advertisement
Layer 2
Ethernet Switch
AT-8000S Ser ies
CLI Reference Guide
Allied Telesis AT-8000S Command Line Interface User’s Guide
Table of Contents
Preface ................................................................................................................................... 1
Intended Audience........................................................................................................................... 2
Document Conventions ................................................................................................................... 3
Contacting Allied Telesis ................................................................................................................. 4
Chapter 1.Using the CLI ....................................................................................................... 5
Overview ................................................................................................................................................5
CLI Command Modes...................................................................................................................... 5
Introduction ................................................................................................................................................5
User EXEC Mode ......................................................................................................................................5
Privileged EXEC Mode ..............................................................................................................................5
Global Configuration Mode ........................................................................................................................6
Interface Configuration and Specific Configuration Modes........................................................................7
Starting the CLI................................................................................................................................ 8
Editing Features .............................................................................................................................. 9
Entering Commands ..................................................................................................................................9
Terminal Command Buffer ...................................................................................................................9
Negating the Effect of Commands .....................................................................................................10
Command Completion........................................................................................................................10
Nomenclature .....................................................................................................................................10
Keyboard Shortcuts............................................................................................................................10
CLI Command Conventions ...............................................................................................................11
Copying and Pasting Text........................................................................................................................11
Chapter 2.ACL Commands ................................................................................................ 12 ip access-list.........................................................................................................................................12
permit (ip) .............................................................................................................................................12
deny (IP)...............................................................................................................................................15
mac access-list.....................................................................................................................................17
permit (MAC)........................................................................................................................................18
deny (MAC) ..........................................................................................................................................19
service-acl ............................................................................................................................................20
show access-lists .................................................................................................................................20
show interfaces access-lists.................................................................................................................21
Chapter 3.AAA Commands ................................................................................................ 23 aaa authentication login .......................................................................................................................23
aaa authentication enable ....................................................................................................................24
login authentication ..............................................................................................................................25
enable authentication ...........................................................................................................................26
ip http authentication ............................................................................................................................26
Page i
Allied Telesis
Command Line Interface User’s Guide ip https authentication.......................................................................................................................... 27 show authentication methods .............................................................................................................. 28 password ............................................................................................................................................. 29 username............................................................................................................................................. 29 show users accounts ........................................................................................................................... 30 enable password ................................................................................................................................. 31
Chapter 4.Address Table Commands............................................................................... 33 bridge address..................................................................................................................................... 33 bridge multicast filtering....................................................................................................................... 33 bridge multicast address...................................................................................................................... 34 bridge multicast forbidden address...................................................................................................... 35 bridge multicast forward-all.................................................................................................................. 36 bridge multicast forbidden forward-all.................................................................................................. 36 bridge aging-time................................................................................................................................. 37 clear bridge.......................................................................................................................................... 38 port security ......................................................................................................................................... 38 port security mode ............................................................................................................................... 39 port security max ................................................................................................................................. 40 port security routed secure-address .................................................................................................... 40 show bridge address-table .................................................................................................................. 41 show bridge address-table static ......................................................................................................... 42 show bridge address-table count......................................................................................................... 43 show bridge multicast address-table ................................................................................................... 44 show bridge multicast address-table static.......................................................................................... 46 show bridge multicast filtering ............................................................................................................. 46 show ports security.............................................................................................................................. 48 show ports security addresses ............................................................................................................ 49
Chapter 5.Clock Commands.............................................................................................. 51 clock set............................................................................................................................................... 51 clock source......................................................................................................................................... 51 clock timezone..................................................................................................................................... 52 clock summer-time .............................................................................................................................. 53 sntp authentication-key........................................................................................................................ 54 sntp authenticate ................................................................................................................................. 55 sntp trusted-key ................................................................................................................................... 55 sntp client poll timer............................................................................................................................. 56 sntp broadcast client enable................................................................................................................ 56 sntp anycast client enable ................................................................................................................... 57 sntp client enable (Interface) ............................................................................................................... 58 sntp unicast client enable .................................................................................................................... 58 sntp unicast client poll ......................................................................................................................... 59 sntp server........................................................................................................................................... 59 show clock ........................................................................................................................................... 60 show sntp configuration....................................................................................................................... 61 show sntp status.................................................................................................................................. 62
Page ii
Not approved by Document Control. For review only.
Chapter 6.Configuration and Image File Commands ...................................................... 64 copy......................................................................................................................................................64
dir .........................................................................................................................................................66
delete ...................................................................................................................................................67
boot system..........................................................................................................................................68
show running-config .............................................................................................................................68
show startup-config ..............................................................................................................................69
show bootvar........................................................................................................................................70
Chapter 7.DHCP Option 82 Commands ............................................................................ 71 ip dhcp information option ....................................................................................................................71
show ip dhcp information option...........................................................................................................71
ip dhcp relay enable .............................................................................................................................72
Chapter 8.DHCP Snooping Commands ............................................................................ 73 ip dhcp snooping ..................................................................................................................................73
ip dhcp snooping vlan ..........................................................................................................................73
ip dhcp snooping trust ..........................................................................................................................74
ip dhcp snooping information option allowed-untrusted .......................................................................75
ip dhcp snooping verify ........................................................................................................................75
ip dhcp snooping database ..................................................................................................................76
ip dhcp snooping database update-freq...............................................................................................76
ip dhcp snooping binding .....................................................................................................................77
clear ip dhcp snooping database .........................................................................................................78
show ip dhcp snooping binding ............................................................................................................78
Chapter 9.Ethernet Configuration Commands................................................................. 80 interface ethernet .................................................................................................................................80
interface range ethernet .......................................................................................................................80
shutdown..............................................................................................................................................81
description............................................................................................................................................82
speed ...................................................................................................................................................82
duplex...................................................................................................................................................83
negotiation............................................................................................................................................84
flowcontrol ............................................................................................................................................84
mdix......................................................................................................................................................85
back-pressure ......................................................................................................................................86
clear counters.......................................................................................................................................86
set interface active ...............................................................................................................................87
show interfaces advertise.....................................................................................................................87
show interfaces configuration...............................................................................................................88
show interfaces status..........................................................................................................................90
show interfaces description..................................................................................................................91
show interfaces counters .....................................................................................................................92
show system flowcontrol ......................................................................................................................94
port storm-control include-multicast (IC) ..............................................................................................95
port storm-control broadcast enable ....................................................................................................95
Page iii
Allied Telesis
Command Line Interface User’s Guide port storm-control broadcast rate ........................................................................................................ 96 show ports storm-control ..................................................................................................................... 97
Chapter 10.GVRP Commands............................................................................................ 98 gvrp enable (Global) ............................................................................................................................ 98 gvrp enable (Interface) ........................................................................................................................ 98 garp timer ............................................................................................................................................ 99 gvrp vlan-creation-forbid.................................................................................................................... 100 gvrp registration-forbid....................................................................................................................... 100 clear gvrp statistics ............................................................................................................................ 101 show gvrp configuration..................................................................................................................... 101 show gvrp statistics ........................................................................................................................... 102 show gvrp error-statistics................................................................................................................... 103
Chapter 11.IGMP Snooping Commands......................................................................... 105 ip igmp snooping (Global).................................................................................................................. 105 ip igmp snooping (Interface) .............................................................................................................. 105 ip igmp snooping mrouter learn-pim-dvmrp ....................................................................................... 106 ip igmp snooping host-time-out ......................................................................................................... 107 ip igmp snooping querier enable ....................................................................................................... 107 ip igmp snooping querier address ..................................................................................................... 108 ip igmp snooping querier version....................................................................................................... 109 ip igmp snooping mrouter-time-out.................................................................................................... 109 ip igmp snooping leave-time-out........................................................................................................ 110 show ip igmp snooping mrouter......................................................................................................... 111 show ip igmp snooping interface ....................................................................................................... 112 show ip igmp snooping groups .......................................................................................................... 113
Chapter 12.IP Addressing Commands............................................................................ 114 ip address .......................................................................................................................................... 114 ip address dhcp ................................................................................................................................. 114 ip default-gateway ............................................................................................................................. 115 show ip interface................................................................................................................................ 116 arp ..................................................................................................................................................... 117 arp timeout......................................................................................................................................... 117 clear arp-cache.................................................................................................................................. 118 show arp ............................................................................................................................................ 119 ip domain-lookup
............................................................................................................................. 119 ip domain-name................................................................................................................................. 120 ip name-server................................................................................................................................... 121 ip host ................................................................................................................................................ 121 clear host ........................................................................................................................................... 122 clear host dhcp .................................................................................................................................. 122 show hosts......................................................................................................................................... 123
Chapter 13.Line Commands ............................................................................................ 125 line ..................................................................................................................................................... 125
Page iv
Not approved by Document Control. For review only.
speed .................................................................................................................................................125
autobaud ............................................................................................................................................126
exec-timeout.......................................................................................................................................127
history.................................................................................................................................................127
history size .........................................................................................................................................128
terminal history...................................................................................................................................128
terminal history size ...........................................................................................................................129
show line ............................................................................................................................................129
Section 14.LACP Commands........................................................................................... 131 lacp system-priority ............................................................................................................................131
lacp port-priority .................................................................................................................................132
lacp timeout........................................................................................................................................133
show lacp ethernet .............................................................................................................................134
show lacp port-channel ......................................................................................................................136
Chapter 15.Management ACL Commands ..................................................................... 137 management access-list ....................................................................................................................137
permit (Management).........................................................................................................................138
deny (Management) ...........................................................................................................................139
management access-class.................................................................................................................139
show management access-list ...........................................................................................................140
show management access-class .......................................................................................................141
Chapter 16.PHY Diagnostics Commands ....................................................................... 142 test copper-port tdr.............................................................................................................................142
show copper-ports tdr ........................................................................................................................142
show copper-ports cable-length .........................................................................................................143
Chapter 17.Port Channel Commands ............................................................................. 145 interface port-channel ........................................................................................................................145
interface range port-channel ..............................................................................................................145
channel-group ....................................................................................................................................146
show interfaces port-channel .............................................................................................................146
Chapter 18.Port Monitor Commands .............................................................................. 148 port monitor ........................................................................................................................................148
show ports monitor.............................................................................................................................149
Chapter 19.Power over Ethernet Commands................................................................. 150 power inline ........................................................................................................................................150
power inline powered-device..............................................................................................................150
power inline priority ............................................................................................................................151
power inline usage-threshold .............................................................................................................152
power inline traps enable ...................................................................................................................152
show power inline...............................................................................................................................153
Page v
Allied Telesis
Command Line Interface User’s Guide
Chapter 20.QoS Commands ............................................................................................ 156 qos..................................................................................................................................................... 156 show qos ........................................................................................................................................... 156 priority-queue out num-of-queues ..................................................................................................... 157 rate-limit............................................................................................................................................. 157 traffic-shape....................................................................................................................................... 158 show qos interface............................................................................................................................. 158 wrr-queue cos-map............................................................................................................................ 159 qos wrr-queue threshold.................................................................................................................... 160 qos trust(Global) ................................................................................................................................ 161 qos map dscp-queue ......................................................................................................................... 162 qos cos .............................................................................................................................................. 162 show qos map ................................................................................................................................... 163
Chapter 21.Radius Commands........................................................................................ 165 radius-server host.............................................................................................................................. 165 radius-server key ............................................................................................................................... 166 radius-server retransmit..................................................................................................................... 166 radius-server source-ip...................................................................................................................... 167 radius-server timeout......................................................................................................................... 168 radius-server deadtime...................................................................................................................... 168 show radius-servers .......................................................................................................................... 169
Chapter 22.RMON Commands......................................................................................... 170 show rmon statistics .......................................................................................................................... 170 rmon collection history....................................................................................................................... 172 show rmon collection history ............................................................................................................. 172 show rmon history ............................................................................................................................. 173 rmon alarm ........................................................................................................................................ 176 show rmon alarm-table ...................................................................................................................... 177 show rmon alarm ............................................................................................................................... 178 rmon event......................................................................................................................................... 179 show rmon events ............................................................................................................................. 180 show rmon log ................................................................................................................................... 181 rmon table-size .................................................................................................................................. 182
Chapter 23.SNMP Commands ......................................................................................... 184 snmp-server community .................................................................................................................... 184 snmp-server view .............................................................................................................................. 185 snmp-server group ............................................................................................................................ 186 snmp-server user............................................................................................................................... 186 snmp-server engineID local............................................................................................................... 188 snmp-server enable traps.................................................................................................................. 189 snmp-server filter............................................................................................................................... 189 snmp-server host............................................................................................................................... 190 snmp-server v3-host.......................................................................................................................... 191 snmp-server trap authentication ........................................................................................................ 192
Page vi
Not approved by Document Control. For review only.
snmp-server contact...........................................................................................................................193
snmp-server location..........................................................................................................................193
snmp-server set .................................................................................................................................194
show snmp .........................................................................................................................................195
show snmp engineid ..........................................................................................................................196
show snmp views ...............................................................................................................................197
show snmp groups .............................................................................................................................197
show snmp filters ...............................................................................................................................198
show snmp users ...............................................................................................................................199
Chapter 24.Spanning-Tree Commands........................................................................... 200 spanning-tree .....................................................................................................................................200
spanning-tree mode ...........................................................................................................................200
spanning-tree forward-time ................................................................................................................201
spanning-tree hello-time.....................................................................................................................201
spanning-tree max-age ......................................................................................................................202
spanning-tree priority .........................................................................................................................203
spanning-tree disable.........................................................................................................................203
spanning-tree cost..............................................................................................................................204
spanning-tree port-priority ..................................................................................................................205
spanning-tree portfast ........................................................................................................................205
spanning-tree link-type.......................................................................................................................206
spanning-tree pathcost method..........................................................................................................206
spanning-tree bpdu ............................................................................................................................207
spanning-tree guard root....................................................................................................................208
spanning-tree bpduguard ...................................................................................................................208
clear spanning-tree detected-protocols..............................................................................................209
spanning-tree mst priority...................................................................................................................209
spanning-tree mst max-hops..............................................................................................................210
spanning-tree mst port-priority ...........................................................................................................210
spanning-tree mst cost.......................................................................................................................211
spanning-tree mst configuration.........................................................................................................212
instance (mst).....................................................................................................................................212
name (mst) .........................................................................................................................................213
revision (mst)......................................................................................................................................214
show (mst)..........................................................................................................................................214
exit (mst) ............................................................................................................................................215
abort (mst)..........................................................................................................................................216
show spanning-tree............................................................................................................................216
Chapter 25.SSH Commands ............................................................................................ 228 ip ssh port...........................................................................................................................................228
ip ssh server.......................................................................................................................................228
crypto key generate dsa.....................................................................................................................229
crypto key generate rsa......................................................................................................................229
ip ssh pubkey-auth .............................................................................................................................230
crypto key pubkey-chain ssh..............................................................................................................230
Page vii
Allied Telesis
Command Line Interface User’s Guide user-key............................................................................................................................................. 231 key-string ........................................................................................................................................... 232 show ip ssh........................................................................................................................................ 233 show crypto key mypubkey ............................................................................................................... 234 show crypto key pubkey-chain ssh.................................................................................................... 235
Chapter 26.Syslog Commands........................................................................................ 237 logging on .......................................................................................................................................... 237 logging ............................................................................................................................................... 237 logging console.................................................................................................................................. 238 logging buffered................................................................................................................................. 239 logging buffered size ......................................................................................................................... 239 clear logging ...................................................................................................................................... 240 logging file ......................................................................................................................................... 241 clear logging file................................................................................................................................. 241 aaa logging ........................................................................................................................................ 242 file-system logging............................................................................................................................. 242 management logging ......................................................................................................................... 243 show logging...................................................................................................................................... 244 show logging file ................................................................................................................................ 245 show syslog-servers .......................................................................................................................... 246
Chapter 27.TACACS+ Commands................................................................................... 248 tacacs-server host ............................................................................................................................. 248 tacacs-server key .............................................................................................................................. 249 tacacs-server timeout ........................................................................................................................ 249 tacacs-server source-ip ..................................................................................................................... 250 show tacacs....................................................................................................................................... 250
Chapter 28.System Management Commands................................................................ 252 ping.................................................................................................................................................... 252 reload................................................................................................................................................. 254 resume............................................................................................................................................... 254 hostname........................................................................................................................................... 255 stack master ...................................................................................................................................... 255 stack reload ....................................................................................................................................... 256 stack change unit-id........................................................................................................................... 257 show stack......................................................................................................................................... 258 show users ........................................................................................................................................ 259 show sessions ................................................................................................................................... 260 show system...................................................................................................................................... 261 show system id .................................................................................................................................. 262 show version...................................................................................................................................... 262 set system ......................................................................................................................................... 263
Chapter 29.User Interface Commands............................................................................ 265 enable................................................................................................................................................ 265
Page viii
Not approved by Document Control. For review only.
disable................................................................................................................................................265
login....................................................................................................................................................266
configure ............................................................................................................................................266
exit (Configuration).............................................................................................................................267
exit......................................................................................................................................................267
end .....................................................................................................................................................268
help ....................................................................................................................................................268
terminal datadump .............................................................................................................................269
show history .......................................................................................................................................270
show privilege ....................................................................................................................................270
Chapter 30.VLAN Commands .......................................................................................... 272 vlan database.....................................................................................................................................272
vlan.....................................................................................................................................................272
default-vlan vlan .................................................................................................................................273
interface vlan......................................................................................................................................273
interface range vlan............................................................................................................................274
name ..................................................................................................................................................275
switchport protected ...........................................................................................................................275
switchport mode .................................................................................................................................276
switchport access vlan .......................................................................................................................278
switchport trunk allowed vlan .............................................................................................................278
switchport trunk native vlan................................................................................................................279
switchport general allowed vlan .........................................................................................................279
switchport general pvid ......................................................................................................................280
switchport general ingress-filtering disable ........................................................................................281
switchport general acceptable-frame-type tagged-only .....................................................................281
switchport general map macs-group vlan ..........................................................................................282
map mac macs-group ........................................................................................................................283
show vlan macs-group .......................................................................................................................283
switchport forbidden vlan ...................................................................................................................284
ip internal-usage-vlan.........................................................................................................................285
show vlan ...........................................................................................................................................286
show vlan internal usage....................................................................................................................286
show interfaces switchport .................................................................................................................287
Chapter 31.Web Server Commands ................................................................................ 291 ip http server ......................................................................................................................................291
ip http port ..........................................................................................................................................291
ip http exec-timeout............................................................................................................................292
ip https server.....................................................................................................................................292
ip https port ........................................................................................................................................293
ip https exec-timeout ..........................................................................................................................293
crypto certificate generate..................................................................................................................294
crypto certificate request ....................................................................................................................295
crypto certificate import ......................................................................................................................296
ip https certificate ...............................................................................................................................297
Page ix
Allied Telesis
Command Line Interface User’s Guide show crypto certificate mycertificate .................................................................................................. 298 show ip http ....................................................................................................................................... 299 show ip https...................................................................................................................................... 299
Chapter 32. ........................................................................................ 802.1x Commands301 aaa authentication dot1x ................................................................................................................... 301 dot1x system-auth-control ................................................................................................................. 301 dot1x port-control............................................................................................................................... 302 dot1x re-authentication ...................................................................................................................... 303 dot1x timeout re-authperiod............................................................................................................... 303 dot1x re-authenticate......................................................................................................................... 304 dot1x timeout quiet-period ................................................................................................................. 304 dot1x timeout tx-period ...................................................................................................................... 305 dot1x max-req.................................................................................................................................... 306 dot1x timeout supp-timeout ............................................................................................................... 306 dot1x timeout server-timeout ............................................................................................................. 307 show dot1x ........................................................................................................................................ 308 show dot1x users............................................................................................................................... 310 show dot1x statistics.......................................................................................................................... 311 dot1x auth-not-req ............................................................................................................................. 313 dot1x guest-vlan ................................................................................................................................ 313 dot1x single-host-violation ................................................................................................................. 314 dot1x mac-authentication .................................................................................................................. 315 show dot1x advanced........................................................................................................................ 316 dot1x guest-vlan enable .................................................................................................................... 317
........................................................................................................................................................... 317
Index................................................................................................................................... 318
Page x
Not approved by Document Control. For review only.
Preface
Preface
This guide describes how to configure an AT-8000S Series switch using the command line interface. The commands are grouped by topic into the following chapters:
• Chapter 1. "Using the CLI"
— Describe the CLI basic structure and command usage.
• Chapter 2. "ACL Commands"
— Define MAC and IP based ACLs and ACL bindings.
• Chapter 3. "AAA Commands"
— Define the authentication method lists for servers.
• Chapter 4. "Address Table Commands"
— Register MAC-layer Multicast addresses, and handles MAClayer secure address to a routed port .
• Chapter 5. "Clock Commands"
— Show the configuration or status of the Simple Network Time Protocol
(SNTP).
• Chapter 6. "Configuration and Image File Commands"
— Display the contents of the currently running configuration file, specify contents of image files.
• Chapter 7. "DHCP Option 82 Commands"
— DHCP with Option 82 attaches authentication messages to the packets sent from the host. DHCP passes the configuration information to hosts on a TCP/IP network.
This permits network administrators to limit address allocation authorized hosts.
• Chapter 8. "DHCP Snooping Commands"
— Contains parameters for enabling DHCP Snooping on the device
• Chapter 9. "Ethernet Configuration Commands"
— Configure multiple Ethernet type interfaces.
• Chapter 10. "GVRP Commands"
— Display the GARP VLAN Registration Protocol (GVRP) configuration information, enable GVRP globally or on an interface.
• Chapter 11. "IGMP Snooping Commands"
— Enable the Internet Group Management Protocol (IGMP) snooping.
• Chapter 12. "IP Addressing Commands"
— Define a default gateway, set an IP address for interface, delete entries from the host.
• Chapter 13. "Line Commands"
— Display line parameters, enable the command history function, or configure the command history buffer size.— Configure system priority, physical port priority, assign
Page 1
Allied Telesis
Command Line Interface User’s Guide administrative LACP timeouts, display LACP information for Ethernet ports, and display LACP information for a port-channel.
• Chapter 15. "Management ACL Commands"
— Define a permit or deny a rule, or configure a management access control list.
• Chapter 16. "PHY Diagnostics Commands"
— Display the optical transceiver diagnostics.
• Chapter 17. "Port Channel Commands"
— Enter the interface configuration mode to configure a specific, or a multiple port-channel.
• Chapter 18. "Port Monitor Commands"
— Start a port monitoring session, or display the port monitoring status.
• Chapter 19. "Power over Ethernet Commands"
— Configure and display Power over Ethernet device settings.
• Chapter 20. "QoS Commands"
— Enable Quality of Service (QoS) on the device, create policy maps, and define traffic classifications
• Chapter 21. "Radius Commands"
— Specify the source IP address used for communication with Remote
Authentication Dial-in User Service (RADIUS) servers, and display the RADIUS server settings.
• Chapter 22. "RMON Commands"
— Display the Remote Network Monitoring (RMON) Ethernet history statistics, alarms table and configuration.
• Chapter 23. "SNMP Commands"
— Configure the community access string to permit access to the Simple
Network Management Protocol (SNMP) server, create or update SNMP server entries, and specify SNMP engineID.
• Chapter 24. "Spanning-Tree Commands"
— Configure the spanning-tree functionality.
• Chapter 25. "SSH Commands"
— Display the Secure Socket Shell (SSH) public keys on the device, SSH server configuration, or which SSH public key is manually configured.
• Chapter 26. "Syslog Commands"
— Log messages to a syslog server, or limit log messages to a syslog server.
• Chapter 27. "TACACS+ Commands"
— Display configuration and statistical information about a Terminal
Access Controller Access Control System (TACACS+) server, or specify a TACACS+ host.
• Chapter 28. "System Management Commands"
— Display and list system, version or Telnet session information.
• Chapter 29. "User Interface Commands"
— Display and list system, version or Telnet session information.
• Chapter 30. "VLAN Commands"
— Enter the (Virtual Local Area Network) VLAN Configuration mode, enable simultaneously configuring multiple VLANs, or adds or remove VLANs.
• Chapter 31. "Web Server Commands"
— Enable configuring the device from a browser, or display the
HTTP server configuration.
• Chapter 32. "802.1x Commands"
— Specify authentication, authorization and accounting (AAA) methods for use on interfaces running IEEE 802.1x, and enable 802.1x globally.
Intended Audience
This guide is intended for network administrators familiar with IT concepts and terminology.
Page 2
Not approved by Document Control. For review only.
Document Conventions
This document uses the following conventions:
Note
Provides related information or information of special importance.
Caution
Indicates potential damage to hardware or software, or loss of data.
Warning
Indicates a risk of personal injury.
Preface
Document Conventions
Page 3
Allied Telesis
Command Line Interface User’s Guide
Contacting Allied Telesis
This section provides Allied Telesis contact information for technical support as well as sales or corporate information. .
Online Suppor t You can request technical support online by accessing the Allied Telesis Knowledge Base from the following web site: www.alliedtelesis.com/support
. You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions..
Email and Telephone
Support
For Technical Support via email or telephone, refer to the Allied Telesis web site: www.alliedtelesis.com
. Select your country from the list displayed on the website. Then select the appropriate menu tab.
Returning Products Products for return or repair must first be assigned a Return Materials Authorization (RMA) number. A product sent to Allied Telesis without a RMA number will be returned to the sender at the sender’s expense.
To obtain an RMA number, contact the Allied Telesis Technical Support group at our web site: www.alliedtelesis.com/support/rma
. Select your country from the list displayed on the website. Then select the appropriate menu tab.
For Sales or
Corporate
Information
Warranty
You can contact Allied Telesis for sales or corporate information at our web site: www.alliedtelesis.com
. Select your country from the list displayed on the website. Then select the appropriate menu tab.
The AT-iMG646xx series intelligent Multiservice Gateway has a limited warranty of two years. Go to www.alliedtelesis.com/warranty for the specific terms and conditions of the warranty and for warranty registration.
Page 4
Not approved by Document Control. For review only.
Using the CLI
CLI Command Modes
Chapter 1. Using the CLI
Overview
This chapter describes how to start using the CLI and the CLI command editing features.
CLI Command Modes
Introduction
To assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes.
Each command mode has its own set of specific commands. Entering a question mark "?" at the system prompt
(console prompt) displays a list of commands available for that particular command mode.
From each mode a specific command is used to navigate from one command mode to another. The standard order to access the modes is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface Configuration mode.
When starting a session, the initial mode is the User EXEC mode. Only a limited subset of commands are available in User EXEC mode. This level is reserved for tasks that do not change the configuration. To enter the next level, the Privileged EXEC mode, a password is required.
The Privileged EXEC mode gives access to commands that are restricted on User EXEC mode and provides access to the device Configuration mode.
The Global Configuration mode manages the device configuration on a global level.
The Interface Configuration mode configures specific interfaces in the device.
User EXEC Mode
After logging into the device, the user is automatically in User EXEC command mode unless the user is defined as a privileged user. In general, the User EXEC commands allow the user to perform basic tests, and list system information.
The user-level prompt consists of the device host name followed by the angle bracket (>).
Console>
The default host name is Console unless it has been changed using the hostname
command in the Global
Configuration mode.
Privileged EXEC Mode
Privileged access is password protected to prevent unauthorized use because many of the privileged commands set operating system parameters. The password is not displayed on the screen and is case sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the Privileged EXEC mode from the User
EXEC mode, perform the following steps:
1.
At the prompt enter the enable command and press <Enter>. A password prompt is displayed.
Page 5
Allied Telesis
Command Line Interface User’s Guide
2.
Enter the password and press <Enter>. The password is displayed as *. The Privileged EXEC mode prompt is displayed. The Privileged EXEC mode prompt consists of the device host name followed by
#
.
Console#
To return from the Privileged EXEC mode to the User EXEC mode, use the disable
command. The following example illustrates how to access the Privileged EXEC mode and return to the User EXEC mode:
Console> enable
Enter Password: ******
Console#
Console# disable
Console>
The exit
command is used to return from any mode to the previous mode except when returning to the User
EXEC mode from the Privileged EXEC mode. For example, the exit
command is used to return from the Interface
Configuration mode to the Global Configuration mode.
Global Configuration Mode
Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific interface. The configure
Privileged EXEC mode command is used to enter the Global Configuration mode.
To enter the Global Configuration mode perform the following steps:
1.
At the Privileged EXEC mode prompt enter the configure
command and press <Enter>. The Global
Configuration mode prompt is displayed. The Global Configuration mode prompt consists of the device host name followed by (config) and
#
.
Console(config)#
One of the following commands can be used to return from the Global Configuration mode to the Privileged EXEC mode:
• exit
• end
• Ctrl+Z
The following example illustrates how to access the Global Configuration mode and return to the Privileged EXEC mode:
Console#
Console# configure
Console(config)# exit
Console#
Page 6
Not approved by Document Control. For review only.
Using the CLI
CLI Command Modes
Interface Configuration and Specific Configuration Modes
Interface Configuration mode commands modify specific interface operations. The following are the Interface
Configuration modes:
• Line Interface
— Contains commands to configure the management connections. These include commands such as line timeout settings, etc. The line
Global Configuration mode command is used to enter the Line
Configuration command mode.
• VLAN Database
— Contains commands to create a VLAN as a whole. The
VLAN database
Global
Configuration mode command is used to enter the VLAN Database Interface Configuration mode.
• Management Access List
— Contains commands to define management access-lists. The management access-list
Global Configuration mode command is used to enter the Management Access List Configuration mode.
• Ethernet
— Contains commands to manage port configuration. The interface ethernet
Global Configuration mode command is used to enter the Interface Configuration mode to configure an Ethernet type interface.
• Port Channel
— Contains commands to configure port-channels, for example, assigning ports to a portchannel. Most of these commands are the same as the commands in the Ethernet interface mode, and are used to manage the member ports as a single entity. The interface port-channel
Global Configuration mode command is used to enter the Port Channel Interface Configuration mode.
• SSH Public Key-chain
— Contains commands to manually specify other device SSH public keys. The crypto key pubkey-chain ssh
Global Configuration mode command is used to enter the SSH Public Keychain Configuration mode.
• QoS —
Contains commands related to service definitions. The qos
Global Configuration mode command is used to enter the QoS services configuration mode.
• MAC Access-List—
Configures conditions required to allow traffic based on MAC addresses. The mac access-list
Global Configuration mode command is used to enter the MAC access-list configuration mode.
Page 7
Allied Telesis
Command Line Interface User’s Guide
Starting the CLI
The device can be managed over a direct connection to the device console port or via a Telnet connection. The device is managed by entering command keywords and parameters at the prompt. Using the device Command
Line Interface (CLI) is very similar to entering commands on a UNIX system.
If access is via a Telnet connection, ensure that the device has a defined IP address, corresponding management access is granted, and the workstation used to access the device is connected to the device prior to using CLI commands.
Note
The following steps are for use on the console line only.
To start using the CLI, perform the following steps:
1.
Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the device to the RS-232 serial port of the terminal or computer running the terminal emulation application.
Note
The default data rate is 115200 bps.
a) Set the data format to 8 data bits, 1 stop bit, and no parity.
b) Set Flow Control to none
.
c) Under
Properties
, select
VT100 for Emulation mode.
d) Select
Terminal keys for
Function, Arrow, and Ctrl keys
. Ensure that the setting is for
Terminal keys
(not
Windows keys
).
Note
When using HyperTerminal with Microsoft® Windows 2000, ensure that Windows® 2000 Service Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly in
HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service packs.
2.
Enter the following commands to begin the configuration procedure:
Console>
enable
Console#
configure
Console(config)#
3.
Configure the device and enter the necessary commands to complete the required tasks.
4.
When finished, exit the session with the exit
command.
When a different user is required to log onto the system, use the login
Privileged EXEC mode command. This effectively logs off the current user and logs on the new user.
Page 8
Not approved by Document Control. For review only.
Using the CLI
Editing Features
Editing Features
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command show interfaces status ethernet 1/e11
, show
, interfaces
and status
are keywords, ethernet
is an argument that specifies the interface type, and
1/e11 specifies the port.
To enter commands that require parameters, enter the required parameters after the command keyword. For example, to set a password for the administrator, enter:
Console(config)# username admin password alansmith
When working with the CLI, the command options are not displayed. The command is not selected from a menu, but is manually entered. To see what commands are available in each mode or within an interface configuration, the CLI does provide a method of displaying the available commands, the command syntax requirements and in some instances parameters required to complete the command. The standard command to request help is
?
.
There are two instances where help information can be displayed:
• Keyword lookup
— The character
?
is entered in place of a command. A list of all valid commands and corresponding help messages are is displayed.
• Partial keyword lookup
— If a command is incomplete and or the character
?
is entered in place of a parameter. The matched keyword or parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following features are described:
•
Terminal Command Buffer
•
Command Completion
•
Nomenclature
•
Keyboard Shortcuts
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally managed Command History buffer.
Commands stored in the buffer are maintained on a First In First Out (FIFO) basis. These commands can be recalled, reviewed, modified, and reissued. This buffer is not preserved across device resets.
Keyword
Up-arrow key
Ctrl+P
Down-arrow key
Description
Recalls commands in the history buffer, beginning with the most recent command. Repeats the key sequence to recall successively older commands.
Returns to more recent commands in the history buffer after recalling commands with the up-arrow key. Repeating the key sequence will recall successively more recent commands.
By default, the history buffer system is enabled, but it can be disabled at any time. For information about the command syntax to enable or disable the history buffer, see history
.
There is a standard default number of commands that are stored in the buffer. The standard number of 10 commands can be increased to 216. By configuring 0, the effect is the same as disabling the history buffer system. For information about the command syntax for configuring the command history buffer, see history size
.
To display the history buffer, see show history
.
Page 9
Allied Telesis
Command Line Interface User’s Guide
Negating the Effect of Commands
For many configuration commands, the prefix keyword no
can be entered to cancel the effect of a command or reset the configuration to the default value. This guide describes the negation effect for all applicable commands.
Command Completion
If the command entered is incomplete, invalid or has missing or invalid parameters, then the appropriate error message is displayed. This assists in entering the correct command. By pressing the <Tab> button, an incomplete command is entered. If the characters already entered are not enough for the system to identify a single matching command, press
?
to display the available commands matching the characters already entered.
Nomenclature
When referring to an Ethernet port in a CLI command, the following format is used:
•
For an Ethernet port on a standalone device: Ethernet_type port_number
•
For an Ethernet port on a stacked device: unit_number/Ethernet_type port number
The Ethernet type may be Gigabit Ethernet (indicated by “g”) or Fast Ethernet (indicated by “e”).
For example, g3 stands for Gigabit Ethernet port 3 on a stand-alone device, and e3 stands for Fast Ethernet port 3 on a stand-alone device, whereas 1/g3 stands for Gigabit Ethernet port 3 on stacking unit 1 and 1/e3 stands for
Fast Ethernet port 3 on stacking unit 1.
The ports may be described on an individual basis or within a range. Use format port number-port number to specify a set of consecutive ports and port number, port number to indicate a set of non-consecutive ports. For example, g1-3 stands for Gigabit Ethernet ports 1, 2 and 3, and g1, 5 stands for Gigabit Ethernet ports 1 and 5.
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI commands. The following table describes the CLI shortcuts.
Keyboard Key
Up-arrow key
Down-arrow key
Ctrl+A
Ctrl+E
Ctrl+Z / End
Backspace key
Description
Recalls commands from the history buffer, beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
Returns the most recent commands from the history buffer after recalling commands with the up arrow key. Repeating the key sequence will recall successively more recent commands.
Moves the cursor to the beginning of the command line.
Moves the cursor to the end of the command line.
Returns back to the Privileged EXEC mode from any configuration mode.
Deletes one character left to the cursor position.
Page 10
Not approved by Document Control. For review only.
CLI Command Conventions
When entering commands there are certain command entry standards that apply to all commands. The following table describes the command conventions.
Convention
[ ]
{ }
Italic font
<Enter>
Description
In a command line, square brackets indicates an optional entry.
In a command line, curly brackets indicate a selection of compulsory parameters separated by the | character. One option must be selected. For example: flowcontrol
{auto|on|off}
means that for the flowcontrol
command either auto
, on
or off
must be selected.
Indicates a parameter.
Indicates an individual key on the keyboard. For example, <Enter> indicates the
Enter key.
Any combination keys pressed simultaneously on the keyboard.
Ctrl+F4
Screen Display Indicates system messages and prompts appearing on the console.
all When a parameter is required to define a range of ports or parameters and all
is an option, the default for the command is all
when no parameters are defined. For example, the command interface range port-channel has the option of either entering a range of channels, or selecting all
. When the command is entered without a parameter, it automatically defaults to all
.
Copying and Pasting Text
Up to 1000 lines of text (i.e., commands) can be copied and pasted into the device.
Note
It is the user’s responsibility to ensure that the text copied into the device consists of legal commands only.
This feature is dependent on the baud rate of the device.
Note
The default device baud rate is 115,200
When copying and pasting commands from a configuration file, make sure that the following conditions exist:
•
A device Configuration mode has been accessed.
•
The commands contain no encrypted data, like encrypted passwords or keys. Encrypted data cannot be copied and pasted into the device.
Allied Telesis
Command Line Interface User’s Guide
Chapter 2. ACL Commands
ip access-list
The ip access-list
Global Configuration mode command defines an IPv4 Access List and places the device in
IPv4 Access List Configuration mode. Use the no
form of this command to remove the Access List.
Syntax ip access-list access-list-name no ip access-list access-list-name
Parameters
• access-list-name — Name of the IPv4 Access List.
Default Configuration
No IPv4 Access List is defined
Command Mode
Global Configuration mode
User Guidelines
IPv4 ACLs are defined by a unique name. An IPv4 ACL and MAC ACL cannot share the same name.
Example
The following example places the device in IPv4 Access List Configuration mode.
Console(config)# ip access-list
permit (ip)
The permit
Ip Access-list Configuration mode command sets conditions to allow a packet to pass a named IP
Access List.
Syntax permit
{ any
| protocol } { any
| { source source-wildcard }} { any
| { destination destination-wildcard }} [ dscp number | ip-precedence number ] [ fragments
] permit-icmp
{ any
| { source source-wildcard }} { any
| { destination destination-wildcard }} { any
| i cmp-type } { any
| icmp-code } [ dscp number | ip-precedence
number ] permit-igmp
{ any
| { source source-wildcard }} { any
| { destination destination-wildcard }} { any
| i gmp-type } [ dscp number | ip-precedence number ] permit-tcp
{ any
| { source source-wildcard }} { any
| source-port } { any
|{ destination destination-wildcard }} { any
| destination-port } [ dscp number | ip-precedence number ] [ flags list-of-flags ]
Page 12
Not approved by Document Control. For review only.
ACL Commands permit-udp
{ any
| { source source-wildcard }} { any
| source-port } { any
| { destination destination-wildcard }} { any
| destination-port } [ dscp number | ip-precedence number ]
Parameters
• source — Source IP address of the packet.
• source-wildcard — Wildcard bits to be applied to the source IP address. Use 1s in the bit position to be ignored.
• destination — Destination IP address of the packet.
• destination-wildcard — Wildcard bits to be applied to the destination IP address. Use 1s in the bit position to be ignored.
• protocol — The name or the number of an IP protocol. Available protocol names: icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, idrp, rsvp, gre, esp, ah, eigrp, ospf, ipip, pim, l2tp, isis
. (Range: 0 - 255)
• dscp number — Specifies the DSCP value.
• ip-precedence number — Specifies the IP precedence value.
• fragments — The set of conditions is applied only to noninitial fragments.
• icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-hostaddress, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip, photuris.
(Range: 0 - 255)
• icmp-code — Specifies an ICMP message code for filtering ICMP packets. (Range: 0 - 255)
• i gmp-type — IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3.
(Range: 0 - 255)
• destination-port — Specifies the UDP/TCP destination port. (Range: 0 - 65535)
• source-port — Specifies the UDP/TCP source port. (Range: 0 - 65535)
• flags list-of-flags — List of TCP flags that should occur. If a flag should be set it is prefixed by "+".If a flag should be unset it is prefixed by "-". Available options are + urg
, + ack
, + psh
, + rst
, + syn
, + fin
, urg
, ack
, psh
, rst
, syn
and fin
. The flags are concatenated to a one string. For example: + fin
ack
.
Page 13
Allied Telesis
Command Line Interface User’s Guide
IP Protocol
Internet Control Message Protocol
Internet Group Management Protocol
IP in IP (encapsulation) Protocol
Transmission Control Protocol
Exterior Gateway Protocol
Interior Gateway Protocol
User Datagram Protocol
Host Monitoring Protocol
Reliable Data Protocol
Inter-Domain Policy Routing Protocol
Ipv6 protocol
Routing Header for IPv6
Fragment Header for IPv6
Inter-Domain Routing Protocol
Reservation Protocol
General Routing Encapsulation
Encapsulating Security Payload (50)
Authentication Header
ICMP for IPv6
EIGRP routing protocol
Open Shortest Path Protocol
Protocol Independent Multicast
Layer Two Tunneling Protocol
ISIS over IPv4
(any IP protocol) gre esp ah ipv6-icmp eigrp ospf pim l2tp isis any tcp egp igp udp
Abbreviated Name icmp igmp ipinip hmp rdp idpr ipv6 ipv6-route ipv6-frag idrp rsvp
88
89
103
115
47
50
51
58
124
(25504)
43
44
45
46
20
27
35
41
6
8
9
17
2
4
Protocol Number
1
• dscp
— Indicates matching the dscp number with the packet dscp value.
• ip-precedence
— Indicates matching ip-precedence with the packet ip-precedence value.
• icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a value or one of the following values: echo-reply
,
destination-unreachable
,
source-quench
,
redirect
,
alternate-host-address
,
echorequest
,
router-advertisement
,
router-solicitation
,
time-exceeded
, parameter-problem
,
timestamp, timestamp-reply
, information-request
,
information-reply
, address-mask-request
, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, ipv6-where-are-you, ipv6-i-am-here
,
Page 14
Not approved by Document Control. For review only.
ACL Commands mobile-registration-request
, mobile-registration-reply
, domain-name-request
, domain-name-reply
, skip
and photuris
. (Range: 0-255)
• icmp-code — Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by
ICMP message type can also be filtered by the ICMP message code. (Range: 0-255)
• igmp-type — IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: dvmrp
, host-query
, host-report
, pim
or trace
. (Range: 0-255)
• destination-port — Specifies the UDP/TCP destination port. (Range: 0-65535)
• source-port — Specifies the UDP/TCP source port. (Range: 0-65535)
• list-of-flags — Specifies a list of TCP flags that can be triggered. If a flag is set, it is prefixed by “+”. If a flag is not set, it is prefixed by “-”. Possible values:
+urg
,
+ack
,
+psh
,
+rst
,
+syn
,
+fin
,
-urg
,
-ack
,
-psh
,
-rst
,
-syn and
-fin
. The flags are concatenated into one string. For example:
+fin-ack
.
Default Configuration
No IPv4 ACL is defined.
Command Mode
Ip Access-list Configuration mode
User Guidelines
You enter IP-Access List configuration mode by using the
ip access-list
Global Configuration mode command.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip access-list ip-acl1
Console(config-ip-al)# permit rsvp 192.1.1.1 0.0.0.0 any dscp 56
deny (IP)
The deny
IP Access List Configuration mode command sets conditions to not allow a packet to pass a named IP
Access List.
Syntax deny [disable-port] {any| protocol
} {any|{ source source-wildcard
}} {any|{ destination destinationwildcard
}} [dscp number
| ip-precedence
number
] deny-icmp [disable-port] {any|{
source source-wildcard
}} {any|{ destination destination-wildcard
}}
{any| icmp-type
} {any| icmp-code
} [dscp number
|
ip-precedence number
] deny-igmp [disable-port] {any|{ source source-wildcard
}} {any|{ destination destination-wildcard
}}
{any| igmp-type
} [dscp number
| ip-precedence number
] deny-tcp [disable-port] {any|{ source source-wildcard
}} {any| source-port
} {any|{ destination destination-wildcard
}} {any| destination-port
} [dscp number
| ip-precedence number
] [flags list-of-
Page 15
Allied Telesis
Command Line Interface User’s Guide flags
] deny-udp [disable-port] {any|{ source source-wildcard
}} {any| source-port
} {any|{ destination destination-wildcard
}} {any| destination-port
} [dscp number
| ip-precedence
number
]
Parameters
• disable-port — The Ethernet interface is disabled if the condition is matched. (Range: 0 - 65535)
• source — Source IP address of the packet.
• source-wildcard — Wildcard bits to be applied to the source IP address. Use 1s in the bit position to be ignored.
• destination — Packet’s destination IP address.
• destination-wildcard — Wildcard bits to be applied to the destination IP address. Use 1s in the bit position to be ignored.
• protocol —The name or number of an IP protocol. Available protocol names: icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, idrp, rsvp, gre, esp, ah, eigrp, ospf, ipip, pim, l2tp, isis
.: (Range: 0 - 255)
• dscp
number — Specifies the DSCP value.
• ip-precedence number — Specifies the IP precedence value.
• icmp-type — Specifies an ICMP message type for filtering ICMP packets. Enter a number, or one of the following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-hostaddress, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, addressmask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip, photuriss.
(Range: 0 - 255)
• icmp-code — Specifies an ICMP message code for filtering ICMP packets. (Range: 0 - 255)
• igmp-type — GMP packets can be filtered by IGMP message type. Enter a number, or one of the following values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3.
(Range: 0 - 255)
• destination-port — Specifies the UDP/TCP destination port.
• source-port — Specifies the UDP/TCP source port. (Range: 0 - 65535)
• flags list-of-flags — List of TCP flags that should occur. If a flag is intended to be set, it is prefixed by ‘+’.If a flag should be unset it is prefixed by ‘-’. Available options are:
+urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack,
-psh, -rst, -syn and
-fin
. The flags are concatenated to a single string. For example:
+fin-ack
.
IP Protocol
Internet Control Message Protocol
Internet Group Management Protocol
Transmission Control Protocol
Exterior Gateway Protocol
Interior Gateway Protocol
User Datagram Protocol
Host Monitoring Protocol
Reliable Data Protocol
Inter-Domain Policy Routing Protocol
Abbreviated Name icmp igmp tcp egp igp udp hmp rdp idpr
8
9
17
20
2
6
Protocol Number
1
27
35
Page 16
Not approved by Document Control. For review only.
ACL Commands
IP Protocol
Ipv6 protocol
Routing Header for IPv6
Fragment Header for IPv6
Inter-Domain Routing Protocol
Reservation Protocol
General Routing Encapsulation
Encapsulating Security Payload (50)
Authentication Header
ICMP for IPv6
EIGRP routing protocol
Open Shortest Path Protocol
Protocol Independent Multicast
Layer Two Tunneling Protocol
ISIS over IPv4
(any IP protocol)
Default Configuration
No IPv4 Access List is defined.
Command Mode
IP Access-list Configuration mode idrp rsvp gre esp
Abbreviated Name ipv6 ipv6-route ipv6-frag pim l2tp isis any ah ipv6-icmp eigrp ospf
51
58
88
89
103
115
124
(25504)
45
46
47
50
Protocol Number
41
43
44
User Guidelines
Enter IP-Access List configuration mode by using the
ip access-list
Global Configuration mode command. After an access control entry (ACE) is added to an access control list, an implied deny-any-any condition exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip-access-list ip-acl1
Console(config-ip-al)# deny rsvp 192.1.1.1 0.0.0.255 any
mac access-list
The mac access-list
Global Configuration mode command defines a Layer 2 Access List and places the device in
MAC-Access List Configuration mode. Use the no
form of this command to remove the Access List.
Syntax mac access-list access-list-name
Page 17
Allied Telesis
Command Line Interface User’s Guide no mac access-list access-list-name
Parameters
• access-list-name — Name of the MAC-Access List.
Default Configuration
No MAC-Access List is defined.
Command Mode
Global Configuration mode
User Guidelines
MAC ACLs are defined by a unique name. An IPv4 ACL, IPv6 ACL and MAC ACL cannot share the same name.
Example
The following example shows how to create a MAC ACL.
Console(config)# mac access-list macl-acl1
Console(config-mac-al)#
permit (MAC)
The permit
MAC-Access List Configuration mode command sets permit conditions for a MAC-Access List.
Syntax permit
{ any
| { source source-wildcard } any
| { destination
destination-wildcard }} [ vlan vlan-id ] [ cos cos coswildcard ] [ ethtype eth-type ]
Parameters
• source — Source MAC address of the packet.
• source-wildcard — Wildcard bits to be applied to the source MAC address. Use 1s in the bit position to be ignored.
• destination — Destination MAC address of the packet.
• destination-wildcard — Specifies wildcard bits to be applied to the destination MAC address. Use 1s in bit positions to be ignored.
• vlan-id — Specifies the ID of the packet VLAN. (Range: 0-4095)
• cos — Specifies the Class of Service (CoS) for the packet. (Range: 0-7)
• cos-wildcard — Specifies wildcard bits to be applied to the CoS.
• eth-type — Specifies the Ethernet type in hexadecimal format of the packet.
Default Configuration
No MAC ACL is defined.
Command Mode
MAC-Access List Configuration mode
Page 18
Not approved by Document Control. For review only.
ACL Commands
User Guidelines
Enter IP-Access List configuration mode by using the MAC access-list Global Configuration mode command.
After an access control entry (ACE) is added to an access control list, an implied deny-any-any
condition exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets.
Example
The following example shows how to create a MAC ACL with permit rules.
Console(config)# mac access-list macl-acl1
Console(config-mac-al)# permit 6:6:6:6:6:6 0:0:0:0:0:0 any vlan 6
deny (MAC)
The deny
MAC-Access List Configuration mode command sets deny conditions for an MAC-Access List.
Syntax deny
[ disable-port
] { any
|{ source source- wildcard } { any
|{ destination destination- wildcard }} [ vlan vlan-id ] [ cos cos cos-wildcard ] [ ethtype eth-type ]
Parameters
• disable-port
— Indicates the Ethernet interface is disabled if the condition is matched.
• source — Specifies source MAC address of the packet.
• source-wildcard — Specifies wildcard bits to be applied to the source MAC address. Use 1s in the bit position to be ignored.
• destination — Specifies the MAC address of the host to which the packet is being sent.
• destination-wildcard — Specifies wildcard bits to be applied to the destination MAC address. Use 1s in the bit position to be ignored.
• vlan-id — Specifies the VLAN ID of the packet. (Range: 0 - 4095)
• cos — Specifies the Class of Service of the packet. (Range: 0 - 7)
• cos-wildcard — Specifies wildcard bits to be applied to the CoS.
• eth-type — Specifies the Ethernet type in hexadecimal format of the packet. (Range: 0 - 0xFFFF)
Default Configuration
No MAC-Access List is defined.
Command Mode
MAC-Access List Configuration mode
User Guidelines
MAC BPDU packets cannot be denied.
This command defines an Access Control Element (ACE). An ACE can only be removed by deleting the ACL, using the no mac access-list
Global Configuration mode command. Alternatively, the Web-based interface can be used to delete ACEs from an ACL.
Page 19
Allied Telesis
Command Line Interface User’s Guide
The following user guidelines are relevant to GE devices only:
•
Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any
condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied.
•
If the VLAN ID is specified, the policy map cannot be connected to the VLAN interface.
Example
The following example shows how to create a MAC ACL with deny rules.
Console(config)# mac access-list macl1
Console (config-mac-acl)# deny 6:6:6:6:6:6:0:0:0:0:0:0 any
service-acl
The
service-acl
Interface Configuration mode command controls access to an interface. Use the no
form of this command to remove the access control.
Syntax service-acl input acl-name no service-acl input
Parameters
• input — Applies the specified ACL to the input interface.
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, Port-Channel) mode
User Guidelines
In advanced mode, when an ACL is bound to an interface, the port trust mode is set to trust 12-13 and not to 12.
Example
The following example, binds (services) an ACL to Ethernet interface g2.
Console(config)# interface ethernet g2
Console(config-if)# service-acl input macl1
show access-lists
The show access-lists
Privileged EXEC mode command displays Access Control Lists (ACLs) configured on the switch.
Syntax show access-lists
[ name ]
Page 20
Not approved by Document Control. For review only.
ACL Commands
Parameters
• name — Name of the ACL.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays access lists.
Console# show access-lists
IP access list ACL1 permit ip host 172.30.40.1 any permit rsvp host 172.30.8.8 any
show interfaces access-lists
The show interfaces access-lists
Privileged EXEC mode command displays access lists applied on interfaces.
Syntax show interfaces access-lists [ ethernet interface
| vlan vlan-id
| port-channel port-channel-number ]
Parameters
• vlan-id — Specifies the ID of the VLAN.
• interface — The full syntax is: unit/port .
• port-channel-number — Valid port-channel Index.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 21
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays ACLs applied to the interfaces of a device:
Console# show interfaces access-lists
Interface
---------
1/e1
2/e1
Input ACL
---------
ACL1
ACL3
Page 22
Not approved by Document Control. For review only.
AAA Commands
Chapter 3. AAA Commands
aaa authentication login
The aaa authentication login
Global Configuration mode command defines login authentication. Use the no form of this command to return to the default configuration.
Syntax aaa authentication login
{ default
| list-name } method1 [ method2 ...] no aaa authentication login
{ default
| list-name }
Parameters
• default
— Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in.
• list-name — Character string used to name the list of authentication methods activated when a user logs in.
(Range: 1-12 characters).
• method1 [ method2 ...] — Specify at least one from the following table:
Keyword enable line local none radius tacacs
Description
Uses the enable password for authentication.
Uses the line password for authentication.
Uses the local username database for authentication.
Uses no authentication.
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command aaa authentication login listname local.
Note
On the console, login succeeds without any authentication check if the authentication method is not defined.
Command Mode
Global Configuration mode
Page 23
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
The default and optional list names created with the
aaa authentication login
command are used with the login authentication command.
Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line.
Example
The following example configures the authentication login.
Console(config)# aaa authentication login default radius local enable none
aaa authentication enable
The aaa authentication enable
Global Configuration mode command defines authentication method lists for accessing higher privilege levels. Use the no
form of this command to return to the default configuration.
Syntax aaa authentication enable
{ default
| list-name } method1 [ method2 ...] no aaa authentication enable
{ default
| list-name }
Parameters
• default
— Uses the listed authentication methods that follow this argument as the default list of methods, when using higher privilege levels.
• list-name — Character string used to name the list of authentication methods activated, when using access higher privilege levels (Range: 1-12 characters).
• method1 [ method2 ...] — Specify at least one from the following table:
Keyword enable line none radius tacacs
Description
Uses the enable password for authentication.
Uses the line password for authentication.
Uses no authentication.
Uses the list of all RADIUS servers for authentication. Uses username $enabx$., where x is the privilege level.
Uses the list of all TACACS+ servers for authentication. Uses username
"$enabx$." where x is the privilege level.
Default Configuration
If the default list is not set, only the enable password is checked. This has the same effect as the command aaa authentication enable default enable .
On the console, the enable password is used if it exists. If no password is set, the process still succeeds. This has the same effect as using the command aaa authentication enable default enable none .
Page 24
Not approved by Document Control. For review only.
AAA Commands
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the
aaa authentication enable
command are used with the enable authentication command.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line.
All aaa authentication enable default requests sent by the device to a RADIUS or TACACS+ server include the username $enabx$., where x is the requested privilege level.
Example
The following example sets the enable password for authentication when accessing higher privilege levels.
Console(config)# aaa authentication enable default enable
login authentication
The login authentication
Line Configuration mode command specifies the login authentication method list for a remote telnet or console. Use the no
form of this command to return to the default configuration specified by the aaa authentication login command.
Syntax login authentication
{ default
| list-name } no login authentication
Parameters
• default
— Uses the default list created with the
aaa authentication login
command.
• list-name — Uses the indicated list created with the aaa authentication login command.
Default Configuration
Uses the default set with the command aaa authentication login
.
Command Mode
Line Configuration mode
User Guidelines
Changing login authentication from default to another value may disconnect the telnet session.
Example
The following example specifies the default authentication method for a console.
Console(config)# line console
Console(config-line)# login authentication default
Page 25
Allied Telesis
Command Line Interface User’s Guide
enable authentication
The enable authentication
Line Configuration mode command specifies the authentication method list when accessing a higher privilege level from a remote telnet or console. Use the no
form of this command to return to the default configuration specified by the aaa authentication enable command.
Syntax enable authentication
{ default
| list-name } no enable authentication
Parameters
• default
— Uses the default list created with the
aaa authentication enable command.
• list-name — Uses the indicated list created with the aaa authentication enable command.
Default Configuration
Uses the default set with the aaa authentication enable command.
Command Mode
Line Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the default authentication method when accessing a higher privilege level from a console.
Console(config)# line console
Console(config-line)# enable authentication default
ip http authentication
The ip http authentication
Global Configuration mode command specifies authentication methods for HTTP server users. Use the no
form of this command to return to the default configuration.
Syntax ip http authentication method1 [ method2 ...] no ip http authentication
Parameters
• method1 [ method2 ...] — Specify at least one from the following table:
Keyword local none
Description
Uses the local username database for authentication.
Uses no authentication.
Page 26
Not approved by Document Control. For review only.
AAA Commands radius tacacs
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command ip http authentication local.
Command Mode
Global Configuration mode
User Guidelines
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line.
Example
The following example configures the HTTP authentication.
Console(config)# ip http authentication radius local
ip https authentication
The ip https authentication
Global Configuration mode command specifies authentication methods for HTTPS server users. Use the no
form of this command to return to the default configuration.
Syntax ip https authentication method1 [ method2 ...] no ip https authentication
Parameters
• method1 [ method2 ...] — Specify at least one from the following table:
Keyword local none radius tacacs
Source or destination
Uses the local username database for authentication.
Uses no authentication.
Uses the list of all RADIUS servers for authentication.
Uses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command ip https authentication local .
Command Mode
Global Configuration mode
Page 27
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none
as the final method in the command line.
Example
The following example configures HTTPS authentication.
Console(config)# ip https authentication radius local
show authentication methods
The show authentication methods
Privileged EXEC mode command displays information about the authentication methods.
Syntax show authentication methods
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the authentication configuration.
Console# show authentication methods
Login Authentication Method Lists
---------------------------------
Default: Radius, Local, Line
Console_Login: Line, None
Enable Authentication Method Lists
----------------------------------
Default: Radius, Enable
Console_Enable: Enable, None
Page 28
Not approved by Document Control. For review only.
AAA Commands
Line
--------------
Console
Telnet
SSH
Login Method List
-----------------
Console_Login
Default
Default
Enable Method List
------------------
Console_Enable
Default
Default http: Radius, Local https: Radius, Local dot1x: Radius
password
The password
Line Configuration mode command specifies a password on a line. Use the no
form of this command to remove the password.
Syntax password password [ encrypted
] no password
Parameters
• password — Password for this level (Range: 1-159 characters).
• encrypted
— Encrypted password to be entered, copied from another device configuration.
Default Configuration
No password is defined.
Command Mode
Line Configuration mode
User Guidelines
If a password is defined as encrypted, the required password length is 32 characters.
Example
The following example specifies password secret
on a console.
Console(config)# line console
Console(config-line)# password secret
username
The username
Global Configuration mode command creates a user account in the local database. Use the no form of this command to remove a user name.
Page 29
Allied Telesis
Command Line Interface User’s Guide
Syntax username name [ password password ] [ level level ] [ encrypted
] no username name
Parameters
• name — The name of the user (Range: 1- 20 characters).
• password — The authentication password for the user (Range: 1-159 characters).
• level — The user level (Range: 1-15).
• encrypted
— Encrypted password entered, copied from another device configuration.
Default Configuration
No user is defined.
Command Mode
Global Configuration mode
User Guidelines
User account can be created without a password.
A single username can be defined for privilege level 1 and another one for privilege level 15.
Default usernames:
Privilege level 1: username = operator, password = operator
Privilege level 15: username = manager, password = friend
Example
The following example configures user bob
with password
lee
and user level 15 to the system.
Console(config)# username bob password lee level 15
show users accounts
The show users accounts
Privileged EXEC mode command displays information about the local user database.
Syntax show users accounts
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 30
Not approved by Document Control. For review only.
AAA Commands
Example
The following example displays the local users configured with access to the system.
Console# show users accounts
Username
--------
Bob
Admin
Manager
Privilege
---------
1
15
15
Password
Aging
--------
120
120
120
Password Expiry date
-----------
Jan 21 2005
Jan 21 2005
Jan 21 2005
Lockout
-
-
-------
-
The following table describes significant fields shown above.
Field
Username
Privilege
Description
Name of the user.
User’s privilege level.
enable password
The enable password
Global Configuration mode command sets a local password to control access to user and privilege levels. Use the no
form of this command to remove the password requirement.
Syntax enable password
[ level level ] password [ encrypted
] no enable password
[ level level ]
Parameters
• password — Password for this level. (Range: 1-159 characters)
• level
level — Level for which the password applies. If not specified the level is 15. (Range: 1-15)
• encrypted
— Encrypted password entered, copied from another device configuration.
Default Configuration
No enable password is defined.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Page 31
Allied Telesis
Command Line Interface User’s Guide
Example
The following example sets a local level 15 password called ‘secret’ to control access to user and privilege levels. .
Console(config)# enable password secret level 15
Page 32
Not approved by Document Control. For review only.
Address Table Commands
Chapter 4. Address Table Commands
bridge address
The bridge address
Interface Configuration (VLAN) mode command adds a MAC-layer station source address to the bridge table. Use the no
form of this command to delete the MAC address.
Syntax bridge address mac-address { ethernet interface | port-channel port-channel-number } [ permanent permanent} | delete-on-reset delete-on-reset } | delete-on-timeout delete-on-timeout } | secure secure ] no bridge address
[ mac-address ]
Parameters
• mac-address — A valid MAC address.
• interface — A valid Ethernet port.
• port-channel-number — A valid port-channel number.
• permanent —
The address can only be deleted by the no bridge address
command.
• delete-on-reset
— The address is deleted after reset.
• delete-on-timeout —
The address is deleted after "age out" time has expired.
• secure
— The address is deleted after the port changes mode to unlock learning ( no port security command). This parameter is only available when the port is in the learning locked mode.
Default Configuration
No static addresses are defined. The default mode for an added address is permanent
.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Using the no
form of the command without specifying a MAC address deletes all static MAC addresses belonging to this VLAN).
Example
The following example adds a permanent static MAC-layer station source address 3aa2.64b3.a245 on port 1/e16 to the bridge table.
Console(config)# interface vlan 2
Console(config-if)# bridge address 3aa2.64b3.a245 ethernet 1/e16 permanent
bridge multicast filtering
The bridge multicast filtering
Global Configuration mode command enables filtering of Multicast addresses. Use the no
form of this command to disable filtering of Multicast addresses.
Page 33
Allied Telesis
Command Line Interface User’s Guide
Syntax bridge multicast filtering no bridge multicast filtering
Parameters
This command has no keywords or arguments.
Default Configuration
Filtering Multicast addresses is disabled. All Multicast addresses are flooded to all ports.
Command Mode
Global Configuration mode
User Guidelines
If routers exist on the VLAN, do not change the unregistered Multicast addresses state to drop on the routers ports.
If Multicast routers exist on the VLAN and IGMP snooping isn't enabled, use the bridge multicast forward-all command to enable forwarding all Multicast packets to the Multicast routers.
Example
In this example, bridge Multicast filtering is enabled.
Console(config)# bridge multicast filtering
bridge multicast address
The bridge multicast address
Interface Configuration mode command registers MAC-layer Multicast addresses to the bridge table, and adds ports statically to the group. Use the no
form of this command to deregister the address.
Syntax bridge multicast address mac-multicast-address
Parameters
• add
— Adds ports to the group. If no option is specified, this is the default option.
• remove
— Removes ports from the group.
• mac-multicast-address — A valid MAC Multicast address.
• interface-list — Separate nonconsecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports.
• port-channel-number-list — Separate nonconsecutive port-channels with a comma and no spaces; a hyphen is used to designate a range of ports.
Default Configuration
No Multicast addresses are defined.
Page 34
Not approved by Document Control. For review only.
Address Table Commands
Command Mode
Interface configuration (VLAN) mode
User Guidelines
If the command is executed without add
or remove
, the command only registers the group in the bridge database.
Static Multicast addresses can only be defined on static VLANs.
Example
The following example registers the MAC address:
Console(config)# interface vlan 8
Console(config-if)# bridge multicast address 01:00:5e:02:02:03
The following example registers the MAC address and adds ports statically.
console(config)# interface vlan 8 console(config-if)# bridge multicast address 01:00:5e:02:02:03 add ethernet 1/e1-9, 2/ e2
bridge multicast forbidden address
The bridge multicast forbidden address
Interface Configuration mode command forbids adding specific
Multicast addresses to specific ports. Use the no
form of this command to return to default.
Syntax bridge multicast forbidden address
{ mac-multicast-address | ip-multicast-address } { add
| remove
} { ethernet interface-list | port-channel port-channel-number-list } no bridge multicast forbidden address
{ mac-multicast-address | ip-multicast-address }
Parameters
• add
— Adds ports to the group.
• remove
— Removes ports from the group.
• mac-multicast-address — A valid MAC Multicast address.
• interface-list — Separate nonconsecutive Ethernet ports with a comma and no spaces; hyphen is used to designate a range of ports.
• port-channel-number-list — Separate nonconsecutive valid port-channels with a comma and no spaces; a hyphen is used to designate a range of port-channels.
Default Configuration
No forbidden addresses are defined.
Command Modes
Interface Configuration (VLAN) mode
User Guidelines
Before defining forbidden ports, the Multicast group should be registered.
Page 35
Allied Telesis
Command Line Interface User’s Guide
Example
In this example, MAC address 0100.5e02.0203 is forbidden on port 2/e9 within VLAN 8.
Console(config)# interface vlan 8
Console(config-if)# bridge multicast address 0100.5e02.0203
Console(config-if)# bridge multicast forbidden address 0100.5e02.0203 add ethernet 2/e9
bridge multicast forward-all
The bridge multicast forward-all
Interface Configuration (VLAN) mode command enables forwarding all
Multicast packets on a port. Use the no
form of this command to restore the default configuration.
Syntax bridge multicast forward-all
{ add
| remove
} { ethernet interface-list |
port-channel port-channel-number-list } no bridge multicast forward-all
Parameters
• add
— Force forwarding all Multicast packets.
• remove
— Do not force forwarding all Multicast packets.
• interface-list — Separate nonconsecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports.
• port-channel-number-list — Separate nonconsecutive port-channels with a comma and no spaces; a hyphen is used to designate a range of port-channels.
Default Configuration
This setting is disabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, all Multicast packets on port 1/e8 are forwarded.
Console(config)# interface vlan 2
Console(config-if)# bridge multicast forward-all add ethernet 1/e8
bridge multicast forbidden forward-all
The bridge multicast forbidden forward-all
Interface Configuration mode command forbids a port to be a
Forward-all-Multicast port. Use the no
form of this command to return to default.
Page 36
Not approved by Document Control. For review only.
Address Table Commands
Syntax bridge multicast forbidden forward-all
{ add
| remove
} { ethernet interface-list | port-channel port-channelnumber-list } no bridge multicast forbidden forward-all
Parameters
• add
— Forbid forwarding all Multicast packets.
• remove
— Do not forbid forwarding all Multicast packets.
• interface-list — Separates nonconsecutive Ethernet ports with a comma and no spaces; use a hyphen to designate a range of ports.
• port-channel-number-list — Separates nonconsecutive port-channels with a comma and no spaces; use a hyphen to designate a range of port-channels.
Default Configuration
This setting is disabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
IGMP snooping dynamically discovers Multicast router ports. When a Multicast router port is discovered, all the
Multicast packets are forwarded to it unconditionally.
This command prevents a port from becoming a Multicast router port.
Example
In this example, forwarding all Multicast packets to 1/e1 with VLAN 2 is forbidden.
Console(config)# interface vlan 2
Console(config-if)# bridge multicast forbidden forward-all add ethernet 1/e1
bridge aging-time
The bridge aging-time
Global Configuration mode command sets the aging time of the Address Table. Use the no
form of this command to restore the default.
Syntax bridge aging-time seconds no bridge aging-time
Parameters
• seconds — Time in seconds. (Range: 10-630 seconds)
Default Configuration
The default setting is 300 seconds.
Page 37
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
In this example the bridge aging time is set to 250.
Console(config)# bridge aging-time 250
clear bridge
The clear bridge
Privileged EXEC mode command removes any learned entries from the forwarding database.
Syntax clear bridge
Default Configuration
This command has no default configuration.
Command Mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, the bridge tables are cleared.
Console# clear bridge
port security
The port security
Interface Configuration mode command enables port security on an interface. Use the no
form of this command to disable port security on an interface.
Syntax port security
[ forward
| discard | discard-shutdown
] [ trap seconds ] no port security
Parameters
• forward
— Forwards frames with unlearned source addresses, but does not learn the address.
• discard
— Discards frames with unlearned source addresses. This is the default if no option is indicated.
• discard-shutdown
— Discards frames with unlearned source addresses. The port is also shut down.
• trap seconds
— Send SNMP traps, and specifies the minimum time between consecutive traps.
Page 38
Not approved by Document Control. For review only.
Address Table Commands
Default Configuration
This setting is disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, port 1/e1 forwards all packets without learning addresses of packets from unknown sources and sends traps every 100 seconds if a packet with an unknown source address is received.
Console(config)# interface ethernet 1/e1
Console(config-if)# port security forward trap 100
port security mode
The port security mode
Interface Configuration mode command configures the port security mode. Use the no form of this command to return to the default configuration.
Syntax port security mode
{ lock | max-addresses} no port security mode
Parameters
• lock
— Saves the current dynamic MAC addresses associated with the port and disables learning, relearning and aging.
• max-addresses
— Delete the current dynamic MAC addresses associated with the port. Learn up to the maximum addresses allowed on the port. Relearning and aging are enabled.
Default Configuration
Lock.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, port security mode is set to dynamic for Ethernet interface 1/e7.
Console(config)# interface ethernet 1/e7
Page 39
Allied Telesis
Command Line Interface User’s Guide
port security max
The port security max
Interface Configuration (Ethernet, port-channel) mode command configures the maximum number of addresses that can be learned on the port while the port is in port security mode. Use the no
form of this command to return to the default configuration.
Syntax port security max max-addr no port security max
Parameters
• max-addr — Maximum number of addresses that can be learned by the port.
(Range: 1-100)
Default Configuration
The default setting is 1 address.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
This command is only relevant in dynamic learning modes.
Example
In this example, the maximum number of addresses that are learned on port 1/e7 before it is locked is set to 20.
Console(config)# interface ethernet 1/e7
Console(config-if)# port security max 20
port security routed secure-address
The port security routed secure-address
Interface Configuration (Ethernet, port-channel) mode command adds a MAC-layer secure address to a routed port. Use the no form of this command to delete a MAC address.
Syntax port security routed secure-address mac-address no port security routed secure-address mac-address
Parameters
• mac-address — A valid MAC address.
Default Configuration
No addresses are defined.
Page 40
Not approved by Document Control. For review only.
Address Table Commands
Command Mode
Interface Configuration (Ethernet, port-channel) mode. Cannot be configured for a range of interfaces (range context).
User Guidelines
The command enables adding secure MAC addresses to a routed port in port security mode. The command is available when the port is a routed port and in port security mode. The address is deleted if the port exits the security mode or is not a routed port.
Example
In this example, the MAC-layer address 66:66:66:66:66:66 is added to port 1/e1.
Console(config)# interface ethernet 1/e1
Console(config-if)# port security routed secure-address 66:66:66:66:66:66
show bridge address-table
The show bridge address-table
Privileged EXEC mode command displays all entries in the bridge-forwarding database.
Syntax show bridge address-table
[ vlan vlan ] [ ethernet interface | port-channel
port-channel-number ]
Parameters
• vlan — Specifies a valid VLAN, such as VLAN 1.
• interface — A valid Ethernet port .
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
Internal usage VLANs (VLANs that are automatically allocated on ports with a defined Layer 3 interface) are presented in the VLAN column by a port number and not by a VLAN ID.
"Special" MAC addresses that were not statically defined or dynamically learned are displayed in the MAC
Address Table.
Example
In this example, all classes of entries in the bridge-forwarding database are displayed.
Console# show bridge address-table
Page 41
Allied Telesis
Command Line Interface User’s Guide
Aging time is 300 sec
1
1 vlan
---------
1 mac address
--------------
Port
----
00:02:3f:b4:28:05 e16
00:07:40:c9:5f:83 ch5
00:15:77:74:64:40 ch5
Type
------dynamic dynamic dynamic
show bridge address-table static
The show bridge address-table static
Privileged EXEC mode command displays statically created entries in the bridge-forwarding database.
Syntax show bridge address-table static
[ vlan vlan ] [ ethernet interface | port-channel
port-channel-number ]
Parameters
• vlan — Specifies a valid VLAN, such as VLAN 1.
• interface — A valid Ethernet port .
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, all static entries in the bridge-forwarding database are displayed.
Console# show bridge address-table static
Aging time is 300 sec
1
1 vlan
----
200 mac address
-----------------
00:60:70:4C:73:FF
00:60.70.8C.73:FF
00:10:0D:48:37:FF port
----
1/e8
1/e8
1/e9 type
-----------------
Permanent delete-on-timeout delete-on-reset
Page 42
Not approved by Document Control. For review only.
Address Table Commands
show bridge address-table count
The show bridge address-table count
Privileged EXEC mode command displays the number of addresses present in the Forwarding Database.
Syntax show bridge address-table count
[ vlan vlan ][ ethernet interface-number | port-channel port-channel-number ]
Parameters
• vlan — Specifies a valid VLAN, such as VLAN 1.
• interface — A valid Ethernet port .
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, the number of addresses present in all VLANs are displayed.
Console# show bridge address-table count
This may take some time.
Capacity: 8192
Free: 8190
Used: 2
Secure: 0
Dynamic: 2
Static : 0
Internal: 0
Page 43
Allied Telesis
Command Line Interface User’s Guide
show bridge multicast address-table
The show bridge multicast address-table
Privileged EXEC mode command displays the bridge Multicast
Address Table information.
Syntax show bridge multicast address-table
[ vlan vlan-id ] [ address mac-multicast-address | ip-multicast-address ]
[ format ip
|
format mac
] [ source ip-address]
Parameters
• vlan-id — A valid VLAN ID value.
• mac-multicast-address — A valid MAC Multicast address.
• ip-multicast-address — A valid IP Multicast address.
• ip-address — Source IP address
• format ip|mac — Multicast address format. Can be ip
or mac
. If the format is unspecified, the default is mac
.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
A MAC address can be displayed in IP format only if it is in the range of 0100.5e00.0000-0100.5e7f.ffff.
Page 44
Not approved by Document Control. For review only.
Address Table Commands
Examples
In these examples, Multicast MAC address and IP Address Table information is displayed.
Console# show bridge multicast address-table
Multicast address table for VLANs in MAC-GROUP bridging mode:
1
1
Vlan
----
19
19
MAC Address
--------------
0100.5e23.8787
01:00:5e:02:02:03
01:00:5e:02:02:08
00:00:5e:02:02:08
Type
------static dynamic static dynamic
Ports
----------
1/e1, 2/e2
1/e1, 2/e2
1/e1-e8
1/e9-e11
Forbidden ports for multicast addresses:
Vlan
----
1
19
MAC Address
--------------
Ports
-----
01:00:5e:02:02:03 2/8
01:00:5e:02:02:08 2/8
Console # show bridge multicast address-table format ip
Multicast address table for VLANs in MAC-GROUP bridging mode:
1
1
Vlan IP/MAC Address
------------------------
0100.9923.8787
Type static
224-239.130|2.2.3
dynamic
Ports
---------------------------------
1/e1, 2/e2
1/e1, 2/e2
19
19
224-239.130|2.2.8
static 1/e1-e8
224-239.130|2.2.8
dynamic 1/e9-e11
Forbidden ports for multicast addresses:
Ports
---------
1
19
--------------------------
224-239.130|2.2.3
2/8
224-239.130|2.2.8
2/8
Page 45
Allied Telesis
Command Line Interface User’s Guide
Note
A Multicast MAC address maps to multiple IP addresses as shown above.
show bridge multicast address-table static
The s how bridge multicast address-table static
Privileged EXEC mode command displays statically configured
Multicast addresses.
Syntax show bridge multicast address-table static
[vlan
vlan-id]
[address
mac-multicast-address |
Parameters
• vlan-id — A valid VLAN ID value.
• mac-multicast-address — A valid MAC Multicast address.
• ip-multicast-address — A valid IP Multicast address.
• ip-address — Source IP address
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
A MAC address can be displayed in IP format only if it's in the range 0100.5e00.0000 through 0100.5e7f.ffff.
Example
In this example, Multicast MAC address and IP Address Table information is displayed.
Console# show bridge multicast address-table static
Multicast address table for VLANs in MAC-GROUP bridging mode:
Vlan
----
1
MAC Address
--------------
0100.5e23.8787
Type
------static
Ports
----------
1/e1, 2/e2
Forbidden ports for multicast addresses:
Vlan MAC Address Ports
---------console#
----------------------------------------------------
show bridge multicast filtering
The show bridge multicast filtering
User EXEC mode command displays Multicast filtering configuration.
Page 46
Not approved by Document Control. For review only.
Filtering:
Enabled
VLAN: 1
Forward-All
1/e6
1/e7
1/e8
1/e9
1/e10
1/e11
1/e12
Port
----
1/e1
1/e2
1/e3
1/e4
1/e5
Syntax show bridge multicast filtering vlan-id
Parameters
• vlan-id — VLAN ID value.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, the Multicast configuration for VLAN 1 is displayed.
Console# show bridge multicast filtering 1
-
-
-
-
-
-
-
-
-
-
-
Static
---------
-
Status
---------
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Filter
Page 47
Address Table Commands
Allied Telesis
Command Line Interface User’s Guide
show ports security
The show ports security
Privileged EXEC mode command displays the port-lock status.
Syntax show ports security
[ ethernet interface | port-channel
port-channel-number ]
Parameters
• interface — A valid Ethernet port .
• port-channel-number — A valid port-channel number .
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, all classes of entries in the port-lock status are displayed:
Console# show ports security
Port Status
----
1/e1
1/e2
1/e3
-------
Locked
Unlocked
Locked
Learning
--------
Dynamic
Dynamic
Disabled
Action
-------
Discard
- 28
Discard,
Shutdown
8
Maximum
-------
3
The following table describes the fields shown above.
Field
Port
Status
Learning
Action
Maximum
Trap
Frequency
Trap
-------
Frequency
---------
Enable 100
-
Disable
-
-
Description
Port number
Locked/Unlocked
Learning mode
Action on violation
Maximum addresses that can be associated on this port in Static
Learning mode or in Dynamic Learning mode
Indicates if traps are sent in case of a violation
Minimum time between consecutive traps
Page 48
Not approved by Document Control. For review only.
Address Table Commands
Port
----
1/e1
1/e2
1/e3
1/e4
1/e5
1/e6 ch1 ch2
show ports security addresses
The show ports security addresses
Privileged EXEC mode command displays the current dynamic addresses in locked ports.
Syntax show ports security addresses
[ ethernet interface | port-channel
port-channel-number ]
Parameters
• interface — A valid Ethernet port .
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Examples
In these examples, dynamic addresses in currently locked ports are displayed.
Console# show ports security addresses
Status
--------
Disabled
Disabled
Learning
--------
Lock
Lock
Enabled Max-addresses
Port is a member in port-channel ch1
Disabled
Enabled
Lock
Max-addresses
Enabled
Enabled
Max-addresses
Max-addresses
0
0
-
0
-
-
Current
-------
0
1
10
50
128
1
1
Maximum
-------
1
Page 49
Allied Telesis
Command Line Interface User’s Guide
In this example, dynamic addresses in currently locked port 1/e1 are displayed.
Console# show ports security addresses ethernet 1/e1
Port
----
1/e1
Status
--------
Disabled
Learning
--------
Lock
Current
-------
-
Maximum
-------
1
Page 50
Not approved by Document Control. For review only.
Clock Commands
Chapter 5. Clock Commands
clock set
The clock set
Privileged EXEC mode command manually sets the system clock.
Syntax clock set hh:mm:ss day month year or clock set hh:mm:ss month day year
Parameters
• hh:mm:ss — Current time in hours (military format), minutes, and seconds (hh: 0 - 23, mm: 0 - 59, ss: 0 - 59 ).
• day — Current day (by date) in the month (1 - 31) .
• month — Current month using the first three letters by name (Jan, …, Dec).
• year — Current year (2000 - 2097).
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the system time to 13:32:00 on the 7th March 2002.
Console# clock set 13:32:00 7 Mar 2002
clock source
The clock source
Global Configuration mode command configures an external time source for the system clock.
Use no
form of this command to disable external time source.
Syntax clock source
{ sntp
} no clock source
Parameters
• sntp
— SNTP servers
Page 51
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
No external clock source
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures an external time source for the system clock.
Console(config)# clock source sntp
clock timezone
The clock timezone
Global Configuration mode command sets the time zone for display purposes. Use the no form of this command to set the time to the Coordinated Universal Time (UTC).
Syntax clock timezone hours-offset [ minutes minutes-offset ] [ zone acronym ] no clock timezone
Parameters
• hours-offset — Hours difference from UTC. (Range: -12 – +
• minutes-offset — Minutes difference from UTC. (Range: 0
–
13)
59)
• acronym — The acronym of the time zone. (Range: Up to 4 characters)
Default Configuration
Clock set to UTC.
Command Mode
Global Configuration mode
User Guidelines
The system internally keeps time in UTC, so this command is used only for display purposes and when the time is manually set.
Example
The following example sets the timezone to 6 hours difference from UTC.
Console(config)
# clock timezone -6 zone CST
Page 52
Not approved by Document Control. For review only.
Clock Commands
clock summer-time
The clock summer-time
Global Configuration mode command configures the system to automatically switch to summer time (daylight saving time). Use the no
form of this command to configure the software not to automatically switch to summer time.
Syntax clock summer-time recurring
{ usa
| eu
| { week day month hh:mm week day month hh:mm }} [ offset offset ] [ zone acronym ] clock summer-time date date month year hh:mm date month year hh:mm [ offset offset ] [ zone acronym ] clock summer-time date month date year hh:mm month date year hh:mm [ offset
offset ] [ zone acronym ] no clock summer-time recurring
Parameters
• recurring
— Indicates that summer time should start and end on the corresponding specified days every year.
• date
— Indicates that summer time should start on the first specific date listed in the command and end on the second specific date in the command.
• usa
— The summer time rules are the United States rules.
• eu
— The summer time rules are the European Union rules.
• week — Week of the month. (Range: 1 - 5, first
, last
)
• day — Day of the week (Range: first three letters by name, like sun
)
• date — Date of the month. (Range:1 - 31)
• month — Month. (Range: first three letters by name, like Jan)
• year — year - no abbreviation (Range: 2000 - 2097)
• hh:mm — Time in military format, in hours and minutes. (Range: hh: 0 - 23, mm:0 - 59)
• offset — Number of minutes to add during summer time. (Range: 1 - 1440)
• acronym — The acronym of the time zone to be displayed when summer time is in effect. (Range: Up to 4 characters)
Default Configuration
Summer time is disabled.
offset — Default is 60 minutes.
acronym — If unspecified default to the timezone acronym.
If the timezone has not been defined, the default is UTC.
Command Mode
Global Configuration mode
Page 53
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
In both the date
and recurring
forms of the command, the first part of the command specifies when summer time begins, and the second part specifies when it ends. All times are relative to the local time zone. The start time is relative to standard time. The end time is relative to summer time. If the starting month is chronologically after the ending month, the system assumes that the device is in the southern hemisphere.
USA rule for daylight savings time:
•
Start: Second Sunday in March
•
End: First Sunday in November
•
Time: 2 am local time
EU rule for daylight savings time:
•
Start: Last Sunday in March
•
End: Last Sunday in October
•
Time: 1.00 am (01:00)
Example
The following example sets summer time starting on the first Sunday in April at 2 am and finishing on the last
Sunday in October at 2 am.
Console(config)# clock summer-time recurring first sun apr 2:00 last sun oct 2:00
sntp authentication-key
The sntp authentication-key
Global Configuration mode command defines an authentication key for Simple
Network Time Protocol (SNTP). Use the no
form of this command to remove the authentication key for SNTP.
Syntax sntp authentication-key
number md5 value no sntp authentication-key number
Parameters
• number — Key number (Range: 1-4294967295)
• value — Key value (Range: 1-8 characters)
Default Configuration
No authentication key is defined.
Command Mode
Global Configuration mode
User Guidelines
Multiple keys can be generated.
Page 54
Not approved by Document Control. For review only.
Clock Commands
Example
The following example defines the authentication key for SNTP.
Console(config)# sntp authentication-key 8 md5 ClkKey
sntp authenticate
The sntp authenticate
Global Configuration mode command grants authentication for received Simple Network
Time Protocol (SNTP) traffic from servers. Use the no
form of this command to disable the feature.
Syntax sntp authenticate no sntp authenticate
Default Configuration
No authentication
Command Mode
Global Configuration mode
User Guidelines
The command is relevant for both Unicast and Broadcast.
Example
The following example defines the authentication key for SNTP and grants authentication.
Console(config)# sntp authentication-key 8 md5 ClkKey
Console(config)# sntp trusted-key 8
Console(config)# sntp authenticate
sntp trusted-key
The sntp trusted-key
Global Configuration mode command authenticates the identity of a system to which
Simple Network Time Protocol (SNTP) will synchronize. Use the no
form of this command to disable authentication of the identity of the system.
Syntax sntp trusted-key key-number no sntp trusted-key key-number
Parameters
• key-number — Key number of authentication key to be trusted. (Range: 1 - 4294967295)
Default Configuration
No keys are trusted.
Page 55
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
The command is relevant for both received Unicast and Broadcast.
If there is at least 1 trusted key, then unauthenticated messages will be ignored.
Example
The following example authenticates key 8.
Console(config)# sntp authentication-key 8 md5 ClkKey
Console(config)# sntp trusted-key 8
Console(config)# sntp authenticate
sntp client poll timer
The sntp client poll timer
Global Configuration mode command sets the polling time for the Simple Network
Time Protocol (SNTP) client. Use the no
form of this command to return to default configuration.
Syntax sntp client poll timer seconds no sntp client poll timer
Parameters
• seconds — Polling interval in seconds (Range: 60-86400)
Default Configuration
Polling interval is 1024 seconds.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the polling time for the Simple Network Time Protocol (SNTP) client to 120 seconds.
Console(config)# sntp client poll timer 120
sntp broadcast client enable
The sntp broadcast client enable
Global Configuration mode command enables Simple Network Time Protocol
(SNTP) Broadcast clients. Use the no
form of this command to disable SNTP Broadcast clients.
Page 56
Not approved by Document Control. For review only.
Clock Commands
Syntax sntp broadcast client enable no sntp broadcast client enable
Default Configuration
The SNTP Broadcast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
Use the sntp client enable (Interface)
Interface Configuration mode command to enable the SNTP client on a specific interface.
Example
The following example enables the SNTP Broadcast clients.
Console(config)#
sntp broadcast client enable sntp anycast client enable
The sntp anycast client enable
Global Configuration mode command enables SNTP Anycast client. Use the no form of this command to disable the SNTP Anycast client.
Syntax sntp anycast client enable no sntp anycast client enable
Default Configuration
The SNTP Anycast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
The sntp client poll timer
Global Configuration mode command determines polling time.
Use the sntp client enable (Interface)
Interface Configuration mode command to enable the SNTP client on a specific interface.
Example
The following example enables SNTP Anycast clients. console(config)# sntp anycast client enable
Page 57
Allied Telesis
Command Line Interface User’s Guide
sntp client enable (Interface)
The
sntp client enable
Interface Configuration (Ethernet, port-channel, VLAN) mode command enables the
Simple Network Time Protocol (SNTP) client on an interface. This applies to both receive Broadcast and Anycast updates. Use the no
form of this command to disable the SNTP client.
Syntax sntp client enable no sntp client enable
Default Configuration
The SNTP client is disabled on an interface.
Command Mode
Interface configuration (Ethernet, port-channel, VLAN) mode
User Guidelines
Use the sntp broadcast client enable
Global Configuration mode command to enable Broadcast clients globally.
Use the sntp anycast client enable
Global Configuration mode command to enable Anycast clients globally.
Example
The following example enables the SNTP client on Ethernet port 1/e3. onsole(config)# interface ethernet 1/e3
Console(config-if)# sntp client enable
sntp unicast client enable
The sntp unicast client enable
Global Configuration mode command enables the device to use the Simple
Network Time Protocol (SNTP) to request and accept SNTP traffic from servers. Use the no
form of this command to disable requesting and accepting SNTP traffic from servers.
Syntax sntp unicast client enable no sntp unicast client enable
Default Configuration
The SNTP Unicast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
Use the sntp server
Global Configuration mode command to define SNTP servers.
Page 58
Not approved by Document Control. For review only.
Clock Commands
Example
The following example enables the device to use the Simple Network Time Protocol (SNTP) to request and accept
SNTP traffic from servers.
Console(config)# sntp unicast client enable
sntp unicast client poll
The sntp unicast client poll
Global Configuration mode command enables polling for the Simple Network Time
Protocol (SNTP) predefined Unicast servers. Use the no
form of this command to disable the polling for SNTP client.
Syntax sntp unicast client poll no sntp unicast client poll
Default Configuration
Polling is disabled.
Command Mode
Global Configuration mode
User Guidelines
The sntp client poll timer
Global Configuration mode command determines polling time.
Example
The following example enables polling for Simple Network Time Protocol (SNTP) predefined Unicast clients.
Console(config)# sntp unicast client poll
sntp server
The sntp server
Global Configuration mode command configures the device to use the Simple Network Time
Protocol (SNTP) to request and accept SNTP traffic from a specified server. Use the no
form of this command to remove a server from the list of SNTP servers.
Syntax sntp server
{ ip-address
| hostname
}
[ poll
] [ key keyid ] no sntp server host
Parameters
• ip-address — IP address of the server.
• hostname — Hostname of the server. (Range: 1-158 characters)
• poll
— Enable polling.
• keyid — Authentication key to use when sending packets to this peer.
(Range:1-4294967295)
Page 59
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
No servers are defined.
Command Mode
Global Configuration mode
User Guidelines
Up to 8 SNTP servers can be defined.
To enable predefined Unicast clients globally use the sntp unicast client enable
Global Configuration mode command.
To enabling global polling use the sntp unicast client poll
Global Configuration mode command.
The sntp client poll timer
Global Configuration mode command determines polling time.
Example
The following example configures the device to accept SNTP traffic from the server on 192.1.1.1.
Console(config)# sntp server 192.1.1.1
show clock
The show clock
User EXEC mode command displays the time and date from the system clock.
Syntax show clock [detail]
Parameters
• detail
— Shows timezone and summertime configuration.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
The symbol that precedes the show clock display indicates the following:
Symbol
*
.
(blank)
Description
Time is not authoritative.
Time is authoritative.
Time is authoritative, but SNTP is not synchronized.
Page 60
Not approved by Document Control. For review only.
Clock Commands
Example
The following example displays the time and date from the system clock.
Console> show clock
15:29:03 PDT(UTC-7) Jun 17 2002
Time source is SNTP
Console> show clock detail
15:29:03 PDT(UTC-7) Jun 17 2002
Time source is SNTP
Time zone:
Acronym is PST
Offset is UTC-8
Summertime:
Acronym is PDT
Recurring every year.
Begins at first Sunday of April at 2:00.
Ends at last Sunday of October at 2:00.
Offset is 60 minutes.
show sntp configuration
The show sntp configuration
Privileged EXEC mode command shows the configuration of the Simple Network
Time Protocol (SNTP).
Syntax show sntp configuration
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the current SNTP configuration of the device.
Console# show sntp configuration
Polling interval: 7200 seconds
MD5 Authentication keys: 8, 9
Page 61
Allied Telesis
Command Line Interface User’s Guide
Authentication is required for synchronization.
Trusted Keys: 8, 9
Unicast Clients: Enabled
Unicast Clients Polling: Enabled
Server
-----------
176.1.1.8
176.1.8.179
Polling
-------
Enabled
Disabled
Encryption Key
--------------
9
Disabled
Broadcast Clients: Enabled
Anycast Clients: Enabled
Broadcast and Anycast Interfaces: 1/e1, 1/e3
show sntp status
The show sntp status
Privileged EXEC mode command shows the status of the Simple Network Time Protocol
(SNTP).
Syntax show sntp status
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example shows the status of the SNTP.
Console# show sntp status
Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast
Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)
Unicast servers:
Server Status Last response Offset
[mSec]
Delay
[mSec]
Page 62
Not approved by Document Control. For review only.
Clock Commands
-----------
176.1.1.8
176.1.8.179
Broadcast:
Interface
---------
176.9.1.1
-------
Up
Unknown
------
7.33
8.98
------
117.79
189.19
Anycast server:
Server
---------
176.1.11.8
-------
VLAN 118
-----
Up
-----------------------------
9:53:21.789 PDT Feb 19 2002
Offset Delay
[mSec]
------
7.19
[mSec]
-----
119.89
Interface
---------
VLAN 119
----------------------------
19:58:22.289 PDT Feb 19 2002
12:17.17.987 PDT Feb 19 2002
Last response
----------------------------
19:17:59.792 PDT Feb 19 2002
Page 63
Allied Telesis
Command Line Interface User’s Guide
Chapter 6. Configuration and Image File Commands
copy
The copy
Privileged EXEC mode command copies files from a source to a destination.
Syntax copy source-url destination-url
Parameters
• source-url — The source file location URL or reserved keyword of the source file to be copied.
(Range: 1-160 characters)
• destination-url — The destination file URL or reserved keyword of the destination file.
(Range: 1-160 characters)
The following table displays keywords and URL prefixes:
Keyword flash: running-config startup-config image boot tftp:// xmodem: unit:
//member/ image unit:
//member/ boot null: backup-config unit:
//member/ backup-config
Source or Destination
Source or destination URL for flash memory. It’s the default in case a URL is specified without a prefix.
Represents the current running configuration file.
Represents the startup configuration file.
If the source file, represents the active image file. If the destination file, represents the non-active image file.
Boot file.
Source or destination URL for a TFTP network server. The syntax for this alias is
tftp:
// host/[directory]/filename . The host can be represented by its IP address or hostname.
Source for the file from a serial connection that uses the Xmodem protocol.
Image file on one of the units. To copy from the master to all units, specify * in the member field.
Boot file on one of the units. To copy from the master to all units, specify * in the member field.
Null destination for copies or files. A remote file can be copied to null to determine its size.
Represents the backup configuration file.
Backup configuration on one of the units.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Page 64
Not approved by Document Control. For review only.
Configuration and Image File Commands
User Guidelines
Up to five backup configuration files are supported on the device.
The location of a file system dictates the format of the source or destination URL.
The entire copying process may take several minutes and differs from protocol to protocol and from network to network.
*.prv and *.sys files cannot be copied.
Understanding Invalid Combinations of Source and Destination
Some invalid combinations of source and destination exist. Specifically, you cannot copy if one of the following conditions exist:
The source file and destination file are the same file.
xmodem:
is the destination file. The source file can be copied to image
, boot
and null:
only.
tftp://
is the source file and destination file on the same copy.
The following table describes copy characters:
!
.
Character Description
For network transfers, indicates that the copy process is taking place. Each exclamation point indicates successful transfer of ten packets (512 bytes each).
For network transfers, indicates that the copy process timed out. Generally, many periods in a row means that the copy process may fail.
Copying an Image File from a Server to Flash Memory
To copy an image file from a server to flash memory, use the copy source-url
image command.
Copying a Boot File from a Server to Flash Memory
To copy a boot file from a server to flash memory, enter the copy source-url
boot
command.
Copying a Configuration File from a Server to the Running Configuration File
To load a configuration file from a network server to the running configuration file of the device, enter the copy source-url
running-config
command. The commands in the loaded configuration file are added to those in the running configuration file as if the commands were typed in the command-line interface (CLI). Thus, the resulting configuration file is a combination of the previous running configuration and the loaded configuration files with the loaded configuration file taking precedence.
Copying a Configuration File from a Server to the Startup Configuration
To copy a configuration file from a network server to the startup configuration file of the device, enter copy sourceurl startup-config
. The startup configuration file is replaced by the copied configuration file.
Storing the Running or Startup Configuration on a Server
Use the copy running-config destination-url command to copy the current configuration file to a network server using TFTP. Use the copy startup-config destination-url command to copy the startup configuration file to a network server.
Saving the Running Configuration to the Startup Configuration
To copy the running configuration to the startup configuration file, enter the copy running-config startup-config command.
Backing up the Running or Startup Configuration to a Backup Configuration File
Page 65
Allied Telesis
Command Line Interface User’s Guide
To copy the running configuration file to a backup configuration file, enter the copy running-config file command.
To copy the startup configuration file to a backup configuration file, enter the copy startup-config file
command.
Before copying from the backup configuration file to the running configuration file, make sure that the backup configuration file has not been corrupted.
Example
The following example copies system image file1 from the TFTP server 172.16.101.101 to a non-active image file.
Console# copy tftp : // 172.16.101.101/file1 image
Accessing file 'file1' on 172.16.101.101...
Loading file1 from 172.16.101.101:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK]
Copy took 0:01:11 [hh:mm:ss]
dir
The
dir
Privileged EXEC mode command displays the list of files on a flash file system.
Syntax dir
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the list of files on a flash file system.
Console# dir
Directory of flash:
File Name
----------
Permission FlashSize DataSize Modified
------------------- ------------------image-1 rw image-2 rw dhcpsn.prv
sshkeys.prv
--
--
5242880
5242880
131072
262144
4325376
4325376
---
---
01-Jan-2000 09:09:19
01-Jan-2000 01:02:15
01-Jan-2000 01:02:15
Page 66
Not approved by Document Control. For review only.
Configuration and Image File Commands syslog1.sys
syslog2.sys
directry.prv
startup-config r r
-rw
262144
262144
262144
524288
--
--
--
4
01-Jan-2000 01:03:21
01-Jan-2000 01:03:21
01-Jan-2000 01:02:15
01-Jan-2000 01:06:34
Total size of flash: 15728640 bytes
Free size of flash: 3538944 bytes console#
delete
The delete
Privileged EXEC mode command deletes a file from a flash memory device.
Syntax delete url
Parameters
• url — The location URL or reserved keyword of the file to be deleted. (Range: 1-160 characters)
The following table displays keywords and URL prefixes:
Keyword flash: startup-config
Source or Destination
Source or destination URL for flash memory. It’s the default in case a URL is specified without a prefix.
Represents the startup configuration file.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
*.sys, *.prv, image-1 and image-2 files cannot be deleted.
Example
The following example deletes file test
from flash memory.
Console# delete flash: test
Delete flash:test? [confirm]
Page 67
Allied Telesis
Command Line Interface User’s Guide
boot system
The boot system
Privileged EXEC mode command specifies the system image that the device loads at startup.
Syntax boot system
[ unit unit ] { image-1
| image-2
}
Parameters
• unit — Specifies the unit number.
• image-1
— Specifies image 1 as the system startup image.
• image-2
— Specifies image 2 as the system startup image.
Default Configuration
If the unit number is unspecified, the default setting is the master unit number.
Command Mode
Privileged EXEC mode
User Guidelines
Use the show bootvar
command to find out which image is the active image.
Example
The following example loads system image 1 at device startup.
Console# boot system image-1
show running-config
The
show running-config
Privileged EXEC mode command displays the contents of the currently running configuration file.
Syntax show running-config
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 68
Not approved by Document Control. For review only.
Configuration and Image File Commands
Example
The following example displays the contents of the running configuration file.
Console# show running-config software version 1.1
hostname device interface ethernet 1/e1 ip address 176.242.100.100 255.255.255.0
duplex full speed 1000 interface ethernet 1/e2 ip address 176.243.100.100 255.255.255.0
duplex full speed 1000
show startup-config
The
show startup-config
Privileged EXEC mode command displays the contents of the startup configuration file.
Syntax show startup-config
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the contents of the running configuration file.
Console# show startup-config software version 1.1
hostname device
Page 69
Allied Telesis
Command Line Interface User’s Guide interface ethernet 1/e1 ip address 176.242.100.100 255.255.255.0
duplex full speed 1000 interface ethernet 1/e2 ip address 176.243.100.100 255.255.255.0
duplex full speed 1000
show bootvar
The show bootvar
Privileged EXEC mode command displays the active system image file that is loaded by the device at startup.
Syntax show bootvar
[ unit unit ]
Parameters
• unit — Specifies the unit number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the active system image file that is loaded by the device at startup.
Console# show bootvar
Images currently available on the FLASH image-1 image-2 active not active (selected for next boot)
Unit
----
1
2
Active Image
-----------image-1 image-1
Selected for next boot
---------------------image-2 image-1
Page 70
Not approved by Document Control. For review only.
DHCP Option 82 Commands
Chapter 7. DHCP Option 82 Commands
ip dhcp information option
The ip dhcp information option
Global Configuration mode command enables Dynamic Host Configuration
Protocol (DHCP) option-82 data insertion. Use the no
form of this command to disable DHCP option-82 data insertion.
Syntax ip dhcp information option no ip dhcp information option
Parameters
This command has no arguments or keywords.
Default Configuration
DHCP option-82 data insertion is enabled.
Command Mode
Global Configuration mode
User Guidelines
DHCP option 82 is enabled only if DHCP snooping or DHCP relay are enabled.
Example
The following example enables DHCP option-82 data insertion.
Console(config)# ip dhcp information option
show ip dhcp information option
The show ip dhcp information option
EXEC mode command displays the DHCP option 82 configuration.
Syntax show ip dhcp information option
Parameters
This command has no arguments or keywords.
Default Configuration
DHCP option-82 data insertion is enabled.
Page 71
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Privileged EXEC
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the DHCP option 82 configuration.
Console(config)# show ip dhcp information option
ip dhcp relay enable
The
ip dhcp relay enable
Global Configuration mode command enables DHCP relay features on your router. Use the no
form of this command to disable the relay agent features.
Syntax ip dhcp relay {address|enable} no ip dhcp relay {address|enable}
Parameters
This command has no arguments or keywords.
Default Configuration
Disabled.
Command Mode
Global Configuration
User Guidelines
There are no user guidelines for this command.
Example
The following example enables DHCP relay features.
Console(config)# ip dhcp relay enable
Page 72
Not approved by Document Control. For review only.
DHCP Snooping Commands
Chapter 8. DHCP Snooping Commands
ip dhcp snooping
The ip dhcp snooping
Global Configuration mode command globally enables DHCP snooping. Use the no
form of this command to return to the default setting.
Syntax ip dhcp snooping no ip dhcp snooping
Parameters
This command has no arguments or keywords
Default Configuration
Disabled
Command Mode
Global Configuration mode
User Guidelines
For any DHCP snooping configuration to take effect, DHCP snooping must be globally enabled. DHCP snooping is not active until snooping on a VLAN is enabled by using the ip dhcp snooping
VLAN Global Configuration mode command.
Example
.The following example configures globally enabling DHCP snooping.
Console(config)# ip dhcp snooping
ip dhcp snooping vlan
The ip dhcp snooping vlan
Global Configuration mode command enables DHCP snooping on a VLAN. Use the no
form of this command to disable DHCP snooping on a VLAN
Syntax ip dhcp snooping vlan
vlan-id no ip dhcp snooping vlan vlan-id
Parameters
• vlan-id — Specify VLAN ID.
Default Configuration
Disabled
Page 73
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
DHCP snooping must be first globally enabled before enabling DHCP snooping on a VLAN.
Example
The following example configures DHCP snooping on a VLAN.
Console(config)# ip dhcp snooping vlan 1
ip dhcp snooping trust
The ip dhcp snooping trust
Interface Configuration mode command configures a port as trusted for DHCP snooping purposes. Use the no
form of this command to return to the default setting.
Syntax ip dhcp snooping trust no ip dhcp snooping trust
Parameters
This command has no arguments or keywords.
Default Configuration
Interface configuration (Ethernet, Port-channel)
Command Mode
Interface Configuration mode
User Guidelines
Configure as trusted ports those that are connected to a DHCP server or to other switches or routers. Configure as untrusted ports those that are connected to DHCP clients.
Example
.The following example configures a port as trusted for DHCP snooping purposes. console# console# configure console(config)# interface ethernet 1/e1 console(config-if)# ip dhcp snooping trust console(config-if)#
Page 74
Not approved by Document Control. For review only.
DHCP Snooping Commands
ip dhcp snooping information option allowed-untrusted
The ip dhcp snooping information option allowed-untrusted
Global Configuration mode command configures a switch to accept DHCP packets with option-82 information from an untrusted port. Use the no
form of this command to configure the switch to drop these packets from an untrusted port.
Syntax ip dhcp snooping information option allowed-untrusted no ip dhcp snooping information option allowed-untrusted
Parameters
This command has no arguments or keywords.
Default Configuration
Discard DHCP packets with option-82 information from an untrusted port.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the switch to accept DHCP packets with option-82 information from an untrusted port.
Console(config)# ip dhcp snooping information option allowed-untrusted
ip dhcp snooping verify
The ip dhcp snooping verify
Global Configuration mode command configures the switch to verify, on an untrusted port, that the source MAC address in a DHCP packet matches the client hardware address. Use the no form of this command to configure the switch to not verify the MAC addresses.
Syntax ip dhcp snooping verify no ip dhcp snooping verify
Parameters
This command has no arguments or keywords.
Default Configuration
The switch verifies the source MAC address in a DHCP packet that is received on untrusted ports matches the client hardware address in the packet.
Command Mode
Global configuration.
Page 75
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the switch to verify on an untrusted port that the source MAC address in a
DHCP packet matches the client hardware address
Console(config) # ip dhcp snooping verify
ip dhcp snooping database
The ip dhcp snooping database
Global Configuration mode command configures the DHCP snooping binding file. Use the no
form of this command to delete the binding file.
Syntax ip dhcp snooping database no ip dhcp snooping database
Parameters
This command has no arguments or keywords.
Default Configuration
The URL is not defined.
Command Mode
Global Configuration mode
User Guidelines
To ensure that the lease time in the database is accurate, Simple Network Time Protocol (SNTP) is enabled and configured.
The switch writes binding changes to the binding file only when the switch system clock is synchronized with
SNTP.
Example
.The following example configures the DHCP snooping binding file.
Console(config)# ip dhcp snooping database
ip dhcp snooping database update-freq
The ip dhcp snooping database update-freq
Global Configuration mode command configures the update frequency of the DHCP snooping binding file. Use the no
form of this command to return to default.
Syntax ip dhcp snooping database update-freq seconds
Page 76
Not approved by Document Control. For review only.
DHCP Snooping Commands no ip dhcp snooping database update-freq
Parameters
• seconds — Specify, in seconds, the update frequency (Range: 600 - 86400 ).
Default Configuration
1200
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the update frequency of the DHCP snooping binding file.
Console(config)# ip dhcp snooping database update-freq
ip dhcp snooping binding
The ip dhcp snooping binding
Privileged EXEC mode command configures the DHCP snooping binding database and adds binding entries to the database. Use the no
form of this command to delete entries from the binding database.
Syntax ip dhcp snooping binding
mac-address vlan-id ip-address { ethernet interface | port
-channel port-channelnumber }
expiry seconds no ip dhcp snooping binding
mac-address vlan-id
Parameters
• mac-address — Specify a MAC address
• vlan-id — Specify a VLAN number
• ip-address — Specify an IP address
• interface — Specify Ethernet port
• port-channel-number — Specify Port-channel number
• expiry seconds — Specify the interval, in seconds, after which the binding entry is no longer valid (Range: 10
- 4294967295)
Default Configuration
No static binding exists
Command Mode
Privileged EXEC
Page 77
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
After entering this command an entry is added to the DHCP snooping database. If DHCP snooping binding file exists, the entry is added to that file also.
The entry is displayed in the show commands as a ‘DHCP Snooping entry’.
Example
The following example configures the DHCP snooping binding database and adds binding entries to the database.
Console# ip dhcp snooping binding 0060.704c.73ff 3 10.1.8.1 ethernet 1/e21
clear ip dhcp snooping database
The clear ip dhcp snooping database
Privileged EXEC mode command clears the DHCP binding database.
Syntax clear ip dhcp snooping database
Parameters
This command has no arguments or keywords.
Default Configuration
No static binding exists
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example clears the DHCP binding database.
Console# clear ip dhcp snooping database
show ip dhcp snooping binding
The show ip dhcp snooping binding
User EXEC mode command displays the DHCP snooping binding database and configuration information for all interfaces on a switch.
Syntax show ip dhcp snooping binding [mac-address mac-address ]
[ip-address ip-address ]
[vlan vlan ] [ ethernet interface | port-channel port-channel-number ]
Page 78
Not approved by Document Control. For review only.
DHCP Snooping Commands
Parameters
• mac-address — Specify a MAC address
• ip-address — Specify an IP address.
• vlan-id — Specify a VLAN number.
• interface — Specify Ethernet port.
• port-channel-number — Specify Port-channel number
Default Configuration
Command Mode
EXEC
User Guidelines
There are no user guidelines for this command.
Example
Console# show ip dhcp snooping binding
Total number of binding: 2
MAC Adreess IP Address Lease (sec) Type VLAN Interface
------------------ --------------- ------------ ---------- ---- ----------
00:60:70:4c:73:ff 10.1.8.1 4294967295 snooping 3 1/e21
00:60:70:4c:7f:c1 10.1.8.2 4294967295 snooping 3 1/e22
Console#
Page 79
Allied Telesis
Command Line Interface User’s Guide
Chapter 9. Ethernet Configuration Commands
interface ethernet
The interface ethernet
Global Configuration mode command enters the interface configuration mode to configure an Ethernet type interface.
Syntax interface ethernet interface
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables configuring Ethernet port 5/e18.
Console(config)# interface ethernet 5/e18
interface range ethernet
The interface range ethernet
Global Configuration mode command configures multiple Ethernet type interfaces at the same time.
Syntax interface range ethernet
{ port-range | all
}
Parameters
• port-range — List of valid ports. Where more than one port is listed, separate nonconsecutive ports with a comma and no spaces, use a hyphen to designate a range of ports and group a list separated by commas in brackets.
• all
— All Ethernet ports.
Default Configuration
This command has no default configuration.
Page 80
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Command Mode
Global Configuration mode
User Guidelines
Commands under the interface range context are executed independently on each active interface in the range. If the command returns an error on one of the active interfaces, it does not stop executing commands on other active interfaces.
Example
The following example shows how ports 5/e18 to 5/e20 and 3/e1 to 3/24 are grouped to receive the same command.
Console(config)# interface range ethernet 5/e18-20,3/e1-24
Console(config-if)#
shutdown
The shutdown
Interface Configuration (Ethernet, port-channel) mode command disables an interface. Use the no form of this command to restart a disabled interface.
Syntax shutdown no shutdown
Default Configuration
The interface is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example disables Ethernet port 1/e5 operations.
Console(config)# interface ethernet 1/e5
Console(config-if)# shutdown
The following example restarts the disabled Ethernet port.
Console(config)# interface ethernet 1/e5
Console(config-if)# no shutdown
Page 81
Allied Telesis
Command Line Interface User’s Guide
description
The description
Interface Configuration (Ethernet, port-channel) mode command adds a description to an interface. Use the no form of this command to remove the description.
Syntax description string no description
Parameters
• string — Comment or a description of the port to enable the user to remember what is attached to the port.
(Range: 1-64 characters)
Default Configuration
The interface does not have a description.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example adds a description to Ethernet port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# description "RD SW#3"
speed
The speed
Interface Configuration (Ethernet, port-channel) mode command configures the speed of a given
Ethernet interface when not using auto-negotiation. Use the no form of this command to restore the default configuration.
Syntax speed
{
10
|
100
|
1000
} no speed
Parameters
• 10
— Forces10 Mbps operation.
• 100
— Forces 100 Mbps operation.
• 1000
— Forces 1000 Mbps operation.
Default Configuration
Maximum port capability
Page 82
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The no speed command in a port-channel context returns each port in the port-channel to its maximum capability.
Example
The following example configures the speed operation of Ethernet port 1/e5 to 100 Mbps operation.
Console(config)# interface ethernet 1/e5
Console(config-if)# speed 100
duplex
The duplex
Interface Configuration (Ethernet) mode command configures the full/half duplex operation of a given
Ethernet interface when not using auto-negotiation. Use the no form of this command to restore the default configuration.
Syntax duplex
{ half
| full
} no duplex
Parameters
• half
— Forces half-duplex operation
• full
— Forces full-duplex operation
Default Configuration
The interface is set to full duplex.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
When configuring a particular duplex mode on the port operating at 10/100 Mbps, disable the auto-negotiation on that port.
Half duplex mode can be set only for ports operating at 10 Mbps or 100 Mbps.
Example
The following example configures the duplex operation of Ethernet port 1/e5 to full duplex operation.
Console(config)# interface ethernet 1/e5
Console(config-if)# duplex full
Page 83
Allied Telesis
Command Line Interface User’s Guide
negotiation
The negotiation
Interface Configuration (Ethernet, port-channel) mode command enables auto-negotiation operation for the speed and duplex parameters of a given interface. Use the no form of this command to disable auto-negotiation.
Syntax negotiation
[capability1 [capability2…capability5]] no negotiation
Parameters
• capability — Specifies the capabilities to advertise. (Possible values: 10h, 10f, 100h,100f, 1000f)
Default Configuration
Auto-negotiation is enabled.
If unspecified, the default setting is to enable all capabilities of the port.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
If capabilities were specified when auto-negotiation was previously entered, not specifying capabilities when currently entering auto-negotiation overrides the previous configuration and enables all capabilities.
Example
The following example enables auto-negotiation on Ethernet port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# negotiation
flowcontrol
The flowcontrol
Interface Configuration (Ethernet, port-channel) mode command configures flow control on a given interface. Use the no form of this command to disable flow control.
Syntax flowcontrol
{ on
| off
} no flowcontrol
Parameters
• on
— Enables flow control.
• off
— Disables flow control.
Default Configuration
Flow control is off.
Page 84
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
Negotiation should be enabled for flow control auto
.
Example
In the following example, flow control is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# flowcontrol on
mdix
The mdix
Interface Configuration (Ethernet) mode command enables cable crossover on a given interface. Use the no form of this command to disable cable crossover.
Syntax mdix {on | auto} no mdix
Parameters
• on
— Manual mdix
• auto
— Automatic mdi/mdix
Default Configuration
The default setting is on
.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
Auto:
All possibilities to connect a PC with cross or normal cables are supported and are automatically detected.
On
: It is possible to connect to a PC only with a normal cable and to connect to another device only with a cross cable.
No
: It is possible to connect to a PC only with a cross cable and to connect to another device only with a normal cable.
Example
In the following example, automatic crossover is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# mdix auto
Page 85
Allied Telesis
Command Line Interface User’s Guide
back-pressure
The back-pressure
Interface Configuration (Ethernet, port-channel) mode command enables back pressure on a given interface. Use the no form of this command to disable back pressure.
Syntax back-pressure no back-pressure
Default Configuration
Back pressure is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
In the following example back pressure is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# back-pressure
clear counters
The clear counters
User EXEC mode command clears statistics on an interface.
Syntax clear counters
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — Valid Ethernet port.
(Full syntax: unit/port )
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 86
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Example
In the following example, the counters for interface 1/e1 are cleared.
Console> clear counters ethernet 1/e1
set interface active
The set interface active
Privileged EXEC mode command reactivates an interface that was shutdown.
Syntax set interface active
{ ethernet interface | port-channel port-channel-number }
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
This command is used to activate interfaces that were configured to be active, but were shutdown by the system for some reason (e.g., port security)
.
Example
The following example reactivates interface 1/e5.
Console# set interface active ethernet 1/e5
show interfaces advertise
The show interfaces advertise
Privileged EXEC mode command displays autonegotiation data.
Syntax show interfaces advertise [ethernet interface | port-channel port-channel-number ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Page 87
Allied Telesis
Command Line Interface User’s Guide
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following examples display autonegotiation information.
Console# show interfaces advertise e11 e12 e13 e14 e7 e8 e9 e10 e3 e4 e5 e6
Port
---e1 e2 e15 e16 e17 e18 e19 e20
Type
-----------
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
Neg
-------
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
--
--
--
--
--
--
--
--
--
--
--
--
--
--
Operational Link Advertisement
------------------------------
--
--
--
--
100f, 100h, 10f, 10h
--
show interfaces configuration
The show interfaces configuration
Privileged EXEC mode command displays the configuration for all configured interfaces.
Syntax show interfaces configuration [ethernet interface | port-channel port-channel-number ]
Page 88
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the configuration of all configured interfaces:
Console# show interfaces configuration
Port Type e11 e12 e13 e14 e7 e8 e9 e10 e15 e16 e17 e18 e19 e3 e4 e5 e6
---e1 e2
-----------
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
Duplex Speed
100
100
100
100
100
100
100
100
100
100
100
100
100
-----
100
100
100
100
100
100
Full
Full
Full
Full
Full
Full
Full
Full
Full
Full
Full
Full
Full
------
Full
Full
Full
Full
Full
Full
Neg
-------
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Flow
Ctrl
Link
State
--------
Off
Off
Off
Off
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Back
Pressure
--------
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Mdix
Mode
----
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Page 89
Allied Telesis
Command Line Interface User’s Guide
show interfaces status
The show interfaces status
Privileged EXEC mode command displays the status of all configured interfaces.
Syntax show interfaces status [ethernet interface | port-channel port-channel-number ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the status of all configured interfaces:
Console# show interfaces status
Port Type e11 e12 e13 e14 e7 e8 e9 e10 e3 e4 e5 e6
---e1 e2
-----------
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
Duplex Speed
--
--
--
--
--
--
--
--
------
--
--
--
--
Full
--
--
--
--
--
--
--
--
--
-----
--
--
--
--
100
--
Neg
--
--
--
--
--
--
--
--
-------
--
--
--
--
Enabled
--
--
--
--
--
Off
--
--
--
--
--
--
--
--
--
Flow
Ctrl
Link
State
--------
Down
Down
Down
Down
Up
Down
Down
Down
Down
Down
Down
Down
Down
Down
--
--
--
--
Back
Pressure
--------
--
--
--
--
Disabled
--
--
--
--
--
--
--
--
--
Auto
--
--
--
--
--
--
--
--
--
Mdix
Mode
----
Page 90
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Port
----
1/e1
1/e2
1/e3
1/e4
1/e5
1/e6 ch1 ch2 e15 e16 e17 e18 e19
100M-Copper
100M-Copper
100M-Copper
100M-Copper
100M-Copper
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
Down
Down
Down
Down
Down
--
--
--
--
--
--
--
--
--
--
show interfaces description
The show interfaces description
Privileged EXEC mode command displays the description for all configured interfaces.
Syntax show interfaces description [ethernet interface | port-channel port-channel-number ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays descriptions of configured interfaces.
Console# show interfaces description
Description
----------lab
Page 91
Allied Telesis
Command Line Interface User’s Guide
show interfaces counters
The show interfaces counters
User EXEC mode command displays traffic seen by the physical interface.
Syntax show interfaces counters
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Modes
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays traffic seen by the physical interfaceThe following example displays counters for
Ethernet port 1/e1.0
console# show interfaces counters
Port InUcastPkts InMcastPkts
-----------------
1/e1 0
------------
0
1/e2
1/e3
0
0
Port OutUcastPkts
------------------
1/e1
1/e2
1/e3
0
0
0
0
0
OutMcastPkts
----------------
0
0
0
Ch
----
InUcastPkts InMcastPkts
------------------------ch1 ch2 ch3 ch4 ch5
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
InBcastPkts
---------------
0
0
0
OutBcastPkts
----------------
0
InBcastPkts
-------------
0
0
0
0
0
0
0
0
0
InOctets
------------
0
0
0
OutOctets
------------
InOctets
------------
Page 92
Not approved by Document Control. For review only.
Ethernet Configuration Commands ch6 ch7 ch8 ch4 ch5 ch6 ch7
-------ch1 ch2 ch3 ch8 console#
0
0
0
0
0
0
0
0
0
0 0
OutUcastPkts OutMcastPkts
0
0
-----------------------
0 0
0
0
0
0
0
0
0
Console# show interfaces counters ethernet 1/e1
0
0
0
0
0
0
0
0
OutBcastPkts
0
0
------------------
0
0
0
0
0
0
0
0
0
OutOctets
0
0
---------------
0
Port
------
1/e1
InUcastPkts
-----------
0
InMcastPkts
--------------
0
InBcastPkts
-----------
0
Port
------
1/e1
OutUcastPkts OutMcastPkts
-----------
0
FCS Errors: 0
Single Collision Frames: 0
Late Collisions: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Received Pause Frames: 0
Transmitted Pause Frames: 0
Console#
--------------
0
OutBcastPkts
------------
0
InOctets
-----------
0
OutOctets
------------
0
Page 93
Allied Telesis
Command Line Interface User’s Guide
The following table describes the fields shown in the display:
Field
InOctets
InUcastPkts
InMcastPkts
InBcastPkts
OutOctets
OutUcastPkts
OutMcastPkts
OutBcastPkts
FCS Errors
Description
Counted received octets.
Counted received Unicast packets.
Counted received Multicast packets.
Counted received Broadcast packets.
Counted transmitted octets.
Counted transmitted Unicast packets.
Counted transmitted Multicast packets.
Single Collision Frames
Counted transmitted Broadcast packets.
Counted received frames that are an integral number of octets in length but do not pass the FCS check.
Counted frames that are involved in a single collision, and are subsequently transmitted successfully.
Late Collisions
Oversize Packets
Internal MAC Rx Errors
Received Pause Frames
Number of times that a collision is detected later than one slotTime into the transmission of a packet.
Counted frames received that exceed the maximum permitted frame size.
Counted frames for which reception fails due to an internal MAC sublayer receive error.
Counted MAC Control frames received with an opcode indicating the PAUSE operation.
Transmitted Pause Frames Counted MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation.
show system flowcontrol
The show system flowcontrol
Privileged EXEC mode command displays the flow control state on cascade ports.
Syntax show system flowcontrol
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 94
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Example
Console# show system flowcontrol
port storm-control include-multicast (IC)
The port storm-control include-multicast
Interface Configuration (Ethernet) mode command counts Multicast packets in Broadcast storm control. Use the no form of this command to disable counting Multicast packets.
Syntax port storm-control include-multicast [unknown-unicast] no port storm-control include-multicast
Parameters
• unknown-unicast
— Specifies also counting unknown Unicast packets.
Default Configuration
Multicast packets are not counted.
Command Modes
Interface Configuration (Ethernet) mode
User Guidelines
This command is relevant to FE devices only.
To control Multicasts storms, use the port storm-control broadcast enable
and port storm-control broadcast rate
commands.
Example
The following example enables counting Broadcast and Multicast packets on Ethernet port 2/e3.
Console(config)# interface ethernet 2/e3
Console(config-if)# port storm-control include-multicast
port storm-control broadcast enable
The port storm-control broadcast enable
Interface Configuration (Ethernet) mode command enables Broadcast storm control. Use the no form of this command to disable Broadcast storm control.
Syntax port storm-control broadcast enable no port storm-control broadcast enable
Default Configuration
Broadcast storm control is disabled.
Page 95
Allied Telesis
Command Line Interface User’s Guide
Command Modes
Interface Configuration (Ethernet) mode
User Guidelines
Use the port storm-control broadcast rate
Interface Configuration (Ethernet) mode command, to set the maximum allowable Broadcast rate.
For FE devices, use the port storm-control include-multicast
Interface Configuration (Ethernet) mode command to enable counting Multicast packets and optionally unknown Unicast packets in the storm control calculation.
For GE devices, use the port storm-control include-multicast
Global Configuration mode command to enable counting Multicast packets in the storm control calculation.
Examples
The following example enables Broadcast storm control on Ethernet port 1/e5 of a FE device.
Console(config)# interface ethernet 1/e5
Console(config-if)# port storm-control broadcast enable
The following example enables Broadcast storm control on port 1/g5 for aGE devices.
.
Console(config)# interface ethernet 1/g5
Console(config)# port storm-control broadcast enable
port storm-control broadcast rate
The port storm-control broadcast rate
Interface Configuration (Ethernet) mode command configures the maximum Broadcast rate. Use the no form of this command to return to the default configuration.
Syntax port storm-control broadcast rate rate no port storm-control broadcast rate
Parameters
• rate — Maximum kilobits per second of Broadcast and Multicast traffic on a port.
For FE ports, possible values are 70K - 100M.
For GE ports, possible values are in a range of 3500-1000000.
Default Configuration
For FE ports, the default storm control Broadcast rate is 3500Kbits/Sec.
For GE ports, the default storm control Broadcast rate is 12,000 Kbits/Sec.
Page 96
Not approved by Document Control. For review only.
Ethernet Configuration Commands
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
Use the port storm-control broadcast enable
Interface Configuration mode command to enable Broadcast storm control.
For FE ports, the software displays the actual rate since granularity depends on the requested rate.
For GE ports, the rate is rounded off to the nearest 64 Kbits/Sec (except for 1-63 Kbits/Sec which is rounded off to
64 Kbits/Sec). If the rate is 0, Broadcast packets are not forwarded.
Example
The following example configures the maximum storm control Broadcast rate at 900 Kbits/Sec on Ethernet port 1/ e5 of a FE port.
Console(config)# interface ethernet 1/e5
Console(config-if)# port storm-control broadcast rate 900
show ports storm-control
The show ports storm-control
User/Privileged EXEC mode command displays the storm control configuration.
show ports storm-control
[ interface ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the storm control configuration.
Console# show ports storm-control
Port State Rate [Kbits/Sec]
----
1/e1
--------
Enabled
----------------
70
2/e1
3/e1
Enabled
Disabled
100
100
Included
--------------------------------------
Broadcast, Multicast, Unknown Unicast
Broadcast
Broadcast
Page 97
Allied Telesis
Command Line Interface User’s Guide
Chapter 10.GVRP Commands
gvrp enable (Global)
GARP VLAN Registration Protocol (GVRP) is an industry-standard protocol designed to propagate VLAN information from device to device. With GVRP, a single device is manually configured with all desired VLANs for the network, and all other devices on the network learn these VLANs dynamically.
The gvrp enable
Global Configuration mode command enables GVRP globally. Use the no form of this command to disable GVRP on the device.
Syntax gvrp enable no gvrp enable
Default Configuration
GVRP is globally disabled.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables GVRP globally on the device.
Console(config)# gvrp enable
gvrp enable (Interface)
The gvrp enable
Interface Configuration (Ethernet, port-channel) mode command enables GVRP on an interface.
Use the no form of this command to disable GVRP on an interface.
Syntax gvrp enable no gvrp enable
Default Configuration
GVRP is disabled on all interfaces.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Page 98
Not approved by Document Control. For review only.
GVRP Commands
User Guidelines
An access port does not dynamically join a VLAN because it is always a member in only one VLAN.
Membership in an untagged VLAN is propagated in the same way as in a tagged VLAN. That is, the PVID is manually defined as the untagged VLAN VID.
Example
The following example enables GVRP on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6
Console(config-if)# gvrp enable
garp timer
The garp timer
Interface Configuration (Ethernet, Port channel) mode command adjusts the values of the join, leave and leaveall timers of GARP applications. Use the no form of this command to return to the default configuration.
Syntax garp timer
{ join
| leave
| leaveall
} timer_value no garp timer
Parameters
•
{ join
| leave
| leaveall
} — Indicates the type of timer.
• timer_value — Timer values in milliseconds in multiples of 10. (Range: 10-2147483647)
Default Configuration
Following are the default timer values:
•
Join timer — 200 milliseconds
•
Leave timer — 600 milliseconds
•
Leavall timer — 10000 milliseconds
Command Mode
Interface configuration (Ethernet, port-channel) mode
User Guidelines
The following relationship must be maintained between the timers:
Leave time must be greater than or equal to three times the join time.
Leave-all time must be greater than the leave time.
Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set differently on Layer
2-connected devices, the GARP application will not operate successfully.
Page 99
Allied Telesis
Command Line Interface User’s Guide
Example
The following example sets the leave timer for Ethernet port 1/e6 to 900 milliseconds.
Console(config)# interface ethernet 1/e6
Console(config-if)# garp timer leave 900
gvrp vlan-creation-forbid
The gvrp vlan-creation-forbid
Interface Configuration (Ethernet, port-channel) mode command disables dynamic VLAN creation or modification. Use the no form of this command to enable dynamic VLAN creation or modification.
Syntax gvrp vlan-creation-forbid no gvrp vlan-creation-forbid
Default Configuration
Dynamic VLAN creation or modification is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
This command forbids dynamic VLAN creation from the interface. The creation or modification of dynamic VLAN registration entries as a result of the GVRP exchanges on an interface are restricted only to those VLANs for which static VLAN registration exists.
Example
The following example disables dynamic VLAN creation on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6
Console(config-if)# gvrp vlan-creation-forbid
gvrp registration-forbid
The gvrp registration-forbid
Interface Configuration (Ethernet, port-channel) mode command deregisters all dynamic VLANs on a port and prevents VLAN creation or registration on the port. Use the no form of this command to allow dynamic registration of VLANs on a port.
Syntax gvrp registration-forbid no gvrp registration-forbid
Default Configuration
Dynamic registration of VLANs on the port is allowed.
Page 100
Not approved by Document Control. For review only.
GVRP Commands
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example forbids dynamic registration of VLANs on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6
Console(config-if)# gvrp registration-forbid
clear gvrp statistics
The clear gvrp statistics
Privileged EXEC mode command clears all GVRP statistical information.
Syntax clear gvrp statistics
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example clears all GVRP statistical information on Ethernet port 1/e6.
Console# clear gvrp statistics ethernet 1/e6
show gvrp configuration
The show gvrp configuration
User EXEC mode command displays GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation is enabled, and which ports are running GVRP.
Syntax show gvrp configuration
[ ethernet interface | port-channel port-channel-number ]
Page 101
Allied Telesis
Command Line Interface User’s Guide
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays GVRP configuration information:
Console> show gvrp configuration
GVRP Feature is currently enabled on the device.
Maximum VLANs: 255
Timers (milliseconds)
Port(s) Status Registration Dynamic VLAN
Creation
-----------------------
1/e1 Disabled Normal
1/e2
1/e3
Disabled
Disabled
Normal
Normal
-----------
Enabled
Enabled
Enabled
1/e4
1/e5
1/e6
1/e7
1/e8
1/e9
Console>
Disabled
Disabled
Disabled
Disabled
Normal
Normal
Normal
Normal
Disabled Normal
Disabled Normal
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Join
show gvrp statistics
The show gvrp statistics
User EXEC mode command displays GVRP statistics.
200
200
200
200
----
200
200
200
200
200
Leave
600
600
600
600
-----
600
600
600
600
600
Syntax show gvrp statistics
[ ethernet interface | port-channel port-channel-number ]
Leave All
---------
10000
10000
10000
10000
10000
10000
10000
10000
10000
Page 102
Not approved by Document Control. For review only.
GVRP Commands
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example shows GVRP statistical information:
Console> show gvrp statistics
GVRP Statistics:
Legend: rJE : Join Empty Received rEmp : rLE : sJE : sEmp :
Empty Received
Leave Empty Received
Join Empty Sent
Empty Sent rJIn: rLIn: rLA : sJIn: sLIn:
Join In Received
Leave In Received
Leave All Received
Join In Sent
Leave In Sent sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
show gvrp error-statistics
The show gvrp error-statistics
User EXEC mode command displays GVRP error statistics.
Syntax show gvrp error-statistics
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Page 103
Allied Telesis
Command Line Interface User’s Guide
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays GVRP statistical information.
Console> show gvrp error-statistics
GVRP Error Statistics:
Legend:
INVPROT : Invalid Protocol Id
INVATYP :
INVAVAL:
Invalid Attribute Type
Invalid Attribute Value
Port INVPROT INVATYP INVAVAL INVALEN INVEVENT
INVALEN :
INVEVENT:
Invalid Attribute Length
Invalid Event
Page 104
Not approved by Document Control. For review only.
IGMP Snooping Commands
Chapter 11.IGMP Snooping Commands
Note
In order to enable IGMP snooping, the user must enable bridge Multicast filtering
ip igmp snooping (Global)
The ip igmp snooping
Global Configuration mode command enables Internet Group Management Protocol
(IGMP) snooping. Use the no form of this command to disable IGMP snooping.
Syntax ip igmp snooping no ip igmp snooping
Default Configuration
IGMP snooping is disabled.
Command Mode
Global Configuration mode
User Guidelines
IGMP snooping can only be enabled on static VLANs.
Example
The following example enables IGMP snooping.
Console(config)# ip igmp snooping
ip igmp snooping (Interface)
The ip igmp snooping Interface Configuration (VLAN) mode command enables Internet Group Management
Protocol (IGMP) snooping on a specific VLAN. Use the no form of this command to disable IGMP snooping on a
VLAN interface.
Syntax ip igmp snooping no ip igmp snooping
Default Configuration
IGMP snooping is disabled .
Page 105
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
IGMP snooping can only be enabled on static VLANs.
Example
The following example enables IGMP snooping on VLAN 2.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping
ip igmp snooping mrouter learn-pim-dvmrp
The ip igmp snooping mrouter learn-pim-dvmrp
Interface Configuration (VLAN) mode command enables automatic learning of Multicast device ports in the context of a specific VLAN. Use the no form of this command to remove automatic learning of Multicast device ports.
Syntax ip igmp snooping mrouter learn-pim-dvmrp no ip igmp snooping mrouter learn-pim-dvmrp
Default Configuration
Automatic learning of Multicast device ports is enabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Multicast device ports can be configured statically using the bridge multicast forward-all
Interface Configuration
(VLAN) mode command.
Example
The following example enables automatic learning of Multicast device ports on VLAN 2.
Console(config) # interface vlan 2
Console(config-if)# ip igmp snooping mrouter learn-pim-dvmrp
Page 106
Not approved by Document Control. For review only.
IGMP Snooping Commands
ip igmp snooping host-time-out
The ip igmp snooping host-time-out
Interface Configuration (VLAN) mode command configures the host-timeout. If an IGMP report for a Multicast group was not received for a host-time-out period from a specific port, this port is deleted from the member list of that Multicast group. Use the no form of this command to return to the default configuration.
Syntax ip igmp snooping host-time-out time-out no ip igmp snooping host-time-out
Parameters
• time-out — Host timeout in seconds. (Range: 60 – 2147483647)
Default Configuration
The default host-time-out is 260 seconds.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
The timeout should be at least greater than 2*query_interval+max_response_time of the IGMP router.
Example
The following example configures the host timeout to 300 seconds.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping host-time-out 300
ip igmp snooping querier enable
The ip igmp snooping querier enable
Interface Configuration mode command enables Internet Group
Management Protocol (IGMP) querier on a specific VLAN. Use the no
form of this command to disable IGMP querier on a VLAN interface.
Syntax ip igmp snooping querier enable no ip igmp snooping querier enable
Parameters
This command has no arguments or keywords
Default Configuration
Disabled.
Page 107
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
IGMP snooping querier can be enabled on a VLAN only if IGMP snooping is enabled for that VLAN.
No more then one switch can be configured as an IGMP Querier for a VLAN.
When IGMP Snooping Querier is enabled, it starts after host-time-out/2 with no IGMP traffic detected from a
Multicast router.
The IGMP Snooping Querier disables itself if it detects IGMP traffic from a Multicast router. It restarts itself after host-time-out/2.
Following are the IGMP Snooping Querier parameters as function of the IGMP Snooping parameters:
•
QueryMaxResponseTime: host-time-out/15
•
QueryInterval: host-time-out/ 3
Example
.The following example configures Internet Group Management Protocol (IGMP) querier on a specific VLAN.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping querier enable
ip igmp snooping querier address
The ip igmp snooping querier address
Interface Configuration mode command defines the source IP address that the IGMP Snooping querier uses. Use the no
form of this command to return to default.
Syntax ip igmp snooping querier address ip-address no ip igmp snooping querier address
Parameters
This command has no arguments or keywords.
Default Configuration
If an IP address is configured for the VLAN, it is used as the source address of the IGMP snooping querier.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
If an IP address is not configured by this command, and no IP address is configured for the IGMP querier VLAN interface, the querier is disabled.
Page 108
Not approved by Document Control. For review only.
IGMP Snooping Commands
Example
.The following example configures the source IP address that the IGMP Snooping querier uses.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping querier address 192.168.1.220
ip igmp snooping querier version
The ip igmp snooping querier version
Interface Configuration mode command configures the IGMP version of an IGMP querier on a specific VLAN. Use the no
form of this command to return to default.
Syntax ip igmp snooping querier version {2 | 3} no ip igmp snooping querier version
Parameters
•
2 — Specifies that the IGMP version is IGMPv2.
•
3 — Specifies that the IGMP version is IGMPv3.
Default Configuration
IGMPv3
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
If the IGMP querier is configured to IGMPv3, the querier trys to work in IGMPv3. In case the hosts do not support
IGMPv3, the querier version is downgraded.
If the IGMP querier is configured to IGMPv2, the querier trys to work in IGMPv2. It can be downgraded automatically to IGMPv1, but never upgraded automatically to IGMPv3.
Example
.The following example configures the IGMP version of an IGMP querier on a specific VLAN.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping querier version 2
ip igmp snooping mrouter-time-out
The ip igmp snooping mrouter-time-out
Interface Configuration (VLAN) mode command configures the mrouter-time-out. The ip igmp snooping mrouter-time-out
Interface Configuration (VLAN) mode command is used for setting the aging-out time after Multicast device ports are automatically learned. Use the no form of this command to return to the default configuration.
Syntax ip igmp snooping mrouter-time-out time-out
Page 109
Allied Telesis
Command Line Interface User’s Guide no ip igmp snooping mrouter-time-out
Parameters
• time-out — Multicast device timeout in seconds (Range: 1 - 2147483647)
Default Configuration
The default value is 300 seconds.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the Multicast device timeout to 200 seconds.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping mrouter-time-out 200
ip igmp snooping leave-time-out
The ip igmp snooping leave-time-out
Interface Configuration (VLAN) mode command configures the leavetime-out. If an IGMP report for a Multicast group was not received for a leave-time-out period after an IGMP Leave was received from a specific port, this port is deleted from the member list of that Multicast group. Use the no form of this command to return to the default configuration.
Syntax ip igmp snooping leave-time-out
{ time-out | immediate-leave
} no ip igmp snooping leave-time-out
Parameters
• time-out — Specifies the leave-time-out in seconds for IGMP queries. (Range: 0-2147483647)
• immediate-leave
— Indicates that the port should be immediately removed from the members list after receiving IGMP Leave.
Default Configuration
The default leave-time-out configuration is 10 seconds.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
The leave timeout should be set greater than the maximum time that a host is allowed to respond to an IGMP query.
Page 110
Not approved by Document Control. For review only.
IGMP Snooping Commands
Use immediate leave
only where there is just one host connected to a port.
Example
The following example configures the host leave-time-out to 60 seconds.
Console(config)# interface vlan 2
Console(config-if)# ip igmp snooping leave-time-out 60
show ip igmp snooping mrouter
The show ip igmp snooping mrouter
User EXEC mode command displays information on dynamically learned
Multicast device interfaces.
Syntax show ip igmp snooping mrouter
[ interface vlan-id ]
Parameters
• vlan-id — VLAN number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays Multicast device interfaces in VLAN 1000.
Console> show ip igmp snooping mrouter interface 1000
VLAN
----
1000
Ports
-----
1/e1
Detected Multicast devices that are forbidden statically:
VLAN Ports
----
1000
-----
1/e19
Page 111
Allied Telesis
Command Line Interface User’s Guide
show ip igmp snooping interface
The show ip igmp snooping interface
EXEC mode command shows IGMP snooping configuration.
Syntax show ip igmp snooping interface vlan-id
Parameters
• vlan-id — VLAN number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
Console # show ip igmp snooping interface 1000
IGMP Snooping is globally enabled
IGMP Snooping admin: Enabled
Hosts and routers IGMP version: 2
IGMP snooping oper mode: Enabled
IGMP snooping querier admin: Enabled
IGMP snooping querier oper: Enabled
IGMP snooping querier address admin:
IGMP snooping querier address oper: 172.16.1.1
IGMP snooping querier version admin: 3
IGMP snooping querier version oper: 2
IGMP host timeout is 300 sec
IGMP Immediate leave is disabled. IGMP leave timeout is 10 sec
IGMP mrouter timeout is 300 sec
Automatic learning of multicast router ports is enable
Page 112
Not approved by Document Control. For review only.
IGMP Snooping Commands
show ip igmp snooping groups
The show ip igmp snooping groups
command displays the Multicast groups that was learned by the IGMP snooping
Syntax show ip igmp snooping groups
[ vlan
vlan-id] [ ip-multicast-address
ip-multicast-address] [ ip-address
ipaddress]
Parameters
• vlan-id — VLAN ID value
• ip-multicast-address — A valid IP Multicast address
• ip-address — Source IP address
Default Configuration
This command has no default configuration.
Command Mode
EXEC mode
User Guidelines
To see the actual Multicast Address Table use the show bridge multicast address-table
command
Example
The following example shows IGMP snooping information on Multicast groups.
Vlan
1
1
19
19
19
Group Address
231.2.2.3
231.2.2.3
231.2.2.8
231.2.2.8
231.2.2.8
IGMP Reporters that are forbidden statically:
Source address Include Ports
172.16.1.1
1/e1
172.16.1.2
172.16.1.1
2/e2
1/e9
172.16.1.2
172.16.1.3
1/e10-e11
Exclude ports
1/e12
1/e12
Vlan
1
19
Group Address
231.2.2.3
231.2.2.8
Source address Ports
172.16.1.1
2/e8
172.16.1.1
2/e8
Page 113
Allied Telesis
Command Line Interface User’s Guide
Chapter 12.IP Addressing Commands
ip address
The ip address
Interface Configuration (Ethernet, VLAN, port-channel) mode command sets an IP address. Use the no form of this command to remove an IP address.
Syntax ip address ip-address { mask | prefix-length } no ip address
[ ip-address ]
Parameters
• ip-address —Valid IP address
• mask — Valid network mask of the IP address.
• prefix-length — Specifies the number of bits that comprise the IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 8 -30)
Default Configuration
No IP address is defined for interfaces.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
A single IP address can be defined. The IP address can be defined only on the Management VLAN.
Example
The following example configures VLAN 1 with IP address 131.108.1.27 and subnet mask 255.255.255.0.
Console(config)# interface vlan 1
Console(config-if)# ip address 131.108.1.27 255.255.255.0
ip address dhcp
The ip address dhcp
Interface Configuration (Ethernet, VLAN, port-channel) mode command acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. Use the no form of this command to deconfigure an acquired IP address.
Syntax ip address dhcp
[ hostname host-name ] no ip address dhcp
Page 114
Not approved by Document Control. For review only.
IP Addressing Commands
Parameters
• host-name — Specifies the name of the host to be placed in the DHCP option 12 field. This name does not have to be the same as the host name specified in the hostname
Global Configuration mode command.
(Range: 1-20 characters)
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
The ip address dhcp
command allows any interface to dynamically learn its IP address by using the DHCP protocol.
Some DHCP servers require that the DHCPDISCOVER message have a specific host name. The ip address dhcp hostname host-name command is most typically used when the host name is provided by the system administrator.
If the device is configured to obtain its IP address from a DHCP server, it sends a DHCPDISCOVER message to provide information about itself to the DHCP server on the network.
If the ip address dhcp
command is used with or without the optional keyword, the DHCP option 12 field (host name option) is included in the DISCOVER message. By default, the specified DHCP host name is the globally configured host name of the device. However, the ip address dhcp hostname host-name command can be used to place a different host name in the DHCP option 12 field.
The no ip address dhcp
command deconfigures any IP address that was acquired, thus sending a
DHCPRELEASE message.
The IP address is defined only on the management VLAN.
Example
The following example acquires an IP address for VLAN 1 from DHCP.
Console(config)# interface vlan 1
Console(config-if)# ip address dhcp
ip default-gateway
The ip default-gateway
Global Configuration mode command defines a default gateway ( device). Use the no form of this command to return to the default configuration.
Syntax ip default-gateway
ip-address no ip default-gateway
Parameters
• ip-address — Valid IP address of the default gateway.
Page 115
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
No default gateway is defined.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example defines default gateway 192.168.1.1.
Console(config)# ip default-gateway 192.168.1.1
show ip interface
The show ip interface
Privileged EXEC mode command displays the usability status of configured IP interfaces.
Syntax show ip interface
[ ethernet interface-number | vlan
vlan-id | port-channel
port-channel number ]
Parameters
• interface-number — Valid Ethernet port.
• vlan-id — Valid VLAN number.
• port-channel number — Valid Port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example the displays the configured IP interfaces and their types.
Console# show ip interface
Gateway IP Address
------------------
192.168.1.1
Activity status
------
Active
Type
---------------
Static
Page 116
Not approved by Document Control. For review only.
IP Addressing Commands
IP Address
-------------
I/F
---------
Type
-------
Static console#
arp
The arp
Global Configuration mode command adds a permanent entry in the Address Resolution Protocol (ARP) cache. Use the no form of this command to remove an entry from the ARP cache.
Syntax arp ip_addr hw_addr { ethernet
i nterface-number | vlan vlan-id | port-channel port-channel number | out-ofband-eth oob-interface } no arp ip_addr { ethernet
i nterface-number | vlan vlan-id | port-channel port-channel number | out-of-band-eth oob-interface }
Parameters
• ip_addr — Valid IP address or IP alias to map to the specified MAC address.
• hw_addr — Valid MAC address to map to the specified IP address or IP alias.
• ethernet
interface-number — Valid Ethernet port.
• vlan
vlan-id — Valid VLAN number.
• port-channel number.
— Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
The software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware addresses. Because most hosts support dynamic resolution, static ARP cache entries do not generally have to be specified.
Example
The following example adds IP address 198.133.219.232 and MAC address 00:00:0c:40:0f:bc to the ARP table.
console(config)# arp
198.133.219.232 00:00:0c:40:0f:bc ethernet
1/e6
arp timeout
The arp timeout
Global Configuration mode command configures how long an entry remains in the ARP cache.
Use the no
form of this command to restore the default configuration.
Page 117
Allied Telesis
Command Line Interface User’s Guide
Syntax arp timeout seconds no arp timeout
Parameters
• seconds — Time (in seconds) that an entry remains in the ARP cache. (Range: 1-40000000)
Default Configuration
The default timeout is 60000 seconds.
Command Mode
Global Configuration mode
User Guidelines
It is recommended not to set the timeout value to less than 3600.
Example
The following example configures the ARP timeout to 12000 seconds.
Console(config)# arp timeout 12000
clear arp-cache
The clear arp-cache
Privileged EXEC mode command deletes all dynamic entries from the ARP cache.
Syntax clear arp-cache
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example deletes all dynamic entries from the ARP cache.
Console# clear arp-cache
Page 118
Not approved by Document Control. For review only.
IP Addressing Commands
show arp
The show arp
Privileged EXEC mode command displays entries in the ARP table.
Syntax show arp
[ ip-address
ip-address ] [ mac-address mac-address ] [ ethernet interface
| port-channel port-channelnumber ]
Parameters
• ip-address — Displays the ARP entry of a specific IP address.
• mac-address — Displays the ARP entry of a specific MAC address.
• interface — Displays the ARP entry of a specific Ethernet port interface.
• port-channel-number — Displays the ARP entry of a specific Port-channel number interface.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
Since the associated interface of a MAC address can be aged out from the FDB table, the Interface field can be empty.
When an ARP entry is associated with an IP interface that is defined on a port or port-channel, the VLAN field is empty.
Example
The following example displays entries in the ARP table.
Console# show arp
ARP timeout: 80000 Seconds
VLAN
-------------
VLAN 1
VLAN 1
Interface
-------------
1/e1
2/e2
IP Address
-------------
10.7.1.102
10.7.1.135
HW Address
-------------
Status
-------------
00:10:B5:04:DB:4B Dynamic
00:50:22:00:2A:A4 Static
ip domain-lookup
The ip domain-lookup
Global Configuration mode command enables the IP Domain Naming System (DNS)based host name-to-address translation. Use the no
form of this command to disable DNS-based host name-toaddress translation.
Syntax ip domain-lookup
Page 119
Allied Telesis
Command Line Interface User’s Guide no ip domain-lookup
Default Configuration
The default configuration is set to enabled.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables IP Domain Naming System (DNS)-based host name-to-address translation.
Console(config)# ip domain-lookup
ip domain-name
The
ip domain-name
Global Configuration mode command defines a default domain name used by the software to complete unqualified host names (names without a dotted-decimal domain name). Use the no
form of this command to remove the default domain name .
Syntax ip domain-name name no ip domain-name
Parameters
• name — Specifies the default domain name used to complete unqualified host names. Do not include the initial period that separates an unqualified name from the domain name. (Range: 1-158 characters)
Default Configuration
A default domain name is not defined.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example defines default domain name www.website.com.
Console(config)# ip domain-name www.website.com
Page 120
Not approved by Document Control. For review only.
IP Addressing Commands
ip name-server
The
ip name-server
Global Configuration mode command defines the available name servers. Use the no
form of this command to remove a name server.
Syntax ip name-server server-address [ server-address2 … server-address8 ] no ip name-server
[ server-address1 … server-address8 ]
Parameters
• server-address — Specifies IP addresses of the name server.
Default Configuration
No name server addresses are specified.
Command Mode
Global Configuration mode
User Guidelines
The preference of the servers is determined by the order in which they were entered.
Up to 8 servers can be defined using one command or using multiple commands.
To define a radius server on the out-of-band port, use the out-of-band IP address format: oob
/ip-address.
Example
The following example sets the available name server.
Console(config)# ip name-server 176.16.1.18
ip host
The ip host
Global Configuration mode command defines static host name-to-address mapping in the host cache.
Use the no
form of this command to remove the name-to-address mapping.
Syntax ip host name address no ip host name
Parameters
• name — Specifies the name of the host. (Range: 1-158 characters)
• address — Specifies the associated IP address.
Default Configuration
No host is defined.
Page 121
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
To define an out-of-band address, use the out-of-band IP address format: oob
/ip-address.
Example
The following example defines a static host name-to-address mapping in the host cache.
Console(config)# ip host accounting.website.com 176.10.23.1
clear host
The clear host
Privileged EXEC mode command deletes entries from the host name-to-address cache.
Syntax clear host
{ name |
*
}
Parameters
• name — Specifies the host entry to be removed. (Range: 1-158 characters
• *
— Removes all entries.
)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example deletes all entries from the host name-to-address cache.
Console# clear host *
clear host dhcp
The clear host dhcp
Privileged EXEC mode command deletes entries from the host name-to-address mapping received from Dynamic Host Configuration Protocol (DHCP).
Syntax clear host dhcp
{ name |
*
}
Parameters
• name — Specifies the host entry to be removed. (Range: 1-158 characters
)
Page 122
Not approved by Document Control. For review only.
IP Addressing Commands
• *
— Removes all entries.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
This command deletes the host name-to-address mapping temporarily until the next renew of the IP address.
Example
The following example deletes all entries from the host name-to-address mapping.
Console# clear host dhcp *
show hosts
The show hosts
Privileged EXEC mode command displays the default domain name, a list of name server hosts, the static and the cached list of host names and addresses.
Syntax show hosts
[ name ]
Parameters
• name — Specifies the host name. (Range: 1-158 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays host information.
Console# show hosts
System name: Device
Default domain is gm.com, sales.gm.com, usa.sales.gm.com(DHCP)
Name/address lookup is enabled
Name servers (Preference order): 176.16.1.18 176.16.1.19
Page 123
Allied Telesis
Command Line Interface User’s Guide
Configured host name-to-address mapping:
Host
---accounting.gm.com
Addresses
---------
176.16.8.8 176.16.8.9 (DHCP)
Cache:
Host
---www.stanford.edu
TTL(Hours)
Total
-----
72
Elapsed
-------
3
Type
------
IP
Addresses
---------
171.64.14.203
Page 124
Not approved by Document Control. For review only.
Line Commands
Chapter 13.Line Commands
line
The line
Global Configuration mode command identifies a specific line for configuration and enters the Line
Configuration command mode.
Syntax line
{ console
| telnet
| ssh
}
Parameters
• console
— Console terminal line.
• telnet
— Virtual terminal for remote console access (Telnet).
• ssh
— Virtual terminal for secured remote console access (SSH).
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the device as a virtual terminal for remote console access.
Console(config)# line telnet
Console(config-line)#
speed
The speed
Line Configuration mode command sets the line baud rate. Use the no form of this command to return to the default configuration.
Syntax speed bps no speed
Parameters
• bps —Baud rate in bits per second (bps). Possible values are 2400, 9600, 19200, 38400, 57600 and 115200.
Page 125
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
The default speed is 9600 bps.
Command Mode
Line Configuration (console) mode
User Guidelines
This command is available only on the line console.
The configured speed is applied when Autobaud is disabled. This configuration applies only to the current session.
Example
The following example configures the line baud rate to 115200.
Console(config)# line console
Console(config-line)# speed 115200
autobaud
The autobaud
Line Configuration mode command sets the line for automatic baud rate detection (autobaud). Use the no form of this command to disable automatic baud rate detection.
Syntax autobaud no autobaud
Default Configuration
Autobaud is disabled.
Command Mode
Line Configuration (console) mode
User Guidelines
This command is available only on the line console.
To start communication using Autobaud , press
<Enter>
twice. This configuration applies only to the current session.
Example
The following example enables autobaud.
Console(config)# line console
Console(config-line)# autobaud
Page 126
Not approved by Document Control. For review only.
Line Commands
exec-timeout
The exec-timeout
Line Configuration mode command sets the interval that the system waits until user input is detected. Use the no form of this command to return to the default configuration.
Syntax exec-timeout minutes [ seconds ] no exec-timeout
Parameters
• minutes — Specifies the number of minutes. (Range: 0 - 65535)
• seconds — Specifies additional time intervals in seconds. (Range: 0 - 59)
Default Configuration
The default configuration is 10 minutes.
Command Mode
Line Configuration mode
User Guidelines
To specify no timeout, enter the exec-timeout
0 command.
Example
The following example configures the interval that the system waits until user input is detected to 20 minutes.
Console(config)# line console
Console(config-line)# exec-timeout 20
history
The history
Line Configuration mode command enables the command history function. Use the no form of this command to disable the command history function.
Syntax history no history
Default Configuration
The command history function is enabled.
Command Mode
Line Configuration mode
User Guidelines
This command enables the command history function for a specified line. To enable or disable the command history function for the current terminal session, use the terminal history
user EXEC mode command.
Page 127
Allied Telesis
Command Line Interface User’s Guide
Example
The following example enables the command history function for telnet.
Console(config)# line telnet
Console(config-line)# history
history size
The history size
Line Configuration mode command configures the command history buffer size for a particular line. Use the no form of this command to reset the command history buffer size to the default configuration.
Syntax history size number-of-commands no history size
Parameters
• number-of-commands— Number of commands that the system records in its history buffer. (Range: 10 -160)
Default Configuration
The default history buffer size is 10.
Command Mode
Line Configuration mode
User Guidelines
This command configures the command history buffer size for a particular line. To configure the command history buffer size for the current terminal session, use the terminal history size
User EXEC mode command.
Example
The following example changes the command history buffer size to 100 entries for a particular line.
Console(config-line)# history size 100
terminal history
The terminal history
user EXEC command enables the command history function for the current terminal session. Use the no form of this command to disable the command history function.
Syntax terminal history terminal no history
Default Configuration
The default configuration for all terminal sessions is defined by the history
line configuration command.
Page 128
Not approved by Document Control. For review only.
Line Commands
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example disables the command history function for the current terminal session.
Console# terminal no history
terminal history size
The terminal history size user EXEC command configures the command history buffer size for the current terminal session. Use the no form of this command to reset the command history buffer size to the default setting.
Syntax terminal history size number-of-commands terminal no history size
Parameters
• number-of-commands —Specifies the number of commands the system may record in its command history buffer. (Range: 10-216)
Default Configuration
The default command history buffer size is 10.
Command Mode
User EXEC mode
User Guidelines
The terminal history size user EXEC command configures the size of the command history buffer for the current terminal session. Use the history
line configuration command to change the default size of the command history buffer.
The maximum number of commands in all buffers is 256.
Example
The following example configures the command history buffer size to 20 commands for the current terminal session.
Console# terminal history size 20
show line
The show line
User EXEC mode command displays line parameters.
Page 129
Allied Telesis
Command Line Interface User’s Guide
Syntax show line [console
| telnet
| ssh
]
Parameters
• console
— Console terminal line.
• telnet
— Virtual terminal for remote console access (Telnet).
• ssh
— Virtual terminal for secured remote console access (SSH).
Default Configuration
If the line is not specified, the default value is console.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the line configuration.
Console> show line
Console configuration:
Interactive timeout: Disabled
History: 10
Baudrate: 9600
Databits: 8
Parity: none
Stopbits: 1
Telnet configuration:
Interactive timeout: 10 minutes 10 seconds
History: 10
SSH configuration:
Interactive timeout: 10 minutes 10 seconds
History: 10
Page 130
Not approved by Document Control. For review only.
LACP Commands
Section 14.LACP Commands
lacp system-priority
The lacp system-priority
Global Configuration mode command configures the system priority. Use the no
form of this command to return to the default configuration.
Syntax lacp system-priority value no lacp system-priority
Parameters
• value — Specifies system priority value. (Range: 1 - 65535)
Default Configuration
The default system priority is 1.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the system priority to 120.
Console(config)# lacp system-priority 120
Page 131
Allied Telesis
Command Line Interface User’s Guide
lacp port-priority
The lacp port-priority
Interface Configuration (Ethernet) mode command configures physical port priority. Use the no
form of this command to return to the default configuration, use the no form of this command.
Syntax lacp port-priority value no lacp port-priority
Parameters
• value — Specifies port priority. (Range: 1 - 65535)
Default Configuration
The default port priority is 1.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example defines the priority of Ethernet port 1/e6 as 247.
Console(config)# interface ethernet 1/e6
Console(config-if)# lacp port-priority 247
Page 132
Not approved by Document Control. For review only.
LACP Commands
lacp timeout
The lacp timeout
Interface Configuration (Ethernet) mode command assigns an administrative LACP timeout.
Use the no
form of this command to return to the default configuration.
Syntax lacp timeout
{ long | short
} no lacp timeout
Parameters
• long
— Specifies the long timeout value.
• short
— Specifies the short timeout value.
Default Configuration
The default port timeout value is long
.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example assigns a long administrative LACP timeout to Ethernet port 1/e6 .
Console(config)# interface ethernet 1/e6
Console(config-if)# lacp timeout long
Page 133
Allied Telesis
Command Line Interface User’s Guide
show lacp ethernet
The show lacp ethernet
Privileged EXEC mode command displays LACP information for Ethernet ports.
Syntax show lacp ethernet interface [ parameters
| statistics
| protocol-state
]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• parameters
— Link aggregation parameter information.
• statistics
— Link aggregation statistics information.
• protocol-state
— Link aggregation protocol-state information.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example display LACP information for Ethernet port 1/e1.
Console show lacp ethernet 1/e1
Port 1/e1 LACP parameters:
Actor system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Admin timeout: port Oper timeout:
LACP Activity:
Aggregation: synchronization: collecting:
1
00:00:12:34:56:78
30
1
1
30
21
LONG
LONG
ACTIVE
AGGREGATABLE
FALSE
FALSE
Page 134
Not approved by Document Control. For review only.
Partner distributing: expired: system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Oper timeout:
LACP Activity:
Aggregation: synchronization: collecting: distributing: expired:
Port 1/e1 LACP Statistics:
LACP PDUs sent:
LACP PDUs received:
Port 1/e1 LACP Protocol State:
LACP State Machines:
Receive FSM:
Mux FSM:
Periodic Tx FSM:
Control Variables:
BEGIN:
LACP_Enabled:
Ready_N:
Selected:
Port_moved:
NNT:
Port_enabled:
Timer counters: periodic tx timer: current while timer: wait while timer:
Page 135
2
2
FALSE
FALSE
0
0
0
00:00:00:00:00:00
0
0
0
LONG
PASSIVE
AGGREGATABLE
FALSE
FALSE
FALSE
FALSE
0
0
0
Port Disabled State
Detached State
No Periodic State
FALSE
TRUE
FALSE
UNSELECTED
FALSE
FALSE
FALSE
LACP Commands
Allied Telesis
Command Line Interface User’s Guide
show lacp port-channel
The show lacp port-channel
Privileged EXEC mode command displays LACP information for a port-channel.
Syntax show lacp port-channel
[ port_channel_number ]
Parameters
• port_channel_number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays LACP information about port-channel 1.
Console# show lacp port-channel 1
Port-Channel 1: Port Type 1000 Ethernet
Actor
System Priority:
MAC Address:
Admin Key:
Oper Key:
Partner
System Priority:
MAC Address:
Oper Key:
1
00:02:85:0E:1C:00
29
29
0
00:00:00:00:00:00
14
Page 136
Not approved by Document Control. For review only.
Management ACL Commands
Chapter 15.Management ACL Commands
management access-list
The management access-list
Global Configuration mode command configures a management Access List and enters the Management Access-list Configuration command mode. Use the no
form of this command to delete an
Access List.
Syntax management access-list name no management access-list name
Parameters
• name — Access list name. (Range: 1-32 characters)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Use this command to configure a management Access List. The command enters the Access-list Configuration mode, where permit and deny access rules are defined using the permit (Management)
and deny
(Management)
commands.
If no match criteria are defined, the default is deny.
If you reenter an Access List context, the new rules are entered at the end of the Access List.
Use the management access-class
command to select the active Access List.
The active management list cannot be updated or removed.
Management ACL requires a valid management interface, which is a port, VLAN, or port-channel with an IP address or console interface. Management ACL only restricts access to the device for management configuration or viewing.
Example
The following example creates a management Access List called mlist , configures management Ethernet interfaces 1/e1 and 2/e9 and makes the new Access List the active list.
Console(config)# management access-list mlist
Console(config-macl)# permit ethernet 1/e1
Console(config-macl)# permit ethernet 2/e9
Console(config-macl)# exit
Console(config)# management access-class mlist
Page 137
Allied Telesis
Command Line Interface User’s Guide
The following example creates a management Access List called mlist, configures all interfaces to be management interfaces except Ethernet interfaces 1/e1 and 2/e9 and makes the new Access List the active list.
Console(config)# management access-list mlist
Console(config-macl)# deny ethernet 1/e1
Console(config-macl)# deny ethernet 2/e9
Console(config-macl)# permit
Console(config-macl)# exit
Console(config)# management access-class mlist
permit (Management)
The permit
Management Access-List Configuration mode command defines a permit rule.
Syntax permit
[ ethernet interface-number | vlan vlan-id | port-channel port-channel-number ] [ service service ] permit ip-source ip-address [ mask mask | prefix-length ] [ ethernet interface-number | vlan vlan-id | port-channel port-channel-number ] [ service service ]
Parameters
• interface-number — A valid Ethernet port number.
• vlan-id — A valid VLAN number.
• port-channel-number — A valid port channel index.
• ip-address — A valid source IP address.
• mask — A valid network mask of the source IP address.
• prefix-length — Number of bits that comprise the source IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0 - 32)
• service — Service type. Possible values: telnet
, ssh
, http, https
and snmp
.
Default Configuration
If no permit rule is defined, the default is set to deny
.
Command Mode
Management Access-list Configuration mode
User Guidelines
Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is defined on the appropriate interface.
The system supports up to 128 management access rules.
Example
The following example permits all ports in the mlist Access List.
Console(config)# management access-list mlist
Console(config-macl)# permit
Page 138
Not approved by Document Control. For review only.
Management ACL Commands
deny (Management)
The deny
Management Access-List Configuration mode command defines a deny rule.
Syntax deny
[ ethernet interface-number | vlan vlan-id | port-channel port-channel-number ] [ service service ] deny ip-source ip-address [ mask mask | prefix-length ] [ ethernet interface-number | vlan vlan-id | port-channel port-channel-number ] [ service service ]
Parameters
• interface-number — A valid Ethernet port number.
• vlan-id — A valid VLAN number.
• port-channel-number — A valid port-channel number.
• ip-address — A valid source IP address.
• mask — A valid network mask of the source IP address.
• mask prefix-length — Specifies the number of bits that comprise the source IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0-32)
• service — Service type. Possible values: telnet
, ssh
, http, https
and snmp
.
Default Configuration
This command has no default configuration.
Command Mode
Management Access-list Configuration mode
User Guidelines
Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is defined on the appropriate interface.
The system supports up to 128 management access rules.
Example
The following example denies all ports in the Access List called mlist.
Console(config)# management access-list mlist
Console(config-macl)# deny
management access-class
The management access-class
Global Configuration mode command restricts management connections by defining the active management Access List. Use the no
form of this command to disable this restriction.
Syntax management access-class
{ console-only
| name } no management access-class
Page 139
Allied Telesis
Command Line Interface User’s Guide
Parameters
• console-only
— Indicates that the device can be managed only from the console.
• name — Specifies the name of the Access List to be used. (Range: 1-32 characters)
Default Configuration
If no Access List is specified, an empty Access List is used.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures an Access List called mlist as the management Access List.
Console(config)# management access-class mlist
show management access-list
The show management access-list
Privileged EXEC mode command displays management access-lists.
Syntax show management access-list
[ name ]
Parameters
• name — Specifies the name of a management Access List. (Range: 1 - 32 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the mlist management Access List.
Console# show management access-list mlist mlist
----permit ethernet 1/e1
Page 140
Not approved by Document Control. For review only.
Management ACL Commands permit ethernet 2/e2
! (Note: all other access implicitly denied)
show management access-class
The show management access-class
Privileged EXEC mode command displays the active management
Access List.
Syntax show management access-class
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays information about the active management Access List.
Console# show management access-class
Management access-class is enabled, using access list mlist
Page 141
Allied Telesis
Command Line Interface User’s Guide
Chapter 16.PHY Diagnostics Commands
test copper-port tdr
The test copper-port tdr
Privileged EXEC mode command uses Time Domain Reflectometry (TDR) technology to diagnose the quality and characteristics of a copper cable attached to a port.
Syntax test copper-port tdr interface
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
The port to be tested should be shut down during the test, unless it is a combination port with fiber port active.
The maximum length of the cable for the TDR test is 120 meter.
Example
The following example results in a report on the cable attached to port 1/e3.
Console# test copper-port tdr 1/e3
Cable is open at 64 meters
Console# test copper-port tdr 2/e3
Can’t perform this test on fiber ports
show copper-ports tdr
The show copper-ports tdr
User EXEC mode command displays information on the last Time Domain
Reflectometry (TDR) test performed on copper ports.
Syntax show copper-ports tdr
[ interface ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
Page 142
Not approved by Document Control. For review only.
PHY Diagnostics Commands
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
The maximum length of the cable for the TDR test is 120 meter.
Example
The following example displays information on the last TDR test performed on all copper ports.
Console show copper-ports tdr
Port
----
1/e1
1/e2
1/e3
1/e4
1/e5
Result
------
OK
Length [meters]
---------------
Short 50
Test has not been performed
Open
Fiber
64
-
Date
----
13:32:00 23 July2005
13:32:00 23 July 2005
-
show copper-ports cable-length
The show copper-ports cable-length
User EXEC mode command displays the estimated copper cable length attached to a port.
Syntax show copper-ports cable-length
[ interface ]
Parameters
• interface — A valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
The port must be active and working in 100M or 1000M mode.
Page 143
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the estimated copper cable length attached to all ports.
Console show copper-ports cable-length
Port
----
1/e1
1/e2
1/e3
1/g1
Length [meters]
---------------------
< 50
Copper not active
110-140
Fiber
Page 144
Not approved by Document Control. For review only.
Port Channel Commands
Chapter 17.Port Channel Commands
interface port-channel
The interface port-channel
Global Configuration mode command enters the interface configuration mode to configure a specific port-channel.
Syntax interface port-channel port-channel-number
Parameters
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Eight aggregated links can be defined with up to eight member ports per port-channel. The aggregated links’ valid
IDs are 1-8.
Example
The following example enters the context of port-channel number 1.
Console(config)# interface port-channel 1
interface range port-channel
The interface range port-channel
Global Configuration mode command enters the interface configuration mode to configure multiple port-channels.
Syntax interface range port-channel
{ port-channel-range | all
}
Parameters
• port-channel-range — List of valid port-channels to add. Separate nonconsecutive port-channels with a comma and no spaces. A hyphen designates a range of port-channels.
• all
— All valid port-channels.
Default Configuration
This command has no default configuration.
Page 145
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
Commands under the interface range context are executed independently on each interface in the range.
Example
The following example groups port-channels 1, 2 and 6 to receive the same command.
Console(config)# interface range port-channel 1-2,6
channel-group
The channel-group
Interface Configuration (Ethernet) mode command associates a port with a port-channel. Use the no
form of this command to remove a port from a port-channel.
Syntax channel-group port-channel-number no channel-group
Parameters
• port-channel-number — Specifies the number of the valid port-channel for the current port to join.
Default Configuration
The port is not assigned to a port-channel.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example forces port 1/e1 to join port-channel 1.
Console(config)# interface ethernet 1/e1
Console(config-if)# channel-group 1 mode on
show interfaces port-channel
The show interfaces port-channel
Privileged EXEC mode command displays port-channel information.
Syntax show interfaces port-channel
[ port-channel-number ]
Page 146
Not approved by Document Control. For review only.
Parameters
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays information on all port-channels.
Console# show interfaces port-channel
1
2
Channel
-------
3
Ports
---------------------------------
Active: 1/e1, 2/e2
Active: 2/e2, 2/e7 Inactive: 3/e1
Active: 3/e3, 3/e8
Port Channel Commands
Page 147
Allied Telesis
Command Line Interface User’s Guide
Chapter 18.Port Monitor Commands
port monitor
The port monitor
Interface Configuration mode command starts a port monitoring session. Use the no
form of this command to stop a port monitoring session.
Syntax port monitor src-interface
[rx | tx] no port monitor src-interface
Parameters
• src-interface— Valid Ethernet port. (Full syntax: unit/port )
• rx
— Monitors received packets only.
• tx
— Monitors transmitted packets only.
Default Configuration
Monitors both received and transmitted packets.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
This command enables traffic on one port to be copied to another port, or between the source port (src-interface) and a destination port (port being configured).
The following restrictions apply to ports configured as destination ports:
The port cannot be already configured as a source port.
The port cannot be a member in a port-channel.
An IP interface is not configured on the port.
GVRP is not enabled on the port.
The port is not a member of a VLAN, except for the default VLAN (will automatically be removed from the default
VLAN).
The following restrictions apply to ports configured to be source ports:
The port cannot be already configured as a destination port.
Example
The following example copies traffic on port 1/e8 (source port) to port 1/e1 (destination port).
Console(config)# interface ethernet 1/e1
Console(config-if)# port monitor 1/e8
Page 148
Not approved by Document Control. For review only.
Port Monitor Commands
show ports monitor
The show ports monitor
User EXEC mode command displays the port monitoring status.
Syntax show ports monitor
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example shows how the port monitoring status is displayed.
Console show ports monitor
Source Port
-----------
Destination Port
----------------
1/e1
1/e2
1/e18
1/e8
1/e8
1/e8
Type
-----
RX,TX
RX,TX
RX
Status
-------
Active
Active
Active
Page 149
Allied Telesis
Command Line Interface User’s Guide
Chapter 19.Power over Ethernet Commands
Note
The PoE commands are operational in the AT-8000S/24, AT-8000S/24POE, AT-8000S/48 and AT-
8000S/48POE devices.
power inline
The port inline
Interface Configuration (Ethernet) mode command configures the administrative mode of inline power on an interface.
Syntax power inline {auto | never}
Parameters
• auto
— Enables the device discovery protocol and, if found, supplies power to the device.
• never
— Disables the device discovery protocol and stops supplying power to the device.
Default Configuration
The device discovery protocol is enabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables powered device discovery protocol on port 1/e1, so that power will be supplied to a discovered device.
Console(config)# interface ethernet 1/e1
Console(config-if)# power inline auto
power inline powered-device
The power inline powered-device
Interface Configuration (Ethernet) mode command adds a comment or description of the powered device type to enable the user to remember what is attached to the interface. Use the no
form of this command to remove the description.
Syntax power inline powered-device pd-type
Page 150
Not approved by Document Control. For review only.
Power over Ethernet Commands no power inline powered-device
Parameters
• pd-type— Specifies the type of powered device attached to the interface. (Range: 1-24 characters)
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures a description to an IP-phone to a powered device connected to Ethernet interface 1/e1.
Console(config)# interface ethernet 1/e1
Console(config-if)# power inline powered-device IP-phone
power inline priority
The power inline priority
Interface Configuration (Ethernet) mode command configures the inline power management priority of the interface. Use the no
form of this command to return to the default configuration.
Syntax power inline priority {critical | high | low} no power inline priority
Parameters
• critical
— Indicates that operating the powered device is critical.
• high
— Indicates that operating the powered device has high priority.
• low
— Indicates that operating the powered device has low priority.
Default Configuration
The default setting is low priority.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Page 151
Allied Telesis
Command Line Interface User’s Guide
Example
The following example configures the device connected to Ethernet interface 1/e1 as a high-priority powered device.
Console(config)# interface ethernet 1/e1
Console(config-if)# power inline priority high
power inline usage-threshold
The power inline usage-threshold
Global Configuration mode command configures the threshold for initiating inline power usage alarms. Use the no
form of this command to return to the default configuration.
Syntax power inline usage-threshold percentage no power inline usage-threshold
Parameters
• percentage— Specifies the threshold as a percentage to compare measured power. (Range: 1-99)
Default Configuration
The default threshold is 95 percent.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the power usage threshold for which alarms are sent to 80%.
Console(config)# power inline usage-threshold 80
power inline traps enable
The power inline traps enable
Global Configuration mode command enables inline power traps. Use the no
form of this command to disable inline power traps.
Syntax power inline traps enable no power inline traps
Default Configuration
Inline power traps are disabled.
Page 152
Not approved by Document Control. For review only.
Power over Ethernet Commands
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables inline power traps to be sent when a power usage threshold is exceeded.
Console(config)# power inline traps enable
show power inline
The show power inline
User EXEC mode command displays the information about inline power.
Syntax show power inline [ethernet interface ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays information about inline power.
console# show power inline
Unit Power Nominal
Power
Consumed Power Usage Threshold Traps
----
1
2
3
-------
Off
Off
Off
-------------
1 Watts
1 Watts
1 Watts
---------------------------
0 Watts (0%)
0 Watts (0%)
0 Watts (0%)
95
95
95
-------
Disable
Disable
Disable
4 On 180 Watts 48 Watts (27%) Disable
5
6
Off
Off
1 Watts
1 Watts
0 Watts (0%)
0 Watts (0%)
95
95
95
Disable
Disable
Page 153
Allied Telesis
Command Line Interface User’s Guide
Port
.
----
4/e1
4/e2
4/e3
4/e4
4/e5
4/e6
4/e7
4/e8
4/e9
4/e10
Powered
Device
-------
State
-----------
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Auto
Status
-------------
On
On
On
On
On
On
On
On
Priority
-----------low low low low low low low low
Searching low
Searching low
Class
-------class1 class3 class1 class0 class1 class2 class4 class3 class0 class0 console# show power inline interface 4/e1
Port Powered
Device
State Status
----
4/e1
-----------------
Auto
Overload Counter: 0
Short Counter: 0
-------------
On
Denied Counter: 0
Absent Counter: 1
Invalid Signature Counter: 0
The following table describes the significant fields shown in the example:
Priority
-----------low
Field
Power
Nominal Power
Consumed Power
Usage Threshold
Traps
Port
Powered Device
State
Class
-------class1
Description
The operational status of the inline power sourcing equipment.
The nominal power of the inline power sourcing equipment in Watts.
Measured usage power in Watts.
The usage threshold expressed in percents for comparing the measured power and initiating an alarm if threshold is exceeded.
Indicates if inline power traps are enabled.
The Ethernet port number.
Description of the powered device type.
Indicates if the port is enabled to provide power. Can be: Auto or Never.
Page 154
Not approved by Document Control. For review only.
Power over Ethernet Commands
Priority
Status
Classification
Overload Counter
Short Counter
Denied Counter
Absent Counter
Invalid Signature Counter
The priority of the port from the point of view of inline power management. Can be: Critical, High or Low.
Describes the inline power operational status of the port. Can be: On, Off, Test-
Fail, Testing, Searching or Fault.
The power consumption range of the powered device. Can be: 0.44 – 12.95,
0.44 – 3.84, 3.84 – 6.49 or 6.49 – 12.95.
Counts the number of overload conditions that has been detected.
Counts the number of short conditions that has been detected.
Counts the number of times power has been denied.
Counts the number of times power has been removed because powered device dropout was detected.
Counts the number of times an invalid signature of a powered device was detected.
Page 155
Allied Telesis
Command Line Interface User’s Guide
Chapter 20.QoS Commands
qos
The qos
Global Configuration mode command enables quality of service (QoS) on the device. Use the no
form of this command to disable QoS on the device.
Syntax qos no qos
Default Configuration
QoS is disabled on the device.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables QoS on the device.
Console(config)# qos
show qos
The show qos
User EXEC mode command displays quality of service (QoS) for the device.
Syntax show qos
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 156
Not approved by Document Control. For review only.
QoS Commands
Example
The following example displays QoS attributes when QoS is disabled on the device.
Console show qos
Qos: disable
Trust: dscp
priority-queue out num-of-queues
The priority-queue out num-of-queues
Global Configuration mode command configures the number of expedite queues. Use the no
form of this command to return to the default configuration.
Syntax priority-queue out num-of-queues number-of-queues no priority-queue out num-of-queues
Parameters
• number-of-queues — Specifies the number of expedite queues. The expedite queues are the queues with higher indexes. (Range: 0-4)
Default Configuration
All queues are expediting queues.
Command Mode
Global Configuration mode
User Guidelines
When the specified number of expedite queues is 0, the Strict Priority scheduling method is used.
When the specified number of expedite queues is 4, weights are defined as 1, 2, 4 and 8.
Example
The following example configures the number of expedite queues as 0.
Console(config)# priority-queue out num-of-queues 0
rate-limit
The rate-limit
Interface Configuration mode command limits the rate of the incoming traffic. The no
form of this command is used to disable rate limiting.
Syntax rate-limit rate no rate-limit
Parameters
• rate — Maximum kilobits per second of ingress traffic on a port. (Range: 62K - 100M).)
Page 157
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
1000 Kbits/Sec
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The command can be enabled on a specific port only if port storm-control Broadcast enable interface configuration command is not enabled on that port.
Example
The following example limits the rate of the incoming traffic to 62.
Console(config-if)# rate-limit 62
traffic-shape
The traffic-shape
Interface Configuration mode command sets a shaper on an egress interface. Use the no
form of this command to disable the shaper.
Syntax traffic-shape committed-rate [committed-burst] no traffic-shape
Parameters
• committed-rate — The average traffic rate (CIR) in bits per second (bps). (Range: 64-1000000.)
• committed-burst — The excess burst size (CBS) in bytes. (Range: 4096-16769020.)
Default Configuration
No shape is defined.
Command Mode
Interface Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures a shaper on port e1.
Console(config-if)# traffic-shape 50000
show qos interface
The show qos interface
User EXEC mode command displays interface QoS information.
Page 158
Not approved by Document Control. For review only.
QoS Commands
Syntax show qos interface
[ ethernet
interface-number | vlan vlan-id | port-channel number ] [ queuing
]
Parameters
• interface-number — Valid Ethernet port number.
• vlan-id — Valid VLAN ID.
• number — Valid port-channel number.
• queuing
— Indicates the queue strategy (WRR or EF), the weight for WRR queues, the CoS to queue map and the EF priority.
Default Configuration
There is no default configuration for this command.
Command Mode
User EXEC mode
User Guidelines
If no keyword is specified, port QoS information (e.g., DSCP trusted, CoS trusted, untrusted, etc.) is displayed.
If no interface is specified, QoS information about all interfaces is displayed.
Example
The following example displays QoS information about Ethernet port 1/e11.
Console> show qos interface ethernet 1/e11 queuing
Ethernet 1/e11
Strict Priority.
Cos-queue map: cos qid
0 2
1 1
2 1
3 2
4 3
5 3
6 4
7 4
wrr-queue cos-map
The wrr-queue cos-map
Global Configuration mode command maps Class of Service (CoS) values to a specific egress queue. Use the no
form of this command to return to the default configuration.
Page 159
Allied Telesis
Command Line Interface User’s Guide
Syntax wrr-queue cos-map queue-id cos1...cos8
no wrr-queue cos-map
[ queue-id ]
Parameters
• queue-id — Specifies the queue number to which the CoS values are mapped.
• cos1...cos8 — Specifies CoS values to be mapped to a specific queue. (Range: 0-7)
Default Configuration.
5
6
3
4
7
1
2
Value (VPT)
0
3
4
2
3
4
1
1
Queue
2
Command Mode
Global Configuration mode
User Guidelines
Queue 4 is reserved for stacking.
Example
The following example maps CoS 7 to queue 2.
Console(config)# wrr-queue cos-map 2 7
qos wrr-queue threshold
The qos wrr-queue threshold
Global Configuration mode command assigns tail-drop thresholds. Use no
form of this command to return to default values.
Syntax qos wrr-queue threshold gigabitethernet queue-id threshold-percentage0 threshold-percentage1 thresholdpercentage2 no qos wrr-queue threshold gigabitethernet queue-id
Page 160
Not approved by Document Control. For review only.
QoS Commands
Parameters
• queue-id — Specify the queue ID you wish to assign the tail-drop.
• threshold-percentage0,1,2 — Specify the tail-drop threshold percentage value. Range 0-100. each value is separate by space.
Default Configuration
The default thresholds are 80% for all thresholds.
Command Mode
Global Configuration mode
User Guidelines
The packet will be referring to a certain threshold by the conformance level. If threshold 0 is exceeded, packets with the corresponding DP are dropped until the threshold is no longer exceeded. However, packets assigned to threshold 1 & 2 continue to be queued and sent as long as the second or third threshold are not exceeded.
Example
The following example assigns a tail-drop threshold.
Console(config)# qos wrr-queue threshold
8 80% 50%
qos trust(Global)
The qos trust
Global Configuration mode command configures the System to basic mode and the trust state. Use the no
form to return untrusted state.
Syntax qos trust {cos | dscp} no qos trust
Parameters
• dscp-list — Specify up to 8 DSCP values, with each value separated by space.
• dp — Enter the Drop Precedence value to which the DSCP values corresponds. Possible values are 0 - 2
(Where 2 is the highest Drop Precedence).
Parameters Range
• dscp-list — 0 - 63
• dp — 0 - 2
Default Configuration
All the DSCPs are mapped to Drop Precedence 0.
Command Mode
Global Configuration mode
Page 161
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the System to basic mode and the trust state.
Console(config)# qos map dscp-dp 2 4 6 8 10 to 2
qos map dscp-queue
The qos map dscp-queue
Global Configuration mode command modifies the DSCP to CoS map. Use the no form of this command to return to the default map.
Syntax qos map dscp-queue dscp-list to
queue-id no qos map dscp-queue
Parameters
• dscp-list — Specifies up to 8 DSCP values separated by a space. (Range: 0 - 63)
• queue-id — Specifies the queue number to which the DSCP values are mapped.
Default Configuration
The following table describes the default map.
DSCP value
00-15
16-31
32-47
48-63
2
3
Queue-ID
1
4
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example maps DSCP values 33, 40 and 41 to queue 1.
Console(config)# qos map dscp-queue 33 40 41 to 1
qos cos
The qos cos
Interface Configuration (Ethernet, port-channel) mode command defines the default CoS value of a port. Use the no
form of this command to return to the default configuration.
Page 162
Not approved by Document Control. For review only.
QoS Commands
Syntax qos cos default-cos no qos cos
Parameters
• default-cos — Specifies the default CoS value of the port. (Range: 0 - 7)
Default Configuration
Default CoS value of a port is 0.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
If the port is trusted, the default CoS value of the port is used to assign a CoS value to all untagged packets entering the port.
Example
The following example configures port 1/e15 default CoS value to 3.
Console(config)# interface ethernet 1/e15
Console(config-if) qos cos 3
show qos map
The show qos map User EXEC mode command displays all QoS maps.
Syntax show qos map
[ dscp-queue
]
Parameters
• dscp-queue
— Indicates the DSCP to queue map.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 163
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the DSCP port-queue map.
Console> show qos map
Dscp-queue map:
3
4
1
2
5
6 d1
--
0
:
: --
:
:
:
:
:
:
: d2 0
--
01
01
02
02
03
04
04
1
--
01
01
02
02
03
04
04
2
--
01
01
02
03
03
04
04
3
--
01
01
02
03
03
04
04
The following table describes the significant fields shown above.
01
02
03
03
04
4
--
01
01
02
03
03
04
5
--
01
Column d1 d2
01 - 04
Description
Decimal Bit 1 of DSCP
Decimal Bit 2 of DSCP
Queue numbers
02
02
03
03
04
6
--
01
02
02
03
03
04
7
--
01
02
02
03
04
04
8
--
01
02
02
03
04
04
9
--
01
Page 164
Not approved by Document Control. For review only.
Radius Commands
Chapter 21.Radius Commands
radius-server host
The radius-server host
Global Configuration mode command specifies a RADIUS server host. Use the no
form of this command to delete the specified RADIUS host.
Syntax radius-server host
{ ip-address | hostname } [ auth-port auth-port-number ] [ timeout timeout ] [ retransmit retries ]
[ deadtime deadtime ] [ key key-string ] [ source source ] [ priority priority ] [ usage type ] no radius-server host
{ ip-address | hostname }
Parameters
• ip-address — IP address of the RADIUS server host.
• hostname — Hostname of the RADIUS server host. (Range: 1-158 characters)
• auth-port-number — Port number for authentication requests. The host is not used for authentication if the port number is set to 0. (Range: 0-65535)
• timeout — Specifies the timeout value in seconds. (Range: 1-30)
• retries — Specifies the retransmit value. (Range: 1-10)
• deadtime — Length of time in minutes during which a RADIUS server is skipped over by transaction requests. (Range: 0-2000)
• key-string — Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server. This key must match the encryption used on the RADIUS daemon. To specify an empty string, enter "". (Range: 0-128 characters)
• source — Specifies the source IP address to use for communication. 0.0.0.0 is interpreted as request to use the IP address of the outgoing IP interface.
• priority — Determines the order in which servers are used, where 0 has the highest priority. (Range: 0-65535)
• type — Specifies the usage type of the server. Possible values: login
, dot.1x
or all
.
Default Configuration
No RADIUS server host is specified.
The port number for authentication requests is 1812.
The usage type is all
.
Command Mode
Global Configuration mode
User Guidelines
To specify multiple hosts, multiple radius-server host
commands can be used.
If no host-specific timeout, retries, deadtime or key-string values are specified, global values apply to each
RADIUS server host.
The address type of the source parameter must be the same as the ip-address
parameter.
Page 165
Allied Telesis
Command Line Interface User’s Guide
Example
The following example specifies a RADIUS server host with IP address 192.168.10.1, authentication request port number 20 and a 20-second timeout period.
Console(config)# radius-server host 192.168.10.1 auth-port 20 timeout 20
radius-server key
The radius-server key
Global Configuration mode command sets the authentication and encryption key for all
RADIUS communications between the device and the RADIUS daemon. Use the no
form of this command to return to the default configuration.
Syntax radius-server key
[ key-string ] no radius-server key
Parameters
• key-string — Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server. This key must match the encryption used on the RADIUS daemon.
(Range: 0-128 characters)
Default Configuration
The key-string is an empty string.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon.
Console(config)# radius-server key ati-server
radius-server retransmit
The radius-server retransmit
Global Configuration mode command specifies the number of times the software searches the list of RADIUS server hosts. Use the no
form of this command to reset the default configuration.
Syntax radius-server retransmit retries no radius-server retransmit
Page 166
Not approved by Document Control. For review only.
Radius Commands
Parameters
• retries — Specifies the retransmit value. (Range: 1 - 10)
Default Configuration
The software searches the list of RADIUS server hosts 3 times.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the number of times the software searches the list of RADIUS server hosts to 5 times.
console(config)# radius-server retransmit 5
radius-server source-ip
The radius-server source-ip
Global Configuration mode command specifies the source IP address used for communication with RADIUS servers. Use the no
form of this command to return to the default configuration.
Syntax radius-server source-ip source no radius-source-ip source
Parameters
• source — Specifies a valid source IP address.
Default Configuration
The source IP address is the IP address of the outgoing IP interface.
Command Mode
Global Configuration mode
User Guidelines
N/A
Example
The following example configures the source IP address used for communication with RADIUS servers to
10.1.1.1.
console(config)# radius-server source-ip 10.1.1.1
Page 167
Allied Telesis
Command Line Interface User’s Guide
radius-server timeout
The radius-server timeout
Global Configuration mode command sets the interval during which the device waits for a server host to reply. Use the no
form of this command to return to the default configuration.
Syntax radius-server timeout timeout no radius-server timeout
Parameters
• timeout — Specifies the timeout value in seconds. (Range: 1 - 30)
Default Configuration
The timeout value is 3 seconds.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the timeout interval to 5 seconds.
Console(config)# radius-server timeout 5
radius-server deadtime
The radius-server deadtime
Global Configuration mode command improves RADIUS response time when servers are unavailable. The command is used to cause the unavailable servers to be skipped. Use the no
form of this command to return to the default configuration.
Syntax radius-server deadtime deadtime no radius-server deadtime
Parameters
• deadtime — Length of time in minutes during which a RADIUS server is skipped over by transaction requests. (Range: 0 - 2000)
Default Configuration
The deadtime setting is 0.
Command Mode
Global Configuration mode
Page 168
Not approved by Document Control. For review only.
Radius Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the deadtime to 10 minutes.
Console(config)# radius-server deadtime 10
show radius-servers
The show radius-servers
Privileged EXEC mode command displays the RADIUS server settings.
Syntax show radius-servers
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays RADIUS server settings.
Console# show radius-servers
IP address
---------
192.168.1.10
1
Port
Auth
----
Global values
-------------
TimeOut: 3
Retransmit: 3
Deadtime: 0
Source IP: 0.0.0.0
Port Acc
-------
Timeout
-----
Retrans
DeadTime
------
1812 1813 Global Global Global
Source IP
--------
Global
Priority
--------
0
Usage
----all
Page 169
Allied Telesis
Command Line Interface User’s Guide
Chapter 22.RMON Commands
show rmon statistics
The show rmon statistics
User EXEC mode command displays RMON Ethernet statistics.
Syntax show rmon statistics
{ ethernet interface number | port-channel port-channel-number }
Parameters
• interface number — Valid Ethernet port.
• port-channel-number — Valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays RMON Ethernet statistics for Ethernet port 1/e1.
Console> show rmon statistics ethernet 1/e1
Port: 1/e1
Octets: 878128 Packets: 978
Broadcast: 7
CRC Align Errors: 0
Undersize Pkts: 0
Fragments: 0
Multicast: 1
Collisions: 0
Oversize Pkts: 0
Jabbers: 0
64 Octets: 98
128 to 255 Octets: 0
512 to 1023 Octets: 491
65 to 127 Octets: 0
256 to 511 Octets: 0
1024 to 1518 Octets: 389
Page 170
Not approved by Document Control. For review only.
RMON Commands
The following table describes significant fields shown above:
Field
Octets
Packets
Broadcast
Multicast
CRC Align Errors
Collisions
Undersize Pkts
Oversize Pkts
Description
The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets).
The total number of packets (including bad packets, Broadcast packets, and Multicast packets) received.
The total number of good packets received and directed to the Broadcast address.
This does not include Multicast packets.
The total number of good packets received and directed to a Multicast address. This number does not include packets directed to the Broadcast address.
The total number of packets received with a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but with either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad
FCS with a non-integral number of octets (Alignment Error).
The best estimate of the total number of collisions on this Ethernet segment.
The total number of packets received less than 64 octets long (excluding framing bits, but including FCS octets) and otherwise well formed.
The total number of packets received longer than 1518 octets (excluding framing bits, but including FCS octets) and otherwise well formed.
Fragments
Jabbers
64 Octets
65 to 127 Octets
128 to 255 Octets
256 to 511 Octets
The total number of packets received less than 64 octets in length (excluding framing bits but including FCS octets) and either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
The total number of packets received longer than 1518 octets (excluding framing bits, but including FCS octets), and either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
The total number of packets (including bad packets) received that are 64 octets in length (excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received that are between 65 and
127 octets in length inclusive (excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received that are between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received that are between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).
512 to 1023 Octets The total number of packets (including bad packets) received that are between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets).
1024 to 1518 Octets The total number of packets (including bad packets) received that are between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).
Page 171
Allied Telesis
Command Line Interface User’s Guide
rmon collection history
The rmon collection history
Interface Configuration (Ethernet, port-channel) mode command enables a Remote
Monitoring (RMON) MIB history statistics group on an interface. Use the no
form of this command to remove a specified RMON history statistics group.
Syntax rmon collection history index [ owner ownername ] [ buckets bucket-number ] [ interval seconds ] no rmon collection history index
Parameters
• index — Specifies the statistics group index . (Range: 1-65535)
• ownername — Specifies the RMON statistics group owner name.
• bucket-number — Number of buckets specified for the RMON collection history group of statistics. If unspecified, defaults to 50. (Range:1-65535)
• seconds — Number of seconds in each polling cycle. (Range: 1-3600)
Default Configuration
RMON statistics group owner name is an empty string.
Number of buckets specified for the RMON collection history statistics group is 50.
Number of seconds in each polling cycle is 1800.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
Cannot be configured for a range of interfaces (range context).
Example
The following example enables a Remote Monitoring (RMON) MIB history statistics group on Ethernet port 1/e1 with index number 1 and a polling interval period of 2400 seconds.
Console(config)# interface ethernet 1/e1
Console(config-if)# rmon collection history 1 interval 2400
show rmon collection history
The show rmon collection history
User EXEC mode command displays the requested RMON history group statistics.
Syntax show rmon collection history
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
• port-channel-number — Valid port-channel number.
Page 172
Not approved by Document Control. For review only.
RMON Commands
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays all RMON history group statistics.
Console> show rmon collection history
Index
-----
1
2
Interface
---------
1/e1
1/e1
Interval
--------
30
1800
Requested
Samples
---------
50
50
The following table describes significant fields shown above:
Granted
Samples
-------
50
50
Owner
-------
CLI
Manager
Field
Index
Interface
Interval
Requested Samples
Granted Samples
Owner
Description
An index that uniquely identifies the entry.
The sampled Ethernet interface
The interval in seconds between samples.
The requested number of samples to be saved.
The granted number of samples to be saved.
The entity that configured this entry.
show rmon history
The show rmon history
User EXEC mode command displays RMON Ethernet history statistics.
Syntax show rmon history index { throughput
| errors | other
} [ period seconds ]
Parameters
• index — Specifies the requested set of samples. (Range: 1 - 65535)
• throughput
— Indicates throughput counters.
• errors
— Indicates error counters.
• other
— Indicates drop and collision counters.
• seconds — Specifies the period of time in seconds. (Range: 1-4294967295)
Page 173
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Examples
The following examples displays RMON Ethernet history statistics for index 1.
Console> show rmon history 1 throughput
Sample Set: 1
Interface: 1/e1
Requested samples: 50
Owner: CLI
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
--------------------
Jan 18 2002 21:57:00
Jan 18 2002 21:57:30
Octets
---------
303595962
287696304
Time
----------
Jan 18 2002 21:57:00
Jan 18 2002 21:57:30
CRC Align
---------
1
1
Packets
-------
357568
275686
Broadcast
----------
3289
2789
Multicast
---------
7287
5878
Console> show rmon history 1 errors
Sample Set: 1
Interface: 1/e1
Requested samples: 50
Owner: Me
Interval: 1800
Granted samples: 50
Maximum table size: 500 (800 after reset)
1
1
Undersize
---------
0
0
Oversize
--------
Fragments
---------
49
27
Util
-----
19%
20%
0
0
Jabbers
-------
Page 174
Not approved by Document Control. For review only.
RMON Commands
Console> show rmon history 1 other
Sample Set: 1 Owner: Me
Interface: 1/e1
Requested samples: 50
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
--------------------
Jan 18 2002 21:57:00
Jan 18 2002 21:57:30
Dropped
--------
3
3
The following table describes significant fields shown above:
Collisions
----------
0
0
Field
Time
Octets
Packets
Broadcast
Multicast
Util
CRC Align
Undersize
Oversize
Fragments
Jabbers
Description
Date and Time the entry is recorded.
The total number of octets of data (including those in bad packets) received on the network
(excluding framing bits but including FCS octets).
The number of packets (including bad packets) received during this sampling interval.
The number of good packets received during this sampling interval that were directed to the
Broadcast address.
The number of good packets received during this sampling interval that were directed to a
Multicast address. This number does not include packets addressed to the Broadcast address.
The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent.
The number of packets received during this sampling interval that had a length (excluding framing bits but including FCS octets) between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
The number of packets received during this sampling interval that were less than 64 octets long
(excluding framing bits but including FCS octets) and were otherwise well formed.
The number of packets received during this sampling interval that were longer than 1518 octets
(excluding framing bits but including FCS octets) but were otherwise well formed.
The total number of packets received during this sampling interval that were less than 64 octets in length (excluding framing bits but including FCS octets) had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error), or a bad FCS with a nonintegral number of octets (Alignment Error). It is normal for etherHistoryFragments to increment because it counts both runts (which are normal occurrences due to collisions) and noise hits.
The number of packets received during this sampling interval that were longer than 1518 octets
(excluding framing bits but including FCS octets), and had either a bad Frame Check Sequence
(FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
Page 175
Allied Telesis
Command Line Interface User’s Guide
Dropped
Collisions
The total number of events in which packets were dropped by the probe due to lack of resources during this sampling interval. This number is not necessarily the number of packets dropped, it is just the number of times this condition has been detected.
The best estimate of the total number of collisions on this Ethernet segment during this sampling interval.
rmon alarm
The rmon alarm
Global Configuration mode command configures alarm conditions. Use the no
form of this command to remove an alarm.
Syntax rmon alarm index variable interval rthreshold fthreshold revent fevent [ type type ] [ startup direction ] [ owner name ] no rmon alarm index
Parameters
• index — Specifies the alarm index. (Range: 1-65535)
• variable — Specifies the object identifier of the variable to be sampled.
• interval — Specifies the interval in seconds during which the data is sampled and compared with rising and falling thresholds. (Range: 1-4294967295)
• rthreshold — Specifies the rising threshold. (Range: 0-4294967295)
• fthreshold — Specifies the falling threshold. (Range: 0-4294967295)
• revent — Specifies the event index used when a rising threshold is crossed.
(Range: 1-65535)
• fevent — Specifies the event index used when a falling threshold is crossed.
(Range: 1-65535)
• type — Specifies the method used for sampling the selected variable and calculating the value to be compared against the thresholds. Possible values are absolute
and delta
.
If the method is absolute
, the value of the selected variable is compared directly with the thresholds at the end of the sampling interval. If the method is delta
, the selected variable value of the last sample is subtracted from the current value, and the difference is compared with the thresholds.
• direction — Specifies the alarm that may be sent when this entry is first set to valid. Possible values are rising
, rising-falling
and falling
.
If the first sample (after this entry becomes valid) is greater than or equal to rthreshold and direction is equal to rising
or rising-falling
, a single rising alarm is generated. If the first sample (after this entry becomes valid) is less than or equal to fthreshold and direction is equal to falling
or rising-falling
, a single falling alarm is generated.
• name — Specifies the name of the person who configured this alarm. If unspecified, the name is an empty string.
Default Configuration
The type is absolute
.
The startup direction is rising-falling
.
Page 176
Not approved by Document Control. For review only.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the following alarm conditions:
•
Alarm index — 1000
•
Variable identifier — ati
•
Sample interval — 360000 seconds
•
Rising threshold — 1000000
•
Falling threshold — 1000000
•
Rising threshold event index — 10
•
Falling threshold event index — 20
Console(config)# rmon alarm 1000 ati 360000 1000000 1000000 10 20
show rmon alarm-table
The show rmon alarm-table
User EXEC mode command displays the alarms table.
Syntax show rmon alarm-table
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the alarms table.
Console> show rmon alarm-table
1
2
Index
-----
3
OID
----------------------
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.9
Owner
-------
CLI
Manager
CLI
Page 177
RMON Commands
Allied Telesis
Command Line Interface User’s Guide
The following table describes significant fields shown above:
Field
Index
OID
Owner
Description
An index that uniquely identifies the entry.
Monitored variable OID.
The entity that configured this entry.
show rmon alarm
The show rmon alarm
User EXEC mode command displays alarm configuration.
Syntax show rmon alarm number
Parameters
• number — Specifies the alarm index. (Range: 1 - 65535)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays RMON 1 alarms.
Console> show rmon alarm 1
Alarm 1
-------
OID: 1.3.6.1.2.1.2.2.1.10.1
Last sample Value: 878128
Interval: 30
Sample Type: delta
Startup Alarm: rising
Rising Threshold: 8700000
Falling Threshold: 78
Rising Event: 1
Falling Event: 1
Owner: CLI
Page 178
Not approved by Document Control. For review only.
RMON Commands
The following table describes the significant fields shown in the display:
Field
Alarm
OID
Last Sample Value
Interval
Sample Type
Startup Alarm
Rising Threshold
Falling Threshold
Rising Event
Falling Event
Owner
Description
Alarm index.
Monitored variable OID.
The statistic value during the last sampling period. For example, if the sample type is delta
, this value is the difference between the samples at the beginning and end of the period. If the sample type is absolute
, this value is the sampled value at the end of the period.
The interval in seconds over which the data is sampled and compared with the rising and falling thresholds.
The method of sampling the variable and calculating the value compared against the thresholds. If the value is absolute
, the value of the variable is compared directly with the thresholds at the end of the sampling interval. If the value is delta
, the value of the variable at the last sample is subtracted from the current value, and the difference compared with the thresholds.
The alarm that may be sent when this entry is first set. If the first sample is greater than or equal to the rising threshold, and startup alarm is equal to rising or rising and falling, then a single rising alarm is generated. If the first sample is less than or equal to the falling threshold, and startup alarm is equal falling or rising and falling, then a single falling alarm is generated.
A sampled statistic threshold. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval is less than this threshold, a single event is generated.
A sampled statistic threshold. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval is greater than this threshold, a single event is generated.
The event index used when a rising threshold is crossed.
The event index used when a falling threshold is crossed.
The entity that configured this entry.
rmon event
The rmon event
Global Configuration mode command configures an event. Use the no
form of this command to remove an event.
Syntax rmon event index type [ community
text ] [ description text ] [ owner name ] no rmon event index
Page 179
Allied Telesis
Command Line Interface User’s Guide
Parameters
• index — Specifies the event index. (Range: 1 - 65535)
• type — Specifies the type of notification generated by the device about this event. Possible values: none
, log
, trap
, log-trap
.
• community
text — If the specified notification type is trap
, an SNMP trap is sent to the SNMP community specified by this octet string. (Range: 0-127 characters)
• description text — Specifies a comment describing this event. (Range: 0-127 characters)
• name — Specifies the name of the person who configured this event. If unspecified, the name is an empty string.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
If log
is specified as the notification type, an entry is made in the log table for each event. If trap
is specified, an
SNMP trap is sent to one or more management stations.
Example
The following example configures an event identified as index 10 and for which the device generates a notification in the log table.
Console(config)# rmon event 10 log
show rmon events
The show rmon events
User EXEC mode command displays the RMON event table.
Syntax show rmon events
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 180
Not approved by Document Control. For review only.
RMON Commands
Example
The following example displays the RMON event table.
Console> show rmon events
1
2
Index
-----
Description
--------------
Errors
High Broadcast
Type
--------
Log
Log-Trap
Community
--------device
The following table describes significant fields shown above:
Owner
-------
CLI
Manager
Last time sent
--------------------
Jan 18 2002 23:58:17
Jan 18 2002 23:59:48
Field
Index
Description
Type
Community
Owner
Last time sent
Description
An index that uniquely identifies the event.
A comment describing this event.
The type of notification that the device generates about this event. Can have the following values: none
, log
, trap
, log-trap
. In the case of log, an entry is made in the log table for each event. In the case of trap, an SNMP trap is sent to one or more management stations.
If an SNMP trap is to be sent, it is sent to the SNMP community specified by this octet string.
The entity that configured this event.
The time this entry last generated an event. If this entry has not generated any events, this value is zero.
show rmon log
The show rmon log
User EXEC mode command displays the RMON log table.
Syntax show rmon log
[ event ]
Parameters
• event — Specifies the event index. (Range: 0 - 65535)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 181
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the RMON log table.
1
1
2
Console> show rmon log
Maximum table size: 500
Event
-------
Description
--------------
Errors
Errors
High Broadcast
Time
---------
Jan 18 2002 23:48:19
Jan 18 2002 23:58:17
Jan 18 2002 23:59:48
1
1
2
Console> show rmon log
Maximum table size: 500 (800 after reset)
Event
-------
Description
--------------
Time
---------
Errors
Errors
High Broadcast
Jan 18 2002 23:48:19
Jan 18 2002 23:58:17
Jan 18 2002 23:59:48
The following table describes the significant fields shown in the display:
Field
Event
Description
Time
Description
An index that uniquely identifies the event.
A comment describing this event.
The time this entry was created.
rmon table-size
The rmon table-size
Global Configuration mode command configures the maximum size of RMON tables. Use the no
form of this command to return to the default configuration.
Syntax rmon table-size
{ history entries | log entries } no rmon table-size
{ history
| log
}
Parameters
• history entries — Maximum number of history table entries. (Range: 20 -270)
• log entries — Maximum number of log table entries. (Range: 20-100)
Default Configuration
History table size is 270.
Log table size is 200.
Page 182
Not approved by Document Control. For review only.
Command Mode
Global Configuration mode
User Guidelines
The configured table size takes effect after the device is rebooted.
Example
The following example configures the maximum RMON history table sizes to 100 entries.
Console(config)# rmon table-size history 100
RMON Commands
Page 183
Allied Telesis
Command Line Interface User’s Guide
Chapter 23.SNMP Commands
snmp-server community
The snmp-server community
Global Configuration mode command configures the community access string to permit access to the SNMP protocol. Use the no
form of this command to remove the specified community string.
Syntax snmp-server community community [ ro
| rw
| su
] [ ip-address ][ view view-name ] snmp-server community-group community group-name [ ip-address ] no snmp-server community community [ ip-address ]
Parameters
• community — Community string that acts like a password and permits access to the SNMP protocol.
(Range: 1-20 characters)
• ro
— Indicates read-only access (default).
• rw
—Indicates read-write access.
• su
—Indicates SNMP administrator access.
• ip-address — Specifies the IP address of the management station.
• group-name — Specifies the name of a previously defined group. A group defines the objects available to the community. (Range: 1-30 characters)
• view-name — Specifies the name of a previously defined view. The view defines the objects available to the community. (Range: 1-30 characters)
Default Configuration
No communities are defined.
Command Mode
Global Configuration mode
User Guidelines
The view-name
parameter cannot be specified for su
, which has access to the whole MIB.
The view-name
parameter can be used to restrict the access rights of a community string. When it is specified:
An internal security name is generated.
The internal security name for SNMPv1 and SNMPv2 security models is mapped to an internal group name.
The internal group name for SNMPv1 and SNMPv2 security models is mapped to a view-name (read-view and notify-view always, and for rw
for write-view also)
The group-name
parameter can also be used to restrict the access rights of a community string. When it is specified:
An internal security name is generated.
The internal security name for SNMPv1 and SNMPv2 security models is mapped to the group name.
Page 184
Not approved by Document Control. For review only.
SNMP Commands
Example
The following example defines community access string public
to permit administrative access to SNMP protocol at an administrative station with IP address 192.168.1.20.
Console(config)# snmp-server community public su 192.168.1.20
snmp-server view
The snmp-server view
Global Configuration mode command creates or updates a Simple Network Management
Protocol (SNMP) server view entry. Use the no
form of this command to remove a specified SNMP server view entry.
Syntax snmp-server view view-name oid-tree
{included | excluded} no snmp-server view view-name [ oid-tree ]
Parameters
• view-name —Specifies the label for the view record that is being created or updated. The name is used to reference the record. (Range: 1-30 characters)
• oid-tree —Specifies the object identifier of the ASN.1 subtree to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as system.
Replace a single sub-identifier with the asterisk (*) wildcard to specify a subtree family; for example 1.3.*.4.
• included
—Indicates that the view type is included.
• excluded
—Indicates that the view type is excluded.
Default Configuration
No view entry exists.
Command Mode
Global Configuration mode
User Guidelines
This command can be entered multiple times for the same view record.
The number of views is limited to 64.
No check is made to determine that a MIB node corresponds to the "starting portion" of the OID until the first wildcard.
Example
The following example creates a view that includes all objects in the MIB-II system group except for sysServices
(System 7) and all objects for interface 1 in the MIB-II interface group.
Console(config)# snmp-server view user-view system included
Console(config)# snmp-server view user-view system.7 excluded
Console(config)# snmp-server view user-view ifEntry.*.1 included
Page 185
Allied Telesis
Command Line Interface User’s Guide
snmp-server group
The snmp-server group
Global Configuration mode command configures a new Simple Management Protocol
(SNMP) group or a table that maps SNMP users to SNMP views. Use the no
form of this command to remove a specified SNMP group.
Syntax snmp-server group groupname
{v1 | v2 | v3 {noauth | auth | priv} [notify notifyview
] } [read readview
] [write writeview
] no snmp-server group groupname
{v1 | v2 | v3 [noauth | auth | priv]}
Parameters
• groupname —Specifies the name of the group.
• v1
—Indicates the SNMP Version 1 security model.
• v2
—Indicates the SNMP Version 2 security model.
• v3
—Indicates the SNMP Version 3 security model.
• noauth
—Indicates no authentication of a packet. Applicable only to the SNMP Version 3 security model.
• auth
—Indicates authentication of a packet without encrypting it. Applicable only to the SNMP Version 3 security model.
• priv
—Indicates authentication of a packet with encryption. Applicable only to the SNMP Version 3 security model.
• readview —Specifies a string that is the name of the view that enables only viewing the contents of the agent.
If unspecified, all objects except for the community-table and SNMPv3 user and access tables are available.
• writeview —Specifies a string that is the name of the view that enables entering data and configuring the contents of the agent. If unspecified, nothing is defined for the write view.
• notifyview —Specifies a string that is the name of the view that enables specifying an inform or a trap. If unspecified, nothing is defined for the notify view. Applicable only to the SNMP Version 3 security model.
Default Configuration
No group entry exists.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example attaches a group called user-group to SNMPv3 and assigns to the group the privacy security level and read access rights to a view called user-view.
Console(config)# snmp-server group user-group v3 priv read user-view
snmp-server user
The snmp-server user
Global Configuration mode command configures a new SNMP Version 3 user. Use the no form of this command to remove a user.
Page 186
Not approved by Document Control. For review only.
SNMP Commands
Syntax snmp-server user username groupname
[remote engineid-string
] [ auth-md5 password
| auth-sha password
| auth-md5-key md5-des-keys
| auth-sha-key sha-des-keys
] no snmp-server user username
[remote engineid-string
]
Parameters
• username —Specifies the name of the user on the host that connects to the agent. (Range: 1-30 characters)
• groupname —Specifies the name of the group to which the user belongs. (Range: 1-30 characters)
• engineid-string —Specifies the engine ID of the remote SNMP entity to which the user belongs. The engine ID is a concatenated hexadecimal string. Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (Range: 5-32 characters)
• auth-md5 password —Indicates the HMAC-MD5-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters)
• auth-sha password —Indicates the HMAC-SHA-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters)
• auth-md5-key md5-des-keys —Indicates the HMAC-MD5-96 authentication level. The user should enter a concatenated hexadecimal string of the MD5 key (MSB) and the privacy key (LSB). If authentication is only required, 16 bytes should be entered; if authentication and privacy are required, 32 bytes should be entered.
Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (16 or 32 bytes)
• auth-sha-key sha-des-keys —Indicates the HMAC-SHA-96 authentication level. The user should enter a concatenated hexadecimal string of the SHA key (MSB) and the privacy key (LSB). If authentication is only required, 20 bytes should be entered; if authentication and privacy are required, 36 bytes should be entered.
Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (20 or 36 bytes)
Default Configuration
No group entry exists.
Command Mode
Global Configuration mode
User Guidelines
If auth-md5 or auth-sha is specified, both authentication and privacy are enabled for the user.
When a show running-config
Privileged EXEC mode command is entered, a line for this user will not be displayed. To see if this user has been added to the configuration, type the show snmp users
Privileged EXEC mode command.
An SNMP EngineID has to be defined to add SNMP users to the device. Changing or removing the SNMP
EngineID value deletes SNMPv3 users from the device’s database.
The remote engineid designates the remote management station and should be defined to enable the device to receive informs.
Example
The following example configures an SNMPv3 user
John in group user-group
.
Console(config)# snmp-server user John user-group
Page 187
Allied Telesis
Command Line Interface User’s Guide
snmp-server engineID local
The snmp-server engineID local
Global Configuration mode command specifies the Simple Network
Management Protocol (SNMP) engineID on the local device. Use the no
form of this command to remove the configured engine ID.
Syntax snmp-server engineID local
{ engineid-string |
default
} no snmp-server engineID local
Parameters
• engineid-string —Specifies a character string that identifies the engine ID. (Range: 5-32 characters)
• default
—The engine ID is created automatically based on the device MAC address.
Default Configuration
The engine ID is not configured.
If SNMPv3 is enabled using this command, and the default is specified, the default engine ID is defined per standard as:
•
First 4 octets — first bit = 1, the rest is IANA Enterprise number = 674.
•
Fifth octet — set to 3 to indicate the MAC address that follows.
•
Last 6 octets — MAC address of the device.
Command Mode
Global Configuration mode
User Guidelines
To use SNMPv3, you have to specify an engine ID for the device. You can specify your own ID or use a default string that is generated using the MAC address of the device.
If the SNMPv3 engine ID is deleted or the configuration file is erased, SNMPv3 cannot be used. By default,
SNMPv1/v2 are enabled on the device. SNMPv3 is enabled only by defining the Local Engine ID.
If you want to specify your own ID, you do not have to specify the entire 32-character engine ID if it contains trailing zeros. Specify only the portion of the engine ID up to the point where just zeros remain in the value. For example, to configure an engine ID of 123400000000000000000000, you can specify snmp-server engineID local
1234.
Since the engine ID should be unique within an administrative domain, the following is recommended:
For a standalone device, use the default keyword to configure the engine ID.
For a stackable system, configure the engine ID and verify its uniqueness.
Changing the value of the engine ID has the following important side-effect. A user's password (entered on the command line) is converted to an MD5 or SHA security digest. This digest is based on both the password and the local engine ID. The user’s command line password is then destroyed, as required by RFC 2274. As a result, the security digests of SNMPv3 users become invalid if the local value of the engine ID change, and the users will have to be reconfigured.
You cannot specify an engine ID that consists of all 0x0, all 0xF or 0x000000001.
Page 188
Not approved by Document Control. For review only.
SNMP Commands
The show running-config
Privileged EXEC mode command does not display the SNMP engine ID configuration.
To see the SNMP engine ID configuration, enter the snmp-server engineID local
Global Configuration mode command.
Example
The following example enables SNMPv3 on the device and sets the local engine ID of the device to the default value.
Console(config) # snmp-server engineID local default
snmp-server enable traps
The snmp-server enable traps
Global Configuration mode command enables the device to send SNMP traps.
Use the no
form of this command to disable SNMP traps.
Syntax snmp-server enable traps no snmp-server enable traps
Default Configuration
SNMP traps are enabled.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables SNMP traps.
Console(config)# snmp-server enable traps
snmp-server filter
The snmp-server filter
Global Configuration mode command creates or updates a Simple Network Management
Protocol (SNMP) server filter entry. Use the no
form of this command to remove the specified SNMP server filter entry.
Syntax snmp-server filter filter-name oid-tree { included | excluded
} no snmp-server filter filter-name [ oid-tree ]
Page 189
Allied Telesis
Command Line Interface User’s Guide
Parameters
• filter-name —Specifies the label for the filter record that is being updated or created. The name is used to reference the record. (Range: 1-30 characters)
• oid-tree —Specifies the object identifier of the ASN.1 subtree to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as system.
Replace a single subidentifier with the asterisk (*) wildcard to specify a subtree family; for example, 1.3.*.4.
• included
—Indicates that the filter type is included.
• excluded
—Indicates that the filter type is excluded.
Default Configuration
No filter entry exists.
Command Mode
Global Configuration mode
User Guidelines
This command can be entered multiple times for the same filter record. Later lines take precedence when an object identifier is included in two or more lines.
Example
The following example creates a filter that includes all objects in the MIB-II system group except for sysServices
(System 7) and all objects for interface 1 in the MIB-II interfaces group.
Console(config)# snmp-server filter filter-name system included
Console(config)# snmp-server filter filter-name system.7 excluded
Console(config)# snmp-server filter filter-name ifEntry.*.1 included
snmp-server host
The snmp-server host
Global Configuration mode command specifies the recipient of Simple Network
Management Protocol Version 1 or Version 2 notifications. Use the no
form of this command to remove the specified host.
Syntax snmp-server host { ip-address
| hostname
} community-string
[traps | informs] [1 | 2] [udp-port port
] [filter filtername
] [timeout seconds
] [retries retries
] no snmp-server host { ip-address
| hostname
} [traps | informs]
Page 190
Not approved by Document Control. For review only.
SNMP Commands
Parameters
• ip-address —Specifies the IP address of the host (targeted recipient).
• hostname —Specifies the name of the host. (Range:1-158 characters)
• community-string —Specifies a password-like community string sent with the notification operation.
(Range: 1-20)
• traps
—Indicates that SNMP traps are sent to this host. If unspecified, SNMPv2 traps are sent to the host.
• informs
—Indicates that SNMP informs are sent to this host. Not applicable to SNMPv1.
• 1
—Indicates that SNMPv1 traps will be used.
• 2
—Indicates that SNMPv2 traps will be used. If
• port —Specifies the UDP port of the host to use. If unspecified, the default UDP port number is 162.
(Range:1-65535)
• filtername —Specifies a string that defines the filter for this host. If unspecified, nothing is filtered.
(Range: 1-30 characters)
• seconds —Specifies the number of seconds to wait for an acknowledgment before resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-300)
• retries—Specifies the maximum number of times to resend an inform request. If unspecified, the default maximum number of retries is 3. (Range: 1-255)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
When configuring an SNMPv1 or SNMPv2 notification recipient, a notification view for that recipient is automatically generated for all the MIB.
When configuring an SNMPv1 notification recipient, the
Inform
option cannot be selected.
If a trap and inform are defined on the same target, and an inform was sent, the trap is not sent.
Example
The following example enables SNMP traps for host 10.1.1.1 with community string "management" using
SNMPv2.
Console(config)# snmp-server host 10.1.1.1 management 2
snmp-server v3-host
The snmp-server v3-host
Global Configuration mode command specifies the recipient of Simple Network
Management Protocol Version 3 notifications. Use the no
form of this command to remove the specified host.
Syntax snmp-server v3-host { ip-address
| hostname
} username
[traps | informs] {noauth | auth | priv} [udp-port port
]
[filter filtername
] [timeout seconds
] [retries retries
] no snmp-server host { ip-address
| hostname
} username
[traps | informs]
Page 191
Allied Telesis
Command Line Interface User’s Guide
Parameters
• ip-address —Specifies the IP address of the host (targeted recipient).
• hostname —Specifies the name of the host. (Range:1-158 characters)
• username —Specifies the name of the user to use to generate the notification. (Range: 1-25)
• traps
—Indicates that SNMP traps are sent to this host.
• informs
—Indicates that SNMP informs are sent to this host.
• noauth
—Indicates no authentication of a packet.
• auth
—Indicates authentication of a packet without encrypting it.
• priv
—Indicates authentication of a packet with encryption.
• port —Specifies the UDP port of the host to use. If unspecified, the default UDP port number is 162.
(Range: 1-65535)
• filtername —Specifies a string that defines the filter for this host. If unspecified, nothing is filtered.
(Range: 1-30 characters)
• seconds —Specifies the number of seconds to wait for an acknowledgment before resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-300)
• retries —Specifies the maximum number of times to resend an inform request. If unspecified, the default maximum number of retries is 3. (Range: 1-255)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
A user and notification view are not automatically created. Use the snmp-server user
, snmp-server group
and snmp-server view
Global Configuration mode commands to generate a user, group and notify group, respectively.
Example
The following example configures an SNMPv3 host.
Console(config)# snmp-server v3-host 192.168.0.20 john noauth
snmp-server trap authentication
The snmp-server trap authentication
Global Configuration mode command enables the device to send SNMP traps when authentication fails. Use the no
form of this command to disable SNMP failed authentication traps.
Syntax snmp-server trap authentication no snmp-server trap authentication
Default Configuration
SNMP failed authentication traps are enabled.
Page 192
Not approved by Document Control. For review only.
SNMP Commands
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables SNMP failed authentication traps.
Console(config)# snmp-server trap authentication
snmp-server contact
The snmp-server contact
Global Configuration mode command configures the system contact (sysContact) string. Use the no
form of this command to remove system contact information.
Syntax snmp-server contact text no snmp-server contact
Parameters
• text — Specifies the string that describes system contact information. (Range: 0-160 characters)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Do not include spaces in the text string or place text that includes spaces inside quotation marks.
Example
The following example configures the system contact point called
ATI_Technical_Support
.
console(config)# snmp-server contact ATI_Technical_Support
snmp-server location
The snmp-server location
Global Configuration mode command configures the system location string. Use the no
form of this command to remove the location string.
Syntax snmp-server location text no snmp-server location
Page 193
Allied Telesis
Command Line Interface User’s Guide
Parameters
• text — Specifies a string that describes system location information. (Range: 0-160 characters)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Do not include spaces in the text string or place text that includes spaces inside quotation marks.
Example
The following example defines the device location as
New_York
.
Console(config)# snmp-server location New_York
snmp-server set
The snmp-server set
Global Configuration mode command defines the SNMP MIB value.
Syntax snmp-server set variable-name name1 value1 [ name2 value2 … ]
Parameters
• variable-name — MIB variable name.
• name value — List of name and value pairs. In the case of scalar MIBs, only a single pair of name values. In the case of an entry in a table, at least one pair of name and value followed by one or more fields.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Although the CLI can set any required configuration, there might be a situation where a SNMP user sets a MIB variable that does not have an equivalent command. In order to generate configuration files that support those situations, the snmp-server set command is used.
This command is case-sensitive.
Example
The following example configures the scalar MIB sysName with the value ati
.
Console(config)# snmp-server set sysName sysname ati
Page 194
Not approved by Document Control. For review only.
SNMP Commands
show snmp
The show snmp
Privileged EXEC mode command displays the SNMP status.
Syntax show snmp
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the SNMP communications status.
Console# show snmp
Community-
String
---------public private private
Community-
Access
---------read only read write su
View name
--------user-view
Default
DefaultSuper
Community-string
---------------public
Traps are enabled.
Authentication trap is enabled.
Group name
---------user-group
Version 1,2 notifications
Target Address Type
--------------
192.122.173.42
192.122.173.42
-----
Trap
Community
--------public
Inform public
IP address
--------
All
172.16.1.1
172.17.1.1
IP address
---------all
Version
-------
2
2
UDP
Port
----
162
162
Filter
Name
------
TO
Sec
Retries
---------
15 3
15 3
Page 195
Allied Telesis
Command Line Interface User’s Guide
Version 3 notifications
Target Address Type
--------------
192.122.173.42
-----
Username
---------
Inform Bob
Security
Level
-------
Priv
UDP
Port
----
162
Filter
Name
------
TO
Sec
Retries
---------
15 3
System Contact: Robert
System Location: Marketing
The following table describes significant fields shown above.
Field Description
Community-string Community access string to permit access to the SNMP protocol.
Community-access
IP Address
Type of access - read-only, read-write, super access
Management station IP Address.
Trap-Rec-Address
Trap-Rec-Community
Version
Targeted Recipient
Statistics sent with the notification operation.
SNMP version for the sent trap 1 or 2.
show snmp engineid
The show snmp engineID
Privileged EXEC mode command displays the ID of the local Simple Network
Management Protocol (SNMP) engine.
Syntax show snmp engineID
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the SNMP engine ID.
Console# show snmp engineID
Local SNMP engineID: 08009009020C0B099C075878
Page 196
Not approved by Document Control. For review only.
SNMP Commands
show snmp views
The show snmp views
Privileged EXEC mode command displays the configuration of views.
Syntax show snmp views [ viewname
]
Parameters
• viewname — Specifies the name of the view. (Range: 1-30)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the configuration of views.
Console# show snmp views
Name
----------user-view user-view user-view
OID Tree
-----------------------
1.3.6.1.2.1.1
1.3.6.1.2.1.1.7
1.3.6.1.2.1.2.2.1.*.1
Type
---------
Included
Excluded
Included
show snmp groups
The show snmp groups
Privileged EXEC mode command displays the configuration of groups.
Syntax show snmp groups [ groupname
]
Parameters
• groupname —Specifies the name of the group. (Range: 1-30)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Page 197
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the configuration of views.
Console# show snmp groups
Name
-------------user-group managers-group managers-group
Model
-----
Security
Level
-----
V3
V3
V3 priv priv priv
Read
-------
Default
Default
Default
The following table describes significant fields shown above.
Write
-------
Views
Notify
-------
""
Default
""
""
""
""
Field Description
Name Name of the group.
Security Model
Security Level
SNMP model in use (v1, v2 or v3).
Authentication of a packet with encryption. Applicable only to the SNMP v3 security model.
Views Read
Write
Notify
Name of the view that enables only viewing the contents of the agent. If unspecified, all objects except the community-table and SNMPv3 user and access tables are available.
Name of the view that enables entering data and managing the contents of the agent.
Name of the view that enables specifying an inform or a trap.
show snmp filters
The show snmp filters
Privileged EXEC mode command displays the configuration of filters.
Syntax show snmp filters [ filtername
]
Parameters
• filtername —Specifies the name of the filter. (Range: 1-30)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Page 198
Not approved by Document Control. For review only.
SNMP Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the configuration of filters.
Console# show snmp filters
Name
----------user-filter user-filter user-filter
OID Tree
-----------------------
1.3.6.1.2.1.1
1.3.6.1.2.1.1.7
1.3.6.1.2.1.2.2.1.*.1
Type
---------
Included
Excluded
Included
show snmp users
The show snmp users
Privileged EXEC mode command displays the configuration of users.
Syntax show snmp users [ username
]
Parameters
• username —Specifies the name of the user. (Range: 1-30)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the configuration of users.
Console# show snmp users
Name
------
John
John
Group name
-----------user-group user-group
Auth Method
--------md5 md5
Remote
-------------------------
08009009020C0B099C075879
Page 199
Allied Telesis
Command Line Interface User’s Guide
Chapter 24.Spanning-Tree Commands
spanning-tree
The spanning-tree
Global Configuration mode command enables spanning-tree functionality. Use the no
form of this command to disable spanning-tree functionality.
Syntax spanning-tree no spanning-tree
Default Configuration
Spanning-tree is enabled.
Command Modes
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables spanning-tree functionality.
Console(config)# spanning-tree
spanning-tree mode
The spanning-tree mode
Global Configuration mode command configures the spanning-tree protocol. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree mode
{ stp
| rstp
| mstp
} no spanning-tree mode
Parameters
• stp
— Indicates that the Spanning Tree Protocol (STP) is enabled.
• rstp
— Indicates that the Rapid Spanning Tree Protocol (RSTP) is enabled.
• mstp
— Indicates that the Multiple Spanning Tree Protocol (RSTP) is enabled.
Default Configuration
STP is enabled.
Page 200
Not approved by Document Control. For review only.
Spanning-Tree Commands
Command Modes
Global Configuration mode
User Guidelines
In RSTP mode, the device uses STP when the neighbor device uses STP.
In MSTP mode, the device uses RSTP when the neighbor device uses RSTP and uses STP when the neighbor device uses STP.
Example
The following example configures the spanning-tree protocol to RSTP.
console(config)# spanning-tree mode rstp
spanning-tree forward-time
The spanning-tree forward-time
Global Configuration mode command configures the spanning-tree bridge forward time, which is the amount of time a port remains in the listening and learning states before entering the forwarding state. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree forward-time seconds no spanning-tree forward-time
Parameters
• seconds — Time in seconds. (Range: 4 - 30)
Default Configuration
The default forwarding time for the IEEE Spanning Tree Protocol (STP) is 15 seconds.
Command Modes
Global Configuration mode
User Guidelines
When configuring the forwarding time, the following relationship should be kept:
2*(Forward-Time - 1) >= Max-Age
Example
The following example configures the spanning tree bridge forwarding time to 25 seconds.
Console(config)# spanning-tree forward-time 25
spanning-tree hello-time
The spanning-tree hello-time
Global Configuration mode command configures the spanning tree bridge hello time, which is how often the device Broadcasts hello messages to other devices. Use the no
form of this command to return to the default configuration.
Page 201
Allied Telesis
Command Line Interface User’s Guide
Syntax s panning-tree hello-time seconds no spanning-tree hello-time
Parameters
• seconds — Time in seconds. (Range: 1 - 10)
Default Configuration
The default hello time for IEEE Spanning Tree Protocol (STP) is 2 seconds.
Command Modes
Global Configuration mode
User Guidelines
When configuring the hello time, the following relationship should be kept:
Max-Age >= 2*(Hello-Time + 1)
Example
The following example configures spanning tree bridge hello time to 5 seconds.
Console(config)# spanning-tree hello-time 5
spanning-tree max-age
The spanning-tree max-age
Global Configuration mode command configures the spanning tree bridge maximum age. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree max-age seconds no spanning-tree max-age
Parameters
• seconds — Time in seconds. (Range: 6 - 40)
Default Configuration
The default maximum age for IEEE Spanning Tree Protocol (STP) is 20 seconds.
Command Modes
Global Configuration mode
User Guidelines
When configuring the maximum age, the following relationships should be kept:
2*(Forward-Time - 1) >= Max-Age
Max-Age >= 2*(Hello-Time + 1)
Page 202
Not approved by Document Control. For review only.
Spanning-Tree Commands
Example
The following example configures the spanning tree bridge maximum-age to 10 seconds.
Console(config)# spanning-tree max-age 10
spanning-tree priority
The spanning-tree priority
Global Configuration mode command configures the spanning tree priority of the device. The priority value is used to determine which bridge is elected as the root bridge. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree priority priority no spanning-tree priority
Parameters
• priority — Priority of the bridge. (Range: 0 - 61440 in steps of 4096)
Default Configuration
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.
Command Modes
Global Configuration mode
User Guidelines
The bridge with the lowest priority is elected as the root bridge.
Example
The following example configures spanning tree priority to 12288.
Console(config)# spanning-tree priority 12288
spanning-tree disable
The spanning-tree disable
Interface Configuration mode command disables spanning tree on a specific port.
Use the no
form of this command to enable spanning tree on a port.
Syntax spanning-tree disable no spanning-tree disable
Default Configuration
Spanning tree is enabled on all ports.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
Page 203
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
There are no user guidelines for this command.
Example
The following example disables spanning-tree on Ethernet port 1/e5.
Console(config)# interface ethernet 1/e5
Console(config-if)# spanning-tree disable
spanning-tree cost
The spanning-tree cost
Interface Configuration mode command configures the spanning tree path cost for a port. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree cost cost no spanning-tree cost
Parameters
• cost — Path cost of the port (Range: 1 - 200,000,000)
Default Configuration
Default path cost is determined by port speed and path cost method (long or short) as shown below:
Interface
Port-channel
Gigabit Ethernet (1000 Mbps)
Fast Ethernet (100 Mbps)
Ethernet (10 Mbps)
Long
20,000
20,000
200,000
2,000,000
Short
4
4
19
100
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The path cost method is configured using the spanning-tree pathcost method
Global Configuration mode command.
Example
The following example configures the spanning-tree cost on Ethernet port 1/e15 to 35000.
Console(config)# interface ethernet 1/e15
Console(config-if)# spanning-tree cost 35000
Page 204
Not approved by Document Control. For review only.
Spanning-Tree Commands
spanning-tree port-priority
The spanning-tree port-priority
Interface Configuration mode command configures port priority. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree port-priority priority no spanning-tree port-priority
Parameters
• priority — The priority of the port. (Range: 0 - 240 in multiples of 16)
Default Configuration
The default port priority for IEEE Spanning TreeProtocol (STP) is 128.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the spanning priority on Ethernet port 1/e15 to 96.
Console(config)# interface ethernet 1/e15
Console(config-if)# spanning-tree port-priority 96
spanning-tree portfast
The spanning-tree portfast
Interface Configuration mode command enables PortFast mode. In PortFast mode, the interface is immediately put into the forwarding state upon linkup without waiting for the standard forward time delay. Use the no
form of this command to disable PortFast mode.
Syntax spanning-tree portfast no spanning-tree portfast
Default Configuration
PortFast mode is disabled.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
This feature should be used only with interfaces connected to end stations. Otherwise, an accidental topology loop could cause a data packet loop and disrupt device and network operations.
Page 205
Allied Telesis
Command Line Interface User’s Guide
Example
The following example enables PortFast on Ethernet port 1/e15
.
Console(config)# interface ethernet 1/e15
Console(config-if)# spanning-tree portfast
spanning-tree link-type
The spanning-tree link-type
Interface Configuration mode command overrides the default link-type setting determined by the duplex mode of the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree link-type
{ point-to-point
| shared
} no spanning-tree spanning-tree link-type
Parameters
• point-to-point
—Indicates that the port link type is point-to-point.
• shared
— Indicates that the port link type is shared.
Default Configuration
The device derives the port link type from the duplex mode. A full-duplex port is considered a point-to-point link and a half-duplex port is considered a shared link.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables shared spanning-tree on Ethernet port 1/e5
.
Console(config)# interface ethernet 1/e15
Console(config-if)# spanning-tree link-type shared
spanning-tree pathcost method
The spanning-tree pathcost method
Global Configuration mode command sets the default path cost method.
Use the no
form of this command to return to the default configuration.
Syntax spanning-tree pathcost method
{ long
| short
} no spanning-tree pathcost method
Page 206
Not approved by Document Control. For review only.
Spanning-Tree Commands
Parameters
• long — Specifies port path costs with a range of 1-200,000,000 .
• short — Specifies port path costs with a range of 0-65,535.
Default Configuration
Short path cost method.
Command Mode
Global Configuration mode
User Guidelines
This command applies to all spanning tree instances on the device.
The cost is set using the spanning-tree cost
command.
Example
The following example sets the default path cost method to long
.
Console(config)# spanning-tree pathcost method long
spanning-tree bpdu
The spanning-tree bpdu
Global Configuration mode command defines BPDU handling when the spanning tree is disabled globally or on a single interface. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree bpdu
{ filtering
| flooding
}
Parameters
• filtering
— Filter BPDU packets when the spanning tree is disabled on an interface.
• flooding
— Flood BPDU packets when the spanning tree is disabled on an interface.
Default Configuration
The default setting is flooding.
Command Modes
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example defines BPDU packet flooding when the spanning-tree is disabled on an interface
.
Console(config)# spanning-tree bpdu flooding
Page 207
Allied Telesis
Command Line Interface User’s Guide
spanning-tree guard root
The spanning-tree guard root
Interface Configuration (Ethernet, port-channel) mode command enables root guard on all spanning tree instances on the interface. Root guard prevents the interface from becoming the root port of the device. Use the no
form of this command to disable root guard on the interface.
Syntax spanning-tree guard root no spanning-tree guard root
Default Configuration
Root guard is disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
Root guard can be enabled when the device operates in STP, RSTP and MSTP.
When root guard is enabled, the port changes to the alternate state if spanning-tree calculations selects the port as the root port.
Example eThe following example prevents Ethernet port 1/e1 from being the root port of the device.
Console(config) # interface ethernet 1/e1
Console(config-mst) # spanning-tree guard root
spanning-tree bpduguard
The spanning-tree bpduguard
Interface Configuration (Ethernet, port-channel) mode command shutsdown an interface when it receives a bridge protocol data unit (BPDU). Use the no
form of this command to restore the default configuration.
Syntax spanning-tree bpduguard no spanning-tree bpduguard
Default Configuration
The default configuration is set to disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
You can enable the command when the spanning tree is enabled (useful when the port is in the PortFast mode) or disabled.
Page 208
Not approved by Document Control. For review only.
Spanning-Tree Commands
Example
The following example shutsdown an interface when it receives a BPDU.
Console(config)# interface ethernet 1/e1
Console(config-if)# spanning-tree bpduguard
clear spanning-tree detected-protocols
The clear spanning-tree detected-protocols
Privileged EXEC mode command restarts the protocol migration process (forces renegotiation with neighboring devices) on all interfaces or on a specified interface.
Syntax clear spanning-tree detected-protocols
[ ethernet interface | port-channel port-channel-number ]
Parameters
• interface — A valid Ethernet port.
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
This feature should be used only when working in RSTP or MSTP mode.
Example
The following example restarts the protocol migration process on Ethernet port 1/e11.
Console# clear spanning-tree detected-protocols ethernet 1/e11
spanning-tree mst priority
The spanning-tree mst priority
Global Configuration mode command configures the device priority for the specified spanning-tree instance. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree mst instance-id priority priority no spanning-tree
mst instance-id priority
Parameters
• instance -id— ID of the spanning -tree instance (Range: 1- 7 ).
• priority— Device priority for the specified spanning-tree instance (Range: 0-61440 in multiples of 4096).
Page 209
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.
Command Mode
Global Configuration mode
User Guidelines
The device with the lowest priority is selected as the root of the spanning tree.
Example
The following example configures the spanning tree priority of instance 1 to 4096.
Console (config) # spanning-tree mst 1 priority 4096
spanning-tree mst max-hops
The spanning-tree mst priority
Global Configuration mode command configures the number of hops in an MST region before the BDPU is discarded and the port information is aged out. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree mst max-hops
hop-count no spanning-tree mst max-hops
Parameters
• hop-count— Number of hops in an MST region before the BDPU is discarded .(Range: 1-40)
Default Configuration
The default number of hops is 20.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the maximum number of hops that a packet travels in an MST region before it is discarded to 10.
Console (config) # spanning-tree mst max-hops 10
spanning-tree mst port-priority
The
spanning-tree mst port-priority
Interface Configuration mode command configures port priority for the specified MST instance. Use the no
form of this command to return to the default configuration.
Page 210
Not approved by Document Control. For review only.
Spanning-Tree Commands
Syntax spanning-tree mst instance-id port-priority
priority no spanning-tree mst instance-id port-priority
Parameters
• instance-ID— ID of the spanning tree instance. (Range: 1- 7)
• priority— The port priority. (Range: 0 - 240 in multiples of 16)
Default Configuration
The default port priority for IEEE Multiple Spanning Tree Protocol (MSTP) is 128.
Command Modes
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the port priority of port g1 to 142.
Console(config)# interface ethernet g1
Console(config-if)# spanning-tree mst 1 port-priority 142
spanning-tree mst cost
The spanning-tree mst cost
Interface Configuration mode command configures the path cost for multiple spanning tree (MST) calculations. If a loop occurs, the spanning tree considers path cost when selecting an interface to put in the forwarding state. Use the no
form of this command to return to the default configuration.
Syntax spanning-tree mst instance-id cost cost no spanning-tree mst instance-id cost
Parameters
• instance-ID— ID of the spanning -tree instance (Range: 1- 7).
• cost— The port path cost. (Range: 1 - 200,000,000)
Default Configuration
Default path cost is determined by port speed and path cost method (long or short) as shown below:
Interface
Port-channel
Gigabit Ethernet(1000 Mbps)
Long
20,000
20,000
Short
4
4
Page 211
Allied Telesis
Command Line Interface User’s Guide
Fast Ethernet (100 Mbps)
Ethernet (10 Mbps)
200,000
2,000,000
Command Modes
Interface Configuration (Ethernet, port-channel) mode
19
100
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the MSTP instance 1 path cost for Ethernet port 1/e9 to 4.
Console(config) # interface ethernet 1/e9
Console(config-if) # spanning-tree mst 1 cost 4
spanning-tree mst configuration
The
spanning-tree mst configuration
Global Configuration mode command enables configuring an MST region by entering the Multiple Spanning Tree (MST) mode.
Syntax spanning-tree mst configuration
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
All devices in an MST region must have the same VLAN mapping, configuration revision number and name.
Example
The following example configures an MST region.
Console(config)# spanning-tree mst configuration
Console(config-mst) # instance 1 add vlan 10-20
Console(config-mst) # name region1
Console(config-mst) # revision 1
instance (mst)
The instance
MST Configuration mode command maps VLANS to an MST instance.
Page 212
Not approved by Document Control. For review only.
Spanning-Tree Commands
Syntax instance instance-id
{add | remove} vlan vlan-range
Parameters
• instance-ID— ID of the MST instance (Range: 1-15).
• vlan-range— VLANs to be added to or removed from the specified MST instance. To specify a range of
VLANs, use a hyphen. To specify a series of VLANs, use a comma. (Range: 1-4094).
Default Configuration
VLANs are mapped to the common and internal spanning tree (CIST) instance (instance 0).
Command Modes
MST Configuration mode
User Guidelines
All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the CIST.
For two or more devices to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number, and the same name.
Example
The following example maps VLANs 10-20 to MST instance 1.
Console(config)# spanning-tree mst configuration
Console(config-mst)# instance 1 add vlan 10-20
name (mst)
The name
MST Configuration mode command defines the configuration name. Use the no
form of this command to return to the default setting.
Syntax name string no name
Parameters
• string— MST configuration name. Case-sensitive (Range: 1-32 characters).
Default Configuration
The default name is a bridge ID.
Command Mode
MST Configuration mode
Page 213
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
There are no user guidelines for this command.
Example
The following example defines the configuration name as region1.
Console(config) # spanning-tree mst configuration
Console(config-mst) # name region 1
revision (mst)
The revision
MST configuration command defines the configuration revision number. Use the no
form of this command to return to the default configuration.
Syntax revision value no revision
Parameters
• value— Configuration revision number (Range: 0-65535).
Default Configuration
The default configuration revision number is 0.
Command Mode
MST Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the configuration revision to 1.
Console(config) # spanning-tree mst configuration
Console(config-mst) # revision 1
show (mst)
The show
MST Configuration mode command displays the current or pending MST region configuration.
Syntax show {current | pending}
Parameters
• current
— Indicates the current region configuration.
• pending
— Indicates the pending region configuration.
Page 214
Not approved by Document Control. For review only.
Spanning-Tree Commands
Default Configuration
This command has no default configuration.
Command Mode
MST Configuration mode
User Guidelines
The pending MST region configuration takes effect only after entering the MST configuration mode.
Example
The following example displays a pending MST region configuration.
Console(config-mst)# show pending
Pending MST configuration
Name: Region1
Revision: 1
Instance
--------
0
1
Vlans Mapped
------------
1-9,21-4094
10-20
State
-------
Enabled
Enabled
exit (mst)
The exit
MST Configuration mode command exits the MST configuration mode and applies all configuration changes.
Syntax exit
Default Configuration
This command has no default configuration.
Command Mode
MST Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example exits the MST configuration mode and saves changes.
Console(config) # spanning-tree mst configuration
Console(config-mst) # exit
Page 215
Allied Telesis
Command Line Interface User’s Guide
abort (mst)
The abort
MST Configuration mode command exits the MST configuration mode without applying the configuration changes.
Syntax abort
Default Configuration
This command has no default configuration.
Command Mode
MST Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example exits the MST configuration mode without saving changes.
Console(config) # spanning-tree mst configuration
Console(config-mst) # abort
show spanning-tree
The show spanning-tree
Privileged EXEC mode command shows spanning tree configuration.
Syntax show spanning-tree [ethernet interface -number | port-channel port-channel-number ] [ instance
instance-id ] show spanning-tree
[ detail
] [ active
| blockedports
] [ instance instance-id ] show spanning-tree mst-configuration
Parameters
• detail
—Display detailed information.
• active
— Display active ports only.
• blockedports
— Display blocked ports only.
• mst-configuration
— Display the MST configuration identifier.
• interface-number
— Ethernet port number.
• port-channel-number
— Port channel index.
• instance-id
— ID associated with a spanning-tree instance.
Default Configuration
This command has no default configuration.
Page 216
Not approved by Document Control. For review only.
Spanning-Tree Commands
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Examples
The following examples displays spanning-tree information.
Console# show spanning-tree
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time 2 sec
32768
00:01:42:97:e0:00
20000
1 (1/e1)
Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
Address
Hello Time 2 sec
36864
00:02:4b:29:7a:00
Max Age 20 sec
Interfaces
Name
----------
1/1
1/2
1/3
1/4
1/5
Enabled
Enabled
Disabled
Enabled
Enabled
------------
128.1 20000
128.2
20000
128.3
128.4
128.5
20000
20000
20000
Sts
---
FWD
FWD
-
BLK
DIS
Forward Delay 15 sec
Role
----
Root
Desg
-
ALTN
-
PortFast
--------
No
No
-
No
-
Type
----------
Shared (STP) e-
Shared (STP)
-
Page 217
Allied Telesis
Command Line Interface User’s Guide
Console# show spanning-tree
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority 36864
Address 00:02:4b:29:7a:00
This switch is the root.
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
1/2
1/3
1/4
1/5
Interfaces
Name
----
1/1
-------
Enabled
Enabled
Disabled
Enabled
Enabled
------------
128.1 20000
128.2
128.3
20000
20000
128.4
128.5
20000
20000
Sts
---
FWD
FWD
-
FWD
DIS
Role
----
Desg
Desg
-
Desg
-
PortFast
--------
No
No
-
No
-
Type
----------
Shared (STP)
-
Shared (STP)
-
Console# show spanning-tree
Spanning tree disabled (BPDU filtering) mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time N/A
N/A
N/A
N/A
N/A
Max Age N/A Forward Delay N/A
Bridge ID Priority
Address
Hello Time 2 sec
Interfaces
Name
----
1/1
-------
Enabled
36864
00:02:4b:29:7a:00
Max Age 20 sec
------------
128.1 20000
Sts
---
-
Forward Delay 15 sec
Role
----
-
PortFast
--------
-
Type
----
-
Page 218
Not approved by Document Control. For review only.
Spanning-Tree Commands
1/2
1/3
1/4
1/5
Enabled
Disabled
Enabled
Enabled
128.2
128.3
128.4
128.5
Console# show spanning-tree active
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time 2 sec
20000
20000
20000
20000
-
-
-
-
-
-
-
-
-
-
-
-
32768
00:01:42:97:e0:00
20000
1 (1/e1)
Max Age 20 sec Forward Delay 15 sec
-
-
-
-
Bridge ID Priority
Address
Hello Time 2 sec
Interfaces
Name
----
1/1
-------
Enabled
1/2
1/4
Enabled
Enabled
36864
00:02:4b:29:7a:00
Max Age 20 sec
------------
128.1 20000
128.2
128.4
20000
20000
Sts
---
FWD
FWD
BLK
Forward Delay 15 sec
Role
----
Root
Desg
ALTN
PortFast
--------
No
No
No
Type
----------
Shared (STP)
Shared (STP)
Console# show spanning-tree blockedports
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time 2 sec
32768
00:01:42:97:e0:00
20000
1 (1/1)
Max Age 20 sec Forward Delay 15 sec
Page 219
Allied Telesis
Command Line Interface User’s Guide
Bridge ID Priority
Address
Hello Time 2 sec
Interfaces
Name
----
1/4
-------
Enabled
--------
128.4
36864
00:02:4b:29:7a:00
Max Age 20 sec
-----
19
Sts
---
BLK
Forward Delay 15 sec
Role
----
ALTN
PortFast
--------
No
Type
----------
Shared (STP)
Console# show spanning-tree detail
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time 2 sec
32768
00:01:42:97:e0:00
20000
1 (1/e1)
Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
Address
36864
Hello Time 2 sec
00:02:4b:29:7a:00
Max Age 20 sec Forward Delay 15 sec
Number of topology changes 2 last change occurred 2d18h ago
Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15
Port 1 (1/e1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Role: Root
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
Page 220
Not approved by Document Control. For review only.
Spanning-Tree Commands
Port 2 (1/2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) STP
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Port 3 (1/3) disabled
State: N/A
Port id: 128.3
Type: N/A (configured: auto)
Designated bridge Priority: N/A
Role: N/A
Port cost: 20000
Port Fast: N/A (configured:no)
Address: N/A
Designated port id: N/A
Number of transitions to forwarding state: N/A
Designated path cost: N/A
BPDU: sent N/A, received N/A
Port 4 (1/4) enabled
State: Blocking
Port id: 128.4
Type: Shared (configured:auto) STP
Designated bridge Priority: 28672
Designated port id: 128.25
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Role: Alternate
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:30:94:41:62:c8
Designated path cost: 20000
BPDU Guard:Disabled
Port 5 (1/5) enabled
State: Disabled
Port id: 128.5
Type: N/A (configured: auto)
Role: N/A
Port cost: 20000
Port Fast: N/A (configured:no)
Designated bridge Priority: N/A
Designated port id: N/A
Number of transitions to forwarding state: N/A
BPDU: sent N/A, received N/A
Address: N/A
Designated path cost: N/A
Page 221
Allied Telesis
Command Line Interface User’s Guide
Console# show spanning-tree ethernet 1/e1
Port 1 (1/e1) enabled
State: Forwarding
Port id: 128.1
Role: Root
Port cost: 20000
Type: P2p (configured: auto) RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
Console# show spanning-tree mst-configuration
0
1
Name: Region1
Revision: 1
Instance
--------
Vlans mapped
------------
1-9, 21-4094
10-20
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
State
-------
Enabled
Enabled
###### MST 0 Vlans Mapped: 1-9,
CST Root ID Priority 32768
Address 00:01:42:97:e0:00
Path Cost 20000
Root Port 1 (1/e1)
Hello Time 2 sec Max Age 20 sec
IST Master ID Priority 32768
Address 00:02:4b:29:7a:00
This switch is the IST master.
Hello Time 2 sec
Max hops 20
Max Age 20 sec
Interfaces
Forward Delay 15 sec
Forward Delay 15 sec
Page 222
Not approved by Document Control. For review only.
Spanning-Tree Commands
Name
----
1/1
1/2
1/3
1/4
-------
Enabled
Enabled
Enabled
Enabled
--------
128.2
128.3
128.4
-----
128.1 20000
20000
20000
20000
###### MST 1 Vlans Mapped: 10-20
CST Root ID Priority
Address
24576
00:02:4b:29:89:76
Path Cost 20000
Root Port 4 (1/4)
Rem hops 19
Bridge ID Priority
Address
32768
00:02:4b:29:7a:00
Sts
---
FWD
FWD
FWD
FWD
Role
----
Root
Desg
Desg
Desg
Interfaces
Name
----
1/1
-------
Enabled
1/2
1/3
1/4
Enabled
Enabled
Enabled
------------
128.1 20000
128.2
128.3
128.4
20000
20000
20000
Console# show spanning-tree detail
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9, 21-4094
CST Root ID Priority 32768
Address 00:01:42:97:e0:00
Path Cost 20000
Root Port 1 (1/1)
Sts
---
FWD
FWD
BLK
FWD
Role
----
Boun
Boun
Altn
Desg
PortFast
--------
No
Type
----------
No
No
No
(RSTP)
Shared Bound
(STP)
P2p
P2p
PortFast
--------
No
Type
----------
No
No
No
(RSTP)
Shared Bound
(STP)
P2p
P2p
Page 223
Allied Telesis
Command Line Interface User’s Guide
IST Master ID
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Priority
Address
32768
00:02:4b:29:7a:00
This switch is the IST master.
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops 20
Number of topology changes 2 last change occurred 2d18h ago
Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15
Port 1 (1/e1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) Boundary RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Port 2 (1/e2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) Boundary STP
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Port 3 (1/3) enabled
State: Forwarding
Port id: 128.3
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.3
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Root
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Page 224
Not approved by Document Control. For review only.
Spanning-Tree Commands
Port 4 (1/4) enabled
State: Forwarding
Port id: 128.4
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.2
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated cost: 20000
BPDU Guard: Disabled
###### MST 1 Vlans Mapped: 10-20
Root ID Priority 24576
Address 00:02:4b:29:89:76
Path Cost 20000
Port Cost 4 (1/4)
Rem hops 19
Bridge ID Priority 32768
Address 00:02:4b:29:7a:00
Number of topology changes 2 last change occurred 1d9h ago
Times: hold 1, topology change 2, notification 2 hello 2, max age 20, forward delay 15
Port 1 (1/1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) Boundary RSTP
Designated bridge Priority: 32768
Designated port id: 128.1
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Role: Boundary
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
BPDU Guard: Disabled
Port 2 (1/2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) Boundary STP
Designated bridge Priority: 32768
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Page 225
Allied Telesis
Command Line Interface User’s Guide
Designated port id: 128.2
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Designated cost: 20000
BPDU Guard: Disabled
Port 3 (1/3) disabled
State: Blocking
Port id: 128.3
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.78
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Alternate
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:1a:19
Designated cost: 20000
BPDU Guard: Disabled
Port 4 (1/4) enabled
State: Forwarding
Port id: 128.4
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.2
Guard Root: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated cost: 20000
BPDU Guard: Disabled
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority 32768
Address 00:01:42:97:e0:00
Path Cost 20000
Root Port 1 (1/1)
Hello Time 2 sec Max Age 20 sec
IST Master ID Priority 32768
Forward Delay 15 sec
Page 226
Not approved by Document Control. For review only.
Spanning-Tree Commands
Bridge ID
Address 00:02:4b:19:7a:00
Path Cost 10000
Rem hops 19
Priority
Address
32768
00:02:4b:29:7a:00
Hello Time 2 sec
Max hops 20
Max Age 20 sec Forward Delay 15 sec
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority 32768
Address 00:01:42:97:e0:00
This switch is root for CST and IST master.
Hello Time 2 sec
Max hops 20
Max Age 20 sec Forward Delay 15 sec
Page 227
Allied Telesis
Command Line Interface User’s Guide
Chapter 25.SSH Commands
ip ssh port
The ip ssh port
Global Configuration mode command specifies the port to be used by the SSH server. Use the no form of this command to return to the default configuration.
Syntax ip ssh port port-number no ip ssh port
Parameters
• port-number — Port number for use by the SSH server (Range: 1 - 65535).
Default Configuration
The default port number is 22.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the port to be used by the SSH server as 8080.
Console(config)# ip ssh port 8080
ip ssh server
The ip ssh server
Global Configuration mode command enables the device to be configured from a SSH server.
Use the no
form of this command to disable this function.
Syntax ip ssh server no ip ssh server
Default Configuration
Device configuration from a SSH server is enabled.
Command Mode
Global Configuration mode
Page 228
Not approved by Document Control. For review only.
SSH Commands
User Guidelines
If encryption keys are not generated, the SSH server is in standby until the keys are generated. To generate SSH server keys, use the crypto key generate dsa
, and crypto key generate rsa
Global Configuration mode commands.
Example
The following example enables configuring the device from a SSH server.
Console(config)# ip ssh server
crypto key generate dsa
The crypto key generate dsa
Global Configuration mode command generates DSA key pairs.
Syntax crypto key generate dsa
Default Configuration
DSA key pairs do not exist.
Command Mode
Global Configuration mode
User Guidelines
DSA keys are generated in pairs: one public DSA key and one private DSA key. If the device already has DSA keys, a warning and prompt to replace the existing keys with new keys are displayed.
This command is not saved in the device configuration; however, the keys generated by this command are saved in the private configuration, which is never displayed to the user or backed up on another device.
DSA keys are saved to the backup master.
This command may take a considerable period of time to execute.
Example
The following example generates DSA key pairs.
Console(config)# crypto key generate dsa
crypto key generate rsa
The crypto key generate rsa
Global Configuration mode command generates RSA key pairs.
Syntax crypto key generate rsa
Default Configuration
RSA key pairs do not exist.
Page 229
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
RSA keys are generated in pairs: one public RSA key and one private RSA key. If the device already has RSA keys, a warning and prompt to replace the existing keys with new keys are displayed.
This command is not saved in the device configuration; however, the keys generated by this command are saved in the private configuration which is never displayed to the user or backed up on another device.
RSA keys are saved to the backup master.
This command may take a considerable period of time to execute.
Example
The following example generates RSA key pairs.
Console(config)# crypto key generate rsa
ip ssh pubkey-auth
The ip ssh pubkey-auth
Global Configuration mode command enables public key authentication for incoming
SSH sessions. Use the no
form of this command to disable this function.
Syntax ip ssh pubkey-auth no ip ssh pubkey-auth
Default Configuration
Public Key authentication for incoming SSH sessions is disabled.
Command Mode
Global Configuration mode
User Guidelines
AAA authentication is independent
Example
The following example enables public key authentication for incoming SSH sessions.
Console(config)# ip ssh pubkey-auth
crypto key pubkey-chain ssh
The crypto key pubkey-chain ssh
Global Configuration mode command enters the SSH Public Key-chain
Configuration mode. The mode is used to manually specify other device public keys such as SSH client public keys.
Page 230
Not approved by Document Control. For review only.
SSH Commands
Syntax crypto key pubkey-chain ssh
Default Configuration
No keys are specified.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob
.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob
Console(config-pubkey-key)# key-string rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
user-key
The user-key
SSH Public Key-string Configuration mode command specifies which SSH public key is manually configured. Use the no
form of this command to remove an SSH public key.
Syntax user-key username { rsa
| dsa
} no user-key username
Page 231
Allied Telesis
Command Line Interface User’s Guide
Parameters
• username — Specifies the username of the remote SSH client. (Range: 1-48 characters)
• rsa
— Indicates the RSA key pair.
• dsa
— Indicates the DSA key pair.
Default Configuration
No SSH public keys exist.
Command Mode
SSH Public Key-string Configuration mode
User Guidelines
Follow this command with the key-string
SSH Public Key-String Configuration mode command to specify the key.
Example
The following example enables manually configuring an SSH public key for SSH public key-chain bob
.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string row
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
key-string
The key-string
SSH Public Key-string Configuration mode command manually specifies an SSH public key.
Syntax key-string key-string row key-string
Parameters
• row —
Indicates the SSH public key row by row.
• key-string
—
Specifies the key in UU-encoded DER format; UU-encoded DER format is the same format in the authorized_keys file used by OpenSSH.
Default Configuration
No keys exist.
Command Mode
SSH Public Key-string Configuration mode
User Guidelines
Use the key-string
SSH Public Key-string Configuration mode command to specify which SSH public key is to be interactively configured next. To complete the command, you must enter a row with no characters.
Page 232
Not approved by Document Control. For review only.
SSH Commands
Use the key-string row
SSH Public Key-string Configuration mode command to specify the SSH public key row by row. Each row must begin with a key-string row
command. This command is useful for configuration files.
Example
The following example enters public key strings for SSH public key client bob
.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string row AAAAB3Nza
Console(config-pubkey-key)# key-string row C1yc2
show ip ssh
The show ip ssh
Privileged EXEC mode command displays the SSH server configuration.
Syntax show ip ssh
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 233
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the SSH server configuration.
Console# show ip ssh
SSH server enabled. Port: 22
RSA key was generated.
DSA (DSS) key was generated.
SSH Public Key Authentication is enabled.
Active incoming sessions:
IP address
----------
172.16.0.1
SSH username
------------
John Brown
Version
---------
2.0 3
Cipher
-------
DES
The following table describes significant fields shown above:
Auth Code
----------
HMAC-SHA1
Field
IP address
SSH username
Version
Cipher
Auth Code
Description
Client address
User name
SSH version number
Encryption type (3DES, Blowfish, RC4)
Authentication Code (HMAC-MD5, HMAC-SHA1)
show crypto key mypubkey
The show crypto key mypubkey
Privileged EXEC mode command displays the SSH public keys on the device.
Syntax show crypto key mypubkey
[ rsa
| dsa
]
Parameters
• rsa
— Indicates the RSA key.
• dsa
— Indicates the DSA key.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 234
Not approved by Document Control. For review only.
SSH Commands
Example
The following example displays the SSH public RSA keys on the device.
Console# show crypto key mypubkey rsa
RSA key data:
005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768
Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86
Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt gfhkjglk
show crypto key pubkey-chain ssh
The show crypto key pubkey-chain ssh
Privileged EXEC mode command displays SSH public keys stored on the device.
Syntax show crypto key pubkey-chain ssh
[ username username ] [ fingerprint
{ bubble-babble
| hex
}]
Parameters
• username — Specifies the remote SSH client username.
• bubble-babble
— Fingerprint in Bubble Babble format.
• hex
— Fingerprint in Hex format.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays SSH public keys stored on the device.
Console# show crypto key pubkey-chain ssh
Username Fingerprint
-------bob john
-----------------------------------------------
9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86
98:F7:6E:28:F2:79:87:C8:18:F8:88:CC:F8:89:87:C8
Console# show crypto key pubkey-chain ssh username bob
Username: bob
Page 235
Allied Telesis
Command Line Interface User’s Guide
Key: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA
A54028A6 9ACC01C5 129D99E4
Fingerprint: 9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86
Page 236
Not approved by Document Control. For review only.
Syslog Commands
Chapter 26.Syslog Commands
logging on
The logging on
Global Configuration mode command controls error message logging. This command sends debug or error messages to a logging process, which logs messages to designated locations asynchronously to the process that generated the messages. Use the no
form of this command to disable the logging process.
Syntax logging on no logging on
Default Configuration
Logging is enabled.
Command Mode
Global Configuration mode
User Guidelines
The logging process controls the distribution of logging messages at various destinations, such as the logging buffer, logging file or syslog server. Logging on and off at these destinations can be individually configured using the logging buffered
, logging file
, and logging
Global Configuration mode commands. However, if the
logging on
command is disabled, no messages are sent to these destinations. Only the console receives messages.
Example
The following example enables logging error messages.
Console(config)# logging on
logging
The logging
Global Configuration mode command logs messages to a syslog server. Use the no
form of this command to delete the syslog server with the specified address from the list of syslogs.
Syntax logging
{ ip-address | hostname } [ port
port ] [ severity
level ] [ facility facility ] [ description
text ] no logging
{ ip-address | hostname }
Page 237
Allied Telesis
Command Line Interface User’s Guide
Parameters
• ip-address — IP address of the host to be used as a syslog server.
• hostname — Specifies the host name of the syslog server. (Range: 1-158 characters)
• port — Specifies the port number for syslog messages. (Range: 1 - 65535)
• level — Specifies the severity level of logged messages sent to the syslog servers. Possible values: emergencies, alerts
, critical
, errors, warnings
, notifications, informational and
debugging
.
• facility — Specifies the facility that is indicated in the message. Possible values: local0, local1, local2, local3, local4, local5, local 6, local7
.
• text — Syslog server description. (Range: 1-64 characters)
Default Configuration
The default port number is 514.
The default logging message level is informational
.
The default facility is local7.
Command Mode
Global Configuration mode
User Guidelines
Up to 8 syslog servers can be used.
If no specific severity level is specified, the global values apply to each server.
Example
The following example limits logged messages sent to the syslog server with IP address 10.1.1.1 to severity level critical
.
Console(config)# logging 10.1.1.1 severity critical
logging console
The logging console
Global Configuration mode command limits messages logged to the console based on severity. Use the no
form of this command to disable logging to the console.
Syntax logging console level no logging console
Parameters
• level — Specifies the severity level of logged messages displayed on the console. Possible values: emergencies, alerts
, critical
, errors, warnings
, notifications, informational, debugging.
Default Configuration
The default severity level is informational
.
Page 238
Not approved by Document Control. For review only.
Syslog Commands
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example limits logging messages displayed on the console to severity level errors
.
Console(config)# logging console errors
logging buffered
The logging buffered
Global Configuration mode command limits syslog messages displayed from an internal buffer based on severity. Use the no
form of this command to cancel using the buffer.
Syntax logging buffered level no logging buffered
Parameters
• level — Specifies the severity level of messages logged in the buffer. Possible values: emergencies, alerts
, critical
, errors, warnings
, notifications, informational, debugging.
Default Configuration
The default severity level is informational
.
Command Mode
Global Configuration mode
User Guidelines
All the syslog messages are logged to the internal buffer. This command limits the messages displayed to the user.
Example
The following example limits syslog messages displayed from an internal buffer based on severity level debugging
.
Console(config)# logging buffered debugging
logging buffered size
The logging buffered size
Global Configuration mode command changes the number of syslog messages stored in the internal buffer. Use the no
form of this command to return to the default configuration.
Page 239
Allied Telesis
Command Line Interface User’s Guide
Syntax logging buffered size number no logging buffered size
Parameters
• number — Specifies the maximum number of messages stored in the history table. (Range: 20 - 60)
Default Configuration
The default number of messages is 200.
Command Mode
Global Configuration mode
User Guidelines
This command takes effect only after Reset.
Example
The following example changes the number of syslog messages stored in the internal buffer to 300.
Console(config)# logging buffered size 300
clear logging
The clear logging
Privileged EXEC mode command clears messages from the internal logging buffer.
Syntax clear logging
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example clears messages from the internal logging buffer.
Console# clear logging
Clear logging buffer [confirm]
Page 240
Not approved by Document Control. For review only.
Syslog Commands
logging file
The logging file
Global Configuration mode command limits syslog messages sent to the logging file based on severity. Use the no
form of this command to cancel using the buffer.
Syntax logging file level no logging file
Parameters
• level — Specifies the severity level of syslog messages sent to the logging file. Possible values: emergencies, alerts
, critical
, errors, warnings
, notifications, informational and debugging.
Default Configuration
The default severity level is errors
.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example limits syslog messages sent to the logging file based on severity level alerts
.
Console(config)# logging file alerts
clear logging file
The clear logging file
Privileged EXEC mode command clears messages from the logging file.
Syntax clear logging file
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 241
Allied Telesis
Command Line Interface User’s Guide
Example
The following example clears messages from the logging file.
Console# clear logging file
Clear Logging File [confirm]
aaa logging
The aaa logging
Global Configuration mode command enables logging AAA login events. Use the no
form of this command to disable logging AAA login events.
Syntax aaa logging login no aaa logging login
Parameters
• login
— Indicates logging messages related to successful login events, unsuccessful login events and other login-related events
.
Default Configuration
Logging AAA login events is enabled.
Command Mode
Global Configuration mode
User Guidelines
Other types of AAA events are not subject to this command.
Example
The following example enables logging messages related to AAA login events.
Console(config)# aaa logging login
file-system logging
The file-system logging
Global Configuration mode command enables logging file system events. Use the no form of this command to disable logging file system events.
Syntax file-system logging copy no file-system logging copy file-system logging delete-rename no file-system logging delete-rename
Page 242
Not approved by Document Control. For review only.
Syslog Commands
Parameters
• copy
— Indicates logging messages related to file copy operations.
• delete-rename
— Indicates logging messages related to file deletion and renaming operations.
Default Configuration
Logging file system events is enabled.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables logging messages related to file copy operations.
Console(config)# file-system logging copy
management logging
The management logging
Global Configuration mode command enables logging management Access List
(ACL) events. Use the no
form of this command to disable logging management Access List events.
Syntax management logging deny no management logging deny
Parameters
• deny
— Indicates logging messages related to deny actions of management ACLs.
Default Configuration
Logging management ACL events is enabled.
Command Mode
Global Configuration mode
User Guidelines
Other types of management ACL events are not subject to this command.
Example
The following example enables logging messages related to deny actions of management ACLs.
Console(config)# management logging deny
Page 243
Allied Telesis
Command Line Interface User’s Guide
show logging
The show logging
Privileged EXEC mode command displays the state of logging and the syslog messages stored in the internal buffer.
Syntax show logging
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the state of logging and the syslog messages stored in the internal buffer
Console# show logging
Logging is enabled.
Console Logging: Level info. Console Messages: 223 Dropped.
Buffer Logging: Level info. Buffer Messages: 20 Logged, 6 Displayed, 20 Max.
File Logging: Level error. File Messages: 27 Logged, 1089 Dropped.
SysLog server 192.168.1.101 Port: 514. Logging: info. Messages: 216 Dropped.
3 messages were not logged.
Application filtering control
Application
-----------
AAA
File system
File system
Management ACL
Event
-----
Login
Copy
Delete-Rename
Deny
Status
------
Enabled
Enabled
Enabled
Enabled
Page 244
Not approved by Document Control. For review only.
Syslog Commands
29-Nov-2007 17:46:02 :%LINK-I-Up: 2/e16
29-Nov-2007 17:46:02 :%LINK-I-Up: Vlan 1
29-Nov-2007 17:45:59 :%LINK-W-Down: 3/e14
29-Nov-2007 17:45:59 :%LINK-W-Down: Vlan 1
29-Nov-2007 17:36:58 :%AAA-I-CONNECT: New http connection for user Admin, source
192.168.1.96 destination 192.168.1.25 ACCEPTED
29-Nov-2007 17:36:36 :%AAA-W-REJECT: New http connection for user manager, sourc e 192.168.1.96 destination 192.168.1.25 REJECTED console#
show logging file
The show logging file
Privileged EXEC mode command displays the state of logging and the syslog messages stored in the logging file.
Syntax show logging file
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 245
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the logging state and the syslog messages stored in the logging file
Console# show logging file
Logging is enabled.
Console Logging: Level info. Console Messages: 226 Dropped.
Buffer Logging: Level info. Buffer Messages: 20 Logged, 6 Displayed, 20 Max.
File Logging: Level error. File Messages: 27 Logged, 1092 Dropped.
SysLog server 192.168.1.101 Port: 514. Logging: info. Messages: 219 Dropped.
3 messages were not logged
Application filtering control
Application Event Status
-----------
AAA
File system
File system
Management ACL
-----
Login
Copy
Delete-Rename
Deny
------
Enabled
Enabled
Enabled
Enabled
29-Nov-2007 15:14:32 :%Box-E-STCK-EXCEP_HNDLR: Lost connection with unit 2 reaso n 0x20097. Unit will be rebooted.
show syslog-servers
The show syslog-servers
Privileged EXEC mode command displays the settings of the syslog servers.
Syntax show syslog-servers
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the settings of the syslog servers.
Console# show syslog-servers
Page 246
Not approved by Document Control. For review only.
Device Configuration
IP address Port
------------
192.180.2.27
192.180.2.28
----
514
514
Severity
-------------
Informational
Warning
Facility
-------local7 local7
Description
-----------
Syslog Commands
Page 247
Allied Telesis
Command Line Interface User’s Guide
Chapter 27.TACACS+ Commands
tacacs-server host
The tacacs-server host
Global Configuration mode command specifies a TACACS+ host. Use the no
form of this command to delete the specified name or address.
Syntax tacacs-server host { ip-address | hostname } [ single-connection
] [ port port-number ] [ timeout timeout ] [ key keystring ] [ source source ] [ priority priority ] no tacacs-server host { ip-address | hostname }
Parameters
• ip-address — IP address of the TACACS+ server.
• hostname — Host name of the TACACS+ server. (Range: 1 - 158 characters)
• single-connection
— Indicates a single-connection. Rather than have the device open and close a TCP connection to the daemon each time it must communicate, the single-connection option maintains a single open connection between the device and the daemon.
• port-number — Specifies a server port number. (Range: 0 - 65535)
• timeout — Specifies the timeout value in seconds. (Range: 1 - 30)
• key-string — Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon. To specify an empty string, enter "". (Range: 0 - 128 characters)
• source — Specifies the source IP address to use for the communication. 0.0.0.0 indicates a request to use the IP address of the outgoing IP interface.
• priority — Determines the order in which the TACACS+ servers are used, where 0 is the highest priority.
(Range: 0 - 65535)
Default Configuration
No TACACS+ host is specified.
If no port number is specified, default port number 49 is used.
If no host-specific timeout, key-string or source value is specified, the global value is used.
If no TACACS+ server priority is specified, default priority 0 is used.
Command Mode
Global Configuration mode
User Guidelines
Multiple tacacs-server host
commands can be used to specify multiple hosts.
Page 248
Not approved by Document Control. For review only.
TACACS+ Commands
Example
The following example specifies a TACACS+ host.
Console(config)# tacacs-server host 172.16.1.1
tacacs-server key
The
tacacs-server key
Global Configuration mode command sets the authentication encryption key used for all
TACACS+ communications between the device and the TACACS+ daemon. Use the no
form of this command to disable the key.
Syntax tacacs-server key key-string no tacacs-server key
Parameters
• key-string — Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon.
(Range: 0-128 characters)
Default Configuration
Empty string.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the authentication encryption key.
Console(config)# tacacs-server key ati-s
tacacs-server timeout
The tacacs-server timeout
Global Configuration mode command sets the interval during which the device waits for a TACACS+ server to reply. Use the no
form of this command to return to the default configuration.
Syntax tacacs-server timeout timeout no tacacs-server timeout
Parameters
• timeout — Specifies the timeout value in seconds. (Range: 1 - 30)
Page 249
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
5 seconds
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the timeout value to 30.
Console(config)# tacacs-server timeout 30
tacacs-server source-ip
The tacacs-server source-ip
Global Configuration mode command configures the source IP address to be used for communication with TACACS+ servers. Use the no
form of this command to return to the default configuration.
Syntax tacacs-server source-ip source no tacacs-server source-ip source
Parameters
• source — Specifies the source IP address.
Default Configuration
The source IP address is the address of the outgoing IP interface.
Command Mode
Global Configuration mode
User Guidelines
N/A
Example
The following example specifies the source IP address.
Console(config)# tacacs-server source-ip 172.16.8.1
show tacacs
The show tacacs
Privileged EXEC mode command displays configuration and statistical information about a
TACACS+ server.
Page 250
Not approved by Document Control. For review only.
TACACS+ Commands
Syntax show tacacs
[ ip-address ]
Parameters
• ip-address — Name or IP address of the TACACS+ server.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays configuration and statistical information about a TACACS+ server.
Console# show tacacs
Device Configuration
--------------------
IP address
----------
172.16.1.1
Status
------
Connected
Port Single Connection
--------------------
49 No
TimeOut
-------
Global
Source IP
---------
Global
Priority
--------
1
Global values
-------------
TimeOut: 3
Device Configuration
---------------------
Source IP: 172.16.8.1
Page 251
Allied Telesis
Command Line Interface User’s Guide
Chapter 28.System Management Commands
ping
The ping
User EXEC mode command sends ICMP echo request packets to another node on the network.
Syntax ping
{ ip-address | hostname } [ size packet_size ] [ count packet_count ] [ timeout time_out ]
Parameters
• ip-address — IP address to ping.
• hostname — Host name to ping. (Range: 1-158 characters)
• packet_size — Number of bytes in a packet. The actual packet size is eight bytes larger than the specified size specified because the device adds header information. (Range: 56 - 1472 bytes)
• packet_count — Number of packets to send. If 0 is entered, it pings until stopped. (Range: 0-65535 packets)
• time_out — Timeout in milliseconds to wait for each reply. (Range: 50 - 65535 milliseconds)
Default Configuration
Default packet size is 56 bytes.
Default number of packets to send is 4.
Default timeout value is 2000 milliseconds.
Command Mode
User EXEC mode
User Guidelines
•
The hostname must be a fully qualified DNS name. A fully qualified DNS name has a period at the end.
•
Press
Esc to stop pinging.
•
Following are examples of unsuccessful pinging:
–
Destination does not respond. If the host does not respond, a “no answer from host” appears in ten seconds.
–
Destination unreachable. The gateway for this destination indicates that the destination is unreachable.
–
Network or host unreachable. The device found no corresponding entry in the route table.
Page 252
Not approved by Document Control. For review only.
System Management Commands
Example
The following example displays pinging results:
Console> ping 10.1.1.1
Pinging 10.1.1.1 with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
----10.1.1.1 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11
Console> ping yahoo.com.
Pinging yahoo.com 66.218.71.198 with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
----10.1.1.1 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11
A sample of this list follows. Note that the Ctrl-shift-6 sequence appears as ^^ on the screen.
Console> ‘Ctrl-shift-6’ ?
[Special telnet escape help]
^^ B sends telnet BREAK
^^ C sends telnet IP
^^ H sends telnet EC
^^ O sends telnet AO
^^ T sends telnet AYT
^^ U sends telnet EL
Ctrl-shift-6 x suspends the session (return to system command prompt)
Several concurrent Telnet sessions can be opened and switched. To open a subsequent session, the current connection has to be suspended by pressing the escape sequence keys (Ctrl-shift-6) and x to return to the system command prompt. Then open a new connection with the
Telnet
User EXEC mode command.
Page 253
Allied Telesis
Command Line Interface User’s Guide
reload
The reload
Privileged EXEC mode command reloads the operating system.
Syntax reload
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
Caution should be exercised when resetting the device, to ensure that no other activity is being performed. In particular, the user should verify that no configuration files are being downloaded at the time of reset.
Example
The following example reloads the operating system.
Console# reload
This command will reset the whole system and disconnect your current session. Do you want to continue (y/n) [n]?
resume
Syntax resume
[ connection ]
Default Configuration
The default connection number is that of the most recent connection.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following command switches to open Telnet session number 1.
Console> resume 1
Page 254
Not approved by Document Control. For review only.
System Management Commands
hostname
The hostname
Global Configuration mode command specifies or modifies the device host name. Use the no
form of this command to remove the existing host name.
Syntax hostname name no hostname
Parameters
• name — The host name. of the device. (Range: 1-158 characters)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the device host name.
Console(config)# hostname Marvell
Marvell(config)#
stack master
Note
This command is operational in the AT-8000S/24, AT-8000S/24POE, AT-8000S/48 and AT-8000S/
48POE devices.
The stack master
Global Configuration mode command enables forcing the selection of a stack master. Use the no form of this command to return to the default configuration.
Syntax stack master unit unit no stack master
Parameters
• unit— Unit number of the new master (Range: 1-2)
Page 255
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
Disables forcing the selection of a stack master.
Command Mode
Global Configuration mode
User Guidelines
This command is not relevant to standalone devices.
The following algorithm is used to select a unit as the master:
•
If only one master-enabled unit is in the stack (1 or 2), it becomes the master.
•
If a unit configured as a forced master, it becomes the master.
If a forced master unit is removed from a stack and placed in a different stack with another forced master unit, both are considered to be forced, and the election criteria continue as follows:
•
The unit with the longer up-time is elected master. Units are considered to have the same up-time if they were powered up within ten minutes of each other.
•
If both forced master units have the same up-time, Unit 1 is elected.
Example
The following example selects Unit 2 as the stack master.
Console(config)# stack master unit 2
stack reload
Note
This command is operational in the AT-8000S/24, AT-8000S/24POE, AT-8000S/48 and AT-8000S/
48POE devices.
The stack reload
Privileged EXEC mode command reloads stack members.
Syntax stack reload [ unit unit ]
Parameters
• unit— Number of the unit to be reloaded (Range: 1-6)
Default Configuration
All units are reloaded.
Command Modes
Privileged EXEC mode
Page 256
Not approved by Document Control. For review only.
System Management Commands
User Guidelines
This command is not relevant to standalone devices.
If no unit is specified, all units are reloaded.
Example
The following example reloads Unit 2 of the stack.
Console(config)# stack reload unit 2
stack change unit-id
Note
This command is operational in the AT-8000S/24, AT-8000S/24POE, AT-8000S/48 and AT-8000S/
48POE devices.
The stack change unit-id
Global Configuration mode command is used to change the Unit ID of a specific unit.
Syntax stack change unit-id unit-number to new-unit-number
Parameters
• unit-number— Specifies the current number of the unit. (Range: 1-6)
• new-unit-number— Specifies the new number of the unit. (Range: 1-6)
Default Configuration
The automatically configured unit number is assigned.
Command Modes
Global Configuration mode
User Guidelines
This command is not relevant to standalone devices.
The command takes effect only after resetting the device.
Example
This example changes Unit Number 6 to Unit Number 5. The command takes effect only after resetting the device.
Console# config
Console(config)# stack change unit-id 6 to 5
Page 257
Allied Telesis
Command Line Interface User’s Guide
show stack
Note
This command is operational in the AT-8000S/24, AT-8000S/24POE, AT-8000S/48 and AT-8000S/
48POE devices.
The show stack
User EXEC mode command displays information about the status of a stack.
Syntax show stack
[ unit unit ]
Parameters
• unit— Specifies the number of the unit. (Range: 1-6)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
This command is not relevant to standalone devices.
Example
The following example displays stack status.
1
2
3
4
1
2
Console> show stack
Unit MAC Address
--------------------
10:20:30:40:50:60
00:00:00:00:48:05
00:00:f4:48:01:00
00:15:77:37:33:e0
5
6
00:30:00:00:30:00
00:00:f4:48:0a:00
Topology is Ring
Unit Unit Id After Reset
-------------
----
1
2
Software Master
-------- -------v1.1.0.29
Forced 6 v1.1.0.29
Enabled 1
Uplink
-----v1.1.0.29
Disabled v1.1.0.29
Disabled v1.1.0.29
Disabled v1.1.0.29
Disabled
2
3
4
5
6
1
4
5
2
3
Downlink Status
------------master backup slave slave slave slave
Page 258
Not approved by Document Control. For review only.
System Management Commands
3
4
5
6
5
6
3
4 console# console# show stack 1
Unit: 1
MAC address: 10:20:30:40:50:60
Master: Forced.
Product: AT-8000S/48. Software: v1.1.0.29
Uplink unit: 6 Downlink unit: 2.
Status: master
Active image: image2.
Selected for next boot: image2.
Topology is Ring
Unit Num After Reset: 1 console#
show users
The show users
User EXEC mode command displays information about the active users.
Syntax show users
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays information about the active users.
Console show users
Username
----------
Protocol
-----------
Location
------------
Page 259
Allied Telesis
Command Line Interface User’s Guide manager
Admin
Bob bill console#
Serial
HTTP
Telnet
Telnet
0.0.0
192.168.1.960.
192.168.1.120
192.168.1.101
show sessions
The show sessions
User EXEC mode command lists open Telnet sessions.
Syntax show sessions
Default Configuration
There is no default configuration for this command.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example lists open Telnet sessions.
Console> show sessions
1
2
Connection
----------
Host
-------------
Remote device
172.16.1.2
Address
----------
172.16.1.1
172.16.1.2
The following table describes significant fields shown above.
Field
Connection
Host
Address
Port
Byte
Port
-----
23
23
Byte
----
89
8
Description
Connection number.
Remote host to which the device is connected through a Telnet session.
IP address of the remote host.
Telnet TCP port number
Number of unread bytes for the user to see on the connection.
Page 260
Not approved by Document Control. For review only.
System Management Commands
show system
The show system
User EXEC mode command displays system information.
Syntax show system
[ unit unit ]
Parameters
• unit— Specifies the number of the unit. (Range: 1-6)
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the system information .
Console# show system
2
3
Unit
----
1
Type
--------------
AT 8000 S/48
AT 8000 S/24
AT 8000 S/24 POE
Unit
----
1
2
3
Serial number
----------
1
2
3t: 1
Up time
--------------
00,03:38:12
00,03:34:44
00,03:36:34
Page 261
Allied Telesis
Command Line Interface User’s Guide
show system id
The show system id
Privileged EXEC mode command displays the system identity information.
Syntax show system id
[ unit unit ]
Parameters
• unit unit — Unit number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the system information
Console> show system id
Service Tag: 89788978
Serial number: 8936589782
Asset tag: 7843678957
1
2
Unit
-------
Serial number
--------------
8936589782
3216523877
show version
The show version
User EXEC mode command displays system version information.
Syntax show version
[ unit unit ]
Parameters
• unit— Specifies the number of the unit. (Range: 1-6)
Default Configuration
This command has no default configuration.
Page 262
Not approved by Document Control. For review only.
System Management Commands
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays system version information (only for demonstration purposes).
4
5
2
3
Console> show version
Unit SW version
----
1
---------v1.1.0.29
6 console# v1.1.0.29
v1.1.0.29
v1.1.0.29
v1.1.0.29
v1.1.0.29
Boot version HW version
---------------------
1.0.1.06 01.00.00
1.0.1.06
1.0.1.06
1.0.1.06
1.0.1.06
1.0.1.06
01.00.00
01.00.00
01.00.00
01.00.00
01.00.00
set system
The set system
Priviledged EXEC mode command activates/deactivates features.
Syntax set system qos {active | inactive} policy-based-vlans {active | inactive}
Parameters
• qos active
— Activate QoS.
• qos inactive
— Deactivate QoS.
• policy-based-vlans active
— Activate Policy based VLANs.
• policy-based-vlans inactive
— Deactivate Policy based VLANs.
Default Configuration
This command has no default configuration.
Command Mode
Priviledged EXEC mode
User Guidelines
After executing the command, the startup-config is deleted and the device is rebooted. It is highly recommended to backup the startup-config before executing this command.
Page 263
Allied Telesis
Command Line Interface User’s Guide
Example
The following example deactivate features.
Console> set system qos inactive policy-based-vlans active
Page 264
Not approved by Document Control. For review only.
Chapter 29.User Interface Commands
enable
The enable
User EXEC mode command enters the Privileged EXEC mode.
Syntax enable
[ privilege-level ]
Parameters
• privilege-level — Privilege level to enter the system. (Range: 1 - 15)
Default Configuration
The default privilege level is 15.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enters Privileged EXEC mode:
Console> enable enter password:
Console#
disable
The disable
Privileged EXEC mode command returns to the User EXEC mode.
Syntax disable
[ privilege-level ]
Parameters
• privilege-level — Privilege level to enter the system. (Range: 1 - 15)
Default Configuration
The default privilege level is 1.
User Interface Commands
Page 265
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example returns to Users EXEC mode.
Console# disable
Console>
login
The login
User EXEC mode command changes a login username.
Syntax login
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enters Privileged EXEC mode and logs in with username admin
.
Console> login
User Name:admin
Password:*****
Console#
configure
The configure
Privileged EXEC mode command enters the Global Configuration mode.
Syntax configure
Default Configuration
This command has no default configuration.
Page 266
Not approved by Document Control. For review only.
User Interface Commands
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enters Global Configuration mode.
Console# configure
Console(config)#
exit (Configuration)
The exit
command exits any configuration mode to the next highest mode in the CLI mode hierarchy.
Syntax exit
Default Configuration
This command has no default configuration.
Command Mode
All configuration modes
User Guidelines
There are no user guidelines for this command.
Example
The following example changes the configuration mode from Interface Configuration mode to Privileged EXEC mode.
Console(config-if)# exit
Console(config)# exit
Console#
exit
The exit
Privileged/User EXEC mode command closes an active terminal session by logging off the device.
Syntax exit
Default Configuration
This command has no default configuration.
Page 267
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Privileged and User EXEC modes
User Guidelines
There are no user guidelines for this command.
Example
The following example closes an active terminal session.
Console> exit
end
The end
command ends the current configuration session and returns to the Privileged EXEC mode.
Syntax end
Default Configuration
This command has no default configuration.
Command Mode
All configuration modes.
User Guidelines
There are no user guidelines for this command.
Example
The following example changes from Global Configuration mode to Privileged EXEC mode .
Console(config)# end
Console#
help
The help
command displays a brief description of the help system.
Syntax help
Default Configuration
This command has no default configuration.
Command Mode
All command modes
Page 268
Not approved by Document Control. For review only.
User Interface Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example describes the help system .
Console# help
Help may be requested at any point in a command by entering a question mark '?'. If nothing matches the currently entered incomplete command, the help list is empty. This indicates that for a query at this point, there is no command matching the current input. If the request is within a command, enter backspace and erase the entered characters to a point where the request results in a display.
Help is provided when:
1. There is a valid command and a help request is made for entering a parameter or argument
(e.g. 'show ?'). All possible parameters or arguments for the entered command are displayed.
2. An abbreviated argument is entered and a help request is made for arguments matching the input (e.g. 'show pr?').
terminal datadump
The terminal data-dump
User EXEC mode command enables dumping all the output of a show command without prompting. Use the no
form of this command to disable dumping.
Syntax terminal datadump no terminal datadump
Default Configuration
Dumping is disabled.
Command Mode
User EXEC mode
User Guidelines
By default, a
More
prompt is displayed when the output contains more lines than can be displayed on the screen.
Pressing the
Enter
key displays the next line; pressing the Spacebar displays the next screen of output. The datadump command enables dumping all output immediately after entering the show command.
This command is relevant only for the current session.
Example
This example dumps all output immediately after entering a show command.
Console> terminal datadump
Page 269
Allied Telesis
Command Line Interface User’s Guide
show history
The show history
User EXEC mode command lists the commands entered in the current session.
Syntax show history
Default Configuration
This command has no default configuration.
Command Mode
User EXEC mode
User Guidelines
The buffer includes executed and unexecuted commands.
Commands are listed from the first to the most recent command.
The buffer remains unchanged when entering into and returning from configuration modes.
Example
The following example displays all the commands entered while in the current Privileged EXEC mode.
Console# show version
SW version 3.131 (date 23-Jul-2004 time 17:34:19)
HW version 1.0.0
Console# show clock
15:29:03 Jun 17 2004
Console# show history show version show clock show history
3 commands were logged (buffer size is 10)
show privilege
The show privilege
Privileged/User EXEC mode command displays the current privilege level.
Syntax show privilege
Default Configuration
This command has no default configuration.
Command Mode
Privileged and User EXEC modes
Page 270
Not approved by Document Control. For review only.
User Interface Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the current privilege level for the Privileged EXEC mode.
Console# show privilege
Current privilege level is 15
Page 271
Allied Telesis
Command Line Interface User’s Guide
Chapter 30.VLAN Commands
vlan database
The vlan database
Global Configuration mode command enters the VLAN Configuration mode.
Syntax vlan database
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enters the VLAN database mode.
Console(config)# vlan database
Console(config-vlan)#
vlan
The vlan
VLAN Configuration mode command creates a VLAN. Use the no
form of this command to delete a
VLAN.
Syntax vlan vlan-range no vlan vlan-range
Parameters
• vlan-range — Specifies a list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces; a hyphen designates a range of IDs.
Default Configuration
This command has no default configuration.
Command Mode
VLAN Configuration mode
Page 272
Not approved by Document Control. For review only.
VLAN Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example VLAN number 1972 is created.
console(config)# vlan database console(config-vlan)# vlan 1972 console(config-vlan)#
default-vlan vlan
The default-vlan vlan
VLAN Configuration mode command defines the default VLAN. Use the no
form of this command to return to default.
Syntax default-vlan vlan
vlan-id no default-vlan vlan
Parameters
• vlan-id — VLAN ID of the default VLAN
Default Configuration
1
Command Mode
VLAN Configuration mode
User Guidelines
There are no user guidelines for this command.
Note
After running the command, the device must be reset.
Example console(config-vlan)# default-vlan vlan 1 console(config-vlan)#
interface vlan
The interface vlan
Global Configuration mode command enters the Interface Configuration (VLAN) mode.
Syntax interface vlan vlan-id
Page 273
Allied Telesis
Command Line Interface User’s Guide
Parameters
• vlan-id — Specifies an existing VLAN ID.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
In case the VLAN doesn't exist (‘ghost VLAN’), only partial list of the commands are available under the interface
VLAN context.
The commands supported for non-existant VLANs are:
1) IGMP snooping control
2) Bridge Multicast configuration
Example
In the following example, for VLAN 1, the address is 131.108.1.27 and the subnet mask is 255.255.255.0: console(config)# interface vlan 1 console(config-if)# ip address 131.108.1.27 255.255.255.0
interface range vlan
The interface range vlan
Global Configuration mode command enables simultaneously configuring multiple
VLANs.
Syntax interface range vlan
{ vlan-range | all
}
Parameters
• vlan-range — Specifies a list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces; a hyphen designates a range of IDs.
• all
— All existing static VLANs.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Commands under the interface range context are executed independently on each interface in the range. If the command returns an error on one of the interfaces, an error message is displayed and execution of the command continues on the other interfaces.
Page 274
Not approved by Document Control. For review only.
VLAN Commands
Example
The following example groups VLANs 221, 228 and 889 to receive the same command.
Console(config)# interface range vlan 221-228,889
Console(config-if)#
name
The name
Interface Configuration mode command adds a name to a VLAN. Use the no
form of this command to remove the VLAN name.
Syntax name string no name
Parameters
• string — Unique name to be associated with this VLAN. (Range: 1-32 characters)
Default Configuration
No name is defined.
Command Mode
Interface Configuration (VLAN) mode. Cannot be configured for a range of interfaces (range context).
User Guidelines
There are no user guidelines for this command.
Example
The following example gives VLAN number 19 the name
Marketing
.
Console(config)# interface vlan 19
Console(config-if)# name Marketing
switchport protected
The switchport protected
Interface Configuration mode command enables Private VLAN Edge, by overriding the
FDB decision, and sends all Unicast, Multicast and Broadcast traffic to an uplink port. Use the no
form of this command to disable overriding the FDB decisiond.
Syntax switchport protected
{ ethernet port | port-channel port-channel-number } no switchport protected
Parameters
• port — Specifies the uplink Ethernet port.
• port-channel-number — Specifies the uplink port-channel.
Page 275
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
Switchport protected is disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
Private VLAN Edge (PVE) supports private communication by isolating PVE-defined ports and ensuring that all
Unicast, Broadcast and Multicast traffic from these ports is only forwarded to uplink port(s).
PVE requires only one VLAN on each device, but not on every port; this reduces the number of VLANs required by the device. Private VLANs and the default VLAN function simultaneously in the same device.
The uplink must be a GE port.
Example
This example configures ethernet port 1/e8 as a protected port, so that all traffic is sent to its uplink (ethernet port
1/e9).
Console(config)# interface ethernet 1/e8
Console(config-if)# switchport forbidden vlan add 234-256
Console(config-if)# exit
Console(config)# interface ethernet 1/e9
Console(config-if)# switchport protected ethernet 1/g1
switchport mode
The switchport mode
Interface Configuration mode command configures the VLAN membership mode of a port.
Use the no
form of this command to return to the default configuration.
Syntax switchport mode
{ access
| trunk | general
} no switchport mode
Parameters
• access
— Indicates an untagged layer 2 VLAN port.
• trunk
— Indicates a trunking layer 2 VLAN port.
• general
— Indicates a full 802-1q supported VLAN port.
Default Configuration
All ports are in access mode, and belong to the default VLAN (whose VID=1).
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines.
Page 276
Not approved by Document Control. For review only.
Example
The following example configures Ethernet port 1/e16 as an untagged layer 2 VLAN port.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport mode access
VLAN Commands
Page 277
Allied Telesis
Command Line Interface User’s Guide
switchport access vlan
The switchport access vlan
Interface Configuration mode command configures the VLAN ID when the interface is in access mode. Use the no
form of this command to return to the default configuration.
Syntax switchport access vlan
{ vlan-id } no switchport access vlan
Parameters
• vlan-id — Specifies the ID of the VLAN to which the port is configured.
Default Configuration
All ports belong to VLAN 1.
Command Mode
Interface configuration (Ethernet, port-channel) mode
User Guidelines
The command automatically removes the port from the previous VLAN and adds it to the new VLAN.
Example
The following example configures a VLAN ID of 23 to the untagged layer 2 VLAN Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport access vlan 23
switchport trunk allowed vlan
The switchport trunk allowed vlan
Interface Configuration mode command adds or removes VLANs to or from a trunk port.
Syntax switchport trunk allowed vlan
{ add vlan-list | remove vlan-list }
Parameters
• add vlan-list — List of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
• remove
vlan-list — List of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
Default Configuration
This command has no default configuration.
Page 278
Not approved by Document Control. For review only.
VLAN Commands
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example adds VLANs 1, 2, 5 to 6 to the allowed list of Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 console(config-if)# switchport trunk allowed vlan add 1 2,5-6
switchport trunk native vlan
The switchport trunk native vlan
Interface Configuration mode command defines the native VLAN when the interface is in trunk mode. Use the no
form of this command to return to the default configuration.
Syntax switchport trunk native vlan vlan-id no switchport trunk native vlan
Parameters
• vlan-id — Specifies the ID of the native VLAN.
Default Configuration
VID=1.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The command adds the port as a member in the VLAN. If the port is already a member in the VLAN (not as a native), it should be first removed from the VLAN.
Example
The following example configures VLAN number 123 as the native VLAN when Ethernet port 1/e16 is in trunk mode.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport trunk native vlan 123
switchport general allowed vlan
The switchport general allowed vlan
Interface Configuration mode command adds or removes VLANs from a general port.
Page 279
Allied Telesis
Command Line Interface User’s Guide
Syntax switchport general allowed vlan add vlan-list [ tagged
| untagged
] switchport general allowed vlan remove vlan-list
Parameters
• add vlan-list — Specifies the list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
• remove
vlan-list — Specifies the list of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
• tagged
— Indicates that the port transmits tagged packets for the VLANs.
• untagged
— Indicates that the port transmits untagged packets for the VLANs.
Default Configuration
If the port is added to a VLAN without specifying tagged or untagged, the default setting is tagged.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
This command enables changing the egress rule (e.g., from tagged to untagged) without first removing the VLAN from the list.
Example
The following example adds VLANs 2, 5, and 6 to the allowed list of Ethernet port 1/e16 .
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport general allowed vlan add 2,5-6 tagged
switchport general pvid
The switchport general pvid
Interface Configuration mode command configures the PVID when the interface is in general mode. Use the no
form of this command to return to the default configuration.
Syntax switchport general pvid vlan-id no switchport general pvid
Parameters
• vlan-id — Specifies the PVID (Port VLAN ID).
Default Configuration
If the default VLAN is enabled, PVID = 1. Otherwise, PVID=4095.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Page 280
Not approved by Document Control. For review only.
VLAN Commands
User Guidelines
There are no user guidelines for this command.
Example
The following example configures the PVID for Ethernet port 1/e16, when the interface is in general mode.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport general pvid 234
switchport general ingress-filtering disable
The switchport general ingress-filtering disable
Interface Configuration mode command disables the ingress filtering of a port. Use the no
form of this command to enable the ingress filtering of a port.
Syntax switchport general ingress-filtering disable no switchport general ingress-filtering disable
Parameters
•
This command has no keywords or arguments.
Default Configuration
Ingress filtering is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example disables the ingress filtering of a port.
Console(config)# switchport general ingress-filtering disable
switchport general acceptable-frame-type tagged-only
The switchport general acceptable-frame-type tagged-only
Interface Configuration mode command discards untagged frames at ingress. Use the no
form of this command to return to the default configuration.
Syntax switchport general acceptable-frame-type tagged-only no switchport general acceptable-frame-type tagged-only
Page 281
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
All frame types are accepted at ingress.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example configures Ethernet port 1/e16 to discard untagged frames at ingress.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport general acceptable-frame-type tagged-only
switchport general map macs-group vlan
The switchport general map macs-group vlan interface configuration mode command sets a mac-based classification rule. Use the no
form of this command to delete a classification.
Syntax switchport general map macs-group group vlan vlan-id
no switchport general map macs-group group
Default Configuration
This command has no default configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
MAC based VLAN rules cannot contain overlapping ranges on the same interface.
The priority between VLAN classification rules is:
•
MAC based VLAN (Best match between the rules)
•
PVID
The interface must be in General Mode to configure a MAC-based classification rule.
Page 282
Not approved by Document Control. For review only.
VLAN Commands
Example
The following example sets a mac-based classification rule.
console(config)# vlan database console(config-vlan)# map mac 00:08:78:32:98:78 9 macs-group 1 interface ethernet e17 console(config-vlan)# exit console(config)# interface ethernet 1/e17 console(config-if)# switchport mode general console(config-if)# switchport general map macs-group 1 vlan 2
map mac macs-group
The map mac macs-group
VLAN Configuration mode command maps a MAC address or a range of MAC addresses to a group of MAC addresses. Use the no form of this command to delete a map.
Syntax map mac mac-address
{prefix-mask | host}
macs-group group no map mac mac-address
{prefix-mask | host}
• mac-address — Specifies the MAC address to be entered to the group.
• prefix-mask — Specifies the Mask bits. The format is the MAC address format.
• host
— Specifies all 1’s mask.
• group — Specifies the group number. (Range: 1-2147483647)
Default Configuration
This command has no default configuration.
Command Mode
VLAN Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example maps a MAC address or a range of MAC addresses to a group of MAC addresses.
console(config)# vlan database console(config-vlan)# map mac 00:08:78:32:98:78 9 macs-group 1 interface ethernet e17
show vlan macs-group
The show vlan macs-group
privileged EXEC command displays MAC group information.
Syntax show vlan macs-group
Page 283
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays macs-groups information
Console# show vlan macs-groups
MAC Address Mask Group ID
-------------- -------------- --------
0060.704C.73FF FFFF.FFFF.0000 1
0060.704D.73FF FFFF.FFFF.0000 1
switchport forbidden vlan
The switchport forbidden vlan
Interface Configuration mode command forbids adding specific VLANs to a port.
Use the no
form of this command to return to the default configuration.
Syntax switchport forbidden vlan
{ add vlan-list | remove vlan-list }
Parameters
• add vlan-list — Specifies the list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
• remove
vlan-list — Specifies the list of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs.
Default Configuration
All VLANs are allowed.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
This command can be used to prevent GVRP from automatically making the specified VLANs active on the selected ports.
Page 284
Not approved by Document Control. For review only.
VLAN Commands
Example
The following example forbids adding VLAN IDs 234 to 256 to Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16
Console(config-if)# switchport forbidden vlan add 234-256
ip internal-usage-vlan
The ip internal-usage-vlan
Interface Configuration mode command reserves a VLAN as the internal usage
VLAN of an interface. Use the no
form of this command to return to the default configuration.
Syntax ip internal-usage-vlan vlan-id no ip internal-usage-vlan
Parameters
• vlan-id — Specifies the ID of the internal usage VLAN.
Default Configuration
The software reserves a VLAN as the internal usage VLAN of an interface.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
An internal usage VLAN is required when an IP interface is configured on an Ethernet port or port-channel.
This command enables the user to configure the internal usage VLAN of a port. If an internal usage VLAN is not configured and the user wants to configure an IP interface, an unused VLAN is selected by the software.
If the software selected a VLAN for internal use and the user wants to use that VLAN as a static or dynamic VLAN, the user should do one of the following:
•
Remove the IP interface.
•
Create the VLAN and recreate the IP interface.
•
Use this command to explicitly configure a different VLAN as the internal usage VLAN.
Example
The following example reserves an unused VLAN as the internal usage VLAN of ethernet port 1/e8.
Console# config
Console(config)# interface ethernet 1/e8
Console(config-if)# ip internal-usage-vlan
Page 285
Allied Telesis
Command Line Interface User’s Guide
show vlan
The show vlan
Privileged EXEC mode command displays VLAN information.
Syntax show vlan
[ tag vlan-id |
name vlan-name
]
Parameters
• vlan-id — specifies a VLAN ID
• vlan-name — Specifies a VLAN name string. (Range: 1 - 32 characters)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays all VLAN information.
Console# show vlan
10
11
20
21
VLAN
----
1
30
31
91
3978
Name
------default
VLAN0010
VLAN0011
VLAN0020
VLAN0021
VLAN0030
VLAN0031
VLAN0011
Guest VLAN
Ports
--------
1/e1-e2, 2/e1-e4
1/e3-e4
1/e1-e2
1/e3-e4
Type
---other dynamic static static static static static static guest
Authorization
-------------
Required
Required
Required
Required
Required
Required
Required
Not Required
-
1/e1-e2
1/e17
show vlan internal usage
The show vlan internal usage
Privileged EXEC mode command displays a list of VLANs used internally by the device.
Syntax show vlan internal usage
Page 286
Not approved by Document Control. For review only.
VLAN Commands
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays VLANs used internally by the device.
Console# show vlan internal usage
VLAN
----
1007
1008
1009
Usage
---------
Eth 1/e21
Eth 1/e22
Eth 1/e23
IP address
----------
Active
Inactive
Active
Reserved
--------
No
Yes
Yes
show interfaces switchport
The show interfaces switchport
Privileged EXEC mode command displays the switchport configuration.
Syntax show interfaces switchport {ethernet interface | port-channel port-channel-number }
Parameters
• interface — A valid Ethernet port number.
• port-channel-number — A valid port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 287
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the switchport configuration for Ethernet port 1/e1.
Console# show interface switchport ethernet 1/e1
Port 1/e1:
VLAN Membership mode: General
Operating parameters:
PVID: 1 (default)
Ingress Filtering: Enabled
Acceptable Frame Type: All
GVRP status: Enabled
Protected: Enabled, Uplink is 1/e9.
1
8
11
19
72
Port 1/e1 is member in:
Vlan
----
Name
------default
VLAN008
VLAN011
IPv6 VLAN
VLAN0072
Static configuration:
PVID: 1 (default)
Ingress Filtering: Enabled
Acceptable Frame Type: All
Egress rule
----------untagged tagged tagged untagged untagged
1
11
19
72
Port 1/e1 is statically configured to:
Vlan
----
Name
-------
Egress rule
----------default
VLAN011
IPv6 VLAN
VLAN0072 untagged tagged untagged untagged
Forbidden VLANS:
VLAN
----
Name
----
Type
-------
System
Dynamic
Static
Static
Static
Page 288
Not approved by Document Control. For review only.
73 out
Console show interface switchport ethernet 1/e2
Port 1/e2:
VLAN Membership mode: General
Operating parameters:
PVID: 4095 (discard vlan)
Ingress Filtering: Enabled
Acceptable Frame Type: All
Port 1/e1 is member in:
Vlan
----
91
Name
------------
IP Telephony
Egress rule
----------tagged
Static configuration:
PVID: 8
Ingress Filtering: Disabled
Acceptable Frame Type: All
Port 1/e2 is statically configured to:
Vlan
----
Name
------------
Egress rule
-----------
8
91
VLAN0072
IP Telephony untagged tagged
Forbidden VLANS:
VLAN
----
73
Name
---out
Port 2/e19
Static configuration:
PVID: 2922
Ingress Filtering: Enabled
Type
------
Static
Page 289
VLAN Commands
Allied Telesis
Command Line Interface User’s Guide
Acceptable Frame Type: Untagged
GVRP status: Disabled
Page 290
Not approved by Document Control. For review only.
Web Server Commands
Chapter 31.Web Server Commands
ip http server
The ip http server
Global Configuration mode command enables configuring the device from a browser. Use the no
form of this command to disable this function.
Syntax ip http server no ip http server
Default Configuration
HTTP server is enabled.
Command Mode
Global Configuration mode
User Guidelines
Only a user with access level 15 can use the Web server.
Example
The following example enables configuring the device from a browser.
Console(config)# ip http server
ip http port
The ip http port
Global Configuration mode command specifies the TCP port to be used by the Web browser interface. Use the no
form of this command to return to the default configuration.
Syntax ip http port port-number no ip http port
Parameters
• port-number — Port number for use by the HTTP server. (Range: 0 - 65535)
Default Configuration
The default port number is 80.
Command Mode
Global Configuration mode
Page 291
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
Use the crypto certificate generate
Global Configuration mode command to generate an HTTPS certificate.
Specifying 0 as the port number effectively disables HTTP access to the device.
Example
The following example configures the http port number to 100.
Console(config)# ip http port 100
ip http exec-timeout
The ip http port
Global Configuration mode command specifies the TCP port to be used by the Web browser interface. Use the no
form of this command to return to the default configuration.
Syntax ip http exec-timeout minutes [ seconds ] no ip http exec-timeout
Parameters
• minutes — Integer that specifies the number of minutes.
• seconds — Additional time intervals in seconds.
Default Configuration
The default is 10 minutes.
Command Mode
Global Configuration mode
User Guidelines
This command also configures the exec-timeout for HTTPS in case the HTTPS timeout was not set.
To specify no timeout, enter the ip https exec-timeout 0 0 command.
ip https server
The ip https server
Global Configuration mode command enables configuring the device from a secured browser. Use the no
form of this command to return to the default configuration.
Syntax ip https server no ip https server
Default Configuration
Disabled.
Page 292
Not approved by Document Control. For review only.
Web Server Commands
Command Mode
Global Configuration mode
User Guidelines
Use the crypto certificate generate
Global Configuration mode command to generate an HTTPS certificate.
Example
The following example enables configuring the device from a secured browser.
Console(config)# ip https server
ip https port
The ip https port
Global Configuration mode command specifies the TCP port used by the server to configure the device through the Web browser. Use the no
form of this command to return to the default configuration.
Syntax ip https port port-number no ip https port
Parameters
• port-number — Port number to be used by the HTTP server. (Range: 0 - 65535)
Default Configuration
The default port number is 443.
Command Mode
Global Configuration mode
User Guidelines
Specifying 0 as the port number effectively disables HTTP access to the device.
Example
The following example configures the https port number to 100.
Console(config)# ip https port 100
ip https exec-timeout
iThe ip https exec-timeout
Global Configuration mode command sets the interval for the system wait for user input in https sessions, before automatic logoff. Use the no
form of this command to restore the default configuration.
Syntax ip https exec-timeout minutes [ seconds ] no ip https exec-timeout
Page 293
Allied Telesis
Command Line Interface User’s Guide
Parameters
• minutes — Integer that specifies the number of minutes. (Range: 1 - 65535)
• seconds — Additional time intervals in seconds. (Range: 0-59)
Default Configuration
The default configuration is the exec-timeout set by the ip http exec-timeout command.
Command Mode
Global Configuration mode
User Guidelines
To specify no timeout, enter the ip https exec-timeout 0 0 command.
Example
The following example configures sets the interval for the system to 1hour.
Console(config)# ip https exec-timeout
60
crypto certificate generate
The crypto certificate generate
Global Configuration mode command generates a self-signed HTTPS certificate.
Syntax crypto certificate [ number
] generate [key-generate length
][cn common- name
][ou organization-unit
][or organization
] [loc location
] [st state
] [cu country
] [duration days
]
Parameters
• number — Specifies the certificate number. (Range: 1 - 2)
• key-generate
— Regenerate the SSL RSA key.
• length — Specifies the SSL RSA key length. (Range: 512 - 2048)
• common- name — Specifies the fully qualified URL or IP address of the device.
(Range: 1 - 64)
• organization — Specifies the organization name. (Range: 1 - 64)
• organization-unit — Specifies the organization-unit or department name.(Range: 1 - 64)
• location — Specifies the location or city name. (Range: 1 - 64)
• state — Specifies the state or province name. (Range: 1 - 64)
• country — Specifies the country name. (Range: 2 - 2)
• days — Specifies number of days certification is valid. (Range: 30 - 3650)
Default Configuration
The Certificate and SSL’s RSA key pairs do not exist.
If no certificate number is specified, the default certificate number is 1.
If no RSA key length is specified, the default length is 1024.
Page 294
Not approved by Document Control. For review only.
Web Server Commands
If no URL or IP address is specified, the default common name is the lowest IP address of the device at the time that the certificate is generated.
If the number of days is not specified, the default period of time that the certification is valid is 365 days.
Command Mode
Global Configuration mode
User Guidelines
The command is not saved in the device configuration; however, the certificate and keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device).
Use this command to generate a self-signed certificate for the device.
If the RSA keys do not exist, parameter key-generate
must be used.
Example
The following example regenerates an HTTPS certificate.
Console(config)# crypto certificate 1 generate key-generate
crypto certificate request
The crypto certificate request
Privileged EXEC mode command generates and displays certificate requests for
HTTPS.
Syntax crypto certificate number request
[ cn common- name ]
[ou organization-unit
][or organization
] [loc location
] [st state
] [cu country
]
Parameters
• number — Specifies the certificate number. (Range: 1 - 2)
• common- name — Specifies the fully qualified URL or IP address of the device.
(Range: 1- 64)
• organization-unit — Specifies the organization-unit or department name. (Range: 1- 64)
• organization — Specifies the organization name. (Range: 1- 64)
• location — Specifies the location or city name. (Range: 1- 64)
• state — Specifies the state or province name. (Range: 1- 64)
• country — Specifies the country name. (Range: 1- 2)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
Page 295
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
Use this command to export a certificate request to a Certification Authority. The certificate request is generated in
Base64-encoded X.509 format.
Before generating a certificate request you must first generate a self-signed certificate using the
crypto certificate generate
Global Configuration mode command. Be aware that you have to reenter the certificate fields.
After receiving the certificate from the Certification Authority, use the crypto certificate import
Global
Configuration mode command to import the certificate into the device. This certificate replaces the self-signed certificate.
Example
The following example generates and displays a certificate request for HTTPS.
Console# crypto certificate 1 request
-----BEGIN CERTIFICATE REQUEST-----
MIwTCCASoCAQAwYjELMAkGA1UEBhMCUFAxCzAJBgNVBAgTAkNDMQswCQYDVQQH
EwRDEMMAoGA1UEChMDZGxkMQwwCgYDVQQLEwNkbGQxCzAJBgNVBAMTAmxkMRAw
DgKoZIhvcNAQkBFgFsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8ecwQ
HdML0831i0fh/F0MV/Kib6Sz5p+3nUUenbfHp/igVPmFM+1nbqTDekb2ymCu6K aKvEbVLF9F2LmM7VPjDBb9bb4jnxkvwW/wzDLvW2rsy5NPmH1QVl+8Ubx3GyCm
/oW93BSOFwxwEsP58kf+sPYPy+/8wwmoNtDwIDAQABoB8wHQYJKoZIhvcNAQkH
MRDjEyMwgICCAgICAICAgIMA0GCSqGSIb3DQEBBAUAA4GBAGb8UgIx7rB05m+2 m5ZZPhIwl8ARSPXwhVdJexFjbnmvcacqjPG8pIiRV6LkxryGF2bVU3jKEipcZa g+uNpyTkDt3ZVU72pjz/fa8TF0n3
-----END CERTIFICATE REQUEST-----
CN= router.gm.com
0= General Motors
C= US
crypto certificate import
The crypto certificate import
Global Configuration mode command imports a certificate signed by the
Certification Authority for HTTPS.
Syntax crypto certificate number
import
Parameters
• number — Specifies the certificate number. (Range: 1 - 2)
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
Page 296
Not approved by Document Control. For review only.
Web Server Commands
User Guidelines
Use this command to enter an external certificate (signed by Certification Authority) to the device. To end the session, enter an empty line.
The imported certificate must be based on a certificate request created by the crypto certificate request
Privileged EXEC mode command.
If the public key found in the certificate does not match the device's SSL RSA key, the command fails.
This command is not saved in the device configuration; however, the certificate imported by this command is saved in the private configuration (which is never displayed to the user or backed up to another device).
Example
The following example imports a certificate signed by Certification Authority for HTTPS.
Console(config)# crypto certificate 1 import
-----BEGIN CERTIFICATE----dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw
CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47
ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v
L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl
-----END CERTIFICATE-----
Certificate imported successfully.
Issued to: router.gm.com
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: DC789788 DC88A988 127897BC BB789788
ip https certificate
The ip https certificate
Global Configuration mode command configures the active certificate for HTTPS. Use the no
form of this command to return to the default configuration.
Syntax ip https certificate number no ip https certificate
Parameters
• number — Specifies the certificate number. (Range: 1 - 2)
Default Configuration
Certificate number 1.
Page 297
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Global Configuration mode
User Guidelines
The crypto certificate generate
command should be used to generate HTTPS certificates.
Example
The following example configures the active certificate for HTTPS.
Console(config)# ip https certificate 1
show crypto certificate mycertificate
The show crypto certificate mycertificate
Privileged EXEC mode command displays the SSH certificates of the device.
Syntax show crypto certificate mycertificate [ number
]
Parameters
• number — Specifies the certificate number. (Range: 1- 2)
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the certificate.
Console# show crypto certificate mycertificate 1
-----BEGIN CERTIFICATE----dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw
CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47
ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v
L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl
-----END CERTIFICATE-----
Page 298
Not approved by Document Control. For review only.
Web Server Commands
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: DC789788 DC88A988 127897BC BB789788
show ip http
The show ip http
Privileged EXEC mode command displays the HTTP server configuration.
Syntax show ip http
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the HTTP server configuration.
Console# show ip http
HTTP server enabled. Port: 80
show ip https
The show ip https
Privileged EXEC mode command displays the HTTPS server configuration.
Syntax show ip https
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Page 299
Allied Telesis
Command Line Interface User’s Guide
Example
The following example displays the HTTP server configuration.
Console# show ip https
HTTPS server enabled. Port: 443
Certificate 1 is active
Issued by: www.verisign.com
Valid from: 8/9/2004 to 8/9/2005
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: DC789788 DC88A988 127897BC BB789788
Certificate 2 is inactive
Issued by: self-signed
Valid from: 8/9/2004 to 8/9/2005
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: 1873B936 88DC3411 BC8932EF 782134BA
Page 300
Not approved by Document Control. For review only.
802.1x Commands
Chapter 32. 802.1x Commands
aaa authentication dot1x
The
aaa authentication dot1x
Global Configuration mode command specifies one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1X. Use the no
form of this command to return to the default configuration.
Syntax aaa authentication dot1x default method1 [ method2 ...] no aaa authentication dot1x default
Parameters
• method1 [ method2 ...] — At least one from the following table:
Keyword Description
Radius Uses the list of all RADIUS servers for authentication
None Uses no authentication
Default Configuration
No authentication method is defined.
Command Mode
Global Configuration mode
User Guidelines
Additional methods of authentication are used only if the previous method returns an error and not if the request for authentication is denied. To ensure that authentication succeeds even if all methods return an error, specify none
as the final method in the command line.
The RADIUS server must support MD-5 challenge and EAP type frames.
Example
The following example uses the aaa authentication dot1x default command with no authentication.
Console(config)# aaa authentication dot1x default none
dot1x system-auth-control
The dot1x system-auth-control
Global Configuration mode command enables 802.1x globally. Use the no
form of this command to return to the default configuration.
Syntax dot1x system-auth-control
Page 301
Allied Telesis
Command Line Interface User’s Guide no dot1x system-auth-control
Default Configuration
802.1x is disabled globally.
Command Modes
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables 802.1x globally.
Console(config)# dot1x system-auth-control
dot1x port-control
The dot1x port-control
Interface Configuration mode command enables manually controlling the authorization state of the port. Use the no
form of this command to return to the default configuration.
Syntax dot1x port-control
{ auto
| force-authorized
| force-unauthorized
} no dot1x port-control
Parameters
• auto —
Enables 802.1X authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1X authentication exchange between the port and the client.
• force-authorized —
Disables 802.1X authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required. The port resends and receives normal traffic without 802.1X-based authentication of the client.
• force-unauthorized —
Denies all access through this interface by forcing the port to transition to the unauthorized state and ignoring all attempts by the client to authenticate. The device cannot provide authentication services to the client through the interface.
Default Configuration
Port is in the force-authorized state
Command Mode
Interface Configuration (Ethernet)
User Guidelines
It is recommended to disable spanning tree or to enable spanning-tree PortFast mode on 802.1x edge ports (ports in auto
state that are connected to end stations), in order to get immediately to the forwarding state after successful authentication.
Page 302
Not approved by Document Control. For review only.
802.1x Commands
Example
The following example enables 802.1X authentication on Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x port-control auto
dot1x re-authentication
The dot1x re-authentication
Interface Configuration mode command enables periodic re-authentication of the client. Use the no
form of this command to return to the default configuration.
Syntax dot1x re-authentication no dot1x re-authentication
Default Configuration
Periodic re-authentication is disabled.
Command Mode
Interface Configuration (Ethernet)
User Guidelines
There are no user guidelines for this command.
Example
The following example enables periodic re-authentication of the client.
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x re-authentication
dot1x timeout re-authperiod
The dot1x timeout re-authperiod
Interface Configuration mode command sets the number of seconds between re-authentication attempts. Use the no
form of this command to return to the default configuration.
Syntax dot1x timeout re-authperiod seconds no dot1x timeout re-authperiod
Parameters
• seconds — Number of seconds between re-authentication attempts. (Range: 300 - 4294967295)
Default Configuration
Re-authentication period is 3600 seconds.
Page 303
Allied Telesis
Command Line Interface User’s Guide
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets the number of seconds between re-authentication attempts, to 300.
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x timeout re-authperiod 300
dot1x re-authenticate
The dot1x re-authenticate
Privileged EXEC mode command manually initiates a re-authentication of all 802.1Xenabled ports or the specified 802.1X-enabled port.
Syntax dot1x re-authenticate
[ ethernet interface ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example manually initiates a re-authentication of 802.1X-enabled Ethernet port 1/e16.
Console# dot1x re-authenticate ethernet 1/e16
dot1x timeout quiet-period
The dot1x timeout quiet-period
Interface Configuration mode command sets the number of seconds that the device remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password). Use the no
form of this command to return to the default configuration.
Syntax dot1x timeout quiet-period seconds no dot1x timeout quiet-period
Page 304
Not approved by Document Control. For review only.
802.1x Commands
Parameters
• seconds — Specifies the time in seconds that the device remains in the quiet state following a failed authentication exchange with the client. (Range: 0 - 65535 seconds)
Default Configuration
Quiet period is 60 seconds.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
During the quiet period, the device does not accept or initiate authentication requests.
The default value of this command should only be changed to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers.
To provide a faster response time to the user, a smaller number than the default value should be entered.
Example
The following example sets the number of seconds that the device remains in the quiet state following a failed authentication exchange to 3600.
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x timeout quiet-period 3600
dot1x timeout tx-period
The dot1x timeout tx-period
Interface Configuration mode command sets the number of seconds that the device waits for a response to an Extensible Authentication Protocol (EAP)-request/identity frame from the client before resending the request. Use the no
form of this command to return to the default configuration.
Syntax dot1x timeout tx-period seconds no dot1x timeout tx-period
Parameters
• seconds — Specifies the time in seconds that the device waits for a response to an EAP-request/identity frame from the client before resending the request. (Range: 30-65535 seconds)
Default Configuration
Timeout period is 30 seconds.
Command Mode
Interface Configuration (Ethernet) mode
Page 305
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers
Example
The following command sets the number of seconds that the device waits for a response to an EAP-request/ identity frame, to 3600 seconds.
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x timeout tx-period 3600
dot1x max-req
The dot1x max-req
Interface Configuration mode command sets the maximum number of times that the device sends an Extensible Authentication Protocol (EAP)-request/identity frame (assuming that no response is received) to the client, before restarting the authentication process. Use the no
form of this command to return to the default configuration.
Syntax dot1x max-req count no dot1x max-req
Parameters
• count — Number of times that the device sends an EAP-request/identity frame before restarting the authentication process. (Range: 1-10)
Default Configuration
The default number of times is 2.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers
Example
The following example sets the number of times that the device sends an EAP-request/identity frame to 6 .
Console(config)# interface ethernet 1/e16
Console(config-if)# dot1x max-req 6
dot1x timeout supp-timeout
The dot1x timeout supp-timeout
Interface Configuration mode command sets the time for the retransmission of an Extensible Authentication Protocol (EAP)-request frame to the client. Use the no
form of this command to return to the default configuration.
Page 306
Not approved by Document Control. For review only.
802.1x Commands
Syntax dot1x timeout supp-timeout seconds no dot1x timeout supp-timeout
Parameters
• seconds — Time in seconds that the device waits for a response to an EAP-request frame from the client before resending the request. (Range: 1- 65535 seconds)
Default Configuration
Default timeout period is 30 seconds.
Command Mode
Interface configuration (Ethernet) mode
User Guidelines
The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers
Example
The following example sets the timeout period before retransmitting an EAP-request frame to the client to 3600 seconds.
Console(config-if) # dot1x timeout supp-timeout 3600
dot1x timeout server-timeout
The dot1x timeout server-timeout
Interface Configuration mode command sets the time that the device waits for a response from the authentication server. Use the no
form of this command to return to the default configuration.
Syntax dot1x timeout server-timeout seconds no dot1x timeout server-timeout
Parameters
• seconds — Time in seconds that the device waits for a response from the authentication server.
(Range: 1-65535 seconds)
Default Configuration
The timeout period is 30 seconds.
Command Mode
Interface configuration (Ethernet) mode
Page 307
Allied Telesis
Command Line Interface User’s Guide
User Guidelines
The actual timeout can be determined by comparing the dot1x timeout server-timeout
value and the result of multiplying the radius-server retransmit
value with the radius-server timeout
value and selecting the lower of the two values.
Example
The following example sets the time for the retransmission of packets to the authentication server to 3600 seconds.
Console(config-if)# dot1x timeout server-timeout 3600
show dot1x
The show dot1x
Privileged EXEC mode command displays the 802.1X status of the device or specified interface.
Syntax show dot1x
[ ethernet interface ]
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the status of 802.1X-enabled Ethernet ports.
Console# show dot1x
802.1x is disabled
Port
----
1/e1
1/e2
1/e3
1/e4
Admin Mode
----------
Auto
Auto
Auto
Auto
Oper Mode
---------
Authorized
Authorized
Authorized
Authorized
Reauth
Control
-------
Reauth
Period
------
Enabled
Enabled
3600
3600
Enabled 3600
Enabled 3600
Username
--------
Bob
John
Clark
Bill
Page 308
Not approved by Document Control. For review only.
802.1x Commands
1/e5 Force-auth Unauthorized*
* Port is down or not present.
console#
Console# show dot1x ethernet 1/e1
802.1x is enabled.
Port
----
1/e1
Admin Mode
----------
Auto
Oper Mode
---------
Unauthorized
Disabled 3600 n/a
Reauth
Control
-------
Enabled
Reauth
Period
------
3600
Username
-------n/a
Quiet period: 60 Seconds
Tx period:30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 00:00:00
MAC Address: 00:00:00:00:00:00
Authentication Method: Remote
Termination Cause: Reauthentication failed
Authenticator State Machine
State: CONNECTING
Backend State Machine
State: IDLE
Authentication success: 0
Authentication fails: 0
The following table describes significant fields shown above:
Field
Port
Admin mode
Oper mode
Reauth Control
Description
The port number.
The port admin mode. Possible values: Force-auth, Force-unauth, Auto.
The port oper mode. Possible values: Authorized, Unauthorized or Down.
Reauthentication control.
Page 309
Allied Telesis
Command Line Interface User’s Guide
Reauth Period
Username
Quiet period
Tx period
Max req
Supplicant timeout
Server timeout
Session Time
MAC address
Authentication Method
Termination Cause
State
Authentication success
Authentication fails
Reauthentication period.
The username representing the identity of the Supplicant. This field shows the username in case the port control is auto. If the port is Authorized, it shows the username of the current user. If the port is unauthorized it shows the last user that was authenticated successfully.
The number of seconds that the device remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password).
The number of seconds that the device waits for a response to an Extensible
Authentication Protocol (EAP)-request/identity frame from the client before resending the request.
The maximum number of times that the device sends an Extensible
Authentication Protocol (EAP)-request frame (assuming that no response is received) to the client before restarting the authentication process.
Time in seconds the switch waits for a response to an EAP-request frame from the client before resending the request.
Time in seconds the switch waits for a response from the authentication server before resending the request.
The amount of time the user is logged in.
The supplicant MAC address.
The authentication method used to establish the session.
The reason for the session termination.
The current value of the Authenticator PAE state machine and of the Backend state machine.
The number of times the state machine received a Success message from the
Authentication Server.
The number of times the state machine received a Failure message from the
Authentication Server.
show dot1x users
The show dot1x users
Privileged EXEC mode command displays active 802.1X authenticated users for the device.
Syntax show dot1x users
[ username username ]
Parameters
• username — Supplicant username (Range: 1-160 characters)
Default Configuration
This command has no default configuration.
Page 310
Not approved by Document Control. For review only.
802.1x Commands
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays 802.1X users.
Console# show dot1x users
Port Username
------------
1/e1
1/e2
Bob
John
Session Time
------------
1d:03:08.58
08:19:17
Console# show dot1x users username Bob
Auth Method
-----------
Remote
None
MAC Address
--------------
0008:3b79:8787
0008:3b89:3127
Username: Bob
Port Username
------------
1/e1 Bob
Session Time
------------
1d:03:08.58
Auth Method
-----------
Remote
The following table describes significant fields shown above:
MAC Address
--------------
0008:3b79:8787
Field
Port
Username
Session Time
Authentication Method
MAC Address
Description
The port number.
The username representing the identity of the Supplicant.
The period of time the Supplicant is connected to the system.
Authentication method used by the Supplicant to open the session.
MAC address of the Supplicant.
show dot1x statistics
The show dot1x statistics
Privileged EXEC mode command displays 802.1X statistics for the specified interface.
Syntax show dot1x statistics ethernet interface
Parameters
• interface — Valid Ethernet port. (Full syntax: unit/port )
Page 311
Allied Telesis
Command Line Interface User’s Guide
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays 802.1X statistics for the specified interface.
Console# show dot1x statistics ethernet 1/e1
EapolFramesRx: 11
EapolFramesTx: 12
EapolStartFramesRx: 12
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 3
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 6
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 00:08:78:32:98:78
The following table describes the significant fields shown in the display:
Field
EapolFramesRx
EapolFramesTx
EapolStartFramesRx
Description
The number of valid EAPOL frames of any type that have been received by this Authenticator.
The number of EAPOL frames of any type that have been transmitted by this Authenticator.
The number of EAPOL Start frames that have been received by this
Authenticator.
EapolRespIdFramesRx
EapolRespFramesRx
Authenticator.
The number of EAP Resp/Id frames that have been received by this
Authenticator.
The number of valid EAP Response frames (other than Resp/Id frames) that have been received by this Authenticator.
Page 312
Not approved by Document Control. For review only.
802.1x Commands
EapolReqIdFramesTx
EapolReqFramesTx
InvalidEapolFramesRx
EapLengthErrorFramesRx
LastEapolFrameVersion
LastEapolFrameSource
The number of EAP Req/Id frames that have been transmitted by this
Authenticator.
The number of EAP Request frames (other than Rq/Id frames) that have been transmitted by this Authenticator.
The number of EAPOL frames that have been received by this
Authenticator in which the frame type is not recognized.
The number of EAPOL frames that have been received by this
Authenticator in which the Packet Body Length field is invalid.
The protocol version number carried in the most recently received EAPOL frame.
The source MAC address carried in the most recently received EAPOL frame.
dot1x auth-not-req
The dot1x auth-not-req
Interface Configuration (VLAN) mode command enables unauthorized devices access to the VLAN. Use the no form of this command to disable access to the VLAN.
Syntax dot1x auth-not-req no dot1x auth-not-req
Default Configuration
Access is enabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
An access port cannot be a member in an unauthenticated VLAN.
The native VLAN of a trunk port cannot be an unauthenticated VLAN.
For a general port, the PVID can be an unauthenticated VLAN (although only tagged packets would be accepted in the unauthorized state.)
Example
The following example enables access to the VLAN to unauthorized devices.
Console(config)# interface vlan 5
Console(config-if) # dot1x auth-not-req
dot1x guest-vlan
The dot1x guest-vlan
Interface Configuration mode command defines a guest VLAN. Use the no
form of this command to return to the default configuration.
Page 313
Allied Telesis
Command Line Interface User’s Guide
Syntax dot1x guest-vlan no dot1x guest-vlan
Default Configuration
No VLAN is defined as a guest VLAN.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Use the dot1x guest-vlan enable
Interface Configuration mode command to enable unauthorized users on an interface to access the guest VLAN.
If the guest VLAN is defined and enabled, the port automatically joins the guest VLAN when the port is unauthorized and leaves it when the port becomes authorized. To be able to join or leave the guest VLAN, the port should not be a static member of the guest VLAN.
Example
The following example defines VLAN 2 as a guest VLAN.
Console#
Console# configure
Console(config)# vlan database
Console(config-vlan)# vlan 2
Console(config-vlan)# exit
Console(config)# interface vlan 2
Console(config-if)# dot1x guest-vlan
dot1x single-host-violation
The dot1x single-host-violation
Interface Configuration (Ethernet) mode command configures the action to be taken, when a station whose MAC address is not the supplicant MAC address, attempts to access the interface.
Use the no form of this command to restore defaults.
Syntax dot1x single-host-violation {forward | disgard | disgard-shutdown
[ trap seconds ] no port dot1x single-host-violation
Parameters
• forward
— Forwards frames with source addresses that are not the supplicant address, but does not learn the source addresses.
• discard
— Discards frames with source addresses that are not the supplicant address.
• discard-shutdown
— Discards frames with source addresses that are not the supplicant address. The port is also shut down.
• trap seconds — Indicates that SNMP traps are sent. Specifies the minimum amount of time in seconds between consecutive traps. (Range: 11000000
)
Page 314
Not approved by Document Control. For review only.
802.1x Commands
Default Configuration
Frames with source addresses that are not the supplicant address are discarded.
No traps are sent.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The command is relevant when multiple hosts is disabled and the user has been successfully authenticated.
Example
The following example forwards frames with source addresses that are not the supplicant address and sends consecutive traps at intervals of 100 seconds.
Console(config)# interface ethernet 1/16
Console(config-if)# dot1x single-host-violation forward trap 100
dot1x mac-authentication
The mac-authentication
Interface Configuration mode command enables authentication based on the station's
MAC address. Use the no
form of this command to disable MAC authentication.
Syntax dot1x mac-authentication {mac-only | mac-and-802.1x} no dot1x mac-authentication
Parameters
• mac-only — Enable authentication based on the station's MAC address only. 802.1X frames are ignored.
• mac-and-802.1x
— Enable 802.1X authentication and MAC address authentication on the interface.
Default Configuration
Disabled.
Command Mode
Interface configuration (Ethernet)
User Guidelines
Guest VLAN must be enabled when MAC authentication is enabled.
Static MAC addresses can't be authorized. Do not change authenticated MAC address to static address.
It is not recommended to delete authenticated MAC addresses.
Reauthentication must be enabled when working in this mode.
Page 315
Allied Telesis
Command Line Interface User’s Guide
Example
The following example enables authentication based on the station's MAC address.
Console# configure
Console(config)# interface ethernet 1/e1
Console(config-if)# d ot1x mac-authentication
show dot1x advanced
The show dot1x advanced
privileged EXEC mode command displays 802.1X advanced features for the switch or for the specified interface.
Syntax show dot1x advanced
Parameters
• interface — Ethernet interface.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC
User Guidelines
There are no user guidelines for this command.
Example
The following example displays 802.1X advanced features for the switch.
Console# show dot1x advanced
Guest VLAN: 3978
Unauthenticated VLANs: 91,92
Interface
---------
1/1
1/2
Multiple Hosts
Console# show dot1x advanced ethernet 1/1
Guest VLAN: 2
Guest VLAN
-----------------------
Disabled Enabled
Enabled Disabled
MAC Authentication
----------
MAC-and-802.1X
Disabled
Page 316
Not approved by Document Control. For review only.
802.1x Commands
Unauthenticated VLANs: 91,92
Interface
---------
1/1
1/2
Multiple Hosts Guest VLAN
-----------------------
Disabled Enabled
Enabled Disabled
MAC Authentication
----------
MAC-and-802.1X
Disabled
Single host parameters
Violation action: Discard
Trap: Enabled
Trap frequency: 100
Status: Single-host locked
Violations since last trap: 9
dot1x guest-vlan enable
The dot1x guest-vlan enable
Interface Configuration mode command enables unauthorized users on the interface access to the Guest VLAN. Use the no
form of this command to disable access.
Syntax dot1x guest-vlan enable no dot1x guest-vlan enable
Default Configuration
Disabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
A device can have only one global guest VLAN. The guest VLAN is defined using the dot1x guest-vlan
Interface
Configuration mode command.
Example
The following example enables unauthorized users on Ethernet port 1/e1 to access the guest VLAN.
Console# configure
Console(config)# interface ethernet 1/e1
Console(config-if)# dot1x guest-vlan enable
Page 317
Allied Telesis
Command Line Interface User’s Guide
Index
A aaa authentication dot1x 301 aaa authentication dot1x default 301 aaa authentication enable 24 aaa authentication login 23 aaa logging 242 abort (mst) 216 autobaud 126
B back-pressure 86 boot system 68, 74 bridge address 33 bridge aging-time 37 bridge multicast address 34 bridge multicast filtering 33 bridge multicast forbidden address 35 bridge multicast forbidden forward-all 36 bridge multicast forward-all 36
C channel-group 146 clear bridge 38 clear counters 86 clear gvrp statistics 101 clear logging 240 clear logging file 241 clear spanning-tree detected-protocol 209
CLI Command Conventions 11
CLI Command Modes 5 clock set 51 clock source 51 clock summer-time 53 clock timezone 52
Command Completion 10 configure 266
Contacting Allied Telesis 4 copy 64, 71, 73 crypto certificate generate 294
Page 318 crypto certificate import 296 crypto certificate request 295 crypto key generate dsa 229 crypto key generate rsa 229 crypto key pubkey-chain ssh 230
D delete 67, 73 deny (Management) 139 description 82 disable 265
Document Conventions 3 dot1x guest-vlan 313, 314 dot1x guest-vlan enable 317 dot1x max-req 306 dot1x port-control 302 dot1x re-authenticate 304 dot1x re-authentication 303 dot1x system-auto-control 301 dot1x timeout quiet-period 304 dot1x timeout re-authperiod 303 dot1x timeout server-timeout 307 dot1x timeout supp-timeout 306 dot1x timeout tx-period 305 duplex 83
E
Editing Features 9 enable 265 enable authentication 26 end 268
Entering Commands 9 exec-timeout 127 exit 267 exit (Configuration) 267 exit (mst) 215
F file-system logging 242 flowcontrol 84
G garp timer 99
Global Configuration Mode 6 gvrp enable (Global) 98
Index gvrp enable (Interface) 98 gvrp registration-forbid 100 gvrp vlan-creation-forbid 100
H help 268 history 127 history size 128 hostname 255
I how bootvar 70 instance (mst) 212
Intended Audience 2
Interface Configuration Mode 7 interface ethernet 80 interface port-channel 145 interface range ethernet 80 interface range port-channel 145 interface range vlan 274 interface vlan 273 ip address 114 ip address-dhcp 114 ip default-gateway 115 ip http authentication 26 ip http port 291 ip http server 291 ip https authentication 27 ip https certificate 297 ip https port 293 ip https server 292 ip igmp snooping (Global) 105 ip igmp snooping (Interface) 105 ip igmp snooping host-time-out 107, 108, 109 ip igmp snooping leave-time-out 110 ip igmp snooping mrouter learn-pim-dvmrp
106 ip igmp snooping mrouter-time-out 109 ip internal-usage-vlan 285 ip ssh port 228 ip ssh pubkey-auth 230 ip ssh server 228
K
Keyboard Shortcuts 10 key-string 232
L line 125 logging 237 logging buffered 239 logging buffered size 239 logging console 238 logging file 241 logging on 237 login 266 login authentication 25
M management access-class 139 management access-list 137 management logging 243 map mac macs-group 283 mdix 85
N name 275 name (mst) 213 negotiation 84
P password 29 permit (Management) 138 ping 252 port monitor 148 port security 38 port security max 40 port security mode 39 port security routed secure-address 40 port storm-control broadcast enable 95 port storm-control broadcast rate 96 port storm-control include-multicast (IC) 95 power inline 150 power inline powered-device 150 power inline priority 151 power inline traps enable 152 power inline usage-threshold 152
Preface 1
Page 319
Allied Telesis
Command Line Interface User’s Guide priority-queue out num-of-queues 157
Privileged EXEC Mode 5
Q qos 156 qos cos 162 qos map dscp-queue 162 qos trust (Global) 162
R radius-server deadtime 168 radius-server host 165 radius-server key 166 radius-server retransmit 166 radius-server source-ip 167 radius-server timeout 168 rate-limit 157 reload 254 revision (mst) 214 rmon alarm 176 rmon collection history 172 rmon event 179 rmon table-size 182
S set interface active 87 show (mst) 214 show authentication methods 28 show bridge address-table 41 show bridge address-table count 43, 44 show bridge address-table static 42 show bridge multicast address-table 44 show bridge multicast filtering 46 show clock 60 show copper-ports cable-length 143 show copper-ports tdr 142 show crypto certificate mycertificate 298 show crypto key mypubkey 234 show crypto key pubkey-chain ssh 235 show dot1x 308 show dot1x advanced 317 show dot1x statistics 311 show dot1x users 310 show gvrp configuration 101
Page 320 show gvrp error-statistics 103 show gvrp statistics 102 show history 270 show interfaces advertise 87 show interfaces counters 92 show interfaces description 91 show interfaces port-channel 146 show interfaces status 90 show interfaces switchport 287 show ip http 299 show ip https 299 show ip igmp snooping groups 113 show ip igmp snooping interface 112 show ip igmp snooping mrouter 111 show ip interface 116 show ip ssh 233 show line 129 show logging 244 show logging file 244 show management access-class 141 show management access-list 140 show ports security 48 show ports security addresses 49 show ports storm-control 97 show power inline 153 show privilege 270 show qos 156 show qos interface 158 show qos map 163 show radius-servers 169 show rmon alarm 178 show rmon alarm-table 177 show rmon collection history 172 show rmon events 180 show rmon history 173 show rmon log 181 show rmon statistics 170 show running-config 68, 75 show sessions 260 show snmp 195 show snmp engineID 196
Index show snmp filters 198 show snmp groups 197 show snmp users 199 show snmp views 197 show sntp configuration 61 show sntp status 62 show spanning-tree 216 show stack 258 show startup-config 69, 75 show syslog-servers 246 show system 261 show tacacs 250 show users 259 show version 262 show vlan 286 show vlan internal usage 286 show vlan macs-group 283 shutdown 81 snmp-server community 184 snmp-server contact 193 snmp-server enable traps 189 snmp-server engineID local 188 snmp-server filter 189 snmp-server group 186 snmp-server host 190 snmp-server location 193 snmp-server set 194 snmp-server trap authentication 192 snmp-server user 186 snmp-server v3-host 191 snmp-server view 185 sntp anycast client enable 57 sntp authenticate 55 sntp authentication-key 54 sntp broadcast client enable 56 sntp client enable (Interface) 58 sntp client poll timer 56 sntp server 59 sntp trusted-key 55 sntp unicast client enable 58 sntp unicast client poll 59 spanning-tree 200 spanning-tree bpdu 207 spanning-tree cost 204, 205 spanning-tree disable 203 spanning-tree forward-time 201 spanning-tree hello-time 201 spanning-tree link-type 206 spanning-tree max-age 202 spanning-tree mode 200 spanning-tree mst configuration 212 spanning-tree mst cost 211 spanning-tree mst max-hops 210 spanning-tree mst port-priority 210 spanning-tree mst priority 209 spanning-tree pathcost method 206 spanning-tree portfast 205 spanning-tree port-priority 205 spanning-tree priority 203 speed 82, 125 stack change unit-id 257 stack master 255 stack reload 256
Starting the CLI 8 switchport access vlan 278 switchport forbidden vlan 284 switchport general acceptable-frame-type tagged-only 281 switchport general allowed vlan 279 switchport general map macs-group vlan 282 switchport general pvid 280 switchport mode 276 switchport protected 275 switchport trunk allowed vlan 278 switchport trunk native vlan 279
T tacacs-server host 248 tacacs-server key 249 tacacs-server source-ip 250 tacacs-server timeout 249
Terminal Command Buffer 9 terminal history 128
Page 321
Allied Telesis
Command Line Interface User’s Guide terminal history size 129 test copper-port tdr 142 traffic-shape 158
U
User EXEC Mode 5 user-key 231 username 29
V vlan 272 vlan database 272
W wrr-queue cos-map 159
Page 322
advertisement
Related manuals
advertisement
Table of contents
- 13 Preface
- 14 Intended Audience
- 15 Document Conventions
- 16 Contacting Allied Telesis
- 17 Chapter 1.Using the CLI
- 17 Overview
- 17 CLI Command Modes
- 17 Introduction
- 17 User EXEC Mode
- 17 Privileged EXEC Mode
- 18 Global Configuration Mode
- 19 Interface Configuration and Specific Configuration Modes
- 20 Starting the CLI
- 21 Editing Features
- 21 Entering Commands
- 21 Terminal Command Buffer
- 22 Negating the Effect of Commands
- 22 Command Completion
- 22 Nomenclature
- 22 Keyboard Shortcuts
- 23 CLI Command Conventions
- 23 Copying and Pasting Text
- 24 Chapter 2.ACL Commands
- 24 ip access-list
- 24 permit (ip)
- 27 deny (IP)
- 29 mac access-list
- 30 permit (MAC)
- 31 deny (MAC)
- 32 service-acl
- 32 show access-lists
- 33 show interfaces access-lists
- 35 Chapter 3.AAA Commands
- 35 aaa authentication login
- 36 aaa authentication enable
- 37 login authentication
- 38 enable authentication
- 38 ip http authentication
- 39 ip https authentication
- 40 show authentication methods
- 41 password
- 41 username
- 42 show users accounts
- 43 enable password
- 45 Chapter 4.Address Table Commands
- 45 bridge address
- 45 bridge multicast filtering
- 46 bridge multicast address
- 47 bridge multicast forbidden address
- 48 bridge multicast forward-all
- 48 bridge multicast forbidden forward-all
- 49 bridge aging-time
- 50 clear bridge
- 50 port security
- 51 port security mode
- 52 port security max
- 52 port security routed secure-address
- 53 show bridge address-table
- 54 show bridge address-table static
- 55 show bridge address-table count
- 56 show bridge multicast address-table
- 58 show bridge multicast address-table static
- 58 show bridge multicast filtering
- 60 show ports security
- 61 show ports security addresses
- 63 Chapter 5.Clock Commands
- 63 clock set
- 63 clock source
- 64 clock timezone
- 65 clock summer-time
- 66 sntp authentication-key
- 67 sntp authenticate
- 67 sntp trusted-key
- 68 sntp client poll timer
- 68 sntp broadcast client enable
- 69 sntp anycast client enable
- 70 sntp client enable (Interface)
- 70 sntp unicast client enable
- 71 sntp unicast client poll
- 71 sntp server
- 72 show clock
- 73 show sntp configuration
- 74 show sntp status
- 76 Chapter 6.Configuration and Image File Commands
- 79 delete
- 80 boot system
- 80 show running-config
- 81 show startup-config
- 82 show bootvar
- 83 Chapter 7.DHCP Option 82 Commands
- 83 ip dhcp information option
- 83 show ip dhcp information option
- 84 ip dhcp relay enable
- 85 Chapter 8.DHCP Snooping Commands
- 85 ip dhcp snooping
- 85 ip dhcp snooping vlan
- 86 ip dhcp snooping trust
- 87 ip dhcp snooping information option allowed-untrusted
- 87 ip dhcp snooping verify
- 88 ip dhcp snooping database
- 88 ip dhcp snooping database update-freq
- 89 ip dhcp snooping binding
- 90 clear ip dhcp snooping database
- 90 show ip dhcp snooping binding
- 92 Chapter 9.Ethernet Configuration Commands
- 92 interface ethernet
- 92 interface range ethernet
- 93 shutdown
- 94 description
- 94 speed
- 95 duplex
- 96 negotiation
- 96 flowcontrol
- 98 back-pressure
- 98 clear counters
- 99 set interface active
- 99 show interfaces advertise
- 100 show interfaces configuration
- 102 show interfaces status
- 103 show interfaces description
- 104 show interfaces counters
- 106 show system flowcontrol
- 107 port storm-control include-multicast (IC)
- 107 port storm-control broadcast enable
- 108 port storm-control broadcast rate
- 109 show ports storm-control
- 110 Chapter 10.GVRP Commands
- 110 gvrp enable (Global)
- 110 gvrp enable (Interface)
- 111 garp timer
- 112 gvrp vlan-creation-forbid
- 112 gvrp registration-forbid
- 113 clear gvrp statistics
- 113 show gvrp configuration
- 114 show gvrp statistics
- 115 show gvrp error-statistics
- 117 Chapter 11.IGMP Snooping Commands
- 117 ip igmp snooping (Global)
- 117 ip igmp snooping (Interface)
- 118 ip igmp snooping mrouter learn-pim-dvmrp
- 119 ip igmp snooping host-time-out
- 119 ip igmp snooping querier enable
- 120 ip igmp snooping querier address
- 121 ip igmp snooping querier version
- 121 ip igmp snooping mrouter-time-out
- 122 ip igmp snooping leave-time-out
- 123 show ip igmp snooping mrouter
- 124 show ip igmp snooping interface
- 125 show ip igmp snooping groups
- 126 Chapter 12.IP Addressing Commands
- 126 ip address
- 126 ip address dhcp
- 127 ip default-gateway
- 128 show ip interface
- 129 arp timeout
- 130 clear arp-cache
- 131 show arp
- 132 ip domain-name
- 133 ip name-server
- 133 ip host
- 134 clear host
- 134 clear host dhcp
- 135 show hosts
- 137 Chapter 13.Line Commands
- 137 speed
- 138 autobaud
- 139 exec-timeout
- 139 history
- 140 history size
- 140 terminal history
- 141 terminal history size
- 141 show line
- 143 Section 14.LACP Commands
- 143 lacp system-priority
- 144 lacp port-priority
- 145 lacp timeout
- 146 show lacp ethernet
- 148 show lacp port-channel
- 149 Chapter 15.Management ACL Commands
- 149 management access-list
- 150 permit (Management)
- 151 deny (Management)
- 151 management access-class
- 152 show management access-list
- 153 show management access-class
- 154 Chapter 16.PHY Diagnostics Commands
- 154 test copper-port tdr
- 154 show copper-ports tdr
- 155 show copper-ports cable-length
- 157 Chapter 17.Port Channel Commands
- 157 interface port-channel
- 157 interface range port-channel
- 158 channel-group
- 158 show interfaces port-channel
- 160 Chapter 18.Port Monitor Commands
- 160 port monitor
- 161 show ports monitor
- 162 Chapter 19.Power over Ethernet Commands
- 162 power inline
- 162 power inline powered-device
- 163 power inline priority
- 164 power inline usage-threshold
- 164 power inline traps enable
- 165 show power inline
- 168 Chapter 20.QoS Commands
- 168 show qos
- 169 priority-queue out num-of-queues
- 169 rate-limit
- 170 traffic-shape
- 170 show qos interface
- 171 wrr-queue cos-map
- 172 qos wrr-queue threshold
- 173 qos trust(Global)
- 174 qos map dscp-queue
- 174 qos cos
- 175 show qos map
- 177 Chapter 21.Radius Commands
- 177 radius-server host
- 178 radius-server key
- 178 radius-server retransmit
- 179 radius-server source-ip
- 180 radius-server timeout
- 180 radius-server deadtime
- 181 show radius-servers
- 182 Chapter 22.RMON Commands
- 182 show rmon statistics
- 184 rmon collection history
- 184 show rmon collection history
- 185 show rmon history
- 188 rmon alarm
- 189 show rmon alarm-table
- 190 show rmon alarm
- 191 rmon event
- 192 show rmon events
- 193 show rmon log
- 194 rmon table-size
- 196 Chapter 23.SNMP Commands
- 196 snmp-server community
- 197 snmp-server view
- 198 snmp-server group
- 198 snmp-server user
- 200 snmp-server engineID local
- 201 snmp-server enable traps
- 201 snmp-server filter
- 202 snmp-server host
- 203 snmp-server v3-host
- 204 snmp-server trap authentication
- 205 snmp-server contact
- 205 snmp-server location
- 206 snmp-server set
- 207 show snmp
- 208 show snmp engineid
- 209 show snmp views
- 209 show snmp groups
- 210 show snmp filters
- 211 show snmp users
- 212 Chapter 24.Spanning-Tree Commands
- 212 spanning-tree
- 212 spanning-tree mode
- 213 spanning-tree forward-time
- 213 spanning-tree hello-time
- 214 spanning-tree max-age
- 215 spanning-tree priority
- 215 spanning-tree disable
- 216 spanning-tree cost
- 217 spanning-tree port-priority
- 217 spanning-tree portfast
- 218 spanning-tree link-type
- 218 spanning-tree pathcost method
- 219 spanning-tree bpdu
- 220 spanning-tree guard root
- 220 spanning-tree bpduguard
- 221 clear spanning-tree detected-protocols
- 221 spanning-tree mst priority
- 222 spanning-tree mst max-hops
- 222 spanning-tree mst port-priority
- 223 spanning-tree mst cost
- 224 spanning-tree mst configuration
- 224 instance (mst)
- 225 name (mst)
- 226 revision (mst)
- 226 show (mst)
- 227 exit (mst)
- 228 abort (mst)
- 228 show spanning-tree
- 240 Chapter 25.SSH Commands
- 240 ip ssh port
- 240 ip ssh server
- 241 crypto key generate dsa
- 241 crypto key generate rsa
- 242 ip ssh pubkey-auth
- 242 crypto key pubkey-chain ssh
- 243 user-key
- 244 key-string
- 245 show ip ssh
- 246 show crypto key mypubkey
- 247 show crypto key pubkey-chain ssh
- 249 Chapter 26.Syslog Commands
- 249 logging on
- 249 logging
- 250 logging console
- 251 logging buffered
- 251 logging buffered size
- 252 clear logging
- 253 logging file
- 253 clear logging file
- 254 aaa logging
- 254 file-system logging
- 255 management logging
- 256 show logging
- 257 show logging file
- 258 show syslog-servers
- 260 Chapter 27.TACACS+ Commands
- 260 tacacs-server host
- 261 tacacs-server key
- 261 tacacs-server timeout
- 262 tacacs-server source-ip
- 262 show tacacs
- 264 Chapter 28.System Management Commands
- 266 reload
- 266 resume
- 267 hostname
- 267 stack master
- 268 stack reload
- 269 stack change unit-id
- 270 show stack
- 271 show users
- 272 show sessions
- 273 show system
- 274 show system id
- 274 show version
- 275 set system
- 277 Chapter 29.User Interface Commands
- 277 enable
- 277 disable
- 278 login
- 278 configure
- 279 exit (Configuration)
- 281 terminal datadump
- 282 show history
- 282 show privilege
- 284 Chapter 30.VLAN Commands
- 284 vlan database
- 285 default-vlan vlan
- 285 interface vlan
- 286 interface range vlan
- 287 switchport protected
- 288 switchport mode
- 290 switchport access vlan
- 290 switchport trunk allowed vlan
- 291 switchport trunk native vlan
- 291 switchport general allowed vlan
- 292 switchport general pvid
- 293 switchport general ingress-filtering disable
- 293 switchport general acceptable-frame-type tagged-only
- 294 switchport general map macs-group vlan
- 295 map mac macs-group
- 295 show vlan macs-group
- 296 switchport forbidden vlan
- 297 ip internal-usage-vlan
- 298 show vlan
- 298 show vlan internal usage
- 299 show interfaces switchport
- 303 Chapter 31.Web Server Commands
- 303 ip http server
- 303 ip http port
- 304 ip http exec-timeout
- 304 ip https server
- 305 ip https port
- 305 ip https exec-timeout
- 306 crypto certificate generate
- 307 crypto certificate request
- 308 crypto certificate import
- 309 ip https certificate
- 310 show crypto certificate mycertificate
- 311 show ip http
- 311 show ip https
- 313 aaa authentication dot1x
- 313 dot1x system-auth-control
- 314 dot1x port-control
- 315 dot1x re-authentication
- 315 dot1x timeout re-authperiod
- 316 dot1x re-authenticate
- 316 dot1x timeout quiet-period
- 317 dot1x timeout tx-period
- 318 dot1x max-req
- 318 dot1x timeout supp-timeout
- 319 dot1x timeout server-timeout
- 320 show dot1x
- 322 show dot1x users
- 323 show dot1x statistics
- 325 dot1x auth-not-req
- 325 dot1x guest-vlan
- 326 dot1x single-host-violation
- 327 dot1x mac-authentication
- 328 show dot1x advanced
- 329 dot1x guest-vlan enable
- 330 Index