Contents Basic CLI commands ········································································ 1 alias ································································································································· 1 display | { begin | exclude | include } ························································································ 2 display | by-linenum ············································································································· 3 display > ···························································································································· 4 display >> ·························································································································· 5 display alias ······················································································································· 6 ...
Page 4
ip http acl ························································································································· 63 ip http enable ···················································································································· 63 ip http port ······················································································································· 64 ip https acl ······················································································································· 65 ip https certificate access-control-policy·················································································· 65 ip https enable ·················································································································· 66 ip https port ······················································································································ 67 ...
Basic CLI commands alias Use alias to configure a command alias. Use undo alias to delete a command alias. Syntax alias alias command undo alias alias Default The device has a set of system-defined command aliases, as listed in Table Table 1 System-defined command aliases Command alias Command or command keyword...
• Enter ship routing-table to execute the display ip routing-table command. • Enter ship interface to execute the display ip interface command. The command string can include up to nine parameters. Each parameter starts with the dollar sign ($) and a sequence number in the range of 1 to 9. For example, you can configure the alias shinc for the display ip $1 | include $2 command.
Predefined user roles network-admin network-operator Parameters command: Specifies the keywords and arguments of a display command. To display available keywords and arguments, enter display ?. begin: Displays the first line matching the specified regular expression and all subsequent lines. exclude: Displays all lines not matching the specified regular expression. include: Displays all lines matching the specified regular expression.
VLAN type: Static Route interface: Configured IP address: 192.168.2.1 Subnet mask: 255.255.255.0 Description: For LAN Access Name: VLAN 0999 Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/1 # Display the first line that begins with user-group in the running configuration and all of the following lines.
Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/2 display >> Use display >> to append the output from a display command to the end of a file. Syntax display command >> filename Views Any view Predefined user roles network-admin network-operator Parameters command: Specifies the keywords and arguments of a display command. To display available keywords and arguments, enter display ?.
Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/2 display alias Use display alias to display command aliases. Syntax display alias [ alias ] Views Any view Predefined user roles network-admin network-operator Parameters alias: Specifies a command alias. If you do not specify this argument, the command displays all command aliases.
Views Any view Predefined user roles network-admin network-operator Usage guidelines The system automatically saves commands you have successfully executed to the command history buffer for the current CLI session. You can view them and execute them again. By default, the system can save up to 10 commands in the buffer. You can use the history-command max-size command to change the buffer size.
Cmd:dis his all 03/16/2012 20:03:29 vty0 192.168.1.26 Cmd:sys Table 2 Command output Field Description Date Date when the command was executed. Time Time when the command was executed. Terminal User line used by the user. IP address of the terminal used by the user. Username used by the user if the user login authentication mode is User scheme.
CTRL_C Stop the current command. CTRL_D Erase the character at the cursor. CTRL_E Move the cursor to the end of the line. CTRL_F Move the cursor one character to the right. CTRL_H Erase the character to the left of the cursor. CTRL_K Abort the connection request.
ctrl_l: Assigns a command to Ctrl+L. ctrl_o: Assigns a command to Ctrl+O. ctrl_t: Assigns a command to Ctrl+T. ctrl_u: Assigns a command to Ctrl+U. command: Specifies the command to be assigned to the hotkey. Usage guidelines The system defines some command hotkeys and provides five configurable command hotkeys. Pressing a command hotkey executes the command assigned to the hotkey.
Page 19
Predefined user roles network-admin Parameters number: Specifies the number of the most recently executed commands in the command history buffer for the current CLI session that you want to execute. The value range is 1 to 10. The default is count times: Specifies the number of times that you want to execute the commands.
return Use return to return to user view from any other view. Syntax return Views Any view except user view Predefined user roles network-admin network-operator Usage guidelines Pressing Ctrl+Z has the same effect as the return command. Examples # Return to user view from Ten-GigabitEthernet 1/0/1 interface view. [Sysname-Ten-GigabitEthernet1/0/1] return <Sysname>...
Examples # Disable pausing between screens of output for the current CLI session. <Sysname> screen-length disable Related commands screen-length system-view Use system-view to enter system view from user view. Syntax system-view Views User view Predefined user roles network-admin network-operator Examples # Enter system view from user view.
RBAC commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. description Use description to configure a description for a user role for easy identification.
Page 23
Parameters name role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. If you do not specify a user role name, the command displays information about all user roles, including the predefined user roles. Examples # Display information about user role 123. <Sysname>...
Field Description VPN instance policy of the user role: • deny—Denies access to all VPN instances except for permitted VPN instance policy VPN instances. • permit (default)—Default VPN instance policy, which enables the user role to access all VPN instances. Permitted VPN instances VPN instances accessible to the user role.
Page 30
Parameters name feature-name: Specifies a feature by feature name. The feature-name argument represents the feature name, and all letters must be in lower case. verbose: Displays the commands of each feature. Usage guidelines If you do not specify any parameters, the command displays only the list of features available in the system.
debugging local-server * super * display password-control * reset password-control * system-view ; password-control * … Table 4 Command output (display role feature name aaa) Field Description Feature Displays the name and brief function description of the feature. All commands that start with the domain keyword in system view, system-view ;...
Page 32
Syntax display role feature-group [ name feature-group-name ] [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters name feature-group-name: Specifies a feature group. The feature-group-name argument represents the feature group name, a case-sensitive string of 1 to 31 characters. If you do not specify a feature group, the command displays information about all feature groups.
Page 33
Feature: bgp (Border Gateway Protocol related commands) Feature: l3vpn (Layer 3 Virtual Private Network related commands) Feature: route-policy (Routing Policy related commands) Feature: multicast (Multicast related commands) Feature: pim (Protocol Independent Multicast related commands) Feature: igmp (Internet Group Management Protocol related commands) Feature: mld (Multicast Listener Discovery related commands) Feature: mcast-domain...
Parameters feature-name: Specifies a feature name. You must enter the feature name in lower case. Usage guidelines Repeat the feature command to add multiple features to a feature group. Examples # Add the AAA and ACL features to feature group security-features. <Sysname>...
Any change to a user role interface policy takes effect only on users who log in with the user role after the change. Examples # Enter user role interface policy view of role1, and deny role1 to access all interfaces. <Sysname>...
• Create, remove, or configure the interfaces. • Enter the interface views. • Specify the interfaces in feature commands. The create and remove operations are available only for logical interfaces. You can repeat the permit interface command to add multiple permitted interfaces to a user role interface policy.
Page 38
Syntax permit vlan vlan-id-list undo permit vlan [ vlan-id-list ] Default No permitted VLANs are configured in user role VLAN policy view. Views User role VLAN policy view Predefined user roles network-admin Parameters vlan-id-list: Specifies a space-separated list of up to 10 VLAN items. Each VLAN item specifies a VLAN by VLAN ID or specifies a range of VLANs in the form of vlan-id1 to vlan-id2.
[Sysname] interface ten-gigabitethernet 1/0/1 [Sysname-Ten-GigabitEthernet1/0/1] port access vlan 100 [Sysname-Ten-GigabitEthernet1/0/1] quit # Verify that you cannot create VLAN 101 or enter VLAN view. [Sysname] vlan 101 Permission denied. Related commands display role role vlan policy deny permit vpn-instance Use permit vpn-instance to configure a list of MPLS L3VPN instances accessible to a user role. Use undo permit vpn-instance to disable the access of a user role to specific MPLS L3VPN instances.
Examples Configure user role role1: # Permit the user role to execute all commands available in system view and in the child views of system view. <Sysname> system-view [Sysname] role name role1 [Sysname-role-role1] rule 1 permit command system-view ; * # Permit the user role to access VPN instance vpn1.
Parameters name role-name: Specifies a username. The role-name argument is a case-sensitive string of 1 to 63 characters. Usage guidelines You can create a maximum of 64 user roles in addition to the predefined user roles. You cannot delete the predefined user roles or change the permissions assigned to network-admin, network-operator, level-15, or security-audit.
Usage guidelines The default user role feature assigns the default user role to AAA-authenticated users if the authentication server (local or remote) does not assign any user roles to the users. These users are allowed to access the system with the default user role. If AAA users have been assigned user roles, they log in with the user roles.
display role feature-group feature rule Use rule to create or change a user role rule. Use undo rule to delete user role rules. Syntax rule number { deny | permit } { command command-string | { execute | read | write } * { feature [ feature-name ] | feature-group feature-group-name | oid oid-string | xml-element [ xml-string ] } } undo rule { number | all } Default...
Page 44
xml-element [ xml-string ]: Specifies an XML element. The xml-string argument represents the XPath of the XML element, a case-insensitive string of 1 to 255 characters. Use the forward slash (/) to separate Xpath items, for example, Interfaces/Index/Name. If you do not specify an XML element, the rule applies to all XML elements.
Page 45
rule 3 permit read write oid 1.3.6.1.4.1 When you specify a command string, follow the guidelines in Table Table 5 Command string configuration rules Rule Guidelines Use a semicolon to separate the command of each view that you must enter before you access a command or a set of commands. However, do not use a semicolon to separate commands available in user view or any view, for example, display and dir.
Rule Guidelines The system does not treat the redirect signs and the parameters that follow the signs as part of command lines. However, in user role Do not include the vertical bar (|), command rules, these redirect signs and parameters are handled as greater-than sign (>), or double part of command lines.
Parameters role-name: Specifies a user role, a case-sensitive string of 1 to 63 characters. The user role must exist in the system and cannot be security-audit. If you do not specify a user role, you obtain the default target user role which is set by using the super default role command. Usage guidelines The obtained user role is a temporary user role, because this command is effective only on the current login.
scheme: Enables remote AAA authentication. Usage guidelines For local password authentication, use the super password command to set a password. For remote AAA authentication, set the username and password on the RADIUS or HWTACACS server. If you specify both local and scheme keywords, the keyword first entered in the command takes precedence.
Usage guidelines The default target user role is applied to the super or super password command when you do not specify a user role for the command. Examples # Specify network-operator as the default target user role for temporary user role authorization. <Sysname>...
Usage guidelines If you do not specify any parameters, you specify a plaintext password in the interactive mode. The FIPS mode supports only the interactive mode for setting a password. Set a password if you configure local password authentication for temporary user role authorization. It is a good practice to specify different passwords for different user roles.
• Create, remove, or configure the VLAN. • Enter VLAN view. • Specify the VLAN in feature commands. Any change to a user role VLAN policy takes effect only on users who log in with the user role after the change. Examples # Enter user role VLAN policy view of role1, and deny the access of role1 to all VLANs.
Page 52
NOTE: The vpn-instance policy deny command denies the access of the user role to all VPN instances if the permit vpn-instance command is not configured. To configure a VPN instance, make sure the VPN instance is permitted by the user role VPN instance policy in use.
Login management commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. Some login management commands are available in both user line view and user line class view.
Page 54
Table 6 ASCII code values for combined keys that use the Ctrl key Combined key ASCII code value Ctrl+A Ctrl+B Ctrl+C Ctrl+D Ctrl+E Ctrl+F Ctrl+G Ctrl+H Ctrl+I Ctrl+J Ctrl+K Ctrl+L Ctrl+M Ctrl+N Ctrl+O Ctrl+P Ctrl+Q Ctrl+R Ctrl+S Ctrl+T Ctrl+U Ctrl+V Ctrl+W Ctrl+X Ctrl+Y...
Press ENTER to get started. Press Enter. Pressing Enter does not start a session. Press s. A terminal session is started. <Sysname> authentication-mode Use authentication-mode to set the authentication mode for a user line. Use undo authentication-mode to restore the default. Syntax In non-FIPS mode: authentication-mode { none | password | scheme }...
An authentication mode change does not take effect for the current session. It takes effect for subsequent login sessions. Examples # Enable the none authentication mode for VTY line 0. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] authentication-mode none # Enable password authentication for VTY line 0 and set the password to 321. <Sysname>...
Page 57
Usage guidelines CAUTION: After configuring this command for a user line, you might be unable to access the CLI through the user line. Make sure you can access the CLI through a different user line before you configure this command and save the configuration. The device will automatically execute the specified command when a user logs in through the user line, and close the user connection after the command is executed.
command accounting Use command accounting to enable command accounting. Use undo command accounting to disable command accounting. Syntax command accounting undo command accounting Default Command accounting is disabled. The accounting server does not record executed commands. Views User line view User line class view Predefined user roles network-admin...
Views User line view User line class view Predefined user roles network-admin Usage guidelines When command authorization is enabled, a user can only use commands that are permitted by both the AAA scheme and user role. A configuration change made by this command does not take effect for the current session. It takes effect for subsequent login sessions.
Usage guidelines This command is not supported in VTY line class view. Only modem dial-in supports keywords 5 and 6. This setting must be the same as the setting on the configuration terminal. Examples # Configure AUX 0 to use seven data bits for a character. <Sysname>...
Views Any view Predefined user roles network-admin network-operator Examples # Display HTTPS service configuration and status information. <Sysname> display ip https HTTPS port: 443 SSL server policy: test Certificate access control policy: Not configured Basic ACL: 2222 HTTPS status: Enabled Table 8 Command output Field Description...
Page 62
Parameters number1: Specifies the absolute number of a user line. The value range is 0 to 73. aux: Specifies the AUX line. vty: Specifies the VTY line. number2: Specifies the relative number of a user line. The value range is 0 to 9 for AUX lines and 0 to 63 for VTY lines.
Table 10 Command output Fields Description Type of the user line: • — AUX line. Line type • — VTY line. number: Absolute number of the first user line in the user line class. number:status status: User line status. X is for unused and U is for used. display telnet client Use display telnet client to display the packet source setting for the Telnet client.
Page 64
vty: Specifies the VTY line. number2: Specifies the relative number of a user line. The value range is 0 to 9 for AUX lines and 0 to 63 for VTY lines. summary: Displays summary information about user lines. If you do not specify this keyword, the detailed information is displayed.
Table 12 Command output Fields Description Type of the user line: • AUX—AUX line. Line type • — VTY line. number: Absolute number of the first user line in the user line class. number:status status: User line status. X is for unused and U is for used. display users Use display users to display online CLI users.
Field Description User type: • TEL—Telnet user. Type • SSH—SSH user. • For a user who logged in through the console port, this field does not display anything. User line you are using. Location IP address of the user. escape-key Use escape-key to set the escape key.
The undo escape-key command disables the current escape key. After you execute this undo command, no escape key is available. This command is available in both user line view and user line class view. A non-default setting in either view takes precedence over a default setting in the other view. A non-default setting in user line view takes precedence over a non-default setting in user line class view.
none: Disables flow control. software: Performs software flow control. Usage guidelines This command is not supported in VTY line view. The device supports flow control in both the inbound and outbound directions. • For flow control in the inbound direction, the local device listens to flow control information from the remote device.
Syntax free user-interface { number1 | { aux | vty } number2 } Views User view Predefined user roles network-admin Parameters number1: Specifies the absolute number of a user line. The value range is 0 to 73. aux: Specifies the AUX line. vty: Specifies the VTY line.
Usage guidelines Each user line uses a separate command history buffer to store commands successfully executed by its user. The buffer size determines how many history commands the buffer can store. To display history commands in the buffer for your session, press the up or down arrow key, or execute the display history-command command.
<Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] idle-timeout 1 30 ip http acl Use ip http acl to apply an ACL to the HTTP service. Use undo ip http acl to restore the default. Syntax ip http acl { acl-number | name acl-name } undo ip http acl Default No ACL is applied to the HTTP service.
Default The HTTP service is disabled. Views System view Predefined user roles network-admin Usage guidelines This command is not supported in FIPS mode. Examples # Enable the HTTP service. <Sysname> system-view [Sysname] ip http enable Related commands ip https enable ip http port Use ip http port to specify the HTTP service port number.
ip https acl Use ip https acl to apply an ACL to the HTTPS service. Use undo ip https acl to restore the default. Syntax ip https acl {acl-number | name acl-name } undo ip https acl Default No ACL is applied to the HTTP service. Views System view Predefined user roles...
Predefined user roles network-admin Parameters policy-name: Specifies a certificate-based access control policy by its name, a case-sensitive string of 1 to 31 characters. Usage guidelines For more information about the certificate-based access control policy, see the chapter on PKI in Security Configuration Guide.
ip https ssl-server-policy ip https port Use ip https port to specify the HTTPS service port number. Use undo ip https port to restore the default. Syntax ip https port port-number undo ip https port Default The HTTPS service port number is 443. Views System view Predefined user roles...
Usage guidelines If the HTTP service and HTTPS service are enabled, changes to the applied SSL server policy do not take effect. For the changes to take effect, you must disable HTTP and HTTPS, and then apply the policy and enable HTTP and HTTPS again. To restore the default, you must disable HTTP and HTTPS, execute the undo ip https ssl-server-policy command, and then enable HTTP and HTTPS again.
line class Use line class to enter user line class view. Syntax line class { aux | vty } Views System view Predefined user roles network-admin Parameters aux: Specifies the AUX line class view. vty: Specifies the VTY line class view. Usage guidelines To configure the same settings for all user lines of a line class, use this command to enter the user line class view.
[Sysname-line-class-vty] idle-timeout 15 # In AUX line class view, configure the character s as the terminal session activation key. <Sysname> system-view [Sysname] line class aux [Sysname-line-class-aux] activation-key s [Sysname-line-class-aux] quit # In the view of AUX line 0, restore the default terminal session activation key. [Sysname] line aux 0 [Sysname-line-aux0] undo activation-key Alternatively, you can use the following command:...
Examples # Lock the current user line and set the password for unlocking the line. <Sysname> lock Please input password<1 to 16> to lock current line: Password: Again: locked ! // The user line is locked. To unlock it, press Enter and enter the password: Password: <Sysname>...
Page 80
Use undo lock-key to restore the default. Syntax lock-key key-string undo lock-key Default No user line locking key is set. Views User line view User line class view Predefined user roles network-admin Parameters key-string: Specifies a shortcut key. It can be a character (case sensitive), or an ASCII code value in the range of 0 to 127.
parity Use parity to specify the parity. Use undo parity to restore the default. Syntax parity { even | mark | none | odd | space } undo parity Default The setting is none. No parity is used. Views User line view Predefined user roles network-admin Parameters...
Page 82
Default In non-FIPS mode, all protocols are supported. In FIPS mode, SSH is supported. Views VTY line view VTY line class view Predefined user roles network-admin Parameters all: Supports all protocols, including SSH and Telnet. ssh: Supports SSH only. telnet: Supports Telnet only. Usage guidelines A configuration change in user line view does not take effect for the current session.
Press CTRL+K to abort Connected to 192.168.1.241 ... ****************************************************************************** * Copyright (c) 2010-2017 Hewlett Packard Enterprise Development LP * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ****************************************************************************** <Server> You are logged in without authentication. Display online CLI user information.
Parameters screen-length: Specifies the maximum number of lines to send, in the range of 0 to 512. To send command output without pausing, set the number to 0 or execute the screen-length disable command. Usage guidelines The number of lines that can be displayed on the terminal screen is restricted by both this setting and the display specification of the terminal.
To end a message, press Enter. To abort the send operation, press Ctrl+C. Examples # Send a notification to the user on VTY 1. <Sysname> send vty 1 Input message, end with Enter; abort with CTRL+C: Your attention, please. I will reboot the system in 3 minutes. Send message? [Y/N]:y The message should appear on the user's terminal screen as follows: [Sysname]...
Examples # Set the password to hello for local password authentication on VTY line 0. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] authentication-mode password [Sysname-line-vty0] set authentication password simple hello Related commands authentication-mode shell Use shell to enable the terminal service for user lines. Use undo shell to disable the terminal service for user lines.
speed Use speed to set the transmission rate (also called the baud rate) on a user line. Use undo speed to restore the default. Syntax speed speed-value undo speed Default The transmission rate is 9600 bps on a user line. Views User line view Predefined user roles...
undo stopbits Default One stop bit is used. Views User line view Predefined user roles network-admin Parameters 1: Uses one stop bit. 1.5: Uses one and a half stop bits. The device does not support using one and a half stop bits. If you specify this keyword, two stop bits are used.
source: Specifies a source IPv4 address or source interface for outgoing Telnet packets. If you do not specify this option, the device uses the primary IPv4 address of the output interface for the route to the server as the source address. interface interface-type interface-number: Specifies the source interface.
# Telnet to the host at 2000::1. Use 1000::1 as the source address for outgoing Telnet packets. <Sysname> telnet ipv6 2000::1 source ipv6 1000::1 telnet server acl Use telnet server acl to apply an ACL to filter Telnet logins. Use undo telnet server acl to restore the default. Syntax telnet server acl [ mac ] acl-number undo telnet server acl...
undo telnet server dscp Default IPv4 uses the DSCP value 48 for Telnet packets sent to a Telnet client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines This command is not supported in FIPS mode.
telnet server ipv6 acl Use telnet server ipv6 acl to apply an IPv6 ACL to filter IPv6 Telnet logins. Use undo telnet server ipv6 acl to restore the default. Syntax telnet server ipv6 acl { ipv6 | mac } acl-number undo telnet server ipv6 acl Default No IPv6 ACL is used to filter IPv6 Telnet logins.
Default IPv6 uses the DSCP value 48 for Telnet packets sent to a Telnet client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines This command is not supported in FIPS mode. The DSCP value is carried in the Traffic class field of an IPv6 packet to indicate the packet transmission priority.
A terminal display type change does not take effect for the current session. It takes effect for subsequent login sessions. Examples # Set the terminal display type to VT100. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] terminal type vt100 user-interface Use user-interface to enter one or multiple user line views.
Related commands user-interface class user-interface class Use user-interface class to enter user line class view. Syntax user-interface class { aux | vty } Views System view Predefined user roles network-admin Parameters aux: Specifies the AUX line class view. vty: Specifies the VTY line class view. Usage guidelines This command is an older version reserved for backward compatibility purposes.
• A setting in user line class view does not take effect for current online users. It takes effect only for new login users. Examples # Set the CLI connection idle-timeout timer to 15 minutes in VTY line class view. <Sysname>...
Page 99
Views User line view User line class view Predefined user roles network-admin Parameters role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. The user role can be user-defined or predefined. Available predefined user roles include network-admin, network-operator, and level-0 to level-15.
FTP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. FTP is not supported in FIPS mode. FTP server commands display ftp-server Use display ftp-server to display FTP server configuration and status information.
Views Any view Predefined user roles network-admin network-operator Examples # Display detailed information about online FTP users. <Sysname> display ftp-user UserName HostIP Port HomeDir root 192.168.20.184 46539 flash: A field value is wrapped if its length exceeds the limit. The segments are left justified. The following are the length limits for fields: •...
Parameters username: Specifies a username. To display online FTP users, execute the display ftp-user command. Examples # Release the FTP connections established by using user account ftpuser. <Sysname> free ftp user ftpuser Are you sure to free FTP connection? [Y/N]:y <Sysname>...
port port: Specifies the source port of an FTP connection. To view the source ports of FTP connections, execute the display ftp-user command. Examples # Release the FTP connections established from IPv6 address 2000::154. <Sysname> free ftp user-ip ipv6 2000::154 Are you sure to free FTP connection? [Y/N]:y <Sysname>...
undo ftp server dscp Default IPv4 uses the DSCP value 0 for FTP packets sent to an FTP client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines The DSCP value is carried in the ToS field of an IP packet to indicate the transmission priority of the packet.
undo ftp server ipv6 dscp Default IPv6 uses the DSCP value 0 for FTP packets sent to an FTP client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines The DSCP value is carried in the Traffic class field of an IPv6 packet to indicate the transmission priority of the packet.
ssl server-policy (Security Command Reference) ftp timeout Use ftp timeout to set the FTP connection idle-timeout timer. Use undo ftp timeout to restore the default. Syntax ftp timeout minute undo ftp timeout Default The FTP connection idle-timeout timer is 30 minutes. Views System view Predefined user roles...
Predefined user roles network-admin Parameters command-name: Specifies a command supported by the FTP client. Usage guidelines In FTP client view, entering ? is the same as executing the help command. Examples # Display all commands supported by the FTP client. ftp>...
150 Accepted data connection 226 File successfully transferred 1657 bytes sent in 0.000736 seconds (2.15 Mbyte/s) ascii Use ascii to set the file transfer mode to ASCII. Syntax ascii Default The file transfer mode is binary. Views FTP client view Predefined user roles network-admin Usage guidelines...
Usage guidelines You can perform this operation only after you log in to the FTP server. FTP transfers files in either of the following modes: • Binary mode—Transfers program file or pictures. • ASCII mode—Transfers text files. When the device acts as the FTP server, the transfer mode is determined by the FTP client. When the device acts as the FTP client, you can set the transfer mode.
Parameters directory: Specifies the target directory. If the target directory does not exist, the cd command does not change the current working directory. ..: Specifies the upper directory. Executing the cd .. command is the same as executing the cdup command.
257 "/ftp/subdir" is your current location ftp> cdup 250 OK. Current directory is /ftp ftp> pwd 257 "/ftp" is your current location Related commands close Use close to terminate the connection to the FTP server without exiting FTP client view. Syntax close Views...
When FTP client debugging is disabled, executing this command enables FTP client debugging. Examples # Enable and then disable FTP client debugging. ftp> debug Debugging on (debug=1). ftp> debug Debugging off (debug=0). delete Use delete to permanently delete a file from the FTP server. Syntax delete remotefile Views...
To display detailed information about the files and subdirectories in the working directory on the FTP server, use the dir command. To display detailed information about a file or directory on the FTP server, use the dir remotefile command. To save detailed information about a file or directory on the FTP server to a local file, use the dir remotefile localfile command.
Predefined user roles network-admin Usage guidelines You can perform this operation only after you log in to the FTP server. Examples # Terminate the connection to the FTP server without exiting the FTP client view. ftp> disconnect 221-Goodbye. You uploaded 0 and downloaded 0 kbytes. 221 Logout.
service-port: Specifies the TCP port number of the FTP server, in the range of 0 to 65535. The default is 21. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the FTP server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters.
Views System view Predefined user roles network-admin Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's IPv6 address as the source address. For successful FTP packet transmission, make sure the interface is up and is configured with an IPv6 address. ipv6 source-ipv6-address: Specifies an IPv6 address.
ip source-ip-address: Specifies an IPv4 address. For successful FTP packet transmission, make sure this address is the IPv4 address of an interface in up state on the device. Usage guidelines If you execute this command multiple times, the most recent configuration takes effect. The source address specified with the ftp command takes precedence over the source address specified with the ftp client source command.
220 FTP service ready. User (2000::154): root 331 Password required for root. Password: 230 User logged in Remote system type is HPE Use get to download a file from the FTP server and save the file. Syntax get remotefile [ localfile ] Views...
Examples # Download the a.txt file and save it as b.txt in the working directory accessed by the ftp command. ftp> get a.txt b.txt local: b.txt remote: a.txt 150 Connecting to port 47457 226 File successfully transferred 1569 bytes received in 0.00527 seconds (290.6 kbyte/s) # Download the a.txt file to the test directory in the working directory accessed by the ftp command.
disconnect open rhelp user passive rename verbose cdup help reset close restart # Display the help information for the dir command. ftp> help dir list contents of remote directory Related commands Use lcd to display or change the local working directory of the FTP client. Syntax lcd [ directory | / ] Views...
Parameters remotefile: Specifies a file or directory on the FTP server. localfile: Specifies the name of the local file used to save the displayed information. Usage guidelines You can perform this operation only after you log in to the FTP server. To display detailed information about the files and subdirectories in the working directory on the FTP server, use the ls command.
Syntax mkdir directory Views FTP client view Predefined user roles network-admin Parameters directory: Specifies the name for the directory to be created. Usage guidelines You can perform this operation only after you log in to the FTP server. You must have permission to perform this operation on the FTP server. Examples # Create a subdirectory named newdir in the current directory of the FTP server.
Press CTRL+C to abort. Connected to 192.168.40.7 (192.168.40.7). 220 FTP service ready. User (192.168.40.7:(none)): root 331 Password required for root. Password: 230 User logged in. Remote system type is HPE. ftp> passive Use passive to change the FTP operation mode. Syntax passive Default The FTP operation mode is passive.
Usage guidelines FTP can operate in either of the following modes: • Active mode—The FTP server initiates the TCP connection. • Passive mode—The FTP client initiates the TCP connection. When the FTP operation mode is passive, executing this command changes the mode to active. When the FTP operation mode is active, executing this command changes the mode to passive.
local: flash:/test/a.txt remote: b.txt 150 Connecting to port 47461 226 File successfully transferred 1569 bytes sent in 0.000671 seconds (2.23 Mbyte/s) # Upload file a.txt from the test directory of the storage medium on a member device. Save the file as b.txt on the FTP server.
ftp> quit 221-Goodbye. You uploaded 0 and downloaded 0 kbytes. 221 Logout. <Sysname> Related commands reget Use reget to get the missing part of a file from the FTP server. Syntax reget remotefile [ localfile ] Views FTP client view Predefined user roles network-admin network-operator...
Predefined user roles network-admin Parameters oldfilename: Specifies the original file name. newfilename: Specifies the new file name. Usage guidelines You can perform this operation only after you log in to the FTP server. Examples # Rename the a.txt file as b.txt. •...
Views FTP client view Predefined user roles network-admin Parameters marker: Specifies the retransmission offset, in bytes. Usage guidelines Use this command to continue with a file retransmission. The file retransmission starts from the (offset+1)th byte. You can perform this operation only after you log in to the FTP server. Support for this command depends on the FTP server.
Page 129
ftp> rhelp 214-The following FTP commands are recognized USER PASS NOOP QUIT SYST TYPE HELP CWD XCWD PWD CDUP XCUP XPWD LIST NLST MLSD PORT EPRT PASV EPSV REST RETR STOR APPE DELE MKD XMKD RMD XRMD ABOR SIZE RNFR RNTO 214 UNIX Type: L8 Table 16 Command output Field...
Field Description SIZE Size of the transmission file. RNFR Original name. RNTO New name. rmdir Use rmdir to permanently delete a directory from the FTP server. Syntax rmdir directory Views FTP client view Predefined user roles network-admin Parameters directory: Specifies a directory on the FTP server. Usage guidelines You can perform this operation only after you log in to the FTP server.
Page 131
Parameters remotefile: Specifies a directory or file on the FTP server. Usage guidelines You can perform this operation only after you log in to the FTP server. Support for this command depends on the FTP server. Examples # Display FTP server status information. ftp>...
Field Description The first bit specifies the file type. • -—Common. • B—Block. • c—Character. • d—Directory. • l—Symbol connection file. • p—Pipe. -rw-r--r-- • s—socket. The second bit through the tenth bit are divided into three groups. Each group contains three characters, representing the access permission of the owner, group, and other users.
Nmap: off Hash mark printing: off; Use of PORT cmds: on Table 19 Command output Field Description IP address of the FTP server that is connected to the Connected to 192.168.1.56. FTP client. Verbose: on; Bell: off; Prompting: on; Globbing: off Displays debugging information.
Parameters username: Specifies the username. password: Specifies the password. Usage guidelines If you tried to access an FTP server but failed to pass the authentication, you can use this command to try again before the connection to the FTP server expires. After you log in to an FTP server, you can initiate an FTP authentication to change to a new account.
Page 135
# Enable the device to display detailed information about FTP operations. ftp> verbose Verbose mode on. # Execute the get command. ftp> get a.cfg 2.cfg 227 Entering Passive Mode (192,168,1,58,68,14) 150-Accepted data connection 150 The computer is your friend. Trust the computer 226 File successfully transferred 3796 bytes received in 0.00762 seconds (486.5 kbyte/s)
TFTP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. TFTP is not supported in FIPS mode. tftp Use tftp to download a file from a TFTP server or upload a file to a TFTP server in an IPv4 network.
TFTP packet transmission, make sure the interface is up and has the primary IPv4 address configured. • ip source-ip-address: Specifies an IPv4 address. For successful TFTP packet transmission, make sure this address is the IPv4 address of an interface in up state on the device. Usage guidelines The source address specified with the tftp command takes precedence over the source address specified with the tftp client source command.
Default No source address is specified for TFTP packets sent to an IPv6 TFTP server. The device selects a source IPv6 address as defined in RFC 3484. Views System view Predefined user roles network-admin Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's IPv6 address as the source address.
Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's primary IPv4 address as the source address. For successful TFTP packet transmission, make sure the interface is up and has the primary IPv4 address configured. ip source-ip-address: Specifies an IPv4 address.
memory successfully. If the destination folder already has a file using the same name, the system overwrites the existing file. If the download or save-to-memory operation fails, the existing file in the destination folder is not overwritten. source-filename: Specifies the source file name, a case-insensitive string of 1 to 255 characters. destination-filename: Specifies the destination file name, a case-insensitive string of 1 to 255 characters.
Views System view Predefined user roles network-admin Parameters acl-number: Specifies the number of a basic ACL, in the range of 2000 to 2999. Usage guidelines You can use an ACL to deny or permit the device's access to specific TFTP servers. Examples # Allow the device to access only TFTP server 1.1.1.1.
File system management commands IMPORTANT: • Before managing storage media, file systems, directories, and files, make sure you know the possible impact. • A file or directory whose name starts with a dot character (.) is a hidden file or directory. To prevent the system from hiding a file or directory, make sure the file or directory name does not start with a dot character.
Examples # Access the test directory after logging in to the device. <Sysname> cd test # Change to the parent directory. <Sysname> cd .. copy Use copy to copy a file. Syntax copy source-file { dest-file | dest-directory } Views User view Predefined user roles network-admin...
Page 144
Location Name format Remarks Enter the URL in the format of For example, to specify the startup.cfg file in the On a TFTP working directory on TFTP server 1.1.1.1, enter the tftp://server address[:port server URL tftp://1.1.1.1/startup.cfg. number]/file path[/file name]. The username and password in the URL must be the same as the username and password configured on the server.
Copying file tftp://1.1.1.1/test.cfg to flash:/testbackup.cfg... Done. # Copy test.cfg from the current directory. Save the copy to the working directory on TFTP server 1.1.1.1 as testbackup.cfg. <Sysname> copy test.cfg tftp://1.1.1.1/testbackup.cfg Copy flash:/test.cfg to tftp://1.1.1.1/testbackup.cfg? [Y/N]:y Copying file flash:/test.cfg to tftp://1.1.1.1/testbackup.cfg... Done. # Copy test.cfg from the working directory on FTP server 2001::1.
Usage guidelines Use the delete /unreserved file command with caution. You cannot restore a file that was deleted with this command. The delete file command (without /unreserved) moves the specified file to the recycle bin, unless the file system is running out of storage space. If the file system is running out of storage space, the command permanently deletes the file.
The directory name of the recycle bin is .trash. To display files in the recycle bin, use either of the following methods: • Execute the dir /all .trash command. • Execute the cd .trash command and then the dir command. Examples # Display information about all files and directories in the current directory.
Page 148
partition-number: Specifies the number of partitions, in the range of 1 to 4. If you specify this argument, the storage medium is divided evenly into the specified number of partitions. To customize the sizes of partitions, do not provide this argument. Usage guidelines The flash memory cannot be partitioned.
Partition 2 (32MB~96MB, 128MB, Press CTRL+C to quit or Enter to use all available space):31 // Enter 31 to set the size of the second partition to 31 MB. The partition size must be greater than or equal to 32MB. Partition 2 (32MB~96MB, 128MB, Press CTRL+C to quit or Enter to use all available space):1000 // Enter 1000 to set the size of the second partition to 1000 MB.
Examples # Set the file and directory operation mode to alert. <Sysname> system-view [Sysname] file prompt alert fixdisk Use fixdisk to check a file system for damage and repair any damage. Syntax fixdisk filesystem Views User view Predefined user roles network-admin Parameters filesystem: Specifies the name of a file system.
Formatting a file system permanently deletes all files in the file system. If a startup configuration file exists in the file system, back up the file if necessary. You can format a file system only when no other users are accessing the file system. Examples # Format file system flash:.
1048576 KB total (472844 KB free) gzip Use gzip to compress a file. Syntax gzip file Views User view Predefined user roles network-admin Parameters file: Specifies the name of the file to be compressed. Usage guidelines This command saves the compressed file to the file.gz file and deletes the source file. Examples # Compress file system.bin: Before compressing the file, you can display files whose names start with the system.
Predefined user roles network-admin network-operator Parameters file: Specifies the name of a file. Usage guidelines You can use file digests to verify file integrity. Examples # Use the MD5 algorithm to calculate the digest of file system.bin. <Sysname> md5sum system.bin MD5 digest: 4f22b6190d151a167105df61c35f0917 mkdir...
Views User view Predefined user roles network-admin Parameters file: Specifies the name of a file. Examples # Display the contents of the test.txt file. <Sysname> more test.txt Have a nice day. # Display the contents of the testcfg.cfg file. <Sysname> more testcfg.cfg version 7.1.070, Release 1201 sysname Sysname vlan 2...
Examples # Mount a file system on the USB disk. <Sysname> mount usba0: Related commands umount move Use move to move a file. Syntax move source-file { dest-file | dest-directory } Views User view Predefined user roles network-admin Parameters source-file: Specifies the name of the source file. dest-file: Specifies the name of the destination file.
Examples # Display the working directory. <Sysname> pwd flash: rename Use rename to rename a file or directory. Syntax rename { source-file | source-directory } { dest-file | dest-directory } Views User view Predefined user roles network-admin Parameters source-file: Specifies the name of the source file. source-directory: Specifies the name of the source directory.
Usage guidelines The delete file command only moves a file to the recycle bin. To permanently delete the file, use the reset recycle-bin command to delete the file from the recycle bin. Examples # Empty the recycle bin. (In this example there are two files in the recycle bin.) <Sysname>...
Syntax sha256sum file Views User view Predefined user roles network-admin Parameters file: Specifies the name of a file. Usage guidelines You can use file digests to verify file integrity. Examples # Use the SHA-256 algorithm to calculate the digest of file system.bin. <Sysname>...
Creating archive flash:/b.tar.gz Done. # Compress and archive files and directories, and display the successfully archived files and directories. <Sysname> tar create gz archive-file c.tar.gz verbose source 1.cfg 2.cfg test 1.cfg 2.cfg test/ test/a.log test/subtest/ test/subtest/aa.log Related commands tar extract tar list tar extract Use tar extract to extract files and directories.
2.cfg test/ test/a.log test/subtest/ test/subtest/aa.log # Extract files and directories from archive file a.tar, and display the content of the files on the screen. <Sysname> tar extract archive-file c.tar.gz screen version 7.1.070, Release 1201 sysname Sysname Related commands tar create tar list tar list Use tar list to display the names of archived files and directories.
umount Use umount to unmount a file system. Syntax umount filesystem Views User view Predefined user roles network-admin Parameters filesystem: Specifies the name of a file system. Usage guidelines File systems on a storage medium are automatically mounted when the storage medium is connected to the device.
Page 162
Usage guidelines If a file with the same name already exists in the directory, the system prompts whether or not you want to overwrite the existing file. If you enter Y, the existing file is overwritten. If you enter N, the command is not executed.
Configuration file management commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. archive configuration Use archive configuration to manually archive the running configuration to the configuration archive directory.
Default The automatic running-configuration archiving feature is disabled. Views System view Predefined user roles network-admin Parameters interval: Specifies the interval for automatically saving the running configuration. The value range is 10 to 525600, in minutes. Usage guidelines Automatic configuration archiving enables the system to periodically save the running configuration to the archive directory.
Parameters directory: Specifies the archive directory, a case-insensitive string of 1 to 63 characters. The value for this argument must take the format of storage-medium-name:/folder-name. The directory must already exist on the master. filename-prefix: Specifies a file name prefix for configuration archives, a case-insensitive string of 1 to 30 characters.
Default The maximum number is 5. Views System view Predefined user roles network-admin Parameters file-number: Specifies the maximum number of configuration archives that can be saved. The value range is 1 to 10. Adjust the setting depending on the amount of storage space available. Usage guidelines Before you can set a limit on configuration archives, use the archive configuration location command to specify a configuration archive directory and archive file name prefix.
Parameters ipv4-server: Specifies a TFTP server by its IPv4 address or host name. The host name is a case-insensitive string of 1 to 253 characters. Valid characters include letters, digits, hyphens (-), underscores (_), and dots (.). ipv6 ipv6-server: Specifies a TFTP server by its IPv6 address or host name. The host name is a case-insensitive string of 1 to 253 characters.
The settings you made during the commit delay interval are automatically removed if you have not manually committed them before the configuration commit delay timer expires. As a best practice, configure the information center to output logs to the console. Use the logs to determine whether you want to commit the settings.
[Sysname] configuration commit delay 10 # Change the configuration commit delay timer to 60 minutes before the old delay timer expires. [Sysname] configuration commit delay 60 The commit delay already set 10 minutes, overwrite it? [Y/N]:y # Attempt to set the configuration commit delay timer to 20 minutes while the system is rolling back the configuration upon expiration of the old delay timer.
Views System view Predefined user roles network-admin Parameters filename: Specifies the name of the replacement configuration file used for configuration rollback. The file name must use the .cfg extension. Excluding the .cfg extension, the file name is a case-insensitive string of 1 to 255 characters and can include path information. The file and file path must be valid.
Maximum number of archive files: 10 Saved archive files: No. TimeStamp FileName Wed Jan 15 14:20:18 2012 my_archive_1.cfg Wed Jan 15 14:33:10 2012 my_archive_2.cfg Wed Jan 15 14:49:37 2012 my_archive_3.cfg '#' indicates the most recent archive file. Next archive file to be saved: my_archive_4.cfg Table 22 Command output Field Description...
interface [ interface-type [ interface-number ] ]: Displays interface configuration, where the interface-type argument represents the interface type and the interface-number argument represents the interface number. If you do not specify the interface-type interface-number arguments, the command displays the running configuration for all interfaces. If you specify only the interface-type argument, the command displays the running configuration for all interfaces of this type.
Page 173
Syntax display current-configuration diff Views Any view Predefined user roles network-admin network-operator Examples # Display the differences that the running configuration has as compared with the next-startup configuration. <Sysname> display current-configuration diff --- Startup configuration +++ Current configuration @@ -17,7 +17,9 @@ vlan 200 -vlan 300 +vlan 400...
Field Description Displays command differences. • cmd1 and cmd4—Command lines are contained in both source and target configurations if they are not prefixed with a minus (-) or plus (+) sign. They provide a context for locating command line differences. cmd1 •...
Page 175
display diff startup-configuration { configfile file-name-d | current-configuration } Views Any view Predefined user roles network-admin network-operator Parameters configfile file-name-s: Specifies the source configuration file for comparison. configfile file-name-d: Specifies the target configuration file for comparison. Specifies running configuration. current-configuration: display diff current-configuration command, this keyword specifies the source configuration for comparison.
<Sysname> The output shows that VLAN 200 is contained in both configurations, VLAN 400 and VLAN 500 are contained only in the running configuration, and VLAN 300 is contained only in the next-startup configuration. For the command output description, see Table Related commands display current-configuration...
vlan 1 domain system ---- More ---- Related commands reset saved-configuration save display startup Use display startup to display the names of the current startup configuration file and the next-startup configuration files. Syntax display startup Views Any view Predefined user roles network-admin network-operator Usage guidelines...
display this Use display this to display the running configuration in the current view. Syntax display this Views Any view Predefined user roles network-admin network-operator Usage guidelines Use this command to verify the configuration you have made in a certain view. This command does not display parameters that are using the default settings.
Usage guidelines CAUTION: This command permanently deletes the specified next-startup configuration file. In an IRF fabric, this command deletes the specified file from all IRF member devices. You can delete the main file, the backup file, or both. To delete a file that is set as both main and backup next-startup configuration files, you must execute both the reset saved-configuration backup command and the reset saved-configuration main command.
Usage guidelines This command is not supported in FIPS mode. Before restoring the configuration file for the next startup, make sure the following requirements are met: • The server is reachable. • The server is enabled with TFTP service. • You have read and write permissions to the server.
Page 181
Parameters file-url: Specifies a file path for saving the running configuration. The file name must use the .cfg extension. Excluding the .cfg extension, the file path is a string of 1 to 255 characters. If you specify the all keyword or the slot slot-number option, the file path cannot include a member ID. If the file path includes a folder name, the folder must already exist on all IRF member devices.
Now saving current configuration to the device. Saving configuration flash:/backup.cfg. Please wait... Configuration is saved to flash successfully. # Save the running configuration to the main next-startup configuration file without any confirmation required. <Sysname> save force Validating file. Please wait..Saved the current configuration to mainboard device successfully.
Page 183
Usage guidelines CAUTION: In an IRF fabric, the undo startup saved-configuration command can cause an IRF split after the IRF fabric or an IRF member reboots. The startup saved-configuration command applies to all IRF members. To successfully execute this command, make sure the specified file has been saved in the root directory of the storage medium on each member.
Software upgrade commands The switch can start up from the built-in flash memory or the USB disk. As a best practice, store the startup images in the built-in flash memory. If you store the startup images on the USB disk, do not remove the USB disk during the startup process.
Page 185
# Specify flash:/all.ipe as the main startup image file for slot 1. <Sysname> boot-loader file flash:/all.ipe slot 1 main Verifying the IPE file and the images....Done. HPE FF 5940 48XGT 6QSFP+ Switch images in IPE: boot.bin system.bin This command will set the main startup software images. Continue? [Y/N]:Y Add images to slot 1.
Loading......Done. Loading......Done. Loading......Done. Loading......Done. The images that have passed all examinations will be used as the main startup software images at the next reboot on slot 2. The images that have passed all examinations will be used as the main startup software images at the next reboot on slot 3.
Copying main startup software images to slot 1. Please wait... Done. Setting copied images as main startup software images for slot 1... Done. Successfully updated the startup software images of slot 1. Related commands display boot-loader install commit bootrom update Use bootrom update to load the BootWare image on the default file system to the Normal area of BootWare.
display boot-loader Use display boot-loader to display current software images and startup software images. Syntax display boot-loader [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies the member ID of an IRF member device. If you do not specify a member device, this command displays the software images on each IRF member device.
# Display detailed information about active software images. <Sysname> display install active verbose Active packages on slot 1: flash:/boot.bin [Package] Vendor: HPE Product: 5940 Service name: boot Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component]...
(if any) can have a maximum of 63 characters. For more information about specifying a file, see file system management in Fundamentals Configuration Guide. Examples # Display information about .ipe file flash:/test.ipe. <Sysname> display install ipe-info flash:/test.ipe Verifying the file flash:/test.ipe on slot 1....Done. HPE FF 5940 48XGT 6QSFP+ images in IPE: boot.bin...
Examples # Display all ISSU log entries. <Sysname> display install log Install job 1 started by user root at 04/28/2001 08:39:29. Job 1 completed successfully at 04/28/2001 08:39:30. Install job 1 started by user root at 04/28/2001 08:39:29. Install activate flash:/feature1.bin on slot 1 Job 1 completed successfully at 04/28/2001 08:39:30.
Syntax display install rollback [ point-id ] Views Any view Predefined user roles network-admin network-operator Parameters point-id: Specifies a rollback point ID. If you do not specify a rollback point ID, the command displays all rollback points. Usage guidelines Use this command to identify available rollback points during an ISSU that uses install commands. The system does not record rollback points during an ISSU that uses issu commands.
# Display the software image file that includes pkg_ctr. <Sysname> display install which file pkg_ctr Verifying the file flash:/system-t0001015.bin on slot 1......Done. Found pkg_ctr in flash:/system-t0001015.bin on slot 1. flash:/system-t0001015.bin [Package] Vendor: HPE Product: 5940 Service name: system Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu Verifying the file flash:/boot-d2601007.bin on slot 1..Done.
Views Any view Predefined user roles network-admin network-operator Usage guidelines Change to the automatic rollback interval does not take effect on the ongoing ISSU process. The current remaining rollback time might be greater than the specified automatic rollback interval. Examples # Display automatic rollback timer information after the issu run switchover command is executed.
Page 201
ISSU state: Init Compatibility: Unknown Work state: Normal Upgrade method: Card by card Upgraded slot: None Current upgrading slot: None Current version list: boot: 7.1.070, Test 0001015 system: 7.1.070, Test 0001015 feature1: 7.1.070, Test 0001015 Current software images: flash:/boot-t0001015.bin flash:/system-t0001015.bin flash:/feature1-t0001015.bin # Display ISSU status information while the issu load command is being executed.
Page 202
Table 29 Command output Field Description ISSU status: • Init—The ISSU process has not started or has finished. • Loading—The system is executing the issu load command. • Loaded—The issu load command is completed. • Switching—The system is executing the issu run switchover command. ISSU state •...
Related commands issu accept issu commit issu load issu rollback issu run switchover display version comp-matrix Use display version comp-matrix to display version compatibility information and identify the recommended upgrade method. Syntax display version comp-matrix display version comp-matrix file { boot filename | system filename | feature filename&<1-30> } * display version comp-matrix file ipe ipe-filename Views Any view...
Page 204
Boot image: flash:/boot-t0001015.bin Version: 7.1.070 System image: flash:/system-t0001015.bin Version: 7.1.070-Test 0001015 Version compatibility list: 7.1.070-Test 0001015 Version dependency boot list: 7.1.070 Feature image: flash:/feature1-t0001015.bin Version: 7.1.070-Test 0001015 Version compatibility list: 7.1.070-Test 0001015 Version dependency system list: 7.1.070-Test 0001015 # Display compatibility information for upgrade images as well as the recommended ISSU method. (In this example, the specified images are compatible with the running images.) <Sysname>...
Table 30 Command output Field Description Verifying the file The system was verifying the validity of the file. • Under a system image, this field shows all system image versions that are compatible with the system image. Version compatibility list •...
Examples # Abort all ongoing software image activate and deactivate operations. <Sysname> install abort Related commands display install job install activate Use install activate to activate software images, or identify the ISSU method and the possible impact on the device. Syntax install activate { boot filename | system filename | feature filename&<1-30>...
Page 207
Examples # Identify the ISSU method for feature upgrade with feature1.bin on subordinate member 2 and the upgrade impact. <Sysname> install activate feature flash:/feature1.bin slot 2 test Copying file flash:/feature1.bin to slot2#flash:/feature1.bin..Done. Verifying the file flash:/feature1.bin on slot 2..Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version...
Field Description New Version Version number of the new software. ISSU methods: • Service Upgrade. • File Upgrade. • Upgrade Way Reboot. This field is displayed only for an upgrade to a compatible version. For more information about ISSU methods, see Fundamentals Configuration Guide.
install commit Use install commit to commit software changes. Syntax install commit Views User view Predefined user roles network-admin Usage guidelines This command modifies the main startup software image list to be the same as the current software image list. You must execute this command after using the following commands: •...
Parameters feature: Specifies a space-separated list of up to 30 feature image files. patch: Specifies a space-separated list of up to 30 patch image files. filename: Specifies a .bin file in the filesystemname/filename.bin format. The value string can have a maximum of 63 characters.
Usage guidelines This command permanently deletes the image files from the device. You cannot use the install rollback to command to revert the operation, or use the install abort command to abort the operation. Examples # Delete inactive software image file flash:/feature1.bin. <Sysname>...
Updating from no package to flash:/feature1-t0001015.bin. The output shows that currently three image files are active but only two of them are confirmed. Image file flash:/feature1-t0001015.bin is not confirmed yet. <Sysname> install rollback to original This operation might take several minutes, please wait...Done. <Sysname>...
Verifying packages on slot 1: Start to check active package completeness. Verifying the file flash:/boot-t0001015.bin on slot 1.....Done. flash:/boot-t0001015.bin verification successful. Verifying the file flash:/system-t0001015.bin on slot 1.....Done. flash:/system-t0001015.bin verification successful. Start to check active package consistency. Active packages are consistent with committed packages on their own board. Active packages are consistent with the reference packages.
Page 214
Syntax issu commit slot slot-number Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies the member ID of the original master or a subordinate member that has not been upgraded. Usage guidelines At reboot, a subordinate device automatically synchronizes the master device's configuration and status data.
Verifying the file flash:/feature1.bin on slot 1....Done. Copying file flash:/feature1.bin to slot1#flash:/feature1.bin...Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version Test 0001015 Test 0001016 Slot Upgrade Way Service Upgrade Upgrading software images to compatible versions. Continue? [Y/N]:y This operation might take several minutes, please wait...Done.
Page 216
one member ID for a compatible upgrade and can specify multiple member IDs for an incompatible upgrade. As a best practice, specify half of the subordinate members if the member devices form a ring. Make sure the specified subordinate members are directly connected by physical links. reboot: Uses the reboot method for the upgrade.
Page 217
Identifying the upgrade methods….Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version Test 0001015 Test 0001016 Slot Upgrade Way Reboot Upgrading software images to compatible versions. Continue? [Y/N]:y This operation might take several minutes, please wait...Done. # Upgrade member devices 3 and 4 (subordinate members) with feature image file flash:/feature1.bin.
issu rollback Use issu rollback to cancel the ISSU and roll back to the original software versions. Syntax issu rollback Views User view Predefined user roles network-admin Usage guidelines The device supports automatic rollback and manual rollback. This command performs a manual rollback.
Default The automatic rollback timer is set to 45 minutes. Views System view Predefined user roles network-admin Parameters minutes: Specifies the automatic rollback interval, in the range of 0 to 120 minutes. Setting it to 0 disables automatic rollback. Usage guidelines The automatic software version rollback feature is only available during an ISSU to a compatible version when the IRF fabric has multiple members.
Page 220
At reboot, a subordinate device automatically synchronizes the master device's configuration and status data. You must wait for the synchronization to complete before using the issu run switchover command on the subordinate device. To identify whether the synchronization is complete, use the display system stable state command.
Field Description Switchover method: • Active standby process switchover—Switch from the active process to the Switchover Way standby process. • Master subordinate switchover—Switch from the master to a subordinate member. For more information about the command output, see Table Related commands issu load reset install log-history oldest Use reset install log-history oldest to clear ISSU log entries.
Page 222
Usage guidelines This command clears the specified rollback point and all rollback points older than the specified rollback point. Examples # Clear rollback point 2 and all rollback points older than rollback point 2. <Sysname> reset install rollback oldest 2 Related commands display install rollback...
Device management commands clock datetime Use clock datetime to set the system time. Syntax clock datetime time date Default The system time is UTC time 00:00:00 01/01/2011. Views User view Predefined user roles network-admin Parameters time: Specifies a time in the hh:mm:ss format. The value range for hh is 0 to 23. The value range for mm is 0 to 59.
Syntax clock protocol { none | ntp } undo clock protocol Default The device obtains its time through NTP. Views System view Predefined user roles network-admin Parameters none: Uses the system time set by using the clock datetime command. ntp: Uses NTP to obtain the UTC time. You must configure NTP correctly. For more information about NTP and NTP configuration, see Network Management and Monitoring Configuration Guide.
Page 225
Predefined user roles network-admin Parameters name: Specifies a name for the daylight saving time schedule, a case-sensitive string of 1 to 32 characters. start-time: Specifies the start time in the hh:mm:ss format. The value range for hh is 0 to 23. The value range for mm is 0 to 59.
Related commands clock datetime clock timezone display clock clock timezone Use clock timezone to set the time zone. Use undo clock timezone to restore the default. Syntax clock timezone zone-name { add | minus } zone-offset undo clock timezone Default The Greenwich Mean Time time zone is used.
command Use command to assign a command to a job. Use undo command to revoke a command. Syntax command id command undo command id Default No command is assigned to a job. Views Job view Predefined user roles network-admin Parameters id: Specifies an ID for the command, in the range of 0 to 4294967295.
<Sysname> display alarm Slot CPU Level Info ERROR faulty Table 34 Command output Field Description Slot that generated the alarm. If the alarm was generated by the chassis, this field Slot displays a hyphen (-). Alarm severity. Possible values include ERROR, WARNING, NOTICE, and INFO, in Level descending order.
Related commands clock datetime clock timezone clock summer-time display copyright Use display copyright to display the copyright statement. Syntax display copyright Views Any view Predefined user roles network-admin network-operator Examples # Display the copyright statement. <Sysname> display copyright display cpu-usage Use display cpu-usage to display the current CPU usage statistics.
1% in last 5 minutes # Display the current CPU usage statistics in table form. <Sysname> display cpu-usage Slot CPU Last 5 sec Last 1 min Last 5 min Table 35 Command output Field Description x% in last 5 seconds Average CPU usage during the most recent 5-second interval.
Page 232
Syntax display cpu-usage history [ job job-id ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin network-operator Parameters job job-id: Specifies a process by its ID. The value range for job-id is 1 to 2147483647. If you do not specify a process, this command displays the statistics for the entire system's CPU usage (the total CPU usage of all processes).
35%| 30%| 25%| 20%| 15%| 10%| ######## ------------------------------------------------------------ (minutes) cpu-usage (Slot 1 CPU 0) last 60 minutes (SYSTEM) The output shows the following items: • Process name. The name SYSTEM represents the entire system. • CPU that is holding the process: CPU 0 in slot 1. •...
This option is available only on the HPE FlexFabric 5940 2-slot Switch (JH397A) and HPE FlexFabric 5940 4-slot Switch (JH398A). verbose: Displays detailed hardware information. If you do not specify this keyword, this command displays brief information.
component during hardware debugging or testing. This command displays only part of the electronic label information. Examples # Display electronic label information for the device. <Sysname> display device manuinfo display device manuinfo fan Use display device manuinfo fan to display electronic label information for a fan tray. Syntax display device manuinfo slot slot-number fan fan-id Views...
display diagnostic-information Use display diagnostic-information to display or save operating information for features and hardware modules. Syntax display diagnostic-information [ hardware | infrastructure | l2 | l3 | service ] [ key-info ] [ filename ] Views Any view Predefined user roles network-admin network-operator Parameters...
than signs (>), and pipeline signs (|). For example, if the device name is A/B, the device name in the file name will be A_B, as in flash:/diag_A_B_20160101-000438.tar.gz. This command does not support the |, >, and >> options. While the device is executing this command, do not execute any other commands. Executing other commands might affect the collected operating information.
Parameters slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays temperature information for all member devices. Examples # Display information about all temperature sensors on the device. <Sysname>...
Parameters slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays fan tray operating status information for all member devices. fan-id: Specifies a fan tray by its ID. If you do not specify a fan tray, this command displays operating status information for all fan trays at the specified position.
<Sysname> display hardware-resource switch-mode Switch-mode resource(switch-mode), all supported modes: MAC table is 288K, L3 host table is 16K, LPM Table is 16K MAC table is 224K, L3 host table is 80K, LPM Table is 16K MAC table is 160K, L3 host table is 144K, LPM Table is 16K MAC table is 96K, L3 host table is 208K, LPM Table is 16K MAC table is 32K, L3 host table is 16K, LPM Table is 128K -----------------------------------------------...
Slot CPU Total Used Free Buffers Caches FreeRatio 3293028 1132336 2160692 1104 263004 65.6% Table 39 Command output Field Description Memory usage information. Total size of the physical memory space that can be allocated. The memory space is virtually divided into two parts. Part 1 is solely used for kernel Total code, kernel management, and ISSU functions.
Memory usage threshold: 100% Free memory threshold: Minor: 64M Severe: 48M Critical: 32M Normal: 96M Current memory state: Normal Event statistics: [Back to normal state] First notification: 2015-5-15 09:21:35.546 Latest notification: 2015-5-15 09:21:35.546 Total number of notifications sent: 1 [Enter minor low-memory state] First notification at: 2015-5-15 09:07:05.941 Latest notification at: 2015-5-15 09:07:05.941 Total number of notifications sent: 1...
power-id: Specifies a power supply by its ID. If you do not specify a power supply, this command displays information about all power supplies at the specified position. Examples # Display power supply information. <Sysname> display power Slot 9: Input Power: 136(W) PowerID State Mode Current(A)
Views Any view Predefined user roles network-admin network-operator Examples # Display job execution log information. <Sysname> display scheduler logfile Logfile Size: 1902 Bytes. Job name : shutdown Schedule name : shutdown Execution time : Tue Dec 27 10:44:42 2015 Completion time : Tue Dec 27 10:44:47 2015 --------------------------------- Job output ----------------------------------- <Sysname>system-view System View: return to User View with Ctrl+Z.
Examples # Display the automatic reboot schedule. <Sysname> display scheduler reboot System will reboot at 16:32:00 05/23/2015 (in 1 hours and 39 minutes). Related commands scheduler reboot at scheduler reboot delay display scheduler schedule Use display scheduler schedule to display schedule information. Syntax display scheduler schedule [ schedule-name ] Views...
Field Description Number of times the schedule has been executed. If the schedule has never been Execution counts executed, this field is not displayed. Job name Name of a job under the schedule. Result of the most recent execution: • Successful.
Table 42 Command output Field Description System status: • Stable—The system is operating stably. System state • Not ready—The system is not operating stably. You cannot perform an ISSU when the system is in this state. System redundancy status: • Stable—Member devices are operating stably.
display transceiver alarm Use display transceiver alarm to display transceiver alarms. Syntax display transceiver alarm interface [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface [ interface-type interface-number ]: Specifies an interface by its type and number. If no interface is specified, this command displays the alarms present on every transceiver module.
display transceiver diagnosis Use display transceiver diagnosis to display the current values of the digital diagnosis parameters on transceiver modules. Syntax display transceiver diagnosis interface [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface [ interface-type interface-number ]: Specifies an interface by its type and number. If no interface is specified, this command displays the current values of the digital diagnosis parameters on every transceiver module.
Views Any view Predefined user roles network-admin network-operator Parameters interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, this command displays the key parameters of every transceiver module. Examples # Display the key parameters of the transceiver module in interface Ten-GigabitEthernet 1/0/1. <Sysname>...
network-operator Examples # Display system version information. <Sysname> display version display version-update-record Use display version-update-record to display startup software image upgrade records. Syntax display version-update-record Views Any view Predefined user roles network-admin network-operator Usage guidelines The device records its current startup software version information whenever it starts up, and records all software version update information.
Syntax fan prefer-direction slot slot-number { power-to-port | port-to-power } undo fan prefer-direction slot slot-number Default The preferred airflow direction is from the power supply side to the port side. Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its member ID. power-to-port: Specifies the airflow direction from the power supply side to the port side.
Usage guidelines The switch supports multiple hardware resource modes for the MAC address table, ARP/ND table, and routing tables. The capacities of the MAC address table, ARP/ND table, and routing tables vary by hardware resource mode. For table capacities in different scenarios, see Fundamentals Configuration Guide.
Examples # Configure the legal banner. <Sysname> system-view [Sysname] header legal Please input banner content, and quit with the character '%'. Welcome to use the legal banner% Use job to assign a job to a schedule. Use undo job to revoke a job. Syntax job job-name undo job job-name...
undo memory-threshold [ slot slot-number [ cpu cpu-number ] ] Default • Minor alarm threshold: 96 MB. • Severe alarm threshold: 64 MB. • Critical alarm threshold: 48 MB. • Normal state threshold: 128 MB. Views System view Predefined user roles network-admin Parameters minor minor-value: Specifies the minor alarm threshold.
Syntax memory-threshold [ slot slot-number [ cpu cpu-number ] ] usage memory-threshold undo memory-threshold [ slot slot-number [ cpu cpu-number ] ] usage Default The memory usage threshold is 100%. Views System view Predefined user roles network-admin Parameters memory-threshold: Specifies the memory usage threshold in percentage. The value range is 0 to 100.
cpu cpu-number: Specifies a CPU by its number. Usage guidelines After CPU usage monitoring is enabled, the system samples and saves CPU usage at the interval specified by the monitor cpu-usage interval command. You can use the display cpu-usage history command to view recent CPU usage. Examples # Enable CPU usage monitoring.
monitor cpu-usage threshold Use monitor cpu-usage threshold to set the CPU usage threshold. Use undo monitor cpu-usage threshold to restore the default. Syntax monitor cpu-usage threshold cpu-threshold [ slot slot-number [ cpu cpu-number ] ] undo monitor cpu-usage threshold [ slot slot-number [ cpu cpu-number ] ] Default The CPU usage threshold is 99%.
Specifies a subcard by its subslot number. This option is available only on the HPE FlexFabric 5940 2-slot Switch (JH397A) and HPE FlexFabric 5940 4-slot Switch (JH398A). force: Reboots the device immediately without performing software or hard disk check. If this keyword is not specified, the system first identifies whether the reboot might result in data loss or a system failure.
To reboot all member devices, do not specify the slot number option. To reboot an IRF member device, specify the slot number and do not specify a subslot number. To reboot the master, perform the following tasks: • Identify whether the IRF fabric has subordinate members and whether the subordinate members are operating correctly.
Related commands reboot scheduler job Use scheduler job to create a job and enter its view, or enter the view of an existing job. Use undo scheduler job to delete a job. Syntax scheduler job job-name undo scheduler job job-name Default No job exists.
Parameters value: Specifies the size of the job execution log file, in KB. The value range is 16 to 1024. Usage guidelines The job execution log file saves the execution information of jobs. If the file is full, old records are deleted to make room for new records.
For data security, the system does not reboot at the reboot time if a file operation is being performed. Examples # Configure the device to reboot at 12:00 p.m. This example assumes that the current time is 11:43 a.m. on June 6, 2015. <Sysname>...
Use undo scheduler schedule to delete a schedule. Syntax scheduler schedule schedule-name undo scheduler schedule schedule-name Default No schedule exists. Views System view Predefined user roles network-admin Parameters schedule-name: Specifies the schedule name, a case-sensitive string of 1 to 47 characters. Usage guidelines You can configure a schedule to have the device automatically run a command or a set of commands without administrative interference.
Use sysname to set the device name. Use undo sysname to restore the default. Syntax sysname sysname undo sysname Default The device name is HPE. Views System view Predefined user roles network-admin Parameters sysname: Specifies a name for the device, a string of 1 to 64 characters.
Examples # Set the name of the device to R2000. <Sysname> system-view [Sysname] sysname R2000 [R2000] system-working-mode Use system-working-mode to set the system operating mode. Use undo system-working-mode to restore the default. Syntax system-working-mode { advance | standard } undo system-working-mode Default The device operates in standard mode.
Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its member ID. hotspot: Configures temperature alarm thresholds for hotspot sensors. A hotspot sensor is typically near the chip that generates a great amount of heat and used to monitor the chip. sensor-number: Specifies a sensor by its number.
Predefined user roles network-admin Parameters time: Specifies the schedule execution time in the hh:mm format. The value range for hh is 0 to 23. The value range for mm is 0 to 59. date: Specifies the schedule execution date in the MM/DD/YYYY or YYYY/MM/DD format. The value range for YYYY is 2000 to 2035.
delay time: Specifies the delay time for executing the schedule, in the hh:mm or mm format. This argument can have up to six characters. When in the hh:mm format, mm must be in the range of 0 to Usage guidelines If the specified time has already occurred, the schedule will be executed at the specified time the following day.
Page 271
Views Schedule view Predefined user roles network-admin Parameters at time: Specifies the execution time in the hh:mm format. The value range for hh is 0 to 23. The value range for mm is 0 to 59. If you do not specify this option, the current system time is used as the execution time.
<Sysname> system-view [Sysname] scheduler schedule saveconfig [Sysname-schedule-saveconfig] time repeating at 8:00 week-day fri sat Related commands scheduler schedule usb disable Use usb disable to disable USB interfaces. Use undo usb disable to enable USB interfaces. Syntax usb disable undo usb disable Default All USB interfaces are enabled.
Page 273
Parameters role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. The user role can be user-defined or predefined. Predefined user roles include network-admin, network-operator, and level-0 to level-15. Usage guidelines A schedule must have one or more user roles. A command in a schedule can be executed if it is permitted by one or more user roles of the schedule.
Tcl commands Use cli to enable a Comware command to be executed in Tcl configuration view when it conflicts with a Tcl command. Syntax cli command Views Tcl configuration view Predefined user roles network-admin Parameters command: Specifies the commands to be executed. They must be complete command lines. Usage guidelines In Tcl configuration view, if a Comware command conflicts with a Tcl command, the Tcl command will be executed.
Views Tcl configuration view Predefined user roles network-admin Usage guidelines To return from Tcl configuration view to user view, you can also use the quit command. To return to the upper-level view after you execute Comware commands to enter system view or a Comware feature view, use the quit command.
Python commands exit() Use exit() to exit the Python shell. Syntax exit() Views Python shell Predefined user roles network-admin Usage guidelines To return to user view from the Python shell, you cannot use the quit command. You must use the exit() command.
Type "help", "copyright", "credits" or "license" for more information. >>> python filename Use python filename to execute a Python script. Syntax python filename [ param ] Views User view Predefined user roles network-admin Parameters filename: Specifies the name of a Python script on a storage medium of the device. The script name is case sensitive and must use the extension .py.
Preprovisioning commands display provision failed-config Use display provision failed-config to display preprovisioned-commands application failure records. Syntax display provision failed-config Views Any view Predefined user roles network-admin network-operator Usage guidelines A preprovisioned command cannot be applied if it conflicts with the running configuration. Use this command to verify the application result of preprovisioned commands except for the following commands: •...
When you disable preprovisioning on a subslot, the device removes preconfigured settings for the subslot. Examples # Enable preprovisioning for the HPE FlexFabric 5940 2-slot Switch (JH397A) on a slot. <Sysname> system-view [Sysname] slot 2 [Sysname-slot-2] provision model 5940 2-slot...
Predefined user roles network-admin Usage guidelines Preprovisioned modules that repeatedly come online and go offline (or join and leave the IRF fabric) might leave a number of preprovisioned-commands application failure records in memory. To release the occupied memory space, execute the reset provision failed-config command. Examples # Clear preprovisioned-commands application failure records.
Document conventions and icons Conventions This section describes the conventions used in the documentation. Command conventions Convention Description Bold text represents commands and keywords that you enter literally as shown. Boldface Italic text represents arguments that you replace with actual values. Italic Square brackets enclose syntax choices (keywords or arguments) that are optional.
Network topology icons Convention Description Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: www.hpe.com/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: www.hpe.com/support/hpesc Information to collect •...
For more information and device support details, go to the following website: www.hpe.com/info/insightremotesupport/docs Documentation feedback Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title,...
Page 285
part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page.
Index A B C D E F G H I J L M N O P Q R S T U V description,14 dir,138 activation-key,45 dir,104 alias,1 disconnect,105 append,99 display | { begin | exclude | include archive configuration,155 display | by-linenum,3 archive configuration interval,155...
Page 287
display ip http,52 ftp client source,108 display ip https,52 ipv6,109 display issu rollback-timer,191 ftp server acl,95 display issu state,192 ftp server dscp,95 display line,53 ftp server enable,96 display memory,232 ftp server ipv6 dscp,96 display memory-threshold,233 ftp server ssl-server-policy,97 display power,234 timeout,98 display provision failed-config,270...
Need help?
Do you have a question about the FlexFabric 5940 Series and is the answer not in the manual?
Questions and answers