Powerconnect-5324 Reference Guide En-Us
Powerconnect-5324 Reference Guide En-Us
www.dell.com | support.dell.com
Notes, Notices, and Cautions
NOTE: A NOTE indicates important information that helps you make better use of your computer.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to
avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2006 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, and PowerConnect are trademarks of Dell Inc.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
1 Command Groups
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Command Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
AAA Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Clock Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
GVRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
LACP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
LLDP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Radius Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
RMON Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
3
SSH Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Syslog Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
TACACS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
802.1x Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2 Command Modes
GC (Global Configuration) Mode . . . . . . . . . . . . . . . . . . . . . . 45
Editing Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4 AAA Commands
aaa authentication login . . . . . . . . . . . . . . . . . . . . . . . . . . 65
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
4
login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
ip http authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
ip https authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
bridge aging-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
clear bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
5
6 Clock
clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
clock source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
clock timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
clock summer-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
sntp authentication-key . . . . . . . . . . . . . . . . . . . . . . . . . . 96
sntp authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
sntp trusted-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
copy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
6
8 Ethernet Configuration Commands
interface ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
mdix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
back-pressure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
9 GVRP Commands
gvrp enable (global) . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
7
garp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
11 IP Addressing Commands
clear host dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
ip address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
8
clear arp-cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
ip domain-lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
ip domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
ip name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
ip host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
12 LACP Commands
lacp system-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
13 Line Commands
line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
autobaud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
exec-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
14 LLDP Commands
lldp enable (global) . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
9
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
15 Management ACL
management access-list . . . . . . . . . . . . . . . . . . . . . . . . . 189
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
10
17 Port Channel Commands
interface port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . 201
channel-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
19 QoS Commands
qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
20 Radius Commands
radius-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
11
radius-server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . 221
21 RMON Commands
show rmon statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
22 SNMP Commands
snmp-server community . . . . . . . . . . . . . . . . . . . . . . . . . 241
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
12
snmp-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
23 Spanning-Tree Commands
spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
13
spanning-tree mst port-priority . . . . . . . . . . . . . . . . . . . . . . 270
24 SSH Commands
ip ssh port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
user-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
key-string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
14
show crypto key pubkey-chain ssh . . . . . . . . . . . . . . . . . . . . 300
25 Syslog Commands
logging on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
26
27 System Management
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
15
show version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
asset-tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
28 TACACS Commands
tacacs-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
29 User Interface
enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
exit(configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
exit(EXEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
debug-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
16
30 VLAN Commands
vlan database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
ip internal-usage-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . 349
31 Web Server
ip http server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
17
ip http port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
32 802.1x Commands
aaa authentication dot1x . . . . . . . . . . . . . . . . . . . . . . . . . 371
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
18
show dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . 382
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
19
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 0 6 – F O R P R O O F O N LY
20
Command Groups
Introduction
The Command Language Interface (CLI) is a network management application operated through
an ASCII terminal without the use of a Graphic User Interface (GUI) driven software application.
By directly entering commands, you have greater configuration flexibility. The CLI is a basic
command-line interpreter similar to the UNIX C shell.
A device can be configured and maintained by entering commands from the CLI, which is based
solely on textual input and output with commands being entered from a terminal keyboard and the
output displayed as text via a terminal monitor. The CLI can be accessed from a VT100 terminal
connected to the console port of the device or through a Telnet connection from a remote host.
This guide describes how the Command Line Interface (CLI) is structured, describes the
command syntax, and describes the command functionality.
This guide also provides information for configuring the PowerConnect switch, details the
procedures and provides configuration examples. Basic installation configuration is described in
the User’s Guide and must be completed before using this document.
Command Groups
The system commands can be broken down into the functional groups shown below.
Command Group Description
AAA Configures connection security including authorization and
passwords.
Address Table Configures bridging address tables.
Configuration and Image Files Manages the device configuration files.
Clock Configures clock commands on the device.
Ethernet Configuration Configures all port configuration options for example ports, storm
control, port speed and auto-negotiation.
GVRP Configures and displays GVRP configuration and information.
IGMP Snooping Configures IGMP snooping and displays IGMP configuration and
IGMP information.
IP Addressing Configures and manages IP addresses on the device.
LACP Configures and displays LACP information.
Line Configures the console and remote Telnet connection.
LLDP Configures and displays LLDP information.
Management ACL Configures and displays management access-list information.
Command Groups 21
www.dell.com | support.dell.com
22 Command Groups
AAA Commands
Command Group Description Access Mode
aaa authentication login Defines login authentication. Global
Configuration
aaa authentication enable Defines authentication method lists for accessing higher Global
privilege levels. Configuration
login authentication Specifies the login authentication method list for a Global
remote telnet or console. Configuration
enable authentication Specifies the authentication method list when accessing Line
a higher privilege level from a remote telnet or console. Configuration
ip http authentication Specifies authentication methods for http. Global
Configuration
ip https authentication Specifies authentication methods for https. Global
Configuration
show authentication Displays information about the authentication methods. Privileged User
methods EXEC
password Specifies a password on a line. Line
Configuration
enable password Sets a local password to control access to normal and Global
privilege levels. Configuration
username Establishes a username-based authentication system. Global
Configuration
show users accounts Displays information about the local user database. Privileged User
EXEC
Command Groups 23
www.dell.com | support.dell.com
bridge multicast forward- Enables forwarding of all multicast frames on a port. VLAN
all Configuration
bridge multicast Enables forbidding forwarding of all multicast frames VLAN
forbidden forward-all to a port. Configuration
bridge aging-time Sets the address table aging time. Global
Configuration
clear bridge Removes any learned entries from the forwarding Privileged User
database. EXEC
port security Disables new address learning on an interface. Interface
Configuration
port security routed Adds MAC-layer secure addresses to a routed port. Interface
secure-address Configuration
show bridge address-table Displays dynamically created entries in the bridge- Privileged User
forwarding database. EXEC
show bridge address-table Displays statically created entries in the bridge- Privileged User
static forwarding database. EXEC
show bridge address-table Displays the number of addresses present in all or at a Privileged User
count specific VLAN. EXEC
show bridge multicast Displays statically created entries in the bridge- Privileged User
address-table forwarding database. EXEC
show bridge multicast Displays the multicast filtering configuration. Privileged User
filtering EXEC
show ports security Displays the port-lock status. Privileged User
EXEC
Clock Commands
Command Group Description Access Mode
clock set Manually sets the system clock. Privileged User
EXEC
clock source Configures an external time source for the Privileged User
system clock. EXEC
clock timezone Sets the time zone for display purposes. Global
Configuration
clock summer-time Configures the system to automatically switch Global
to summer time (daylight saving time). Configuration
sntp authentication-key Defines an authentication key for Simple Global
Network Time Protocol (SNTP). Configuration
24 Command Groups
sntp authenticate Grants authentication for received Network Global
Time Protocol (NTP) traffic from servers. Configuration
sntp trusted-key Authenticates the identity of a system to which Global
Simple Network Time Protocol (SNTP) will Configuration
synchronize.
sntp client poll timer Sets the polling time for the Simple Network Global
Time Protocol (SNTP) client. Configuration
sntp broadcast client Enables the Simple Network Time Protocol Global
enable (SNTP) broadcast clients. Configuration
sntp anycast client enable Enables Anycast clients. Global
Configuration
sntp client enable Enables the Simple Network Time Protocol Interface
(interface) (SNTP) client on an interface. Configuration
sntp unicast client enable Enables the device to use the Simple Network Global
Time Protocol (SNTP) to request and accept Configuration
Network Time Protocol (NTP) traffic from
servers.
sntp unicast client poll Enables polling for the Simple Network Time Global
Protocol (SNTP) predefined unicast clients. Configuration
sntp server Configures the device to use the Simple Global
Network Time Protocol (SNTP) to request and Configuration
accept Network Time Protocol (NTP) traffic
from a server.
show clock Displays the time and date from the system User EXEC
clock.
show sntp configuration Shows the configuration of the Simple Network Privileged User
Time Protocol (SNTP). EXEC
show sntp status Shows the status of the Simple Network Time Privileged User
Protocol (SNTP). EXEC
Command Groups 25
www.dell.com | support.dell.com
show running-config Displays the contents of the currently running Privileged User
configuration file. EXEC
show startup-config Displays the startup configuration file contents. Privileged User
EXEC
show backup-config Displays the backup configuration file contents. Privileged User
EXEC
show bootvar Displays the active system image file that the device Privileged User
loads at startup. EXEC
26 Command Groups
set interface active Reactivates an interface that was suspended by the Privileged User
system. EXEC
show interfaces Displays the configuration for all configured User EXEC
configuration interfaces.
show interfaces status Displays the status for all configured interfaces. User EXEC
show interfaces Displays the description for all configured interfaces. User EXEC
description
show interfaces counters Displays traffic seen by the physical interface. User EXEC
show ports jumbo-frame Displays the jumbo frames configuration. User EXEC
port storm-control Enables the device to count multicast packets. Global
include-multicast Configuration
port storm-control Enables broadcast storm control. Interface
broadcast enable Configuration
port storm-control Configures the maximum broadcast rate. Interface
broadcast rate Configuration
show ports storm-control Displays the storm control configuration. Privileged User
EXEC
GVRP Commands
Command Group Description Mode
gvrp enable (global) Enables GVRP globally. Global
Configuration
gvrp enable (interface) Enables GVRP on an interface. Interface
Configuration
garp timer Adjusts the GARP application join, leave, and Interface
leaveall GARP timer values. Configuration
gvrp vlan-creation-forbid Enables or disables dynamic VLAN creation. Interface
Configuration
gvrp registration-forbid De-registers all VLANs, and prevents dynamic Interface
VLAN registration on the port. Configuration
clear gvrp statistics Clears all the GVRP statistics information. Privileged User
EXEC
show gvrp configuration Displays GVRP configuration information. User EXEC
show gvrp statistics Displays GVRP statistics. User EXEC
show gvrp error-statistics Displays GVRP error statistics. User EXEC
Command Groups 27
IGMP Snooping Commands
www.dell.com | support.dell.com
IP Addressing
Command Group Description Access Mode
clear host dhcp Sets an IP address on the device. Interface
Configuration
ip address Sets an IP address Interface
Configuration
ip address dhcp Acquires an IP address on an interface from the Interface
DHCP server. Configuration
ip default-gateway Defines a default gateway (router) Global
Configuration
show ip interface Displays the usability status of interfaces configured User EXEC
for IP.
arp Adds a permanent entry in the ARP cache. Global
Configuration
28 Command Groups
arp timeout Configures how long an entry remains in the ARP Global
cache Configuration
clear arp-cache Deletes all dynamic entries from the ARP cache. Privileged User
EXEC
show arp Displays entries in the ARP table. Privileged User
EXEC
ip domain-lookup Enables the IP Domain Naming System (DNS)-based Global
host name-to-address translation. Configuration
ip domain-name Defines a default domain name, that the software Global
uses to complete unqualified host names. Configuration
ip name-server Sets the available name servers. Global
Configuration
ip host Defines static host name-to-address mapping in the Global
host cache. Configuration
clear host Deletes entries from the host name-to-address Privileged User
cache EXEC
show hosts Displays the default domain name, a list of name User EXEC
server hosts, the static and cached list of host names
and addresses.
LACP Commands
Command Group Description Access Mode
lacp system-priority Configures the system LACP priority. Global
Configuration
lacp port-priority Configures the priority value for physical ports. Interface
Configuration
lacp timeout Assigns an administrative LACP timeout. Interface
Configuration
show lacp ethernet Displays LACP information for Ethernet ports. User EXEC
show lacp port-channel Displays LACP information for a port-channel. User EXEC
Line Commands
Command Group Description Access Mode
line Identifies a specific line for configuration and enters Global
the line configuration command mode. Configuration
Command Groups 29
www.dell.com | support.dell.com
LLDP Commands
Command Group Description Access Mode
lldp enable (global) Enables Link Layer Discovery Protocol. Global
configuration
lldp enable (interface) Enables Link Layer Discovery Protocol (LLDP) on an Interface
interface. configuration
(Ethernet)
lldp timer Specifies how often the software sends Link Layer Global
Discovery Protocol (LLDP) updates. configuration
lldp hold-multiplier Specifies the amount of time the receiving device should Global
hold a Link Layer Discovery Protocol packet before configuration
discarding it.
lldp reinit-delay Specifies the minimum time an LLDP port will wait Global
before reinitializing LLDP transmission. configuration
lldp tx-delay Specifies the delay between successive LLDP frame Global
transmissions initiated by value/status changes in the configuration
LLDP local systems MIB.
lldp optional-tlv Specifies which optional TLVs from the basic set should Interface
be transmitted. configuration
(Ethernet)
lldp management- Specifies the management address that would be Interface
address advertised from an interface. configuration
(Ethernet)
clear lldp rx Restarts the LLDP RX state machine and clears the Privileged
neighbors table. EXEC
show lldp Displays the Link Layer Discovery Protocol (LLDP) Privileged
configuration configuration. EXEC
show lldp local Displays the Link Layer Discovery Protocol (LLDP) Privileged
information that is advertised from a specific port. EXEC
30 Command Groups
show lldp neighbors Displays information about discovered neighboring Privileged
devices using Link Layer Discovery Protocol (LLDP). EXEC
Command Groups 31
Port Channel Commands
www.dell.com | support.dell.com
QoS Commands
Command Group Description Access Mode
qos Enables quality of service (QoS) on the device and Global
enters QoS basic or advance mode. Configuration
show qos Displays the QoS status. User EXEC
wrr-queue cos-map Maps assigned CoS values to select one of the Global
egress queues. Configuration
wrr-queue bandwidth Assigns Weighted Round Robin (WRR) weights to Interface
egress queues. Configuration
priority-queue out num- Enables the egress queues to be expedite queues. Global
of-queues Configuration
show qos interface Displays interface QoS data. User EXEC
qos map dscp-queue Modifies the DSCP to CoS map. Global
Configuration
32 Command Groups
qos trust (Global) Configures the system to basic mode and the "trust" Global
state. Configuration
qos trust (Interface) Enables each port trust state Interface
Configuration
qos cos Configures the default port CoS value. Interface
Configuration
show qos map Displays all the maps for QoS. User EXEC
Radius Commands
Command Group Description Access Mode
radius-server host Specifies a RADIUS server host. Global
Configuration
radius-server key Sets the authentication and encryption key for all Global
RADIUS communications between the router and the Configuration
RADIUS daemon.
radius-server Specifies the number of times the software searches the Global
retransmit list of RADIUS server hosts. Configuration
radius-server source-ip Specifies the source IP address used for communication Global
with RADIUS servers. Configuration
radius-server timeout Sets the interval for which a router waits for a server host Global
to reply. Configuration
radius-server deadtime Improves RADIUS response times when servers are Global
unavailable. Configuration
show radius-servers Displays the RADIUS server settings. Privileged User
EXEC
Command Groups 33
RMON Commands
www.dell.com | support.dell.com
SNMP Commands
Command Group Description Access Mode
snmp-server community Sets up the community access string to permit access Global
to SNMP protocol. Configuration
snmp-server view Creates or update a view entry, Global
Configuration
snmp-server filter Create or update a filter entry, Global
Configuration
snmp-server contact Sets up a system contact. Global
Configuration
snmp-server location Sets up the information on where the device is located. Global
Configuration
snmp-server enable traps Enables the switch to send SNMP traps or SNMP Global
notifications. Configuration
snmp-server trap Enables the switch to send Simple Network Global
authentication Management Protocol traps when authentication Configuration
failed.
34 Command Groups
snmp-server host Specifies the recipient of Simple Network Global
Management Protocol notification operation, Configuration
snmp-server set Sets SNMP MIB value by the CLI. Global
Configuration
snmp-server group Configures a new Simple Network Management Global
Protocol (SNMP) group, or a table that maps SNMP Configuration
users to SNMP views.
snmp-server user Configure a new SNMP Version 3 user. Global
Configuration
snmp-server v3-host Specifies the recipient of Simple Network Global
Management Protocol Version 3 notifications. Configuration
snmp-server engineID Specifies the Simple Network Management Protocol Global
local (SNMP) engineID on the local device. Configuration
show snmp engineid Displays the ID of the local Simple Network Privileged User
Management Protocol (SNMP) engine. EXEC
show snmp Displays the SNMP status.. Privileged User
EXEC
show snmp views Displays the configuration of views. Privileged User
EXEC
show snmp groups Displays the configuration of groups. Privileged User
EXEC
show snmp filters Displays the configuration of filters. Privileged User
EXEC
show snmp users Displays the configuration of groups. Privileged User
EXEC
Command Groups 35
www.dell.com | support.dell.com
36 Command Groups
spanning-tree link-type Overrides the default link-type setting. Interface
Configuration
spanning-tree pathcost Sets the default path cost method. Global
method Configuration
spanning-tree bpdu Defines BPDU handling when spanning tree is Global
disabled on an interface. Configuration
clear spanning-tree Restarts the protocol migration process on all Privileged User
detected-protocols interfaces or on the specified interface. EXEC
show spanning-tree Displays spanning tree configuration. Privileged User
EXEC
spanning-tree mst mstp- Configure the switch to convert STP/RSTP packets to Global
rstp MSTP instances. Configuration
Spanning-tree guard root Enables root guard on all the spanning tree instances Interface
on that interface. Configuration
SSH Commands
Command Group Description Access Mode
ip ssh port Specifies the port to be used by the SSH server. Global
Configuration
ip ssh server Enables the device to be configured from a SSH Global
server. Configuration
crypto key generate dsa Generates DSA key pairs. Global
Configuration
crypto key generate rsa Generates RSA key pairs. Global
Configuration
ip ssh pubkey-auth Enables public key authentication for incoming Global
SSH sessions. Configuration
crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration mode. Global
Configuration
user-key Specifies which SSH public key is manually SSH Public Key
configured and enters the SSH public key-string
configuration command.
key-string Manually specifies a SSH public key. SSH Public Key
show ip ssh Displays the SSH server configuration. Privileged User
EXEC
show crypto key mypubkey Displays the SSH public keys stored on the device. Privileged User
EXEC
Command Groups 37
www.dell.com | support.dell.com
show crypto key pubkey-chain Displays SSH public keys stored on the device. Privileged User
ssh EXEC
Syslog Commands
Command Group Description Access Mode
logging on Controls error messages logging. Global
Configuration
logging Logs messages to a syslog server. Global
Configuration
logging console Limits messages logged to the console based on Global
severity. Configuration
logging buffered Limits syslog messages displayed from an internal Global
buffer based on severity. Configuration
logging buffered size Changes the number of syslog messages stored in Global
the internal buffer. Configuration
clear logging Clears messages from the internal logging buffer. Privileged User
EXEC
logging file Limits syslog messages sent to the logging file Global
based on severity. Configuration
clear logging file Clears messages from the logging file. Privileged User
EXEC
show logging Displays the state of logging and the syslog Privileged User
messages stored in the internal buffer. EXEC
show logging file Displays the state of logging and the syslog Privileged User
messages stored in the logging file. EXEC
show syslog-servers Displays the syslog servers settings. Privileged User
EXEC
38 Command Groups
System Management Commands
Command Group Description Access Mode
ping Sends ICMP echo request packets to another User EXEC
node on the network.
traceroute Discovers the routes that packets will actually take User EXEC
when traveling to their destination.
telnet Logs in to a host that supports Telnet. User EXEC
resume Switches to another open Telnet session User EXEC
reload Reloads the operating system Privileged User
EXEC
hostname Specifies or modifies the device host name. Global
Configuration
show users Displays information about the active users. User EXEC
show sessions Lists the open Telnet sessions. User EXEC
show system Displays system information. User EXEC
show version Displays the system version information. User EXEC
asset-tag Specifies the device asset-tag. Global
Configuration
show system id Displays the service ID information. User EXEC
TACACS Commands
Command Group Description Mode
tacacs-server host Specifies a TACACS+ host. Global
Configuration
tacacs-server key Sets the authentication encryption key used for all Global
TACACS+ communications between the device Configuration
and the TACACS+ daemon.
tacacs-server source-ip Specifies the source IP address that will be used Global
for the communication with TACACS servers. Configuration
tacacs-server timeout Sets the timeout value. Global
Configuration
show tacacs Displays configuration and statistics for a Privileged User
TACACS+ servers. EXEC
Command Groups 39
User Interface Commands
www.dell.com | support.dell.com
VLAN Commands
Command Group Description Access Mode
vlan database Enters the VLAN database configuration mode. Global
Configuration
vlan Creates a VLAN. VLAN
Configuration
default-vlan disable Disables the default VLAN functionality. VLAN
Configuration
interface vlan Enters the interface configuration (VLAN) mode. Global
Configuration
interface range vlan Enters the interface configuration mode to configure Global
multiple VLANs. Configuration
name Configures a name to a VLAN. Interface
Configuration
40 Command Groups
switchport access vlan Configures the VLAN membership mode of a port. Interface
Configuration
switchport access vlan Configures the VLAN ID when the interface is in access Interface
mode. Configuration
switchport trunk Adds or removes VLANs from a port in general mode. Interface
allowed vlan Configuration
switchport trunk native Defines the port as a member of the specified VLAN, and Interface
vlan the VLAN ID is the "port default VLAN ID (PVID)". Configuration
switchport general Adds or removes VLANs from a general port. Interface
allowed vlan Configuration
switchport general pvid Configures the PVID when the interface is in general Interface
mode. Configuration
switchport general Disables port ingress filtering. Interface
ingress-filtering disable Configuration
switchport general Discards untagged frames at ingress. Interface
acceptable-frame-type Configuration
tagged-only
switchport forbidden Forbids adding specific VLANs to a port. Interface
vlan Configuration
map protocol Adds a special protocol to a named group of protocols, VLAN
protocols-group which may be used for protocol-based VLAN assignment. Configuration
switchport general map Sets a protocol-based classification rule. Interface
protocols-group vlan Configuration
ip internal-usage-vlan Reserves a VLAN as the internal usage VLAN of an Interface
interface. Configuration
show vlan Displays VLAN information. Privileged User
EXEC
show vlan internal Displays a list of VLANs being used internally by the Privileged User
usage switch. EXEC
show vlan protocols- Displays protocols-groups information. Privileged User
groups EXEC
show interfaces Displays switchport configuration. Privileged User
switchport EXEC
switchport mode Configures the VLAN membership mode of a port Interface
configuration
(Ethernet, port-
channel)
Command Groups 41
www.dell.com | support.dell.com
42 Command Groups
802.1x Commands
Command Description Access Mode
aaa authentication Specifies one or more authentication, authorization, and Global
dot1x accounting (AAA) methods for use on interfaces running Configuration
IEEE 802.1X.
dot1x system-auto- Enables 802.1x globally. Global
control Configuration
dot1x port-control Enables manual control of the authorization state of the Interface
port Configuration
dot1x re-authentication Enables periodic re-authentication of the client. Interface
Configuration
dot1x timeout re- Sets the number of seconds between re-authentica- Interface
authperiod tion attempts. Configuration
dot1x re-authenticate Manually initiates a re-authentication of all 802.1X- Privileged User
enabled ports or the specified 802.1X-enabled port. EXEC
dot1x timeout quiet- Sets the number of seconds that the switch remains Interface
period in the quiet state following a failed authentication Configuration
exchange.
dot1x timeout tx-period Sets the number of seconds that the switch waits for Interface
a response to an Extensible Authentication Protocol Configuration
(EAP) - request/identity frame, from the client,
before resending the request.
dot1x max-req Sets the maximum number of times that the switch sends Interface
an EAP - request/identity frame to the client, before Configuration
restarting the authentication process.
dot1x timeout supp- Sets the time for the retransmission of an Extensible Interface
timeout Authentication Protocol (EAP)-request frame to the Configuration
client.
dot1x timeout server- Sets the time for the retransmission of packets to the Interface
timeout authentication server. Configuration
show dot1x Allows multiple hosts on an 802.1X-authorized port, that Interface
has the dot1x port-control interface configuration com- Configuration
mand set to auto.
show dot1x users Displays 802.1X statistics for the specified interface. Privileged User
EXEC
show dot1x statistics Displays 802.1X statistics for the specified interface. Privileged User
EXEC
Command Groups 43
www.dell.com | support.dell.com
44
Command Groups
Command Modes
GC (Global Configuration) Mode
Command Description
aaa authentication enable Defines authentication method lists for accessing higher privilege
levels.
aaa authentication login Defines login authentication.
aaa authentication dot1x Specifies one or more authentication, authorization, and accounting
(AAA) methods for use on interfaces running IEEE 802.1X.
arp Adds a permanent entry in the ARP cache.
arp timeout Configures how long an entry remains in the ARP cache
asset-tag Specifies the device asset-tag.
bridge aging-time Sets the address table aging time.
bridge multicast filtering Enables filtering of multicast addresses.
clock source Configures an external time source for the system clock.
clock timezone Sets the time zone for display purposes
clock summer-time Configures the system to automatically switch to summer time
(daylight saving time).
crypto certificate generate Generates a HTTPS certificate.
crypto certificate import Imports a certificate signed by Certification Authority for HTTPS.
crypto key generate dsa Generates DSA key pairs.
crypto key generate rsa Generates RSA key pairs.
crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration mode.
dot1x system-auto-control Enables 802.1x globally.
enable password Sets a local password to control access to normal and privilege levels.
end Ends the current configuration session and returns to the previous
command mode.
gvrp enable (global) Enables GVRP globally.
hostname Specifies or modifies the device host name.
interface ethernet Enters the interface configuration mode to configure an Ethernet type
interface.
interface port-channel Enters the interface configuration mode of a specific port-channel.
Command Modes 45
www.dell.com | support.dell.com
interface range ethernet Enters the interface configuration mode to configure multiple ethernet
type interfaces.
interface range port-channel Enters the interface configuration mode to configure multiple port-
channels.
interface range vlan Enters the interface configuration mode to configure multiple VLANs.
interface vlan Enters the interface configuration (VLAN) mode.
ip default-gateway Defines a default gateway.
ip domain-lookup Enables the IP Domain Naming System (DNS)-based host name-to-
address translation.
ip domain-name Defines a default domain name, that the software uses to complete
unqualified host names.
ip host Defines static host name-to-address mapping in the host cache.
ip http authentication Specifies authentication methods for http.
ip http port Specifies the TCP port for use by a web browser to configure the
device.
ip http server Enables the device to be configured from a browser.
ip https authentication Specifies authentication methods for https
ip https certificate Configures the active certificate for HTTPS. Use the no form of this
command to return to default.
ip https server Enables the device to be configured from a secured browser.
ip https port Configures a TCP port for use by a secure web browser to configure
the device.
ip igmp snooping (Global) Enables Internet Group Management Protocol (IGMP) snooping
ip name-server Sets the available name servers.
ip ssh port Specifies the port to be used by the SSH server.
ip ssh pubkey-auth Enables public key authentication for incoming SSH sessions.
ip ssh server Enables the device to be configured from a SSH server.
lacp system-priority Configures the system LACP priority.
line Identifies a specific line for configuration and enters the line
configuration command mode.
logging Logs messages to a syslog server.
logging buffered Limits syslog messages displayed from an internal buffer based on
severity.
logging buffered size Changes the number of syslog messages stored in the internal buffer.
logging console Limits messages logged to the console based on severity.
46 Command Modes
logging file Limits syslog messages sent to the logging file based on severity.
logging on Controls error messages logging.
login authentication Specifies the login authentication method list for a remote telnet or
console.
management access-class Defines which management access-list is used.
management access-list Defines a management access-list, and enters the access-list for
configuration.
port jumbo-frame Enables jumbo frames for the device.
port storm-control include- Enables the device to count multicast packets.
multicast
priority-queue out num-of- Enables the egress queues to be expedite queues.
queues
qos Enables quality of service (QoS) on the device and enters QoS basic or
advance mode.
qos map dscp-queue Modifies the DSCP to CoS map.
qos trust (Global) Configure the system to "trust" state.
radius-server deadtime Improves RADIUS response times when servers are unavailable.
radius-server host Specifies a RADIUS server host.
radius-server key Sets the authentication and encryption key for all RADIUS
communications between the router and the RADIUS daemon.
radius-server retransmit Specifies the number of times the software searches the list of RADIUS
server hosts.
radius-server source-ip Specifies the source IP address used for communication with RADIUS
servers.
radius-server timeout Sets the interval for which a router waits for a server host to reply.
rmon alarm Configures alarm conditions.
rmon event Configures a RMON event.
rmon table-size Configures the maximum RMON tables sizes.
snmp-server community Sets up the community access string to permit access to SNMP
protocol.
snmp-server contact Sets up a system contact.
snmp-server enable traps Enables the switch to send SNMP traps or SNMP notifications.
snmp-server host Specifies the recipient of Simple Network Management Protocol
notification operation.
snmp-server location Sets up the information on where the device is located.
Command Modes 47
www.dell.com | support.dell.com
Command Description
back-pressure Enables Back Pressure on a given interface.
channel-group Associates a port with a Port-channel.
clear host dhcp Sets an IP address on the device.
description Adds a description to an interface.
dot1x auth-not-req Enables unauthorized users access to that VLAN
48 Command Modes
dot1x max-req Sets the maximum number of times that the switch sends an EAP -
request/identity frame to the client, before restarting the authentication
process.
show dot1x Allows multiple hosts on an 802.1X-authorized port, that has the dot1x
port-control interface configuration command set to auto.
dot1x port-control Enables manual control of the authorization state of the port
dot1x re-authentication Enables periodic re-authentication of the client.
dot1x single-host-violation Configures the action to be taken, when a station whose MAC address is
not the supplicant MAC address, attempts to access the interface.
dot1x timeout quiet-period Sets the number of seconds that the switch remains in the quiet state
following a failed authentication exchange.
dot1x timeout re-authperiod Sets the number of seconds between re-authentication attempts.
dot1x timeout server-timeout Sets the time for the retransmission of packets to the authentication
server
dot1x timeout supp-timeout Sets the time for the retransmission of an EAP-request frame to the
client.
dot1x timeout tx-period Sets the number of seconds that the switch waits for a response to
an Extensible Authentication Protocol (EAP) - request/identity
frame, from the client, before resending the request.
show dot1x Sets the number of seconds that the switch waits for a response to an
EAP request/identity frame, from the client, before resending the
request.
duplex Configures the full/half duplex operation of a given ethernet interface
when not using auto-negotiation.
flowcontrol Configures the Flow Control on a given interface.
garp timer Adjusts the GARP application join, leave, and leaveall GARP timer
values.
gvrp enable (interface) Enables GVRP on an interface.
gvrp registration-forbid De-registers all VLANs, and prevents dynamic VLAN registration on the
port.
gvrp vlan-creation-forbid Enables or disables dynamic VLAN creation.
ip address Sets an IP address
ip address dhcp Acquires an IP address on an interface from the DHCP server.
ip internal-usage-vlan Reserves a VLAN as the internal usage VLAN of an interface.
lacp port-priority Configures the priority value for physical ports.
lacp timeout Assigns an administrative LACP timeout.
mdix Enables automatic crossover on a given interface.
Command Modes 49
www.dell.com | support.dell.com
Command Description
enable authentication Specifies the authentication method list when accessing a higher
privilege level from a remote telnet or console.
exec-timeout Configures the interval that the system waits until user input is detected.
history Enables the command history function.
50 Command Modes
history size Changes the command history buffer size for a particular line.
password Specifies a password on a line.
autobaud Sets the line for automatic baud rate detection
speed Sets the line baud rate.
Command Description
show dot1x users Displays 802.1X statistics for the specified interface.
boot system Specifies the system image that the device loads at startup.
clear arp-cache Deletes all dynamic entries from the ARP cache.
clear bridge Removes any learned entries from the forwarding database.
clear gvrp statistics Clears all the GVRP statistics information.
clear host Deletes entries from the host name-to-address cache
clear host dhcp Deletes entries from the host name-to-address mapping received from
Dynamic Host Configuration Protocol (DHCP).
clear logging Clears messages from the internal logging buffer.
clear logging file Clears messages from the logging file
clear spanning-tree detected- Restarts the protocol migration process on all interfaces or on the
protocols specified interface.
clock set Manually sets the system clock.
configure Enters the global configuration mode.
copy Copies files from a source to a destination.
crypto certificate request Generates and displays certificate requests for HTTPS.
dot1x re-authenticate Manually initiates a re-authentication of all 802.1X-enabled ports or the
specified 802.1X-enabled port.
login Returns to User EXEC mode.
reload Reloads the operating system.
Command Modes 51
www.dell.com | support.dell.com
set interface active Reactivates an interface that was suspended by the system.
show arp Displays entries in the ARP table.
show authentication methods Displays information about the authentication methods.
show bootvar Displays the active system image file that the device loads at startup
show bridge address-table Displays dynamically created entries in the bridge-forwarding database.
show bridge address-table Displays the number of addresses present in all VLANs or at specific
count VLAN.
show bridge multicast address- Displays statically created entries in the bridge-forwarding database.
table
show bridge multicast address- Displays multicast MAC address table information.
table
show bridge multicast filtering Displays the multicast filtering configuration.
show copper-ports cable- Displays the estimated copper cable length attached to a port.
length
show copper-ports tdr Displays the last TDR (Time Domain Reflectometry) tests on specified
ports.
show crypto key mypubkey Displays the SSH public keys stored on the device.
show crypto key pubkey-chain Displays SSH public keys stored on the device.
ssh
show crypto certificate Displays the SSL certificates of the device
mycertificate
show dot1x Displays 802.1X status for the switch or for the specified interface.
show dot1x advanced Displays 802.1X enhanced features for the switch or for the specified
interface.
show dot1x users Displays 802.1X users for the switch.
show fiber-ports optical- Displays the optical transceiver diagnostics.
transceiver
show ip ssh Displays the SSH server configuration.
show lacp port-channel Displays LACP information for a port-channel.
show logging Displays the state of logging and the syslog messages stored in the
internal buffer.
show logging file Displays the state of logging and the syslog messages stored in the
logging file.
show management access-class Displays the active management access-list.
show management access-list Displays management access-lists.
show ports security Displays the port-lock status.
52 Command Modes
show ports storm-control Displays the storm control configuration.
show radius-servers Displays the RADIUS server settings.
show running-config Displays the contents of the currently running configuration file.
show snmp Displays the SNMP status.
show spanning-tree Displays spanning tree configuration.
show startup-config Displays the startup configuration file contents.
show syslog-servers Displays the syslog servers settings.
show tacacs Displays configuration and statistics for a TACACS+ servers.
show users accounts Displays information about the local user database.
test copper-port tdr Diagnoses with TDR (Time Domain Reflectometry) technology the
quality and characteristics of a copper cable attached to a port.
Command Description
key-string Manually specifies a SSH public key.
user-key Specifies which SSH public key is manually configured and enters the
SSH public key-string configuration command
Command Description
clear counters Clears statistics on an interface.
enable Enters the privileged EXEC mode.
exit(EXEC) Closes an active terminal session by logging off the device.
login Changes a login username.
ping Sends ICMP echo request packets to another node on the network.
show clock Displays the time and date from the system clock.
show gvrp configuration Displays GVRP configuration information.
show gvrp error-statistics Displays GVRP error statistics.
clear gvrp statistics Displays GVRP statistics.
show history Lists the commands entered in the current session.
Command Modes 53
www.dell.com | support.dell.com
show hosts Displays the default domain name, a list of name server hosts, the static
and the cached list of host names and addresses.
show interfaces configuration Displays the configuration for all configured interfaces.
show interfaces counters Displays traffic seen by the physical interface.
show interfaces description Displays the description for all configured interfaces.
port channel load balance Displays Port-channel information.
show interfaces status Displays the status for all configured interfaces.
show ip igmp snooping groups Displays multicast groups learned by IGMP snooping.
show ip igmp snooping Displays IGMP snooping configuration.
interface
show ip igmp snooping Displays information on dynamically learned multicast router
mrouter interfaces.
show ip interface Displays the usability status of interfaces configured for IP.
show lacp ethernet Displays LACP information for Ethernet ports.
show line Displays line parameters.
show ports jumbo-frame Displays the jumbo frames configuration.
show ports monitor Displays the port monitoring status.
show privilege Displays the current privilege level.
show qos Displays the QoS status.
show qos interface Assigns CoS values to select one of the egress queues.
show qos map Displays all the maps for QoS.
show rmon alarm Displays alarm configurations.
show rmon alarm-table Displays the alarms summary table.
show rmon collection history Displays the requested history group configuration.
show rmon events Displays the RMON event table.
show rmon history Displays RMON Ethernet Statistics history.
show rmon log Displays the RMON logging table.
show rmon statistics Displays RMON Ethernet Statistics.
show system Displays system information.
show system id Displays the service id information.
show users Displays information about the active users.
show version Displays the system version information.
54 Command Modes
VC (VLAN Configuration) Mode
Command Description
bridge address Adds a static MAC-layer station source address to the bridge table.
bridge multicast address Registers MAC-layer multicast addresses to the bridge table, and adds
static ports to the group.
bridge multicast forbidden Forbids adding a specific multicast address to specific ports.
address
bridge multicast forbidden Enables forbidding forwarding of all multicast frames to a port.
forward-all
bridge multicast forward-all Enables forwarding of all multicast frames on a port.
ip igmp snooping (Interface) Enables Internet Group Management Protocol (IGMP) snooping on a
specific VLAN.
ip igmp snooping host-time- Configures the host-time-out.
out
ip igmp snooping leave-time- Configures the leave-time-out.
out
show ip igmp snooping mrouter Enables automatic learning of multicast router ports in the context of a
specific VLAN.
ip igmp snooping mrouter- Configures the mrouter-time-out.
time-out
vlan Creates a VLAN.
Command Modes 55
www.dell.com | support.dell.com
56
Command Modes
Using the CLI
This chapter describes how to start using the CLI and describes implemented command editing
features to assist in using the CLI.
commands are available in User EXEC Mode. This level is reserved for tasks that do not change the
configuration. To enter the next level, the Privileged EXEC mode, a password is required.
The Privileged mode gives access to commands that are restricted on EXEC mode and provides
access to the device Configuration mode.
The Global Configuration mode manages the device configuration on a global level.
The Interface Configuration mode configures specific interfaces in the device.
console>
The default host name is "Console" unless it has been changed using the hostname command in
the Global Configuration mode.
console#
To return from Privileged Exec mode to User EXEC mode, type the disable command at the
command prompt.
console>enable
Enter Password: ******
console#
console#disable
console>
The Exit command is used to return from any mode to the previous mode except when returning
to User EXEC mode from the Privileged EXEC mode. For example, the Exit command is used to
return from the Interface Configuration mode to the Global Configuration mode
console(config)#
To return from the Global Configuration mode to the Privileged EXEC mode, the user can use one
of the following commands:
• exit
• end
• Ctrl+Z
The following example illustrates how to access Global Configuration mode and returns to the
Privileged EXEC mode:
console#
console#configure
console(config)#exit
console#
Interface Configuration mode commands are to modify specific interface operations. The
following are the Interface Configuration modes:
• Line Interface—Contains commands to configure the management connections. These
include commands such as line speed, timeout settings, etc. The Global Configuration mode
command line is used to enter the Line Configuration command mode.
• VLAN Database—Contains commands to create a VLAN as a whole. The Global
Configuration mode command vlan database is used to enter the VLAN Database Interface
Configuration mode.
• Management Access List—Contains commands to define management access-lists. The
Global Configuration mode command management access-list is used to enter the
Management Access List Configuration mode.
• Ethernet—Contains commands to manage port configuration. The Global Configuration
mode command interface ethernet is used to enter the Interface Configuration mode to
configure an Ethernet type interface.
• Port Channel—Contains commands to configure port-channels, for example, assigning ports
to a VLAN or port-channel. Most of these commands are the same as the commands in the
Ethernet interface mode, and are used to manage the member ports as a single entity. The
Global Configuration mode command interface port-channel is used to enter the Port
Channel Interface Configuration mode.
• SSH Public Key-chain—Contains commands to manually specify other device SSH public
keys. The Global Configuration mode command crypto key pubkey-chain ssh is used to enter
the SSH Public Key-chain Configuration mode.
• Interface—Contains commands that configure the interface. The Global Configuration
mode command interface ethernet is used to enter the Interface Configuration mode.
• QoS—Contains commands related to service definitions. The Global Configuration mode
command qos config-services is used to enter the QoS services configuration mode.
Editing Features
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a command, and
arguments specify configuration parameters. For example, in the command "show interfaces status
ethernet g5," show, interfaces and status are keywords, ethernet is an argument that specifies the
interface type, and g5 specifies the port.
To enter commands that require parameters, enter the required parameters after the command
keyword. For example, to set a password for the administrator, enter:
Console(config)# username admin password smith
When working with the CLI, the command options are not displayed. The command is not
selected from a menu but is manually entered. To see what commands are available in each mode
or within an interface configuration, the CLI does provide a method of displaying the available
commands, the command syntax requirements and in some instances parameters required to
complete the command. The standard command to request help is?.
There are two instances where the help information can be displayed:
• Keyword lookup—The character ? is entered in place of a command. A list of all valid
commands and corresponding help messages are displayed.
• Partial keyword lookup—A command is incomplete and the character ? is entered in place of
a parameter. The matched parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following features are
described:
• Terminal Command Buffer
• Command Completion
• Keyboard Shortcuts
Every time a command is entered in the CLI, it is recorded on an internally managed Command
History buffer. Commands stored in the buffer are maintained on a First In First Out (FIFO)
basis.These commands can be recalled, reviewed, modified, and reissued. This buffer is not
preserved across device resets.
Keyword Source or destination
Up-arrow key Recalls commands in the history buffer, beginning with the most recent
Ctrl+P command. Repeats the key sequence to recall successively older
commands.
Down-arrow key Returns to more recent commands in the history buffer after recalling
commands with the up-arrow key. Repeating the key sequence will recall
successively more recent commands.
By default, the history buffer system is enabled, but it can be disabled at any time. For information
about the command syntax to enable or disable the history buffer, see history.
There is a standard default number of commands that are stored in the buffer. The standard
number of 10 commands can be increased to 256. By configuring 0, the effect is the same as
disabling the history buffer system. For information about the command syntax for configuring the
command history buffer, see history size.
To display the history buffer, see show history.
Command Completion
If the command entered is incomplete, invalid, or has missing or invalid parameters, then the
appropriate error message is displayed. This assists in entering the correct command. By pressing
the <Tab> button, an incomplete command is entered. If the characters already entered are not
enough for the system to identify a single matching command, press "?" to display the available
commands matching the characters already entered.
Incorrect or incomplete commands are automatically re-entered next to the cursor. If a parameter
must be added, the parameter can be added to the basic command already displayed next to the
cursor. The following example indicates that the command interface ethernet requires a missing
parameter.
(config)#interface ethernet
%missing mandatory parameter
(config)#interface ethernet
Convention Description
[] In a command line, square brackets indicates an optional entry.
{} In a command line, curly brackets indicate a selection of compulsory
parameters separated by the | character. One option must be selected. For
example: flowcontrol {auto|on|off} means that for the flowcontrol
command either auto, on or off must be selected.
Italic font Indicates a parameter.
<Enter> Any individual key on the keyboard. For example click <Enter>.
Ctrl+F4 Any combination keys pressed simultaneously on the keyboard.
Screen Indicates system messages and prompts appearing on the console.
Display
all When a parameter is required to define a range of ports or parameters
and all is an option, the default for the command is all when no
parameters are defined. For example, the command interface range port-
channel has the option of either entering a range of channels, or selecting
all. When the command is entered without a parameter, it automatically
defaults to all.
64
Using the CLI
AAA Commands
aaa authentication login
The aaa authentication login Global Configuration mode commands defines login authentication.
To return to the default configuration, use the no form of this command.
Syntax
aaa authentication login {default | list-name} method1 [method2...]
no aaa authentication login {default | list-name}
• default—Uses the listed authentication methods that follow this argument as the default
list of methods when a user logs in.
• list-name—Character string used to name the list of authentication methods activated
when a user logs in.
• method1 [method2...]—Specify at least one from the following table:
Keyword Source or destination
enable Uses the enable password for authentication.
line Uses the line password for authentication.
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command aaa
authentication login list-name local.
NOTE: On the console, login succeeds without any authentication check if the authentication method is
not defined.
Command Mode
Global Configuration mode
User Guidelines
• The default and optional list names created with the aaa authentication login command are
used with the login authentication command.
AAA Commands 65
• Create a list by entering the aaa authentication login list-name method command for a
www.dell.com | support.dell.com
particular protocol, where list-name is any character string used to name this list. The method
argument identifies the list of methods that the authentication algorithm tries, in the given
sequence.
• The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify none as the final method in the command line.
Example
The following example configures authentication login.
Syntax
aaa authentication enable {default | list-name} method1 [method2...]
no aaa authentication enable default
• default—Uses the listed authentication methods that follow this argument as the default
list of methods, when using higher privilege levels.
• list-name—Character string used to name the list of authentication methods activated,
when using access higher privilege levels.
• method1 [method2...]—Specify at least one from the following table:
66 AAA Commands
Default Configuration
If the default list is not set, only the enable password is checked. This has the same effect as
the command aaa authentication enable default enable.
On the console, the enable password is used if it exists. If no password is set, the process still
succeeds. This has the same effect as using the command aaa authentication enable default
enable none.
Command Mode
Global Configuration mode
User Guidelines
• The default and optional list names created with the aaa authentication enable command are
used with the enable authentication command.
• Create a list by entering the aaa authentication enable list-name method command where
list-name is any character string used to name this list. The method argument identifies the
list of methods that the authentication algorithm tries, in the given sequence.
• The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify none as the final method in the command line.
• All aaa authentication enable default requests sent by the device to a RADIUS or TACACS
server include the username "$enab15$".
Example
The following example sets authentication when accessing higher privilege levels.
login authentication
The login authentication Line Configuration mode command specifies the login authentication
method list for a remote telnet, SSH or console. To return to the default specified by the
authentication login command, use the no form of this command.
Syntax
login authentication {default | list-name}
no login authentication
• default—Uses the default list created with the authentication login command.
• list-name—Uses the indicated list created with the authentication login command.
AAA Commands 67
Default Configuration
www.dell.com | support.dell.com
Command Mode
Line Configuration mode
User Guidelines
• Changing login authentication from default to another value may disconnect the telnet
session.
Example
The following example specifies the default authentication method for a console.
enable authentication
The enable authentication Line Configuration mode command specifies the authentication
method list when accessing a higher privilege level from a remote telnet, SSH or console. To return
to the default specified by the enable authentication command, use the no form of this command.
Syntax
enable authentication {default | list-name}
no enable authentication
• default—Uses the default list created with the authentication enable command.
• list-name—Uses the indicated list created with the authentication enable command.
Default Configuration
Uses the default set with the command authentication enable.
Command Mode
Line Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example specifies the default authentication method when accessing a higher
privilege level from a console.
68 AAA Commands
Console (config)# line console
Console (config-line)# enable authentication default
ip http authentication
The ip http authentication Global Configuration mode command specifies authentication
methods for http. To return to the default, use the no form of this command.
Syntax
ip http authentication method1 [method2...]
no ip http authentication
• method1 [method2...]—Specify at least one from the following table:
Default Configuration
The local user database is checked. This has the same effect as the command ip http
authentication local.
Command Mode
Global Configuration mode
User Guidelines
• The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify none as the final method in the command line.
Example
The following example configures the http authentication.
AAA Commands 69
ip https authentication
www.dell.com | support.dell.com
Syntax
ip https authentication method1 [method2...]
no ip https authentication
• method1 [method2...]—Specify at least one from the following table:
Default Configuration
The local user database is checked. This has the same effect as the command ip https
authentication local.
Command Mode
Global Configuration mode
User Guidelines
• The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify none as the final method in the command line.
Example
The following example configures https authentication.
70 AAA Commands
Syntax
show authentication methods
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the authentication configuration.
AAA Commands 71
www.dell.com | support.dell.com
password
The password Line Configuration mode command specifies a password on a line. To remove the
password, use the no form of this command.
Syntax
password password [encrypted]
no password
• password—Password for this level, from 1 to 159 characters in length.
• encrypted—Encrypted password to be entered, copied from another device
configuration.
72 AAA Commands
Default Configuration
No password is required.
Command Mode
Line Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example specifies a password "secret" on a line.
enable password
The enable password Global Configuration mode command sets a local password to control access
to normal and privilege levels. To remove the password requirement, use the no form of this
command.
Syntax
enable password [level level] password [encrypted]
no enable password [level level]
• password—Password for this level, from 1 to 159 characters in length.
• level level—Level for which the password applies. If not specified the level is 15
(Range: 1-15).
• encrypted—Encrypted password entered, copied from another device configuration.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
AAA Commands 73
Example
www.dell.com | support.dell.com
The following example sets a local level 15 password "secret" to control access to user and privilege
levels.
username
The username Global Configuration mode command establishes a username-based authentication
system. To remove a user name use the no form of this command.
Syntax
username name [password password] [level level] [encrypted]
no username name
• name—The name of the user. (Range: 1 - 20 characters)
• password—The authentication password for the user. (Range: 1 - 159 characters).
• level—The user level (Range: 1 -15).
• encrypted—Encrypted password entered, copied from another device configuration.
Default Configuration
No user is defined.
Command Mode
Global Configuration mode
User Guidelines
• No password is required.
Example
The following example configures user "bob" with the password "lee" and user level 15 to the
system.
74 AAA Commands
Syntax
show users accounts
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the local users configured with access to the system.
Username Privilege
-------- ---------
Bob 15
Robert 15
AAA Commands 75
www.dell.com | support.dell.com
76
AAA Commands
Address Table Commands
bridge address
The bridge address VLAN Interface Configuration mode command adds a static MAC-layer
station source address to the bridge table. To delete the MAC address, use the no form of the
bridge address command (using the no form of the command without specifying a MAC address
deletes all static MAC addresses belonging to this VLAN).
Syntax
bridge address mac-address {ethernet interface | port-channel port-channel-number}
[permanent | delete-on-reset | delete-on-timeout | secure]
no bridge address [mac-address]
• mac-address—A valid MAC address in the format of xx:xx:xx:xx:xx:xx.
• interface—A valid Ethernet port.
• port-channel-number—A valid port-channel number.
• permanent—The address can only be deleted by the no bridge address command.
• delete-on-reset—The address is deleted after reset.
• delete-on-timeout—The address is deleted after "age out" time has expired.
• secure—The address is deleted after the port changes mode to unlock learning (no port
security command). This parameter is only available when the port is in learning locked
mode.
Default Configuration
No static addresses are defined. The default mode for an added address is permanent.
Command Mode
Interface configuration (VLAN) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example adds a permanent static MAC-layer station source address 3aa2.64b3.a245
on port g8 to the bridge table.
Syntax
bridge multicast filtering
no bridge multicast filtering
Default Configuration
Disabled. All multicast addresses are flooded to all ports.
Command Mode
Global Configuration mode
User Guidelines
• If devices exist on the VLAN, do not change the unregistered multicast addresses state to
drop on the devices ports.
• If multicast routers exist on the VLAN and IGMP-snooping is not enabled, the bridge
multicast forward-all command should be used to enable forwarding all multicast packets to
the multicast routers.
Example
In this example, bridge multicast filtering is enabled.
Console (config)# bridge multicast filtering
Syntax
bridge multicast address {mac-multicast-address | ip-multicast-address}
Default Configuration
No multicast addresses are defined.
Command Mode
Interface configuration (VLAN) mode
User Guidelines
• If the command is executed without add or remove, the command only registers the group in
the bridge database.
• Static multicast addresses can only be defined on static VLANs.
Examples
The following example registers the MAC address:
The following example registers the MAC address and adds ports statically.
The bridge multicast forbidden address Interface Configuration mode command forbids adding a
specific multicast address to specific ports. Use the no form of this command to return to default.
Syntax
bridge multicast forbidden address {mac-multicast-address | ip-multicast-address} {add |
remove} {ethernet interface-list | port-channel port-channel-number-list}
no bridge multicast forbidden address {mac-multicast-address | ip-multicast-address}
• add—Adds ports to the group.
• remove—Removes ports from the group.
• mac-multicast-address—MAC multicast address in the format of xx:xx:xx:xx:xx:xx.
• ip- multicast-address—IP multicast address is in the format xxx.xxx.xxx.xxx.
• interface-list—Separate non consecutive valid Ethernet ports with a comma and no
spaces; hyphen is used to designate a range of ports.
• port-channel-number-list—Separate non consecutive valid port-channels with a comma
and no spaces; a hyphen is used to designate a range of port-channels.
Default Configuration
No forbidden addresses are defined.
Command Modes
Interface Configuration (VLAN) mode
User Guidelines
• Before defining forbidden ports, the multicast group should be registered.
Examples
In this example the MAC address 01:00:5e:02:02:03 is forbidden on port g9 within VLAN 8.
Syntax
bridge multicast forward-all {add | remove} {ethernet interface-list | port-channel port-
channel-number-list}
no bridge multicast forward-all
• add—Adds ports to the group.
• remove—Removes ports from the group.
• interface-list—Separate non consecutive valid Ethernet ports with a comma and no
spaces; a hyphen is used to designate a range of ports.
• port-channel-number-list—Separate non consecutive valid port-channels with a comma
and no spaces; a hyphen is used to designate a range of port-channels.
Default Configuration
Disable forward-all on the specified interface.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example all multicast packets on port g8 are forwarded.
Default Configuration
By default, this setting is disabled (for example, forwarding to the port is not forbidden).
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• IGMP snooping dynamically discovers multicast router ports. When a multicast router port is
discovered, all the multicast packets are forwarded to it unconditionally.
• This command prevents a port to be a multicast router port.
Example
In this example, forwarding all multicast packets to g6 are forbidden.
bridge aging-time
The bridge aging-time Global Configuration mode command sets the address table aging time. To
restore the default, use the no form of the bridge aging-time command.
Syntax
bridge aging-time seconds
no bridge aging-time
Default Configuration
300 seconds
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example the bridge aging time is set to 250.
clear bridge
The clear bridge Privileged EXEC mode command removes any learned entries from the
forwarding database.
Syntax
clear bridge
• This command has no keywords or arguments.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, the bridge tables are cleared.
The port security Interface Configuration mode command locks the port. By locking the port, new
addresses are not learned on the port. To enable new address learning, use the no form of the port
security command.
Syntax
port security [forward | discard | discard-shutdown] [trap seconds]
no port security
• forward—Forwards frames with unlearned source addresses, but does not learn the
address.
• discard—Discards frames with unlearned source addresses. This is the default if no
option is indicated.
• discard-shutdown—Discards frames with unlearned source addresses. The port is also
shut down.
• trap Seconds—Sends SNMP traps and defines the minimal amount of time in seconds
between two consecutive traps. (Range: 1 - 1,000,000)
Default Configuration
Disabled - No port security
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, frame forwarding is enabled without learning, and with traps sent every 100
seconds on port g1.
Syntax
port security routed secure-address mac-address
no port security routed secure-address mac-address
• mac-address—Specify a MAC address in the format of xx:xx:xx:xx:xx:xx.
Default Configuration
No addresses are defined.
Command Mode
Interface configuration (Ethernet, port-channel). Cannot be configured for a range of
interfaces (range context).
User Guidelines
• The command enables adding secure MAC addresses to a routed ports in port security mode.
The command is available when the port is a routed port and in port security mode. The
address is deleted if the port exits the security mode or is not a routed port.
Example
In this example, the MAC-layer address 66:66:66:66:66:66 is added to port g1.
Syntax
show bridge address-table [vlan vlan] [ethernet interface | port-channel port-channel-
number]
• vlan—Specific valid VLAN, such as VLAN 1.
• interface—A valid Ethernet port.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• Internal usage VLANs (VLANs that are automatically allocated on routed ports) would be
presented in the VLAN column by a port number and not by a VLAN ID.
Example
In this example, all classes of entries in the bridge-forwarding database are displayed.
Syntax
show bridge address-table static [vlan vlan] [ethernet interface | port-channel port-channel-
number]
• vlan—Specific valid VLAN, such as VLAN 1.
• interface—A valid Ethernet port.
• port-channel-number—A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, all static entries in the bridge-forwarding database are displayed.
Syntax
show bridge address-table count [vlan vlan]
• vlan —Specific VLAN.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• This command displays the count for 1 VLAN, for all VLANs or for a specific port.
• No commas are allowed.
Example
In this example, the number of addresses present in the VLANs are displayed.
Capacity: 8192
Free: 8084
Used: 108
Static addresses: 2
Dynamic addresses: 97
Internal addresses: 9
Syntax
show bridge multicast address-table [vlan vlan-id] [address mac-multicast-address | ip-
multicast-address] [format ip | mac]
• vlan_id—A VLAN ID value.
• mac-multicast-address—A MAC multicast address in the format of xx:xx:xx:xx:xx:xx.
• ip-multicast-address—An IP multicast address.
• format—Multicast address format. Can be ip or mac. If format is unspecified, the default
is mac.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, multicast MAC address table information is displayed.
Syntax
show bridge multicast filtering vlan-id
• vlan_id—A valid VLAN ID value.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, the multicast configuration for VLAN 1 is displayed.
Console # show bridge multicast filtering 1
Filtering: Enabled
VLAN: 1
Syntax
show ports security [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet port.
• port-channel-number—A valid port-channel number.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In this example, all classes of entries in the port-lock status are displayed.
Console # show ports security
Syntax
clock set hh:mm:ss day month year
or
clock set hh:mm:ss month day year
• hh:mm:ss—Current time in hours (military format), minutes, and seconds (0 - 23, mm: 0
- 59, ss: 0 - 59).
• day—Current day (by date) in the month (1 - 31).
• month—Current month using the first three letters by name (Jan, …, Dec).
• year—Current year (2000 - 2097).
Default Configuration
The default time set is 0:0:0:0 Jan 1 2000 or xxxxx Month Day Year.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example sets the system time to 13:32:00 on the 7th March 2002.
clock source
The clock source Privileged EXEC mode command configures an external time source for the
system clock.
Syntax
clock source {sntp}
no clock source
• sntp—SNTP servers
Clock 93
Default Configuration
www.dell.com | support.dell.com
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example configures an external time source for the system clock.
clock timezone
The clock timezone Global Configuration mode command sets the time zone for display purposes.
To set the time to Coordinated Universal Time (UTC), use the no form of this command.
Syntax
clock timezone hours-offset [minutes minutes-offset] [zone acronym]
no clock timezone
• hours-offset— Hours difference from UTC. (Range: -12 – +13)
• minutes minutes-offset—Minutes difference from UTC. (Range: 0 – 59)
• zone acronym—The acronym of the time zone. (Range: Up to 4 characters)
Default Configuration
UTC
Command Mode
Global Configuration mode
User Guidelines
• The system internally keeps time in UTC, so this command is used only for display purposes
and when the time is manually set.
Examples
The following example sets the timezone to 6 hours difference from UTC.
94 Clock
clock summer-time
The clock summer-time Global Configuration mode command configures the system to
automatically switch to summer time (daylight saving time). To configure the software to not
automatically switch to summer time, use the no form of this command.
Syntax
clock summer-time recurring {usa | eu | {week day month hh:mm week day month hh:mm}}
[offset offset] [zone acronym]
clock summer-time date date month year hh:mm date month year hh:mm [offset offset] [zone
acronym]
clock summer-time date month date year hh:mm month date year hh:mm [offset offset] [zone
acronym]
no clock summer-time
• recurring—Indicates that summer time should start and end on the corresponding
specified days every year.
• date—Indicates that summer time should start on the first specific date listed in the
command and end on the second specific date in the command.
• usa—The summer time rules are the United States rules.
• eu—The summer time rules are the European Union rules.
• week— Week of the month. (Range: 1 - 4, first, last)
• day—Day of the week (Range: first three letters by name, like sun)
• date—Date of the month (Range:1 - 31)
• month—Month (Range: first three letters by name)
• year— year - no abbreviation (Range: 2000 - 2097)
• hh:mm—Time in military format, in hours and minutes (Range: hh: 0 - 23, mm:0 - 59)
• offset offset—Number of minutes to add during summer time (Range: 1 - 1440).
• zone acronym—The acronym of the time zone to be displayed when summer time is in
effect. If unspecified default to the timezone acronym. (Range: Up to 4 characters)
Default Configuration
Summer time is disabled.
offset offset—default is 60
zone acronym— If unspecified default to the timezone acronym.
If the timezone has not been defined, the default will be UTC.
Clock 95
Command Mode
www.dell.com | support.dell.com
User Guidelines
• In both the date and recurring forms of the command, the first part of the command specifies
when summer time begins, and the second part specifies when it ends. All times are relative to
the local time zone. The start time is relative to standard time. The end time is relative to
summer time. If the starting month is chronologically after the ending month, the system
assumes that you are in the southern hemisphere.
• USA rule for daylight saving time:
• Start: First Sunday in April
• End: Last Sunday in October
• Time: 2 am local time
• EU rule for daylight saving time:
• Start: Last Sunday in March
• End: Last Sunday in October
• Time: 1.00 am (01:00) Greenwich Mean Time (GMT)
Examples
The following example sets summer time starting on the first Sunday in April at 2am and finishing
on the last Sunday in October at 2 am.
sntp authentication-key
The sntp authentication-key Global Configuration mode command defines an authentication key
for Simple Network Time Protocol (SNTP). To remove the authentication key for SNTP, use the no
form of this command.
Syntax
sntp authentication-key number md5 value
no sntp authentication-key number
• number—Key number (Range: 1 - 4294967295)
• value—Key value (Range: Up to 8 characters)
Default Configuration
No authentication key is defined.
96 Clock
Command Mode
Global Configuration mode
User Guidelines
• Multiple keys can be generated.
Examples
The following example defines the authentication key for SNTP.
sntp authenticate
The sntp authenticate Global Configuration mode command grants authentication for received
Network Time Protocol (NTP) traffic from servers. To disable the feature, use the no form of this
command.
Syntax
sntp authenticate
no sntp authenticate
This command has no arguments or keywords.
Default Configuration
No authentication
Command Mode
Global Configuration mode
User Guidelines
• The command is relevant for both unicast and broadcast.
Examples
The following example defines the authentication key for SNTP and grants authentication.
Clock 97
sntp trusted-key
www.dell.com | support.dell.com
The sntp trusted-key Global Configuration mode command authenticates the identity of a system
to which Simple Network Time Protocol (SNTP) will synchronize. To disable authentication of the
identity of the system, use the no form of this command.
Syntax
sntp trusted-key key-number
no sntp trusted-key key-number
• key-number—Key number of authentication key to be trusted. (Range: 1 - 4294967295)
Default Configuration
Not trusted.
Command Mode
Global configuration mode
User Guidelines
• The command is relevant for both received unicast and broadcast.
• If there is at least 1 trusted key, then unauthenticated messages will be ignored.
Examples
The following example authenticates key 8.
Syntax
sntp client poll timer seconds
no sntp client poll timer
• seconds—Polling interval in seconds (Range: 60-86400)
98 Clock
Default Configuration
1024
Command Mode
Global configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example sets the polling time for the Simple Network Time Protocol (SNTP) client
to 120 seconds.
Syntax
sntp broadcast client enable
no sntp broadcast client enable
This command has no arguments or keywords.
Default Configuration
Disabled
Command Mode
Global configuration mode
User Guidelines
• The sntp broadcast client enable Interface Configuration mode command enables the device
to receive broadcast transmissions globally and on ALL interfaces.
• Use the sntp client enable Interface Configuration mode command to enable the SNTP
client on a specific interface.
Examples
The following example enables the SNTP broadcast clients.
Clock 99
sntp anycast client enable
www.dell.com | support.dell.com
The sntp anycast client enable Global Configuration mode command enables anycast client. To
disable the polling for SNTP broadcast client, use the no form of this command.
Syntax
sntp anycast client enable
no sntp anycast client enable
This command has no arguments or keywords.
Default Configuration
Disabled
Command Mode
Global configuration
User Guidelines
• Polling time is determined by the sntp client poll timer Global Configuration mode
command.
• Use the sntp client enable Interface Configuration mode command to enable the SNTP
client on a specific interface.
Examples
The following example enables anycast clients.t
Syntax
sntp client enable
no sntp client enable
This command has no arguments or keywords.
Default Configuration
Disabled
100 Clock
Command Mode
Interface configuration (Ethernet, Port-Channel, VLAN) mode
User Guidelines
• Use the sntp client enable Global Configuration mode command to enable broadcast clients
globally.
• Use the sntp anycast client enable Global Configuration mode command to enable anycast
clients globally.
Examples
The following example enables the SNTP client on the interface.
Syntax
sntp unicast client enable
no sntp unicast client enable
This command has no arguments or keywords.
Default Configuration
Disabled
Command Mode
Global Configuration mode
User Guidelines
• Use the sntp server command to define SNTP servers.
Examples
The following example enables the device to use the Simple Network Time Protocol (SNTP) to
request and accept Network Time Protocol (NTP) traffic from servers.
Clock 101
sntp unicast client poll
www.dell.com | support.dell.com
The sntp unicast client poll Global Configuration mode command enables polling for the Simple
Network Time Protocol (SNTP) predefined unicast clients. To disable the polling for SNTP client,
use the no form of this command.
Syntax
sntp unicast client poll
no sntp unicast client poll
This command has no arguments or keywords.
Default Configuration
Disabled
Command Mode
Global configuration mode
User Guidelines
• Polling time is determined by the sntp client poll timer Global Configuration mode
command.
Examples
The following example enables polling for the Simple Network Time Protocol (SNTP) predefined
unicast clients.
sntp server
The sntp server Global Configuration mode command configures the device to use the Simple
Network Time Protocol (SNTP) to request and accept Network Time Protocol (NTP) traffic from a
server. To remove a server from the list of NTP servers, use the no form of this command.
Syntax
sntp server ip-address | hostname [poll] [key keyid]
no sntp server host
• ip-address—IP address of the server.
• hostname—Hostname of the server. (Range: 1 - 158 characters)
• poll—Enable polling.
• key keyid—Authentication key to use when sending packets to this peer. (Range:1 –
4294967295)
102 Clock
Default Configuration
No servers are defined.
Command Mode
Global Configuration mode
User Guidelines
• Up to 8 SNTP servers can be defined.
• Use the sntp unicast client enable Global Configuration mode command to enable
predefined unicast clients globally.
• To enable polling you should also use the sntp unicast client poll Global Configuration mode
command for global enabling.
• Polling time is determined by the sntp client poll timer Global Configuration mode
command.
• If multiple servers are added then the updates applied are determined by the following:
Unicast Server updates take precedence, followed by Anycast and then Broadcast.
Examples
The following example configures the device to accept Network Time Protocol (NTP) traffic from
the server on 192.1.1.1.
show clock
The show clock User EXEC mode command displays the time and date from the system clock.
Syntax
show clock [detail]
• detail—Shows timezone and summertime configuration.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
Clock 103
User Guidelines
www.dell.com | support.dell.com
• The symbol that precedes the show clock display indicates the following:
Symbol Description
* Time is not authoritative.
(blank) Time is authoritative.
. Time is authoritative, but SNTP is not synchronized.
Example
The following example displays the time and date from the system clock.
Time zone:
Acronym is PST
Offset is UTC-8
Summertime:
Acronym is PDT
Recurring every year.
Begins at first Sunday of April at 2:00.
Ends at last Sunday of October at 2:00.
Offset is 60 minutes.
104 Clock
show sntp configuration
The show sntp configuration Privileged EXEC mode command shows the configuration of the
Simple Network Time Protocol (SNTP).
Syntax
show sntp configuration
This command has no keywords or arguments.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
Clock 105
www.dell.com | support.dell.com
Syntax
show sntp status
• This command has no keywords or arguments.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Examples
The following example shows the status of the SNTP.
Console# show sntp status
Clock is synchronized, stratum 4, reference is 176.1.1.8
Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)
Unicast servers:
Server Preference Status Last response Offset Delay
[mSec]
[mSec]
--------- ---------- ------ --------------- ----- ------
176.1.1.8 Primary Up AFE252C1.6DBDDFF2 7.33 117.79
106 Clock
176.1.8.179 Secondary Unknown AFE21789.643287C9 8.98 189.19
Broadcast:
Interface IP address Last response
--------- ---------- ------------------------
176.1.1.8 Primary AFE252C1.6DBDDFF2
176.1.8.179 Secondary AFE21789.643287C9
Clock 107
www.dell.com | support.dell.com
108
Clock
Configuration and Image Files
delete startup-config
The delete startup-config Privileged EXEC mode command deletes the startup-config file.
Syntax
delete startup-config
This command has no arguments or keywords.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example deletes the startup-config file.
copy
The copy Privileged EXEC mode command copies files from a source to a destination.
Syntax
copy source-url destination-url [SNMP]
• source-url—The source file location URL or reserved keyword being copied.
• destination-url—The destination file URL or reserved keyword.
• SNMP—Used only when copying from/to startup-config. Specifies that the
destination/source file is in SNMP format
The following table displays keywords aliases to URL:
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• The location of a file system dictates the format of the source or destination URL.
• The entire copying process may take several minutes and differs from protocol to protocol
and from network to network.
Understanding Invalid Combinations of Source and Destination
Some invalid combinations of source and destination exist. Specifically, the following cannot
be copied:
• If the source file and destination file are the same file.
• xmodem cannot be a destination. Can only be copied to image, boot and null.
• tftp cannot be the source and destination on the same copy.
• Active Image is the image the system currently boots from (see "show bootvar"
command) or set to boot next from. Non active image is the spare image location.
Character Description
! For network transfers, an exclamation point indicates that the copy process is taking
place. Each exclamation point indicates the successful transfer of ten packets (512 bytes
each).
. For network transfers, a period indicates that the copy process timed out. Many periods
in a row typically mean that the copy process may fail.
The following example copies a system image named file1 from the TFTP server with an IP address
of 172.16.101.101 to non active image file.
boot system
The boot system Privileged EXEC mode command specifies the system image that the device
loads at startup.
Syntax
boot system {image-1 | image-2}
• image-1—Specifies image 1 as the system startup image.
• image-2—Specifies image 2 as the system startup image.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• Use the show bootvar command to find out which image is the active image.
Examples
The following example loads system image 1 for the next device startup.
Syntax
show running-config [sort type]
• sort type —Specifies the sorting type of the file. Can be one of the following values:
interface, feature.
Default Configuration
Sort type defaults to interface if unspecified.
Command Mode
Privileged EXEC mode
User Guidelines
• show running-config does not show all the port configurations under the port. Although the
device is already configured with some default parameters,”show running config” on an
empty device is empty.
show startup-config
The show startup-config Privileged EXEC mode command displays the startup configuration file
contents.
Syntax
show startup-config [sort type]
Default Configuration
Sort type defaults to interface if unspecified.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
show backup-config
The show backup-config Privileged EXEC mode command displays the backup configuration file
contents.
Syntax
show backup-config
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
hostname device
interface ethernet g1
ip address 176.242.100.100 255.255.255.0
duplex full
speed 1000
interface ethernet g2
ip address 176.243.100.100 255.255.255.0
duplex full
speed 1000
The show bootvar Privileged EXEC mode command displays the active system image file that the
device loads at startup.
Syntax
show bootvar
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays the active system image file that the device loads at startup.
Syntax
interface ethernet interface
• interface—Valid Ethernet port.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example enables ports g8 for configuration.
Syntax
interface range ethernet {port-range | all}
• port-range—List of valid ports to add. Separate non consecutive ports with a comma and
no spaces; a hyphen is used to designate a range of ports.
• all—All Ethernet ports.
Default Configuration
This command has no default configuration.
User Guidelines
• Commands under the interface range context are executed independently on each active
interface in the range. If the command returns an error on one of the active interfaces, it does
not stop executing commands on other active interfaces.
Example
The following example shows how ports g18 to g20 and ports g22 to g24 are grouped to receive the
same command.
shutdown
The shutdown Interface Configuration mode command disables interfaces. To restart a disabled
interface, use the no form of this command.
Syntax
shutdown
no shutdown
Default Configuration
The interface is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example disables port g5.
description
The description Interface Configuration mode command adds a description to an interface. To
remove the description use the no form of this command.
Syntax
description string
no description
• string—Comment or a description of the port up to 64 characters.
Default Configuration
By default, the interface does not have a description.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example adds a description to the Ethernet g5.
speed
The speed Interface Configuration mode command configures the speed of a given Ethernet
interface when not using auto-negotiation. To restore the default, use the no form of this
command.
Syntax
speed {100 | 1000 | 10000}
no speed
• 100—Force 100 Mbps operation.
Default Configuration
Maximum port capability.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• The command "no speed" in port-channel context returns each port in the port-channel to its
maximum capability.
Example
The following example configures the speed operation of Ethernet g5 to force 100-Mbps operation.
duplex
The duplex Interface Configuration mode command configures the full/half duplex operation of a
given Ethernet interface when not using auto-negotiation. To restore the default, use the no form
of this command.
Syntax
duplex {half | full}
no duplex
• half—Force half-duplex operation
• full—Force full-duplex operation
Default Configuration
The interface is set to full duplex.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
• Before attempting to force a particular duplex mode on the port operating at 10/100/1000
Mbps, disable the auto-negotiation on that port.
Example
The following example configures the duplex operation of Ethernet g5 to force full duplex
operation.
negotiation
The negotiation Interface Configuration mode command enables auto-negotiation operation for
the speed and duplex parameters of a given interface. To disable negotiation, use the no form of
this command.
Syntax
negotiation
no negotiation
Default Configuration
auto-negotiation
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• Turning off auto-negotiation on an aggregate link may, under some circumstances, make it
non-operational. If the other side has auto-negotiation turned on, it may re-synchronize all
members of the aggregated link to half-duplex operation, and may, as per the standards, set
them all inactive.
Example
The following example enables autonegotiation on Ethernet g5.
flowcontrol
The flowcontrol Interface Configuration mode command configures the Flow Control on a given
interface. To restore the default, use the no form of this command.
Default Configuration
Flow Control is off.
Command Mode
Interface configuration (Ethernet, port-channel) mode
User Guidelines
• Flow Control will operate only if duplex mode is set to FULL. Back Pressure will operate only
if duplex mode is set to HALF.
• When Flow Control is ON, the head-of-line-blocking mechanism of this port is disabled.
• If a link is set to NOT use auto-negotiation, the other side of the link must also be configured
to not use auto-negotiation.
• To select auto, ensure negotiation for Flow Control is enabled.
Example
In the following example, Flow Control is enabled on g5.
mdix
The mdix Interface Configuration mode command enables automatic crossover on a given
interface. To disable automatic crossover, use the no form of this command.
Syntax
mdix {on | auto}
no mdix
• on—Manual mdix
• auto—Auto mdi/mdix
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
• Mdix Auto: All possibilities to connect a PC with cross OR normal cables are supported and
are automatically detected.
• Mdix ON: It is possible to connect to a PC only with a normal cable and to connect to
another switch ONLY with a cross cable.
• If MDIX is set to "no mdix", the device works opposite from the "MDIX On" behavior. With
this setting you can only use either an ethernet standard cross-over cable to connect to a PC,
or an ethernet standard cable to connect to another switch.
Example
In the following example, automatic crossover is enabled on g5.
back-pressure
The back-pressure Interface Configuration mode command enables Back Pressure on a given
interface. To disable Back Pressure, use the no form of this command.
Syntax
back-pressure
no back-pressure
Default Configuration
Back Pressure is disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• Back Pressure will operate only if duplex mode is set to half.
port jumbo-frame
The port jumbo-frame Global Configuration mode command enables jumbo frames for the device.
The size of the port jumbo frame is 10K. To disable jumbo frames, use the no form of this
command.
Syntax
port jumbo-frame
no port jumbo-frame
Default Configuration
Jumbo Frames are not enabled.
Command Mode
Global Configuration mode
User Guidelines
• The command would be effective only after reset.
Example
In the following example, Jumbo Frames are enabled on the device.
clear counters
The clear counters User EXEC mode command clears statistics on an interface.
Syntax
clear counters [ethernet interface | port-channel port-channel-number]
• interface—Valid Ethernet port.
• port-channel-number—Valid port-channel trunk index.
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
In the following example, the counters for interface g1 are cleared.
Syntax
set interface active {ethernet interface | port-channel port-channel-number}
• interface—Valid Ethernet port.
• port-channel-number—Valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
Privilege EXEC mode
User Guidelines
• This command is used to activate interfaces that were configured to be active, but were
shutdown for some reason.
Example
The following example activates interface g5, which is disabled.
Default Configuration
This command has no default configuration.
Command Modes
Privilege EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the configuration for all configured interfaces:
Console# show interfaces configuration
Syntax
show interfaces status [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet port.
• port-channel-number—A valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
Privilege EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the status for all configured interfaces.
Syntax
show interfaces description [ethernet interface | port-channel port-channel-number]
• interface—Valid Ethernet port.
• port-channel-number—A valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Modes
Privilege EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the description for the interface g1.
Port Description
---- ------------------
g1 Management_port
g2 R&D_port
g3 Finance_port
Ch Description
---- ------------------
Ch 1 Output
Syntax
show interfaces counters [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet port.
• port-channel-number—A valid port-channel index.
Default Configuration
This command has no default configuration.
Command Modes
Privilege EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays traffic seen by the physical interface:
FCS Errors: 8
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Internal MAC Tx Errors: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Received Pause Frames: 0
Transmitted Pause Frames: 0
Symbol Errors For an interface operating at 100 Mb/s, the number of times there was an
invalid data symbol when a valid carrier was present.For an interface
operating in half-duplex mode at 1000 Mb/s, the number of times the
receiving media is non-idle (a carrier event) for a period of time equal to or
greater than slotTime, and during which there was at least one occurrence of
an event that causes the PHY to indicate 'Data reception error' or 'carrier
extend error' on the GMII.For an interface operating in full-duplex mode at
1000 Mb/s, the number of times the receiving media is non-idle (a carrier
event) for a period of time equal to or greater than minFrameSize, and during
which there was at least one occurrence of an event that causes the PHY to
indicate 'Data reception error' on the GMII.For an interface operating at 10
Gb/s, the number of times the receiving media is non-idle (a carrier event) for
a period of time equal to or greater than minFrameSize, and during which
there was at least one occurrence of an event that causes the PHY to indicate
'Receive Error' on the XGMII.
Received Pause Frames Counted MAC Control frames received with an opcode indicating the
PAUSE operation.
Transmitted Pause Counted MAC Control frames transmitted on this interface with an opcode
Frames indicating the PAUSE operation.
Syntax
show ports jumbo-frame
Default Configuration
This command has no default configuration.
Command Modes
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Syntax
port storm-control include-multicast
no port storm-control include-multicast
There are no arguments or keywords for this command.
Default Configuration
Multicast packets are not counted.
Command Modes
Global Configuration mode
User Guidelines
• To control multicasts storms use the commands port storm-control broadcast enable and
port storm-control broadcast rate.
Example
The following example enables the counting of multicast packets.
Console# configure
Console(config)# port storm-control include-multicast
Syntax
port storm-control broadcast enable
Default Configuration
Broadcast storm control is disabled.
Command Modes
Interface Configuration (Ethernet) mode
User Guidelines
• Use the port storm-control broadcast rate Interface Configuration mode command, to set the
maximum allowable broadcast rate.
• Multicast can be counted as part of the "storm" frames if the port storm-control include-
multicast Global Configuration mode command is already executed.
Example
The following example enables broadcast storm control on port g5.
Command Mode
Global Configuration mode
User Guidelines
• Use the port storm-control broadcast enable Interface Configuration mode command to
enable broadcast storm control.
• The granularity is 1 - 64K packets. Note that if the rate is 0, broadcast packets are not
forwarded.
Syntax
show ports storm-control [interface]
• interface—A valid Ethernet port.
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the storm control configuration.
console(config)# port storm-control broadcast rate 333
Console# show ports storm-control
Port Broadcast Storm control [Packets/sec]
----- -------------------------------------
g1 333
g2 Disabled
g3 333
g4 Disabled
g5 Disabled
g6 Disabled
g7 Disabled
g8 Disabled
g9 Disabled
g10 Disabled
g11 Disabled
g12 Disabled
g13 Disabled
g14 Disabled
g15 Disabled
g16 Disabled
g17 Disabled
g18 Disabled
g19 Disabled
g20 Disabled
g21 Disabled
g22 Disabled
g23 Disabled
g24 Disabled
Syntax
gvrp enable
no gvrp enable
Default Configuration
GVRP is globally disabled.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example globally enables GVRP on the device.
Syntax
gvrp enable
no gvrp enable
Default Configuration
GVRP is disabled on all interfaces by default.
User Guidelines
• An access port would not dynamically join a VLAN because it is always a member in only one
VLAN.
• Membership in an untagged VLAN would be propagated in a same way as a tagged VLAN. i.e.
in such a case it’s the administrator’s responsibility to set the PVID to be the untagged VLAN
VID.
Example
The following example enables GVRP on ethernet g8.
garp timer
The garp timer Interface Configuration mode command adjusts the GARP application join, leave,
and leaveall GARP timer values. To reset the timer to default values, use the no form of this
command.
Syntax
garp timer {join | leave | leaveall} timer_value
no garp timer
• join—Indicates the time in milliseconds that PDUs are transmitted.
(Range: 10-2147483640)
• leave—Indicates the amount of time in milliseconds that the device waits before leaving
its GARP state. The Leave Time is activated by a Leave All Time message sent/received,
and cancelled by the Join message. (Range: 10-2147483640)
• leaveall—Used to confirm the port within the VLAN. The time in milliseconds between
messages sent. (Range: 10-2147483640)
• timer_value—Timer values in milliseconds.
Default Configuration
The default timer values are as follows:
• Join timer—200 milliseconds
• Leave timer—600 milliseconds
• Leavall timer—10000 milliseconds
User Guidelines
• The timer_value value must be a multiple of 10.
• You must maintain the following relationship for the various timer values:
– ·Leave time must be greater than or equal to three times the join time.
– ·Leave-all time must be greater than the leave time.
• Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set
differently on the Layer 2-connected devices, GARP application will not operate successfully.
Example
The following example sets the leave timer for port g8 to 900 milliseconds.
gvrp vlan-creation-forbid
The gvrp vlan-creation-forbid Interface Configuration mode command enables or disables
dynamic VLAN creation. To disable dynamic VLAN creation, use the no form of this command.
Syntax
gvrp vlan-creation-forbid
no gvrp vlan-creation-forbid
Default Configuration
By default, dynamic VLAN creation is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• This command forbids dynamic VLAN creation from the interface. The creation or
modification of dynamic VLAN registration entries as a result of the GVRP exchanges on an
interface are restricted only to those VLANs for which static VLAN registration exists.
gvrp registration-forbid
The gvrp registration-forbid Interface Configuration mode command de-registers all dynamic
VLANs, and prevents dynamic VLAN registration on the port. To allow dynamic registering for
VLANs on a port, use the no form of this command.
Syntax
gvrp registration-forbid
no gvrp registration-forbid
Default Configuration
Dynamic registering and deregistering for each VLAN on the port is allowed.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how default dynamic registering and deregistering is forbidden for
each VLAN on port g8.
Syntax
clear gvrp statistics [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet interface.
• port-channel-number—A valid port-channel trunk index.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example clears all the GVRP statistics information on port g8.
Syntax
show gvrp configuration [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet interface.
• port-channel-number—A valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to display GVRP configuration information:
Syntax
show gvrp statistics [ethernet interface | port-channel port-channel-number]
• interface—A valid Ethernet interface.
• port-channel-number—A valid trunk index.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
GVRP statistics:
----------------
rJE : Join Empty Received rJIn : Join In Received
rEmp : Empty Received rLIn : Leave In Received
rLE : Leave Empty Received rLA : Leave All Received
sJE : Join Empty Sent sJIn : Join In Sent
sEmp : Empty Sent sLIn : Leave In Sent
sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
--- --- ---- ---- ---- --- --- --- ---- ---- ---- --- ---
g1 0 0 0 0 0 0 0 0 0 0 0 0
g2 0 0 0 0 0 0 0 0 0 0 0 0
g3 0 0 0 0 0 0 0 0 0 0 0 0
g4 0 0 0 0 0 0 0 0 0 0 0 0
g5 0 0 0 0 0 0 0 0 0 0 0 0
g6 0 0 0 0 0 0 0 0 0 0 0 0
g7 0 0 0 0 0 0 0 0 0 0 0 0
g8 0 0 0 0 0 0 0 0 0 0 0 0
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays GVRP statistics information.
Syntax
ip igmp snooping
no ip igmp snooping
Default Configuration
IGMP snooping is disabled.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example enables IGMP snooping.
Syntax
ip igmp snooping
no ip igmp snooping
Default Configuration
IGMP snooping is disabled on all VLANs in the set context.
Command Mode
Interface configuration (VLAN) mode
Example
The following example enables IGMP snooping on VLAN 2.
Syntax
ip igmp snooping mrouter learn-pim-dvmrp
no ip igmp snooping mrouter learn-pim-dvmrp
Default Configuration
Automatic learning of mrouter ports is enabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• Multicast router ports can be configured statically by the bridge multicast forward-all
command.
Example
The following example enables automatic learning of multicast router ports on VLANs.
Default Configuration
The default host-time-out is 260 seconds.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• The timeout should be at least greater than 2*query_interval+max_response_time of the
IGMP router.
Example
The following example configures the host timeout to 300 seconds.
Syntax
ip igmp snooping mrouter-time-out time-out
no ip igmp snooping mrouter-time-out
• time-out—mrouter timeout in seconds (Range: 1 - 2147483647)
Default Configuration
The default value is 300 seconds.
Command Mode
Interface Configuration (VLAN) mode
Example
The following example configures the mrouter timeout to 200 seconds.
Syntax
ip igmp snooping leave-time-out {time-out | immediate-leave}
no ip igmp snooping leave-time-out
• time-out—leave-time-out in seconds. (Range: 0 - 2147483647)
• immediate-leave—Specifies that the port should be immediately removed from the
members list after receiving IGMP Leave.
Default Configuration
The default leave-time-out configuration is 10 seconds.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• The leave timeout should be set greater than the maximum time that a host is allowed to
respond to an IGMP Query.
• Use immediate leave only where there is only one host connected to a port.
Example
The following example configures the host leave-time-out to 60 seconds.
Syntax
show ip igmp snooping mrouter [interface vlan-id]
• vlan_id—VLAN ID value.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows IGMP snooping mrouter information.
VLAN Ports
---- ------
2 g1
Syntax
show ip igmp snooping interface vlan-id
• vlan_id—VLAN ID value.
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The example displays IGMP snooping information.
Syntax
show ip igmp snooping groups [vlan vlan-id] [address ip-multicast-address]
• vlan_id—VLAN ID value.
• ip-multicast-address—IP multicast address.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• To see the full multicast address table (including static addresses) use the show bridge
address-table command.
156
IGMP Snooping Commands
IP Addressing Commands
clear host dhcp
The clear host dhcp Privileged EXEC mode command deletes entries from the host name-to-
address mapping received from Dynamic Host Configuration Protocol (DHCP).
Syntax
clear host dhcp {name | *}
• name—Particular host entry to remove. (Range: 1 - 158 characters.)
• *— Removes all entries.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• This command would delete the host name-to-address mapping temporarily until the next
renew of the IP address.
Examples
The following example deletes all entries from the host name-to-address mapping.
ip address
The ip address Interface Configuration mode command sets an IP address. To remove an IP
address, use the no form of this command.
Syntax
ip address ip-address {mask | prefix-length}
no ip address [ip-address]
• ip-address—IP address
• mask—Specifies the network mask of the IP address. (Range: Valid Subnet mask)
Default Configuration
No IP address is defined for interfaces.
Command Mode
Interface configuration (Ethernet, VLAN, port-channel)
User Guidelines
• An IP address cannot be configured for a range of interfaces (range context).
Example
The following example configures VLAN 1 with the IP address 131.108.1.27 and subnet mask
255.255.255.0.
ip address dhcp
The ip address dhcp Interface Configuration mode command acquires an IP address on an
interface from the Dynamic Host Configuration Protocol (DHCP) server. To deconfigure any
acquired address, use the no form of this command.
The no ip address dhcp command deconfigures any IP address that was acquired, thus sending a
DHCPRELEASE message.
Syntax
ip address dhcp [hostname host-name]
no ip address dhcp
• hostname—Specifies the host name.(Range: 1 - 20 characters)
• host-name—DHCP host name. This name need not be the same as the host name
entered in global configuration mode.
Default Configuration
This command has no default configuration.
Command Mode
Interface configuration (Ethernet, VLAN, port-channel)
Example
The following example acquires an IP address on an Ethernet interface from DHCP.
ip default-gateway
The ip default-gateway Global Configuration mode command defines a default gateway (router).
To remove the default gateway use the no form of this command.
Syntax
ip default-gateway ip-address
no ip default-gateway
• ip-address — Valid IP address that specifies the IP address of the default gateway.
Default Configuration
No default gateway is defined.
Command Mode
Global configuration
Example
The following example defines an ip default gateway.
show ip interface
The show ip interface User EXEC mode command displays the usability status of interfaces
configured for IP.
Syntax
show ip interface [ethernet interface-number | vlan vlan-id | port-channel number]
• ethernet interface-number—port.
• vlan vlan-id—VLAN number.
• port-channel number—Port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example the displays the usability status of interfaces configured for IP.
arp
The arp Global Configuration mode command adds a permanent entry in the Address Resolution
Protocol (ARP) cache. To remove an entry from the ARP cache, use the no form of this command.
Syntax
arp ip_addr hw_addr {ethernet interface-number | vlan vlan-id | port-channel number}
no arp ip_addr {ethernet interface-number | vlan vlan-id | port-channel number}
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• The software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware
addresses. Because most hosts support dynamic resolution, static ARP cache entries do not
need to be specified.
The following example adds the IP address 198.133.219.232 and MAC address 00:00:0c:40:0f:bc to
the ARP table.
arp timeout
The arp timeout Global Configuration mode command configures how long an entry remains in
the ARP cache. To restore the default value, use the no form of this command.
Syntax
arp timeout seconds
no arp timeout
• seconds—Time (in seconds) that an entry remains in the ARP cache. (Range: 1 - 40000000)
Default Configuration
The default timeout is 60000 seconds.
Command Mode
Global Configuration mode
User Guidelines
• It is recommended not to set the timeout value to less than 3600.
Example
The following example configures ARP timeout to 12000 seconds.
clear arp-cache
The clear arp-cache Privileged EXEC mode command deletes all dynamic entries from the ARP
cache.
Syntax
clear arp-cache
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example deletes all dynamic entries from the ARP cache.
show arp
The show arp Privileged EXEC mode command displays entries in the ARP table.
Syntax
show arp
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays entries in the ARP table.
Console# show arp
ARP timeout: 60000 Seconds
The ip domain-lookup Global Configuration mode command enables the IP Domain Naming
System (DNS)-based host name-to-address translation. To disable the DNS, use the no form of
this command.
Syntax
ip domain-lookup
no ip domain-lookup
This command has no arguments or keywords.
Default Configuration
Enabled
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example enables the IP Domain Naming System (DNS)-based host name-to-address
translation.
ip domain-name
The ip domain-name Global Configuration mode command defines a default domain name, that
the software uses to complete unqualified host names (names without a dotted-decimal domain
name). To disable use of the Domain Name System (DNS), use the no form of this command.
Syntax
ip domain-name name
no ip domain-name
• name—Default domain name used to complete unqualified host names. Do not include
the initial period that separates an unqualified name from the domain name.(Range: 1 -
158 characters)
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Examples
The following example defines a default domain name of www.dell.com.
ip name-server
The ip name-server Global Configuration mode command sets the available name servers. To
remove a name server, use the no form of this command.
Syntax
ip name-server server-address [server-address2 … server-address8]
no ip name-server [server-address1 … server-address8]
• server-address—IP addresses of the name server. Up to 8 servers can be defined in one
command or by using multiple commands.
Default Configuration
No name server addresses are specified.
Command Mode
Global Configuration mode
User Guidelines
• The preference of the servers is determined by the order they were entered.
• Up to 8 servers can be defined.
Examples
The following example sets the available name server.
ip host
The ip host Global Configuration mode command defines a static host name-to-address mapping
in the host cache. To remove the name-to-address mapping, use the no form of this command.
Default Configuration
No host is defined.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example defines a static host name-to-address mapping in the host cache.
clear host
The clear host Privileged EXEC mode command deletes entries from the host name-to-address
cache.
Syntax
clear host {name | *}
• name—Particular host entry to remove. (Range: 1 - 158 characters)
• *—Removes all entries.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
show hosts
The show hosts User EXEC mode command displays the default domain name, a list of name
server hosts, the static and the cached list of host names and addresses.
Syntax
show hosts [name]
• name—Name of the host.(Range: 1 - 158 characters)
Default Configuration
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays host information.
Host Addresses
---- ---------
www.dell.com 176.16.8.8 176.16.8.9
Cache:
TTL(Hours)
Host Total Elapsed Type Addresses
---- ----- --------- ------ ---------
www.dell.com 72 3 IP 171.64.14.203
Syntax
lacp system-priority value
no lacp system-priority
• value—Value of the priority. (Range: 1 - 65535)
Default Configuration
The default system priority value is 1.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the system priority to 120.
lacp port-priority
The lacp port-priority Interface Configuration mode command configures the priority value for
physical ports. To reset to default priority value, use the no form of this command.
Syntax
lacp port-priority value
no lacp port-priority
• value—Port priority value. (Range: 1 - 65535)
Default Configuration
The default port priority value is 1.
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the priority value for port g8 to 247.
lacp timeout
The lacp timeout Interface Configuration mode command assigns an administrative LACP
timeout. To reset the default administrative LACP timeout use the no form of this command.
Syntax
lacp timeout {long | short}
no lacp timeout
• long—Specifies a long timeout value.
• short—Specifies a short timeout value.
Default Configuration
The default port timeout value is long.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example assigns an administrative LACP timeout for port g8 to a long timeout value.
Syntax
show lacp ethernet interface [parameters | statistics | protocol-state]
• Interface—Ethernet interface.
Default Configuration
This command has no default configuration.
Command Mode
Privilege EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to display LACP statistics information.
Syntax
show lacp port-channel [port_channel_number]
• port_channel_number—The port-channel number.
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to display LACP port-channel information.
Partner
System Priority:0
MAC Address: 00:00:00:00:00:00
Oper Key: 14
Syntax
line {console | telnet | ssh}
• console—Console terminal line.
• telnet—Virtual terminal for remote console access (Telnet).
• ssh—Virtual terminal for secured remote console access (SSH).
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example configures the device as a virtual terminal for remote console access.
speed
The speed Line Configuration mode command sets the line baud rate.
Syntax
speed bps
• bps—Baud rate in bits per second (bps). The options are 2400, 9600, 19200 and 38400.
Default Configuration
This default speed is 9600.
User Guidelines
• The configured speed would be applied when Autobaud is disabled.
• If Autobaud is disabled, the new speed is implemented immediately.
Examples
The following example sets the baud rate to 9600.
autobaud
The autobaud Line Configuration mode command sets the line for automatic baud rate detection
(autobaud). Use the no form of this command to disable automatic baud rate detection.
Syntax
autobaud
no autobaud
Default Configuration
Disabled
Command Mode
Line Configuration (console) mode
User Guidelines
• To start communications using automatic baud detection, press the Enter key twice.
Examples
The following example sets the line for automatic baud rate detection.
exec-timeout
The exec-timeout Line Configuration mode command sets the interval that the system waits until
user input is detected. To restore the default setting, use the no form of this command.
Default Configuration
The default configuration is 10 minutes.
Command Mode
Line Configuration mode
User Guidelines
• To specify no timeout, enter the exec-timeout ("0 0") command.
Examples
The following example configures the interval that the system waits until user input is detected to
20 minutes.
show line
The show line User EXEC mode command displays line parameters.
Syntax
show line [console | telnet | ssh]
• console—Console terminal line.
• telnet—Virtual terminal for remote console access (Telnet).
• ssh—Virtual terminal for secured remote console access (SSH).
Default Configuration
Default value is console.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
terminal history
The terminal history EXEC mode command enables the command history function for the
current terminal session. To disable the command history function, use the no form of this
command.
Syntax
terminal history
terminal no history
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
The command enables the command history for the current session. The default would be
determined by the history line configuration command.
Syntax
terminal history size number-of-commands
terminal no history size
• number-of-commands - Number of commands the system records in the history buffer
(Range: 1-0216).
Command Mode
User EXEC mode
User Guidelines
The maximum for the sum of all buffers is 256.
178
Line Commands
LLDP Commands
lldp enable (global)
To enable Link Layer Discovery Protocol (LLDP), use the lldp enable command in global
configuration mode. To disable LLDP, use the no form of this command.
Syntax
lldp enable
no lldp enable
Default Configuration
The command is enabled.
Command Mode
Global configuration
User Guidlines
• There are no guidelines for this command.
Example
The following example enables Link Layer Discovery Protocol (LLDP) .
Syntax
lldp enable [rx | tx | both]
no lldp enable
• rx — Receive only LLDP packets.
• tx —Transmit only LLDP packets.
• both — Receive and transmit LLDP packets (default)
Default Configuration
Enabled in both modes.
User Guidelines
• LLDP manages LAG ports individually. LLDP sends separate advertisements on each port in
a LAG. LLDP data received through LAG ports is stored individually per port.
• LLDP operation on a port is not dependent on STP state of a port. I.e. LLDP frames are sent
and received on blocked ports. If a port is controlled by 802.1X, LLDP operates only if the
port is authorized.
Examples
The following example enables Link Layer Discovery Protocol (LLDP) on an interface (g5).
lldp timer
To specify how often the software sends Link Layer Discovery Protocol (LLDP) updates, use the
lldp timer command in global configuration mode. To revert to the default setting, use the no
form of this command.
Syntax
lldp timer seconds
no lldp timer
• seconds — Specifies in seconds how often the software sends LLDP update. (Range: 5 -
32768 seconds).
Default Configuration
Default - 30 seconds.
Command Modes
Global configuration
User Guidelines
• There are no user guidelines for this command.
lldp hold-multiplier
To specify the amount of time the receiving device should hold a Link Layer Discovery Protocol
(LLDP) packet before discarding it, use the lldp hold-multiplier command in global configuration
mode. To revert to the default setting, use the no form of this command.
Syntax
lldp hold-multiplier number
no lldp hold-multiplier
• number — Specifies the hold time to be sent in the LLDP update packets as a multiple of
the timer value (Range: 2-10).
Default Configuraiton
The default configuration is 4.
Command Modes
Global configuration
User Guidelines
• The actual time-to-live value used in LLDP frames can be expressed by the following formula:
TTL = min(65535, LLDP-Timer * LLDP-HoldMultiplier). For example, if the value of LLDP
timer is '30', and the value of the LLDP hold multiplier is '4', then the value '120' is encoded in
the TTL field in the LLDP header.
Examples
The following example specifies how often the software sends Link Layer Discovery Protocol
(LLDP) updates.
lldp reinit-delay
To specify the minimum time an LLDP port will wait before reinitializing LLDP transmission, use
the lldp reinit-delay command in global configuration mode. To revert to the default setting, use
the no form of this command.
Default Configuraiton
2 seconds
Command Modes
Global configuration
User Guidelines
There are no user guidelines for this command.
Examples
The following example specifies the minimum time an LLDP port will wait before reinitializing
LLDP transmission.
lldp tx-delay
To specify the delay between successive LLDP frame transmissions initiated by value/status
changes in the LLDP local systems MIB, use the lldp tx-delay command in global configuration
mode. To revert to the default setting, use the no form of this command.
Syntax
lldp tx-delay seconds
no lldp tx-delay
Parameters
• seconds — Specifies the delay in seconds between successive LLDP frame transmissions
initiated by value/status changes in the LLDP local systems MIB. Range 1-8192 second.
Default Configuration
The default value is 2 seconds
Command Modes
Global configuration
Examples
The following example specifies the delay between successive LLDP frame transmissions initiated
by value/status changes in the LLDP local systems MIB.
lldp optional-tlv
To specify which optional TLVs from the basic set should be transmitted, use the lldp optional-tlv
command in interface configuration mode. To revert to the default setting, use the no form of this
command.
Syntax
lldp optional-tlv tlv1 [tlv2 … tlv5]
no lldp optional-tlv
• tlv — Specifies TLV that should be included. Available optional TLVs are: port-desc, sys-
name, sys-desc and sys-cap . (Range 1-8192 seconds).
Default Configuration
No optional TLV is transmitted.
Command Modes
Interface configuration (Ethernet)
User Guidelines
• There are no user guidelines for this command.
Example
The following example specifies which optional TLV (2)s from the basic set should be transmitted.
lldp management-address
To specify the management address that would be advertised from an interface, use the lldp
management-address command in interface configuration mode. To stop advertising management
address information, use the no form of this command.
Default Configuration
No IP address is advertised.
Command Modes
Interface configuration (Ethernet)
User Guidelines
• Each port can advertise one IP address.
• Only static IP addresses can be advertised.
Example
The following example specifies management address that would be advertised from an interface.
clear lldp rx
To restart the LLDP RX state machine and clearing the neighbors table, use the clear lldp rx
command in privileged EXEC mode.
Syntax
clear lldp rx [ethernet interface]
• Interface — Ethernet port
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The folowing example restarts the LLDP RX state machine and clearing the neighbors table.
Syntax
show lldp configuration [ethernet interface]
• Interface — Ethernet port
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the Link Layer Discovery Protocol (LLDP) configuration
Switch# show lldp configuration
Timer: 30 Seconds
Hold multiplier: 4
Reinit delay: 2 Seconds
Tx delay: 2 Seconds
Syntax
show lldp local ethernet interface
• Interface — Ethernet port
Privileged EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the Link Layer Discovery Protocol (LLDP) information that is
advertised from a specific port.
Syntax
show lldp neighbors [ethernet interface]
• Interface — Ethernet port
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays information about neighboring devices discovered using Link Layer
Discovery Protocol (LLDP).
188
LLDP Commands
Management ACL
management access-list
The management access-list Global Configuration mode command defines an access-list for
management, and enters the access-list for configuration. Once in the access-list configuration
mode, the denied or permitted access conditions are configured with the deny and permit
commands. To remove an access list, use the no form of this command.
Syntax
management access-list name
no management access-list name
• name—The access list name using up to 32 characters.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• This command enters the access-list configuration mode, where the denied or permitted
access conditions with the deny and permit commands must be defined.
• If no match criteria are defined the default is "deny".
• If reentering to an access-list context, the new rules are entered at the end of the access-list.
• Use the management access-class command to select the active access-list.
• The active management list cannot be updated or removed.
• Management ACL requires a valid management interface (valid IFindex). A valid
management interface is an interface with an IP address. A valid (IFindex) management
interface can be a single port, vlan or port-channel. Management ACL only restricts access to
the device for management configuration or viewing.
The following example shows how to create an access-list called "mlist", configure two management
interfaces ethernet g1 and ethernet g9, and make the access-list the active list.
permit (management)
The permit Management Access-List Configuration mode command defines a permit rule.
Syntax
permit [ethernet interface-number | vlan vlan-id | port-channel number] [service service]
permit ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan
vlan-id | port-channel number] [service service]
• ethernet interface-number—A valid Ethernet port number.
• vlan vlan-id—A valid VLAN number.
• port-channel number—A valid port channel number.
• ip-address—Source IP address.(Range: Valid IP Address)
• mask mask—Specifies the network mask of the source IP address. (Range: Valid subnet
mask)
Default Configuration
If no permit statement is present, the default is set to deny.
Command Mode
Management Access-list Configuration mode
User Guidelines
• Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is
defined on the appropriate interface.The system supports up to 256 management access
rules.
Example
The following example shows how all ports are permitted in the access-list called "mlist".
deny (management)
The deny Management Access-List Configuration mode command defines a deny rule.
Syntax
deny [ethernet interface-number | vlan vlan-id | port-channel number] [service service]
deny ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan vlan-
id | port-channel number] [service service]
• ethernet interface-number—A valid Ethernet port number.
• vlan vlan-id—A valid VLAN number.
• port-channel number—A valid port-channel number.
• ip-address—Source IP address. (Range: Valid IP Address)
• mask mask—Specifies the network mask of the source IP address. (Range: Valid subnet
mask)
• mask prefix-length—Specifies the number of bits that comprise the source IP address
prefix. The prefix length must be preceded by a forward slash (/). (Range: 0 - 32)
https or snmp.
Default Configuration
This command has no default configuration.
Command Mode
Management Access-list Configuration mode
User Guidelines
• Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is
defined on the appropriate interface.The system supports up to 256 management access
rules.
Example
The following example shows how all ports are denied in the access-list called "mlist".
management access-class
The management access-class Global Configuration mode command defines which management
access-list is used. To disable restriction, use the no form of this command.
Syntax
management access-class {console-only | name}
no management access-class
• name—Name of the access list. If unspecified, defaults to an empty access-list.(Range: 1 -
32 characters)
• console-only—The device can be managed only from the console.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Syntax
show management access-list [name]
• name—Name of the access list. If unspecified, defaults to an empty access-list.(Range: 1 -
32 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the active management access-list.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the management access-list information.
Syntax
test copper-port tdr interface
• interface—A valid Ethernet port.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• The port under test should be conducted when the fiber link is down.
NOTE: The maximum distance VCT can function is 120 meters.
Examples
The following example results in a report on the cable attached to port g3.
Syntax
show copper-ports tdr [interface]
• interface—A valid Ethernet port.
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the last TDR (Time Domain Reflectometry) tests on all ports.
Syntax
show copper-ports cable-length [interface]
• interface—A valid Ethernet port.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• The port must be active and working in 1000M.
Syntax
show fiber-ports optical-transceiver [interface] [detailed]
• interface—A valid Ethernet port.
• detailed—Detailed diagnostics.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• To test optical transceivers, ensure a fiber link is up. The test is only supported on Dell
supported SFP modules.
200
PHY Diagnostics Commands
Port Channel Commands
interface port-channel
The interface port-channel Global Configuration mode command enters the interface
configuration mode of a specific port-channel.
Syntax
interface port-channel port-channel-number
• port-channel-number—A valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• Eight aggregated links can be defined with up to 8 member ports per port channel.Turning off
auto-negotiation of an aggregate link may, under some circumstances, make it non-
operational. If the other side has auto-negotiation turned on, it may re-synchronize all
members of the aggregated link to half-duplex operation, and may, as per the standards, set
them all to inactive.
Example
The following example enters the context of port-channel number 1.
Syntax
interface range port-channel {port-channel-range | all}
• port-channel-range—List of port-channels to configure. Separate non-consecutive port-
channels with a comma and no spaces. A hyphen designates a range of port-channels.
• all—All the channel-ports.
Command Mode
Global Configuration mode
User Guidelines
• Commands under the interface range context are executed independently on each interface
in the range: If the command returns an error on one of the interfaces, it will not stop the
execution of the command on other interfaces.
Example
The following example shows how port-channels 1, 2 and 8 are grouped to receive the same
command.
channel-group
The channel-group Interface Configuration mode command associates a port with a port-channel.
To remove a port from a port channel, use the no form of this command.
Syntax
channel-group port-channel-number mode {on | auto}
no channel-group
• port-channel_number—Specifies the number of the valid port-channel for the current
port to join.
• on—Forces the port to join a channel.
• auto—Allows the port to join a channel as a result of an LACP operation.
Default Configuration
The port is not assigned to any port-channel.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
• There are no user guidelines for this command.
Syntax
port-channel load-balance {layer-2 | layer-2-3 | layer-2-3-4}
no port-channel load-balance
• layer-2 — Port channel load balancing is based on layer 2 parameters.
• layer-2-3 — Port channel load balancing is based on layer 2 and layer 3 parameters.
• layer-2-3-4 — Port channel load balancing is based on layer 2, layer 3 and layer 4
parameters.
Default Configuration
Layer 2
Command Modes
Global Configuration
User Guidelines
• In L2+L3+L4 load balancing policy, fragmented packets might be reordered.
Example
The following example configures the load balancing policy of the port channeling on layer 2.
Syntax
show interfaces port-channel [port-channel-number]
channel)
Default Configuration
This command has no default configuration.
Command Modes
EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how all port channel information is displayed.
Channel Ports
------------ -----------------------------------------
--
1 Active: 1, 2
2 Active: 2, 7
3 Active: 3, 8
Syntax
port monitor src-interface [rx | tx]
no port monitor src-interface
• src-interface—Valid Ethernet port or port-channel number.
• rx—Monitors received packets only. If no option specified, monitors both rx and tx.
• tx—Monitors transmitted packets only. If no option specified, monitors both rx and tx.
Default Configuration
The default is both rx and tx.
Command Mode
Interface Configuration mode
User Guidelines
• This command enables traffic on one port to be copied to another port, or between the source
port (src-interface) and a destination port (the port being configured). Only a single target
port can be defined per system.
• The port being monitored cannot be set faster than the monitoring port.
• The following restrictions apply to ports configured to be destination ports:
• The port cannot be already configured as a source port.
• The port cannot be a member in a port-channel.
• An IP interface is not configured on the port.
• GVRP is not enabled on the port.
• The port is not a member in any VLAN, except for the default VLAN (will automatically
be removed from the default VLAN).
• The following restrictions apply to ports configured to be source ports:
• Port monitoring Source Ports must be simple ports, and not port-channels.
• The port cannot be already configured as a destination port.
• All the frames are transmitted as either always tagged or always untagged.
• Ports cannot be configured as a group using the interface range ethernet command.
NOTE: The Port Mirroring target must be a member of the Ingress VLAN of all Mirroring source ports.
Therefore, multicast and broadcast frames in these VLANs are seen more than once. (Actually N, where
N is the number of mirroring source ports).
When both transmit (Tx) and receive (Rx) directions of more than one port are monitored,
the capacity may exceed the bandwidth of the target port. In this case, the division of the
monitored packets may not be equal. The user is advised to use caution in assigning port
monitoring.
Example
The following example shows how traffic on port g8 (source port) is copied to port g1 (destination
port).
Syntax
show ports monitor
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how the port copy status is displayed.
208
Port Monitor Commands
QoS Commands
qos
The qos Global Configuration mode command enables quality of service (QoS) on the device
and enters QoS basic mode. Use the no form of this command to disable the QoS features on
the device.
Syntax
qos
no qos
Default Configuration
There is no default configuration for this command.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how QoS is enabled on the device, in basic mode.
show qos
The show qos User EXEC mode command displays the quality of service (QoS) mode for the
entire device.
Syntax
show qos
This command has no arguments or keywords.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
Example
The following example displays a QoS mode.
wrr-queue cos-map
The wrr-queue cos-map Global Configuration mode command maps assigned CoS values to select
one of the egress queues. To return to the default values, use the no form of this command.
Syntax
wrr-queue cos-map queue-id cos1...cos8
no wrr-queue cos-map [queue-id]
• queue-id—The queue number to which the following CoS values are mapped.
• cos1...cos8—Map to specific queues up to eight CoS values from 0 to 7.
Default Configuration
The map default values for 4 queues:
• CoS value 1 select queue 1
• CoS value 2 select queue 1
• CoS value 0 select queue 2
• CoS value 3 select queue 2
• CoS value 4 select queue 3
• CoS value 5 select queue 3
• CoS value 6 select queue 4
• CoS value 7 select queue 4
Command Mode
Global Configuration mode
Example
The following example maps CoS 3 to queue 4.
wrr-queue bandwidth
The wrr-queue bandwidth Interface Configuration mode command assigns Weighted Round
Robin (WRR) weights to egress queues. The weights ratio determines the frequency in which the
packet scheduler dequeues packets from each queue. To return to the default values, use the no
form of this command.
Syntax
wrr-queue bandwidth weight1 weight2 ... weight_4
no wrr-queue bandwidth
• weight1...weight_4—Sets the bandwidth ratio by the WRR packet scheduler for the
packet queues. Separate each value by spaces. (Range: 6 - 255)
Default Configuration
The default WRR weight is 1/4 ratio for all queues (each weight set to 6).
Command Mode
Interface Configuration (Ethernet, port channel) mode
User Guidelines
• The ratio for each queue is defined by the queue weight divided by the sum of all queue
weights (i.e., the normalized weight). This actually sets the bandwidth allocation of each
queue.
• A weight of 0 means no bandwidth is allocated for the same queue, and the share bandwidth
is divided among the remaining queues.
• All 4 queues are participating excluding the queues that are assigned as expedite queues. The
weights of these queues are ignored in the ratio calculation.
• All 4 queues participate in the WRR exclude the expedite queues, in which case the
corresponded weight is ignored (not used in the ratio calculation). The expedite queue is a
priority queue, and it is serviced until empty before the other queues are serviced.
Syntax
priority-queue out num-of-queues number-of-queues
no priority-queue out num-of-queues
• number-of-queues—Assign the number of queues to be expedite queues. The expedite
queues would be the queues with higher indexes. (Range: 1 - 4)
Default Configuration
All queues are expedite queues.
Command Mode
Global Configuration mode
User Guidelines
• When configuring the priority-queue out num-of-queues command, the weighted round
robin (WRR) weight ratios are affected because there are fewer queues participating in WRR.
• Queue 4 is taken as the highest index queue. Queue 3 is taken as the next highest queue. If
two priority queues are selected then queue 4 and 3 will be used. Leaving queue 2 and 1 for
WRR.
Syntax
show qos interface [ethernet interface-number | queuing]
• ethernet interface-number—Ethernet port number.
• queuing—Displays the queue strategy (WRR or EF), the weight for WRR queues, the
CoS to queue map and the EF priority.
Default Configuration
There is no default configuration for this command.
Command Mode
User EXEC mode
User Guidelines
If no keyword is specified with the show qos interface command, the port QoS mode (DSCP
trusted, CoS trusted, untrusted), default CoS value, attached to the port, attached to the
interface are displayed. If a specific interface is not specified, the information for all interfaces
is displayed.
Examples
The following example displays output from the show qos interface g1 queueing command.
Cos-queue map:
cos qid
0 2
1 1
2 1
3 2
4 3
5 3
6 4
7 4
Syntax
qos map dscp-queue dscp-list to queue-id
no qos map dscp-queue
• dscp-list—Specify up to 8 DSCP values, separate each DSCP with a space.
(Range: 0 - 63)
• queue-id—Enter the queue number to which the DSCP value corresponds.
Command Mode
Global Configuration mode
User Guidelines
• Queue settings for 3, 11, 19, ... cannot be modified.
Example
The following example maps DSCP values 33, 40 and 41 to queue 1.
Syntax
qos trust {cos | dscp}
no qos trust
• cos—Classifies ingress packets with the packet CoS values. For untagged packets, the
port default CoS is used.
• dscp—Classifies ingress packets with the packet DSCP values.
Default Configuration
CoS is the default trust mode.
Command Mode
Global Configuration mode
User Guidelines
• Packets entering a quality of service (QoS) domain are classified at the edge of the QoS
domain. When the packets are classified at the edge, the switch port within the QoS domain
can be configured to one of the trusted states because there is no need to classify the packets
at every switch within the domain.
to classify traffic.
• To return to the untrusted state, use the no qos command to apply best effort service.
Example
The following example configures the system to DSCP trust state.
Syntax
qos trust
no qos trust
Default Configuration
Each port is enabled while the system is operational.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• Use no qos trust to disable the trust mode on each port.
Use qos trust to enable trust mode on each port.
Example
The following example configures port g5 to default trust state (CoS).
qos cos
The qos cos Interface Configuration mode command configures the default port CoS value. To
return to the default setting, use the no form of this command.
Syntax
qos cos default-cos
no qos cos
Default Configuration
Port CoS is 0.
Command Mode
Interface Configuration (Ethernet, port-channel) command
User Guidelines
• You can use the default value to assign a CoS value to all untagged packets entering the
port.
Example
The following example configures port g5 default CoS value to 3.
Syntax
show qos map [dscp-queue]
• dscp-queue—Displays the DSCP to queue map.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Syntax
radius-server host {ip-address | hostname} [auth-port auth-port-number] [timeout timeout]
[retransmit retransmit] [deadtime deadtime] [key key] [source source] [priority priority]
[usage type]
no radius-server host ip-address
• ip-address—IP address of the RADIUS server host.
• hostname—Hostname of the RADIUS server host.(Range: 1 - 158 characters)
• auth-port-number—Port number for authentication requests. The host is not used for
authentication if set to 0. If unspecified, the port number defaults to 1812.
(Range: 0 - 65535)
• timeout—Specifies the timeout value in seconds. If no timeout value is specified, the
global value is used. (Range: 1 - 30)
• retransmit—Specifies the re-transmit value. If no re-transmit value is specified, the global
value is used. (Range: 1 - 10)
• deadtime—Length of time, in minutes, for which a RADIUS server is skipped over by
transaction requests. (Range 0 - 2000)
• key—Specifies the authentication and encryption key for all RADIUS communications
between the device and the RADIUS server. This key must match the encryption used on
the RADIUS daemon. If no key value is specified, the global value is used. (Range: 1 - 128
characters)
• source—Specifies the source IP address to use for the communication. If no retransmit
value is specified, the global value is used. 0.0.0.0 is interpreted as request to use the IP
address of the outgoing IP interface.
• priority—Determines the order in which the servers are used, where 0 is the highest
priority. (Range: 0 - 65535)
• type—Specifies the usage type of the server. Can be one of the following values: login,
802.1x or all. If unspecified, defaults to all.
Default Configuration
By default, no RADIUS host is specified.
User Guidelines
• To specify multiple hosts, multiple radius-server host commands can be used.
• If no host-specific timeout, retransmit, deadtime or key values are specified, the global values
apply to each host.
• The address type of the source parameter must be the same as the ip-address parameter.
Example
The following example specifies a RADIUS server host with the following characteristics:
• Server host IP address—192.168.10.1
• Authentication port number—20
• Timeout period—20 seconds
radius-server key
The radius-server key Global Configuration mode command sets the authentication and
encryption key for all RADIUS communications between the device and the RADIUS daemon. To
reset to the default, use the no form of this command.
Syntax
radius-server key [key-string]
no radius-server key
• key-string—Specifies the authentication and encryption key for all RADIUS
communications between the device and the RADIUS server. This key must match the
encryption used on the RADIUS daemon. The key can be up to 128 characters long.
Default Configuration
The default is an empty string.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
radius-server retransmit
The radius-server retransmit Global Configuration mode command specifies the number of times
the software searches the list of RADIUS server hosts. To reset the default configuration, use the no
form of this command.
Syntax
radius-server retransmit retries
no radius-server retransmit
• retries—Specifies the retransmit value. (Range: 1 - 10)
Default Configuration
The default is 3 attempts.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the number of times the software searches the list of RADIUS
server hosts to 5 attempts.
radius-server source-ip
The radius-server source-ip Global Configuration mode command specifies the source IP address
used for communication with RADIUS servers. To return to the default, use the no form of this
command.
Syntax
radius-server source-ip source
no radius-server-ip source
• source—Specifies the source IP address.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the source IP address used for communication with RADIUS
servers to 10.1.1.1.
radius-server timeout
The radius-server timeout Global Configuration mode command sets the interval for which a
device waits for a server host to reply. To restore the default, use the no form of this command.
Syntax
radius-server timeout timeout
no radius-server timeout
• timeout—Specifies the timeout value in seconds. (Range: 1 - 30)
Default Configuration
The default value is 3 seconds.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example sets the interval for which a device waits for a server host to reply to
5 seconds.
Syntax
radius-server deadtime deadtime
no radius-server deadtime
• deadtime—Length of time in minutes, for which a RADIUS server is skipped over by
transaction requests. (Range: 0 - 2000)
Default Configuration
The default dead time is 0 minutes.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example sets a dead time where a RADIUS server is skipped over by transaction
requests for this period, to 10 minutes.
show radius-servers
The show radius-servers User EXEC mode command displays the RADIUS server settings.
Syntax
show radius-servers
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Global values
--------------
TimeOut: 3
Retransmit: 3
Deadtime: 0
Source IP: 172.16.8.1
Syntax
show rmon statistics {ethernet interface number | port-channel port-channel-number}
• interface—Valid Ethernet port.
• port-channel-number—Valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• The following RMON Groups are supported - Ethernet Statistics (Group1), History (Group
2), Alarms (Group 3) and Events (Group 4).
Example
The following example displays RMON Ethernet Statistics for port g1.
Field Description
Dropped The total number of events in which packets are dropped by the probe due to
lack of resources. This number is not always the number of packets dropped;
it is the number of times this condition has been detected.
Octets The total number of octets of data (including those in bad packets) received
on the network (excluding framing bits but including FCS octets).
Packets The total number of packets (including bad packets, broadcast packets, and
multicast packets) received.
Broadcast The total number of good packets received and directed to the broadcast
address. This does not include multicast packets.
Multicast The total number of good packets received and directed to a multicast
address. This number does not include packets directed to the broadcast
address.
CRC Align Errors The total number of packets received with a length (excluding framing bits,
but including FCS octets) of between 64 and 1518 octets, inclusive, but with
either a bad Frame Check Sequence (FCS) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral number of octets (Alignment
Error).
Undersize Pkts The total number of packets received less than 64 octets long (excluding
framing bits, but including FCS octets) and otherwise well formed.
Oversize Pkts The total number of packets received longer than 1518 octets (excluding
framing bits, but including FCS octets) and otherwise well formed.
Fragments The total number of packets received less than 64 octets in length (excluding
framing bits but including FCS octets) and either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral number of octets (Alignment Error).
Jabbers The total number of packets received longer than 1518 octets (excluding
framing bits, but including FCS octets), and either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral number of octets (Alignment Error).
Collisions The best estimate of the total number of collisions on this Ethernet segment.
64 Octets The total number of packets (including bad packets) received that are 64
octets in length (excluding framing bits but including FCS octets).
65 to 127 Octets The total number of packets (including bad packets) received that are
between 65 and 127 octets in length inclusive (excluding framing bits but
including FCS octets).
128 to 255 Octets The total number of packets (including bad packets) received that are
between 128 and 255 octets in length inclusive (excluding framing bits but
including FCS octets).
Syntax
rmon collection history index [owner ownername] [buckets bucket-number] [interval seconds]
no rmon collection history index
• index—The requested statistics index group. (Range: 1 - 65535)
• owner ownername—Records the RMON statistics group owner name. If unspecified, the
name is an empty string.
• buckets bucket-number—A value associated with the number of buckets specified for the
RMON collection history group of statistics. If unspecified, defaults to 50.
(Range: 1 - 65535)
• interval seconds—The number of seconds in each polling cycle. If unspecified, defaults to
1800. (Range: 1 - 3600)
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• This command cannot be executed on multiple ports using the interface range ethernet
command.
The following example enables a Remote Monitoring (RMON) MIB history statistics group on port
g8 with the index number "1" and a polling interval period of 2400 seconds.
Syntax
show rmon collection history [ethernet interface | port-channel port-channel-number]
• interface—Valid Ethernet port.
• port-channel-number—Valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays all RMON group statistics.
Syntax
show rmon history index {throughput | errors | other} [period seconds]
• index—The requested set of samples. (Range: 1 - 65535)
• throughput—Displays throughput counters.
• errors—Displays error counters.
• other—Displays drop and collision counters.
• period seconds—Specifies the requested period time to display. (Range: 1 - 4294967295)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
The following example displays RMON Ethernet Statistics history for "throughput" on index
number 5.
Console# show rmon history 5 throughput
Sample Set: 1 Owner: CLI
Interface: g1 Interval: 1800
Requested samples: 50 Granted samples: 50
The following example displays RMON Ethernet Statistics history for "errors" on index number 5.
Console# show rmon history 5 errors
Sample Set: 1 Owner: CLI
Interface: g1 Interval: 1800
Requested samples: 50 Granted samples: 50
The following example displays RMON Ethernet Statistics history for "other" on index number 5.
The following table describes the significant fields shown in the display:
Field Description
Time Date and Time the entry is recorded.
Octets The total number of octets of data (including those in bad packets) received on the
network (excluding framing bits but including FCS octets).
Packets The number of packets (including bad packets) received during this sampling interval.
Broadcast The number of good packets received during this sampling interval that were directed
to the broadcast address.
Multicast The number of good packets received during this sampling interval that were directed
to a multicast address. This number does not include packets addressed to the
broadcast address.
Utilization% The best estimate of the mean physical layer network utilization on this interface
during this sampling interval, in hundredths of a percent.
CRC Align The number of packets received during this sampling interval that had a length
(excluding framing bits but including FCS octets) between 64 and 1518 octets,
inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number
of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment
Error).
Undersize The number of packets received during this sampling interval that were less than 64
octets long (excluding framing bits but including FCS octets) and were otherwise well
formed.
Oversize The number of packets received during this sampling interval that were longer than
1518 octets (excluding framing bits but including FCS octets) but were otherwise well
formed.
Fragments The total number of packets received during this sampling interval that were less than
64 octets in length (excluding framing bits but including FCS octets) had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error), or a bad
FCS with a non-integral number of octets (AlignmentError). It is normal for
etherHistoryFragments to increment because it counts both runts (which are normal
occurrences due to collisions) and noise hits.
Jabbers The number of packets received during this sampling interval that were longer than
1518 octets (excluding framing bits but including FCS octets), and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad
FCS with a non-integral number of octets (Alignment Error).
Dropped The total number of events in which packets were dropped by the probe due to lack of
resources during this sampling interval. This number is not necessarily the number of
packets dropped, it is just the number of times this condition has been detected.
Collisions The best estimate of the total number of collisions on this Ethernet segment during
this sampling interval.
rmon alarm
The rmon alarm Global Configuration mode command configures alarm conditions. To remove an
alarm, use the no form of this command.
Syntax
rmon alarm index variable interval rthreshold fthreshold revent fevent [type type] [startup
direction] [owner name]
no rmon alarm index
• index—The alarm index. (Range: 1 - 65535)
• variable—The object identifier of the particular variable to be sampled.
• interval—The interval in seconds over which the data is sampled and compared with the
rising and falling thresholds. (Range: 1 - 2147483648)
• rthreshold—Rising Threshold. (Range: 1 - 4294967295)
• fthreshold—Falling Threshold. (Range: 1 - 4294967295)
• revent—The Event index used when a rising threshold is crossed.(Range: 1 - 65535)
• fevent—The Event index used when a falling threshold is crossed. (Range: 1 - 65535)
Default Configuration
The following parameters have the following default values:
• type type—If unspecified, the type is absolute.
• startup direction—If unspecified, the startup direction is rising-falling.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the following alarm conditions:
• Alarm index—1000
• Variable identifier—dell
• Sample interval—360000 seconds
• Rising threshold—1000000
• Falling threshold—1000000
• Rising threshold event index—10
• Falling threshold event index—20
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the alarms summary table.
Console# show rmon alarm-table
The following table describes the significant fields shown in the display:
Field Description
Index An index that uniquely identifies the entry.
OID Monitored variable OID.
Owner The entity that configured this entry.
Syntax
show rmon alarm number
• number—Alarm index. (Range: 1 - 65535)
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays RMON 1 alarms.
rmon event
The rmon event Global Configuration mode command configures an event. To remove an event,
use the no form of this command.
Syntax
rmon event index type [community text] [description text] [owner name]
no rmon event index
• index—The event index. (Range: 1 - 65535)
• type—The type of notification that the device generates about this event. Can have the
following values: none, log, trap, log-trap. In the case of log, an entry is made in the log
table for each event. In the case of trap, an SNMP trap is sent to one or more
management stations.
• community text—If an SNMP trap is to be sent, it is sent to the SNMP community
specified by this octet string. (Range: 0-127 characters)
• description text—A comment describing this event. (Range: 0-127 characters)
• owner name—Enter a name that specifies who configured this event. If unspecified, the
name is an empty string. (Range: 0-127 characters)
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures an event with the trap index of 10.
Syntax
show rmon events
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the RMON event table.
The following table describes the significant fields shown in the display:
Field Description
Index An index that uniquely identifies the event.
Description A comment describing this event.
Type The type of notification that the device generates about this event. Can have the
following values: none, log, trap, log-trap. In the case of log, an entry is made in
the log table for each event. In the case of trap, an SNMP trap is sent to one or
more management stations.
Community If an SNMP trap is to be sent, it is sent to the SNMP community specified by this
octet string.
Owner The entity that configured this event.
Last time sent The time this entry last generated an event. If this entry has not generated any
events, this value is zero.
Syntax
show rmon log [event]
• event—Event index. (Range: 0 - 65535)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
Example
The following example displays the RMON logging table.
The following table describes the significant fields shown in the display:
Field Description
Event An index that uniquely identifies the event.
Description A comment describing this event.
Time The time this entry created.
The rmon table-size Global Configuration mode command configures the maximum RMON
tables sizes. To return to the default configuration, use the no form of this command.
Syntax
rmon table-size {history entries | log entries}
no rmon table-size {history | log}
• history entries—Maximum number of history table entries. (Range: 20 - 32767)
• log entries—Maximum number of log table entries. (Range: 20 - 32767)
Default Configuration
History table size is 270.
Log table size is 200.
Command Mode
Global Configuration mode
User Guidelines
• The configured table size is effective after the device is rebooted.
Example
The following example configures the maximum RMON history table sizes to 1000 entries.
Syntax
snmp-server community community [ro | rw | su] [ip-address] [view view-name]
snmp-server community-group community group-name [ip-address]
no snmp-server community community [ip-address]
• community — Community string that acts like a password and permits access to the
SNMP protocol. (Range :1- 20 chars)
• ro — Specifies read-only access (Default)
• rw — Specifies read-write access
• su — Specifies SNMP administrator access
• view view-name — Name of a previously defined view. The view defines the objects
available to the community. It’s not relevant for su, which has an access to the whole
MIB. If unspecified, all the objects except of the community-table and SNMPv3 user and
access tables are available. (Range: 1- 30 chars)
• ip-address — Management station IP address. Default is all IP addresses. An out-of-band
IP address can be specified as described in the usage guidelines. (Range: Valid IP address)
• group-name — Name of a previously defined group. The group defines the objects
available to the community. (Range :1- 30 chars)
Default Configuration
There are no default communities defined.
Command Mode
Global Configuration mode
User Guidelines
• You can’t specify view-name for su, which has an access to the whole MIB.
• You can use the view-name to restrict the access rights of a community string.
By specifying the view-name parameter the software:
1 Generates an internal security-name.
group-name.
3 Map the internal group-name for SNMPv1 and SNMPv2 security models to view-name
(read-view and notify-view always, and for rw for write-view also)
• You can use the group-name to restrict the access rights of a community string.
By specifying the group-name parameter the software:
1 Generates an internal security-name.
2 Map the internal security-name for SNMPv1 and SNMPv2 security models to the group-
name.
Examples
The following example sets up the community access string "public" to permit administrative
access to SNMP protocol, at an administrative station with the IP address 192.168.1.20.
snmp-server view
To create or update a view entry, use the snmp-server view global configuration command. To
remove the specified Simple Network Management Protocol (SNMP) server view entry, use the no
form of this command.
Syntax
snmp-server view view-name oid-tree {included | excluded}
no snmp-server view view-name [oid-tree]
• view-name — Label for the view record that you are updating or creating. The name is
used to reference the record. (Range:1 - 30 chars)
• oid-tree — Object identifier of the ASN.1 subtree to be included or excluded from the
view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4,
or a word, such as system. Replace a single subidentifier with the asterisk (*) wildcard to
specify a subtree family; for example 1.3.*.4.
• included — The view type is included.
• excluded — The view type is excluded.
Default Setting
"Default" and "DefaultSuper" views exists.
Command Mode
Global configuration
Example
The following example creates a view that includes all objects in the MIB-II system group except
for sysServices (System 7) and all objects for interface 1 in the MIB-II interfaces group:
snmp-server filter
To create or update a filter entry, use the snmp-server filter global configuration command. To
remove the specified Simple Network Management Protocol (SNMP) server filter entry, use the no
form of this command.
Syntax
snmp-server filter filter-name oid-tree {included | excluded}
no snmp-server filter filter-name [oid-tree]
• filter-name — Label for the filter record that you are updating or creating. The name is
used to reference the record. (Range: Up to 30 characters).
• oid-tree — Object identifier of the ASN.1 subtree to be included or excluded from the
view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4,
or a word, such as system. Replace a single subidentifier with the asterisk (*) wildcard to
specify a subtree family; for example 1.3.*.4.
• included — The filter type is included.
• excluded — The filter type is excluded.
Default Configuration
Product specific.
Command Modes
Global Configuration
• You can enter this command multiple times for the same filter record. Later lines take
precedence when an object identifier is included in two or more lines. .
Example
The following example creates a filter that includes all objects in the MIB-II system group except
for sysServices (System 7) and all objects for interface 1 in the MIB-II interfaces group:
snmp-server contact
The snmp-server contact Global Configuration mode command sets up a system contact. To
remove the system contact information, use the no form of the command.
Syntax
snmp-server contact text
no snmp-server contact
• text—Character string, up to 160 characters, describing the system contact information.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• Do not include spaces in the text string.
Example
The following example displays setting up the system contact point as "Dell_Technical_Support".
snmp-server location
The snmp-server location Global Configuration mode command sets up information on where the
device is located. To remove the location string use, the no form of this command.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• Do not include spaces in the text string.
Example
The following example sets the device location as "New_York".
Syntax
snmp-server enable traps
no snmp-server enable traps
Default Configuration
Enabled
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays the command to enable SNMP traps.
The snmp-server trap authentication Global Configuration mode command enables the switch to
send Simple Network Management Protocol traps when authentication fails. To disable SNMP
authentication failed traps, use the no form of this command.
Syntax
snmp-server trap authentication
no snmp-server trap authentication
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays the command to enable authentication failed SNMP traps.
snmp-server host
To specify the recipient of Simple Network Management Protocol notification operation, use the
snmp-server host global configuration command. Use the no form of this command to remove the
specified host.
Syntax
snmp-server host {ip-address | hostname} community-string [traps | informs] [1 | 2] [udp-port
port] [filter filtername] [timeout seconds] [retries retries]
no snmp-server host {ip-address | hostname} [traps | informs]
• ip-address — Internet address of the host (the targeted recipient). An out-of-band IP
address can be specified as described in the usage guidelines.
• hostname — Hostname of the host. (Range: 1 - 158 characters).
• community-string — Password-like community string sent with the notification operation.
(Range: 1 - 20 chars)
• traps — Sends SNMP traps to this host (Default).
• informs— Sends SNMP informs to this host. Not applicable to SNMPv1.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• When configuring snmp v1 or v2 notification recipients, the software should automatically
generate notification views for those recipients, for all MIBs.
Example
The following example specifies the recipient of Simple Network Management Protocol
notification operation.
snmp-server set
The snmp-server set Global Configuration mode command sets SNMP MIB value by the CLI.
Syntax
snmp-server set variable-name name1 value1 [name2 value2 …]
• variable-name — MIB variable name.
• name value.— List of name and value pairs. In case of scalar MIBs there is only a single
pair of name values. In case of entry in a table the first pairs are the indexes, followed by
one or more fields.
Default Configuration
This command has no default configuration.
User Guidelines
• Although the CLI can set any required configuration, there might be a situation where a
SNMP user sets a MIB variable that does not have an equivalent command. In order to
generate configuration files that support those situations, the snmp-server set command is
used.
• This command is context sensitive.
Examples
The following example sets the scalar MIB "sysName" to have the value "dell".
snmp-server group
To configure a new Simple Network Management Protocol (SNMP) group, or a table that maps
SNMP users to SNMP views, use the snmp-server group global configuration command. To remove
a specified SNMP group, use the no form of this command.
Syntax
snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv} [notify notifyview ] } [context
name] [read readview] [write writeview]
no snmp-server group groupname [v1 | v2 | v3 [noauth | auth | priv]] [context name]
• groupname — The name of the group. (Range: Up to 30 characters)
• v1 — SNMP Version 1 security model.
• v2 — SNMP Version 2 security model.
• v3 — SNMP Version 3 security model.
• noauth — Specifies no authentication of a packet. Applicable only to SNMP Version 3
security model.
• auth — Specifies authentication of a packet without encrypting it. Applicable only to
SNMP Version 3 security model.
Default configuration
No group entry exists.
Command Mode
Global configuration
User Guidelines
• The Router context is translated to "" context in the MIB.
Example
The following example configures a new Simple Network Management Protocol (SNMP) group or
a table that maps SNMP users to SNMP views
snmp-server user
To configure a new SNMP Version 3 user, use the snmp-server user global configuration
command. To remove a user, use the no form of the command.
Syntax
snmp-server user username groupname [remote engineid-string ] [ auth-md5 password | auth-
sha password | auth-md5-key md5-des-keys | auth-sha-key sha-des-keys ]
no snmp-server user username [remote engineid-string ]
• username — The name of the user on the host that connects to the agent. (Range: Up to
30 characters)
characters)
• remote engineid-string — Specifies the engine ID of remote SNMP entity to which the
user belongs. The engine ID is concatenated hexadecimal string. Each byte in
hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a
period or colon.(Range: 5 - 32 characters)
• auth-md5 —The HMAC-MD5-96 authentication level. The user should enter password.
• auth-sha —The HMAC-SHA-96 authentication level. The user should enter password.
• password — A password (not to exceed 32 characters) for authentication and generation
of DES key for privacy.(Range: Up to 30 characters)
• auth-md5-key — The HMAC-MD5-96 authentication level. The user should enter
authentication and privacy keys.
• md5-des-keys — Concatenated hexadecimal string of the MD5 key (MSB) and the privacy
key (LSB). If authentication is only required you should enter 16 bytes, if authentication
and privacy are required you should enter 32 bytes. Each byte in hexadecimal character
strings is two hexadecimal digits. Each byte can be separated by a period or colon.
(Range: 16 - 32 characters)
• auth-sha-key—The HMAC-SHA-96 authentication level. The user should enter
authentication and privacy keys.
• sha-des-keys — Concatenated hexadecimal string of the SHA key (MSB) and the privacy
key (LSB). If authentication is only required you should enter 20 bytes, if authentication
and privacy are required you should enter 36 bytes. Each byte in hexadecimal character
strings is two hexadecimal digits. Each byte can be separated by a period or colon.
(Range: 20 - 36 characters)
Default configuration
No group entry exists.
Command Mode
Global configuration
User Guidelines
• If auth-md5 or auth-sha is specified, both authentication and privacy are enabled for the
user.
When you enter a show running-config command, you will not see a line for this user. To
see if this user has been added to the configuration, type the show snmp user command.
An SNMP EngineID should be defined in order to add users to the device.
Changing or removing the value of snmpEngineID deletes the SNMPv3 users database.
snmp-server v3-host
The snmp-server v3-host Global Configuration mode command specifies the recipient of Simple
Network Management Protocol Version 3 notifications. To remove the specified host, use the no
form of this command.
Syntax
snmp-server v3-host {ip-address | hostname} username [traps | informs] {noauth | auth |
priv} [udp-port port] [filter filtername] [timeout seconds] [retries retries]
no snmp-server host {ip-address | hostname} username [traps | informs]
• ip-address—Specifies the IP address of the host (targeted recipient).
• hostname—Specifies the name of the host. (Range:1-158 characters).
• username—Specifies the name of the user to use to generate the notification. (Range: 1-
24)
• traps — Indicates that SNMP traps are sent to this host.
• informs — Indicates that SNMP informs are sent to this host.
• noauth — Indicates no authentication of a packet.
• auth — Indicates authentication of a packet without encrypting it.
• priv — Indicates authentication of a packet with encryption.
• port — Specifies the UDP port of the host to use. If unspecified, the default UDP port
number is 162.
(Range: 1-65535)
• filtername — Specifies a string that defines the filter for this host. If unspecified, nothing
is filtered.
(Range: 1-30 characters)
• seconds — Specifies the number of seconds to wait for an acknowledgment before
resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-
300)
• retries — Specifies the maximum number of times to resend an inform request. If
unspecified, the default maximum number of retries is 3. (Range: 1-255)
Default Setting
This command has no default configuration.
User Guidelines
• A user and notification view are not automatically created. Use the snmp-server user, snmp-
server group and snmp-server view Global Configuration mode commands to generate a user,
group and notify group, respectively.
Example
The following example configures an SNMPv3 host.
Syntax
snmp-server engineID local {engineid-string | default}
no snmp-server engineID local
• engineid-string — Specifies a character string that identifies the engine ID. (Range: 5-32
characters)
• default — The engine ID is created automatically based on the device MAC address.
Default Setting
The engine ID is not configured.
If SNMPv3 is enabled using this command, and the default is specified, the default engine ID
is defined per standard as:
• First 4 octets — first bit = 1, the rest is IANA Enterprise number.
• Fifth octet — set to 3 to indicate the MAC address that follows.
• Last 6 octets — MAC address of the device.
Command Mode
Global Configuration mode
User Guidelines
• To use SNMPv3, you have to specify an engine ID for the device. You can specify your own ID
or use a default string that is generated using the MAC address of the device.
Example
The following example specifies the Simple Network Management Protocol (SNMP) engineID on
the local device.
Syntax
show snmp engineID
Default Setting
This command has no default configuration.
Command Mode
Privileged EXEC mode
Example
The following example displays the SNMP engine ID.
show snmp
The show snmp Privileged EXEC mode command displays the SNMP status.
Syntax
show snmp
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the SNMP communications status.
console# sh snmp
Version 3 notifications
Target Type Username Secu- UDP Port Filter TO sec Retrie
Address rity name s
Level
System Contact:
System Location:
console#
Syntax
show snmp views [viewname]
• viewname— The name of the view. Range: Up to 30 characters
Default Configuration
There is no default configuration for this command.
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command
Example
The following example displays the configuration of views use the show snmp views Privileged
EXEC command.
Syntax
show snmp groups [groupname]
• groupnam — The name of the group.
Default Configuration
There is no default configuration for this command.
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the configuration of views use the show snmp views Privileged
EXEC command.
Name: user-group
Security Model: V3
Security Level: priv
Security Context: -
Read View: Default
Write View: ""
Notify View: ""
Syntax
show snmp filters [filtername]
• filternam — The name of the view. Range: Up to 30 character
Default Configuration
There is no default configuration for this command.
Privileged EXEC
User Guidelines
• There are no user guidelines for this command
Example
The following example displays the configuration of filters use the show snmp filters Privileged
EXEC command.
Syntax
show snmp users [username]
• usernam — The name of the user.. Range: Up to 30 character
Default Configuration
There is no default configuration for this command.
Command Modes
Privileged EXEC
User Guidelines
• There are no user guidelines for this command
Example
The following example displays the configuration of groups use the show snmp users Privileged
EXEC command.
Name: John
Group name: user-group
Auth Method: md5
Remote:
Name: John
Group name: user-group
Auth Method: md5
Remote: 08009009020C0B099C075879
260
SNMP Commands
Spanning-Tree Commands
spanning-tree
The spanning-tree Global Configuration mode command enables spanning-tree functionality. To
disable spanning-tree functionality, use the no form of this command.
Syntax
spanning-tree
no spanning-tree
Default Configuration
Spanning-tree is enabled.
Command Modes
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example enables spanning-tree functionality.
Console(config)# spanning-tree
spanning-tree mode
The spanning-tree mode Global Configuration mode command configures the spanning-tree
protocol. To return to the default configuration, use the no form of this command.
Syntax
spanning-tree mode {stp | rstp| mstp}
no spanning-tree mode
• stp—STP is the Spanning Tree operative mode.
• rstp—RSTP is the Spanning Tree operative mode.
• mstp—MSTP is enabled
Default Configuration
STP
User Guidelines
• In RSTP mode, the switch would use STP when the neighbor switch is using STP.
• In MSTP mode the switch would use RSTP when the neighbor switch is using RSTP, and
would use STP when the neighbor switch is using STP
Example
The following example configures the spanning-tree protocol to RSTP.
spanning-tree forward-time
The spanning-tree forward-time Global Configuration mode command configures the spanning-
tree bridge forward time, which is the amount of time a port remains in the listening and learning
states before entering the forwarding state.
To reset the default forward time, use the no form of this command.
Syntax
spanning-tree forward-time seconds
no spanning-tree forward-time
• seconds—Time in seconds. (Range: 4 - 30)
Default Configuration
The default forwarding-time for IEEE Spanning-tree Protocol (STP) is 15 seconds.
Command Modes
Global Configuration mode
User Guidelines
• When configuring the Forward-Time the following relationship should be kept:
– 2*(Forward-Time - 1) >= Max-Age
Example
The following example configures spanning-tree bridge forward time to 25 seconds.
Default Configuration
The default hello time for IEEE Spanning-Tree Protocol (STP) is 2 seconds.
Command Modes
Global Configuration mode
User Guidelines
• When configuring the Hello-Time the following relationship should be kept:
– Max-Age >= 2*(Hello-Time + 1)
Example
The following example configures spanning-tree bridge hello time to 5 seconds.
spanning-tree max-age
The spanning-tree max-age Global Configuration mode command configures the spanning-tree
bridge maximum age. To reset the default maximum age, use the no form of this command.
Syntax
spanning-tree max-age seconds
no spanning-tree max-age
• seconds -Time in seconds. (Range: 6 - 40)
Default Configuration
The default max-age for IEEE STP is 20 seconds.
Command Modes
Global Configuration mode
User Guidelines
• When configuring the Max-Age the following relationships should be kept:
– 2*(Forward-Time - 1) >= Max-Age
– Max-Age >= 2*(Hello-Time + 1)
spanning-tree priority
The spanning-tree priority Global Configuration mode command configures the spanning-tree
priority. The priority value is used to determine which bridge is elected as the root bridge. To reset
the default spanning-tree priority use the no form of this command.
Syntax
spanning-tree priority priority
no spanning-tree priority
• priority—Priority of the bridge. (Range: 0 - 65535 in steps of 4096)
Default Configuration
The default bridge priority for IEEE STP is 32768.
Command Modes
Global Configuration mode
User Guidelines
• The priority value must be a multiple of 4096.
• The bridge with the lowest priority is elected to be the Root Bridge.
Example
The following example configures spanning-tree priority to 12288.
spanning-tree disable
The spanning-tree disable Interface Configuration mode command disables spanning-tree on a
specific port. To enable spanning-tree on a port use, the no form of this command.
Syntax
spanning-tree disable
no spanning-tree disable
Default Configuration
By default, all ports are enabled for spanning-tree.
User Guidelines
• When STP is disabled, the device will not forward STP BPDU's based on the Forward BPDU's
setting.
Example
The following example disables spanning-tree on g5.
spanning-tree cost
The spanning-tree cost Interface Configuration mode command configures the spanning-tree path
cost for a port. To reset the default port path cost, use the no form of this command.
Syntax
spanning-tree cost cost
no spanning-tree cost
• cost—The port path cost (Range: 1 - 200,000,000)
Default Configuration
For the default short pathcost method, the cost values are: port channel - 4; 1000 mbps - 4;
100 mbps - 19; 10 mbps - 100.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• The method used (long or short) is set by using the spanning-tree pathcost method
command.
Example
The following example configures the spanning-tree cost on g5 to 35000.
Syntax
spanning-tree port-priority priority
no spanning-tree port-priority
• priority—The port priority. (Range: 0 - 240 in multiples of 16)
Default Configuration
The default port-priority for IEEE STP is 128.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the spanning priority on g5 to 96.
spanning-tree portfast
The spanning-tree portfast Interface Configuration mode command enables PortFast mode. In
PortFast mode, the interface is immediately put into the forwarding state upon linkup, without
waiting for the timer to expire. To disable PortFast mode, use the no form of this command.
Syntax
spanning-tree portfast
no spanning-tree portfast
Default Configuration
PortFast mode is disabled.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
• This feature should be used only with interfaces connected to end stations. Otherwise, an
accidental topology loop could cause a data packet loop and disrupt switch and network
operations.
Example
The following example enables PortFast on g5.
spanning-tree link-type
The spanning-tree link-type Interface Configuration mode command overrides the default link-
type setting. To reset the default, use the no form of this command.
Syntax
spanning-tree link-type {point-to-point | shared}
no spanning-tree spanning-tree link-type
• point-to-point—Specifies the port link type as point-to-point.
• shared—Specifies that the port link type is shared.
Default Configuration
There is no default configuration for this command.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• The switch derives the link type of a port from the duplex mode. A full-duplex port is
considered a point-to-point link, and a half-duplex port is considered a shared link.
Example
The following example enables shared spanning-tree on g5.
Syntax
spanning-tree mst instance-id priority priority
no spanning-tree mst instance-id priority
• instance - id — Displays the ID of the spanning -tree instance (Range: 1-15).
• priority — Displays the device priority for the specified spanning-tree instance (Range: 0-
61440 in multiples of 4096).
Default Setting
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.
Command Mode
Global Configuration mode
User Guidelines
• The device with the lowest priority is selected as the root of the spanning tree.
Example
The following example configures the spanning tree priority of instance 1 to 4096.
Syntax
spanning-tree mst max-hops hop-count
no spanning-tree mst max-hops
• hop-count — Number of hops in an MST region before the BDPU is discarded .(Range: 1-
40)
Default Setting
The default number of hops is 20.
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the maximum number of hops that a packet travels in an MST
region before it is discarded to 10.
Syntax
spanning-tree mst instance-id port-priority priority
no spanning-tree mst instance-id port-priority
• instance-ID — ID of the spanning tree instance. (Range: 1-15)
• priority — The port priority. (Range: 0 - 240 in multiples of 16)
Default Setting
The default port priority for IEEE Multiple Spanning Tree Protocol (MSTP) is 128.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidlines
• There are no user guidelines for this command.
Example
The following example configures the port priority of port g1 to 142.
Syntax
spanning-tree mst instance-id cost cost
no spanning-tree mst instance-id cost
• instance-ID — ID of the spanning -tree instance (Range: 1-15).
• cost — The port path cost. (Range: 1 - 200,000,000)
Default Setting
Default path cost is determined by port speed and path cost method (long or short) as shown
below:
Command Modes
Interface Configuration (Ethernet, port-channel) mode
Default Configuration
There is no default configuration for this command.
Example
The following example configures the MSTP instance 1 path cost for Ethernet port e9 to 4.
Default Setting
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• All devices in an MST region must have the same VLAN mapping, configuration revision
number, and name.
Example
The following example configures an MST region.
instance (mst)
The instance MST Configuration mode command maps VLANS to an MST instance.
Syntax
instance instance-id {add | remove} vlan vlan-range
• instance-ID — ID of the MST instance (Range: 1- 8).
• vlan-range — VLANs to be added to or removed from the specified MST instance. To
specify a range of VLANs, use a hyphen. To specify a series of VLANs, use a comma.
(Range: 1-4094).
Default Setting
VLANs are mapped to the common and internal spanning tree (CIST) instance (instance 0).
Command Modes
MST Configuration mode
User Guidelines
• All VLANs that are not explicitly mapped to an MST instance are mapped to the common
and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the
CIST.
Example
The following example maps VLANs 10-20 to MST instance 1.
name (mst)
The name MST Configuration mode command defines the configuration name. To return to the
default setting, use the no form of this command.
Syntax
name string
• string—MST configuration name. Case-sensitive (Range: 1-32 characters).
Default Setting
The default name is a bridge ID.
Command Mode
MST Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example defines the configuration name as regional.
revision (mst)
The revision MST configuration command defines the configuration revision number. To return to
the default configuration, use the no form of this command.
Syntax
revision value
no revision
• value — Configuration revision number (Range: 0-65535).
Command Mode
MST Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example sets the configuration revision to 1.
show (mst)
The show MST Configuration mode command displays the current or pending MST region
configuration.
Syntax
show {current | pending}
• current — Indicates the current region configuration.
• pending — Indicates the pending region configuration.
Default Setting
This command has no default configuration.
Command Mode
MST Configuration mode
User Guidelines
• The pending MST region configuration takes effect only after exiting the MST configuration
mode.
Example
The following example displays a pending MST region configuration.
exit (mst)
The exit MST Configuration mode command exits the MST configuration mode and applies all
configuration changes.
Syntax
exit
Default Setting
This command has no default configuration.
Command Mode
MST Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example exits the MST configuration mode and saves changes.
abort (mst)
The abort MST Configuration mode command exits the MST configuration mode without applying
the configuration changes.
Syntax
abort
Default Setting
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example exits the MST configuration mode without saving changes.
Syntax
spanning-tree pathcost method {long | short}
no spanning-tree pathcost method
• long— Specifies 1 through 200,000,000 range for port path costs.
• short—Specifies 0 through 65,535 range for port path costs.
Default Configuration
Short
Command Mode
Global configuration mode
User Guidelines
• The cost is set using the spanning-tree cost command.
Example
The following example sets the default path cost method to "long".
spanning-tree bpdu
The spanning-tree bpdu Global Configuration mode command defines BPDU handling when
spanning-tree is disabled on an interface.
Default Configuration
The default definition is flooding.
Command Modes
Global Configuration mode
User Guidelines
• The command is relevant when spanning-tree is disabled globally or on a single interface.
Example
The following example defines BPDU packet flooding when spanning-tree is disabled on an
interface.
Syntax
clear spanning-tree detected-protocols [ethernet interface number | port-channel port-
channel-number]
• interface—A valid Ethernet port.
• port-channel-number—A port-channel index.
Default Configuration
If no interface is specified, the action is applied to all interfaces.
Command Modes
Privileged EXEC mode
User Guidelines
• This feature should be used only when working in RSTP mode.
The following example restarts the protocol migration process (forces the renegotiation with
neighboring switches) on g1.
show spanning-tree
The show spanning-tree Privileged EXEC mode command displays spanning-tree configuration.
Syntax
show spanning-tree [ ethernet interface-number | port-channel port-channel-number ] [instance
instance-id]
show spanning-tree [detail] [active | blockedports] [instance instance-id]
show spanning-tree mst-configuration
• detail — Display detailed information.
• active — Display active ports only.
• blockedports — Display blocked ports only.
• mst-configuration — Display the MST configuration identifier.
• interface-number — Ethernet port number. (Range:Valid Ethernet port)
• port-channel-number — Port channel index. (Range:Valid Ethernet port)
• instance-id — ID associated with a spanning-tree instance.
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays spanning-tree information.
Interfaces
Name State Prio.Nbr Cost Sts Role PortFast Type
---- ------- --------- ----- ----- ------ ------- ----
1 Enabled 128.1 FWD Root No
20000 P2p
(RST
P)
2 Enabled 128.2 FWD Desg No
20000 Shar
ed
(STP
)
3 Disabled 128.3
20000
4 Enabled 128.4 BLK Altn No
20000 Shar
ed
(STP
)
5 Enabled 128.5 20000 DIS -
-
Interfaces
Name State Prio.Nbr Cost Sts Role PortFast Type
Address N/A
Interface
s
Name State Prio.Nbr Cost Sts Role PortFast Type
Address 00:02:4b:29:7a:00
Interfaces
Name State Prio.Nbr Cost Sts Role PortFast Type
Interfaces
Name State Prio.Nbr Cost Sts Role PortFast Type
1/4 Enabled 128.4 19 BLK Altn No
Shar
ed
(STP
)
Console# show spanning-tree detail
Name: Region1
Revision: 1
0 1-9,21-4094 Enabled
1 10-20 Enabled
Address 00:01:42:97:e0:00
Address 00:02:4b:29:7a:00
Interfaces
Address 00:02:4b:29:89:76
Rem hops 19
Address 00:02:4b:29:7a:00
Address 00:02:4b:19:7a:00
Path Cost 10000
Rem hops 19
Syntax
spanning-tree mst mstp-rstp
no spanning-tree mst mstp-rstp
This command has no arguments or keywords.
Command Modes
Global configuration
User Guidelines
• This command can be enabled when all the ports are Access ports.
• This command is relevant in MSTP mode only.
• When this feature is enabled incoming IEEE RSTP/STP packets would be mapped to the
MSTP instance according to the port’s VLAN. Outgoing MSTP packets would be mapped to
IEEE RSTP/STP packets according to the port’s VLAN.
Example
The following example configures the switch to convert STP/RSTP packets to MSTP instances.
Syntax
spanning-tree guard root
no spanning-tree guard root
Default Configuration
Root guard is disabled
Command Modes
Interface configuration (Ethernet, port-channel)
User Guidelines
• Root guard can be enabled when the switch work in STP, RSTP and MSTP.
When root guard is enabled, if spanning-tree calculations cause a port to be selected as
the root port, the port transitions to the alternate state.
Syntax
ip ssh port port-number
no ip ssh port
• port-number—Port number for use by the SSH server (Range: 1 - 65535).
Default Configuration
The default value is 22.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example specifies the port to be used by the SSH server as 8080.
ip ssh server
The ip ssh server Global Configuration mode command enables the device to be configured from a
SSH server. To disable this function, use the no form of this command.
Syntax
ip ssh server
no ip ssh server
Default Configuration
SSH is enabled.
Command Mode
Global Configuration mode
• If encryption keys are not generated, the SSH server is in standby until the keys are generated.
To generate SSH server keys, use the commands crypto key generate rsa, and crypto key
generate dsa.
Example
The following example enables the device to be configured from a SSH server.
Syntax
crypto key generate dsa
Default Configuration
DSA key pairs do not exist.
Command Mode
Global Configuration mode
User Guidelines
• DSA keys are generated in pairs: one public DSA key and one private DSA key. If the device
already has DSA keys, a warning and prompt to replace the existing keys with new keys is
displayed.
• This command is not saved in the startup configuration; however, the keys generated by this
command are saved in the FLASH. The SSH keys can be displayed with the show crypto key
mypubkey dsa command.
• This command may take a considerable period of time to execute.
• DSA key size is 2048 bits.
Example
The following example generates DSA key pairs.
Default Configuration
RSA key pairs do not exist.
Command Mode
Global Configuration mode
User Guidelines
• RSA keys are generated in pairs: one public RSA key and one private RSA key. If the device
already has RSA keys, a warning and prompt to replace the existing keys with new keys is
displayed.
• The maximum supported size for the RSA key is 2048 bits.
• This command is not saved in the startup configuration; however, the keys generated by this
command are saved in the FLASH. The SSH keys can be displayed with the show crypto key
mypubkey rsa command.
• This command may take a considerable period of time to execute.
Example
The following example generates RSA key pairs.
ip ssh pubkey-auth
The ip ssh pubkey-auth Global Configuration mode command enables public key authentication
for incoming SSH sessions. To disable this function, use the no form of this command.
Syntax
ip ssh pubkey-auth
no ip ssh pubkey-auth
Default Configuration
The function is disabled.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
The following example enables public key authentication for incoming SSH sessions.
Syntax
crypto key pubkey-chain ssh
Default Configuration
By default, there are no keys.
Command Mode
Global Configuration mode
User Guidelines
• Use this command to enter public key chain configuration mode.
• This command can also be used when you need to manually specify SSH client’s public keys.
Example
The following example enters the SSH Public Key-chain configuration mode.
user-key
The user-key SSH Public Key Chain Configuration mode command specifies which SSH public key
is manually configured and enters the SSH public key-string configuration command. To remove a
SSH public key, use the no form of this command.
Syntax
user-key username {rsa | dsa}
no user-key username
• username—Specifies the remote SSH client username, which can be up to 48 characters
long.
• rsa—RSA key.
Default Configuration
By default, there are no keys.
Command Mode
SSH Public Key Chain Configuration mode
User Guidelines
• Follow this command with the key-string command to specify the key.
Example
The following example enables a SSH public key to be manually configured for the SSH public key
chain called "bob".
key-string
The key-string SSH Public Key-String Configuration mode command manually specifies a SSH
public key.
Syntax
key-string row key-string
• row—Specify SSH public key row by row
• key-string—UU-encoded DER format is the same format in authorized_keys file used by
OpenSSH.
Default Configuration
By default, the keys do not exist.
Command Mode
SSH Public Key-string configuration
User Guidelines
• Use the key-string row command to specify the SSH public key row by row. Each row must
begin with the key-string row command. This command is useful for configuration files.
• UU-encoded DER format is the same format in authorized_keys file used by OpenSSH.
The following example enters public key strings for SSH public key clients called "bob".
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
show ip ssh
The show ip ssh Privileged EXEC mode command displays the SSH server configuration.
Syntax
show ip ssh
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
The following table describes the significant fields shown in the display:
Field Description
IP address Client address
SSH username User name
Version SSH version number
Cipher Encryption type (3DES, Blowfish, RC4)
Auth Code Authentication Code (HMAC-MD5, HMAC-SHA1)
Syntax
show crypto key mypubkey [rsa | dsa]
• rsa—RSA key.
• dsa—DSA key.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Example
The following example displays the SSH public keys on the device.
Console# show crypto key mypubkey rsa
RSA key data:
005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768
Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86
Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt gfhkjglk
Syntax
show crypto key pubkey-chain ssh [username username] [fingerprint bubble-babble | hex]
• username—Specifies the remote SSH client username.
• bubble-babble—Fingerprints in Bubble Babble format.
• hex—Fingerprint in Hex format. If fingerprint is unspecified, it defaults to Hex format.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays all SSH public keys stored on the device.
302
SSH Commands
Syslog Commands
logging on
The logging on Global Configuration mode command controls error messages logging. This
command sends debug or error messages to a logging process, which logs messages to designated
locations asynchronously to the process that generated the messages. To disable the logging
process, use the no form of this command.
Syntax
logging on
no logging on
Default Configuration
Logging is enabled.
Command Mode
Global Configuration mode
User Guidelines
• The logging process controls the distribution of logging messages to the various destinations,
such as the logging buffer, logging file, or syslog server. Logging on and off for these
destinations can be individually configured using the logging buffered, logging file, and
logging Global Configuration mode commands. However, if the logging on command is
disabled, no messages are sent to these destinations. Only the console receives messages.
Example
The following example shows how logging is enabled.
logging
The logging Global Configuration mode command logs messages to a syslog server. To delete the
syslog server with the specified address from the list of syslogs, use the no form of this command.
Syntax
logging {ip-address | hostname} [port port] [severity level] [facility facility] [description text]
no logging {ip-address | hostname}
• ip-address—IP address of the host to be used as a syslog server.
• hostname—Hostname of the host to be used as a syslog server. (Range: 1 - 158 characters)
(Range: 1 - 65535)
• severity level—Limits the logging of messages to the syslog servers to a specified level:
emergencies, alerts, critical, errors, warnings, notifications, informational and
debugging. If unspecified, the default level is errors.
• facility—The facility that is indicated in the message. Can be one of the following values:
local0, local1, local2, local3, local4, local5, local 6, local7. If unspecified, the port
number defaults to local7.
• text—Syslog server description, which can be up to 64 characters.
Default Configuration
As described in the field descriptions.
Command Mode
Global Configuration mode
User Guidelines
• Multiple syslog servers can be used.
• If no specific severity level is specified, the global values apply to each server.
Example
The following example configures messages with a "critical" severity level so that they are logged to
a syslog server with an IP address 10.1.1.1.
logging console
The logging console Global Configuration mode command limits messages logged to the console
based on severity. To disable logging to the console terminal, use the no form of this command.
Syntax
logging console level
no logging console
• level—Limits the logging of messages displayed on the console to a specified level:
emergencies, alerts, critical, errors, warnings, notifications, informational, debugging.
Default Configuration
The default is informational.
User Guidelines
• There are no user guidelines for this command.
Example
The following example limits messages logged to the console based on severity level "errors".
logging buffered
The logging buffered Global Configuration mode command limits syslog messages displayed from
an internal buffer based on severity. To cancel the buffer use, use the no form of this command.
Syntax
logging buffered level
no logging buffered
• level—Limits the message logging to a specified level buffer: emergencies, alerts, critical,
errors, warnings, notifications, informational, debugging.
Default Configuration
The default level is informational.
Command Mode
Global Configuration mode
User Guidelines
• All the syslog messages are logged to the internal buffer. This command limits the commands
displayed to the user.
Example
The following example limits syslog messages displayed from an internal buffer based on the
severity level "debugging".
Default Configuration
The default number of messages is 200.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example changes the number of syslog messages stored in the internal buffer to 300.
clear logging
The clear logging Privileged EXEC mode command clears messages from the internal logging
buffer.
Syntax
clear logging
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example clears messages from the internal syslog message logging buffer.
Syntax
logging file level
no logging file
• level—Limits the logging of messages to the buffer to a specified level: emergencies,
alerts, critical, errors, warnings, notifications, informational and debugging.
Default Configuration
The default severity level is errors.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example limits syslog messages sent to the logging file based on the severity level
"alerts".
Syntax
clear logging file
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
show logging
The show logging Privileged EXEC mode command displays the state of logging and the syslog
messages stored in the internal buffer.
Syntax
show logging
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Syntax
show logging file
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Example
The following example displays the state of logging and the syslog messages stored in the logging
file.
show syslog-servers
The show syslog-servers Privileged EXEC mode command displays the syslog servers settings.
Syntax
show syslog-servers
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the syslog server settings.
Console# show syslog-servers
312
Syslog Commands
System Management
ping
The ping User EXEC mode command sends ICMP echo request packets to another node on the
network.
Syntax
ping ip-address | hostname [size packet_size] [count packet_count] [timeout time_out]
• ip-address—IP address to ping.
• hostname—hostname to ping. (Range: 1 - 158 characters)
• packet_size—Number of bytes in a packet. The actual packet size is eight bytes larger
than the size specified because the switch adds header information. (Range: 56 - 1472
bytes)
• packet_count—Number of packets to send. If 0 is entered it pings until stopped. (Range:
0 - 65535 packets)
• time_out—Timeout in milliseconds to wait for each reply. (Range: 50 - 65535
milliseconds).
Default Configuration
timeout time_out—The default is 2000 milliseconds.
Command Mode
User EXEC mode
User Guidelines
Press Esc to stop pinging. Following are sample results of the ping command:
• Destination (host/network) unreachable—The gateway for this destination indicates that
the destination is unreachable.
313
www.dell.com | support.dell.com
Examples
The following example displays a ping to IP address 10.1.1.1.
traceroute
The traceroute User EXEC mode command discovers the routes that packets will actually take
when traveling to their destination.
Syntax
traceroute ip-address |hostname [size packet_size] [ttl max-ttl] [count packet_count]
[timeout time_out] [source ip-address] [tos tos]
• ip-address—IP address of the destination host. (Range: Valid IP Address)
• hostname—Hostname of the destination host (Range: 1 - 158 characters)
• size packet_size—Number of bytes in a packet. (Range: 40-1472)
• ttl max-ttl—The largest TTL value that can be used. The traceroute command
terminates when the destination is reached or when this value is reached. (Range:1-255)
• count packet_count—The number of probes to be sent at each TTL level. (Range:1-10)
• timeout time_out—The number of seconds to wait for a response to a probe packet.
(Range:1-60)
Default Configuration
size packet_size—The default is 40 bytes.
ttl max-ttl—The default is 30.
count packet_count—The default count is 3.
timeout time_out—The default is 6 seconds.
Command Mode
User EXEC mode
User Guidelines
• The traceroute command works by taking advantage of the error messages generated by a
device when a datagram exceeds its time-to-live (TTL) value.
• The traceroute command starts by sending probe datagrams with a TTL value of one. This
causes the first device to discard the probe datagram and send back an error message. The
traceroute command sends several probes at each TTL level and displays the round-trip time
for each.
• The traceroute command sends out one probe at a time. Each outgoing packet may result in
one or two error messages. A "time exceeded" error message indicates that an intermediate
device has seen and discarded the probe. A "destination unreachable" error message indicates
that the destination node has received the probe and discarded it because it could not deliver
the packet. If the timer goes off before a response comes in, the traceroute command prints
an asterisk (*).
• The traceroute command terminates when the destination responds, when the maximum
TTL is exceeded, or when the user interrupts the trace with Esc.
The following table describes the significant fields shown in the display
Field Description
1 Indicates the sequence number of the router in the path
to the host.
i2-gateway.stanford.edu Host name of this device.
192.68.191.83 IP address of this device.
1 msec 1 msec 1 msec Round-trip time for each of the probes that are sent.
The following table describes the characters that can appear in the traceroute command output.
telnet
The telnet User EXEC mode command is used to log in to a host that supports Telnet.
Syntax
telnet ip-address | hostname [port] [keyword1......]
• ip-address—IP address of the destination host. (Range: 1 - 160 characters)
• hostname—Hostname of the destination host (Range: Valid IP Address)
• port—A decimal TCP port number, or one of the keywords from the ports table in the
usage guidelines. The default is the Telnet port (decimal23) on the host.
• keyword—Can be one or more keywords from the keywords table in the User Guidelines.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• The Telnet software supports special Telnet commands in the form of Telnet sequences that
map generic terminal control functions to operating system-specific functions. To issue a
special Telnet command, enter Esc and then a command character.
Special Telnet Command characters
At any time during an active Telnet session, the Telnet commands can be listed by pressing the
Ctrl-shift-6 key, followed by a question mark at the system prompt: Ctrl-shift-6?
A sample of this list follows.
Console> ‘Ctrl-shift-6’ ?
[Special telnet escape help]
Esc B sends telnet BREAK
Esc C sends telnet IP
Esc H sends telnet EC
Esc O sends telnet AO
Esc T sends telnet AYT
Esc U sends telnet EL
Esc x suspends the session (return to system command prompt)
Several concurrent Telnet sessions can be opened and switched between them. To open a
subsequent session, the current connection needs to be suspended, by pressing the escape
sequence ‘Ctrl-Shift-6’ and ‘x’ to return to the system command prompt. Then open a new
connection with the telnet command.
Keywords Table
Options Description
/echo Enables local echo
/quiet Prevents onscreen display of all messages from the
software.
/source-interface Specifies the source interface.
Ports Table
Example
Console> telnet 176.213.10.50
Esc U sends telnet EL
resume
The resume User EXEC mode command is used to switch to another open Telnet session.
Syntax
resume [connection]
• connection—The connection number. The default is the most recent connection
Default Configuration
There is no default configuration for this command.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following command switches to another open Telnet session.
Syntax
reload
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• Caution should be exercised when resetting the device, to ensure that no other activity is
being performed. In particular, the user should verify that no configuration files are being
downloaded at the time of reset.
Example
The following example reloads the operating system.
Console# reload
hostname
The hostname Global Configuration mode command specifies or modifies the device host name.
To remove the existing host name, use the no form of the command.
Syntax
hostname name
no hostname
• name—The device host name. Range (1-158 characters)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
show users
The show users User EXEC mode command displays information about the active users.
Syntax
show users
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays information about the active users.
show sessions
The show sessions User EXEC mode command lists the open Telnet sessions.
Syntax
show sessions
This command has no arguments or keywords.
Command Mode
EXEC mode
User Guidelines
1 Open telnet session from PC 5324 to other device.
2 In the other device syntax, press Cntrl-shift-t-X
3 Enter the command show session. The number of sessions opened from PC 5324 is displayed.
4 Enter the command resume [number of session] to return to the relevant telnet session.
Examples
The following table describes the significant fields shown in the display:
Console> show sessions
Field Description
Connection Connection number
Host Remote host to which the device is connected through a Telnet session.
Address IP address of the remote host.
Port Telnet TCP port number
Byte Number of unread bytes for the user to see on the connection.
show system
The show system User EXEC mode command displays system information.
Syntax
show system
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the system information.
console> show system
System Description: Corporate
System Up Time (days,hour:min:sec): 1,22:38:21
System Contact:
System Name: RS1
System location:
System MAC Address: 00:10:B5:F4:00:01
Sys Object ID:
Type: PowerConnect 5324
Fan Status
------------ --------------------
1 OK
2 OK
show version
The show version User EXEC mode command displays the system version information.
Syntax
show version
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays a system version (this version number is only for demonstration
purposes).
asset-tag
The asset-tag Global Configuration mode command specifies the device asset tag. To remove the
existing asset tag, use the no form of the command.
Syntax
asset-tag tag
no asset-tag
• tag—The device asset tag. (Range: 1- 16 characters)
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example specifies the device asset tag as "1qwepot".
show system id
The show system id User EXEC mode command displays the ID information.
Syntax
show system id
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• The tag information is on a device by device basis.
Example
The following example displays the system service tag information.
Syntax
tacacs-server host {ip-address | hostname} [single-connection] [port port-number] [timeout
timeout] [key key-string] [source source] [priority priority]
no tacacs-server host {ip-address | hostname}
• ip-address—Name or IP address of the host.
• hostname—Hostname of the tacacs server. (Range: 1 - 158 characters)
• single-connection—Specify single-connection. Rather than have the device open and
close a TCP connection to the daemon each time it must communicate, the single-
connection option maintains a single open connection between the device and the
daemon.
• port-number—Specify a server port number. If unspecified, the port number defaults to
49. (Range: 0 - 65535)
• timeout—Specifies the timeout value in seconds. If no timeout value is specified, the
global value is used. (Range: 1 - 30)
• key-string—Specifies the authentication and encryption key for all TACACS
communications between the device and the TACACS server. This key must match the
encryption used on the TACACS daemon. If no key string value is specified, the global
value is used. (Range: 0 - 128 characters)
• source—Specifies the source IP address to use for the communication. If no source value
is specified, the global value is used.
• priority—Determines the order in which the servers will be used, when 0 is the highest
priority. If unspecified defaults to 0. (Range: 0 - 65535)
Default Configuration
No TACACS host is specified
Command Mode
Global Configuration mode
User Guidelines
• Multiple tacacs-server host commands can be used to specify multiple hosts.
host.
Example
The following example specifies a TACACS+ host.
Console (config)# tacacs-server host 172.16.1.1
tacacs-server key
The tacacs-server key Global Configuration mode command sets the authentication encryption
key used for all TACACS+ communications between the device and the TACACS+ daemon. To
disable the key, use the no form of this command.
Syntax
tacacs-server key key-string
no tacacs-server key
• key-string—Specifies the authentication and encryption key for all TACACS
communications between the device and the TACACS server. This key must match the
encryption used on the TACACS daemon. (Range: 0 - 128 characters)
Default Configuration
Empty string
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example sets the authentication encryption key.
tacacs-server timeout
The tacacs-server timeout Global Configuration mode command sets the timeout value. To restore
the default, use the no form of this command.
Syntax
tacacs-server timeout timeout
no tacacs-server timeout
Default Configuration
5 seconds
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example sets the timeout value as 30.
tacacs-server source-ip
The tacacs-server source-ip Global Configuration mode command specifies the source IP address
that will be used for the communication with TACACS servers. To return to default, use the no
form of this command.
Syntax
tacacs-server source-ip source
no tacacs-server source-ip source
• source—Specifies the source IP address. (Range: Valid IP Address)
Default Configuration
The IP address would be of the outgoing IP interface.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example specifies the source IP address.
The show tacacs Privileged EXEC mode command displays configuration and statistics for a
TACACS+ server.
Syntax
show tacacs [ip-address]
• ip-address—Name or IP address of the host.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays configuration and statistic for a TACACS+ server.
Console# show tacacs
IP address Status Port Single TimeOut Source Priority
Connection IP
---------- -------- ----- --------- ------- ------- --------
172.16.1.1 Connected 49 No Global Global 1
Global values
--------------
TimeOut: 3
Source IP: 172.16.8.1
Syntax
enable [privilege-level]
• privilege-level—Privilege level to enter the system. (Range: 1 - 15)
Default Configuration
The default privilege level is 15.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to enter privileged mode:
Console> enable
enter password:
Console#
disable
The disable Privileged EXEC mode command returns to User EXEC mode.
Syntax
disable [privilege-level]
• privilege-level—Privilege level to enter the system. (Range: 1 - 15)
Default Configuration
The default privilege level is 1.
Command Mode
Privileged EXEC mode
Example
The following example shows how to return to normal mode.
Console# disable
Console>
login
The login User EXEC mode command changes a login username.
Syntax
login
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to enter privileged EXEC mode and login.
Console> login
User Name:admin
Password:*****
Console#
configure
The configure Privileged EXEC mode command enters the global configuration mode.
Syntax
configure
This command has no keywords or arguments.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
In the following example, because no keyword is entered, a prompt is displayed. After the keyword
is selected, a message confirming the command entry method is displayed.
Console# configure
Console (config)#
exit(configuration)
The exit command exits any configuration mode to the next highest mode in the CLI mode
hierarchy.
Syntax
exit
Default Configuration
This command has no default configuration.
Command Mode
All command modes
User Guidelines
• There are no user guidelines for this command.
Example
The following example changes the configuration mode from Interface Configuration mode to
User EXEC mode.
Console(config-if)# exit
Console(config)# exit
Console#
The exit User EXEC mode command closes an active terminal session by logging off the device.
Syntax
exit
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example closes an active terminal session.
Console> exit
end
The end Global Configuration mode command ends the current configuration session and returns
to the privileged command mode.
Syntax
end
Default Configuration
This command has no default configuration.
Command Mode
All Command modes
User Guidelines
• There are no user guidelines for this command.
help
The help command displays a brief description of the help system.
Syntax
help
Default Configuration
This command has no default configuration.
Command Mode
All Command modes
User Guidelines
• There are no user guidelines for this command.
history
The history Line Configuration mode command enables the command history function. To disable
the command history feature, use the no form of this command.
Syntax
history
no history
Default Configuration
The history function is enabled.
Command Mode
Line Configuration mode
User Guidelines
• There are no user guidelines for this command.
The following example enables the command history function for telnet.
history size
The history size Line Configuration mode command changes the command history buffer size for
a particular line. To reset the command history buffer size to the default, use the no form of this
command.
Syntax
history size number-of-commands
no history size
• number-of-commands—Number of commands that the system records in its history
buffer. (Range: 0 - 256)
Default Configuration
The default history buffer size is 10.
Command Mode
Line Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example changes the command history buffer size to 100 entries for a particular line.
debug-mode
The debug-mode Privilege EXEC mode command switches the mode to debug.
Syntax
debug-mode
Default Configuration
This command has no default configuration.
User Guidelines
• There are no user guidelines for this command.
Example
The following example enables the debug command interface.
console(config)#
console# debug
>debug
Enter DEBUG Password: *****
DEBUG>
show history
The show history User EXEC mode command lists the commands entered in the current session.
Syntax
show history
Default Configuration
This command has no default configuration.
Command Mode
User EXEC command mode
User Guidelines
• The commands are listed from the first to the latest command.
• The buffer is kept unchanged when entering to configuration mode and returning back.
• The command in the buffer includes the commands that were not executed.
The following example displays all the commands entered while in the current privileged EXEC
mode.
show privilege
The show privilege User EXEC mode command displays the current privilege level.
Syntax
show privilege
Default Configuration
This command has no default configuration.
Command Mode
User EXEC command mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the current privilege level.
Syntax
vlan database
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example enters the VLAN database mode.
vlan
Use the vlan VLAN Configuration mode command to create a VLAN. To delete a VLAN, use the
no form of this command.
Syntax
vlan {vlan-range}
no vlan {vlan-range}
• vlan-range—A list of valid VLAN IDs to be added. List separate, non-consecutive VLAN
IDs separated by commas (without spaces); use a hyphen to designate a range of IDs.
(Range: 2 - 4094)
Default Configuration
This command has no default configuration.
Command Mode
VLAN Configuration mode
Example
The following example VLAN number 1972 is created.
default-vlan disable
The default-vlan disable VLAN Configuration mode command disables the default VLAN
functionality. Use the no form of this command to enable the default VLAN functionality.
Syntax
default-vlan disable
no default-vlan disable
This command has no keywords or arguments.
Default Configuration
Enabled
Command Modes
VLAN Configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples1
Console# vlan database
Console(config-vlan)# default-vlan disable
interface vlan
The interface vlan Global Configuration mode command enters the interface configuration
(VLAN) mode.
Syntax
interface vlan vlan-id
• vlan-id—The ID of an existing VLAN (excluding GVRP dynamic VLANs).
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the VLAN 1 IP address of 131.108.1.27 and subnet mask
255.255.255.0.
Syntax
interface range vlan {vlan-range | all}
• vlan-range—A list of valid VLAN IDs to add. Separate non consecutive VLAN IDs with a
comma and no spaces; a hyphen designates a range of IDs.
• all—All existing static VLANs.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
• Commands under the interface range context are executed independently on each interface
in the range. If the command returns an error on one of the interfaces, an error message is
displayed and execution continues on other interfaces.
The following example groups VLAN 221 until 228 and VLAN 889 to receive the same command.
name
The name Interface Configuration mode command adds a name to a VLAN. To remove the VLAN
name use the no form of this command.
Syntax
name string
no name
• string—Unique name, up to 32 characters in length, to be associated with this VLAN.
Default Configuration
No name is defined.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• The VLAN name should be unique.
Example
The following example names VLAN number 19 with the name "Marketing".
Syntax
switchport access vlan vlan-id
no switchport access vlan
• vlan-id—VID of the VLAN to which the port is configured.
Command Mode
Interface configuration (Ethernet, port-channel) mode
User Guidelines
• The command automatically removes the port from the previous VLAN, and adds it to the
new VLAN.
Example
The following example configures a VLAN ID of 23 to the untagged layer 2 VLAN interface
number g8.
Syntax
switchport trunk allowed vlan {add vlan-list | remove vlan-list}
• add vlan-list—List of VLAN IDs to add. Separate non consecutive VLAN IDs with a
comma and no spaces. A hyphen designates a range of IDs.
• remove vlan-list—List of VLAN IDs to remove. Separate non consecutive VLAN IDs with
a comma and no spaces. A hyphen designate a range of IDs.
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
The following example shows how to add VLANs 2 and 5 to 8 to the allowed list of g8.
Syntax
switchport trunk native vlan vlan-id
no switchport trunk native vlan
• vlan-id—Valid VLAN ID of the native VLAN.
Default Configuration
If default VLAN is enabled, then the VID=1, otherwise VID = 4095.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• This command has the following consequences: incoming untagged frames are assigned to
this VLAN and outgoing traffic in this VLAN on this port is sent untagged (despite the
normal situation where traffic sent from a trunk-mode port is all tagged).
• The command adds the port as a member in the VLAN. If the port is already a member in the
VLAN (not as a native), it should be first removed from the VLAN.
Example
The following example g8, in trunk mode, is configured to use VLAN number 123 as the "native"
VLAN.
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• You can use this command to change the egress rule (e.g. from tagged to untagged), without
first removing the VLAN from the list.
Example
The following example shows how to add VLANs 2, 5, and 6 to the allowed list.
Syntax
switchport general pvid vlan-id
no switchport general pvid
• vlan-id—PVID (Port VLAN ID). The vlan-id may belong to a non-existent VLAN.
Default Configuration
VLAN ID=1
User Guidelines
• This command has the following consequences: incoming untagged frames are assigned to
this VLAN and outgoing traffic in this VLAN on this port is sent untagged (despite the
normal situation where traffic sent from a trunk-mode port is all tagged).
Example
The following example shows how to configure the PVID for g8, when the interface is in general
mode.
Syntax
switchport general ingress-filtering disable
no switchport general ingress-filtering disable
Default Configuration
Ingress filtering is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example shows how to enables port ingress filtering on g8.
Syntax
switchport general acceptable-frame-type tagged-only
no switchport general acceptable-frame-type tagged-only
Default Configuration
All frame types are accepted at ingress.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures g8 to discard untagged frames at ingress.
Syntax
switchport forbidden vlan {add vlan-list | remove vlan-list}
• add vlan-list—List of VLAN IDs to add to the "forbidden" list. Separate non consecutive
VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
• remove vlan-list—List of VLAN IDs to remove from the "forbidden" list. Separate non
consecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
Default Configuration
All VLANs allowed.
User Guidelines
• There are no user guidelines for this command.
Example
The following example forbids adding VLANs number 234 till 256, to g8.
Syntax
map protocol protocol [encapsulation] protocols-group group
no map protocol protocol encapsulation
• protocol—The protocol is a 16 or 40 bits protocol number or one of the following names,
ip-arp or ipx. The protocol number is in Hex format (Range: 0600 - FFFF).
• encapsulation—One of the following values: ethernet, rfc1042 or llcOther. If no option is
indicated the default is ethernet.
• group—Protocol group number (Range: 1 - 2147483647).
Default Configuration
This command has no default configuration.
Command Mode
VLAN Configuration mode
User Guidelines
There are no user guidelines for this command
Example
The following example maps protocol ip-arp to the group named "213".
Syntax
switchport general map protocols-group group vlan vlan-id
no switchport general map protocols-group group
• group—Group number as defined in the map protocol protocols-group command.
(Range: 1 - 2147483647)
• vlan-id—Define the VLAN ID in the classifying rule.
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example sets a protocol-based classification rule of protocol group 1 to VLAN 8.
ip internal-usage-vlan
The ip internal-usage-vlan Interface Configuration mode command reserves a VLAN as the
internal usage VLAN of an interface. Use the no form of this command to reset to default.
Syntax
ip internal-usage-vlan vlan-id
no ip internal-usage-vlan
• vlan-id—VLAN ID of the internal usage VLAN.(Range: Valid VLAN)
Default Configuration
This command has no default configuration.
User Guidelines
• An internal usage VLAN is required when an IP interface is defined on Ethernet port or Port-
channel.
• Using this command the user can define the internal usage VLAN of a port.
• If an internal-usage is not defined for a Port, and the user wants to define an IP interface, the
software chooses one of the unused VLANs.
• If a VLAN ID was chosen by the software for internal usage, and the user wants to use that
VLAN ID for static or dynamic VLAN, he should either remove the IP interface, creates the
VLAN, and recreate the IP interface, or use this command to define explicit internal usage
VLAN.
Examples
The following example reserves a VLAN as the internal usage VLAN of an interface.
show vlan
The show vlan Privileged EXEC mode command displays VLAN information.
Syntax
show vlan [tag vlan-id | name vlan-name]
• vlan-id—A valid VLAN ID
• vlan-name—A valid VLAN name string. (Range: 1 - 32 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays all VLAN information.
Syntax
show vlan internal usage
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Syntax
show vlan protocols-groups
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays protocols-groups information.
Syntax
show interfaces switchport {ethernet interface | port-channel port-channel-number}
• Interface—Specific interface, such as ethernet g8.
• port-channel-number—Valid port-channel trunk index.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays switchport configuration individually for g1.
Forbidden VLANS:
VLAN Name
---- ----
73 Out
Classification rules:
Group ID VLAN
-------- ----
219 372
switchport mode
Use the switchport mode interface configuration command to configure the VLAN membership
mode of a port. Use the no form of this command to reset the mode to the appropriate default for
the device.
Syntax
switchport mode {customer | access | trunk | general}
Default Configuration
All ports are in access mode, and belong to the default VLAN (whose VID=1).
Command Modes
Interface configuration (Ethernet, port-channel)
User Guidelines
• There are no user guidelines for this command
Example
The following example onfigures the VLAN membership mode of a port. Use the no form of this
command to reset the mode to the appropriate default for the device.
console# config
console(config)# interface ethernet g1
console(config-if)# switchport mode customer
Syntax
switchport customer vlan vlan-id
no switchport customer vlan
• vlan-id — VLAN ID of the customer
Default Configuration
No VLAN is configured.
Command Modes
Interface configuration (Ethernet, port-channel)
Example
The following example sets the port's VLAN when the interface is in customer mode.
Syntax
ip http server
no ip http server
Default Configuration
HTTP server is disabled by default.
Command Mode
Global Configuration mode
User Guidelines
• Only a user with access level 15 can use the web server.
Example
The following example enables the device to be configured from a browser.
ip http port
The ip http port Global Configuration mode command specifies the TCP port for use by a web
browser to configure the device. To use the default TCP port, use the no form of this command.
Syntax
ip http port port-number
no ip http port
• port-number—Port number for use by the HTTP server. (Range: 0 - 65535)
Default Configuration
This default port number is 80.
Command Mode
Global Configuration mode
• There are no user guidelines for this command. However, specifying 0 as the port number will
effectively disable HTTP access to the device.
Example
The following example shows how the http port number is configured to 100.
ip https server
The ip https server Global Configuration mode command enables the device to be configured
from a secured browser. To disable this function, use the no form of this command.
Syntax
ip https server
no ip https server
Default Configuration
The default for the device is disabled.
Command Mode
Global Configuration mode
User Guidelines
• You must use the crypto certificate generate command to generate the HTTPS certificate.
Example
The following example enables the device to be configured from a browser.
ip https port
The ip https port Global Configuration mode command configures a TCP port for use by a secure
web browser to configure the device. To use the default port, use the no form of this command.
Syntax
ip https port port-number
no ip https port
• port-number—Port number for use by the HTTP server. (Range: 0 - 65535)
Command Mode
Global Configuration mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example configures the https port number to 100.
Syntax
crypto certificate [number] generate [key-generate [length]] [passphrase string] [cn common-
name] [ou organization-unit] [o organization] [l location] [st state] [c country] [duration
days]
• number —Specifies the certificate number. If unspecified, defaults to 1. (Range: 1 - 2)
• key-generate—Regenerate SSL RSA key.
• length—Specifies the SSL RSA key length. If unspecified, length defaults to 1024.
(Range: 512 - 2048)
• passphrase string—Passphrase that is used for exporting the certificate in PKCS12 file
format. If unspecified the certificate is not exportable. (Range: 8 - 96)
• cn common- name—Specifies the fully qualified URL or IP address of the device. If
unspecified, defaults to the lowest IP address of the device (where the certificate is
generated). (Range: 1 - 64)
• ou organization-unit—Specifies the organization-unit or department name.(Range: 1 -
64)
• o organization—Specifies the organization name. (Range: 1 - 64)
• l location—Specifies the location or city name. (Range: 1 - 64)
• st state—Specifies the state or province name. (Range: 1 - 64)
• c country—Specifies the country name. (Range: 1 - 2)
• duration days—Specifies number of days a certification would be valid. If unspecified
defaults to 365 days. (Range: 30 - 3650)
The Certificate and the SSL RSA key pairs do not exist.
Command Mode
Global Configuration mode
User Guidelines
• The command is not saved in the device configuration; however, the certificate and keys
generated by this command are saved in the private configuration, which is never displayed to
the user or backed up to another device.
• Use this command to generate self-signed certificate for your device.
• When you export an RSA key pair to a PKCS#12 file, the RSA key pair is as secure as the
passphrase. Therefore, keep the passphrase secure.
Example
The following example regenerates a HTTPS certificate.
Syntax
crypto certificate number request common- name [ou organization-unit] [o organization] [l
location] [st state] [c country]
• number—Specifies the certificate number. (Range: 1 - 2)
• common- name—Specifies the fully qualified URL or IP address of the device. (Range: 1-
64)
• ou organization-unit—Specifies the organization-unit or department name. (Range: 1-
64)
• o organization—Specifies the organization name. (Range: 1- 64)
• l location—Specifies the location or city name. (Range: 1- 64)
• st state—Specifies the state or province name. (Range: 1- 64)
• c country— Specifies the country name. (Range: 1- 2)
Default Configuration
There is no default configuration for this command.
User Guidelines
• Use this command to export a certificate request to a Certification Authority. The certificate
request is generated in Base64-encoded X.509 format.
• Before generating a certificate request you must first generate a self-signed certificate using
the crypto certificate generate Global Configuration mode command.
• After receiving the certificate from the Certification Authority, use the crypto certificate
import Global Configuration mode command to import the certificate into the device. This
certificate would replace the self-signed certificate.
Examples
The following example generates and displays a certificate request for HTTPS.
CN= router.gm.com
0= General Motors
C= US
The crypto certificate import Global Configuration mode command imports a certificate signed
by Certification Authority for HTTPS.
Syntax
crypto certificate number import
• number—Specifies the certificate number. (Range: 1 - 2)
Default Configuration
There is no default configuration for this command.
Command Mode
Global configuration mode
User Guidelines
• Use this command to enter an external certificate (signed by Certification Authority) to the
device. To end the session, enter a new line, enter "." (period) and add another new line.
• The imported certificate must be based on a certificate request created by the crypto
certificate request Privileged EXEC mode command.
• If the public key found in the certificate does not match the device's SSL RSA key, the
command will fail.
• This command is not saved in the device configuration; however, the certificate imported by
this command is saved in the private configuration (which is never displayed to the user or
backed up to another device).
ip https certificate
The ip https certificate Global Configuration mode command configures the active certificate for
HTTPS. Use the no form of this command to return to default.
Syntax
ip https certificate number
no ip https certificate
• number—Specifies the certificate number. (Range: 1 - 2)
Default Configuration
Certificate number 1.
User Guidelines
• The crypto certificate generate command should be used in order to generate HTTPS
certificates.
Example
The following example configures the active certificate for HTTPS.
Syntax
crypto certificate number export pkcs12
• number—Specifies the certificate number. (Range: 1 - 2)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
User Guidelines
• The crypto certificate export pkcs12 command creates a PKCS 12 file that contains the
certificate and an RSA key pair.
• The passphrase for the exporting is determined when the key is generated.
• The certificate and key pair is exported in standard PEM-format PKCS12 file. This
format can be converted to and from the binary PFX file used by Windows and Linux by
using the openssl command-line tool. See the OpenSSL user manual (man pkcs12) for
more information.
The crypto certificate import pkcs12 Privileged EXEC mode command, imports the certificate
and the RSA keys within a PKCS12 file.
Syntax
crypto certificate number import pkcs12 passphrase
• number—Specifies the certificate number. (Range: 1 - 2)
• passphrase—Passphrase that is used to encrypt the PKCS12 file for export. (Range: 8 - 96)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
User Guidelines
• The passphrase that was exported by the crypto certificate export pkcs12 command should
be used. Please note that this passphrase would be saved for later exports.
Example
The following example imports the certificate and RSA keys.
The show crypto certificate mycertificate Privileged EXEC mode command allows you to view the
SSL certificates of your device.
Syntax
show crypto certificate mycertificate [number]
• number—Specifies the certificate number. (Range: 1- 2)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the certificate.
Syntax
show ip http
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays the HTTP server configuration.
show ip https
The show ip http Privileged EXEC mode command displays the HTTPS server configuration.
Syntax
show ip https
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Certificate 1 is active
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: DC789788 DC88A988 127897BC BB789788
Certificate 2 is inactive
Issued by: self-signed
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: 1873B936 88DC3411 BC8932EF 782134BA
Syntax
aaa authentication dot1x default method1 [method2...]
no aaa authentication dot1x default
• method1 [method2...]—At least one from the following table:
Keyword Description
Radius Uses the list of all RADIUS servers for
authentication
None Uses no authentication
Default Configuration
The default behavior of the "aaa authentication" for dot1.x is "failed to authenticate". If the
8021.x calls the AAA for authentication services it will receive a fail status.
Command Mode
Global configuration mode
User Guidelines
• The additional methods of authentication are used only if the previous method returns an
error, for example the authentication server is down, and not if the request for authenticate is
denied access. To ensure that the authentication succeeds even if all methods return an error,
specify none as the final method in the command line.
• The radius server must support MD-5 challenge and EAP type frames.
Examples
The following example uses the aaa authentication dot1x default command with no
authentication.
The dot1x system-auto-control Global Configuration mode command enables 802.1x globally. Use
the no form of this command to disable 802.1x globally.
Syntax
dot1x system-auto-control
no dot1x system-auto-control
• This command has no arguments or keywords.
Default Configuration
Disabled
Command Modes
Global configuration mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example enables 802.1x globally.
dot1x port-control
The dot1x port-control Interface Configuration mode command enables manual control of the
authorization state of the port. Use the no form of this command to return to the default setting.
Syntax
dot1x port-control {auto | force-authorized | force-unauthorized}
no dot1x port-control
• auto—Enable 802.1X authentication on the interface and cause the port to transition to
the authorized or unauthorized state based on the 802.1X authentication exchange
between the switch and the client.
• force-authorized—Disable 802.1X authentication on the interface and cause the port to
transition to the authorized state without any authentication exchange required. The
port resends and receives normal traffic without 802.1X-based authentication of the
client.
• force-unauthorized—Deny all access through this interface by forcing the port to
transition to the unauthorized state, ignoring all attempts by the client to authenticate.
The switch cannot provide authentication services to the client through the interface.
Command Mode
Interface configuration (Ethernet)
User Guidelines
• It is recommended to disable spanning tree or to enable spanning-tree PortFast mode on
802.1x edge ports (ports in auto state that are connected to end stations), in order to get
immediately to the forwarding state after successful authentication.
Examples
The following example enables 802.1X authentication on the interface.
dot1x re-authentication
The dot1x re-authentication Interface Configuration mode command enables periodic re-
authentication of the client. Use the no form of this command to return to the default setting.
Syntax
dot1x re-authentication
no dot1x re-authentication
This command has no arguments or keywords.
Default Configuration
Periodic re-authentication is disabled.
Command Mode
Interface configuration (Ethernet)
User Guidelines
• It is recommended to use re-authentication because if re-authentication is not defined, once
a port is authenticated, it will remain in this state until the port is down or a log-off message is
sent by client.
Syntax
dot1x timeout re-authperiod seconds
no dot1x timeout re-authperiod
• seconds— Number of seconds between re-authentication attempts. (Range: 300 -
4294967295)
Default Configuration
3600
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example sets the number of seconds between re-authentication attempts, to 3600.
dot1x re-authenticate
The dot1x re-authenticate Privileged EXEC mode command manually initiates a re-
authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port.
dot1x re-authenticate [ethernet interface]
Default Configuration
This command has no default configuration.
User Guidelines
There are no user guidelines for this command.
Examples
• The following command manually initiates a re-authentication of the 802.1X-enabled port.
Syntax
dot1x timeout quiet-period seconds
no dot1x timeout quiet-period
• seconds—Time in seconds that the switch remains in the quiet state following a failed
authentication exchange with the client. (Range: 0 - 65535 seconds)
Default Configuration
60
Command Mode
Interface configuration (Ethernet)
User Guidelines
• During the quiet period, the switch does not accept or initiate any authentication requests.
• The default value of this command should only be changed to adjust for unusual
circumstances, such as unreliable links or specific behavioral problems with certain clients
and authentication servers.
• If it is necessary to provide a faster response time to the user, a smaller number than the
default should be entered.
The following example sets the number of seconds that the switch remains in the quiet state
following a failed authentication exchange, to 3600.
Syntax
dot1x timeout tx-period seconds
no dot1x timeout tx-period
• seconds— Time in seconds that the switch should wait for a response to an EAP -
request/identity frame from the client before resending the request. (Range: 1 - 65535
seconds)
Default Configuration
30
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• You should change the default value of this command only to adjust for unusual
circumstances, such as unreliable links or specific behavioral problems with certain clients
and authentication servers.
Examples
The following command sets the number of seconds that the switch waits for a response to an EAP
- request/identity frame, to 3600 seconds.
Syntax
dot1x max-req count
no dot1x max-req
• count—Number of times that the switch sends an EAP - request/identity frame before
restarting the authentication process. (Range: 1 - 10)
Default Configuration
2
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• You should change the default value of this command only to adjust for unusual
circumstances, such as unreliable links or specific behavioral problems with certain clients
and authentication servers.
Examples
The following example sets the number of times that the switch sends an EAP - request/identity
frame, to 6 .
Syntax
dot1x timeout supp-timeout seconds
no dot1x timeout supp-timeout
• seconds—Time in seconds that the switch should wait for a response to an EAP-request
frame from the client before resending the request. (Range: 1 - 65535 seconds)
30
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• The default value of this command should be changed only to adjust to unusual
circumstances, such as unreliable links or specific behavioral problems with certain clients
and authentication servers.
Examples
The following example sets the time for the retransmission of an EAP-request frame to the client,
to 3600 seconds.
Syntax
dot1x timeout server-timeout seconds
no dot1x timeout server-timeout
• seconds—Time in seconds that the switch should wait for a response from the
authentication server before resending the request. (Range: 1 - 65535 seconds)
Default Configuration
30
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• There are no user guidelines for this command.
show dot1x
The show dot1x Privileged EXEC mode command displays 802.1X status for the switch or for the
specified interface.
Syntax
show dot1x [ethernet interface]
• interface—The full syntax is: port.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Examples
The following example displays 802.1X status for the switch.
Console# show dot1x
The following table describes the significant fields shown in the display:
Field Description
Interface The interface number.
Admin mode The admin mode of the port. Possible values are: Force-auth, Force-
unauth, Auto
Oper mode The oper mode of the port. Possible values are: Authorized,
Unauthorized.
Reauth Control Reauthentication control.
Reauth Period Reauthentication period.
Username The User-Name representing the identity of the Supplicant.
State The current value of the Authenticator PAE state machine.
Quiet period The number of seconds that the switch remains in the quiet state
following a failed authentication exchange (for example, the client
provided an invalid password).
Tx period The number of seconds that the switch waits for a response to an
Extensible Authentication Protocol (EAP)-request/identity frame from
the client before resending the request.
Syntax
show dot1x users [username username]
• username—Supplicant username (Range: 1- 160 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Example
The following example displays 802.1X users.
The following table describes the significant fields shown in the display:
Field Description
Username The User-Name representing the identity of the Supplicant.
Login Time How long the user is logged in.
Last Authentication Time since last authentication.
Authentication Method The authentication method used to establish the session.
Mac address The supplicant MAC address.
Interface The interface that the user is using.
Syntax
show dot1x statistics ethernet interface
• interface—The full syntax is: port.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
EapolFramesRx: 11
EapolFramesTx: 12
EapolStartFramesRx: 1
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 3
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 6
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 0008.3b79.8787
The following table describes the significant fields shown in the display:
Field Description
EapolFramesRx The number of valid EAPOL frames of any type that have been received
by this Authenticator.
EapolFramesTx The number of EAPOL frames of any type that have been transmitted by
this Authenticator.
EapolStartFramesRx The number of EAPOL Start frames that have been received by this
Authenticator.
EapolLogoffFramesRx The number of EAPOL Logoff frames that have been received by this
Authenticator.
EapolRespIdFramesRx The number of EAP Resp/Id frames that have been received by this
Authenticator.
EapolRespFramesRx The number of valid EAP Response frames (other than Resp/Id frames)
that have been received by this Authenticator.
EapolReqIdFramesTx The number of EAP Req/Id frames that have been transmitted by this
Authenticator.
EapolReqFramesTx The number of EAP Request frames (other than Rq/Id frames) that have
been transmitted by this Authenticator.
InvalidEapolFramesRx The number of EAPOL frames that have been received by this
Authenticator in which the frame type is not recognized.
EapLengthErrorFramesRx The number of EAPOL frames that have been received by this
Authenticator in which the Packet Body Length field is invalid.
LastEapolFrameVersion The protocol version number carried in the most recently received
EAPOL frame.
LastEapolFrameSource The source MAC address carried carried in the most recently received
EAPOL frame.
ADVANCED FEATURES
dot1x auth-not-req
The dot1x auth-not-req VLAN Configuration mode command enables unauthorized users access
to that VLAN. Use the no form of this command to disable the access.
Syntax
dot1x auth-not-req
no dot1x auth-not-req
This command has no arguments or keywords.
Default Configuration
User should be authorized to access the VLAN.
Command Mode
VLAN Configuration mode
User Guidelines
• An access port cannot be a member in an unauthenticated VLAN. The native VLAN of a
trunk port cannot be an unauthenticated VLAN. For a general port, the PVID can be the
Unauthenticated VLAN (although only tagged packets would be accepted in Unauthorized
state.)
Examples
The following example enables unauthorized users access to the VLAN.
Default Configuration
Multiple hosts are disabled. If a port would join a port-channel, the state would be multiple
hosts as long as the port is member in the port-channel.
Multiple-hosts must be enabled if the user wants to disable ingress-filtering on this port.
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• This command enables the attachment of multiple clients to a single 802.1X-enabled port. In
this mode, only one of the attached hosts must be successfully authorized for all hosts to be
granted network access. If the port becomes unauthorized, all attached clients are denied
access to the network.
• For unauthenticated VLANs multiple hosts are always enabled.
Examples
The following command allows multiple hosts (clients) on an 802.1X-authorized port.
dot1x single-host-violation
The dot1x single-host-violation Interface Configuration mode command configures the action to
be taken, when a station whose MAC address is not the supplicant MAC address, attempts to
access the interface. Use the no form of this command to return to default.
Syntax
dot1x single-host-violation {forward | discard | discard-shutdown} [trap seconds]
no port dot1x single-host-violation
Default Configuration
Discard frames with source addresses not the supplicant address. No traps.
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
• The command is relevant when Multiple hosts is disabled and the user has been successfully
authenticated
Examples
The following example uses the forward action to forward frames with source addresses.
Syntax
show dot1x advanced [ethernet interface]
• interface—Ethernet interface
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
• There are no user guidelines for this command.
Port Multiple
Hosts
g1 Disabled
g2 Enabled
Port Multiple
Hosts
g1 Disabled
Single host parameters
Violation action: Discard
Trap: Enabled
Trap frequency: 100
Status: Single-host locked
Violations since last trap: 9