NetApp assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp.
Page 3
States, certain other countries and/or the EU. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. NetApp, Inc. is a licensee of the CompactFlash and CF Logo trademarks. NetApp, Inc. NetCache is certified RealSystem compatible.
Introduction This document describes command-line interface (CLI) commands you use to view and configure the CN1610 software. You can access the CLI by using a direct connection to the serial port or by using Telnet or SSH over a remote network connection.
Page 10
About This Document Provide a complete device management portfolio to the network administrator. Scope FASTPATH software encompasses both hardware and software support. The software is partitioned to run in the following processors: This code runs the networking device management portfolio and controls the overall networking device hardware.
“Common Parameter Values” on page 10 “Slot/Port Naming Convention” on page 12 “Using the no Form of a Command” on page 14 “CN1610 Software Modules” on page 15 “Command Modes” on page 16 “Command Completion and Abbreviation” on page 22 “CLI Error...
] is an optional parameter, so you are not required to enter a value gateway in place of the parameter. The NetApp CN1610 Network Switch CLI Command Reference lists each command by the command name and provides a brief description of the command. Each command reference also contains the following information: Format shows the command keywords and the required and optional parameters.
Command Conventions The parameters for a command might include mandatory values, optional values, or keyword choices. Parameters are order-dependent. The following Parameter Conventions table describes the conventions this document uses to distinguish between value types: Symbol Example Description Indicates an optional [] square brackets [value] parameter.
Common Parameter Values Parameter values might be names (strings) or numbers. To use spaces as part of a name parameter, enclose the name value in double quotes. For example, the expression “System Name with Spaces” forces the system to accept the spaces. Empty strings (““) are not valid user-defined strings.
Page 15
Parameter Description Character strings Use double quotation marks to identify character strings, for example, “System Name with Spaces”. An empty string (“”) is not valid. Chapter 2: Using the Command-Line Interface...
Slot/Port Naming Convention FASTPATH software references physical entities such as cards and ports by using a slot/port naming convention. The FASTPATH software also uses this convention to identify certain logical entities, such as Port-Channel interfaces. The slot number has two uses. In the case of physical ports, it identifies the card containing the ports.
Page 17
Port Type Description CPU ports CPU ports are handled by the driver as one or more physical entities located on physical slots. Note In the CLI, loopback and tunnel interfaces do not use the slot/port format. To specify a loopback interface, use the loopback ID. To specify a tunnel interface, use the tunnel ID.
Using the no Form of a Command keyword is a specific form of an existing command and does not represent a new or distinct command. Almost every configuration command has a form. In general, use the form to reverse the action of a command or reset a value back to the default.
CN1610 Software Modules The CN1610 software consists of flexible modules that can be applied in various combinations to develop advanced Layer 2/3/4+ products. The commands and command modes available on your switch depend on the installed modules. Additionally, for some...
Command Modes The CLI groups commands into modes according to the command function. Each of the command modes supports specific CN1610 software commands. The commands in one mode are not available until you switch to that particular mode, with the exception of the User EXEC mode commands. You can execute the User EXEC mode commands in the Privileged EXEC mode.
Page 21
Command Mode Prompt Mode Description Interface Config Manages the operation (CN1610) (Interface slot/port)# of an interface and provides access to the router interface (CN1610) (Interface configuration Loopback id)# commands. Use this mode to set up (CN1610) (Interface a physical port for a...
Page 22
Command Mode Prompt Mode Description Line Telnet Contains commands to (CN1610) (config- telnet)# configure Telnet login/enable authentication. AAA IAS User Config Allows password (CN1610) (Config- IAS-User)# configuration for a user in the IAS database. Mail Server Config Allows configuration of...
Page 23
Command Mode Prompt Mode Description TACACS Config Contains commands to (CN1610) (Tacacs)# configure properties for the TACACS servers. DHCPv6 Pool Contains the DHCPv6 (CN1610) (Config dhcp6-pool)# Config server IPv6 address pool configuration commands. ARP Access-List Contains commands to (CN1610) (Config-...
Page 24
Command Mode Prompt Mode Description Interface Config From the Global Config To exit to the Global mode, enter: Config mode, enter . To return to the exit slot/port or interface Privileged EXEC interface loopback id mode, enter Ctrl-Z. interface tunnel id interface slot/port(startrange)- slot/port(endrange)
Page 25
Command Mode Prompt Mode Description Class-Map From the Global Config To exit to the Global Config mode, enter Config mode, enter , and specify the . To return to the class-map exit optional keyword Privileged EXEC ipv4 specify the Layer 3 protocol mode, enter Ctrl-Z for this class.
Command Completion and Abbreviation Command completion finishes spelling the command when you type enough letters of a command to uniquely identify the command keyword. Once you have entered enough letters, press the SPACEBAR or TAB key to complete the word. Command abbreviation allows you to execute a command when you have entered enough letters to uniquely identify the command.
CLI Error Messages If you enter a command and the system is unable to execute it, an error message appears. The following table describes the most common CLI error messages: Message Text Description % Invalid input detected at '^' marker. Indicates that you entered an incorrect or unavailable command.
CLI Line-Editing Conventions The following CLI editing conventions table describes the key combinations you can use to edit commands or increase the speed of command entry. You can access this list from the CLI by entering from the User or Privileged EXEC help modes.
Page 29
Key Sequence Description List available commands, keywords, or parameters. Chapter 2: Using the Command-Line Interface...
Select DHCP, BootP, or None as the network config protocol. If the help output shows a parameter in angle brackets, you must replace the parameter with a value: (CN1610)#network parms ? <ipaddr> Enter the IP address. If there are no additional command keywords or parameters, or if additional parameters are optional, the following message appears in the output: <cr>...
Page 31
You can also enter a question mark (?) after typing one or more characters of a word to list the available command or parameters that begin with the letters, as shown in the following example: (CN1610) #show m? mac-addr-table mac-address-table...
Accessing the CLI You can access the CLI by using a direct console connection or by using a Telnet or SSH connection from a remote management host. For the initial connection, you must use a direct connection to the console port. You cannot access the system remotely until the system has an IP address, subnet mask, and default gateway.
Management Commands About this chapter This chapter describes the management commands available with the CN1610 CLI. Topics in this This chapter includes the following sections: chapter “Access Commands” on page 30 “Configuration Scripting Commands” on page 32 “Console Port Access Commands”...
Access Commands Introduction Use the commands in this section to close remote connections or to view information about connections to the system. disconnect This command closes HTTP, HTTPS, Telnet, or SSH sessions. Use all to close all active sessions, or use to specify the session ID to close.
Page 35
This command displays the complete user names of the users currently logged in long to the switch. Format show loginsession long Mode Privileged EXEC Example: The following shows an example of the command: (CN1610) #show loginsession long User Name ------------ admin test1111test1111test1111test1111test1111test1111test1111test1111 Chapter 3: Management Commands...
Configuration Scripting Commands Introduction Configuration scripting allows you to generate text-formatted script files representing the current configuration of a system. You can upload these configuration script files to a PC or UNIX system and edit them. Then, you can download the edited files to the system and apply the new configuration. You can apply configuration scripts to one or more switches with no or minor modifications.
Page 37
Note To specify a blank password for a user in the configuration script, you must specify it as a space within quotes. For example, to change the password for user jane from a blank password to hello, the script entry is as follows: users passwd jane "...
Page 38
Output Description The size of the script, in bytes. Size Example: The following shows sample output from this command: (CN1610) #script list Configuration Script Name Size(Bytes) --------------------------- ------------ runconfig-17Jan.scr 2586 1 configuration script(s) found. 2045 Kbytes free. script show This command displays the contents of a script file, which is called a...
Mode Global Config Parameter Description Console terminal line. console Virtual terminal for remote console access (Telnet). telnet Virtual terminal for secured remote console access (SSH). Example: The following example shows a CLI display: (CN1610)(config)#line telnet (CN1610)(config-telnet)# Chapter 3: Management Commands...
Page 40
serial baudrate This command specifies the communication rate of the terminal interface. The supported rates are 1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200. Default 9600 Format serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200} Mode Line Config no serial baudrate...
Page 41
The Parity Type used on the Serial Port. The Parity Parity Type Type is always None. Example: The following shows sample output from this command: (CN1610) >show serial Serial Port Login Timeout (minutes).... 5 Baud Rate (bps)........ 9600 Character Size (bits)......8 Flow Control........
Management Security Commands Introduction This section describes commands you use to generate keys and certificates, which you can do in addition to loading them as before. crypto key generate This command generates a DSA key pair for SSH. The new key files will overwrite any existing generated or downloaded DSA key files.
Network Interface Commands Introduction This section describes the commands you use to configure a logical interface for management access. To configure the management VLAN, see “network mgmt_vlan” on page 427. enable (Privileged This command gives you access to the Privileged EXEC mode. From the EXEC access) Privileged EXEC mode, you can configure the network interface.
Page 44
network parms This command sets the IP address, subnet mask, and gateway of the device. The IP address and the gateway must be on the same subnet. You can specify the none option to clear the IPv4 address and mask and the default gateway (that is, to reset each of these values to 0.0.0.0).
Page 45
network mac-type This command specifies whether the switch uses the burned-in MAC address or the locally-administered MAC address. Default burnedin Format network mac-type {local | burnedin} Mode Privileged EXEC no network mac- This command resets the value of MAC address to its default. type Format no network mac-type...
Page 46
Format show network Mode Privileged EXEC User EXEC Output Description The network interface status; it is always considered Interface Status to be The IP address of the interface. The factory default IP Address value is 0.0.0.0. The IP subnet mask for this interface. The factory Subnet Mask default value is 0.0.0.0.
Page 47
Output Description If desired, a locally administered MAC address can Locally Administered MAC be configured for in-band connectivity. To take Address effect, must be set to MAC Address Type Locally . Enter the address as twelve Administered hexadecimal digits (6 bytes) with a colon between each byte.
Page 48
Example: The following shows example CLI display output for the network port: (CN1610) #show network Interface Status....... Always Up IP Address........10.250.3.1 Subnet Mask........255.255.255.0 Default Gateway........ 10.250.3.3 IPv6 Administrative Mode....... Enabled IPv6 Prefix is ........ fe80::210:18ff:fe82:64c/64 IPv6 Prefix is ........ 2003::1/128 IPv6 Default Router is ......
Pre-login Banner, System Prompt, and Host Name Commands Introduction This section describes the commands you use to configure the pre-login banner and the system prompt. The pre-login banner is the text that displays before you login at the User: prompt copy (pre-login This command includes the option to upload or download the CLI Banner to or banner)
Page 50
hostname This command sets the system hostname. It also changes the prompt. The length may be up to 64 alphanumeric, case-sensitive characters. hostname Format hostname hostname Mode Privileged EXEC Pre-login Banner, System Prompt, and Host Name Commands...
RADIUS Commands Introduction This section describes the commands you use to configure the switch to use a Remote Authentication Dial-In User Service (RADIUS) server on your network for authentication and accounting. authorization This command enables the switch so it can accept VLAN assignment by the network radius RADIUS server.
Page 52
NAS-IP-Address attribute in RADIUS requests. Format no radius server attribute 4 [ipaddr] Mode Global Config Example: The following shows an example of the command: (CN1610)(Config) #radius server attribute 4 192.168.37.60 (CN1610)(Config) #radius server attribute 4 RADIUS Commands...
Page 53
radius server host This command configures the IP address or DNS name to use for communicating with the RADIUS server of a selected server type. While configuring the IP address or DNS name for the authenticating or accounting servers, you can also configure the port number and server name.
Page 54
Global Config Example: The following shows an example of the command: (CN1610)(Config) #radius server host acct 192.168.37.60 (CN1610)(Config) #radius server host acct 192.168.37.60 port 1813 (CN1610)(Config) #radius server host auth 192.168.37.60 name Network1_RS port 1813 (CN1610)(Config) #radius server host acct 192.168.37.60 name Network2_RS (CN1610)(Config) #no radius server host acct 192.168.37.60...
Page 55
Text-based configuration supports the RADIUS server’s secrets in encrypted and nonencrypted format. When you save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter the key along with the encrypted keyword. In the show running config command’s display, these secret keys are displayed in encrypted format.
Page 56
no radius server version of this command disables the message authenticator attribute to be msgauth used for the specified RADIUS Authenticating server. Format no radius server msgauth ipaddr|dnsname Mode Global Config radius server This command specifies a configured server that should be the primary server in primary the group of servers that have the same server name.
Page 57
Mode Global Config Parameter Description The maximum number of transmission attempts in the range retries of 1 to 15. no radius server version of this command sets the value of this global parameter to the retransmit default value. Format no radius server retransmit Mode Global Config radius server...
Page 58
Mode Global Config show radius This command displays the values configured for the global parameters of the RADIUS client. Format show radius Mode Privileged EXEC Output Description The number of RADIUS Authentication servers that Number of Configured have been configured. Authentication Servers The number of RADIUS Accounting servers that...
Page 59
NAS-IP-Address attribute of RADIUS requests. Example: The following shows example CLI display output for the command: (CN1610) #show radius Number of Configured Authentication Servers..32 Number of Configured Accounting Servers..... 32 Number of Named Authentication Server Groups..15 Number of Named Accounting Server Groups....
Page 60
A global parameter that specifies the IP address to be RADIUS Attribute 4 Value used in the NAS-IP-Address attribute of RADIUS requests. Example: The following shows example CLI display output for the command: (CN1610)#show radius servers Current Host Address Server Name Port Type ------- ---------------- ---------------------- ----- ---------- 192.168.37.200...
Page 61
Network2_RADIUS_Server Primary 192.168.37.202 Network3_RADIUS_Server Secondary 192.168.37.203 Network4_RADIUS_Server Primary (CN1610)#show radius servers name Default_RADIUS_Server Server Name......Default_RADIUS_Server Host Address......192.168.37.58 Secret Configured...... No Message Authenticator ....Enable Number of Retransmits....4 Time Duration......10 RADIUS Accounting Mode....Disable RADIUS Attribute 4 Mode....Enable RADIUS Attribute 4 Value ....
Page 62
(CN1610)#show radius accounting name Host Address Server Name Port Secret Configured -------------- ---------------------- ----- ----------- 192.168.37.200 Network1_RADIUS_Server 1813 192.168.37.201 Network2_RADIUS_Server 1813 192.168.37.202 Network3_RADIUS_Server 1813 192.168.37.203 Network4_RADIUS_Server 1813 (CN1610)#show radius accounting name Default_RADIUS_Server Server Name......Default_RADIUS_Server Host Address......192.168.37.200 RADIUS Commands...
Page 63
RADIUS Accounting Mode....Disable Port ........1813 Secret Configured ..... Yes show radius This command displays a summary of statistics for the configured RADIUS accounting accounting servers. statistics Format show radius accounting statistics {ipaddr|dnsname | name servername} Mode Privileged EXEC Output Description The IP address of the server.
Page 64
Packets Dropped server on the accounting port and dropped for some other reason. Example: The following shows example CLI display output for the command: (CN1610)#show radius accounting statistics 192.168.37.200 RADIUS Accounting Server Name....Default_RADIUS_Server Host Address........192.168.37.200 Round Trip Time....... 0.00 Requests........
Page 66
Output Description The number of RADIUS Access-Accept packets, Access Accepts including both valid and invalid packets, that were received from this server. The number of RADIUS Access-Reject packets, Access Rejects including both valid and invalid packets, that were received from this server. The number of RADIUS Access-Challenge packets, Access Challenges including both valid and invalid packets, that were...
Page 67
Malformed Access Responses....0 Bad Authenticators......0 Pending Requests......0 Timeouts........0 Unknown Types......... 0 Packets Dropped....... 0 (CN1610)#show radius statistics name Default_RADIUS_Server RADIUS Server Name......Default_RADIUS_Server Server Host Address......192.168.37.200 Access Requests....... 0.00 Access Retransmissions......0 Access Accepts........ 0 Access Rejects........
Secure Shell Commands Introduction This section describes the commands you use to configure Secure Shell (SSH) access to the switch. Use SSH to access the switch from a remote management host. Note The system allows a maximum of five SSH sessions. ip ssh This command enables SSH access to the system.
Page 69
Mode Privileged EXEC no ip ssh server This command disables the IP secure shell server. enable Format no ip ssh server enable Mode Privileged EXEC sshcon This command specifies the maximum number of SSH connection sessions that maxsessions can be established. A value of 0 indicates that no SSH connection can be established.
Page 70
no sshcon timeout This command sets the SSH connection session timeout value, in minutes, to the default. Changing the timeout value for active sessions does not become effective until the session is reaccessed. Also, any keystroke activates the new timeout duration. Format no sshcon timeout Mode...
SNMP Commands Introduction This section describes the commands you use to configure Simple Network Management Protocol (SNMP) on the switch. You can configure the switch to act as an SNMP agent so that it can communicate with SNMP managers on your network.
Page 72
no snmp-server This command removes this community name from the table. The is the name community community name to be deleted. Format no snmp-server community name Mode Global Config snmp-server This command sets a client IP address for an SNMP community. The address is community ipaddr the associated community SNMP packet sending address.
Page 73
Format snmp-server community ipmask ipmask name Mode Global Config no snmp-server This command sets a client IP mask for an SNMP community to 0.0.0.0. The name community ipmask is the applicable community name. The community name may be up to 16 alphanumeric characters.
Page 74
snmp-server This command restricts access to switch information. The access mode is read- community ro only (also called public). Format snmp-server community ro name Mode Global Config snmp-server This command restricts access to switch information. The access mode is community rw read/write (also called private).
Page 75
Format snmp-server enable traps Mode Global Config no snmp-server This command disables the Authentication Flag. enable traps Format no snmp-server enable traps Mode Global Config snmp-server enable This command enables Link Up/Down traps for the entire switch. When enabled, traps linkmode link traps are sent only if the Link Trap flag setting associated with the port is enabled.
Page 76
no snmp-server This command disables Multiple User traps. enable traps multiusers Format no snmp-server enable traps multiusers Mode Global Config snmp-server enable This command enables the sending of new root traps and topology change traps stpmode notification traps. Default enabled Format snmp-server enable traps stpmode Mode...
Page 77
[snmpversion snmpversion] Mode Global Config Example: The following shows an example of the CLI command: (CN1610) # snmptrap mytrap ip6addr 3099::2 no snmptrap This command deletes trap receivers for a community. Format no snmptrap name {ipaddr | ip6addr} {ipaddr | ip6addr |...
Page 78
snmptrap ipaddr This command assigns an IP address to a specified community name. The maximum length of is 16 case-sensitive alphanumeric characters. name Note IP addresses in the SNMP trap receiver table must be unique. If you make multiple entries using the same IP address, the first entry is retained and processed.
Page 79
no snmp trap link- This command disables link status traps by interface. status Note This command is valid only when the Link Up/Down Flag is enabled. Format no snmp trap link-status Mode Interface Config snmp trap link- This command enables link status traps for all interfaces. status all Note This command is valid only when the Link Up/Down Flag is enabled.
Page 80
Format show snmpcommunity Mode Privileged EXEC Output Description The community string to which this entry grants SNMP Community Name access. A valid entry is a case-sensitive alphanumeric string of up to 16 characters. Each row of this table must contain a unique community name.
Example: The following shows sample output from this command: (CN1610) #show snmpcommunity SNMP Community Name Client IP Address Client IP Mask Access Mode Status ------------------- ----------------- ----------------- ----------- ------- public 0.0.0.0 0.0.0.0 Read Only Enable private 0.0.0.0 0.0.0.0 Read/Write Enable netapp 0.0.0.0...
Page 82
show trapflags This command displays trap conditions. The command’s display shows all the enabled OSPFv2 and OSPFv3 trapflags. Configure which traps the switch should generate by enabling or disabling the trap condition. If a trap condition is enabled and the condition is detected, the SNMP agent on the switch sends the trap to all enabled trap receivers.
Page 83
. Indicates whether PIM traps are Disable sent. Example: The following shows an example of this command: (CN1610) #show trapflags Authentication Flag......Enable Link Up/Down Flag......Enable Multiple Users Flag......Enable Spanning Tree Flag......Enable ACL Traps........Disable...
TACACS+ Commands Introduction TACACS+ provides access control for networked devices via one or more centralized servers. Similar to RADIUS, this protocol simplifies authentication by making use of a single database that can be shared by many clients on a large network.
Page 85
Text-based configuration supports TACACS server’s secrets in encrypted and nonencrypted format. When you save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter the key along with the encrypted keyword. In the “show running-config”...
Page 86
Use this command in TACACS Configuration mode to specify the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the key used on the TACACS+ daemon. parameter specifies the key name. For an empty string use “ ”. key-string The range is 0 to 128 characters.
Page 87
timeout Use this command in TACACS Configuration mode to specify the timeout value, in seconds. If no timeout value is specified, the global value is used. The timeout parameter has a range of 1 to 30 and is the timeout value in seconds. Format timeout timeout Mode...
Telnet Commands Introduction This section describes the commands you use to configure and view Telnet settings. You can use Telnet to manage the device from a remote management host. ip telnet server This command enables Telnet connections to the system and enables the Telnet enable Server Admin Mode.
Page 89
Mode Privileged EXEC User EXEC transport input This command regulates new Telnet sessions. If enabled, new Telnet sessions can telnet be established until there are no more sessions available. An established session remains active until the session is ended or an abnormal network error ends the session.
Page 90
Format no transport output telnet Mode Line Config session-limit This command specifies the maximum number of simultaneous outbound Telnet sessions. A value of 0 indicates that no outbound Telnet session can be established. Default Format session-limit 0-5 Mode Line Config no session-limit This command sets the maximum number of simultaneous outbound Telnet sessions to the default value.
Page 91
telnetcon This command specifies the maximum number of Telnet connection sessions that maxsessions can be established. A value of 0 indicates that no Telnet connection can be established. The range is 0 to 5. Default Format telnetcon maxsessions 0-5 Mode Privileged EXEC no telnetcon This command sets the maximum number of Telnet connection sessions that can...
Page 92
show telnet This command displays the current outbound Telnet settings. In other words, these settings apply to Telnet connections initiated from the switch to a remote system. show telnet Format Privileged EXEC Mode User EXEC Output Description The number of minutes an outbound Telnet session Outbound Telnet Login Timeout is allowed to remain inactive before being logged...
Page 93
Output Description New Telnet sessions will not be allowed when this field is set Allow New Telnet to no. The factory default value is yes. Sessions Chapter 3: Management Commands...
User Account Commands Introduction This section describes the commands you use to add, manage, and delete system users. FASTPATH software has two default users: admin and guest. The admin user can view and configure system settings, and the guest user can view settings. Note You cannot delete the admin user.
Page 95
. Uses the list of all TACACS+ servers tacacs for authentication. Example: The following shows an example of the command: (CN1610)(config)# aaa authentication login default radius local enable none no aaa This command returns to the default. authentication login...
Page 96
aaa authentication This command sets authentication for accessing higher privilege levels. The enable default enable list is . It is used by console, Telnet, and SSH and only enableList contains the method none The default and optional list names created with the aaa authentication enable command are used with the command.
Page 97
. Uses the list of all TACACS+ servers for tacacs authentication. Example: The following example sets authentication when accessing higher privilege levels: (CN1610)(config)# aaa authentication enable default enable no aaa This command returns to the default configuration. authentication enable Format...
Page 98
Example: The following example specifies the default authentication method when accessing a higher privilege level console: (CN1610)(config)# line console (CN1610)(config-line)# enable authentication default no enable This command returns to the default specified by the enable authentication authentication command.
Page 99
Example: The following example configures user with password xxxyyymmmm and user level 15: (CN1610)(config)# username bob password xxxyyymmmm level 15 Example: The following example configures user with password test and assigns a user level of 1 (read-only). The password strength testPassword will not be validated.
Page 100
username name This command removes an existing user’s password (NULL password). nopassword Format username name nopassword [level level] Mode Global Config Parameter Description The name of the user. The range is 1 to 32 characters name in length. The user level. Level 0 can be assigned by a level 15 level user to another user to suspend that user’s access.
Page 101
no username This command sets the SNMPv3 access privileges for the specified user as snmpv3 for the admin user and for all other users. The readwrite readonly username accessmode value is the user name for which the specified access mode will apply. Format no username snmpv3 accessmode username Mode...
Page 102
username snmpv3 This command specifies the encryption protocol used for the specified user. The encryption valid encryption protocols are none If you select , you can specify the required key on the command line. The encryption key must be 8 to 64 characters long. If you select the protocol but do not provide a key, the user is prompted for the key.
Page 103
show users This command displays the configured user names and their settings. The show command displays truncated user names. Use the users show users long command to display the complete usernames. The command is only show users available for users with Read/Write privileges. The SNMPv3 fields will only be displayed if SNMP is available on the system.
Page 104
This command displays the complete usernames of the configured users on the switch. Format show users long Mode Privileged EXEC Example: The following shows an example of this command: (CN1610)#show users long User Name ------------ admin guest test1111test1111test1111test1111 show users...
Page 105
Password Strength field is displayed only if the Password Strength feature is enabled. Example: The following example displays information about the local user database: (CN1610)#show users accounts UserName Privilege Password Password Lockout Aging Expiry date ------------------- --------- -------- ------------ -------...
Page 106
show users login- This command displays information about the login history of users. history Format show users login-history [long] Mode Privileged EXEC Output Description Name of the user. The name is 1 to 20 characters in length. Username Example: The following example shows user login history output: Login Time Username Protocol...
Page 107
Example: The following example specifies the default authentication method for a console: (CN1610)(config)# line console (CN1610)(config-line)# login authentication default no login This command returns to the default specified by the authentication login authentication command. Format no login authentication Mode Line Configuration password (Line This command specifies a password on a line.
Page 108
Mode User EXEC Example: The following example shows the prompt sequence for executing the password command: (CN1610)>password Enter old password: ******** Enter new password: ******** Confirm new password: ******** enable password This command prompts you to change the Privileged EXEC password. Passwords are a maximum of 64 alphanumeric characters.
Page 109
Parameter Description Encrypted password entered or copied from another switch encrypted configuration. passwords min- This command enforces a minimum password length for local users. The value length also applies to the enable password. The valid range is 8 to 64 characters. Default Format passwords min-length 8–64...
Page 110
passwords aging This command implements aging on passwords for local users. When a user’s password expires, the user will be prompted to change it before logging in again. The valid range is 1 to 365 days. The default is 0, or no aging. Default Format passwords aging 1–365...
Page 111
passwords This command enables the password strength feature. It is used to verify the strength-check strength of a password during configuration. Default disable Format passwords strength-check Mode Global Config no passwords This command enables the password strength checking to the default value. strength-check Format no passwords strength-check...
Page 112
passwords strength This command enforces a minimum number of lowercase letters that a password minimum should contain. The valid range is 0 to 16. The default is 2; 0 means that there is lowercase-letters no restriction on that set of characters. Default Format passwords strength minimum lowercase-letters 0-16...
Page 113
passwords strength This command enforces a minimum number of special characters that a password minimum special- should contain. The valid range is 0 to 16. The default is 2; 0 means that there is characters no restriction on that set of characters. Default Format passwords strength minimum special–characters 0-16...
Page 114
passwords strength This command enforces a minimum number of repeated characters that a minimum repeated- password should contain. An example of repeated characters is .The valid aaaa characters range is 0 to 16. If a password has a repetition of characters more than the configured limit, it fails to configure.
Page 115
passwords strength This command excludes the specified keyword while configuring the password. exclude-keyword The password does not accept the keyword in any form (in between the string, case-insensitive and reverse) as a substring. The user can configure up to a maximum of three keywords.
Page 116
Output Description Number of failed password login attempts before Lockout Attempts lockout. Minimum number of uppercase characters required Minimum Password Uppercase Letters when configuring passwords. Minimum number of lowercase characters required Minimum Password Lowercase Letters when configuring passwords. Minimum number of numeric characters required Minimum Password Numeric Characters when configuring passwords.
Page 117
Output Description Shows whether password strength checking is Password Strength Check enabled. Shows whether the attempt to set a password was Last Password Set Result successful. If the attempt failed, the reason for the failure is included. memory free low- This command configures the CPU Free Memory monitoring threshold.
Page 118
no aaa ias-user This command removes the specified user from the internal user database. username Format no aaa ias-user username user Mode Global Config password (AAA IAS This command specifies a password for a user in the IAS database. User Configuration) Format password password [encrypted] Mode...
Page 119
show aaa ias-users This command displays configured IAS users and their attributes. Passwords configured are not shown in the command output. show Format show aaa ias-users Mode Privileged EXEC Chapter 3: Management Commands...
Utility Commands About this chapter This chapter describes the utility commands available in the CN1610 command line interface (CLI). Topics in this This chapter includes the following sections: chapter “AutoInstall Commands” on page 118 “Cable Test Command” on page 122 “DNS Client...
AutoInstall Commands Introduction The AutoInstall feature enables the automatic update of the image and configuration of the switch. This feature enables touchless or low-touch provisioning to simplify switch configuration and imaging. AutoInstall includes the following support: Downloading an image from a TFTP server using DHCP option 125. The image update can result in a downgrade or upgrade of the firmware on the switch.
Page 123
Default stopped Format boot autoinstall {start | stop} Mode Privileged EXEC boot host This command sets the number of attempts to download a configuration file from retrycount the TFTP server. The valid range is 1 to 3 attempts. The default is 3. Default Format boot host retrycount 1-3...
Page 124
command. If memory copy system:running-config nvram:startup-config the switch reboots and the downloaded configuration has not been saved, the AutoInstall process begins, if the feature is enabled. The default value is disabled Default disabled Format boot host autosave Mode Privileged EXEC no boot host This command automatically disables saving the downloaded configuration on autosave...
This command displays the current status of the AutoInstall process. Format show autoinstall Mode Privileged EXEC Example: The following example shows CLI display output for the command: (CN1610)#show autoinstall AutoInstall Mode....... Stopped AutoInstall Persistent Mode....Disabled AutoSave Mode........Disabled AutoReboot Mode........ Enabled AutoInstall Retry Count......3...
The cable test feature enables you to determine the cable connection status on a selected port. Note The cable test feature is supported only for copper cable. It is not supported for optical fiber cable and NetApp twinax cables. cablestatus This command returns the status of the specified port. Note The shipped configuration and supported molex cables are not supported by this command.
Page 127
Output Description If this feature is supported by the PHY for the Cable Length current link speed, the cable length is displayed as a range between the shortest estimated length and the longest estimated length. Note that if the link is down and a cable is attached to a 10/100 Ethernet adapter, then the cable status may display as Open or Short because some Ethernet adapters leave unused...
DNS Client Commands Introduction These commands are used in the Domain Name System (DNS), an Internet directory service. DNS is how domain names are translated into IP addresses. When enabled, the DNS client provides a hostname lookup service to other components of FASTPATH.
Page 129
Example: The CLI command will configure ip domain name yahoo.com as a default domain name. For an unqualified hostname , a DNS yahoo.com query is made to find the IP address corresponding to xxx.yahoo.com no ip domain name This command removes the default domain name configured using the ip domain name command.
Page 130
no ip name server This command removes a name server. Format no ip name server address1 address2 Mode Global Config ip host This command defines static host name-to-address mapping in the host cache. The parameter is the host name and is the IP address of the host.
Page 131
no ipv6 host This command removes the static host name-to-ipv6 address mapping in the host cache. Format no ipv6 host name Mode Global Config ip domain retry This command specifies the number of times to retry sending Domain Name System (DNS) queries. The parameter indicates the number of times to number retry sending a DNS query to the DNS server.
Page 132
Mode Global Config clear host This command deletes entries from the host name-to-address cache. This command clears the entries from the DNS cache maintained by the software. This command clears both IPv4 and IPv6 entries. Format clear host {name | all} Mode Privileged EXEC Parameter...
Page 133
Amount of time to wait for a response to a DNS query. Retry timeout period Configured name servers. Name servers Example: The following shows example CLI display output for the command: (CN1610)> show hosts Host name......Device Default domain....gm.com Default domain list....yahoo.com, Stanford.edu, rediff.com Domain Name lookup....Enabled Number of retries....
Dual Image Commands Introduction FASTPATH software supports a dual image feature that allows the switch to have two software images in the permanent storage. You can specify which image is the active image to be loaded in subsequent reboots. This feature allows reduced downtime when you upgrade or downgrade the software.
Page 135
Format filedescr {active | backup} text-description Mode Privileged EXEC update bootcode This command updates the bootcode (boot loader) on the switch. The bootcode is read from the active image for subsequent reboots. Format update bootcode Mode Privileged EXEC Chapter 4: Utility Commands...
Email Alerting and Mail Server Commands Introduction Email Alerting is an extension of the logging system. The logging system allows you to configure a set of destinations for log messages. The feature includes email configuration, through which the log messages are sent to a configured SMTP server such that an administrator may receive the log in an email account of the administrator’s choice.
Page 137
This command configures the email address of the sender (the switch). No dashes addr or dots can be included in the hostname in the e-mail addresses. Default switch@NetApp.com Format logging email from-addr from-email-addr Chapter 4: Utility Commands...
Page 138
Mode Global Config no logging email This command removes the configured email source address. from-addr Format no logging email from-addr from-email-addr Mode Global Config logging email This command configures the subject line of the email for the specified type. message-type subject Default For urgent messages:...
Page 139
no logging email This command resets the non-urgent log time to the default value. logtime Format no logging email logtime Mode Global Config logging traps This command sets the severity at which SNMP traps are logged and sent in an email.
Page 140
Output Description The administrative status of the feature: enabled or Email Alert Logging disabled. The email address of the sender (the switch). Email Alert From Address The lowest severity level that is considered urgent. Email Alert Urgent Severity Level Messages of this type are sent immediately. The lowest severity level that is considered non- Email Alert Non Urgent Severity...
Page 141
Output Description The operational status of the email alerting feature. Email Alert Operation Status The number of email messages that have attempted No of Email Failures to be sent but were unsuccessful. The number of email messages that were sent from No of Email Sent the switch since the counter was cleared.
Page 142
security This command sets the email alerting security protocol by enabling the switch to use TLS authentication with the SMTP Server. If the TLS mode is enabled on the switch but the SMTP sever does not support TLS mode, no email is sent to the SMTP server.
Page 143
show mail-server This command displays information about the email alert configuration. config Format show mail-server {ip-address | hostname | all} config Mode Privileged EXEC Output Description The number of SMTP servers configured on the No. of mail servers configured switch. The IPv4/IPv6 address or DNS host name of the Email Alert Mail Server Address...
IP Address Conflict Commands Introduction The commands in this section help troubleshoot IP address conflicts. ip address-conflict- This command triggers the switch to run active address conflict detection by detect run sending gratuitous ARP packets for IPv4 addresses on the switch. Format ip address-conflict-detect run Mode...
Logging Commands Introduction This section describes the commands you use to configure system logging, and to view logs and the logging settings. logging buffered This command enables logging to an in-memory log that keeps up to 128 logs. Default when enabled disabled critical Format...
Page 146
logging cli- This command enables the CLI command logging feature, which enables the command FASTPATH software to log all CLI commands entered on the system. Default enabled Format logging cli-command Mode Global Config no logging cli- This command disables the CLI command logging feature. command Format no logging cli-command...
Page 147
either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0) alert (1), critical (2) error (3) warning , or notice (5) info (6) debug (7) Default port: 514 severitylevel: critical (2) logging host {ipaddr|hostname} addresstype Format [port][severitylevel] Mode...
Page 148
Format no logging port Mode Global Config logging syslog This command enables syslog logging. The portid parameter is an integer with a range of 1 to 65535. Default disabled Format logging syslog [port portid] Mode Global Config no logging syslog This command disables syslog logging.
Page 149
Output Description The minimum severity to log to the console log. Messages Console Logging with an equal or lower numerical severity are logged. Severity Filter Buffered Shows whether buffered logging is enabled. Logging Shows whether syslog logging is enabled. Syslog Logging Number of messages received by the log process.
Page 150
Format show logging hosts Mode Privileged EXEC Output Description (Used for deleting hosts.) Host Index IP address or hostname of the logging host. IP Address / Hostname The minimum severity to log to the specified Severity Level address. The possible values are emergency (0) alert (1) critical (2)
Serviceability Packet Tracing Commands Introduction These commands improve the capability of diagnosing conditions affecting FASTPATH. Attention The output of commands can be long and may adversely affect system debug performance. debug clear This command disables all previously enabled “debug” traces. Default disabled Format...
Page 152
debug dhcp packet This command displays “debug” information about DHCPv4 client activities and traces DHCPv4 packets to and from the local DHCPv4 client. Default disabled Format debug dhcp packet [transmit | receive] Mode Privileged EXEC no debug dhcp This command disables the display of “debug” trace output for DHCPv4 client packet activity.
Page 153
Mode Privileged EXEC no debug This command disables tracing of IGMP Snooping packets. igmpsnooping packet Format no debug igmpsnooping packet Mode Privileged EXEC debug This command enables tracing of IGMP Snooping packets transmitted by the igmpsnooping switch. Snooping should be enabled on the device and the interface in order to packet transmit monitor packets for a particular interface.
Page 154
Output Description The destination multicast IP address in the packet. Dest_IP The type of IGMP packet. can be one of the Type Type following: Membership Query – IGMP Membership Query V1_Membership_Report – IGMP Version 1 Membership Report V2_Membership_Report – IGMP Version 2 Membership Report V3_Membership_Report –...
Page 155
Src_IP: 11.1.1.1 Dest_IP: 225.0.0.5 Type: Membership_Query Group: 225.0.0.5 The following parameters are displayed in the trace message: Output Description A packet received by the device. The interface that the packet went out on. The Intf format used is slot/port (internal interface number). The unit is always shown as 1 for interfaces on a nonstacking device.
Page 156
debug ping packet This command enables tracing of ICMP echo requests and responses. The command traces pings on the network port/ serviceport for switching packages. For routing packages, pings are traced on the routing ports as well. Default disabled Format debug ping packet Mode Privileged EXEC...
Page 157
Mode Privileged EXEC debug sflow packet This command enables sFlow debug packet trace. Default disabled Format debug sflow packet Mode Privileged EXEC no debug sflow This command disables sFlow debug packet trace. packet Format no debug sflow packet Mode Privileged EXEC debug spanning- This command enables tracing of spanning tree BPDUs received and transmitted tree bpdu...
Page 158
Default disabled Format debug spanning-tree bpdu receive Mode Privileged EXEC A sample output of the trace message is shown in the following example: <15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt RX - Intf: 1/0/9(9), Source_Mac: 00:11:88:4e:c2:10 Version: 3, Root Mac: 00:11:88:4e:c2:00, Root Priority: 0x8000 Path Cost: 0 The following parameters are displayed in the trace message: Output...
Page 159
debug spanning- This command enables tracing of spanning tree BPDUs transmitted by the tree bpdu transmit switch. The spanning tree should be enabled on the device and on the interface in order to monitor packets on a particular interface. Default enabled Format debug spanning-tree bpdu transmit...
Page 160
Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#debug arp Arp packet tracing enabled. (CN1610)# show debugging Arp packet tracing enabled. no show debugging Use this command to disable packet tracing configurations. Format no show debugging...
sFlow Commands Introduction ® sFlow is the standard for monitoring high-speed switched and routed networks. sFlow technology is built into network equipment and gives complete visibility into network activity, enabling effective management and control of network resources. sflow receiver This command configures the sFlow collector parameters (owner string, receiver timeout, max datagram size, IP address, and port).
Page 162
Output Description The destination Layer4 UDP port for sFlow datagrams. The range Receiver Port is 1 to 65535. The default is 6343. no sflow receiver This command sets the sFlow collector parameters back to the defaults. Format no sflow receiver indx {ip ip-address | maxdatagram size | owner string timeout interval | port 14-port} Mode Global Config...
Page 163
no sflow sampler This command resets the sFlow sampler instance to the default settings. Format no sflow sampler {rcvr-indx | rate sampling-rate | maxheadersize size} Mode Interface Config sflow poller A data source configured to collect counter samples is called a poller. This command enables a new sFlow poller instance on an interface or range of interfaces for this data source if is valid.
Page 164
Revision: 1.0 The IP address associated with this agent. IP Address Example: The following shows example CLI display output for the command: (CN1610)#show sflow agent sFlow Version........1.3;NetApp Corp;1.0 IP Address........10.131.12.66 show sflow pollers This command displays the sFlow polling instances created on the switch. To indicate a range, use a hyphen (-).
Page 165
The sFlow protocol version to be used while sending samples Datagram Version to sFlow receiver. Example: The following shows example CLI display output for the command: (CN1610)#show sflow receivers 1 Receiver Index......... 1 Owner String........Time out........0 IP Address:........0.0.0.0 Address Type........
Page 166
Output Description The maximum number of bytes that should be copied from Max Header Size a sampled packet to form a flow sample. sFlow Commands...
Simple Network Time Protocol Commands Introduction This section describes the commands you use to automatically configure the system time and date by using Simple Network Time Protocol (SNTP). sntp broadcast This command sets the poll interval for SNTP broadcast clients in seconds as a client poll-interval power of two where can be a value from 6 to 16.
Page 168
Mode Global Config sntp client port This command sets the SNTP client port ID to a value from 1 to 65535. The default value is 0, which means that the SNTP port is not configured by the user. In the default case, the actual client port value used in SNTP packets is assigned by the underlying operating system.
Page 169
sntp unicast client This command will set the poll timeout for SNTP unicast clients, in seconds, to a poll-timeout value from 1 to 30. The default is 5 seconds. Default Format sntp unicast client poll-timeout poll-timeout Mode Global Config no sntp unicast This command will reset the poll timeout for SNTP unicast clients to its default client poll-timeout value.
Page 170
Format sntp multicast client poll-interval poll-interval Mode Global Config no sntp multicast This command resets the poll interval for SNTP multicast clients to its default client poll-interval value. Format no sntp multicast client poll-interval Mode Global Config sntp server This command configures an SNTP server (a maximum of three). The server address can be either an IPv4 address or an IPv6 address.
Page 171
Output Description Time of last clock update. Last Update Time Time of last transmit query (in unicast mode). Last Attempt Time Status of the last SNTP request (in unicast mode) or Last Attempt Status unsolicited message (in broadcast mode). Current number of unsolicited broadcast messages that Broadcast Count have been received and processed by the SNTP client since...
Page 172
show sntp server This command displays SNTP server settings and configured servers. Format show sntp server Mode Privileged EXEC Output Description IP address or hostname of the configured SNTP Server IP Address / Hostname server. Address type of server (IPv4, IPv6, or DNS). Server Type Claimed stratum of the server for the last received Server Stratum...
Page 173
Output Description Last server attempt status for the server. Last Update Status Number of requests to the server. Total Unicast Requests Number of failed requests from server. Failed Unicast Requests Chapter 4: Utility Commands...
System Information and Statistics Commands Introduction This section describes the commands you use to view information about system features, components, and configurations. show arp switch This command displays the contents of the IP stack’s Address Resolution Protocol (ARP) table. The IP stack only learns ARP entries associated with the management interfaces, which are the network or service ports.
Page 175
Output Description The file in which the event originated. File The line number of the event. Line The task ID of the event. Task Id The event code. Code The time this event occurred. Time show hardware This command displays inventory information for the switch. Note command and the command display the same...
Page 176
Output Description Text used to identify the product name of this System Description switch. The machine model as defined by the Vital Product Machine Type Data. The machine model as defined by the Vital Product Machine Model Data The unique box serial number for this switch. Serial Number The field replaceable unit number.
Page 177
Output Description The total number of packets (including broadcast Packets Received Without Error packets and multicast packets) received by the processor. The number of inbound packets that contained errors Packets Received With Error preventing them from being deliverable to a higher- layer protocol.
Page 178
Output Description The total number of packets that higher-level Broadcast Packets Transmitted protocols requested to be transmitted to the broadcast address, including those that were discarded or not sent. The number of outbound packets that could not be Transmit Packet Errors transmitted because of errors.
Page 179
Output Description - The total Packets Total Packets Received (Octets) Received number of octets of data (including those in bad packets) received on the network (excluding framing bits but including Frame Check Sequence (FCS) octets). This object can be used as a reasonable estimate of Ethernet utilization.
Page 180
Output Description - The total Packets Received 128–255 Octets number of packets (including bad packets) received that were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). - The total Packets Received 256–511 Octets number of packets (including bad packets) received that were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS...
Page 181
Output Description - The total Packets Packets RX and TX 256–511 Octets number of packets (including bad packets) received Received and transmitted that were between 256 and 511 octets (con’t) in length inclusive (excluding framing bits but including FCS octets). - The total Packets RX and TX 512–1023 Octets number of packets (including bad packets) received...
Page 182
Output Description - The total Packets Total Packets Received Without Error Received number of packets received that were without errors. Successfully - The number of Unicast Packets Received subnetwork-unicast packets delivered to a higher-layer protocol. - The total number of Multicast Packets Received good packets received that were directed to a multicast address.
Page 183
Output Description - The total number of inbound packets that Packets Total Received with contained errors preventing them from being MAC Errors deliverable to a higher-layer protocol. - The total number of packets Jabbers Received received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-...
Page 184
Output Description - A count of valid frames received which were Received Total Packets Not discarded (in other words, filtered) by the forwarding Forwarded process - The total number of frames Local Traffic Frames dropped in the forwarding process because the destination address was located off of this port.
Page 185
Output Description - The total number of octets of data Packets Total Bytes Transmitted (including those in bad packets) received on the Octets network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval.
Page 186
Output Description - The number of frames that have been Packets Total Transmitted transmitted by this port to its segment. Successfully - The total number of Unicast Packets Transmitted packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
Page 187
Output Description - The sum of single collision frames Transmit Total Discards Discards discarded, multiple collision frames discarded, and excessive frames discarded. - A count of the number Single Collision Frames of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision.
Page 188
Output Description - A count of Protocol 802.3x Pause Frames Transmitted Statistics MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode. - The count of GVRP PDUs GVRP PDUs Received received in the GARP layer.
Page 189
Output Description The elapsed time, in days, hours, minutes, and seconds Time Since Counters Last since the statistics for this port were last cleared. Cleared If you use the keyword, the following information appears: switchport Output Description The total number of octets of data received by the processor Octets Received (excluding framing bits but including FCS octets).
Page 190
Output Description The total number of packets that higher-level protocols Unicast Packets requested be transmitted to a subnetwork-unicast address, Transmitted including those that were discarded or not sent. The total number of packets that higher-level protocols Multicast Packets requested be transmitted to a Multicast address, including Transmitted those that were discarded or not sent.
Page 191
Output Description The elapsed time, in days, hours, minutes, and seconds, Time Since Counters Last since the statistics for this switch were last cleared. Cleared show mac-addr- This command displays the forwarding database entries. These entries are used table by the transparent bridging function to determine how to forward a received frame.
Page 192
Output Description The status of this entry. The meanings of the values Status are: —The value of the corresponding Static instance was added by the system or a user when a static MAC filter was defined. It cannot be relearned. —The value of the corresponding Learned instance was learned by observing the source...
Page 193
This command is available in VxWorks and Linux 2.6 only. Format show process cpu Mode Privileged EXEC Example: The following shows example CLI display output for the command using Linux: (CN1610) #show process cpu Memory Utilization Report status bytes ------ ---------- free 106450944...
Page 194
0.11% 0.12% ----------------------------------------------------------------- Total CPU Utilization 1.55% 1.58% 1.50% Example: The following shows example CLI display output for the command using VxWorks: (CN1610)#show process cpu Memory Utilization Report status bytes ------ ---------- free 192980480 alloc 53409968 Task Utilization Report Task...
Page 195
Note command does not display the User Password, even show running-config if you set one different from the default. The output is displayed in script format, which can be used to configure another switch with the same configuration. If the optional is provided with scriptname a file name extension of .scr, the output is redirected to a script file.
Page 196
Output Description Text used to identify this switch. Switch Description Name used to identify the switch.The factory default is System Name blank. To configure the system name, see “snmp-server” on page 67. Text used to identify the location of the switch. The factory System Location default is blank.
Page 197
Mode Privileged EXEC terminal length This command sets the number of lines of output to be displayed on the screen, that is, pagination, for the show running-config show running-config commands. The terminal length size is either 0 (zero) or a number in the range of 5 to 48.
System Utility and Clear Commands Introduction This section describes the commands you use to help troubleshoot connectivity issues and to restore various configurations to their factory defaults. traceroute This command finds the routes that packets actually take when traveling to their destination through the network on a hop-by-hop basis.
Page 199
The following are examples that use the command: traceroute Example of a successful traceroute (CN1610)# traceroute 10.240.10.115 initTtl 1 maxTtl 4 maxFail 0 interval 1 count 3 port 33434 size 43 Traceroute to 10.240.10.115 ,4 hops max 43 byte packets: 1 10.240.4.1 708 msec...
Page 200
Example of a failure: traceroute (CN1610)# traceroute 10.40.1.1 initTtl 1 maxFail 0 interval 1 count port 33434 size 43 Traceroute to 10.40.1.1 ,30 hops max 43 byte packets: 1 10.240.4.1 19 msec 18 msec 9 msec 2 10.240.1.252 0 msec...
Page 201
clear counters This command clears the statistics for a specified slot/port, for all the ports, or for the entire switch based upon the argument. Format clear counters {slot/port | all} Mode Privileged EXEC clear igmpsnooping This command clears the tables managed by the IGMP Snooping function and attempts to delete these entries from the Multicast Forwarding Database.
Page 202
logout This command closes the current Telnet connection or resets the current serial connection. Note Save the configuration changes before logging out. Format logout Mode Privileged EXEC User EXEC ping This command determines whether another computer is on the network. It provides a synchronous response when initiated from the CLI and Web interfaces.
Page 203
Example of a successful ping (CN1610) #ping 10.254.2.160 count 3 interval 1 size 255 Pinging 10.254.2.160 with 255 bytes of data: Received response for icmp_seq = 0. time = 275268 usec Received response for icmp_seq = 1. time = 274009 usec Received response for icmp_seq = 2.
Page 204
quit This command closes the current Telnet connection or resets the current serial connection. The system asks you whether to save configuration changes before quitting. Format quit Mode Privileged EXEC User EXEC reload This command resets the switch without powering it off. Reset means that all network connections are terminated and the boot code executes.
Page 205
For TFTP, SFTP and SCP, the parameter is the IP address or ipaddr|hostname host name of the server, is the path to the file, and is the filepath filename name of the file you want to upload or download. For SFTP and SCP, the parameter is the username for logging into the remote server via SSH.
Page 206
An example of the CLI command follows: (CN1610)#copy tftp://1.1.1.1/file.scr nvram:script file.scr noval (CN1610)#copy tftp://1.1.1.1/file.scr nvram:script file.scr noval Downloads an SSH key file. For more nvram:sshkey- information, see “Secure Shell Commands” on page 64. Downloads an SSH key file.
Page 207
Source Destination Description Uploads either image to the remote {active | backup} server. Copies the active image to the backup active backup image. Copies the backup image to the active backup active image. environment This command sets the allowed temperature range for normal operations. temprange Format environment temprange min -100-100 max -100-100...
Page 208
Mode Global Config environment trap This command enables the temperature status trap. temperature Format environment trap temperature Mode Global Config show environment This command displays vital environment status data. Format show environment Mode Privileged EXEC slot This command configures a slot in the system. The slot/port is the slot identifier of the slot.
Page 209
Note You can get the by entering the command cardindex show supported cardtype in User EXEC mode. set slot disable This command configures the administrative mode of the slot(s). If you specify ], the command is applied to all slots, otherwise the command is applied to the slot identified by slot/port.
Page 210
no set slot power This command unconfigures the power mode of the slot(s), and prohibits power from being supplied to a card located in the slot. If you specify , the command prohibits power to all slots, otherwise the command prohibits power to the slot identified by slot/port.
Page 211
Enable Enable BCM53716-16FE No Example: The following shows example CLI display output for the show slot command: [slot] (CN1610) #show slot 0 Slot......0 Slot Status....... Full Admin State....... Enable Power State....... Enable Inserted Card: Model Identifier....BCM53716-16FE Card Description....Broadcom BCM53716 - 16 Port 10GB...
Page 212
BCM53716-16FE Example: The following shows example CLI display output for the command when you supply a value for cardindex (CN1610) #show supported cardtype 3 Card Type......0x56820001 Model Identifier....BCM53716-16FE Card Description....Broadcom BCM53716 - 16 Port 10GB Ethernet Line Card...
Switching Commands About this chapter This chapter describes the switching commands available in the CN1610 command line interface (CLI). Topics in this This chapter includes the following sections: chapter “Denial of Service Commands” on page 211 “DHCP Client Commands” on page 222 “DHCP L2 Relay Agent...
Page 214
“Storm-Control Commands” on page 414 “VLAN Commands” on page 427 “Voice VLAN Commands” on page 444 CAUTION The commands in this chapter are in one of three functional groups: Show commands display switch settings, statistics, and other information. Configuration commands configure features and options of the switch. For every configuration command, there is a command that displays the show...
Denial of Service Commands Introduction This section describes the commands you use to configure Denial of Service (DoS) Control. FASTPATH software provides support for classifying and blocking specific types of Denial of Service attacks. You can configure your system to monitor and block these types of attacks: SIP = DIP: Source IP address = Destination IP address.
Page 216
no dos-control all This command disables Denial of Service prevention checks globally. Format no dos-control all Mode Global Config dos-control sipdip This command enables Source IP address = Destination IP address (SIP = DIP) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack.
Page 217
Mode Global Config dos-control tcpfrag This command enables TCP Fragment Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having IP Fragment Offset equal to one (1), the packets will be dropped if the mode is enabled.
Page 218
dos-control l4port This command enables L4 Port Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having Source TCP/UDP Port Number equal to Destination TCP/UDP Port Number, the packets will be dropped if the mode is enabled. Note Some applications mirror source and destination L4 ports –...
Page 219
dos-control This command enables Source MAC address = Destination MAC address smacdmac (SMAC = DMAC) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with SMAC = DMAC, the packets will be dropped if the mode is enabled.
Page 220
Default disabled Format dos-control udpport Mode Global Config no dos-control This command disables UDP L4 source = destination port number (Source UDP udpport Port = Destination UDP Port) Denial of Service protection. Format no dos-control udpport Mode Global Config dos-control This command enables TCP Flag and Sequence Denial of Service protections.
Page 221
Mode Global Config no dos-control This command disables TCP Offset Denial of Service protection. tcpoffset Format no dos-control tcpoffset Mode Global Config dos-control tcpsyn This command enables TCP SYN and L4 source = 0-1023 Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack.
Page 222
Mode Global Config dos-control This command enables TCP FIN and URG and PSH and SEQ = 0 checking tcpfinurgpsh Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP FIN, URG, and PSH all set and TCP Sequence Number set to 0, the packets will be dropped if the mode is enabled.
Page 223
dos-control icmpv6 This command enables Maximum ICMPv6 Packet Size Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If ICMPv6 Echo Request (PING) packets ingress having a size greater than the configured value, the packets will be dropped if the mode is enabled.
Page 224
Output Description May be enabled or disabled. The factory default is First Fragment Mode disabled. The factory default is 20. Min TCP Hdr Size <0- 255> May be enabled or disabled. The factory default is ICMP Mode disabled. The range is 0 to 1023. The factory default is 512. Max ICMPv4 Pkt Size The range is 0 to 16384.
Page 225
Output Description The VLAN ID. Enter VLAN IDs in the range of 1 vlan–list to 4093. Use a dash (–) to specify a range. Use a comma (,) to separate non-consecutive IDs in a list. Spaces and zeros are not permitted. Chapter 5: Switching Commands...
DHCP Client Commands Introduction FASTPATH can include vendor and configuration information in DHCP client requests relayed to a DHCP server. This information is included in DHCP Option 60, Vendor Class Identifier. The information is a string of 128 octets. dhcp client vendor- This command enables the inclusion of DHCP Option-60, Vendor Class id-option Identifier included in the requests transmitted to the DHCP server by the DHCP...
Page 227
Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#show dhcp client vendor-id-option DHCP Client Vendor Identifier Option is Enabled DHCP Client Vendor Identifier Option string is FastpathClient. Chapter 5: Switching Commands...
DHCP L2 Relay Agent Commands You can enable the switch to operate as a DHCP Layer 2 relay agent to relay DHCP requests from clients to a Layer 3 relay agent or server. The Circuit ID and Remote ID can be added to DHCP requests relayed from clients to a DHCP server.
Page 229
no dhcp l2relay This command resets the Option 82 Circuit ID for a given service subscription circuit-id identified by on a given interface. The subscription-string subscription- subscription-name is a character string that needs to be matched with a configured DOT1AD string subscription string for correct operation.
Page 230
Format dhcp l2relay remote-id remoteid-string subscription-name subscription-string Mode Interface Config no dhcp l2relay This command resets the Option 82 Remote ID string for a given service remote-id subscription identified by on a given interface. The subscription-string subscription-name is a character string which needs to be matched with a subscription-string configured DOT1AD subscription string for correct operation.
Page 231
dhcp l2relay This command enables relaying DHCP packets on an interface or range of subscription-name interfaces that fall under the specified service subscription. The subscription- is a character string that needs to be matched with configured DOT1AD string subscription string for correct operation. Default (that is, no DHCP packets are relayed) disabled...
Page 232
This command displays the summary of DHCP L2 Relay configuration. Format show dhcp l2relay all Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#show dhcp l2relay all DHCP L2 Relay is Enabled. Interface L2RelayMode TrustMode ----------...
Page 233
This command displays DHCP L2 relay configuration specific to interfaces. interface Format show dhcp l2relay interface {all | interface-num} Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#show dhcp l2relay interface all DHCP L2 Relay is Enabled. Interface L2RelayMode TrustMode ----------...
Format show dhcp l2relay stats interface {all | interface-num} Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#show dhcp l2relay stats interface all DHCP L2 Relay is Enabled. Interface UntrustedServer UntrustedClient TrustedServer...
Page 235
VLAN. Format show dhcp l2relay agent-option vlan vlan-range Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610)#show dhcp l2relay agent-option vlan 5-10 DHCP L2 Relay is Enabled. VLAN Id L2 Relay CircuitId RemoteId...
DHCP Snooping Configuration Commands Introduction This section describes commands you can use to configure DHCP Snooping. ip dhcp snooping This command enables DHCP Snooping globally. Default disabled Format ip dhcp snooping Mode Global Config no ip dhcp This command disables DHCP Snooping globally. snooping Format no ip dhcp snooping...
Page 237
Format ip dhcp snooping verify mac-address Mode Global Config no ip dhcp This command disables verification of the source MAC address with the client snooping verify hardware address. mac-address Format no ip dhcp snooping verify mac-address Mode Global Config ip dhcp snooping This command configures the persistent location of the DHCP Snooping database database.
Page 238
no ip dhcp This command removes the DHCP static entry from the DHCP Snooping snooping binding database. Format no ip dhcp snooping binding mac-address Mode Global Config ip verify binding This command configures static IP source guard (IPSG) entries. Format ip verify binding mac-address vlan vlan id ip address interface interface id Mode...
Page 239
ip dhcp snooping This command controls the logging DHCP messages filtration by the DHCP log-invalid Snooping application. Use this command to configure a single interface or a range of interfaces. Default disabled Format ip dhcp snooping log-invalid Mode Interface Config no ip dhcp This command disables the logging DHCP messages filtration by the DHCP snooping log-...
Page 240
Log Invalid Pkts on the specified interface. Example: The following shows example CLI display output for the command: (CN1610)#show ip dhcp snooping DHCP snooping is Disabled DHCP snooping source MAC verification is enabled DHCP snooping is enabled on the following VLANs:...
Page 241
Binding type; statically configured from the CLI or dynamically Type learned. The remaining lease time for the entry. Lease (sec) Example: The following shows example CLI display output for the command: (CN1610)#show ip dhcp snooping binding Total number of bindings: 2 MAC Address IP Address VLAN Interface...
Page 242
Interface Trust State Rate LimitBurst Interval (pps) (seconds) ----------- ---------- ---------- -------------- 1/g1 1/g2 1/g3 (CN1610)#show ip dhcp snooping interfaces ethernet 1/g15 Interface Trust State Rate LimitBurst Interval (pps) (seconds) ----------- ---------- ---------- -------------- 1/g15 show ip dhcp This command lists statistics for DHCP Snooping security violations on snooping statistics untrusted ports.
Page 243
DHCP Server Represents the number of DHCP server messages received on Msgs Rec’d Untrusted ports. Example: The following shows example CLI display output for the command: (CN1610)#show ip dhcp snooping statistics Interface MAC Verify Client Ifc DHCP Server Failures...
Page 244
MAC Address field is empty. If port security is disabled on the interface, then the MAC Address field displays permit-all The VLAN for the binding rule. VLAN Example: The following shows example CLI display output for the command: (CN1610)#show ip verify source Interface Filter Type IP Address MAC Address Vlan...
Page 245
--------- ----------- --------------- ----------------- ----- ip-mac 210.1.1.3 00:02:B3:06:60:80 ip-mac 210.1.1.4 00:0F:FE:00:13:04 show ip verify This command displays the IPSG filter type for a specific interface. interface Format show ip verify interface slot/port Mode Privileged EXEC User EXEC Output Description Interface address in slot/port format. Interface Is one of two values: Filter Type...
Page 246
DHCP Snooping. VLAN for the entry. VLAN IP address of the interface in slot/port format. Interface Example: The following shows example CLI display output for the command: (CN1610)#show ip source binding MAC Address IP Address Type VLAN Interface ----------------- --------------- ---------- ----- ------------- 00:00:00:00:00:08 1.2.3.4 dhcp-snooping...
Double VLAN Commands Introduction This section describes the commands you can use to configure double VLAN (DVLAN). Double VLAN tagging is a way to pass VLAN traffic from one customer domain to another through a Metro Core in a simple and cost-effective manner.
Page 248
Parameter Description Configure the ethertype as 0x8100. 802.1Q Configure the value of the custom tag in the range from 0 to custom 65535. Represents the commonly used value of 0x88A8. vman no dvlan-tunnel Use the form of this command to disassociate globally defined TPID(s) to an ethertype (Interface interface.
Page 249
no dvlan-tunnel Use the form of this command to set the TPID register to 0. (At initialization, ethertype default– all TPID registers will be set to their default values.) tpid Format no dvlan-tunnel ethertype {802.1Q | vman | custom 0– 65535} [default-tpid] Mode Global Config...
Page 250
no mode dvlan- This command disables double VLAN tunneling on the specified interface. By tunnel default, Double VLAN Tunneling is disabled. Format no mode dvlan-tunnel Mode Interface Config show dot1q-tunnel Use this command without the optional parameters to display all interfaces enabled for double VLAN tunneling.
Page 251
Example: The following shows examples of the CLI display for this command: (CN1610) #show dvlan-tunnel TPIDs Configured....... 0x88a8 Default TPID........0x88a8 Interfaces Enabled for DVLAN Tunneling..None (CN1610)# (CN1610)#show dvlan-tunnel interface 1/0/1 Interface Mode EtherType --------- ------- ------------ 1/0/1 Disable 0x88a8...
Dynamic ARP Inspection Commands Introduction Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. DAI prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting neighbors. The miscreant sends ARP requests or responses mapping another station’s IP address to its own MAC address.
Page 253
Default disabled Format ip arp inspection validate {[src-mac] [dst-mac] [ip]} Mode Global Config no ip arp inspection This command disables the additional validation checks on the received ARP validate packets. Format no ip arp inspection validate {[src-mac] [dst-mac] [ip]} Mode Global Config ip arp inspection This command enables logging of invalid ARP packets on a list of comma-...
Page 254
Mode Interface Config ip arp inspection This command configures the rate limit and burst interval values for an interface limit or range of interfaces. Configuring none for the limit means the interface is not rate limited for Dynamic ARP Inspections. The maximum value shown in the range for the rate option might be more than the hardware allowable limit.
Page 255
Format no ip arp inspection filter acl-name vlan vlan-list [static] Mode Global Config arp access-list This command creates an ARP ACL. Format arp access-list acl-name Mode Global Config no arp access-list This command deletes a configured ARP ACL. Format no arp access-list acl-name Mode Global Config permit ip host mac...
Page 256
ACL Name If the ARP ACL is configured static on the VLAN. Static Flag Example: The following shows example CLI display output for the command: (CN1610)#show ip arp inspection vlan 10-12 Source Mac Validation : Disabled Destination Mac Validation : Disabled...
Page 257
(CN1610)# show ip arp inspection statistics VLAN Forwarded Dropped ---- --------- ------- The following shows example CLI display output for the command: Example: (CN1610)# show ip arp inspection statistics vlan vlan-list VLAN DHCP DHCP Bad Src Bad Dest Invalid Drops Drops...
Page 258
The configured rate limit value in packets per second. Rate Limit The configured burst interval value in seconds. Burst Interval Example: The following shows example CLI display output for the command: (CN1610)#show ip arp inspection interfaces Interface Trust State Rate Limit Burst Interval (pps) (seconds) ---------------...
Page 259
Mode Privileged EXEC User EXEC Example: The following shows example CLI display output for the command: (CN1610)#show arp access-list ARP access list H2 permit ip host 1.1.1.1 mac host 00:01:02:03:04:05 permit ip host 1.1.1.2 mac host 00:03:04:05:06:07 ARP access list H3 ARP access list H4 permit ip host 2.1.1.2 mac host 00:03:04:05:06:08...
802.1X Supplicant Commands Introduction CN1610 supports 802.1X (dot1x) supplicant functionality on point-to-point ports. The administrator can configure the user name and password used in authentication and capabilities of the supplicant port. dot1x pae This command sets the port’s dot1x role. The port can serve as either a supplicant or an authenticator.
Page 261
Parameter Description Sets the authorization state of the port to force-unauthorized Unauthorized, bypassing the authentication process. no dot1x supplicant This command sets the mode to the default, auto. port-control port-control Format no dot1x supplicant port-control Mode Interface Config dot1x supplicant This command configures the number of attempts that the supplicant makes to max-start find the authenticator before the supplicant assumes that there is no authenticator.
Page 262
no dot1x supplicant This command sets the value to the default. start-period timeout start-period Format no dot1x supplicant timeout start-period Mode Interface Config dot1x supplicant This command configures the timer interval to wait for the next held-period timeout held-period authentication on previous authentication fail. Default 30 seconds Format...
Page 263
dot1x supplicant This command maps the given user to the port. user Format dot1x supplicant user Mode Interface Config show dot1x This command displays the dot1x port statistics in detail. statistics Format show dot1x statistics slot/port Mode Privileged EXEC User EXEC Output Description Displays the number of valid EAPOL frames received on...
Page 264
Displays the source MAC Address attached to the most Last EAPOL Frames Source recently received EAPOL frame. Example: The following shows example CLI display output for the command: (CN1610)#show dot1x statistics 0/1 Port........... 0/1 EAPOL Frames Received......0 EAPOL Frames Transmitted....... 0 EAPOL Start Frames Transmitted....3 EAPOL Logoff Frames Received....
GARP Commands Introduction This section describes the commands you use to configure Generic Attribute Registration Protocol (GARP) and view GARP status. These commands affect both GARP VLAN Registration Protocol (GVRP) and GARP Multicast Registration Protocol (GMRP). GARP is a protocol that allows client stations to register with the switch for membership in VLANS (by using GVMP) or multicast groups (by using GVMP).
Page 266
to maintain uninterrupted service. The leave time is 20 to 600 (centiseconds). The value 60 centiseconds is 0.6 seconds. The leave time must be greater than or equal to three times the join time. Default Format set garp timer leave 20-600 Mode Interface Config Global Config...
Page 267
show garp This command displays GARP information. Format show garp Mode Privileged EXEC User EXEC Output Description The administrative mode of GARP Multicast Registration GMRP Admin Mode Protocol (GMRP) for the system. The administrative mode of GARP VLAN Registration Protocol GVRP Admin Mode (GVRP) for the system.
GMRP Commands Introduction This section describes the commands you use to configure and view GARP Multicast Registration Protocol (GMRP) information. Like IGMP snooping, GMRP helps control the flooding of multicast packets.GMRP-enabled switches dynamically register and deregister group membership information with the MAC networking devices attached to the same segment.
Page 269
Format set gmrp interfacemode Mode Interface Config Global Config no set gmrp This command disables GARP Multicast Registration Protocol on a single interfacemode interface or all interfaces. If an interface which has GARP enabled is enabled for routing or is enlisted as a member of a port channel (LAG), GARP functionality is disabled.
Page 270
Output Description The period of time to wait after receiving an unregister request for Leave Timer an attribute before deleting the attribute. Current attributes are a VLAN or multicast group. This may be considered a buffer time for another station to assert registration for the same attribute in order to maintain uninterrupted service.
Page 271
Output Description The type of the entry. Static entries are those that are configured Type by the end user. Dynamic entries are added to the table as a result of a learning process or protocol. The text description of this multicast table entry. Description The list of interfaces that are designated for forwarding (Fwd:) Interfaces...
GVRP Commands Introduction This section describes the commands you use to configure and view GARP VLAN Registration Protocol (GVRP) information. GVRP-enabled switches exchange VLAN configuration information, which allows GVRP to provide dynamic VLAN creation on trunk ports and automatic VLAN pruning. Note If GVRP is disabled, the system does not forward GVRP messages.
Page 273
no set gvrp This command disables GVRP on a single port (Interface Config mode) or all interfacemode ports (Global Config mode). If GVRP is disabled, Join Time, Leave Time, and Leave All Time have no effect. Format no set gvrp interfacemode Mode Interface Config Global Config...
Page 274
Output Description Controls how frequently LeaveAll PDUs are generated. A LeaveAll Timer LeaveAll PDU indicates that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. There is an instance of this timer on a per-port, per- GARP participant basis.
IGMP Snooping Configuration Commands Introduction This section describes the commands you use to configure IGMP snooping. FASTPATH software supports IGMP Versions 1, 2, and 3. The IGMP snooping feature can help conserve bandwidth because it allows the switch to forward IP multicast traffic only to connected hosts that request multicast traffic.
Page 276
Format no set igmp [vlan_id] Mode Global Config Interface Config VLAN Config set igmp This command enables IGMP snooping on all interfaces. If an interface has interfacemode IGMP snooping enabled and you enable this interface for routing or enlist it as a member of a port channel (LAG), IGMP snooping functionality is disabled on that interface.
Page 277
Default disabled Format set igmp fast-leave [vlan_id] Mode Interface Config Interface Range VLAN Config no set igmp fast- This command disables IGMP snooping fast-leave admin mode on a selected leave interface. Format no set igmp fast-leave [vlan_id] Mode Interface Config Interface Range VLAN Config set igmp...
Page 278
Mode Interface Config Global Config VLAN Config set igmp This command sets the IGMP Maximum Response time for the system, on a maxresponse particular interface or VLAN, or on a range of interfaces. The Maximum Response time is the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface.
Page 279
Format set igmp mcrtrexpiretime [vlan_id] 0-3600 Mode Global Config Interface Config VLAN Config no set igmp This command sets the Multicast Router Present Expiration time to 0. The time is mcrtrexpiretime set for the system, on a particular interface or a VLAN. Format no set igmp mcrtrexpiretime [vlan_id] Mode...
Page 280
Format set igmp mrouter interface Mode Interface Config no set igmp mrouter This command disables the status of the interface as a statically configured interface multicast router interface. Format no set igmp mrouter interface Mode Interface Config set igmp router- This command enables Router-Alert validation for IGMP packets.
Page 281
Output Description Indicates whether or not IGMP snooping is active on the Admin Mode switch. The number of multicast control frames that are processed Multicast Control Frame by the CPU. Count The list of interfaces on which IGMP snooping is enabled. Interface Enabled for IGMP Snooping...
Page 282
When you specify a value for , the following information appears. vlan_id Output Description The VLAN ID. VLAN ID Indicates whether IGMP snooping is active on the VLAN. IGMP Snooping Admin Mode Indicates whether IGMP snooping Fast-leave is active on Fast Leave Mode the VLAN.
Page 283
Output Description The list of VLANs of which the interface is a VLAN ID member. show This command displays information about statically configured ports. igmpsnooping mrouter vlan Format show igmpsnooping mrouter vlan slot/port Mode Privileged EXEC Output Description The port on which multicast router information is Interface being displayed.
Page 284
Output Description The text description of this multicast table entry. Description The list of interfaces that are designated for Interfaces forwarding (Fwd:) and filtering (Flt:). IGMP Snooping Configuration Commands...
IGMP Snooping Querier Commands Introduction IGMP snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the “IGMP Querier”. The IGMP query responses, known as IGMP reports, keep the switch updated with the current multicast group membership on a port-by-port basis.
Page 286
no set igmp querier This command disables IGMP snooping querier on the system. Use the optional address parameter to reset the querier address to 0.0.0.0. Format no set igmp querier [vlan-id] [address] Mode Global Config VLAN Mode set igmp querier This command sets the IGMP Querier Query Interval time.
Page 287
Mode Global Config set igmp querier This command sets the IGMP version of the query that the snooping switch is version going to send periodically. Default Format set igmp querier version 1–2 Mode Global Config no set igmp querier This command sets the IGMP Querier version to its default value. version Format no set igmp querier version...
Page 288
Mode VLAN Config show This command displays IGMP snooping querier information. Configured igmpsnooping information is displayed whether or not IGMP snooping querier is enabled. querier Format show igmpsnooping querier [{detail | vlan vlanid}] Mode Privileged EXEC When the optional argument is not used, the command displays the vlanid following information:...
Page 289
Output Description Indicates whether IGMP snooping querier is in VLAN Querier Operational state. When the switch is in Non-Querier Querier State state, it will send out periodic general queries. When in state, it will wait for moving to Non-Querier Querier state and does not send out any queries.
ISDP Commands Introduction This section describes the commands you use to configure the industry standard Discovery Protocol (ISDP). isdp run This command enables ISDP on the switch. Default Enabled Format isdp run Mode Global Config no isdp run This command disables ISDP on the switch. Format no isdp run Mode...
Page 291
isdp advertise-v2 This command enables the sending of ISDP Version 2 packets from the device. Default Enabled Format isdp advertise-v2 Mode Global Config no isdp advertise- This command disables the sending of ISDP Version 2 packets from the device. Format no isdp advertise-v2 Mode Global Config...
Page 292
Mode Privileged EXEC show isdp This command displays global ISDP settings. Format show isdp Mode Privileged EXEC Output Description The frequency with which this device sends ISDP Timer packets. This value is given in seconds. Hold Time The length of time the receiving device should save information sent by this device.
Page 293
show isdp interface This command displays ISDP settings for the specified interface. Format show isdp interface {all | slot/port} Mode Privileged EXEC Output Description ISDP mode enabled/disabled status for the interface(s). Mode show isdp entry This command displays ISDP entries. If the device ID is specified, then only entries for that device are shown.
Page 294
Entry Last Changed Time The software version that the neighbor is running. Version Example: The following shows example CLI display output for the command: (CN1610)#show isdp neighbors detail Device ID 0001f45f1bc0 Address(es): IP Address: 10.27.7.57 Capability Router Trans Bridge Switch IGMP...
Page 295
Output Description Total number of ISDP packets received. ISDP Packets Received Total number of ISDP packets transmitted. ISDP Packets Transmitted Total number of ISDPv1 packets received. ISDPv1 Packets Received Total number of ISDPv1 packets transmitted. ISDPv1 Packets Transmitted Total number of ISDPv2 packets received. ISDPv2 Packets Received Total number of ISDPv2 packets transmitted.
LLDP (802.1AB) Commands Introduction This section describes the commands you use to configure Link Layer Discovery Protocol (LLDP), which is defined in the IEEE 802.1AB specification. LLDP allows stations on an 802 LAN to advertise major capabilities and physical descriptions. The advertisements allow a network management system (NMS) to access and display this information.
Page 297
Format no lldp receive Mode Interface Config lldp timers This command sets the timing parameters for local data transmission on ports enabled for LLDP. The determines the number of seconds to interval-seconds wait between transmitting local data LLDPDUs. The range is 1 to 32768 seconds. is the multiplier on the transmit interval that sets the TTL in hold-value local data LLDPDUs.
Page 298
Mode Interface Config no lldp transmit-tlv This command removes an optional TLV from the LLDPDUs. Use the command without parameters to remove all optional TLVs from the LLDPDU. Format no lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc] Mode Interface Config lldp transmit-mgmt This command includes transmission of the local system management address information in the LLDPDUs.
Page 299
Default disabled Format no lldp notification Mode Interface Config lldp notification– This command configures how frequently the system sends remote data change interval notifications. The parameter is the number of seconds to wait between interval sending notifications. The valid interval range is 5 to 3600 seconds. Default Format lldp notification-interval interval...
Page 300
show lldp This command displays a summary of the current LLDP configuration. Format show lldp Mode Privileged EXEC Output Description How frequently the system transmits local data Transmit Interval LLDPDUs, in seconds. The multiplier on the transmit interval that sets the Transmit Hold Multiplier TTL in local data LLDPDUs.
Page 301
Output Description Shows whether the interface sends optional TLVs in the TLVs LLDPDUs. The TLV codes can be 0 (Port Description), 1 (System Name), 2 (System Description), or 3 (System Capability). Shows whether the interface transmits system management Mgmt address information in the LLDPDUs. show lldp statistics This command displays the current LLDP traffic and remote table statistics for a specified interface or for all interfaces.
Page 302
Output Description Total number of LLDP packets received on the port. Receive Total Total number of LLDP frames discarded on the port for any Discards reason. The number of invalid LLDP frames received on the port. Errors Total number of times a complete remote data entry was Ageouts deleted for the port because the Time to Live interval expired.
Page 303
(CN1610)#show lldp remote-device all LLDP Remote Device Summary Local Interface RemID Chassis ID Port ID System Name ------- ------- -------------------- ------------------ ------ 00:FC:E3:90:01:0F 00:FC:E3:90:01:11 00:FC:E3:90:01:0F 00:FC:E3:90:01:12 00:FC:E3:90:01:0F 00:FC:E3:90:01:13 00:FC:E3:90:01:0F 00:FC:E3:90:01:14 00:FC:E3:90:01:0F 00:FC:E3:90:03:11 00:FC:E3:90:01:0F 00:FC:E3:90:04:11 0/10 0/11 0/12 --More-- or (q)uit show lldp remote–...
Page 304
Time To Live information received in the LLDPDU should be treated as valid information. Example: The following shows example CLI display output for the command: (CN1610)#show lldp remote-device detail 0/7 LLDP Remote Device Detail Local Interface: 0/7 LLDP (802.1AB) Commands...
Page 305
Remote Identifier: 2 Chassis ID Subtype: MAC Address Chassis ID: 00:FC:E3:90:01:0F Port ID Subtype: MAC Address Port ID: 00:FC:E3:90:01:11 System Name: System Description: Port Description: System Capabilities Supported: System Capabilities Enabled: Time to Live: 24 seconds show lldp local– This command displays summary information about the advertised LLDP local device data.
Page 306
Output Description The type of identification used in the Chassis ID field. Chassis ID Subtype The chassis of the local device. Chassis ID The type of port on the local device. Port ID Subtype The port number that transmitted the LLDPDU. Port ID The system name of the local device.
LLDP-MED Commands Introduction Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED) (ANSI-TIA-1057) provides an extension to the LLDP standard. Specifically, LLDP-MED provides extensions for network configuration and policy, device location, Power over Ethernet (PoE) management and inventory management. lldp med This command enables MED on an interface or a range of interfaces.
Page 308
lldp med transmit- This command specifies which optional Type Length Values (TLVs) in the LLDP-MED set will be transmitted in the Link Layer Discovery Protocol Data Units (LLDPDUs) from this interface or a range of interfaces. Default By default, the capabilities and network policy TLVs are included. Format lldp med transmit-tlv [capabilities] [ex-pd] [ex-pse] [inventory] [location] [network-policy]...
Page 309
lldp med faststart- This command sets the value of the fast start repeat count. [ ] is the count repeatcount number of LLDP PDUs that will be transmitted when the product is enabled. The range is 1 to 10. Default Format lldp med faststartrepeatcount [count] Mode...
Page 310
LLDP interfaces. Format show lldp med interface {slot/port | all} Mode Privileged Exec Example: The following shows example CLI display output for the command: (CN1610) #show lldp med interface all Interface Link configMED operMED ConfigNotify TLVsTx ---------...
Page 311
Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610) #show lldp med local-device detail 1/0/8 LLDP-MED Local Device Detail Interface: 1/0/8 Network Policies Media Policy Application Type : voice...
Page 313
Format show lldp med remote-device detail slot/port Mode Privileged EXEC Example: The following shows example CLI display output for the command: (CN1610) #show lldp med remote-device detail 1/0/8 LLDP-MED Remote Device Detail Local Interface: 1/0/8 Remote Identifier: 18 Capabilities MED Capabilities Supported: capabilities, networkpolicy, location,...
Link Local Protocol Filtering Commands Introduction Link Local Protocol Filtering (LLPF) allows the switch to filter out multiple proprietary protocol PDUs, such as Port Aggregation Protocol (PAgP), if the problems occur with proprietary protocols running on standards-based switches. If certain protocol PDUs cause unexpected results, LLPF can be enabled to prevent those protocol PDUs from being processed by the switch.
Page 316
Output Description Shows whether the port blocks SSTP PDUs. Block SSTP Shows whether the port blocks all proprietary PDUs available for Block All the LLDP feature. Link Local Protocol Filtering Commands...
MAC Database Commands Introduction This section describes the commands you use to configure and view information about the Media Access Control (MAC) databases. bridge aging-time This command configures the forwarding database address aging timeout in seconds. The parameter must be within the range of 10 to 1,000,000 seconds seconds.
Page 318
Output Description In an IVL system, this parameter displays the address aging Agetime timeout for the associated forwarding database. show mac-address- This command displays the Multicast Forwarding Database (MFDB) table multicast information. If you enter the command with no parameter, the entire table is displayed.
Page 319
Output Description The total number of entries that can possibly be in the Multicast Total Entries Forwarding Database table. The largest number of entries that have been present in the Most MFDB Entries Multicast Forwarding Database table. This value is also known as Ever Used the MFDB high-water mark.
MLD Snooping Commands Introduction This section describes commands used for MLD snooping. In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded only to those interfaces associated with IP multicast addresses.
Page 321
Format set mld vlanid Mode Global Config Interface Config VLAN Mode set mld This command enables MLD snooping on all interfaces. If an interface has MLD interfacemode snooping enabled and you enable this interface for routing or enlist it as a member of a port channel (LAG), MLD snooping functionality is disabled on that interface.
Page 322
Default disabled Format set mld fast-leave vlanid Mode Interface Config VLAN Mode no set mld fast- This command disables MLD snooping fast-leave admin mode on a selected leave interface. Format no set mld fast-leave vlanid Mode Interface Config VLAN Mode set mld This command sets the MLD Group Membership Interval time on a VLAN, one groupmembership-...
Page 323
set mld This command sets the MLD Maximum Response time for the system, on a maxresponse particular interface or VLAN. The Maximum Response time is the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface.
Page 324
Format no set mld mcrtexpiretime vlanid Mode Global Config Interface Config set mld mrouter This command configures the VLAN ID for the VLAN that has the multicast router attached mode enabled. Format set mld mrouter vlanid Mode Interface Config no set mld mrouter This command disables multicast router attached mode for a VLAN with a particular VLAN ID.
Page 325
Format show mldsnooping [slot/port | vlanid] Mode Privileged EXEC When the optional arguments slot/port or are not used, the command vlanid displays the following information. Output Description Indicates whether or not MLD snooping is active on the switch. Admin Mode Interfaces on which MLD snooping is enabled.
Page 326
When you specify a value for , the following information appears. vlanid Output Description Indicates whether MLD snooping is active on the VLAN. VLAN Admin Mode show mldsnooping This command displays information about statically configured multicast router mrouter interface attached interfaces. Format show mldsnooping mrouter interface slot/port Mode...
Page 327
Mode Privileged EXEC Output Description VLAN ID The VLAN in which the MAC address is learned. A multicast MAC address for which the switch has forwarding or MAC Address filtering information. The format is 6 two-digit hexadecimal numbers that are separated by colons, for example, 01:23:45:67:89:AB.
MLD Snooping Querier Commands Introduction In an IPv6 environment, MLD snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the MLD querier. The MLD query responses, known as MLD reports, keep the switch updated with the current multicast group membership on a port-by-port basis.
Page 329
Mode Global Config VLAN Mode set mld querier This command sets the MLD querier Query Interval time. It is the amount of time query_interval in seconds that the switch waits before sending another general query. Default disabled Format set mld querier query_interval 1-18000 Mode Global Config no set mld querier...
Page 330
address is better (less) than the snooping querier’s address, it stops sending periodic queries. If the snooping querier wins the election, then it will continue sending periodic queries. Default disabled Format set mld querier election participate Mode VLAN Config no set mld querier This command sets the snooping querier not to participate in querier election but election participate go into a non-querier mode as soon as it discovers the presence of another querier...
Page 331
When you specify a value for vlanid, the following information appears: Output Description Indicates whether MLD snooping querier is active on the VLAN Admin Mode VLAN. Indicates whether MLD snooping querier is in “Querier” VLAN Operational or “Non-Querier” state. When the switch is in Querier State state, it will send out periodic general queries.
Port-Based Network Access Control Commands Introduction This section describes the commands you use to configure port-based network access control (IEEE 802.1X). Port-based network access control allows you to permit access to network services only to devices that are authorized and authenticated.
Page 333
clear radius This command clears all of the RADIUS statistics. statistics Format clear radius statistics Mode Privileged EXEC dot1x dynamic-vlan This command enables the switch to create VLANs dynamically when a enable RADIUS-assigned VLAN does not exist in the switch. Default disabled Format...
Page 334
dot1x initialize This command begins the initialization sequence on the specified port. This command is only valid if the control mode for the specified port is auto or MAC- based. If the control mode is not auto or MAC-based, an error will be returned. Format dot1x initialize slot/port Mode...
Page 335
no dot1x max-users This command resets the maximum number of clients allowed per port to its default value. Format no dot1x max-users count Mode Interface Config dot1x port-control This command sets the authentication mode to use on the specified interface or range of interfaces.
Page 336
Default auto Format dot1x port-control all {force-unauthorized | force- authorized | auto | mac-based} Mode Global Config no dot1x port- This command sets the authentication mode on all ports to the default value. control all Format no dot1x port-control all Mode Global Config dot1x re-...
Page 337
Mode Interface Config dot1x system-auth- This command enables the dot1x authentication support on the switch. While control disabled, the dot1x configuration is retained and can be changed, but is not activated. Default disabled Format dot1x system-auth-control Mode Global Config no dot1x system- This command disables the dot1x authentication support on the switch.
Page 338
dot1x timeout This command sets the value, in seconds, of the timer used by the authenticator state machine on an interface or range of interfaces. Default guest-vlan-period: 90 seconds reauth-period: 3600 seconds quiet-period: 60 seconds tx-period: 30 seconds supp-timeout: 30 seconds server-timeout: 30 seconds Format dot1x timeout {{guest-vlan-period seconds} |{reauth-...
Page 339
Tokens Description The value, in seconds, of the timer used by the quiet-period authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant. The must be a quiet-period value in the range 0 to 65535. The value, in seconds, of the timer used by the tx-period authenticator state machine on this port to determine...
Page 340
VLAN database to be operational. By default, the unauthenticated VLAN is 0, that is, invalid and not operational. Default Format dot1x unauthenticated-vlan vlan id Mode Interface Config no dot1x This command resets the unauthenticated VLAN associated with the port to its unauthenticated- default value.
Page 341
Format users defaultlogin listname Mode Global Config users login This command assigns the specified authentication login list to the specified user for system login. The user must be a configured and the must user listname be a configured login list. If the user is assigned a login list that requires remote authentication, all access to the interface from all CLI, web, and Telnet sessions will be blocked until the authentication is complete.
Page 342
This command displays information about the authentication methods. authentication methods Format show authentication methods Mode Privileged EXEC Example: The following example displays the authentication configuration: (CN1610)#show authentication methods Login Authentication Method Lists --------------------------------- defaultList local Enable Authentication Method Lists ---------------------------------- enableList...
Page 343
show dot1x This command shows a summary of the global dot1x configuration, summary information of the dot1x configuration for a specified port or all ports, the detailed dot1x configuration for a specified port, and the dot1x statistics for a specified port, depending on the tokens used. Format show dot1x [{summary {slot/port | all} | detail slot/port | statistics slot/port]...
Page 344
Indicates whether the port is authorized or Port Status unauthorized. Possible values are authorized | unauthorized Example: The following shows example CLI display output for the command: (CN1610)#show dot1x summary 0/1 Operating Interface Control Mode Control Mode Port Status --------- ------------...
Page 345
Output Description Current state of the authenticator PAE state machine. Authenticator PAE State Possible values are Initialize, Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized. When MAC-based authentication is enabled on the port, this parameter is deprecated. Current state of the backend authentication state Backend Authentication machine.
Page 346
Output Description The timer used by the authenticator on this port to Server Timeout timeout the authentication server. The value is expressed in seconds and will be in the range of 1 to 65535. The maximum number of times the authenticator state Maximum Requests machine on this port will retransmit an EAPOL EAP Request/Identity before timing out the supplicant.
Page 347
This value is valid for the port only when the port control mode is not MAC-based. Example: The following shows example CLI display output for the command: (CN1610)#show dot1x detail 0/1 Port........... 0/1 Protocol Version....... 1 PAE Capabilities....... Supplicant Control Mode........
Page 348
Output Description Current state of the authenticator PAE state machine. Authenticator PAE State Possible values are Initialize, Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized. Current state of the backend authentication state Backend Authentication machine. Possible values are Request, Response, State Success, Fail, Timeout, Idle, and Initialize.
Page 349
Output Description The number of EAP response/identity frames that have Response/Id been received by this authenticator. Frames Received EAP Response The number of valid EAP response frames (other than Frames resp/id frames) that have been received by this Received authenticator. The number of EAP request/identity frames that have EAP Request/Id Frames...
Page 350
Output Description Physical port on which the event occurs. Interface The supplicant/client MAC address. MAC-Address The VLAN assigned to the client/port on VLAN Assigned authentication. The type of VLAN ID assigned, which can be Guest VLAN Assigned Reason VLAN, Unauth, Default, RADIUS Assigned, or Montior Mode VLAN ID.
Page 351
Output Description The user name used by the client to authenticate to User Name the server. The supplicant device MAC address. Supplicant MAC Address The time since the supplicant is logged on. Session Time Identifies the Filter ID returned by the RADIUS Filter ID server when the client was authenticated.
Page 352
Mode Privileged EXEC Output Description Users configured locally to have access to the specified Users port. Port-Based Network Access Control Commands...
Port Channel/LAG (802.3ad) Commands Introduction This section describes the commands you use to configure port channels, which are defined in the 802.3ad specification, and that are also known as link aggregation groups (LAGs). Link aggregation allows you to combine multiple full-duplex Ethernet links into a single logical link.
Page 354
Format no port-channel {logical slot/port | all} Mode Global Config addport This command adds one port to the port channel (LAG). The first interface is a logical slot/port number of a configured port channel. You can add a range of ports by specifying the port range when you enter Interface Config mode (for example, interface 1/0/1-1/0/4...
Page 355
lacp admin key This command configures the administrative value of the key for the port channel. The value range of is 0 to 65535. This command can be used to configure a single interface or a range of interfaces. Note This command is applicable only to port channel interfaces.
Page 356
lacp actor admin This command configures the LACP actor admin parameters. Format lacp actor admin Mode Interface Config lacp actor admin This command configures the administrative value of the LACP actor admin key on an interface or range of interfaces. The valid range for is 0 to 65535.
Page 357
no lacp actor admin This command configures the default administrative values of actor state as state transmitted by the actor in LACPDUs. Format no lacp actor admin state {individual|longtimeout|passive} Mode Interface Config lacp actor admin This command sets the LACP actor admin state to individual. state individual Note This command is applicable only to physical interfaces.
Page 358
Note This command is applicable only to physical interfaces. Format no lacp actor admin state longtimeout Mode Interface Config lacp actor admin This command sets the LACP actor admin state to passive. state passive Note This command is applicable only to physical interfaces. Format lacp actor admin state passive Mode...
Page 359
Default 0x80 Format lacp actor port priority 0–255 Mode Interface Config no lacp actor port This command configures the default priority value assigned to the aggregation priority port. Format no lacp actor port priority Mode Interface Config lacp partner admin This command configures the administrative value of the key for the protocol partner.
Page 360
Note This command is applicable only to physical interfaces. Default 0x07 Format lacp partner admin state {individual|longtimeout|passive} Mode Interface Config no lacp partner This command configures the default current administrative value of the actor admin state state for the protocol partner. You can use this command to configure a single interface or a range of interfaces.
Page 361
Note This command is applicable only to physical interfaces. Format lacp partner admin state longtimeout Mode Interface Config no lacp partner This command sets the LACP partner admin state to short timeout. admin state Note longtimeout This command is applicable only to physical interfaces. Format no lacp partner admin state longtimeout Mode...
Page 362
Note This command is applicable only to physical interfaces. Default 0x80 Format lacp partner port-id port-id Mode Interface Config no lacp partner port This command sets the LACP partner port ID to the default. Format no lacp partner port-id Mode Interface Config lacp partner port This command configures the LACP partner port priority.
Page 363
lacp partner This command configures the 6-octet MAC Address value representing the system-id administrative value of the aggregation port’s protocol partner’s system ID. You can use this command to configure a single interface or a range of interfaces. The valid range of is 00:00:00:00:00:00–FF:FF:FF:FF:FF.
Page 364
Mode Interface Config port-channel static This command enables the static mode on a port channel (LAG) interface or range of interfaces. By default the static mode for a new port channel is disabled, which means the port channel is dynamic. However if the maximum number of allowable dynamic port channels are already present in the system, the static mode for a new port channel is enabled, which means the port channel is static.You can only use this command on port channel interfaces.
Page 365
Mode Interface Config port lacpmode all This command enables Link Aggregation Control Protocol (LACP) on all ports. Format port lacpmode all Mode Global Config no port lacpmode This command disables Link Aggregation Control Protocol (LACP) on all ports. Format no port lacpmode all Mode Global Config port lacptimeout...
Page 366
Format port lacptimeout {actor | partner} {long | short} Mode Global Config no port lacptimeout This command sets the timeout for all physical interfaces of a particular device (Global Config) type (actor or partner) back to their default values. Format no port lacptimeout {actor | partner} Mode Global Config...
Page 367
no port-channel This command disables link trap notifications for the port channel (LAG). The linktrap interface is a logical slot and port for a configured port channel. The option sets every configured port channel with the same administrative mode setting. Format no port-channel linktrap {logical slot/port | all} Mode...
Page 368
Parameter Description Destination IP and Destination TCP/UDP Port fields of the packet Source/Destination IP and source/destination TCP/UDP Port fields of the packet Global Config Mode only: The interface is a logical slot/port| all slot/port number of a configured port channel. applies the command to all currently configured port channels.
Page 369
port-channel This command configures port channel system priority. The valid range of system priority is 0 to 65535. priority Default 0x8000 Format port-channel system priority priority Mode Global Config no port-channel This command configures the default port channel system priority value. system priority Format no port-channel system priority...
Page 370
The following output parameters are displayed: Output Description The administrative value of priority associated with System Priority the partner’s system ID. Represents the administrative value of the System-ID aggregation port’s protocol partner’s system ID. The administrative value of the key for the protocol Admin Key partner.
Page 371
Output Description The status designating whether a particular port Type channel (LAG) is statically or dynamically maintained. - The port channel is statically Static maintained. - The port channel is dynamically Dynamic maintained. A listing of the ports that are members of this port Mbr Ports channel (LAG), in slot/port notation.
Page 372
Output Description Shows whether the link is up or down. Link-State Shows whether trap flags are enabled or disabled. Trap Flag Shows whether the port channel is statically or Type dynamically maintained. The members of this port channel. Mbr Ports The ports that are actively participating in the port Active Ports channel.
{slot/port | slot/port(startrange)- slot/port(endrange)} Mode Global Config Example: The following example enters Interface Config mode for port 1/0/1: (CN1610)#configure (CN1610)(config)#interface 1/0/1 (CN1610)(interface 1/0/1)# Example: The following example enters Interface Config mode for ports 1/0/1 through 1/0/4: (CN1610)#configure (CN1610)(config)#interface 1/0/1-1/0/4...
Page 374
Mode Interface Config no auto-negotiate This command disables automatic negotiation on a port. Note Automatic sensing is disabled when automatic negotiation is disabled. Format no auto-negotiate Mode Interface Config auto-negotiate all This command enables automatic negotiation on all ports. Default enabled Format auto-negotiate all...
Page 375
Use the mtu command to set the maximum transmission unit (MTU) size, in bytes, for frames that ingress or egress the interface. You can use the mtu command to configure jumbo frame support for physical and port channel (LAG) interfaces. For the standard FASTPATH implementation, the MTU size is a valid integer between 1522 to 9216 for tagged packets and a valid integer between 1518 to 9216 for untagged packets.
Page 376
Mode Interface Config shutdown all This command disables all ports. Note You can use the command on physical and port channel (LAG) shutdown all interfaces, but not on VLAN routing interfaces. Default enabled Format shutdown all Mode Global Config no shutdown all This command enables all ports.
Page 377
speed all This command lets you set the speed and duplex setting for all interfaces. Format speed all {100 | 10} {half-duplex | full-duplex} Mode Global Config Acceptable Values Description 100h 100BASE-T half duplex 100f 100BASE-T full duplex 10BASE-T half duplex 10BASE-T full duplex show port This command displays port information.
Page 378
Output Description The port control administration state. The port must be Admin Mode enabled in order for it to be allowed into the network. May be enabled or disabled. The factory default is enabled. The desired port speed and duplex mode. If auto- Physical Mode negotiation support is selected, then the duplex mode and speed is set from the auto-negotiation process.
Note Since the current version of CN1610 software only supports one session, if you do not supply optional parameters, the behavior of this command is similar to the behavior of the command.
Page 380
Mode Global Config no monitor This command removes all the source ports and a destination port and restores the default value for mirroring session mode for all the configured sessions. Note This is a standalone command. This command does not have a normal form. Default enabled Format...
Page 381
Output Description Probe port (destination port) for the session identified Probe Port with . If the probe port is not set then this session-id field is blank. The port, which is configured as a mirrored port (source Source Port port) for the session identified with If no session-id source port is configured for the session then this field is...
Port Security Commands Introduction This section describes the commands you use to configure port security on the switch. Port security, which is also known as port MAC locking, allows you to secure the network by locking allowable MAC addresses on a given port. Packets with a matching source MAC address are forwarded normally, and all other packets are discarded.
Page 383
Mode Interface Config no port-security This command resets the maximum number of dynamically locked MAC max-dynamic addresses allowed on a specific port to its default value. Format no port-security max-dynamic Mode Interface Config port-security max- This command sets the maximum number of statically locked MAC addresses static allowed on a port.
Page 384
port-security mac- This command converts dynamically locked MAC addresses to statically locked address move addresses for an interface or range of interfaces. Format port-security mac-address move Mode Interface Config show port-security This command displays the port security settings. If you do not use a parameter, the command displays the settings for the entire system.
Page 385
Mode Privileged EXEC Output Description MAC Address MAC address of statically locked MAC. show port-security This command displays the source MAC address of the last packet discarded on a violation locked port. Format show port-security violation slot/port Mode Privileged EXEC Output Description MAC address of discarded packet on locked port.
Protected Ports Commands Introduction This section describes the commands you use to configure and view protected ports on a switch. Protected ports do not forward traffic to each other, even if they are on the same VLAN. However, protected ports can forward traffic to all unprotected ports in their group.
Page 387
Mode Global Config switchport This command adds an interface to a protected port group. The groupid protected (Interface parameter identifies the set of protected ports to which this interface is assigned. Config) You can only configure an interface as protected in one group. Note Port protection occurs within a single switch.
Page 388
Output Description An optional name of the protected port group. The Name name can be up to 32 alphanumeric characters long, including blanks. The default is blank. List of ports, which are configured as protected for List of Physical Ports the group identified with .
Provisioning (IEEE 802.1p) Commands Introduction This section describes the commands you use to configure provisioning (IEEE 802.1p,) which allows you to prioritize ports. vlan port priority all This command configures the port priority assigned for untagged packets for all ports presently plugged into the device. The range for the priority is 0 to 7. Any subsequent per port configuration will override this configuration setting.
Spanning Tree Protocol Commands Introduction This section describes the commands you use to configure Spanning Tree Protocol (STP). STP helps prevent network loops, duplicate messages, and network instability. Note STP is enabled on the switch and on all ports and LAGs by default. Note If STP is disabled, the system does not forward BPDU messages.
Page 391
no spanning-tree This command sets the command to false. spanning-tree auto-edge auto-edge Format no spanning-tree auto-edge Mode Interface Config spanning-tree This command enables BPDU Filter on an interface or range of interfaces. bpdufilter Default disabled Format spanning-tree bpdufilter Mode Interface Config no spanning-tree This command disables BPDU Filter on an interface or range of interfaces.
Page 392
Default disabled Format spanning-tree bpduflood Mode Interface Config no spanning-tree This command disables BPDU Flood on an interface or range of interfaces. bpduflood Format no spanning-tree bpduflood Mode Interface Config spanning-tree This command enables BPDU Guard on the switch. bpduguard Default disabled Format...
Page 393
spanning-tree This command sets the Configuration Identifier Name for use in identifying the configuration name configuration that this switch is currently using. The is a string of up to 32 name characters. Default base MAC address in hexadecimal notation Format spanning-tree configuration name name Mode Global Config...
Page 394
Format spanning-tree cost 1-200000000 Mode Interface Config spanning-tree cost This command sets the external path cost value automatically on the basis of the auto link speed. Format spanning-tree cost auto Mode Interface Config spanning-tree This command specifies that an interface (or range of interfaces) is an edge port edgeport within the common and internal spanning tree.
Page 395
to specify that the switch transmits MST BPDUs (IEEE 802.1s 802.1s functionality supported). to specify that the switch transmits RST BPDUs rather than 802.1w MST BPDUs (IEEE 802.1w functionality supported). no spanning-tree This command sets the Force Protocol Version parameter to the default value. forceversion Format no spanning-tree forceversion...
Page 396
Mode Interface Config no spanning-tree This command disables loop guard or root guard on the interface. guard Format no spanning-tree guard Mode Interface Config spanning-tree hold- This command sets the Bridge Tx parameter to a new value for the hold-count count common and internal spanning tree.
Page 397
no spanning-tree This command sets the Bridge parameter for the common and internal max-age max-age spanning tree to the default value. Format no spanning-tree max-age Mode Global Config spanning-tree max- This command sets the MSTP parameters to a new value for the max-hops hops common and internal spanning tree.
Page 398
number in the range of 1 to 200000000 or . If you specify auto, the external auto path cost value is set based on Link Speed. If you specify the option, this command sets the priority for this port-priority port within a specific multiple spanning tree instance or the common and internal spanning tree instance, depending on the parameter.
Page 399
Format no spanning-tree mst mstid {cost | external-cost | port-priority} Mode Interface Config spanning-tree mst This command adds a multiple spanning tree instance to the switch. The mstid instance a number within a range of 1 to 4094, which corresponds to the new instance ID to be added.
Page 400
If 0 (defined as the default CIST ID) is passed as the parameter, this mstid command sets the bridge priority parameter for the common and internal spanning tree to the default value. Format no spanning-tree mst priority mstid Mode Global Config spanning-tree mst This command adds an association between a multiple spanning tree instance and vlan...
Page 401
no spanning-tree This command sets the Administrative Switch Port State for this port to disabled. port mode Format no spanning-tree port mode Mode Interface Config spanning-tree port This command sets the Administrative Switch Port State for all ports to enabled. mode all Default enabled...
Page 402
Output Description Specifies the bridge priority for the Common and Bridge Priority Internal Spanning tree (CST). The value lies between 0 and 61440. It is displayed in multiples of 4096. The bridge identifier for the CST. It is made up using the Bridge Identifier bridge priority and the base MAC address of the bridge.
Page 403
Output Description Bridge Identifier of the CST Regional Root. It is made up CST Regional Root using the bridge priority and the base MAC address of the bridge. Path Cost to the CST Regional Root. Regional Root Path Cost List of forwarding database identifiers currently Associated FIDs associated with this instance.
Page 404
Output Description Minimum time between transmission of Configuration Bridge Hold Time Bridge Protocol Data Units (BPDUs). show spanning-tree This command displays the settings and parameters for a specific switch port interface within the common and internal spanning tree. The slot/port is the desired switch port.
Page 405
Output Description Time since port was reset, displayed in days, hours, Port Up Time Since Counters minutes, and seconds. Last Cleared Spanning Tree Protocol Bridge Protocol Data Units sent. STP BPDUs Transmitted Spanning Tree Protocol Bridge Protocol Data Units STP BPDUs Received received.
Page 406
Format show spanning-tree mst port detailed mstid slot/port Mode Privileged EXEC User EXEC Output Description The ID of the existing MST instance. MST Instance ID The port identifier for the specified port within the Port Identifier selected MST instance. It is made up from the port priority and the interface number of the port.
Page 407
Output Description The current loop inconsistent state of this port in this Loop Inconsistent MST instance. When in loop inconsistent state, the port State has failed to receive BPDUs while configured with loop guard enabled. Loop inconsistent state maintains the port in a blocking state until a subsequent BPDU is received.
Page 408
Output Description The cost to get to the root bridge of the CIST across External Port Path Cost the boundary of the region. This means that if the port is a boundary port for an MSTP region, then the external path cost is used. Identifier of the designated root for this port within Designated Root the CST.
Page 409
Output Description The number of times this interface has transitioned Transitions Into Loop Inconsistent into loop inconsistent state. State The number of times this interface has transitioned Transitions Out of Loop Inconsistent out of loop inconsistent state. State show spanning-tree This command displays the settings of one or all ports within the specified mst port summary multiple spanning tree instance.
Page 410
Output Description Indicates whether the port is in loop inconsistent Desc state or not. This field is blank if the loop guard feature is not available. show spanning-tree This command displays settings for the ports within the specified multiple mst port summary spanning tree instance that are active links.
Page 411
Mode Privileged EXEC User EXEC On execution, the following details are displayed: Output Description List of multiple spanning tree IDs currently MST Instance ID List configured. For each MSTID: List of forwarding database identifiers associated with this instance. Associated FIDs List of VLAN IDs associated with this instance.
Page 412
Output Description Identifier used to identify the configuration currently Configuration Revision Level being used. A generated key used in the exchange of the BPDUs. Configuration Digest Key Specifies the version of the configuration format Configuration Format Selector being used in the exchange of BPDUs. The default value is zero.
MAC filters supported is 20. For multicast MAC address filters with destination ports configured, the maximum number of static filters supported is 256. For the NetApp CN1610 switches, you can configure the following combinations: Unicast MAC and source port (max = 20)
Page 414
parameter must identify a valid VLAN. vlanid Format no macfilter macaddr vlanid Mode Global Config macfilter adddest This command adds the interface or range of interfaces to the destination filter set for the MAC filter with the given and VLAN of .
Page 415
no macfilter This command removes all ports from the destination filter set for the MAC filter adddest all with the given and VLAN of . The parameter must be macaddr vlanid macaddr specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. parameter must identify a valid VLAN.
Page 416
parameter must identify a valid VLAN. vlanid Format no macfilter addsrc all macaddr vlanid Mode Global Config show mac-address- This command displays the static MAC filtering information for all static MAC table static filters. If you specify , all the static MAC filters in the system are displayed. If you supply a value for , you must also enter a value for , and the...
Page 417
Output Description A unicast MAC address for which the switch has forwarding and/ MAC Address or filtering information. As the data is gleaned from the MFDB, the address will be a multicast address. The format is six 2-digit hexadecimal numbers that are separated by colons, for example, 01:23:45:67:89:AB.
Storm-Control Commands Introduction This section describes commands you use to configure storm-control and view storm-control configuration information. A traffic storm is a condition that occurs when incoming packets flood the LAN, which creates performance degradation in the network. The Storm-Control feature protects against this condition.
Page 419
storm-control This command enables broadcast storm recovery mode for a specific interface or broadcast range of interfaces. If the mode is enabled, broadcast storm recovery is active and, if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
Page 420
Mode Interface Config storm-control This command configures the broadcast storm recovery threshold for an interface broadcast rate in packets per second. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped.
Page 421
Mode Global Config storm-control This command configures the broadcast storm recovery threshold for all broadcast all level interfaces as a percentage of link speed and enables broadcast storm recovery. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
Page 422
Format no storm-control broadcast all rate Mode Global Config storm-control This command enables multicast storm recovery mode for an interface or range multicast of interfaces. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
Page 423
no storm-control This command sets the multicast storm recovery threshold to the default value for multicast level an interface and disables multicast storm recovery. Format no storm-control multicast level 0-100 Mode Interface Config storm-control This command configures the multicast storm recovery threshold for an interface multicast rate in packets per second.
Page 424
no storm-control This command disables multicast storm recovery mode for all interfaces. multicast all Format no storm-control multicast all Mode Global Config storm-control This command configures the multicast storm recovery threshold for all multicast all level interfaces as a percentage of link speed and enables multicast storm recovery mode.
Page 425
no storm-control This command sets the multicast storm recovery threshold to the default value for multicast all rate all interfaces and disables multicast storm recovery. Format no storm-control multicast all rate Mode Global Config storm-control This command enables unicast storm recovery mode for an interface or range of unicast interfaces.
Page 426
no storm-control This command sets the unicast storm recovery threshold to the default value for unicast level an interface and disables unicast storm recovery. Format no storm-control unicast level Mode Interface Config storm-control This command configures the unicast storm recovery threshold for an interface in unicast rate packets per second.
Page 427
no storm-control This command disables unicast storm recovery mode for all interfaces. unicast all Format no storm-control unicast all Mode Global Config storm-control This command configures the unicast storm recovery threshold for all interfaces unicast all level as a percentage of link speed, and enables unicast storm recovery. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
Page 428
no storm-control This command sets the multicast storm recovery threshold to the default value for unicast all rate an interface and disables multicast storm recovery. Format no storm-control unicast all rate Mode Global Config storm-control This command enables 802.3x flow control for the switch and applies only to flowcontrol full-duplex mode ports.
Page 429
Failure) storm control level. Example: The following shows example CLI display output for the command: (CN1610)#show storm-control 802.3x Flow Control Mode....... Disable Example: The following shows example CLI display output for the command: (CN1610)#show storm-control 1/0/1 Bcast Bcast Mcast Mcast...
Page 430
Example: The following shows an example of part of the CLI display output for the command: (CN1610)#show storm-control all Bcast Bcast Mcast Mcast Ucast Ucast Intf Mode Level Mode Level Mode Level ------ ------- -------- ------- -------- ------- -------- 1/0/1...
VLAN Commands Introduction This section describes the commands you use to configure VLAN settings. vlan database This command gives you access to the VLAN Config mode, which allows you to configure VLAN characteristics. Format vlan database Mode Privileged EXEC network mgmt_vlan This command configures the Management VLAN ID.
Page 432
no vlan This command deletes an existing VLAN. The ID is a valid VLAN identification number (ID 1 is reserved for the default VLAN). The VLAN range is 2 to 4093. Format no vlan 2-4093 Mode VLAN Config vlan acceptframe This command sets the frame acceptance mode on an interface or range of interfaces.
Page 433
no vlan ingressfilter This command disables ingress filtering. If ingress filtering is disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN.
Page 434
Format vlan participation {exclude | include | auto} 1-4093 Mode Interface Config Participation options are: Parameter Description The interface is always a member of this VLAN. This is include equivalent to registration fixed. The interface is never a member of this VLAN. This is exclude equivalent to registration forbidden.
Page 435
Parameter Description The interface is never a member of this VLAN. This is exclude equivalent to registration forbidden. The interface is dynamically registered in this VLAN by auto GVRP and will not participate in this VLAN unless a join request is received on this interface. This is equivalent to registration normal.
Page 436
Mode Global Config vlan port This command enables ingress filtering for all ports. If ingress filtering is ingressfilter all disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN.
Page 437
vlan port tagging all This command configures the tagging behavior for all interfaces in a VLAN to enabled. If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN identification number.
Page 438
Mode Global Config vlan protocol group This command adds the to the protocol-based VLAN identified by protocol add protocol A group may have more than one protocol associated with it. Each groupid. interface and protocol combination can only be associated with one group. If adding a protocol to a group causes any conflicts with interfaces currently associated with the group, this command fails and the protocol is not added to the group.
Page 439
no protocol group This command removes the from this protocol-based VLAN group that is vlanid identified by this groupid Format no protocol group groupid vlanid Mode VLAN Config protocol vlan group This command adds a physical interface or a range of interfaces to the protocol- based VLAN identified by .
Page 440
no protocol vlan This command removes all interfaces from this protocol-based VLAN group that group all is identified by this groupid Format no protocol vlan group all groupid Mode Global Config show port protocol This command displays the Protocol-Based VLAN information for either the entire system, or for the indicated group.
Page 441
Format no vlan pvid Mode Interface Config vlan tagging This command configures the tagging behavior for a specific interface or range of interfaces in a VLAN to enabled. If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN identification number.
Page 442
vlan association This command associates a MAC address to a VLAN. Format vlan association mac macaddr vlanid Mode VLAN database no vlan association This command removes the association of a MAC address to a VLAN. Format no vlan association mac macaddr Mode VLAN database show vlan...
Page 443
Output Description slot/port It is possible to set the parameters for all ports Interface by using the selectors on the top line. The degree of participation of this port in this VLAN. Current The permissible values are: - This port is always a member of this Include VLAN.
Page 444
show vlan internal This command displays a list of all configured VLANs. usage Format show vlan internal usage Mode Privileged EXEC User EXEC Output Description Identifies the base VLAN ID for internal allocation Base VLAN ID of VLANs to the routing interface. Identifies whether the system allocates VLAN IDs Allocation Policy in ascending or descending order.
Page 445
show vlan port This command displays VLAN port information. Format show vlan port {slot/port|all} Mode Privileged EXEC User EXEC Output Description slot/port. It is possible to set the parameters for all Interface ports by using the selectors on the top line. The VLAN ID that this port will assign to untagged Port VLAN ID frames or priority tagged frames received on this...
Page 446
Output Description The 802.1p priority assigned to tagged packets Default Priority arriving on the port. show vlan This command displays the VLAN associated with a specific configured IP- association subnet Address and net mask. If no IP address and net mask are specified, the VLAN associations of all the configured IP-subnets are displayed.
Page 447
Output Description There is a VLAN Identifier (VID) associated with each VLAN ID VLAN. Chapter 5: Switching Commands...
Voice VLAN Commands Introduction This section describes the commands you use for Voice VLAN. Voice VLAN enables switch ports to carry voice traffic with defined priority so as to enable separation of voice and data traffic coming onto the port. The benefits of using Voice VLAN is to ensure that the sound quality of an IP phone could be safeguarded from deteriorating when the data traffic on the port is high.
Page 449
Parameter Description Configure the IP phone to forward all voice traffic through the vlanid specified VLAN. Valid VLAN ID’s are from 1 to 4093 (the maximum supported by the platform). Configure the IP phone to use 802.1p priority tagging for voice dot1p traffic and to use the default native VLAN (VLAN 0) to carry all traffic.
Page 450
When the is specified: interface Output Description The admin mode of the Voice VLAN on the interface. Voice VLAN Mode The Voice VLAN ID. Voice VLAN ID The do1p priority for the Voice VLAN on the port. Voice VLAN Priority The tagging option for the Voice VLAN traffic.
IPv6 Commands Management About this chapter This chapter describes the IPv6 commands available in the CN1610 CLI. Topics in this This chapter includes the following sections: chapter “IPv6 Management Commands” on page 448 CAUTION The commands in this chapter are in one of three functional groups: Show commands display switch settings, statistics, and other information.
IPv6 Management Commands Introduction IPv6 Management commands allow a device to be managed via an IPv6 address in a switch or IPv4 routing (that is, independent from the IPv6 Routing package). For Routing/IPv6 builds of FASTPATH, dual IPv4/IPv6 operation over the service port is enabled.
Page 453
no network ipv6 This command disables IPv6 operation on the network port. enable Format no network ipv6 enable Mode Privileged EXEC serviceport ipv6 Use the options of this command to manually configure IPv6 global address, address enable/disable stateless global address autoconfiguration, and to enable/disable dhcpv6 client protocol information on the service port.
Page 454
Use the command with the option to disable the dhcpv6 client protocol on dhcp the service port. Format no serviceport ipv6 address {address/prefix-length [eui64] | autoconfig | dhcp} Mode Privileged EXEC serviceport ipv6 This command configures IPv6 gateway (for example, default routers) gateway information for the service port.
Page 455
Format network ipv6 address {address/prefix-length [eui64] | autoconfig | dhcp} Mode Privileged EXEC Parameter Description IPv6 prefix in IPv6 global address format. address IPv6 prefix length value. prefix- length Formulate IPv6 address in eui64 format. eui64 autoconfig Configure stateless global address autoconfiguration capability.
Page 456
Mode Privileged EXEC Parameter Description Gateway address in IPv6 global or link-local address gateway- address format. no network ipv6 This command removes IPv6 gateways on the network port interface. gateway Format no network ipv6 gateway Mode Privileged EXEC show network ndp This command displays NDP cache information for the network port.
Page 457
Example: The following shows example CLI display output for the command: (CN1610) #show network ndp Neighbor Age IPv6 Address MAC Address isRtr State Updated --------------------- -------------- ------- -------- ----- 3017::204:76FF:FE73:423A 00:04:76:73:42:3a Reachable 447535 FE80::204:76FF:FE73:423A 00:04:76:73:42:3a Delay 447540 show serviceport This command displays service port configuration information.
Page 458
The burned in MAC address used for in-band Burned In MAC Address connectivity. Example: The following shows example CLI display output for the service port: (CN1610) #show serviceport Interface Status....... Up IP Address........10.230.3.51 Subnet Mask........255.255.255.0 Default Gateway........ 10.230.3.1 IPv6 Administrative Mode.......
Page 459
show serviceport This command displays the neighbor entries cached on the service port. Default enabled Format show serviceport ndp Mode Privileged EXEC User EXEC Output Description The IPv6 address of the neighbor. IPv6 Address MAC Address The MAC address of the neighbor. The state of the neighbor cache entry.
Page 460
with which the switch is connected through the default VLAN (VLAN 1), as long as there is a physical path between the switch and the workstation. The terminal interface sends three pings to the target station. Use the ipv6-address|hostname parameter to ping an interface by using the global IPv6 address of the interface. Use the optional keyword to specify the size of the ping packet.
Page 461
Mode Privileged EXEC User EXEC traceroute ipv6 This command discovers the routes that packets actually take when traveling to their destination through the network on a hop-by-hop basis. The ipv6-address parameter must be a valid IPv6 address. The optional parameter is the UDP port port used as the destination of packets sent as part of the traceroute.
Page 462
Total DHCPv6 Packets network interface. Transmitted Example: The following shows example CLI display output for this command: (CN1610) #show network ipv6 dhcp statistics DHCPv6 Client Statistics ------------------------- DHCPv6 Advertisement Packets Received..0 DHCPv6 Reply Packets Received....0 Received DHCPv6 Advertisement Packets Discard.. 0 Received DHCPv6 Reply Packets Discarded..
Quality of Service Commands About this chapter This chapter describes the Quality of Service (QoS) commands available with the CN1610 CLI. Topics in this This chapter includes the following sections: chapter “Auto-Voice over IP Commands” on page 462 “Class of Service Commands”...
Auto-Voice over IP Commands Introduction This section describes the commands you use to configure Auto-Voice over IP (VoIP) commands. The Auto-VoIP feature explicitly matches VoIP streams in Ethernet switches and provides them with a better class-of-service than ordinary traffic. When you enable the Auto-VoIP feature on an interface, the interface scans incoming traffic for the following call-control protocols: Session Initiation Protocol (SIP) H.323...
Page 467
no auto-voip This command disables VoIP Profile on the interface. Format no auto-voip all Mode Interface Config show auto-voip This command displays the VoIP Profile settings on the interface or interfaces of the switch. Format show auto-voip interface {slot/port | all} Mode Privileged EXEC Output...
Class of Service Commands Introduction This section describes the commands you use to configure and view Class of Service (CoS) settings for the switch. The commands in this section allow you to control the priority and transmission rate of traffic. Note Commands you enter in the Interface Config mode only affect a single interface.
Page 469
Format classofservice ip-dscp-mapping ipdscp trafficclass Mode Global Config no classofservice This command maps each IP DSCP value to its default internal traffic class value. ip-dscp-mapping Format no classofservice ip-dscp-mapping Mode Global Config classofservice trust This command sets the class of service trust mode of an interface or range of interfaces.
Page 470
cos-queue min- This command specifies the minimum transmission bandwidth guarantee for bandwidth each interface queue on an interface, a range of interfaces, or all interfaces. The total number of queues supported per interface is platform specific. A value from 0 to 100 (percentage of link rate) must be specified for each supported queue, with 0 indicating no guaranteed minimum bandwidth.
Page 471
no cos-queue This command disables WRED, which restores the default tail drop operation for random-detect the specified queues on the interface. Format no cos-queue random-detect queue-id-1 [queue-id-2 … queue-id-n] Mode Global Config Interface Config cos-queue strict This command activates the strict priority scheduler mode for each specified queue for an interface queue on an interface, a range of interfaces, or all interfaces.
Page 472
When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config mode, it applies to all interfaces. The Interface Config mode command is only available on platforms that support independent per-port class of service queue configuration. no random-detect This command disables WRED, which restores the default tail drop operation for all queues on the interface.
Page 473
Parameter Description The minimum threshold the queue depth (as a min-thresh percentage) where WRED starts marking and dropping traffic. The maximum threshold is the queue depth (as a max-thresh percentage) above which WRED marks / drops all traffic. The percentage probability that WRED will drop-probability mark/drop a packet, when the queue depth is at the maximum threshold.
Page 474
no traffic-shape This command restores the interface shaping rate to the default value. Format no traffic-shape Mode Global Config Interface Config show This command displays the current Dot1p (802.1p) priority mapping to internal classofservice traffic classes for a specific interface. The slot/port parameter is optional and is dot1p-mapping only valid on platforms that support independent per-port class of service mappings.
Page 475
Output Description The IP Precedence value. IP Precedence The traffic class internal queue identifier to which the IP Traffic Class Precedence value is mapped. show This command displays the current IP DSCP mapping to internal traffic classes classofservice ip- for the global configuration settings. dscp-mapping Format show classofservice ip-dscp-mapping...
Page 476
Output Description The traffic class used for non-IP traffic. This is only Non-IP Traffic Class displayed when the CoS trust mode is set to trust IP Precedence or IP DSCP (on platforms that support IP DSCP). The traffic class used for all untrusted traffic. This is only Untrusted Traffic Class displayed when the CoS trust mode is set to...
Page 477
If you specify the interface, the command also displays the following information: Output Description The slot/port of the interface. If displaying the Interface global configuration, this output line is replaced with a Global Config indication. The maximum transmission bandwidth limit for the Interface Shaping Rate interface as a whole.
Page 478
Output Description The configured percentage probability that WRED WRED Drop Probability will mark/drop a packet, when the queue depth is at the maximum threshold. (The drop probability increases linearly from 0 just before the minimum threshold, to this value at the maximum threshold, then goes to 100% for larger queue depths).
Differentiated Services Commands Introduction This section describes the commands you use to configure QoS Differentiated Services (DiffServ). You configure DiffServ in several stages by specifying three DiffServ components: 1. Class a. Creating and deleting classes b. Defining match criteria for a class 2.
Page 480
The only way to remove an individual match criterion from an existing class definition is to delete the class and re-create it. Note The mark possibilities for policing include CoS, IP DSCP, and IP precedence. While the latter two are only meaningful for IP packet types, CoS marking is allowed for both IP and non-IP packets, since it updates the 802.1p user priority field contained in the VLAN tag of the Layer 2 packet header.
DiffServ Class Commands Introduction Use the DiffServ commands to define traffic classification. To classify class traffic, specify Behavior Aggregate (BA) which is based on DSCP and Multi- Field (MF) classes of traffic (name, match criteria) This set of commands consists of class creation/deletion and matching, with the class match commands specifying Layer 3, Layer 2, and general match criteria.
Page 482
Note The CLI mode is changed to Class-Map Config when this command is successfully executed depending on the keyword specified. [{ipv4 | ipv6}] Format class-map match-all class-map-name [{ipv4 | ipv6}] Mode Global Config no class-map This command eliminates an existing DiffServ class. The is the class-map-name name of an existing DiffServ class.
Page 483
match any This command adds to the specified class definition a match condition whereby all packets are considered to belong to the class. Default none Format match any Mode Class-Map Config match class-map This command adds to the specified class definition the set of match conditions defined for another class.
Page 484
Format no match class-map refclassname Mode Class-Map Config match cos This command adds to the specified class definition a match condition for the Class of Service (CoS) value (the only tag in a single tagged packet or the first or outer 802.1Q tag of a double VLAN tagged packet).
Page 485
match dstip This command adds to the specified class definition a match condition based on the destination IP address of a packet. The parameter specifies an IP ipaddr address. The parameter specifies an IP address bit mask and must consist ipmask of a contiguous set of leading 1 bits.
Page 486
Mode Class-Map Config match ip This command adds to the specified class definition a match condition based on precedence the value of the IP Precedence field in a packet, which is defined as the high- order three bits of the Service Type octet in the IP header (the low-order five bits are not checked).
Page 487
Mode Class-Map Config match protocol This command adds to the specified class definition a match condition based on the value of the IP Protocol field in a packet using a single keyword notation or a numeric value notation. To specify the match condition using a single keyword notation, the value for is one of the supported protocol name keywords.
Page 488
match srcip This command adds to the specified class definition a match condition based on the source IP address of a packet. The parameter specifies an IP address. ipaddr parameter specifies an IP address bit mask and must consist of a ipmask contiguous set of leading 1 bits.
Page 489
Default none Format match vlan 0-4095 Mode Class-Map Config match secondary- This command adds to the specified class definition a match condition based on vlan the value of the Layer 2 secondary VLAN Identifier field (the inner 802.1Q tag of a double VLAN tagged packet).
DiffServ Policy Commands Introduction Use the Diffserv policy commands to specify traffic conditioning actions, such as policing and marking, to apply to traffic classes. Use the policy commands to associate a traffic class that you define by using the class command set with one or more QoS policy attributes. Assign the class/policy association to an interface to form a service.
Page 491
drop This command specifies that all packets for the associated traffic stream are to be dropped at ingress. Format drop Mode Policy-Class-Map Config Incompatibilities Assign Queue, Mark (all forms), Mirror, Police, Redirect mirror This command specifies that all incoming packets for the associated traffic stream are copied to a specific egress interface (physical port or LAG).
Page 492
class This command creates an instance of a class definition within the specified policy for the purpose of defining treatment of the traffic class through subsequent policy attribute statements. The is the name of an existing DiffServ classname class. Note This command causes the specified policy to create a reference to the class definition.
Page 493
Policy-Class-Map Config Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police Example: The following shows an example of this command: (CN1610) (Config-policy-classmap)#mark cos-as-sec-cos mark ip-dscp This command marks all packets for the associated traffic stream with the specified IP DSCP value.
Page 494
Incompatibilities Drop, Mark CoS, Mark IP Precedence, Police Policy Type police-simple This command establishes the traffic policing style for the specified class. The simple form of the command uses a single data rate and burst size, police resulting in two outcomes: conform and violate. The conforming data rate is specified in kilobits-per-second (Kbps) and is an integer from 1 to 4294967295.
Page 495
(CN1610) (Config-policy-classmap)#police-simple 1 128 conform- action transmit violate-action drop police-single-rate This command is the single-rate form of the command and is used to police establish the traffic policing style for the specified class. For each outcome, the only possible actions are...
Page 497
policy-map rename This command changes the name of a DiffServ policy. The is the policyname name of an existing DiffServ class. The parameter is a case- newpolicyname sensitive alphanumeric string from 1 to 31 characters uniquely identifying the policy. Format policy-map rename policy-name newpolicyname Mode Global Config...
DiffServ Service Commands Introduction Use the DiffServ commands to assign a DiffServ traffic conditioning service policy, which you specified by using the commands, to an interface in the policy incoming direction. These commands attach a defined policy to a directional interface. You can assign only one policy at any one time to an interface in the inbound direction.
Page 499
Note This command causes a service to remove its reference to the policy. This command effectively disables DiffServ on an interface in the inbound direction. There is no separate interface administrative command for DiffServ. mode Format no service-policy in policymapname Modes Global Config Interface Config...
DiffServ Show Commands Introduction Use the DiffServ commands to display configuration and status information show for classes, policies, and services. You can display DiffServ information in summary or detailed formats. The status information is only shown when the DiffServ administrative mode is enabled. show class-map This command displays all configuration information for the specified class.
Page 501
Output Description The name of this class. (Note that the order in which classes are Class Name displayed is not necessarily the same order in which they were created.) A class type of means every match criterion defined for the Class Type class is evaluated simultaneously and must all be true to indicate a class match.
Page 502
Output Description Maximum allowed entries (rows) for the Policy Policy Instance Table Instance Table. Current number of entries (rows) in the Policy Policy Attribute Table Size Attribute Table. Maximum allowed entries (rows) for the Policy Policy Attribute Table Attribute Table. The current number of entries (rows) in the Service Table Size Service Table.
Page 503
Output Description The current setting for the action taken on a packet considered to Conform Action conform to the policing parameters. This is not displayed if policing is not in use for the class under this policy. The current setting for the color mode. Policing uses either color Conform Color Mode blind or color aware mode.
Page 504
(physical port or LAG). This can occur in addition to any marking or policing action. It may also be specified along with a QoS queue assignment. This field does not display on CN1610 switches. The current setting for the action taken on a packet considered to...
Page 505
Members Example: The following shows example CLI display output including the mark- option specified in the policy action: cos-as-sec-cos (CN1610) #show policy-map p1 Policy Name........p1 Policy Type........In Class Name........c1 Mark CoS as Secondary CoS...... Yes Example: The following shows example CLI display output including the...
Page 506
Mode Privileged EXEC Output Description The current setting of the DiffServ administrative mode. An DiffServ Admin Mode attached policy is only in effect on an interface while DiffServ is in an enabled mode. slot/port Interface The traffic direction of this interface service, inbound or Direction outbound.
Page 507
Output Description The current operational status of this DiffServ service interface. OperStatus The name of the policy attached to the interface in the indicated Policy Name direction. show policy-map This command displays policy-oriented statistics information for the specified interface interface and direction. The slot/port parameter specifies a valid interface for the system.
Page 508
Format show service-policy [in|out] Mode Privileged EXEC The following information is repeated for each interface and direction (only those interfaces configured with an attached policy are shown): Output Description slot/port Interface The current operational status of this DiffServ service interface. Operational Status The name of the policy attached to the interface.
ACLs, regardless of type. The maximum number of rules per IP ACL is hardware dependent. On CN1610 switches, if you configure a MAC ACL on an interface, you cannot configure an IP ACL on the same interface.
Page 511
, which is the queue identifier [assign- assign-queue queue queue- to which packets matching this rule are assigned. For CN1610 switches, specifies the mirror or redirect [{mirror | redirect} interface which is the slot/port to which packets matching slot/port] this rule are copied or forwarded, respectively. The...
Page 512
ip access-list This command creates an extended IP Access Control List (ACL) identified by , consisting of classification fields defined for the IP header of an IPv4 name frame. The parameter is a case-sensitive alphanumeric string from 1 to 31 name characters uniquely identifying the IP access list.
Page 513
{deny|permit} (IP This command creates a new rule for the current IP access list. Each rule is ACL) appended to the list of configured rules for the list. Note form of this command is not supported, since the rules within an IP ACL cannot be deleted individually.
Page 514
ip access-group This command either attaches a specific IP Access Control List (ACL) identified to an interface, range of interfaces, or all interfaces; or accesslistnumber associates it with a VLAN ID in a given direction. The parameter is the name name of the ACL.
Page 515
acl-trapflags This command enables the ACL trap mode. Default disabled Format acl-trapflags Mode Global Config no acl-trapflags This command disables the ACL trap mode. Format no acl-trapflags Mode Global Config show ip access-lists This command displays summary information about all IP ACLs configured on the switch.
Page 516
If you specify an IP ACL number or name, the following information displays: Note Only the access list fields that you configure are displayed. Output Description The number identifier for each rule that is defined for the IP Rule Number ACL.
Page 517
Output Description The slot/port to which packets matching this rule are Mirror Interface copied. The slot/port to which packets matching this rule are Redirect Interface forwarded. Displays the name of the time-range if the IP ACL rule has Time Range Name referenced a time range.
Page 518
Output Description –Display Access List information for a in|out particular interface in the direction. –Display Access List information for a particular interface in the direction. show access-lists This command displays Access List information for a particular VLAN ID and vlan direction.
IPv6 Access Control List Commands Introduction This section describes the commands you use to configure IPv6 Access Control List (ACL) settings. IPv6 ACLs ensure that only authorized users have access to specific resources and block any unwarranted attempts to reach network resources.
Page 520
ipv6 access-list This command changes the name of an IPv6 ACL. The parameter is the name rename name of an existing IPv6 ACL. The parameter is a case-sensitive newname alphanumeric string from 1 to 31 characters uniquely identifying the IPv6 access list.
Page 521
The parameter is valid only for a permit rule. assign-queue For the CN1610 switch, the parameter allows the traffic matching this mirror rule to be copied to the specified slot/port, while the redirect parameter allows the traffic matching this rule to be forwarded to the specified slot/port.
Page 522
no ipv6 traffic-filter This command removes an IPv6 ACL identified by name from the interface(s) in a given direction. Format no ipv6 traffic-filter name [vlan vlan-id] in [sequence 1-4294967295] Modes Global Config Interface Config show ipv6 access- This command displays an IPv6 access list and all of the rules that are defined for lists the IPv6 ACL.
Page 523
Output Description The slot/port to which packets matching this rule are copied. Mirror Interface The slot/port to which packets matching this rule are forwarded. Redirect Interface Displays the name of the time-range if the IPv6 ACL rule has Time Range Name referenced a time range.
The system supports only Ethernet II frame types. The maximum number of rules per MAC ACL is hardware-dependent. For the CN1610 switch, if you configure an IP ACL on an interface, you cannot configure a MAC ACL on the same interface.
Page 525
mac access-list This command changes the name of a MAC Access Control List (ACL). The extended rename parameter is the name of an existing MAC ACL. The newname parameter name is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the MAC access list.
Page 526
The parameter is valid only for a rule. assign-queue permit For the CN1610 switch, the parameter allows the traffic matching this mirror rule to be copied to the specified slot/port, while the parameter allows redirect the traffic matching this rule to be forwarded to the specified slot/port.
Page 527
Note The special command form is used to match all {deny | permit} any any Ethernet Layer 2 packets, and is the equivalent of the IP access list match every rule. Format {deny|permit} {srcmac | any} {dstmac | any} [ethertypekey | 0x0600-0xFFFF] [vlan {eq 0-4095}] [cos 0-7] [[log] [time-range time-range-name] [assign-queue queue-id]] [{mirror | redirect} slot/port] Mode...
Page 528
Displays when you enable logging for the rule. The queue identifier to which packets matching this rule Assign Queue are assigned. On CN1610 switches, the slot/port to which packets Mirror Interface matching this rule are copied. MAC Access Control List Commands...
Page 529
Output Description On CN1610 switches, the slot/port to which packets Redirect Interface matching this rule are forwarded. Displays the name of the time-range if the MAC ACL rule Time Range Name has referenced a time range. Status (Active/Inactive) of the MAC ACL rule.
Time Range Commands for Time-Based ACLs Introduction Time-based ACLs allow one or more rules within an ACL to be based on time. Each ACL rule within an ACL except for the implicit rule can be deny all configured to be active and operational only during a specific time period. The time range commands allow you to define specific times of the day and week in order to implement time-based ACLs.
Page 531
absolute This command adds an absolute time entry to a time range. Only one absolute time entry is allowed per time range. The parameter is based on the time currently configured time zone. The [ ] parameters indicate the time and date at which the start time date configuration that referenced the time range starts going into effect.
Page 532
The first occurrence of the argument is the starting hours:minutes which the time configuration that referenced the time range starts going into effect. The second occurrence is the ending hours:minutes at which the configuration that referenced the time range is no longer in effect. The hours:minutes are expressed in a 24-hour clock.
Page 533
Mode Privileged EXEC show time-range This command displays a time range and all the absolute/periodic time entries that are defined for the time range. Use the parameter to identify a specific name time range to display. When is not specified, all the time ranges defined in name the system are displayed.
Page 534
Time Range Commands for Time-Based ACLs...
Page 537
ip domain lookup lldp med ip domain name lldp med all ip domain retry lldp med confignotification ip domain timeout lldp med confignotification all ip host lldp med faststart-repeatcount ip name server lldp med transmit-tlv ip ssh lldp med transmit-tlv all ip ssh protocol lldp notification ip ssh server enable...
Page 538
macfilter adddest no crypto key generate dsa macfilter adddest all no crypto key generate rsa macfilter addsrc no debug console macfilter addsrc all no debug dhcp packet mail-server no debug dot1x packet Management Commands no debug igmpsnooping packet management commands no debug igmpsnooping packet receive 201 commands ??–...
Page 539
no dot1x unauthenticated-vlan no lldp transmit-mgmt no dot1x user no lldp transmit-tlv no enable authentication no logging buffered no enable password no logging buffered wrap no ip access-group no logging cli-command no ip access-list no logging console no ip domain list no logging email no ip domain lookup no logging email from-addr...
Page 540
no set igmp mcrtrexpiretime no passwords strength minimum numeric- no set igmp mrouter characters no set igmp mrouter interface no passwords strength minimum repeated- no set igmp querier characters no set igmp querier election participate no passwords strength minimum special-characters no set igmp querier query-interval no set igmp querier timer expiry no passwords strength minimum uppercase-letters...
Page 541
no spanning-tree max-hops no vlan name no spanning-tree mst no vlan port acceptframe all no spanning-tree mst priority no vlan port ingressfilter all no spanning-tree mst vlan no vlan port pvid all no spanning-tree port mode no vlan port tagging all no spanning-tree port mode all no vlan pvid no sshcon maxsessions...
Page 542
port lacptimeout (Global Config) port lacptimeout (Interface Config) script apply Port Mirroring Commands script delete Port Security Commands script list Port-Based Network Access Control Commands script show script validate port-channel Secure Shell Commands port-channel adminmode security port-channel linktrap serial baudrate port-channel load-balance serial timeout port-channel name...
Page 543
show clock detail show lldp remote–device show commands show lldp remote–device detail show inventory show lldp statistics show debugging show logging show dos-control show logging buffered show dot1x show logging email config show dot1x authentication-history show logging email statistics show dot1x clients show logging hosts show dot1x statistics show logging traplogs...
Page 544
show sntp snmp-server community ro show sntp client snmp-server community rw show sntp server snmp-server enable traps show spanning-tree snmp-server enable traps linkmode show spanning-tree brief snmp-server enable traps multiusers show spanning-tree interface snmp-server enable traps stpmode show spanning-tree mst detailed snmp-server enable traps violation show spanning-tree mst port detailed snmptrap...
Page 545
storm-control broadcast all storm-control broadcast all level update bootcode storm-control broadcast all rate User Account Commands storm-control broadcast level user password storm-control broadcast rate username Storm-Control Commands username name nopassword storm-control flowcontrol username name unlock storm-control multicast username snmpv3 accessmode storm-control multicast all username snmpv3 authentication storm-control multicast all level...
Need help?
Do you have a question about the CN1610 and is the answer not in the manual?
Questions and answers