HP 10Gb Ethernet BL-c Switch Command Reference Guide

HP 10Gb Ethernet BL-c Switch
Command Reference Guide
Part number: 445944-001
First Edition: June 2007
Legal notices
© 2007 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set
forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
2
Contents
Contents
Command line interface
Introduction ........................................................................................................................................... 9
Additional references ............................................................................................................................. 9
Connecting to the switch ......................................................................................................................... 9
Establishing a console connection ..................................................................................................... 10
Setting an IP address ....................................................................................................................... 11
Establishing a Telnet connection........................................................................................................ 11
Establishing an SSH connection ........................................................................................................ 12
Accessing the switch............................................................................................................................. 13
Idle timeout ......................................................................................................................................... 14
Typographical conventions.................................................................................................................... 14
Menu basics
Introduction ......................................................................................................................................... 15
Main Menu ......................................................................................................................................... 15
Menu summary .................................................................................................................................... 15
Global commands................................................................................................................................ 16
Command line history and editing.......................................................................................................... 18
Command line interface shortcuts ........................................................................................................... 19
Command stacking ......................................................................................................................... 19
Command abbreviation ................................................................................................................... 19
Tab completion ............................................................................................................................... 19
First-time configuration
Introduction ......................................................................................................................................... 20
Configuring Simple Network Management Protocol support ................................................................. 21
Setting passwords ................................................................................................................................ 21
Changing the default administrator password ..................................................................................... 21
Changing the default user password.................................................................................................. 23
Changing the default operator password ........................................................................................... 24
Information Menu
Introduction ......................................................................................................................................... 25
Menu overview.................................................................................................................................... 25
System Information Menu ...................................................................................................................... 26
SNMPv3 Information Menu .............................................................................................................. 27
SNMPv3 USM User Table information ............................................................................................... 28
SNMPv3 View Table information ...................................................................................................... 29
SNMPv3 Access Table information.................................................................................................... 30
SNMPv3 Group Table information .................................................................................................... 31
SNMPv3 Community Table information.............................................................................................. 31
SNMPv3 Target Address Table information ........................................................................................ 32
SNMPv3 Target Parameters Table information .................................................................................... 32
SNMPv3 Notify Table information..................................................................................................... 33
SNMPv3 dump ............................................................................................................................... 34
System information .......................................................................................................................... 35
3
Contents
Show last 100 syslog messages ........................................................................................................ 36
System user information ................................................................................................................... 37
Layer 2 information .............................................................................................................................. 38
FDB information menu ..................................................................................................................... 39
Show all FDB information ................................................................................................................. 40
Clearing entries from the forwarding database .............................................................................. 40
Link Aggregation Control Protocol information .................................................................................... 41
LACP dump ............................................................................................................................... 41
802.1x information ......................................................................................................................... 42
Spanning Tree information ............................................................................................................... 44
Rapid Spanning Tree and Multiple Spanning Tree information .............................................................. 46
Common Internal Spanning Tree information ...................................................................................... 49
Trunk group information................................................................................................................... 51
VLAN information ........................................................................................................................... 51
Layer 2 general information.............................................................................................................. 52
Layer 3 information .............................................................................................................................. 53
Route information ............................................................................................................................ 54
Show all IP Route information ........................................................................................................... 55
ARP information .............................................................................................................................. 56
Show all ARP entry information .................................................................................................... 56
ARP address list information ........................................................................................................ 57
OSPF information............................................................................................................................ 57
OSPF general information ........................................................................................................... 58
OSPF interface information.......................................................................................................... 58
OSPF Database information menu................................................................................................ 59
OSPF route codes information ..................................................................................................... 60
Routing Information Protocol information ............................................................................................ 60
RIP Routes information ................................................................................................................ 61
RIP user configuration ................................................................................................................. 61
IP information ................................................................................................................................. 62
IGMP multicast group information ..................................................................................................... 62
IGMP group information ............................................................................................................. 63
IGMP multicast router information ................................................................................................ 64
VRRP information ............................................................................................................................ 64
QoS information .................................................................................................................................. 66
802.1p information......................................................................................................................... 66
ACL information................................................................................................................................... 68
RMON Information Menu ..................................................................................................................... 68
RMON history information ............................................................................................................... 68
RMON alarm information ................................................................................................................ 69
RMON event information ................................................................................................................. 70
Link status information........................................................................................................................... 71
Port information ................................................................................................................................... 72
Logical Port to GEA Port mapping .......................................................................................................... 73
Fiber Port SFP status ............................................................................................................................. 73
Uplink Failure Detection information ....................................................................................................... 74
Information dump................................................................................................................................. 74
Statistics Menu
Introduction ......................................................................................................................................... 75
Menu information................................................................................................................................. 75
Port Statistics Menu .............................................................................................................................. 76
4
Contents
802.1x statistics.............................................................................................................................. 77
Bridging statistics ............................................................................................................................ 79
Ethernet statistics ............................................................................................................................. 80
Interface statistics ............................................................................................................................ 82
Internet Protocol (IP) statistics ............................................................................................................ 83
Link statistics ................................................................................................................................... 84
Port RMON statistics........................................................................................................................ 84
Layer 2 statistics................................................................................................................................... 87
FDB statistics................................................................................................................................... 87
LACP statistics................................................................................................................................. 87
Layer 3 statistics................................................................................................................................... 88
GEA Layer 3 statistics menu.............................................................................................................. 89
GEA Layer 3 statistics ................................................................................................................. 89
IP statistics...................................................................................................................................... 90
Route statistics ................................................................................................................................ 91
ARP statistics .................................................................................................................................. 91
DNS statistics ................................................................................................................................. 91
ICMP statistics ................................................................................................................................ 92
TCP statistics................................................................................................................................... 93
UDP statistics .................................................................................................................................. 94
IGMP Multicast Group statistics......................................................................................................... 95
OSPF statistics menu ........................................................................................................................ 96
OSPF global statistics ................................................................................................................. 97
VRRP statistics ............................................................................................................................... 100
RIP statistics .................................................................................................................................. 101
Management Processor statistics .......................................................................................................... 101
Packet statistics ............................................................................................................................. 102
TCP statistics................................................................................................................................. 103
UDP statistics ................................................................................................................................ 103
CPU statistics ................................................................................................................................ 104
Access Control List (ACL) statistics menu ................................................................................................ 104
ACL statistics ................................................................................................................................ 104
SNMP statistics .................................................................................................................................. 105
NTP statistics ..................................................................................................................................... 107
Uplink Failure Detection statistics.......................................................................................................... 109
Statistics dump................................................................................................................................... 109
Configuration Menu
Introduction ....................................................................................................................................... 110
Menu information............................................................................................................................... 110
Viewing, applying, reverting, and saving changes ................................................................................. 111
Viewing pending changes................................................................................................................... 111
Applying pending changes ................................................................................................................. 111
Reverting changes.............................................................................................................................. 111
Saving the configuration ..................................................................................................................... 112
Reminders ......................................................................................................................................... 112
System configuration .......................................................................................................................... 113
System host log configuration ......................................................................................................... 114
Secure Shell Server configuration .................................................................................................... 116
RADIUS server configuration........................................................................................................... 117
TACACS+ server configuration ....................................................................................................... 118
NTP server configuration ................................................................................................................ 120
5
Contents
System SNMP configuration ........................................................................................................... 121
SNMPv3 configuration .................................................................................................................. 122
User Security Model configuration.............................................................................................. 123
SNMPv3 View configuration ..................................................................................................... 124
View-based Access Control Model configuration.......................................................................... 125
SNMPv3 Group configuration ................................................................................................... 126
SNMPv3 Community Table configuration .................................................................................... 126
SNMPv3 Target Address Table configuration............................................................................... 127
SNMPv3 Target Parameters Table configuration .......................................................................... 128
SNMPv3 Notify Table configuration ........................................................................................... 128
System Access configuration........................................................................................................... 129
Management Networks configuration .............................................................................................. 130
User Access Control configuration ................................................................................................... 131
User ID configuration..................................................................................................................... 132
HTTPS Access configuration............................................................................................................ 133
Port configuration............................................................................................................................... 134
Temporarily disabling a port........................................................................................................... 135
Port link configuration .................................................................................................................... 136
Port ACL/QoS configuration........................................................................................................... 137
Layer 2 configuration ......................................................................................................................... 138
802.1x configuration .................................................................................................................... 139
802.1x Global configuration..................................................................................................... 139
802.1x Port configuration ......................................................................................................... 140
Rapid Spanning Tree Protocol/ Multiple Spanning Tree Protocol configuration...................................... 142
Common Internal Spanning Tree configuration.................................................................................. 143
CIST bridge configuration ......................................................................................................... 144
CIST port configuration ............................................................................................................. 145
Spanning Tree configuration........................................................................................................... 147
Bridge Spanning Tree configuration ........................................................................................... 148
Spanning Tree port configuration ............................................................................................... 149
Forwarding Database configuration ................................................................................................ 150
Static FDB configuration............................................................................................................ 151
Trunk configuration........................................................................................................................ 152
IP Trunk Hash configuration ............................................................................................................ 153
Layer 2 IP Trunk Hash configuration ........................................................................................... 153
Link Aggregation Control Protocol configuration................................................................................ 154
LACP Port configuration ............................................................................................................ 154
VLAN configuration....................................................................................................................... 156
Layer 3 configuration ......................................................................................................................... 157
IP interface configuration................................................................................................................ 158
Default Gateway configuration ....................................................................................................... 159
IP Static Route configuration ........................................................................................................... 160
Address Resolution Protocol configuration ........................................................................................ 160
Static ARP configuration............................................................................................................ 161
IP Forwarding configuration ........................................................................................................... 161
Network Filter configuration ........................................................................................................... 162
Route Map configuration................................................................................................................ 162
IP Access List configuration ............................................................................................................. 163
Routing Information Protocol configuration........................................................................................ 164
RIP Interface configuration......................................................................................................... 164
RIP Route Redistribution configuration ......................................................................................... 166
Open Shortest Path First configuration.............................................................................................. 167
OSFP Area Index configuration.................................................................................................. 168
6
Contents
OSPF Summary Range configuration .......................................................................................... 169
OSPF Interface configuration .......................................................................................................... 170
OSPF Virtual Link configuration.................................................................................................. 171
OSPF Host Entry configuration ................................................................................................... 172
OSPF Route Redistribution configuration...................................................................................... 172
OSPF MD5 Key configuration.................................................................................................... 173
IGMP configuration ....................................................................................................................... 173
IGMP snooping configuration .................................................................................................... 174
IGMPv3 Snooping configuration ................................................................................................ 175
IGMP static multicast router configuration.................................................................................... 176
IGMP filtering configuration ...................................................................................................... 176
IGMP filter definition ................................................................................................................ 177
IGMP filtering port configuration ................................................................................................ 177
Domain Name System configuration................................................................................................ 178
Bootstrap Protocol Relay configuration ............................................................................................. 179
Virtual Router Redundancy Protocol configuration.............................................................................. 180
VRRP Virtual Router configuration ............................................................................................... 181
VRRP Virtual Router Priority Tracking configuration ....................................................................... 182
VRRP Virtual Router Group configuration ..................................................................................... 183
VRRP Virtual Router Group Priority Tracking configuration ............................................................. 185
VRRP Interface configuration...................................................................................................... 185
VRRP Tracking configuration...................................................................................................... 186
Quality of Service configuration........................................................................................................... 187
QoS 802.1p configuration............................................................................................................. 187
Access Control configuration ............................................................................................................... 188
Access Control List configuration ..................................................................................................... 188
ACL Ethernet Filter configuration ..................................................................................................... 190
ACL IP Version 4 Filter configuration................................................................................................ 191
ACL TCP/UDP Filter configuration ................................................................................................... 192
ACL Meter configuration ................................................................................................................ 193
ACL Re-mark configuration ............................................................................................................. 193
ACL Re-mark In-Profile configuration ........................................................................................... 194
ACL Re-mark In-Profile Update User Priority configuration .............................................................. 194
ACL Re-mark Out-of-Profile configuration ..................................................................................... 195
ACL Packet Format configuration..................................................................................................... 195
ACL Group configuration ............................................................................................................... 196
Remote Monitoring configuration ......................................................................................................... 197
RMON history configuration........................................................................................................... 197
RMON event configuration............................................................................................................. 198
RMON alarm configuration ............................................................................................................ 199
Port mirroring .................................................................................................................................... 201
Port-based port mirroring................................................................................................................ 201
Uplink Failure Detection configuration................................................................................................... 202
Failure Detection Pair configuration ................................................................................................. 203
Link to Monitor configuration .......................................................................................................... 203
Link to Disable configuration........................................................................................................... 204
Dump ............................................................................................................................................... 205
Saving the active switch configuration .................................................................................................. 205
Restoring the active switch configuration ............................................................................................... 205
Operations Menu
Introduction ....................................................................................................................................... 206
Menu information............................................................................................................................... 206
7
Contents
Operations-level port options .......................................................................................................... 207
Operations-level port 802.1x options .............................................................................................. 207
Operations-level VRRP options ........................................................................................................ 208
Boot Options Menu
Introduction ....................................................................................................................................... 209
Menu information............................................................................................................................... 209
Updating the switch software image ..................................................................................................... 209
Downloading new software to the switch ......................................................................................... 209
Selecting a software image to run ........................................................................................................ 211
Uploading a software image from the switch ......................................................................................... 211
Selecting a configuration block ............................................................................................................ 212
Resetting the switch ............................................................................................................................ 212
Accessing the ISCLI ............................................................................................................................ 213
Maintenance Menu
Introduction ....................................................................................................................................... 214
Menu information............................................................................................................................... 214
System maintenance options ........................................................................................................... 215
Forwarding Database options......................................................................................................... 216
Debugging options........................................................................................................................ 216
ARP cache options ........................................................................................................................ 217
IP Route Manipulation options......................................................................................................... 218
IGMP Multicast Group options ........................................................................................................ 218
IGMP Snooping options ................................................................................................................. 219
IGMP Mrouter options ................................................................................................................... 219
Uuencode flash dump .................................................................................................................... 220
FTP/TFTP system dump put ............................................................................................................. 220
Clearing dump information............................................................................................................. 220
Panic command ............................................................................................................................ 221
Unscheduled system dumps ................................................................................................................. 221
Index
8
Command line interface
Command line interface
Introduction
The HP 10Gb Ethernet BL-c Switch is ready to perform basic switching functions right out of the box. Some
of the more advanced features, however, require some administrative configuration before they can be
used effectively. This guide provides a command reference for the HP 10Gb Ethernet BL-c Switch.
The extensive switching software included in the switch provides a variety of options for accessing and
configuring the switch:
•
Built-in, text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or
remote Telnet/Secure Shell (SSH) session
•
Simple Network Management Protocol (SNMP) support for access through network management
software such as HP Systems Insight Manager
•
A browser-based management interface for interactive network access through the Web browser
The command line interface provides a direct method for collecting switch information and performing
switch configuration. Using a basic terminal, you can view information and statistics about the switch,
and perform any necessary configuration.
This chapter explains how to access the AOS CLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides,
which are available at http://www.hp.com/go/bladesystem/documentation.
•
•
•
•
•
HP 10Gb Ethernet BL-c Switch User Guide
HP 10Gb Ethernet BL-c Switch BladeSystem ISCLI Reference
HP 10Gb Ethernet BL-c Switch Application Guide
HP 10Gb Ethernet BL-c Switch Browser-based Interface Reference
HP 10Gb Ethernet BL-c Switch Quick Setup Instructions
Connecting to the switch
You can access the command line interface in one of the following ways:
•
•
•
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
9
Command line interface
Establishing a console connection
To establish a console connection with the switch, you need:
•
A null modem cable with a female DB-9 connector (See the HP 10Gb Ethernet BL-c Switch User
Guide for more information.)
•
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in
the table below
Table 1 Console configuration parameters
Parameter
Value
Baud Rate
9600
Data Bits
8
Parity
None
Stop Bits
1
Flow Control
None
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch. (For more information, see the
“Setting passwords” section in the “First-time configuration” chapter.)
10
Command line interface
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address
set for the switch. The switch can get its IP address in one of the following ways:
•
Management port access:
○ Using a Dynamic Host Control Protocol (DHCP) server—When the /cfg/sys/dhcp command
is enabled, the management interface (interface 250) requests its IP address from a DHCP server.
The default value for the /cfg/sys/dhcp command is enabled.
○ Configuring manually—If the network does not support DHCP, you must configure the
management interface (interface 250) with an IP address. If you want to access the switch from a
remote network, you also must configure the management gateway (gateway 254).
•
Uplink port access:
○ Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to
request its IP address from a BOOTP server. If you have a BOOTP server on the network, add the
Media Access Control (MAC) address of the switch to the BOOTP configuration file located on
the BOOTP server. The MAC address can be found in the System Information menu. (See the
“System information” section in the “Information Menu” chapter.) If you are using a DHCP server
that also does BOOTP, you do not have to configure the MAC address.
○ Configuring manually—If the network does not support BOOTP, you must configure the
management port with an IP address.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to the
network. Telnet provides the same options for user, operator, and administrator access as those available
through the console port. By default, Telnet is enabled on the switch. The switch supports four concurrent
Telnet connections.
Once the IP parameters are configured, you can access the CLI using a Telnet connection. To establish a
Telnet connection with the switch, run the Telnet program on the workstation and enter the telnet
command, followed by the switch IP address:
telnet <10GbE switch IP address>
You will then be prompted to enter a password. The password entered determines the access level:
administrator, operator, or user. See the “Accessing the switch” section later in this chapter for description
of default passwords.
11
Command line interface
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this
method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely
log into the switch over the network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over
the network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the
“Secure Shell Server configuration” section in the “Configuration Menu” chapter for information on how
to configure SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure
Copy (SCP) client will not be able to log in if the switch is performing key generation at that time or if
another client has just logged in before this client. Similarly, the system will fail to perform the key
generation if an SSH/SCP client is logging in at that time.
The supported SSH encryption and authentication methods are listed below.
•
•
•
Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection
Key Exchange—RSA
Encryption:
○
○
○
○
○
○
•
AES256-CBC
AES192-CBC
AES128-CBC
3DES-CBC
3DES
ARCFOUR
User Authentication—Local password authentication; Remote Authentication Dial-in User Service
(RADIUS)
The following SSH clients are supported:
•
•
•
•
•
SSH 3.0.1 for Linux (freeware)
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
OpenSSH_3.9 for Linux (FC 3)
FedoraCore 3 for SCP commands
PuTTY Release 0.58 (Simon Tatham) for Windows
NOTE: The switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH
clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You
may configure the client software to use protocol SSH version 1 or version 2.
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can
access the command line interface to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the
ssh command, followed by the user account name and the switch IP address:
>> # ssh <user>@<10Gb switch IP address>
You will then be prompted to enter your password.
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the
prompt, enter yes to continue.
12
Command line interface
Accessing the switch
To enable better switch management and user accountability, the switch provides different levels or
classes of user access. Levels of access to the CLI and Web management functions and screens increase
as needed to perform various switch management tasks. The three levels of access are:
•
User—User interaction with the switch is completely passive; nothing can be changed on the switch.
Users may display information that has no security or privacy implications, such as switch statistics
and current operational state information.
•
Operator—Operators can only effect temporary changes on the switch. These changes will be lost
when the switch is rebooted/reset. Operators have access to the switch management features used
for daily switch operations. Because any changes an operator makes are undone by a reset of the
switch, operators cannot severely impact switch operation, but do have access to the Maintenance
menu.
•
Administrator—Only administrators can make permanent changes to the switch configuration,
changes that are persistent across a reboot/reset of the switch. Administrators can access switch
functions to configure and troubleshoot problems on the switch. Because administrators can also
make temporary (operator-level) changes as well, they must be aware of the interactions between
temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you
are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password.
The password entered determines the access level. The default user names/password for each access
level is listed in the following table.
NOTE: It is recommended that you change default switch passwords after initial configuration and
as regularly as required under your network security policies. For more information, see the “Setting
passwords” section in the “First-time configuration” chapter.
Table 2 User access levels
User account Description and tasks performed
User
The user has no direct responsibility for switch management. He or she can view all switch status
information and statistics, but cannot make any configuration changes to the switch. The user
account is enabled by default, and the default password is user.
Oper
The operator manages all functions of the switch. The operator can reset ports or the entire
switch. By default, the operator account is disabled and has no password.
Admin
The super user administrator has complete access to all menus, information, and configuration
commands on the switch, including the ability to change both the user and administrator
passwords. The admin account is enabled by default, and the default password is admin.
NOTE: With the exception of the admin user, setting the password to an empty value can disable
access to each user level.
Once you enter the administrator password and it is verified, you are given complete access to the switch.
13
Command line interface
After logging in, the Main Menu of the CLI is displayed. See the “Menu basics” chapter for a summary of
the Main Menu options.
[Main Menu]
info
stats
cfg
oper
boot
maint
diff
apply
save
revert
exit
-
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
>> Main#
Idle timeout
By default, the switch will disconnect the console, Telnet, or SSH session after five minutes of inactivity.
This function is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. For
information on changing this parameter, see the “System configuration” section in the “Configuration
Menu” chapter.
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 3 Typographical conventions
Typeface or
symbol
Meaning
Example
AaBbCc123
This type depicts onscreen computer output and prompts.
Main#
AaBbCc123
This type displays in command examples and shows text
that must be typed in exactly as shown.
Main# sys
<AaBbCc123>
This italicized type displays in command examples as a
parameter placeholder. Replace the indicated text with the
appropriate real name or value when using the command.
Do not type the brackets.
To establish a Telnet session, enter:
host# telnet <IP address>
Read the user guide thoroughly.
This also shows guide titles, special terms, or words to be
emphasized.
[ ]
Command items shown inside brackets are optional and
can be used or excluded as the situation demands. Do not
type the brackets.
host# ls [-a]
14
Menu basics
Menu basics
Introduction
The AOS CLI is used for viewing switch information and statistics. In addition, the administrator can use
the CLI for performing all levels of switch configuration.
To make the CLI easy to use, the various commands have been logically grouped into a series of menus
and submenus. Each menu displays a list of commands and/or submenus that are available, along with a
summary of what each command will do. Below each menu is a prompt where you can enter any
command appropriate to the current menu.
This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that
commonly are available from all the menus within the CLI.
Main Menu
The Main Menu displays after a successful connection and login. The following table shows the Main
Menu for the administrator login. Some features are not available under the user login.
[Main Menu]
info
stats
cfg
oper
boot
maint
diff
apply
save
revert
exit
-
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
Menu summary
The Main Menu displays the following submenus:
•
Information Menu
The Information Menu provides submenus for displaying information about the current status of the
switch: from basic system settings to VLANs, and more.
•
Statistics Menu
This menu provides submenus for displaying switch performance statistics. Included are port, IP,
ICMP, TCP, UDP, SNMP, routing, ARP, and DNS.
•
Configuration Menu
This menu is available only from an administrator login. It includes submenus for configuring every
aspect of the switch. Changes to configuration are not active until explicitly applied. Changes can
be saved to non-volatile memory (NVRAM).
15
Menu basics
•
Operations Command Menu
Operations-level commands are used for making immediate and temporary changes to switch
configuration. This menu is used for bringing ports temporarily in and out of service. This menu is
available only from an administrator and operator login.
•
Boot Options Menu
The Boot Options Menu is available only from an administrator login. This menu is used for
upgrading switch software, selecting configuration blocks, and for resetting the switch when
necessary. This menu is also used to set the switch back to factory settings.
•
Maintenance Menu
This menu is used for debugging purposes, enabling you to generate a technical support dump of
the critical state information in the switch, and to clear entries in the Forwarding Database and the
Address Resolution Protocol (ARP) and routing tables. This menu is available only from an
administrator and operator login.
Global commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful for
obtaining online Help, navigating through menus, and for applying and saving configuration changes.
For help on a specific command, enter help. The following screen displays:
Global Commands: [can be issued from any menu]
help
up
print
lines
verbose
exit
diff
apply
save
ping
traceroute
telnet
pushd
popd
who
pwd
quit
revert
history
The following are used to navigate the menu structure:
. Print current menu
.. Move up one menu level
/ Top menu if first, or command separator
! Execute command from history
The following table describes the global commands.
Table 4 Global commands
Command
Action
? command or
help
Provides usage information about a specific command on the current menu. When used
without the command parameter, a summary of the global commands is displayed.
. or print
Displays the current menu.
.. or up
Moves up one level in the menu structure.
/
If placed at the beginning of a command, displays the Main Menu. Otherwise, this is used to
separate multiple commands placed on the same line.
lines
Sets the number of lines (n) that display on the screen at one time. The default is 24 lines.
When used without a value, the current setting is displayed.
diff
Shows any pending configuration changes that have not been applied.
diff flash displays all pending configuration changes that have been applied but not
saved to flash memory (NVRAM), as well as those that have not been applied.
16
Menu basics
Table 4 Global commands
Command
Action
apply
Applies pending configuration changes.
save
Saves the active configuration to backup, and saves the current configuration as active.
save n saves the current configuration as active, without saving the active configuration to
backup.
revert
Removes changes that have been made, but not applied.
revert apply removes all changes that have not been saved.
Exit or quit
Exits from the command line interface and logs out.
ping
Verifies station-to-station connectivity across the network. The format is:
ping <host name>|<IP address> [attempts (1-32)> [msec delay]]
[-m|-mgt|-d|-data]
•
•
•
•
traceroute
IP address is the hostname or IP address of the device.
number of tries (optional) is the number of attempts (1-32).
msec delay (optional) is the number of milliseconds between attempts.
By default, the -m or -mgt option for the management port is used. To use data ports,
specify the -d or –data option.
Identifies the route used for station-to-station connectivity across the network. The format is:
traceroute <host name>|<IP address> [<max-hops> [ msec delay ]]
• IP address is the hostname or IP address of the target station.
• max-hops (optional) is the maximum distance to trace (1-32 devices).
• msec delay (optional) is the number of milliseconds to wait for the response.
pwd
Displays the command path used to reach the current menu.
verbose n
Sets the level of information displayed on the screen:
•
•
•
•
telnet
0 = Quiet: Nothing displays except errors, not even prompts.
1 = Normal: Prompts and requested output are shown, but no menus.
2 = Verbose: Everything is shown. This is the default.
When used without a value, the current setting is displayed.
This command is used to Telnet out of the switch. The format is:
telnet <hostname> | <IP address> [port] [-m|-mgt|-d|-data]
By default, the -m or -mgt option for the management port is used. To use data ports,
specify the -d or –data option.
history
Displays the history of the last ten commands.
pushd
Remembers the current location in the directory of menu commands.
popd
Returns to the last pushd location.
who
Displays users who are logged in.
17
Menu basics
Command line history and editing
Using the command line interface, you can retrieve and modify previously entered commands with just a
few keystrokes. The following options are available globally at the command line:
Table 5 Command line history and editing options
Option
Description
history
Displays a numbered list of the last ten previously entered commands.
!!
Repeats the last entered command.
!n
Repeats the nth command shown on the history list.
<Ctrl-p> or Up arrow
key
Recalls the previous command from the history list. This can be used multiple times to
work backward through the last ten commands. The recalled command can be
entered as is, or edited using the options below.
<Ctrl-n> or Down
arrow key
Recalls the next command from the history list. This can be used multiple times to
work forward through the last ten commands. The recalled command can be entered
as is, or edited using the options below.
<Ctrl-a>
Moves the cursor to the beginning of the command line.
<Ctrl-e>
Moves cursor to the end of the command line.
<Ctrl-b> or Left arrow
key
Moves the cursor back one position to the left.
<Ctrl-f> or Right arrow Moves the cursor forward one position to the right.
key
<Backspace> or Delete
key
Erases one character to the left of the cursor position.
<Ctrl-d>
Deletes one character at the cursor position.
<Ctrl-k>
Erases all characters from the cursor position to the end of the command line.
<Ctrl-l>
Redisplays the current line.
<Ctrl-u>
Clears the entire line.
Other keys
Inserts new characters at the cursor position.
.
Prints the current level menu list.
..
Moves to the previous directory level.
18
Menu basics
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.
Command stacking
As a shortcut, you can type multiple commands on a single line, separated by forward slashes (/). You
can connect as many commands as required to access the menu option that you want.
For example, the keyboard shortcut to access the Simple Network Management Protocol (SNMP)
Configuration Menu from the Main# prompt is:
Main# cfg/sys/ssnmp/name
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from
the others in the same menu or submenu.
For example, the command shown above could also be entered as:
Main# c/sys/ssn/n
Tab completion
By entering the first letter of a command at any menu prompt and pressing the Tab key, the CLI will
display all commands or options in that menu that begin with that letter. Entering additional letters will
further refine the list of commands or options displayed.
If only one command fits the input text when the Tab key is pressed, that command will be supplied on the
command line, waiting to be entered. If the Tab key is pressed without any input on the command line,
the currently active menu displays.
19
First-time configuration
First-time configuration
Introduction
This chapter describes how to perform first-time configuration and how to change system passwords.
To begin first-time configuration of the switch, perform the following steps.
1. Connect to the switch console. After connecting, the login prompt displays.
HP 10Gb Ethernet BL-c Switch
Copyright(C)2006 Hewlett-Packard Development Company, L.P.
Password:
2. Enter admin as the default administrator password.
The system displays the Main Menu with administrator privileges.
[Main Menu]
info
stats
cfg
oper
boot
maint
diff
apply
save
revert exit
-
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
>> Main#
3. From the Main Menu, enter the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr
- Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg
- Backup current configuration to FTP/TFTP server
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
20
First-time configuration
Configuring Simple Network Management Protocol support
NOTE: SNMP support is enabled by default.
1. Use the following command to enable SNMP:
>> # /cfg/sys/access/snmp disable|read only|read/write
2. Set SNMP read or write community string. By default, they are public and private respectively:
>> # /cfg/sys/ssnmp/rcomm|wcomm
3. When prompted, enter the proper community string.
4. Apply and save configuration if you are not configuring the switch with Telnet support. Otherwise
apply and save after the performing the “Optional Setup for Telnet Support” steps.
>> System# apply
>> System# save
Setting passwords
HP recommends that you change all passwords after initial configuration and as regularly as required
under the network security policies. See the “Accessing the switch” section in the “Command line
interface” chapter for a description of the user access levels.
To change the user, operator, or administrator password, you must log in using the administrator
password. Passwords cannot be modified from the user or operator command mode.
NOTE: If you forget your administrator password, call HP technical support for help using the
password fix-up mode.
Changing the default administrator password
The administrator has complete access to all menus, information, and configuration commands, including
the ability to change the user, operator, and administrator passwords.
The default password for the administrator account is admin. To change the default password:
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# /cfg
21
First-time configuration
The Configuration Menu is displayed.
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr - Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg - Backup current configuration to FTP/TFTP server
gtcfg - Restore current configuration from FTP/TFTP server
cur
- Display current configuration
3. From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
The System Menu is displayed.
[System Menu]
syslog
sshd
radius
tacacs+
ntp
ssnmp
access
date
time
timezone
olddst
dlight
idle
notice
bannr
hprompt
bootp
reminders
cur
-
Syslog Menu
SSH Server Menu
RADIUS Authentication Menu
TACACS+ Authentication Menu
NTP Server Menu
System SNMP Menu
System Access Menu
Set system date
Set system time
Set system timezone (daylight savings)
Set system DST for US
Set system daylight savings
Set timeout for idle CLI sessions
Set login notice
Set login banner
Enable/disable display hostname (sysName) in CLI prompt
Enable/disable use of BOOTP
Enable/disable Reminders
Display current system-wide parameters
4. Enter the following command to set the administrator password:
System# access/user/admpw
5. Enter the current administrator password at the prompt:
Changing ADMINISTRATOR password; validation required...
Enter current administrator password:
NOTE: If you forget your administrator password, call your technical support representative for help
using the password fix-up mode.
6. Enter the new administrator password at the prompt:
Enter new administrator password:
22
First-time configuration
7. Enter the new administrator password, again, at the prompt:
Re-enter new administrator password:
8. Apply and save the change by entering the following commands:
System# apply
System# save
Changing the default user password
The user login has limited control of the switch. Through a user account, you can view switch information
and statistics, but you cannot make configuration changes.
The default password for the user account is user. This password cannot be changed from the user
account. Only the administrator has the ability to change passwords, as shown in the following
procedure.
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3. From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4. Enter the following command to set the user password:
System# access/user/usrpw
5. Enter the current administrator password at the prompt.
Only the administrator can change the user password. Entering the administrator password confirms
your authority.
Changing USER password; validation required...
Enter current administrator password:
6. Enter the new user password at the prompt:
Enter new user password:
7. Enter the new user password, again, at the prompt:
Re-enter new user password:
8. Apply and save the changes:
System# apply
System# save
23
First-time configuration
Changing the default operator password
The operator manages all functions of the switch. The operator can reset ports or the entire switch.
Operators can only effect temporary changes on the switch. These changes will be lost when the switch is
rebooted/reset. Operators have access to the switch management features used for daily switch
operations. Because any changes an operator makes are undone by a reset of the switch, operators
cannot severely impact switch operation.
By default, the operator account is disabled and has no password. This password cannot be changed
from the operator account. Only the administrator has the ability to change passwords, as shown in the
following procedure.
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3. From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4. Enter the following command to set the operator password:
System# access/user/opw
5. Enter the current administrator password at the prompt.
Only the administrator can change the user password. Entering the administrator password confirms
your authority.
Changing OPERATOR password; validation required...
Enter current administrator password:
6. Enter the new operator password at the prompt:
Enter new operator password:
7. Enter the new operator password, again, at the prompt:
Re-enter new operator password:
8. Apply and save the changes:
System# apply
System# save
24
Information Menu
Information Menu
Introduction
You can view configuration information for the switch in the user, operator, and administrator command
modes. This chapter discusses how to use the CLI to display switch information.
Menu overview
Command: /info
[Information Menu]
sys
- System Information Menu
l2
- Layer 2 Information Menu
l3
- Layer 3 Information Menu
qos
- QoS Menu
acl
- Show ACL information
rmon
- Show RMON information
link
- Show link status
port
- Show port information
geaport - Show system port and gea port mapping
sfp
- Show External Port SFP/XFP status
ufd
- Show Uplink Failure Detection information
dump
- Dump all information
The following table describes the Information Menu options.
Table 6 Information Menu options
Command
Usage
sys
Displays system information.
l2
Displays the Layer 2 Information Menu.
l3
Displays the Layer 3 Information Menu.
qos
Displays the Quality of Service (QoS) Information Menu.
acl
Displays the Access Control List Information Menu.
rmon
Displays the Remote Monitoring Information Menu.
link
Displays configuration information about each port, including:
•
•
•
•
•
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
25
Information Menu
Table 6 Information Menu options
Command
Usage
port
Displays port status information, including:
•
•
•
•
•
Port number
Whether the port uses VLAN tagging or not
Port VLAN ID (PVID)
Port name
VLAN membership
geaport
Displays GEA port mapping information, used by service personnel.
sfp
Displays the status of the Small Form Pluggable (SFP) module on each Fiber External
Port.
ufd
Displays Uplink Failure Detection information.
dump
Dumps all switch information available from the Information Menu (10K or more,
depending on your configuration).
If you want to capture dump data to a file, set your communication software on your
workstation to capture session data prior to issuing the dump commands.
System Information Menu
Command: /info/sys
[System Menu]
snmpv3
general
log
user
dump
-
SNMPv3 Information Menu
Show general system information
Show last 100 syslog messages
Show current user status
Dump all system information
The following table describes the System Information Menu options.
Table 7 System Information Menu options
Command
Usage
snmpv3
Displays the SNMP v3 Menu.
general
Displays system information, including:
•
•
•
•
•
•
•
•
•
•
System date and time
Switch model name and number
Switch name and location
Time of last boot
MAC address of the switch management processor
IP address of IP interface #1
Hardware version and part number
Software image file and version number
Configuration name
Log-in banner, if one is configured
26
Information Menu
Table 7 System Information Menu options
Command
Usage
log
Displays 100 most recent syslog messages.
user
Displays the User Access Information Menu.
dump
Dumps all switch information available from the Information Menu (10K or more, depending
on your configuration).
SNMPv3 Information Menu
Command: /info/sys/snmpv3
[SNMPv3 Information Menu]
usm
- Show usmUser table information
view
- Show vacmViewTreeFamily table information
access
- Show vacmAccess table information
group
- Show vacmSecurityToGroup table information
comm
- Show community table information
taddr
- Show targetAddr table information
tparam
- Show targetParams table information
notify
- Show notify table information
dump
- Show all SNMPv3 information
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework
by supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information Menu options.
Table 8 SNMPv3 Information Menu options
Command
Usage
usm
Displays User Security Model (USM) table information.
view
Displays information about view name, subtrees, mask and type of view.
access
Displays View-based Access Control information.
group
Displays information about the group that includes the security model, user name, and
group name.
comm
Displays information about the community table.
taddr
Displays the Target Address table.
tparam
Displays the Target parameters table.
notify
Displays the Notify table.
dump
Displays all the SNMPv3 information.
27
Information Menu
SNMPv3 USM User Table information
Command: /info/sys/snmpv3/usm
usmUser Table:
User Name
-------------------------------adminmd5
adminsha
v1v2only
Protocol
-------------------------------HMAC_MD5, DES PRIVACY
HMAC_SHA, DES PRIVACY
NO AUTH, NO PRIVACY
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and
privacy of messages. This security model makes use of a defined set of user identities displayed in the
USM user table. The USM user table contains information like:
•
•
•
the user name
•
the privacy protocol.
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can
be authenticated
The following table describes the SNMPv3 User Table information.
Table 9 User Table parameters
Field
Description
User Name
This is a string that represents the name of the user that you can use to access the switch.
Protocol
This indicates whether messages sent on behalf of this user are protected from disclosure using
a privacy protocol. Switch software supports DES algorithm for privacy. The software also
supports two authentication algorithms: MD5 and HMAC-SHA.
28
Information Menu
SNMPv3 View Table information
Command: /info/sys/snmpv3/view
View Name
Subtree
Mask
Type
-----------------
----------------------
-------------
--------
iso
1
included
v1v2only
1
included
v1v2only
1.3.6.1.6.3.15
excluded
v1v2only
1.3.6.1.6.3.16
excluded
v1v2only
1.3.6.1.6.3.18
excluded
29
Information Menu
The user can control and restrict the access allowed to a group to only a subset of the management
information in the management domain that the group can access within each context by specifying the
group’s rights in terms of a particular MIB view for security reasons.
The following table describes the SNMPv3 View Table information.
Table 10 View Table parameters
Field
Description
View Name
Displays the name of the view.
Subtree
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances
which have a common Object Identifier prefix to their names.
Mask
Displays the bit mask.
Type
Displays whether a family of view subtrees is included or excluded from the MIB view.
SNMPv3 Access Table information
Command: /info/sys/snmpv3/access
Group Name
---------v1v2grp
admingrp
Model
------snmpv1
usm
Level
-----------noAuthNoPriv
authPriv
ReadV
--------iso
iso
WriteV
-------iso
iso
NotifyV
------v1v2only
iso
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which
could be the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking
access rights of a group. This group’s access rights are determined by a read-view, a write-view, and a
notify-view. The read-view represents the set of object instances authorized for the group while reading
the objects. The write-view represents the set of object instances authorized for the group when writing
objects. The notify-view represents the set of object instances authorized for the group when sending a
notification.
The following table describes the SNMPv3 Access Table information.
Table 11 Access Table parameters
Field
Description
Group Name
Displays the name of group.
Prefix
Displays the prefix that is configured to match the values.
Model
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example,
noAuthNoPriv, authNoPriv, or auth-Priv.
ReadV
Displays the MIB view to which this entry authorizes the read access.
WriteV
Displays the MIB view to which this entry authorizes the write access.
NotifyV
Displays the Notify view to which this entry authorizes the notify access.
30
Information Menu
SNMPv3 Group Table information
Command: /info/sys/snmpv3/group
Sec Model
--------snmpv1
usm
usm
User Name
----------------------------v1v2only
adminmd5
adminsha
Group Name
-------------------v1v2grp
admingrp
admingrp
A group is a combination of security model and security name that defines the access rights assigned to
all the security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 12 Group Table parameters
Field
Description
Sec Model
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
User Name
Displays the name for the group.
Group Name
Displays the access name of the group.
SNMPv3 Community Table information
Command: /info/sys/snmpv3/comm
Index
Name
User Name
Tag
---------- ---------- -------------------- ---------trap1
public
v1v2only
v1v2trap
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Table 13 Community Table parameters
Field
Description
Index
Displays the unique index value of a row in this table.
Name
Displays the community string, which represents the configuration.
User Name
Displays the User Security Model (USM) user name.
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a
command responder application sends an SNMP trap.
31
Information Menu
SNMPv3 Target Address Table information
Command: /info/sys/snmpv3/taddr
Name
---------trap1
Transport Addr
--------------47.81.25.66
Port
---162
Taglist
---------v1v2trap
Params
--------------v1v2param
This command displays the SNMPv3 target address table information, which is stored in the SNMP
engine.
The following table describes the SNMPv3 Target Address Table information.
Table 14 Target Address Table parameters
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this
snmpTargetAddrEntry.
Transport Addr
Displays the transport addresses.
Port
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The
identified entry contains SNMP parameters to be used when generating messages to
be sent to this transport address.
SNMPv3 Target Parameters Table information
Command: /info/sys/snmpv3/tparam
Name
-------------v1v2param
MP Model
--------snmpv2c
User Name
----------------v1v2only
Sec Model
---------snmpv1
Sec Level
--------noAuthNoPriv
The following table describes the SNMPv3 Target Parameters Table information.
Table 15 Target Parameters Table
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this entry.
User Name
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Sec Model
Displays the security model used when generating SNMP messages using this entry. The system
may choose to return an inconsistentValue error if an attempt is made to set this variable to a value
for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
32
Information Menu
SNMPv3 Notify Table information
Command: /info/sys/snmpv3/notify
Name
Tag
-------------------- -------------------v1v2trap
v1v2trap
The following table describes the SNMPv3 Notify Table information.
Table 16 SNMPv3 Notify Table
Field
Description
Name
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
Tag
This represents a single tag value which is used to select entries in the
snmpTargetAddrTable. Any entry in the snmpTargetAddrTable that contains a tag
value equal to the value of this entry is selected. If this entry contains a value of zero length, no
entries are selected.
33
Information Menu
SNMPv3 dump
Command: /info/sys/snmpv3/dump
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00
usmUser Table:
User Name
Protocol
-------------------------------- -------------------------------admin
NO AUTH, NO PRIVACY
adminmd5
HMAC_MD5, DES PRIVACY
adminsha
HMAC_SHA, DES PRIVACY
v1v2only
NO AUTH, NO PRIVACY
vacmAccess Table:
Group Name Prefix Model
---------- ------ ------admin
usm
v1v2grp
snmpv1
admingrp
usm
Level
-----------noAuthNoPriv
noAuthNoPriv
authPriv
Match
-----exact
exact
exact
ReadV
------org
org
org
vacmViewTreeFamily Table:
View Name
Subtree
Mask
-------------------- --------------- -----------org
1.3
v1v2only
1.3
v1v2only
1.3.6.1.6.3.15
v1v2only
1.3.6.1.6.3.16
v1v2only
1.3.6.1.6.3.18
vacmSecurityToGroup Table:
Sec Model
User Name
---------- ------------------------------snmpv1
v1v2only
usm
admin
usm
adminsha
WriteV
-------org
org
org
NotifyV
-----org
v1v2only
org
Type
-------------included
included
excluded
excluded
excluded
Group Name
----------------------v1v2grp
admin
admingrp
snmpCommunity Table:
Index
Name
User Name
Tag
---------- ---------- -------------------- ---------snmpNotify Table:
Name
Tag
-------------------- -------------------snmpTargetAddr Table:
Name
Transport Addr Port Taglist
Params
---------- --------------- ---- ---------- --------------snmpTargetParams Table:
Name
MP Model User Name
Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
34
Information Menu
System information
Command: /info/sys/gen
System Information at 6:56:22 Thu Jan 11, 2007
Time zone: America/US/Pacific
HP 10Gb Ethernet BL-c Switch
sysName:
MySwitch
sysLocation:
RackId: Default RUID
RackName: MyRack
EnclosureSerialNumber: USE6351M46
EnclosureName: 1Z34AB789012
BayNumber: 7
Switch has been up for 3 days, 14 hours, 56 minutes and 22 seconds.
Last boot: 17:25:38 Mon Jan 8, 2007 (software reset)
MAC address: 00:10:00:01:00:01
IP (If 1) address: 10.14.4.16
Management Port MAC Address: 00:10:18:00:00:00
Management Port IP Address (if 250): 10.20.7.15
Revision: 0A
Switch Serial No:
Hardware Part No:
Spare Part No:
Software Version 1.0.0 (FLASH image2), active configuration.
System information includes:
•
•
•
•
•
•
•
•
•
System date and time
Switch model name and number
HP c-Class Rack name and location
Time of last boot
MAC address of the switch management processor
IP address of the switch
Software image file and version number
Current configuration block (active, backup, or factory default)
Login banner, if one is configured
35
Information Menu
Show last 100 syslog messages
Command: /info/sys/log
Date
---Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Jul 8
Time
---17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:42
17:25:42
17:25:42
17:25:42
17:25:42
17:25:42
Severity level
----------------NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
link
Message
-----------up on port 1
up on port 8
up on port 7
up on port 12
up on port 11
up on port 14
up on port 13
up on port 16
up on port 15
up on port 17
up on port 20
up on port 18
up on port 19
up on port 21
up on port 4
up on port 3
up on port 6
up on port 5
up on port 10
up on port 9
Each message contains a date and time field and has a severity level associated with it. One of eight
different prefixes is used to indicate the condition:
•
•
•
•
•
•
•
•
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
36
Information Menu
System user information
Command: /info/sys/user
Usernames:
user
- enabled
oper
- disabled
admin
- Always Enabled
Current User ID table:
1: name tech1
, ena, cos user
2: name tech2
, ena, cos user
, password valid, online
, password valid, offline
The following table describes the User Name information.
Table 17 User Name information menu
Field
Usage
user
Displays the status of the user access level.
oper
Displays the status of the oper (operator) access level.
admin
Displays the status of the admin (administrator) access level.
Current User ID Table
Displays the status of configured user IDs. To configure new user IDs, use the
/cfg/sys/access/user/uid command.
37
Information Menu
Layer 2 information
Command: /info/l2
[Layer 2 Menu]
fdb
lacp
8021x
stp
cist
trunk
vlan
gen
dump
-
Forwarding Database Information Menu
Link Aggregation Control Protocol Menu
Show 802.1x information
Show STP information
Show CIST information
Show Trunk Group information
Show VLAN information
Show general information
Dump all layer 2 information
The following table describes the Layer 2 Information Menu options.
Table 18 Layer 2 Information Menu options
Command
Usage
fdb
Displays the Forwarding Database Information Menu.
lacp
Displays the Link Aggregation Control Protocol Information Menu.
8021x
Displays the 802.1x Information Menu.
stp
In addition to seeing if STP is enabled or disabled, you can view the following STP bridge
information:
•
•
•
•
•
Priority
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP information:
• Port number and priority
• Cost
• State
cist
Displays Common internal Spanning Tree (CIST) bridge information, including the following:
•
•
•
•
Priority
Hello interval
Maximum age value
Forwarding delay
You can also view port-specific CIST information, including the following:
• Port number and priority
• Cost
• State
trunk
When trunk groups are configured, you can view the state of each port in the various trunk
groups.
38
Information Menu
Table 18 Layer 2 Information Menu options
Command
Usage
vlan
Displays VLAN configuration information, including:
•
•
•
•
VLAN Number
VLAN Name
Status
Port membership of the VLAN
gen
Displays general Layer 2 configuration information.
dump
Dumps all switch information available from the Layer 2 menu (10K or more, depending on
your configuration).
If you want to capture dump data to a file, set your communication software on your
workstation to capture session data prior to issuing the dump commands.
FDB information menu
Command: /info/l2/fdb
[Forwarding Database Menu]
find
- Show a single FDB entry by MAC address
port
- Show FDB entries on a single port
vlan
- Show FDB entries on a single VLAN
state
- Show FDB entries by state
dump
- Show all FDB entries
The forwarding database (FDB) contains information that maps the media access control (MAC) address
of each known device to the switch port where the device address was learned. The FDB also shows
which other ports have seen frames destined for a particular MAC address.
NOTE: The master forwarding database supports up to 8K MAC address entries on the
management processor (MP) per switch.
39
Information Menu
Table 19 FDB information menu info/12/fdb
Command
Usage
find <MAC address> [<VLAN>]
Displays a single database entry by its MAC address. You are prompted
to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx. (For
example: 08:00:20:12:34:56)
You can also enter the MAC address using the format: xxxxxxxxxxxx.
(For example: 080020123456)
port <port number>
Displays all FDB entries for a particular port.
vlan <1-4095>
Displays all FDB entries on a single VLAN. The range is 1-4095.
state unknown|ignore|
forward|flood|trunk|ifmac
Displays all FDB entries that match a particular state.
dump
Displays all entries in the Forwarding Database.
Show all FDB information
Command: /info/l2/fdb/dump
MAC address
----------------00:02:01:00:00:00
00:02:01:00:00:01
00:02:01:00:00:02
00:02:01:00:00:03
00:02:01:00:00:04
00:02:01:00:00:05
00:02:01:00:00:06
00:02:01:00:00:07
00:02:01:00:00:08
00:02:01:00:00:09
00:02:01:00:00:0a
00:02:01:00:00:0b
00:02:01:00:00:0c
VLAN
---300
300
300
300
300
300
300
300
300
300
300
300
300
Port
----
Trnk
---1
20
20
20
20
20
20
20
20
20
20
20
20
State
----TRK
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the
trunking (TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as
unknown (UNK), the MAC address has not yet been learned by the switch, but has only been seen as a
destination address. When an address is in the unknown state, no outbound port is indicated.
Clearing entries from the forwarding database
To delete a static MAC address from the forwarding database (FDB), see the “Static FDB configuration”
section in the “Configuration Menu” chapter. To clear the entire forwarding database (FDB), see the
“Forwarding Database options” section in the “Maintenance Menu” chapter.
40
Information Menu
Link Aggregation Control Protocol information
Command: /info/l2/lacp
[LACP Menu]
aggr
port
dump
- Show LACP aggregator information for the port
- Show LACP port information
- Show all LACP ports information
The following table describes the Link Aggregation Control Protocol Menu options.
Table 20 LACP information
Command
Usage
aggr
Displays LACP aggregator information for the port.
port
Displays LACP information for the port.
dump
Displays all LACP information parameters.
LACP dump
Command: /info/l2/lacp/dump
>> LACP# dump
port lacp
adminkey
operkey
selected
prio
attached trunk
aggr
-----------------------------------------------------------------1
off
1
1
n
32768
--2
off
2
2
n
32768
--3
off
3
3
n
32768
--4
off
4
4
n
32768
--5
off
5
5
n
32768
--6
off
6
6
n
32768
--7
off
7
7
n
32768
--8
off
8
8
n
32768
--…
LACP dump includes the following information for each port in the switch:
•
•
•
•
•
•
•
lacp—Displays the port’s LACP mode (active, passive, or off)
adminkey—Displays the value of the port’s adminkey.
operkey—Shows the value of the port’s operational key.
selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.
prio—Shows the value of the port priority.
attached aggr—Displays the aggregator associated with each port.
trunk—This value represents the LACP trunk group number.
41
Information Menu
802.1x information
Command: /info/l2/8021x
System capability : Authenticator
System status
: disabled
Protocol version : 1
Authenticator
Backend
Port
Auth Mode
Auth Status
PAE State
Auth State
---- ------------ ------------ -------------- ---------1
force-auth
unauthorized initialize
initialize
2
force-auth
unauthorized initialize
initialize
3
force-auth
unauthorized initialize
initialize
4
force-auth
unauthorized initialize
initialize
5
force-auth
unauthorized initialize
initialize
6
force-auth
unauthorized initialize
initialize
7
force-auth
unauthorized initialize
initialize
8
force-auth
unauthorized initialize
initialize
9
force-auth
unauthorized initialize
initialize
10
force-auth
unauthorized initialize
initialize
11
force-auth
unauthorized initialize
initialize
12
force-auth
unauthorized initialize
initialize
13
force-auth
unauthorized initialize
initialize
14
force-auth
unauthorized initialize
initialize
15
force-auth
unauthorized initialize
initialize
16
force-auth
unauthorized initialize
initialize
*18
force-auth
unauthorized initialize
initialize
*19
force-auth
unauthorized initialize
initialize
*20
force-auth
unauthorized initialize
initialize
*21
force-auth
unauthorized initialize
initialize
-----------------------------------------------------------------* - Port down or disabled
The following table describes the IEEE 802.1x parameters.
Table 21 802.1x information
Field
Description
Port
Displays each port’s name.
Auth Mode
Displays the Access Control authorization mode for the port. The
Authorization mode can be one of the following:
• force-unauth
• auto
• force-auth
Auth Status
Displays the current authorization status of the port, either authorized or
unauthorized.
42
Information Menu
Table 21 802.1x information
Field
Description
Authenticator PAE State
Displays the Authenticator Port Access Entity State. The PAE state can be one
of the following:
•
•
•
•
•
•
•
•
Backend Auth State
initialize
disconnected
connecting
authenticating
authenticated
aborting
held
forceAuth
Displays the Backend Authorization State. The Backend Authorization state
can be one of the following:
•
•
•
•
•
•
request
response
success
fail
timeout
idle
43
Information Menu
Spanning Tree information
Command: /info/l2/stp
-----------------------------------------------------------------upfast disabled, update 40
-----------------------------------------------------------------Spanning Tree Group 1: On (STP/PVST+)
VLANs: 1
Current Root:
8000 00:02:a5:d1:0f:ed
Parameters:
Port
---1
2
3
Priority
32768
Priority
-------0
0
0
Cost
---0
0
0
Path-Cost
8
Hello
2
FastFwd
-------n
n
n
MaxAge
20
Port
20
FwdDel
15
Hello MaxAge FwdDel
2
20
15
Aging
300
State
Designated Bridge
----------- ----------------FORWARDING *
FORWARDING *
FORWARDING *
Des Port
-------
44
Information Menu
The switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). If RSTP/MSTP is turned on, see
the “Rapid Spanning Tree information” section for Spanning Tree Group information. In addition to
seeing if STP is enabled or disabled, you can view the following STP bridge information:
•
•
•
•
•
•
•
•
Status of Uplink Fast (upfast)
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP information:
•
•
•
•
•
•
Port number and priority
Cost
State
Port Fast Forwarding state
Designated bridge
Designated port
The following table describes the STP parameters.
Table 22 STP parameters
Parameters
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes
the priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current
root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the
STP root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the
STP network. If the bridge is not the root bridge, it uses the MaxAge value of the root
bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge
port has to wait before it changes from learning state to forwarding state. If the bridge
is not the root bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the
Forwarding Database.
45
Information Menu
Table 22 STP parameters
Parameters
Description
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single
segment, the port with the lowest port priority becomes the designated port for the
segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost.
State
The State field shows the current state of the port. The State field can be one of the
following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected. This
information includes the port priority (hex) and the port number (hex).
Rapid Spanning Tree and Multiple Spanning Tree information
Command: /info/l2/stp
-----------------------------------------------------------------upfast disabled, update 40
-----------------------------------------------------------------Spanning Tree Group 1: On (RSTP)
VLANs: 1-3
Current Root:
8000 00:00:01:00:19:00
Parameters:
Port
---1
2
3
4
5
6
7
8
9
10
11
12
Prio
---0
0
0
0
0
0
0
0
0
0
0
0
Priority
32768
Cost
---0
0
0
0
0
0
0
0
0
0
0
0
Path-Cost
0
Hello
9
State
-----DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DISC
FWD
FWD
Role
----
MaxAge
20
Port Hello MaxAge FwdDel
0
9
20
15
FwdDel
15
Aging
300
Designated Bridge
Des Port
------------------- --------
DESG 8000-00:00:01:00:19:00
DESG 8000-00:00:01:00:19:00
8017
8018
Type
----
P2P2,Edge
P2P
46
Information Menu
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE
802.1s Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following
RSTP bridge information for the Spanning Tree Group:
•
•
•
•
•
•
•
•
Status of Uplink Fast (upfast)
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific RSTP information:
•
•
•
•
•
•
Port number and priority
Cost
State
Role
Designated bridge and port
Link type
The following table describes the STP parameters in RSTP or MSTP mode.
Table 23 Rapid Spanning Tree parameter descriptions
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current
root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge
port has to wait before it changes from learning state to forwarding state. If the bridge is
not the root bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the
Forwarding Database.
47
Information Menu
Table 23 Rapid Spanning Tree parameter descriptions
Parameter
Description
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single
segment, the port with the lowest port priority becomes the designated port for the
segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A setting of
zero (0) indicates that the cost will be set to the appropriate default after the link speed
has been auto-negotiated.
State
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of
the following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or Disabled
(DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master
(MAST), or Unknown (UNK).
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected.
Type
Type of link connected to the port, and whether the port is an edge port. Link type
values are AUTO, P2P, or SHARED.
MSTP: The Type field appears in /info/cist.
48
Information Menu
Common Internal Spanning Tree information
Command: /info/l2/cist
Mstp Digest: 0xac36177f50283cd4b83821d8ab26de62
Common Internal Spanning Tree:
VLANs MAPPED: 1-16 18-31 33-4094
VLANs: 1 25 26 4095
Current Root:
8000 00:03:42:fa:3b:80
Path-Cost
0
Port
1
MaxAge
20
FwdDel
15
CIST Regional Root:
Path-Cost
8000 00:03:42:fa:3b:81
11
Parameters:
Port
---1
2
3
4
5
6
7
8
9
10
11
12
...
Prio
---128
128
128
128
128
128
128
128
128
128
128
128
Priority
32768
MaxAge
20
FwdDel
15
Hops
20
Cost State Role Designated Bridge
Des Port Hello Type
---- ------ ---- --------------------- -------- ----- ---2000
FWD
DESG 8000-00:03:42:fa:3b:80 8001
4 P2P, Edge
2000
FWD
DESG 8000-00:03:42:fa:3b:80 8002
2000
DSB
2000
DSB
2000
DSB
2000
DSB
2000
DSB
2000
DSB
2000
DSB
0
DSB
2000
FWD
DESG 8000-00:03:42:fa:3b:80
2000
DSB
In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the
following CIST bridge information:
•
•
•
•
•
•
•
Status of Uplink Fast (upfast)
CIST root
CIST regional root
Priority
Maximum age value
Forwarding delay
Hops
You can also refer to the following port-specific CIST information:
•
•
•
•
•
•
•
Port number and priority
Cost
State
Role
Designated bridge and port
Hello interval
Link type and port type
49
Information Menu
The following table describes the CIST parameters.
Table 24 Common Internal Spanning Tree parameter description
Parameter
Description
CIST Root
Shows information about the root bridge for the Common Internal Spanning Tree (CIST).
Values on this row of information refer to the CIST root.
CIST Regional Root
Shows information about the root bridge for this MSTP region. Values on this row of
information refer to the regional root.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge
port has to wait before it changes from learning state to forwarding state.
Hops
Shows the maximum number of bridge hops allowed before a packet is dropped.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single
segment, the port with the lowest port priority becomes the designated port for the
segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A setting of
zero (0) indicates that the cost will be set to the appropriate default after the link speed
has been auto-negotiated.
State
Shows the current state of the port. The state field can be one of the following:
Discarding (DISC), Forwarding (FWD), or Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master
(MAST).
Designated Bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated Port
The port ID of the port on the Designated Bridge to which this port is connected.
Information includes the port priority (hex) and the port number (hex).
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
Type
Type of link connected to the port, and whether the port is an edge port. Link type
values are AUTO, P2P, or SHARED.
50
Information Menu
Trunk group information
Command: /info/l2/trunk
Trunk group 1, Enabled
port state:
20: STG 1 forwarding
21: STG 1 forwarding
When trunk groups are configured, you can view the state of each port in the various trunk groups.
NOTE: If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining
ports in the trunk group will also be set to forwarding.
VLAN information
Command: /info/l2/vlan
VLAN
---1
2
7
11
14
15
16
17
18
19
20
21
22
24
300
4000
4095
Name
Status
-------------------------------- -----Default VLAN
ena
pc03p
ena
pc07f
ena
pc04u
ena
8600-14
ena
8600-15
ena
8600-16
ena
8600-17
ena
35k-1
ena
35k-2
ena
35k-3
ena
35k-4
ena
pc07z
ena
redlan
ena
ixiaTraffic
ena
bpsports
ena
Mgmt VLAN
ena
Ports
---------------4 5
2
7
11
14
15
16
6
18
19
20
21
21
21
1 12 13 23
3-6 8-10
17
This information display includes all configured VLANs and all member ports that have an active link
state.
VLAN information includes:
•
•
•
•
VLAN Number
VLAN Name
Status
Port membership of the VLAN
51
Information Menu
Layer 2 general information
Command: /info/l2/gen
STP uplink fast mode : disabled
The following table describes the Layer 2 general information.
Table 25 L2 general information
Field
Description
STP uplink fast mode
Displays the status of STP Uplink Fast: enabled or disabled.
52
Information Menu
Layer 3 information
Command: /info/l3
[Layer 3 Menu]
route
arp
ospf
rip
ip
igmp
vrrp
dump
-
IP Routing Information Menu
ARP Information Menu
OSPF Routing Information Menu
RIP Routing Information Menu
Show IP information
Show IGMP Snooping Multicast Group information
Show Virtual Router Redundancy Protocol information
Dump all layer 3 information
The following table describes the Layer 3 Information Menu options.
Table 26 Layer 3 Information Menu options
Command
Usage
route
Displays the IP Routing Menu. Using the options of this menu, the system displays the following
for each configured or learned route:
•
•
•
•
Route destination IP address, subnet mask, and gateway address
Type of route
Tag indicating origin of route
Metric for RIP tagged routes, specifying the number of hops to the destination (1-15 hops,
or 16 for infinite hops)
• The IP interface that the route uses
arp
Displays the Address Resolution Protocol (ARP) Information Menu.
ospf
Displays OSPF routing Information Menu.
rip
Displays Routing Information Protocol Menu.
ip
Displays IP Information. IP information, includes:
• IP interface information: Interface number, IP address, subnet mask, VLAN number, and
operational status.
• Default gateway information: Metric for selecting which configured gateway to use,
gateway number, IP address, and health status
• IP forwarding information: Enable status, lnet and lmask
• Port status
igmp
Displays IGMP Information Menu.
vrrp
Displays the VRRP Information Menu.
dump
Dumps all switch information available from the Layer 3 Menu (10K or more, depending on
your configuration).
If you want to capture dump data to a file, set your communication software on your
workstation to capture session data prior to issuing the dump commands.
53
Information Menu
Route information
Command: /info/l3/route
[IP Routing Menu]
find
- Show
gw
- Show
type
- Show
tag
- Show
if
- Show
dump
- Show
a single route by destination IP address
routes to a single gateway
routes of a single type
routes of a single tag
routes on a single interface
all routes
Using the commands listed below, you can display all or a portion of the IP routes currently held in the
switch.
Table 27 Route Information menu options
Command
Usage
find <IP address>
Displays a single route by IP address. For example, 100.10.1.1.
gw <IP address>
Displays routes to a single gateway. For example, 100.10.1.2.
type indirect|direct|local|
broadcast|martian|multicast
Displays routes of a single type.
tag fixed|static|addr|rip|ospf|
broadcast|martian|multicast
Displays routes of a single tag.
if <1-250>
Displays routes on a single interface.
dump
Displays all routes configured in the switch.
54
Information Menu
Show all IP Route information
Command: /info/l3/route/dump
Status code: * - best
Destination
Mask
----------------------------* 11.0.0.0
255.0.0.0
* 11.0.0.1
255.255.255.255
* 11.255.255.255
255.255.255.255
* 12.0.0.0
255.0.0.0
* 12.0.0.1
255.255.255.255
* 12.255.255.255
255.255.255.255
* 13.0.0.0
255.0.0.0
* 47.0.0.0
255.0.0.0
* 47.133.88.0
255.255.255.0
* 172.30.52.223
255.255.255.255
* 224.0.0.0
224.0.0.0
* 224.0.0.5
255.255.255.255
Gateway
--------------11.0.0.1
11.0.0.1
11.255.255.255
12.0.0.1
12.0.0.1
12.255.255.255
11.0.0.2
47.133.88.1
47.133.88.46
172.30.52.223
0.0.0.0
0.0.0.0
Type
--------direct
local
broadcast
direct
local
broadcast
indirect
indirect
direct
broadcast
martian
multicast
Tag
--------fixed
addr
broadcast
fixed
addr
broadcast
ospf
static
fixed
broadcast
martian
addr
Metr If
---- -211
211
211
12
12
12
2
211
24
24
2
The following table describes the Type parameter.
Table 28 IP Routing Type information
Field
Description
indirect
The next hop to the host or subnet destination will be forwarded through a router at the
Gateway address.
direct
Packets will be delivered to a destination host or subnet attached to the switch.
local
Indicates a route to one of the switch’s IP interfaces.
broadcast
Indicates a broadcast route.
martian
The destination belongs to a host or subnet which is filtered out. Packets to this destination are
discarded.
multicast
Indicates a multicast route.
The following table describes the Tag parameter.
Table 29 IP Routing Tag information
Field
Description
fixed
The address belongs to a host or subnet attached to the switch.
static
The address is a static route which has been configured on the switch.
addr
The address belongs to one of the switch’s IP interfaces.
rip
The address was learned by the Routing Information Protocol (RIP).
ospf
The address was learned by Open Shortest Path First (OSPF).
broadcast
Indicates a broadcast address.
martian
The address belongs to a filtered group.
55
Information Menu
ARP information
Command: /info/arp
[Address Resolution Protocol Menu]
find
- Show a single ARP entry by IP address
port
- Show ARP entries on a single port
vlan
- Show ARP entries on a single VLAN
addr
- Show ARP entries for switch's interfaces
dump
- Show all ARP entries
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry,
address status flags, VLAN, and port for the address, and port referencing information.
The following table describes the Address Resolution Protocol Menu options.
Table 30 ARP information
Command
Usage
find <IP address>
Displays a single ARP entry by IP address. For example, 192.4.17.101.
port <port number>
Displays the ARP entries on a single port.
vlan <1-4095>
Displays the ARP entries on a single VLAN.
addr
Displays the ARP address list: IP address, IP mask, MAC address, and VLAN flags.
dump
Displays all ARP entries, including:
•
•
•
•
IP address and MAC address of each entry
Address status flag
The VLAN and port to which the address belongs
The ports which have referenced the address (empty if no port has routed traffic to
the IP address shown)
Show all ARP entry information
Command: /info/arp/dump
IP address
Flags
--------------- ----192.168.2.4
192.168.2.19
192.168.2.61
P
MAC address
----------------00:50:8b:b2:32:cb
00:0e:7f:25:89:b5
00:0f:6a:ed:46:00
VLAN
---1
1
1
Port
---18
17
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
Table 31 ARP dump flag parameters
Flag
Description
P
Permanent entry created for switch IP interface.
R
Indirect route entry.
U
Unresolved ARP entry. The MAC address has not been learned.
56
Information Menu
ARP address list information
Command: /info/arp/addr
IP address
--------------205.178.18.66
205.178.50.1
205.178.18.64
IP mask
--------------255.255.255.255
255.255.255.255
255.255.255.255
MAC address
VLAN Flags
----------------- ---- ----00:70:cf:03:20:04
P
00:70:cf:03:20:06
1
00:70:cf:03:20:05
1
This screen displays all entries in the ARP cache.
OSPF information
Command: /info/l3/ospf
[OSPF Information Menu]
general - Show general information
aindex
- Show area(s) information
if
- Show interface(s) information
virtual - Show details of virtual links
nbr
- Show neighbor(s) information
dbase
- Database Menu
sumaddr - Show summary address list
nsumadd - Show NSSA summary address list
routes
- Show OSPF routes
dump
- Show OSPF information
The following table describes the OSPF Menu options.
Table 32 OSPF information
Command
Usage
general
Displays general OSPF information.
aindex <0-2>
Displays area information for a particular area index. If no parameter is
supplied, it displays area information for all the areas.
if <1-249>
Displays interface information for a particular interface. If no parameter
is supplied, it displays information for all the interfaces.
virtual
Displays information about all the configured virtual links.
nbr <nbr router-id (A.B.C.D)>
Displays the status of a neighbor with a particular router ID. If no router
ID is supplied, it displays the information about all the current
neighbors.
dbase
Displays OSPF database menu.
sumaddr <0-2>
Displays the list of summary ranges belonging to non-NSSA areas.
nsumadd <0-2>
Displays the list of summary ranges belonging to NSSA areas.
routes
Displays OSPF routing table.
dump
Displays all OSPF information.
57
Information Menu
OSPF general information
Command: /info/l3/ospf/general
OSPF Version 2
Router ID: 10.10.10.1
Started at 1663 and the process uptime is 4626
Area Border Router: yes, AS Boundary Router: no
LS types supported are 6
External LSA count 0
External LSA checksum sum 0x0
Number of interfaces in this router is 2
Number of virtual links in this router is 1
16 new lsa received and 34 lsa originated from this router
Total number of entries in the LSDB 10
Database checksum sum 0x0
Total neighbors are 1, of which
2 are >=INIT state,
2 are >=EXCH state,
2 are =FULL state
Number of areas is 2, of which 3-transit 0-nssa 0-stub
Area Id : 0.0.0.0
Authentication : none
Import ASExtern : yes
Number of times SPF ran : 8
Area Border Router count : 2
AS Boundary Router count : 0
LSA count : 5
Summary : noSummary
OSPF interface information
Command: /info/l3/ospf/if
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP
Router ID 10.10.10.1, State DR, Priority 1
Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1
Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2
Timer intervals, Hello 10, Dead 40, Wait 40, Retransmit 5,
Transit delay 1
Neighbor count is 1 If Events 4, Authentication type none
58
Information Menu
OSPF Database information menu
Command: /info/l3/ospf/dbase
[OSPF Database Menu]
advrtr
- LS Database info for an Advertising Router
asbrsum - ASBR Summary LS Database info
dbsumm
- LS Database summary
ext
- External LS Database info
nw
- Network LS Database info
nssa
- NSSA External LS Database info
rtr
- Router LS Database info
self
- Self Originated LS Database info
summ
- Network-Summary LS Database info
all
- All
The following table describes the OSPF Database information menu options.
Table 33 OSPF Database information
Command
Usage
advrtr <router-id (A.B.C.D)>
Takes advertising router as a parameter. Displays all the Link State
Advertisements (LSAs) in the LS database that have the advertising
router with the specified router ID, for example: 20.1.1.1.
asbrsum <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays ASBR summary LSAs. The usage of this command is as
follows:
• asbrsum adv-rtr 20.1.1.1 displays ASBR summary LSAs
having the advertising router 20.1.1.1.
• asbrsum link_state_id 10.1.1.1 displays ASBR
summary LSAs having the link state ID 10.1.1.1.
• asbrsum self displays the self advertised ASBR summary
LSAs.
• asbrsum with no parameters displays all the ASBR summary
LSAs.
dbsumm
Displays the following information about the LS database in a table
format:
• The number of LSAs of each type in each area.
• The total number of LSAs for each area.
• The total number of LSAs for each LSA type for all areas
combined.
• The total number of LSAs for all LSA types for all areas
combined.
No parameters are required.
ext <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays the AS-external (type 5) LSAs with detailed information of
each field of the LSAs. The usage of this command is the same as
the usage of the command asbrsum.
nw <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays the network (type 2) LSAs with detailed information of
each field of the LSA.network LS database. The usage of this
command is the same as the usage of the command asbrsum.
nssa <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays the NSSA (type 7) LSAs with detailed information of each
field of the LSAs. The usage of this command is the same as the
usage of the command asbrsum.
59
Information Menu
Table 33 OSPF Database information
Command
Usage
rtr <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays the router (type 1) LSAs with detailed information of each
field of the LSAs. The usage of this command is the same as the
usage of the command asbrsum.
self
Displays all the self-advertised LSAs. No parameters are required.
summ <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D)>|<self>
Displays the network summary (type 3) LSAs with detailed
information of each field of the LSAs.
The usage of this command is the same as the usage of the
command asbrsum.
Displays all the LSAs.
all
OSPF route codes information
Command: /info/l3/ospf/routes
Codes: IA - OSPF inter area,
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
* - best
IA
IA
IA
IA
IA
IA
E2
E2
E2
E2
E2
E2
E2
E2
10.10.0.0/16 via 200.1.1.2
40.1.1.0/28 via 20.1.1.2
80.1.1.0/24 via 200.1.1.2
100.1.1.0/24 via 20.1.1.2
140.1.1.0/27 via 20.1.1.2
150.1.1.0/28 via 200.1.1.2
172.18.1.1/32 via 30.1.1.2
172.18.1.2/32 via 30.1.1.2
172.18.1.3/32 via 30.1.1.2
172.18.1.4/32 via 30.1.1.2
172.18.1.5/32 via 30.1.1.2
172.18.1.6/32 via 30.1.1.2
172.18.1.7/32 via 30.1.1.2
172.18.1.8/32 via 30.1.1.2
Routing Information Protocol information
Command: /info/l3/rip
[RIP Information Menu]
routes
- Show RIP routes
dump
- Show RIP user's configuration
The following table describes the Routing Information Protocol information menu options.
Table 34 RIP information
Command
Usage
routes
Displays information about RIP routes.
60
Information Menu
Table 34 RIP information
Command
Usage
dump <0-249>
Displays RIP user’s configuration. Enter 0 (zero) for all interfaces.
RIP Routes information
Command: /info/l3/rip/routes
>> IP Routing# /info/l3/rip/routes
3.0.0.0/8 via 30.1.1.11 metric 4
4.0.0.0/16 via 30.1.1.11 metric 16
10.0.0.0/8 via 30.1.1.2 metric 3
20.0.0.0/8 via 30.1.1.2 metric 2
This table contains all dynamic routes learned through RIP, including the routes that are undergoing
garbage collection with metric = 16. This table does not contain directly connected routes and locally
configured static routes.
RIP user configuration
Command: /info/l3/rip/dump <1-249>
RIP USER CONFIGURATION :
RIP on update 30
RIP Interface 2 : 102.1.1.1, enabled
version 2, listen enabled, supply enabled, default none
poison disabled, trigg enabled, mcast enabled, metric 1
auth none, key none
RIP Interface 3 : 103.1.1.1, enabled
version 2, listen enabled, supply enabled, default none
poison disabled, trigg enabled, mcast enabled, metric 1
61
Information Menu
IP information
Command: /info/l3/ip
IP information:
Interface information:
1: 10.80.23.243
255.255.254.0
250: 10.20.7.144
255.255.0.0
10.80.23.255,
10.20.255.255,
vlan 1, up
vlan 4095, up
Default gateway information: metric strict
1: 10.80.22.1,
vlan any, up active
254: 10.20.1.1,
vlan 4095, up active
Current BOOTP relay settings: OFF
0.0.0.0, 0.0.0.0
Current IP forwarding settings: OFF, dirbr disabled
Current network filter settings:
none
Current route map settings:
The following interface and default gateway information is displayed:
•
•
•
•
•
•
•
•
•
Interface number
IP address
IP mask
IP broadcast address
Operational status
BootP relay settings
IP forwarding settings
Network filter settings
Route map settings
IGMP multicast group information
Command: /info/l3/igmp
[IGMP Multicast
mrouter find
vlan
port
trunk
detail dump
-
Group Menu]
Show IGMP Snooping Multicast Router Port information
Show a single group by IP group address
Show groups on a single vlan
Show groups on a single port
Show groups on a single trunk
Show detail of a single group by IP group address
Show all groups
The following table describes the commands used to display information about IGMP groups learned by
the switch.
Table 35 IGMP Multicast Group menu options
Command
Usage
62
Information Menu
Table 35 IGMP Multicast Group menu options
Command
Usage
mrouter
Displays the Multicast Router Menu.
find <IP address>
Displays a single IGMP multicast group by its IP address.
vlan <1-4094>
Displays all IGMP multicast groups on a single VLAN.
port <port number>
Displays all IGMP multicast groups on a single port.
trunk <1-40>
Displays all IGMP multicast groups on a single trunk group.
detail
Displays details about IGMP multicast groups, including source and
timer information.
dump
Displays information for all multicast groups.
IGMP group information
Command: /info/l3/igmp/dump
Note: Local groups (224.0.0.x) are not snooped/relayed and will not appear.
Expires
Fwd
-------------- --------------- ------- ------ --------
Source
----- -------
---
10.1.1.1
232.1.1.1
2
21
V3
INC
4:16
Yes
10.1.1.5
232.1.1.1
2
21
V3
INC
4:16
Yes
232.1.1.1
2
21
V3
INC
235.0.0.1
9
21
V3
INC
236.0.0.1
9
21
V3
EXC
*
10.10.10.43
*
Group
VLAN
Port
Version
Mode
-
No
2:26
-
Yes
Yes
IGMP Group information includes:
•
•
•
•
•
•
•
IGMP source address
IGMP Group address
VLAN and port
IGMP version
IGMPv3 filter mode
Expiration timer value
IGMP multicast forwarding state
63
Information Menu
IGMP multicast router information
Command: /info/l3/igmp/mrouter
[IGMP Multicast Router Menu]
vlan - Show all multicast router ports on a single vlan
dump - Show all learned multicast router ports
The following table describes the commands used to display information about multicast routers learned
through IGMP Snooping.
Table 36 IGMP Multicast Router menu options
Command
Usage
vlan <1-4094>
Displays information for all multicast groups on a single VLAN.
dump
Displays information for all multicast groups learned by the switch.
VRRP information
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy
between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID
number on each participating VRRP-capable routing device. One of the virtual routers is then elected as
the master, based on a number of priority criteria, and assumes control of the shared virtual router IP
address. If the master fails, one of the backup virtual routers will assume routing authority and take control
of the virtual router IP address.
Command: /info/l3/vrrp
VRRP information:
1: vrid 2, 205.178.18.210, if 1, renter, prio 100, master, server
2: vrid 1, 205.178.18.202, if 1, renter, prio 100, backup
3: vrid 3, 205.178.18.204, if 1, renter, prio 100, master, proxy
64
Information Menu
When virtual routers are configured, you can view the status of each virtual router using this command.
VRRP information includes:
•
•
•
•
Virtual router number
Virtual router ID and IP address
Interface number
Ownership status
○ owner identifies the preferred master virtual router. A virtual router is the owner when the IP
address of the virtual router and its IP interface are the same.
○ renter identifies virtual routers which are not owned by this device
•
•
Priority value. During the election process, the virtual router with the highest priority becomes master.
Activity status
○ master identifies the elected master virtual router.
○ backup identifies that the virtual router is in backup mode.
○ init identifies that the virtual router is waiting for a startup event. Once it receives a startup
event, it transitions to master if its priority is 255, (the IP address owner), or transitions to backup
if it is not the IP address owner.
•
•
Server status. The server state identifies virtual routers.
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same
IP address as a proxy IP address. The use of virtual proxy routers enables redundant switches to
share the same IP address, minimizing the number of unique IP addresses that must be configured.
65
Information Menu
QoS information
Command: /info/qos
[QoS Menu]
8021p
- Show QOS 802.1p information
The following table describes the commands used to display Quality of Service (QoS) information.
Table 37 QoS menu options
Command
Usage
8021p
Displays the QoS 802.1p Information Menu.
802.1p information
Command: /info/qos/8021p
Current priority to COS queue information:
Priority COSq Weight
-------- ---- -----0
0
1
1
0
1
2
0
1
3
0
1
4
1
2
5
1
2
6
1
2
7
1
2
Current port priority information:
Port
Priority COSq Weight
----- -------- ---- -----1
0
0
1
2
0
0
1
3
0
0
1
4
0
0
1
…
20
0
0
1
21
0
0
1
The following table describes the IEEE 802.1p priority to COS queue information.
Table 38 802.1p Priority to COS Queue information
Field
Description
Priority
Displays the 802.1p Priority level.
Cosq
Displays the Class of Service queue.
Weight
Displays the scheduling weight of the COS queue.
The following table describes the IEEE 802.1p port priority information.
Table 39 802.1p Port Priority information
66
Information Menu
Field
Description
Port
Displays the port number.
Priority
Displays the 802.1p Priority level.
Cosq
Displays the Class of Service queue.
Weight
Displays the scheduling weight.
67
Information Menu
ACL information
Command: /info/acl
Current ACL information:
-----------------------Filter 1 profile:
Ethernet
- VID
: 1/0xfff
Actions
: Set COS to 0
Filter 2 profile:
Ethernet
- VID
: 1/0xfff
Actions
: Permit
No ACL groups configured.
Access Control List (ACL) information provides configuration parameters for each Access Control List. It
also shows which ACLs are included in each ACL Group.
RMON Information Menu
Command: /info/rmon
[RMON Information Menu]
hist
- Show RMON History group information
alarm
- Show RMON Alarm group information
event
- Show RMON Event group information
dump
- Show all RMON information
The following table describes the RMON Information parameters.
Table 40 RMON History Information Menu /info/rmon/hist
Command
Usage
hist
Displays the RMON History Information menu.
alarm
Displays the RMON Alarm Information menu.
event
Displays the RMON Event Information menu.
dump
Displays all RMON Information parameters.
RMON history information
Command: /info/rmon/hist
RMON History group configuration:
Index
----1
2
3
4
5
IFOID
-----------------------------1.3.6.1.2.1.2.2.1.1.21
1.3.6.1.2.1.2.2.1.1.18
1.3.6.1.2.1.2.2.1.1.20
1.3.6.1.2.1.2.2.1.1.19
1.3.6.1.2.1.2.2.1.1.21
Interval
-------30
30
30
30
1800
Rbnum
----5
5
5
5
5
Gbnum
----5
5
5
5
5
68
Information Menu
The following table describes the RMON History Information parameters.
Table 41 RMON History Information Menu /info/rmon/hist
Command
Usage
Index
Displays the index number that identifies each history instance.
IFOID
Displays the MIB Object Identifier.
Interval
Displays the time interval for each sampling bucket.
Rbnum
Displays the number of requested buckets, which is the number of data slots into which
data is to be saved.
Gbnum
Displays the number of granted buckets that may hold sampled data.
RMON alarm information
Command: /info/rmon/alarm
RMON Alarm group configuration:
Index
----1
2
3
4
5
8
10
11
15
18
100
Interval
-------30
900
300
1800
1800
1800
1800
1800
1800
1800
1800
Type
---abs
abs
abs
abs
abs
abs
abs
abs
abs
abs
abs
rLimit
-------10
0
10
10
10
10
10
10
10
10
10
fLimit
-------0
10
20
0
0
0
0
0
0
0
0
Index
----1
2
3
4
5
8
10
11
15
18
100
OID
-----------------------------1.3.6.1.2.1.2.2.1.10.257
1.3.6.1.2.1.2.2.1.11.258
1.3.6.1.2.1.2.2.1.12.259
1.3.6.1.2.1.2.2.1.13.260
1.3.6.1.2.1.2.2.1.14.261
1.3.6.1.2.1.2.2.1.10.271
1.3.6.1.2.1.2.2.1.15.262
1.3.6.1.2.1.2.2.1.16.263
1.3.6.1.2.1.2.2.1.19.266
1.3.6.1.2.1.2.2.1.10.270
1.3.6.1.2.1.2.2.1.17.264
rEvtIdx
------1
0
0
1
1
1
1
1
1
1
1
fEvtIdx
------0
2
0
0
0
0
0
0
0
0
0
last value
---------0
0
0
0
0
56344540
0
0
0
0
0
69
Information Menu
The following table describes the RMON Alarm Information parameters.
Table 42 RMON Alarm Information Menu /info/rmon/alarm
Command
Usage
Index
Displays the index number that identifies each alarm instance.
Interval
Displays the time interval over which data is sampled and compared with the rising and
falling thresholds.
Type
Displays the method of sampling the selected variable and calculating the value to be
compared against the thresholds, as follows:
• abs—absolute value, the value of the selected variable is compared directly with the
thresholds at the end of the sampling interval.
• delta—delta value, the value of the selected variable at the last sample is subtracted
from the current value, and the difference compared with the thresholds.
rLimit
Displays the rising threshold for the sampled statistic.
fLimit
Displays the falling threshold for the sampled statistic.
rEvtIdx
Displays the rising alarm event index that is triggered when a rising threshold is crossed.
fEvtIdx
Displays the falling alarm event index that is triggered when a falling threshold is crossed.
Last value
Displays the last sampled value.
OID
Displays the MIB Object Identifier for each alarm index.
RMON event information
Command: /info/rmon/event
RMON Event group configuration:
Index
----1
2
3
4
5
10
11
15
100
Type
---both
none
log
trap
both
both
both
both
both
Last Sent
---------------0D: 0H: 1M:20S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
Description
--------------------------------Event_1
Event_2
Event_3
Event_4
Log and trap event for Link Down
Log and trap event for Link Up
Send log and trap for icmpInMsg
Send log and trap for icmpInEchos
Event_100
The following table describes the RMON Event Information parameters.
Table 43 RMON Event Information Menu /info/rmon/event
Command
Usage
Index
Displays the index number that identifies each event instance.
Type
Displays the type of notification provided for this event, as follows: none, log,
trap, both.
70
Information Menu
Table 43 RMON Event Information Menu /info/rmon/event
Command
Usage
Last Sent
Displays the time that passed since the last switch reboot, when the most recent event
was triggered. This value is cleared when the switch reboots.
Description
Displays a text description of the event.
Link status information
Command: /info/link
-----------------------------------------------------------------Port
Speed
Duplex
Flow Ctrl
Link
--------------- --TX-----RX------1
10000
full
yes
yes
down
2
10000
full
yes
yes
down
3
10000
full
yes
yes
down
4
10000
full
yes
yes
down
5
10000
full
yes
yes
down
6
10000
full
yes
yes
down
7
10000
full
yes
yes
down
8
10000
full
yes
yes
down
9
10000
full
yes
yes
up
10
10000
full
yes
yes
down
11
10000
full
yes
yes
down
12
10000
full
yes
yes
down
13
10000
full
yes
yes
down
14
10000
full
yes
yes
down
15
10000
full
yes
yes
down
16
10000
full
yes
yes
down
17
100
full
yes
yes
up
18
10000
full
yes
yes
down
19
10000
full
yes
yes
down
20
10000
full
yes
yes
down
21
10000
full
yes
yes
down
Use this command to display link status information about each port on a switch, including:
•
•
•
•
•
Port number
Port speed (10000 Mb/s or 100 Mb/s)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up, down, or disabled)
71
Information Menu
Port information
Command: /info/port
Port Tag RMON PVID
NAME
---- --- ---- ---- -------------1
n
d
1 Downlink1
2
n
d
1 Downlink2
3
n
d
1 Downlink3
4
n
d
1 Downlink4
5
n
d
1 Downlink5
6
n
d
1 Downlink6
7
n
d
1 Downlink7
8
n
d
1 Downlink8
9
n
d
1 Downlink9
10
n
d
1 Downlink10
11
n
d
1 Downlink11
12
n
d
1 Downlink12
13
n
d
1 Downlink13
14
n
d
1*Downlink14
15
n
d
1*Downlink15
16
n
d
1*Downlink16
17
n
d
4095 Mgmt
18
n
d
1*Uplink1
19
n
d
1*Uplink2
20
n
d
1*Uplink3
21
n
d
1*Uplink4
* = PVID is tagged.
VLAN(s)
------------------------------1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4095
1
1
1
1
Port information includes:
•
•
•
•
•
•
Port number
Whether the port uses VLAN tagging or not (y or n)
Whether Remote Monitoring (RMON) is enabled or disabled (e or d)
Port VLAN ID (PVID)
Port name
VLAN membership
72
Information Menu
Logical Port to GEA Port mapping
Command: /info/geaport
Logical Port
-----------1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
GEA Port(0-based)
----------------2
4
6
8
10
12
14
16
3
5
7
9
11
13
15
17
255
18
19
0
1
GEA Unit
--------0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
This display correlates the logical port number to the GEA unit on which each port resides.
Fiber Port SFP status
Command: /info/sfp
-----------------------------------------Port Device TX-Enable RX-Signal TX-Fault
------ ------ --------- --------- -------XFP1 SR-XFP enabled
ok
N/A
XFP2 SR-XFP enabled
LOST
N/A
XFP3 SR-XFP enabled
ok
N/A
XFP4 SR-XFP
**** NOT Installed ****
This command displays the status of the Small Form Pluggable (SFP) module on each Fiber External Port.
73
Information Menu
Uplink Failure Detection information
Command: /info/ufd
Uplink Failure Detection: Enabled
LtM status: Down
Member
STG
STG State
---------------------port 20
1
DISABLED
10
DISABLED *
15
DISABLED *
* = STP turned off for this port.
Link Status
----------down
LtD status: Auto Disabled
Member
Link Status
------------------port 1
disabled
port 2
disabled
port 3
disabled
port 4
disabled
Uplink Failure Detection (UFD) information includes:
•
•
•
•
UFD status, either enabled or disabled
LtM status and member ports
Spanning Tree status for LtM ports
LtD status and member ports
Information dump
Command: /info/dump
Use the dump command to dump all switch information available from the Information Menu (10K or
more, depending on your configuration). This data is useful for tuning and debugging switch
performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture
session data prior to issuing the dump commands.
74
Statistics Menu
Statistics Menu
Introduction
You can view switch performance statistics in the user, operator, and administrator command modes. This
chapter discusses how to use the CLI to display switch statistics.
Menu information
Command: /stats
[Statistics Menu]
port
- Port Stats Menu
clrports - Clear stats for all ports
l2
- Layer 2 Stats Menu
l3
- Layer 3 Stats Menu
mp
- MP-specific Stats Menu
acl
- ACL Stats Menu
snmp
- Show SNMP stats
ntp
- Show NTP stats
ufd
- Show Uplink Failure Detection stats
clrmp
- Clear all MP related stats
dump
- Dump all stats
The following table describes the Statistics Menu options.
Table 44 Statistics Menu options
Command
Usage
port <port number>
Displays the Port Statistics Menu for the specified port. Use this command to display
traffic statistics on a port-by-port basis. Traffic statistics are included in SNMP
Management Information Base (MIB) objects.
clrports
Clear statistics counters for all ports.
l2
Displays the Layer 2 Statistics Menu.
l3
Displays the Layer 3 Statistics Menu.
mp
Displays the Management Processor Statistics Menu. Use this command to view
information on how switch management processes and resources are currently being
allocated.
acl
Displays the Access Control List Statistics Menu.
snmp
Displays SNMP statistics.
ntp <clear>
Displays Network Time Protocol (NTP) Statistics.
You can execute the clear command option to delete all statistics.
ufd <clear>
Displays Uplink Failure Detection statistics.
Add the argument, clear, to clear UFD statistics.
75
Statistics Menu
Table 44 Statistics Menu options
Command
Usage
clrmp
Clears all Management Processor statistics.
dump
Dumps all switch statistics. Use this command to gather data for tuning and debugging
switch performance. If you want to capture dump data to a file, set your
communication software on your workstation to capture session data prior to issuing
the dump command.
Port Statistics Menu
Command: /stats/port <port number>
[Port Statistics Menu]
8021x
- Show 802.1x stats
brg
- Show bridging ("dot1") stats
ether
- Show Ethernet ("dot3") stats
if
- Show interface ("if") stats
ip
- Show Internet Protocol ("IP") stats
link
- Show link stats
rmon
- Show RMON stats
clear
- Clear all port stats
This menu displays traffic statistics on a port-by-port basis.
The following table describes the Port Statistics Menu options:
Table 45 Port Statistics Menu options
Command
Usage
8021x
Displays IEEE 802.1x statistics
brg
Displays bridging (“dot1”) statistics for the port.
ether
Displays Ethernet (“dot3”) statistics for the port.
if
Displays interface statistics for the port.
ip
Displays Internet Protocol statistics for the port.
link
Displays link statistics for the port.
rmon
Displays Remote Monitoring (RMON) statistics for the port.
clear
Clears all the statistics on the port.
76
Statistics Menu
802.1x statistics
Command: /stats/port <port number>/8021x
Authenticator Statistics:
eapolFramesRx
=
eapolFramesTx
=
eapolStartFramesRx
=
eapolLogoffFramesRx
=
eapolRespIdFramesRx
=
eapolRespFramesRx
=
eapolReqIdFramesTx
=
eapolReqFramesTx
=
invalidEapolFramesRx
=
eapLengthErrorFramesRx =
lastEapolFrameVersion =
lastEapolFrameSource
=
0
0
0
0
0
0
0
0
0
0
0
00:00:00:00:00:00
Authenticator Diagnostics:
authEntersConnecting
authEapLogoffsWhileConnecting
authEntersAuthenticating
authSuccessesWhileAuthenticating
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
authEapStartsWhileAuthenticating
authEapLogoffWhileAuthenticating
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
backendAccessChallenges
backendOtherRequestsToSupplicant
backendNonNakResponsesFromSupplicant
backendAuthSuccesses
backendAuthFails
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
The following table describes the 802.1x authenticator diagnostics for a selected port:
Table 46 802.1x statistics for port
Statistics
Port
Authenticator Diagnostics
authEntersConnecting
Total number of times that the state machine transitions to the
CONNECTING state from any other state.
authEapLogoffsWhileConnecting
Total number of times that the state machine transitions from
CONNECTING to DISCONNECTED as a result of receiving an
EAPOL-Logoff message.
authEntersAuthenticating
Total number of times that the state machine transitions from
CONNECTING to AUTHENTICATING, as a result of an
EAPResponse/ Identity message being received from the
Supplicant.
77
Statistics Menu
Table 46 802.1x statistics for port
Statistics
Port
authSuccessesWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to AUTHENTICATED, as a result of the
Backend Authentication state machine indicating successful
authentication of the Supplicant.
authTimeoutsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of the Backend
Authentication state machine indicating authentication timeout.
authFailWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to HELD, as a result of the Backend
Authentication state machine indicating authentication failure.
authReauthsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of a reauthentication request.
authEapStartsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Start
message being received from the Supplicant.
authEapLogoffWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOLLogoff message being received from the Supplicant.
authReauthsWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of a reauthentication request.
authEapStartsWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of an EAPOLStart message being received from the Supplicant.
authEapLogoffWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to DISCONNECTED, as a result of an
EAPOLLogoff message being received from the Supplicant.
backendResponses
Total number of times that the state machine sends an initial
Access-Request packet to the Authentication server. Indicates
that the Authenticator attempted communication with the
Authentication Server.
backendAccessChallenges
Total number of times that the state machine receives an initial
Access-Challenge packet from the Authentication server.
Indicates that the Authentication Server has communication with
the Authenticator.
backendOtherRequestsToSupplicant
Total number of times that the state machine sends an EAPRequest packet (other than an Identity, Notification, Failure, or
Success message) to the Supplicant. Indicates that the
Authenticator chose an EAP-method.
backendNonNakResponsesFromSupplicant
Total number of times that the state machine receives a response
from the Supplicant to an initial EAP-Request, and the response
is something other than EAP-NAK. Indicates that the Supplicant
can respond to the Authenticators chosen EAP-method.
78
Statistics Menu
Table 46 802.1x statistics for port
Statistics
Port
backendAuthSuccesses
Total number of times that the state machine receives an Accept
message from the Authentication Server. Indicates that the
Supplicant has successfully authenticated to the Authentication
Server.
backendAuthFails
Total number of times that the state machine receives a Reject
message from the Authentication Server. Indicates that the
Supplicant has not authenticated to the Authentication Server.
Bridging statistics
Command: /stats/port <port number>/brg
Bridging statistics for port 1:
dot1PortInFrames:
dot1PortOutFrames:
dot1PortInDiscards:
dot1TpLearnedEntryDiscards:
dot1StpPortForwardTransitions:
63242584
63277826
0
0
0
The following table describes the bridging statistics for a selected port:
Table 47 Bridging statistics for port
Statistics
Description
dot1PortInFrames
The number of frames that have been received by this port from its
segment.
A frame received on the interface corresponding to this port is counted
by this object, if and only if, it is for a protocol being processed by the
local bridging function, including bridge management frames.
dot1PortOutFrames
The number of frames that have been transmitted by this port to its
segment.
A frame transmitted on the interface corresponding to this port is counted
by this object, if and only if, it is for a protocol being processed by the
local bridging function, including bridge management frames.
dot1PortInDiscards
Count of valid frames received which were discarded (that is, filtered) by
the forwarding process.
dot1TpLearnedEntryDiscards
The total number of Forwarding Database entries, which have been or
would have been learned, but have been discarded due to a lack of
space to store them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is
regularly becoming full (a condition which has adverse performance
effects on the sub network).
If this counter has a significant value but is not presently increasing, it
indicates that the problem has been occurring but is not persistent.
dot1StpPortForwardTransitions
The number of times this port has transitioned from the Learning state to
the Forwarding state.
79
Statistics Menu
Ethernet statistics
Command: /stats/port <port number>/ether
Ethernet statistics for port 1:
dot3StatsAlignmentErrors:
dot3StatsFCSErrors:
dot3StatsSingleCollisionFrames:
dot3StatsMultipleCollisionFrames:
dot3StatsLateCollisions:
dot3StatsExcessiveCollisions:
dot3StatsInternalMacTransmitErrors:
dot3StatsFrameTooLongs:
dot3StatsInternalMacReceiveErrors:
0
0
0
0
0
0
NA
0
0
The following table describes the Ethernet statistics for a selected port:
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsAlignmentErrors
A count of frames received on a particular interface that are not
an integral number of octets in length and do not pass the Frame
Check Sequence (FCS) check.
The count represented by an instance of this object is incremented
when the AlignmentError status is returned by the MAC
service to the Logical Link Control (LLC) (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
dot3StatsFCSErrors
A count of frames received on a particular interface that are an
integral number of octets in length but do not pass the Frame
Check Sequence (FCS) check.
The count represented by an instance of this object is incremented
when the frameCheckError status is returned by the MAC service
to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
dot3StatsSingleCollisionFrames
A count of successfully transmitted frames on a particular interface
for which transmission is inhibited by exactly one collision.
A frame that is counted by an instance of this object is also
counted by the corresponding instance of the
ifOutUcastPkts, ifOutMulticastPkts, or
ifOutBroadcastPkts, and is not counted by the
corresponding instance of the
dot3StatsMultipleCollisionFrame object.
80
Statistics Menu
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsMultipleCollisionFrames
A count of successfully transmitted frames on a particular interface
for which transmission is inhibited by more than one collision.
A frame that is counted by an instance of this object is also
counted by the corresponding instance of either the
ifOutUcastPkts, ifOutMulticastPkts, or
ifOutBroadcastPkts, and is not counted by the
corresponding instance of the
dot3StatsSingleCollisionFrames object.
dot3StatsLateCollisions
The number of times that a collision is detected on a particular
interface later than 512 bit-times into the transmission of a packet.
Five hundred and twelve bit-times corresponds to 51.2
microseconds on a 10 Mbps system. A (late) collision included in
a count represented by an instance of this object is also
considered as a (generic) collision for purposes of other collisionrelated statistics.
dot3StatsExcessiveCollisions
A count of frames for which transmission on a particular interface
fails due to excessive collisions.
dot3StatsInternalMacTransmitErrors
A count of frames for which transmission on a particular interface
fails due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of either the
dot3StatsLateCollisions object, the
dot3StatsExcessiveCollisions object, or the
dot3StatsCarrierSenseErrors object.
The precise meaning of the count represented by an instance of
this object is implementation specific. In particular, an instance of
this object may represent a count of transmission errors on a
particular interface that are not otherwise counted.
dot3StatsFrameTooLongs
A count of frames received on a particular interface that exceeds
the maximum permitted frame size.
The count represented by an instance of this object is incremented
when the frameTooLong status is returned by the MAC service to
the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
81
Statistics Menu
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsInternalMacReceiveErrors
A count of frames for which reception on a particular interface
fails due to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of the
dot3StatsFrameTooLongs object, the
dot3StatsAlignmentErrors object, or the
dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance of
this object is implementation specific. In particular, an instance of
this object may represent a count of received errors on a
particular interface that are not otherwise counted.
Interface statistics
Command: /stats/port <port number>/if
Interface statistics for port 1:
ifHCIn Counters
Octets:
51697080313
UcastPkts:
65356399
BroadcastPkts:
0
MulticastPkts:
0
Discards:
0
Errors:
0
ifHCOut Counters
51721056808
65385714
6516
0
0
21187
The following table describes the interface (IF) statistics for a selected port:
Table 49 Interface statistics for port
Statistics
Description
Octets—IfHCIn
The total number of octets received on the interface, including framing characters.
UcastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which
were not addressed to a multicast or broadcast address at this sublayer.
BroadcastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which
were addressed to a broadcast address at this sublayer.
MulticastPkts—IfHCIn
The total number of packets, delivered by this sublayer. These are the packets that
higher-level protocols requested to be transmitted, and which were addressed to a
multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
Discards—IfHCIn
The number of inbound packets which were chosen to be discarded even though
no errors were detected to prevent their being delivered to a higher-layer
protocol. One possible reason for discarding such a packet could be to free up
buffer space.
82
Statistics Menu
Table 49 Interface statistics for port
Statistics
Description
Errors—IfHCIn
For packet-oriented interfaces, the number of inbound packets that contained
errors preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound
transmission units that contained errors preventing them from being deliverable to
a higher-layer protocol.
Octets—IfHCOut
The total number of octets transmitted out of the interface, including framing
characters.
UcastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were not addressed to a multicast or broadcast address at this
sublayer, including those that were discarded or not sent.
BroadcastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a broadcast address at this sublayer, including
those that were discarded or not sent. This object is a 64-bit version of
ifOutBroadcastPkts.
MulticastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a multicast address at this sublayer, including those
that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This
object is a 64-bit version of ifOutMulticastPkts.
Discards—IfHCOut
The number of outbound packets that were chosen to be discarded even though
no errors had been detected to prevent their being transmitted. One possible
reason for discarding such a packet could be to free up buffer space.
Errors—IfHCOut
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound
transmission units that could not be transmitted because of errors.
Internet Protocol (IP) statistics
Command: /stats/port <port number>/ip
GEA IP statistics for port 1:
ipInReceives
:
0
ipInHeaderError:
0
ipInDiscards
:
0
The following table describes the Internet Protocol (IP) statistics for a selected port:
Table 50 IP statistics for port
Statistics
Description
ipInReceives
The total number of input datagrams received from interfaces, including those received
in error.
ipInHeaderError
The number of input datagrams discarded because the IP address in their IP header's
destination field was not a valid address to be received at this entity (the switch).
83
Statistics Menu
Table 50 IP statistics for port
Statistics
Description
ipInDiscards
The number of input IP datagrams for which no problems were encountered to prevent
their continued processing, but which were discarded (for example, for lack of buffer
space). Note that this counter does not include any datagrams discarded while awaiting
re-assembly.
Link statistics
Command: /stats/port <port number>/link
Link statistics for port 1:
linkStateChange:
2
The following table describes the link statistics for a selected port:
Table 51 Link statistics for port
Statistics
Description
linkStateChange
The total number of link state changes.
Port RMON statistics
Command: /stats/port <port number>/rmon
RMON statistics for port 2:
etherStatsDropEvents:
etherStatsOctets:
etherStatsPkts:
etherStatsBroadcastPkts:
etherStatsMulticastPkts:
etherStatsCRCAlignErrors:
etherStatsUndersizePkts:
etherStatsOversizePkts:
etherStatsFragments:
etherStatsJabbers:
etherStatsCollisions:
etherStatsPkts64Octets:
etherStatsPkts65to127Octets:
etherStatsPkts128to255Octets:
etherStatsPkts256to511Octets:
etherStatsPkts64Octets:
etherStatsPkts1024to1518Octets:
NA
0
0
0
0
0
0
0
NA
0
0
0
0
0
0
0
0
The following table describes the Remote Monitoring (RMON) statistics of the selected port:
Table 52 RMON statistics
Statistics
Description
etherStatsDropEvents
The total number of packets received that were dropped because of
system resource constraints.
84
Statistics Menu
Table 52 RMON statistics
Statistics
Description
etherStatsOctets
The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including
FCS octets).
etherStatsPkts
The total number of packets (including bad packets, broadcast packets,
and multicast packets) received.
etherStatsBroadcastPkts
The total number of good packets received that were directed to the
broadcast address.
etherStatsMulticastPkts
The total number of good packets received that were directed to a
multicast address.
etherStatsCRCAlignErrors
The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets,
inclusive, but had either a bad Frame Check Sequence (FCS) with an
integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (Alignment Error).
etherStatsUndersizePkts
The total number of packets received that were less than 64 octets long
(excluding framing bits but including FCS octets) and were otherwise
well formed.
etherStatsOversizePkts
The total number of packets received that were longer than 1518 octets
(excluding framing bits but including FCS octets) and were otherwise
well formed.
etherStatsFragments
The total number of packets received that were less than 64 octets in
length (excluding framing bits but including FCS octets) and had either a
bad Frame Check Sequence (FCS) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error).
etherStatsJabbers
The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets (Alignment
Error). Jabber is defined as the condition where any packet exceeds 20
ms. The allowed range to detect jabber is between 20 ms and 150 ms.
etherStatsCollisions
The best estimate of the total number of collisions on this Ethernet
segment.
etherStatsPkts64Octets
The total number of packets (including bad packets) received that were
less than or equal to 64 octets in length (excluding framing bits but
including FCS octets).
etherStatsPkts65to127Octets
The total number of packets (including bad packets) received that were
greater than 64 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts128to255Octets
The total number of packets (including bad packets) received that were
greater than 127 octets in length (excluding framing bits but including
FCS octets).
85
Statistics Menu
Table 52 RMON statistics
Statistics
Description
etherStatsPkts256to511Octets
The total number of packets (including bad packets) received that were
greater than 255 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts512to1023Octets
The total number of packets (including bad packets) received that were
greater than 511 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts1024to1518Octets
The total number of packets (including bad packets) received that were
greater than 1023 octets in length (excluding framing bits but including
FCS octets).
86
Statistics Menu
Layer 2 statistics
Command: /stats/l2
[Layer 2 Statistics Menu]
fdb
- Show FDB stats
lacp
- Show LACP stats
The following table describes the Layer 2 Statistics Menu options.
Table 53 Layer 2 Statistics Menu options
Command
Usage
fdb
Displays the Forwarding Database statistics menu.
lacp
Displays the Link Aggregation Control Protocol statistics menu.
FDB statistics
Command: /stats/l2/fdb
FDB statistics:
current:
91
hiwat:
91
This menu option enables you to display statistics regarding the use of the forwarding database, including
the number of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
Table 54 Forwarding Database statistics
Statistics
Description
current
Current number of entries in the Forwarding Database.
hiwat
Highest number of entries recorded at any given time in the Forwarding Database.
LACP statistics
Command: /stats/l2/lacp <port number>
Valid LACPDUs received
Valid Marker PDUs received
Valid Marker Rsp PDUs received
Unknown version/TLV type
Illegal subtype received
LACPDUs transmitted
Marker PDUs transmitted
Marker Rsp PDUs transmitted
-
0
0
0
0
0
0
0
0
87
Statistics Menu
Layer 3 statistics
Command: /stats/l3
[Layer 3 Statistics Menu]
geal3
- GEA Layer 3 Stats Menu
ip
- Show IP stats
route
- Show route stats
arp
- Show ARP stats
dns
- Show DNS stats
icmp
- Show ICMP stats
tcp
- Show TCP stats
udp
- Show UDP stats
igmp
- Show IGMP stats
ospf
- OSPF stats
vrrp
- Show VRRP stats
clrvrrp - Clear VRRP stats
rip
- Show RIP stats
igmpgrps - Total number of IGMP groups
ipmcgrps - Total number of IPMC groups
clrigmp - Clear IGMP stats
ipclear - Clear IP stats
ripclear - Clear RIP stats
ospfclear - Clear all OSPF stats
dump
- Dump layer 3 stats
The following table describes the Layer 3 Statistics Menu options.
Table 55 Layer 3 Statistics Menu options
Command
Usage
geal3
Displays the GEA statistics menu.
ip
Displays IP statistics.
route
Displays route statistics.
arp <clear>
Displays Address Resolution Protocol (ARP) statistics. Add the argument
clear, to clear ARP statistics.
dns
Displays Domain Name System (DNS) statistics.
icmp
Displays ICMP statistics.
tcp
Displays Transmission Control Protocol (TCP) statistics. Add the argument,
clear, to clear TCP statistics.
udp
Displays User Datagram Protocol (UDP) statistics. Add the argument,
clear, to clear UDP statistics.
igmp
Displays IGMP statistics.
ospf
Displays OSPF statistics menu.
vrrp
When virtual routers are configured, you can display statistics for the
virtual routers.
clrvrrp
Clears VRRP statistics.
rip
Displays Routing Information Protocol (RIP) statistics.
88
Statistics Menu
Table 55 Layer 3 Statistics Menu options
Command
Usage
igmpgrps
Displays the total number of Internet Group Management Protocol (IGMP)
groups registered the switch.
ipmcgrps
Displays the total number of Internet Protocol Multicast (IPMC) groups
registered on the switch.
clrigmp <1-4094>|all
Clears all IGMP statistics for the selected VLANs.
ipclear
Clears IP statistics. Use this command with caution as it will delete all the
IP statistics.
ripclear
Clears all Routing Information Protocol (RIP) statistics.
ospfclear
Clears all Open Shortest Path First (OSPF) statistics.
dump
Displays all Layer 3 statistics.
GEA Layer 3 statistics menu
Command: /stats/l3/geal3
[GEA Layer 3 Statistics Menu]
l3bucket - Show GEA L3 bucket for an IP address
dump
- Dump GEA layer 3 stats counter
The following table describes the Layer 3 GEA Statistics Menu options.
Table 56 Layer 3 GEA statistics menu options
Command
Usage
l3bucket
Displays GEA statistics for a specific IP address.
Dump
Displays all GEA statistics.
GEA Layer 3 statistics
Command: /stats/l3/geal3/dump
GEA L3 statistics:
Max L3 table size
Number of L3 entries used
Max LPM table size
Number of LPM entries used
: 4096
: 3
: 512
: 4
89
Statistics Menu
IP statistics
Command: /stats/l3/ip
IP statistics:
ipInReceives: 36475
ipInAddrErrors: 905
ipInUnknownProtos: 0
ipInDelivers: 4103
ipOutDiscards: 0
ipDefaultTTL: 255
ipInHdrErrors: 0
ipInDiscards: 0
ipOutRequests: 30974
The following table describes the IP statistics:
Table 57 IP statistics
Statistics
Description
ipInReceives
The total number of input datagrams received from interfaces, including those
received in error.
ipInHdrErrors
The number of input datagrams discarded due to errors in their IP headers,
including bad checksums, version number mismatch, other format errors, time-to-live
exceeded, errors discovered in processing their IP options, and so on.
ipInAddrErrors
The number of input datagrams discarded because the IP address in their IP header
destination field was not a valid address to be received at this switch. This count
includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported
classes (for example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this
counter includes datagrams discarded because the destination address was not a
local address.
ipInUnknownProtos
The number of locally addressed datagrams received successfully but discarded
because of an unknown or unsupported protocol.
ipInDiscards
The number of input IP datagrams for which no problems were encountered to
prevent their continued processing, but which were discarded (for example, for lack
of buffer space).
This counter does not include any datagrams discarded while awaiting re-assembly.
ipInDelivers
The total number of input datagrams successfully delivered to IP user-protocols
(including ICMP).
ipOutRequests
The total number of IP datagrams that local IP user-protocols (including ICMP)
supplied to IP in requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
ipOutDiscards
The number of output IP datagrams for which no problem was encountered to
prevent their transmission to their destination, but which were discarded (for
example, for lack of buffer space).
This counter would include datagrams counted in ipForwDatagrams if any such
packets met this (discretionary) discard criterion.
ipDefaultTTL
The default value inserted into the Time-To-Live (TTL) field of the IP header of
datagrams originated at this switch, whenever a TTL value is not supplied by the
transport layer protocol.
90
Statistics Menu
Route statistics
Command: /stats/l3/route
Route statistics:
ipRoutesCur:
ipRoutesMax:
8
4096
ipRoutesHighWater:
8
The following table describes the Route statistics:
Table 58 Route statistics
Statistics
Description
ipRoutesCur
The total number of outstanding routes in the route table.
ipRoutesMax
The maximum number of supported routes.
ipRoutesHighWater
The highest number of routes ever recorded in the route table.
ARP statistics
Command: /stats/l3/arp
ARP statistics:
arpEntriesCur:
arpEntriesMax:
2
4095
arpEntriesHighWater:
4
The following table describes the Address Resolution Protocol (ARP) statistics:
Table 59 ARP statistics
Statistics
Description
arpEntriesCur
The total number of outstanding ARP entries in the ARP table.
arpEntriesMax
The maximum number of ARP entries that are supported.
arpEntriesHighWater
The highest number of ARP entries ever recorded in the ARP table.
DNS statistics
Command: /stats/l3/dns
DNS statistics:
dnsInRequests:
dnsBadRequests:
0
0
dnsOutRequests:
0
The following table describes the Domain Name System (DNS) statistics:
Table 60 DNS statistics
Statistics
Description
dnsInRequests
The total number of DNS request packets that have been received.
dnsOutRequests
The total number of DNS response packets that have been transmitted.
dnsBadRequests
The total number of DNS request packets received that were dropped.
91
Statistics Menu
ICMP statistics
Command: /stats/l3/icmp
ICMP statistics:
icmpInMsgs:
icmpInDestUnreachs:
icmpInParmProbs:
icmpInRedirects:
icmpInEchoReps:
icmpInTimestampReps:
icmpInAddrMaskReps:
icmpOutErrors:
icmpOutTimeExcds:
icmpOutSrcQuenchs:
icmpOutEchos:
icmpOutTimestamps:
icmpOutAddrMasks:
245802
41
0
0
244350
0
0
0
0
0
253777
0
0
icmpInErrors:
icmpInTimeExcds:
icmpInSrcQuenchs:
icmpInEchos:
icmpInTimestamps:
icmpInAddrMasks:
icmpOutMsgs:
icmpOutDestUnreachs:
icmpOutParmProbs:
icmpOutRedirects:
icmpOutEchoReps:
icmpOutTimestampReps:
icmpOutAddrMaskReps:
1393
0
0
18
0
0
253810
15
0
0
18
0
0
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
Table 61 ICMP statistics
Statistics
Description
icmpInMsgs
The total number of ICMP messages which the switch received. Note that this
counter includes all those counted by icmpInErrors.
icmpInErrors
The number of ICMP messages which the switch received but determined as having
ICMP specific errors (for example bad ICMP checksums and bad length).
icmpInDestUnreachs
The number of ICMP Destination Unreachable messages received.
icmpInTimeExcds
The number of ICMP Time Exceeded messages received.
icmpInParmProbs
The number of ICMP Parameter Problem messages received.
icmpInSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages received.
icmpInRedirects
The number of ICMP Redirect messages received.
icmpInEchos
The number of ICMP Echo (request) messages received.
icmpInEchoReps
The number of ICMP Echo Reply messages received.
icmpInTimestamps
The number of ICMP Timestamp (request) messages received.
icmpInTimestampReps
The number of ICMP Timestamp Reply messages received.
icmpInAddrMasks
The number of ICMP Address Mask Request messages received.
icmpInAddrMaskReps
The number of ICMP Address Mask Reply messages received.
icmpOutMsgs
The total number of ICMP messages which this switch attempted to send. Note that
this counter includes all those counted by icmpOutErrors.
icmpOutErrors
The number of ICMP messages that this switch did not send due to problems
discovered within ICMP such as a lack of buffer. This value should not include errors
discovered outside the ICMP layer such as the inability of IP to route the resultant
datagram. In some implementations there may be no types of errors that contribute
to this counter's value.
92
Statistics Menu
Table 61 ICMP statistics
Statistics
Description
icmpOutDestUnreachs
The number of ICMP Destination Unreachable messages sent.
icmpOutTimeExcds
The number of ICMP Time Exceeded messages sent.
icmpOutParmProbs
The number of ICMP Parameter Problem messages sent.
icmpOutSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages sent.
icmpOutRedirects
The number of ICMP Redirect messages sent.
icmpOutEchos
The number of ICMP Echo (request) messages sent.
icmpOutEchoReps
The number of ICMP Echo Reply messages sent.
icmpOutTimestamps
The number of ICMP Timestamp (request) messages sent.
icmpOutTimestampReps
The number of ICMP Timestamp Reply messages sent.
icmpOutAddrMasks
The number of ICMP Address Mask Request messages sent.
icmpOutAddrMaskReps
The number of ICMP Address Mask Reply messages sent.
TCP statistics
Command: /stats/l3/tcp
TCP statistics:
tcpRtoAlgorithm:
tcpRtoMax:
tcpActiveOpens:
tcpAttemptFails:
tcpInSegs:
tcpRetransSegs:
tcpCurBuff:
tcpOutRsts:
4
240000
252214
528
756401
0
0
417
tcpRtoMin:
tcpMaxConn:
tcpPassiveOpens:
tcpEstabResets:
tcpOutSegs:
tcpInErrs:
tcpCurConn:
0
512
7
4
756655
0
3
The following table describes the Transmission Control Protocol (TCP) statistics:
Table 62 TCP statistics
Statistics
Description
tcpRtoAlgorithm
The algorithm used to determine the timeout value used for retransmitting
unacknowledged octets.
tcpRtoMin
The minimum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend
upon the algorithm used to determine the retransmission timeout. In particular, when
the timeout algorithm is rsre(3), an object of this type has the semantics of the
LBOUND quantity described in Request For Comments (RFC) 793.
tcpRtoMax
The maximum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend
upon the algorithm used to determine the retransmission timeout. In particular, when
the timeout algorithm is rsre(3), an object of this type has the semantics of the
UBOUND quantity described in RFC 793.
93
Statistics Menu
Table 62 TCP statistics
Statistics
Description
tcpMaxConn
The limit on the total number of TCP connections the switch can support. In entities
where the maximum number of connections is dynamic, this object should contain the
value -1.
tcpActiveOpens
The number of times TCP connections have made a direct transition to the SYN-SENT
state from the CLOSED state.
tcpPassiveOpens
The number of times TCP connections have made a direct transition to the SYN-RCVD
state from the LISTEN state.
tcpAttemptFails
The number of times TCP connections have made a direct transition to the CLOSED
state from either the SYN-SENT state or the SYN-RCVD state, plus the number of times
TCP connections have made a direct transition to the LISTEN state from the SYN-RCVD
state.
tcpEstabResets
The number of times TCP connections have made a direct transition to the CLOSED
state from either the ESTABLISHED state or the CLOSE- WAIT state.
tcpInSegs
The total number of segments received, including those received in error. This count
includes segments received on currently established connections.
tcpOutSegs
The total number of segments sent, including those on current connections but
excluding those containing only retransmitted octets.
tcpRetransSegs
The total number of segments retransmitted, that is, the number of TCP segments
transmitted containing one or more previously transmitted octets.
tcpInErrs
The total number of segments received in error (for example, bad TCP checksums).
tcpCurBuff
The total number of outstanding memory allocations from heap by TCP protocol stack.
tcpCurConn
The total number of outstanding TCP sessions that are currently opened.
tcpOutRsts
The number of TCP segments sent containing the reset (RST) flag.
UDP statistics
Command: /stats/l3/udp
UDP statistics:
udpInDatagrams:
udpInErrors:
54
0
udpOutDatagrams:
udpNoPorts:
43
1578077
The following table describes the User Datagram Protocol (UDP) statistics:
Table 63 UDP statistics
Statistics
Description
udpInDatagrams
The total number of UDP datagrams delivered to the switch.
udpOutDatagrams
The total number of UDP datagrams sent from this switch.
udpInErrors
The number of received UDP datagrams that could not be delivered for reasons
other than the lack of an application at the destination port.
94
Statistics Menu
Table 63 UDP statistics
Statistics
Description
udpNoPorts
The total number of received UDP datagrams for which there was no application
at the destination port.
IGMP Multicast Group statistics
Command: /stats/l3/igmp <VLAN number>
-----------------------------------------------------------IGMP Snoop vlan 1 statistics:
-----------------------------------------------------------rxIgmpValidPkts:
0
rxIgmpInvalidPkts:
0
rxIgmpGenQueries:
0
rxIgmpGrpSpecificQueries:
0
rxIgmpGroupSrcSpecificQueries:
0
rxIgmpLeaves:
0
rxIgmpReports:
0
txIgmpReports:
0
txIgmpGrpSpecificQueries:
0
txIgmpLeaves:
0
rxIgmpV3CurrentStateRecords:
0
rxIgmpV3SourceListChangeRecords:
0
rxIgmpV3FilterChangeRecords:
0
This menu option enables you to display statistics regarding the use of the IGMP Multicast Groups.
The following table describes the IGMP statistics:
Table 64 IGMP statistics
Statistic
Description
rxIgmpValidPkts
Total number of valid IGMP packets received
rxIgmpInvalidPkts
Total number of invalid packets received
rxIgmpGenQueries
Total number of General Membership Query packets received
rxIgmpGrpSpecificQueries
Total number of Membership Query packets received from specific
groups
rxIgmpGroupSrcSpecificQueries
Total number of Group Source-Specific Queries (GSSQ) received
rxIgmpLeaves
Total number of Leave requests received
rxIgmpReports
Total number of Membership Reports received
txIgmpReports
Total number of Membership reports transmitted
txIgmpGrpSpecificQueries
Total number of Membership Query packets transmitted to specific
groups
txIgmpLeaves
Total number of Leave messages transmitted
rxIgmpV3CurrentStateRecords
Total number of Current State records received
rxIgmpV3SourceListChangeRecords
Total number of Source List Change records received
rxIgmpV3FilterChangeRecords
Total number of Filter Change records received.
95
Statistics Menu
OSPF statistics menu
Command: /stats/l3/ospf
[OSPF stats Menu]
general - Show global stats
aindex
- Show area(s) stats
if
- Show interface(s) stats
The following table describes the OSPF statistics menu options.
Table 65 OSPF statistics menu options
Command
Usage
general
Displays OSPF global statistics.
aindex <0-2>
Displays area index statistics.
if <1-249>
Displays interface statistics.
96
Statistics Menu
OSPF global statistics
Command: /stats/l3/ospf/general
OSPF stats
---------Rx/Tx Stats:
Pkts
hello
database
ls requests
ls acks
ls updates
Nbr change stats:
hello
start
n2way
adjoint ok
negotiation done
exchange done
bad requests
bad sequence
loading done
n1way
rst_ad
down
Timers kickoff
hello
retransmit
lsa lock
lsa ack
dbage
summary
ase export
Rx
-------0
23
4
3
7
9
2
0
2
2
2
2
0
0
2
0
0
1
Tx
-------0
518
12
1
7
7
Intf change Stats:
up
4
down 2
loop 0
unloop 0
wait timer 2
backup 0
nbr change 5
514
1028
0
0
0
0
0
The following table describes the OSPF global statistics:
Table 66 OSPF global statistics
Statistic
Description
Rx Tx stats:
Rx Pkts
The sum total of all OSPF packets received on all OSPF areas and interfaces.
Tx Pkts
The sum total of all OSPF packets transmitted on all OSPF areas and interfaces.
Rx Hello
The sum total of all Hello packets received on all OSPF areas and interfaces.
Tx Hello
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.
Rx Database
The sum total of all Database Description packets received on all OSPF areas and
interfaces.
Tx Database
The sum total of all Database Description packets transmitted on all OSPF areas and
interfaces.
Rx ls Requests
The sum total of all Link State Request packets received on all OSPF
areas and interfaces.
97
Statistics Menu
Table 66 OSPF global statistics
Statistic
Description
Tx ls Requests
The sum total of all Link State Request packets transmitted on all OSPF areas and
interfaces.
Rx ls Acks
The sum total of all Link State Acknowledgement packets received on all OSPF areas
and interfaces.
Tx ls Acks
The sum total of all Link State Acknowledgement packets transmitted on all OSPF
areas and interfaces.
Rx ls Updates
The sum total of all Link State Update packets received on all OSPF areas and
interfaces.
Tx ls Updates
The sum total of all Link State Update packets transmitted on all OSPF areas and
interfaces.
Nbr change stats:
hello
The sum total of all Hello packets received from neighbors on all OSPF areas and
interfaces.
Start
The sum total number of neighbors in this state (that is, an indication that Hello
packets should now be sent to the neighbor at intervals of HelloInterval seconds)
across all OSPF areas and interfaces.
n2way
The sum total number of bidirectional communication establishment between this
router and other neighboring routers.
adjoint ok
The sum total number of decisions to be made (again) as to whether an adjacency
should be established/maintained with the neighbor across all OSPF areas and
interfaces.
negotiation done
The sum total number of neighbors in this state wherein the Master/slave relationship
has been negotiated, and sequence numbers have been exchanged, across all OSPF
areas and interfaces.
exchange done
The sum total number of neighbors in this state (that is, in an adjacency's final state)
having transmitted a full sequence of Database Description packets, across all OSPF
areas and interfaces.
bad requests
The sum total number of Link State Requests which have been received for a link state
advertisement not contained in the database across all interfaces and OSPF areas.
bad sequence
The sum total number of Database Description packets which have been received that
either:
• Has an unexpected DD sequence number
• Unexpectedly has the init bit set
• Has an options field differing from the last Options field received in a Database
Description packet.
Any of these conditions indicate that some error has occurred during adjacency
establishment for all OSPF areas and interfaces.
loading done
The sum total number of link state updates received for all out-of-date portions of the
database across all OSPF areas and interfaces.
n1way
The sum total number of Hello packets received from neighbors, in which this router is
not mentioned across all OSPF interfaces and areas.
98
Statistics Menu
Table 66 OSPF global statistics
Statistic
Description
rst_ad
The sum total number of times the Neighbor adjacency has been reset across all OPSF
areas and interfaces.
down
The total number of Neighboring routers down (that is, in the initial state of a
neighbor conversation) across all OSPF areas and interfaces.
Intf Change Stats:
up
The sum total number of interfaces up in all OSPF areas.
down
The sum total number of interfaces down in all OSPF areas.
loop
The sum total of interfaces no longer connected to the attached network across all
OSPF areas and interfaces.
unloop
The sum total number of interfaces, connected to the attached network in all OSPF
areas.
wait timer
The sum total number of times the Wait Timer has been fired, indicating the end of the
waiting period that is required before electing a (Backup) Designated Router across all
OSPF areas and interfaces.
backup
The sum total number of Backup Designated Routers on the attached network for all
OSPF areas and interfaces.
nbr change
The sum total number of changes in the set of bidirectional neighbors associated with
any interface across all OSPF areas.
Timers Kickoff:
hello
The sum total number of times the Hello timer has been fired (which triggers the send
of a Hello packet) across all OPSF areas and interfaces.
retransmit
The sum total number of times the Retransmit timer has been fired across all OPSF
areas and interfaces.
lsa lock
The sum total number of times the Link State Advertisement (LSA) lock timer has been
fired across all OSPF areas and interfaces.
lsa ack
The sum total number of times the LSA Ack timer has been fired across all OSPF areas
and interfaces.
dbage
The total number of times the data base age (Dbage) has been fired.
summary
The total number of times the Summary timer has been fired.
ase export
The total number of times the Autonomous System Export (ASE) timer has been fired.
99
Statistics Menu
VRRP statistics
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy
between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID
number on each participating VRRP-capable routing device.
One of the virtual routers is then elected as the master, based on a number of priority criteria, and
assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers
will assume routing authority and take control of the virtual router IP address.
When virtual routers are configured, you can display protocol statistics for VRRP.
Command: /stats/l3/vrrp
>> Layer 3 Statistics# vrrp
VRRP statistics:
vrrpInAdvers:
0
vrrpOutAdvers:
0
vrrpBadVersion:
0
vrrpBadAddress:
0
vrrpBadPassword:
0
vrrpBadAdvers:
0
vrrpBadVrid:
vrrpBadData:
vrrpBadInterval:
0
0
0
The following table describes the VRRP statistics.
Table 67 VRRP statistics
Field
Description
vrrpInAdvers
The total number of VRRP advertisements that have been received.
vrrpOutAdvers
The total number of VRRP advertisements that have been sent.
vrrpBadVersion
The total number of VRRP advertisements that had a bad version number.
vrrpBadAddress
The total number of VRRP advertisements that had a bad address.
vrrpBadPassword
The total number of VRRP advertisements that had a bad password.
vrrpBadAdvers
The total number of VRRP advertisements received that were dropped.
vrrpBadVrid
The total number of VRRP advertisements that had a bad virtual router ID.
vrrpBadData
The total number of VRRP advertisements that had bad data.
vrrpBadInterval
The total number of VRRP advertisements that had a bad interval.
100
Statistics Menu
RIP statistics
Command: /stats/l3/rip
RIP ALL STATS INFORMATION:
RIP packets received = 12
RIP packets sent = 75
RIP request received = 0
RIP response received = 12
RIP request sent = 3
RIP response sent = 72
RIP route timeout = 0
RIP bad size packet received = 0
RIP bad version received = 0
RIP bad zeros received = 0
RIP bad src port received = 0
RIP bad src IP received = 0
RIP packets from self received = 0
Management Processor statistics
Command: /stats/mp
[MP-specific Statistics Menu]
pkt
- Show Packet stats
tcb
- Show All TCP control blocks in use
ucb
- Show All UDP control blocks in use
cpu
- Show CPU utilization
The following table describes the Statistics Menu options for the management processor (MP):
Table 68 MP-specific Statistics Menu options
Command
Usage
pkt
Displays packet statistics, to check for leads and load.
tcb
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.
ucb
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use.
cpu
Displays CPU utilization for periods of up to 1, 4, and 64 seconds.
101
Statistics Menu
Packet statistics
Command: /stats/mp/pkt
Packet counts:
allocs:
mediums:
jumbos:
smalls:
failures:
36692
0
0
0
0
frees:
mediums hi-watermark:
jumbos hi-watermark:
smalls hi-watermark:
36692
3
0
2
The following table describes the packet statistics.
Table 69 MP specific packet statistics
Description
Example statistic
allocs
Total number of packet allocations from the packet buffer pool by the TCP/IP protocol
stack.
frees
Total number of times the packet buffers are freed (released) to the packet buffer pool
by the TCP/IP protocol stack.
mediums
Total number of packet allocations with size between 128 to 1536 bytes from the
packet buffer pool by the TCP/IP protocol stack.
mediums hi-watermark
The highest number of packet allocation with size between 128 to 1536 bytes from the
packet buffer pool by the TCP/IP protocol stack.
jumbos
Total number of packet allocations with more than 1536 bytes from the packet buffer
pool by the TCP/IP protocol stack.
jumbos hi-watermark
The highest number of packet allocation with more than 1536 bytes from the packet
buffer pool by the TCP/IP protocol stack.
smalls
Total number of packet allocations with size less than 128 bytes from the packet buffer
pool by the TCP/IP protocol stack.
smalls hi-watermark
The highest number of packet allocation with size less than 128 bytes from the packet
buffer pool by the TCP/IP protocol stack.
failures
Total number of packet allocation failures from the packet buffer pool by the TCP/IP
protocol stack.
102
Statistics Menu
TCP statistics
Command: /stats/mp/tcb
All TCP allocated control blocks:
10ad41e8: 0.0.0.0
0 <=> 0.0.0.0
10ad5790: 47.81.27.5
1171 <=> 47.80.23.243
80
23
listen
established
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown
in this example:
Table 70 TCP statistics
Description
Example statistic
Memory
10ad41e8/10ad5790
Destination IP address
0.0.0.0/47.81.27.5
Destination port
0/1171
Source IP
0.0.0.0/47.80.23.243
Source port
80/23
State
listen/established
UDP statistics
Command: /stats/mp/ucb
All UDP allocated control blocks:
161: listen
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in
this example:
Table 71 UDP statistics
Description
Example Statistic
Control block
161
State
listen
103
Statistics Menu
CPU statistics
Command: /stats/mp/cpu
CPU utilization:
cpuUtil1Second:
cpuUtil4Seconds:
cpuUtil64Seconds:
8%
9%
8%
The following table describes the management port CPU utilization statistics:
Table 72 CPU statistics
Statistics
Description
cpuUtil1Second
The utilization of MP CPU over 1 second. This is shown as a percentage.
cpuUtil4Seconds
The utilization of MP CPU over 4 seconds. This is shown as a percentage.
cpuUtil64Seconds
The utilization of MP CPU over 64 seconds. This is shown as a percentage.
Access Control List (ACL) statistics menu
Command: /stats/acl
[ACL Menu]
acl
dump
clracl
- Display ACL stats
- Display all available ACL stats
- Clear ACL stats
The following table describes the Access Control List (ACL) Statistics menu options:
Table 73 ACL statistics menu options
Command
Usage
acl <1-384>
Displays the Access Control List Statistics for a specific ACL.
dump
Displays all ACL statistics.
clracl
Clear all ACL statistics.
ACL statistics
Command: /stats/acl/dump
Hits for ACL 1: 26057515
Hits for ACL 2: 26057497
104
Statistics Menu
SNMP statistics
Command: /stats/snmp
SNMP statistics:
snmpInPkts:
snmpInBadC'tyNames:
snmpInASNParseErrs:
snmpOutPkts:
snmpInTooBigs:
snmpInBadValues:
snmpInGenErrs:
snmpInTotalSetVars:
snmpInGetNexts:
snmpInGetResponses:
snmpOutTooBigs:
snmpOutBadValues:
snmpOutGenErrs:
snmpOutGetNexts:
snmpOutGetResponses:
snmpSilentDrops:
54
0
0
54
0
0
0
0
52
0
0
0
0
0
54
0
snmpInBadVersions:
snmpInBadC'tyUses:
snmpEnableAuthTraps:
snmpInBadTypes:
snmpInNoSuchNames:
snmpInReadOnlys:
snmpInTotalReqVars:
snmpInGetRequests:
snmpInSetRequests:
snmpInTraps:
snmpOutNoSuchNames:
snmpOutReadOnlys:
snmpOutGetRequests:
snmpOutSetRequests:
snmpOutTraps:
snmpProxyDrops:
0
0
0
0
0
0
105
2
0
0
2
0
0
0
0
0
The following table describes the Simple Network Management Protocol (SNMP) statistics:
Table 74 SNMP statistics
Statistics
Description
snmpInPkts
The total number of messages delivered to the SNMP entity from the transport service.
snmpInBadVersions
The total number of SNMP messages, which were delivered to the SNMP protocol entity
and were for an unsupported SNMP version.
snmpInBadC'tyNames
The total number of SNMP messages delivered to the SNMP entity that used an SNMP
community name not known to the switch.
snmpInBadC'tyUses
The total number of SNMP messages delivered to the SNMP protocol entity that
represented an SNMP operation which was not allowed by the SNMP community
named in the message.
snmpInASNParseErrs
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic Encoding
Rules), errors encountered by the SNMP protocol entity when decoding SNMP messages
received.
The Open Systems Interconnection (OSI) method of specifying abstract objects is called
ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of rules for
representing such objects as strings of ones and zeros is called the BER (Basic Encoding
Rules, defined in X.209).
ASN.1 is a flexible notation that allows one to define a variety of data types, from
simple types such as integers and bit strings to structured types such as sets and
sequences.
BER describes how to represent or encode values of each ASN.1 type as a string of
eight-bit octets.
snmpEnableAuthTrap
s
An object to enable or disable the authentication traps generated by this switch.
snmpOutPkts
The total number of SNMP messages which were passed from the SNMP protocol entity
to the transport service.
105
Statistics Menu
Table 74 SNMP statistics
Statistics
Description
snmpInBadTypes
The total number of SNMP messages which failed ASN.1 parsing.
snmpInTooBigs
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP
protocol entity and for which the value of the error-status field is too big.
snmpInNoSuchNames
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP
protocol entity and for which the value of the error-status field is noSuchName.
snmpInBadValues
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP
protocol entity and for which the value of the error-status field is badValue.
snmpInReadOnlys
The total number of valid SNMP Protocol Data Units (PDUs), which were delivered to the
SNMP protocol entity and for which the value of the error-status field is read-only.
It should be noted that it is a protocol error to generate an SNMP PDU, which contains
the value read-only in the error-status field. As such, this object is provided as a means
of detecting incorrect implementations of the SNMP.
snmpInGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were delivered to the
SNMP protocol entity and for which the value of the error-status field is genErr.
snmpInTotalReqVars
The total number of MIB objects which have been retrieved successfully by the SNMP
protocol entity as a result of receiving valid SNMP Get-Request and Get-Next Protocol
Data Units (PDUs).
snmpInTotalSetVars
The total number of MIB objects, which have been altered successfully by the SNMP
protocol entity as a result of receiving valid SNMP Set-Request Protocol Data Units
(PDUs).
snmpInGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInGetResponses
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been accepted
and processed by the SNMP protocol entity.
snmpOutTooBigs
The total number of SNMP Protocol Data Units (PDUs), which were generated by the
SNMP protocol entity and for which the value of the error-status field is too big.
snmpOutNoSuchNames
The total number of SNMP Protocol Data Units (PDUs), which were generated by the
SNMP protocol entity and for which the value of the error-status is noSuchName.
snmpOutBadValues
The total number of SNMP Protocol Data Units (PDUs), which were generated by the
SNMP protocol entity and for which the value of the error-status field is badValue.
snmpOutReadOnlys
Not in use.
snmpOutGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were generated by the
SNMP protocol entity and for which the value of the error-status field is genErr.
snmpOutGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
106
Statistics Menu
Table 74 SNMP statistics
Statistics
Description
snmpOutGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpOutSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpOutGetResponse
s
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpOutTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been generated
by the SNMP protocol entity.
snmpSilentDrops
The total number of GetRequest-PDUs, GetNextRequestPDUs,GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs
delivered to the SNMP entity which were silently dropped because the size of a reply
containing an alternate Response-PDU with an empty variable-bindings field was too
large.
snmpProxyDrops
The total number of GetRequest-PDUs, GetNextRequest-PDUs,
GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs
delivered to the SNMP entity that were silently dropped because the transmission of the
message to a proxy target failed in a manner (other than a time-out) such that no
Response-PDU could be returned.
NTP statistics
Command: /stats/ntp
NTP statistics:
Primary Server:
Requests Sent:
Responses Received:
Updates:
Secondary Server:
Requests Sent:
Responses Received:
Updates:
17
17
1
0
0
0
The switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch’s internal clock with an
atomic time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock
to be consistent with other devices on the network and generates accurate syslogs.
107
Statistics Menu
The following table describes the NTP statistics:
Table 75 NTP statistics
Statistics
Description
Primary Server
• Requests Sent—The total number of NTP requests the switch sent to
the primary NTP server to synchronize time.
• Responses Received—The total number of NTP responses received
from the primary NTP server.
• Updates—The total number of times the switch updated its time based
on the NTP responses received from the primary NTP server.
Secondary Server
• Requests Sent—The total number of NTP requests the switch sent to
the secondary NTP server to synchronize time.
• Responses Received—The total number of NTP responses received
from the secondary NTP server.
• Updates—The total number of times the switch updated its time based
on the NTP responses received from the secondary NTP server.
108
Statistics Menu
Uplink Failure Detection statistics
This menu option allows you to display Uplink Failure Detection (UFD) statistics. To reset UFD statistics,
follow the command /stats/ufd with the following argument: clear.
Command: /stats/ufd
Uplink
Number
Number
Number
Failure Detection statistics:
of times LtM link failure: 1
of times LtM link in Blocking State: 0
of times LtD got auto disabled: 1
The following table describes the Uplink Failure Detection (UFD) statistics:
Table 76 Uplink Failure Detection statistics
Statistics
Description
Number of times LtM link failure
The total numbers of times that link failures were detected on
the uplink ports in the Link to Monitor group.
Number of times LtM link in Blocking
State
The total number of times that Spanning Tree Blocking state
was detected on the uplink ports in the Link to Monitor group.
Number of times LtD got auto disabled
The total numbers of times that downlink ports in the Link to
Disable group were automatically disabled because of a
failure in the Link to Monitor group.
Statistics dump
Command: /stats/dump
Use the dump command to dump all switch statistics available from the Statistics Menu (40K or more,
depending on your configuration). This data can be used to tune or debug switch performance.
If you want to capture dump data to a file, set your communication software on your workstation to
capture session data prior to issuing the dump commands.
109
Configuration Menu
Configuration Menu
Introduction
The Configuration Menu is only available from an administrator login. It includes submenus for
configuring every aspect of the switch. Changes to configuration are not active until explicitly applied.
Changes can be saved to non-volatile memory (NVRAM).
Menu information
Command: /cfg
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr
- Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg
- Backup current configuration to FTP/TFTP server
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
The following table describes the Configuration Menu options.
Table 77 Configuration Menu options
Command
Usage
sys
Displays the System Configuration Menu.
port <port number>
Displays the Port Configuration Menu.
l2
Displays the Layer 2 Configuration Menu.
l3
Displays the Layer 3 Configuration Menu.
qos
Displays the Quality of Service Configuration Menu.
acl
Displays the Access Control List Configuration Menu.
rmon
Displays the RMON Configuration Menu.
pmirr
Displays the Mirroring Configuration Menu.
ufd
Displays the Uplink Failure Detection Configuration Menu.
dump
Dumps current configuration to a script file.
ptcfg <host name or IP address of
FTP/TFTP server> <filename on host>
Backs up current configuration to FTP/TFTP server.
110
Configuration Menu
Table 77 Configuration Menu options
Command
Usage
gtcfg <host name or IP address of
FTP/TFTP server> <filename on host>
Restores current configuration from FTP/TFTP server.
cur
Displays the current configuration parameters.
Viewing, applying, reverting, and saving changes
As you use the configuration menus to set switch parameters, the changes you make do not take effect
immediately. All changes are considered pending until you explicitly apply them. Also, any changes are
lost the next time the switch boots unless the changes are explicitly saved.
While configuration changes are in the pending state, you can:
•
•
•
•
View the pending changes
Apply the pending changes
Revert to restore configuration parameters set with the last apply command
Save the changes to flash memory
Viewing pending changes
You can view all pending configuration changes by entering diff at any CLI prompt:
# diff
You can view all pending configuration changes that have been applied but not saved to flash memory
by entering diff flash at any CLI prompt:
# diff flash
Applying pending changes
To make your configuration changes active, you must apply them. To apply configuration changes, enter
the following command at any prompt:
# apply
NOTE: All configuration changes take effect immediately when applied.
Reverting changes
The revert command removes configuration changes that have been made, but not applied. Enter
revert apply to remove all changes that have not been saved:
# revert
111
Configuration Menu
Saving the configuration
In addition to applying the configuration changes, you can save them to flash memory on the switch.
IMPORTANT: If you do not save the changes, they will be lost the next time the system is
rebooted.
To save the new configuration, enter the following command at any prompt:
# save
When you save configuration changes, the changes are saved to the active configuration block. The
configuration being replaced by the save is first copied to the backup configuration block. If you do not
want the previous configuration block copied to the backup configuration block, enter the following
instead:
# save n
You can decide which configuration you want to run the next time you reset the switch. Your options
include:
•
•
•
The active configuration block
The backup configuration block
Factory default configuration block
You can view all pending configuration changes that have been applied but not saved to flash memory
using the diff flash command. It is a global command that can be executed from any prompt.
For instructions on selecting the configuration to run at the next system reset, see the “Selecting a
configuration block” section in the “Boot Options Menu” chapter.
Reminders
CLI reminders prompt users to complete configuration tasks that require multiple steps. The default setting
for CLI reminders is enabled. Use the following command to disable CLI reminders:
/cfg/sys/reminders dis
The following is an example of a configuration task performed with CLI reminders enabled.
>> Layer 2# vlan 5
VLAN number 5 with name "VLAN 5" created.
Reminder: VLAN 5 needs to be enabled.
>> VLAN 5# add 9
Port 9 is an UNTAGGED port and its current PVID is 1.
Confirm changing PVID from 1 to 5 [y/n]: y
Current ports for VLAN 5:
empty
Pending new ports for VLAN 5:
9
Reminder: Port 9 needs to be enabled.
Reminder: VLAN 5 needs to be enabled.
112
Configuration Menu
System configuration
Command: /cfg/sys
[System Menu]
syslog
sshd
radius
tacacs+
ntp
ssnmp
access
date
time
timezone
olddst
dlight
idle
notice
bannr
hprompt
bootp
dhcp
reminders
cur
-
Syslog Menu
SSH Server Menu
RADIUS Authentication Menu
TACACS+ Authentication Menu
NTP Server Menu
System SNMP Menu
System Access Menu
Set system date
Set system time
Set system timezone (daylight savings)
Set system DST for US
Set system daylight savings
Set timeout for idle CLI sessions
Set login notice
Set login banner
Enable/disable display hostname (sysName) in CLI prompt
Enable/disable use of BOOTP
Enable/disable use of DHCP on Mgmt interface
Enable/disable Reminders
Display current system-wide parameters
This menu provides configuration of switch management parameters such as user and administrator
privilege mode passwords, browser-based management settings, and management access list.
The following table describes the System Configuration Menu options.
Table 78 System Configuration Menu options
Command
Usage
syslog
Displays the Syslog Menu.
sshd
Displays the SSH Server Menu.
radius
Displays the RADIUS Authentication Menu.
tacacs+
Displays the TACACS+ Menu.
ntp
Displays the Network Time Protocol (NTP) Server Menu.
ssnmp
Displays the System SNMP Menu.
access
Displays the System Access Menu.
date
Prompts the user for the system date.
time
Configures the system time using a 24-hour clock format.
timezone
Configures the time zone where the switch resides. You are prompted to select
your location (continent, country, region) by the timezone wizard. Once a
region is selected, the switch updates the time to reflect local changes to
Daylight Savings Time, etc.
olddst
Enables or disables use of the Daylight Saving Time (DST) rules in effect prior
to the year 2007. The default value is disabled.
113
Configuration Menu
Table 78 System Configuration Menu options
Command
Usage
dlight enable|disable
Enables or disables daylight savings time in the system clock. When enabled,
the switch adds an extra hour to the system clock so that it is consistent with the
local clock. The default setting is disabled.
idle <1-60>
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The default value is
5 minutes.
This setting affects both the console port and Telnet port.
notice <1-1024 character
multi-line> <'-' to end>
Displays login notice immediately before the Enter password: prompt. This
notice can contain up to 1024 characters and new lines.
bannr <1-80 characters>
Configures a login banner of up to 80 characters. When a user or
administrator logs into the switch, the login banner is displayed. It is also
displayed as part of the output from the /info/sys/gen command.
hprompt disable|enable
Enables or disables displaying of the host name (system administrator’s name)
in the command line interface.
bootp disable|enable
Enables or disables the use of BOOTP. If you enable BOOTP, the switch will
query its BOOTP server for all of the switch IP parameters. The default value is
enabled.
dhcp disable|enable
Enables or disables Dynamic Host Control Protocol for setting the
management IP address on interface 250. When enabled, the IP
address obtained from the DHCP server overrides the static IP address.
The default value is enabled.
reminders disable|enable
Enables or disables reminder messages in the CLI. The default value is
enabled.
cur
Displays the current system parameters.
System host log configuration
Command: /cfg/sys/syslog
[Syslog Menu]
host
host2
sever
sever2
facil
facil2
console
log
cur
-
Set IP address of first syslog host
Set IP address of second syslog host
Set the severity of first syslog host
Set the severity of second syslog host
Set facility of first syslog host
Set facility of second syslog host
Enable/disable console output of syslog messages
Enable/disable syslogging of features
Display current syslog settings
114
Configuration Menu
The following table describes the Syslog Configuration Menu options.
Table 79 Syslog Configuration Menu options
Command
Description
host <IP address>
Sets the IP address of the first syslog host. For example, 100.10.1.1.
host2 <IP address>
Sets the IP address of the second syslog host. For example, 100.10.1.2.
sever <1-7>
Sets the severity level of the first syslog host displayed. The default is 7, which
means log all the severity levels.
sever2 <1-7>
Sets the severity level of the second syslog host displayed. The default is 7,
which means log all the severity levels.
facil <1-7>
This option sets the facility level of the first syslog host displayed. The range is
0-7. The default is 0.
facil2 <1-7>
This option sets the facility level of the second syslog host displayed. The range
is 0-7. The default is 0.
console disable|enable
Enables or disables delivering syslog messages to the console. When
necessary, disabling console ensures the switch is not affected by syslog
messages. It is enabled by default.
log <feature|all>
<enable|disable>
Displays a list of features for which syslog messages can be generated. You
can choose to enable/disable specific features or enable/disable syslog on all
available features.
Features include:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
cur
console
system
mgmt
cli
stg
vlan
ssh
vrrp
ntp
ip
web
ospf
rmon
ufd
802.1x
cfg
Displays the current syslog settings.
115
Configuration Menu
Secure Shell Server configuration
Command: /cfg/sys/sshd
[SSHD Menu]
interval–
scpadm –
hkeygen skeygen sshport ena
dis
on
off
cur
-
Set Interval for generating the RSA server key
Set SCP-only admin password
Generate the RSA host key
Generate the RSA server key
Set SSH server port number
Enable the SCP apply and save
Disable the SCP apply and save
Turn SSH server ON
Turn SSH server OFF
Display current SSH server configuration
Telnet traffic on the network is not secure. This menu enables Secure Shell (SSH) access from any SSH
client. The SSH program securely logs into another computer over a network and executes commands in a
secure environment. All data using SSH is encrypted.
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on SSH.
The following table describes the SSHD Configuration Menu options.
Table 80 SSHD Configuration Menu options
Command
Description
intrval <0-24>
Defines interval for auto-generating the RSA server key. The switch will autogenerate the RSA server key at the interval defined in this command. The value
of zero (0) means the RSA server key auto-generation is disabled. If the switch
has been busy performing any other key generation and the assigned time of
interval expires, the RSA server will skip generating the key.
scpadm
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another. In
the switch, SCP is used to download and upload the switch configuration using
secure channels.
hkeygen
Generates the RSA host keys manually. The switch creates this key
automatically while configuring the switch with Secure Shell (SSH). But you can
generate the key manually by using this command if you need to overwrite the
key for security reasons. The command will take effect immediately without
executing the apply command.
skeygen
Generates the RSA server key. The switch creates this key automatically while
configuring the switch with Secure Shell (SSH). You can generate the key
manually by using this command if you need to overwrite the key for security
reasons. The command will take effect immediately without executing the apply
command.
sshport <TCP port number>
Sets the SSH server port number.
ena
Enables the SCP apply and save.
dis
Disables the SCP apply and save. This is the default for SCP.
on
Enables the SSH server.
116
Configuration Menu
Table 80 SSHD Configuration Menu options
Command
Description
off
Disables the SSH server. This is the default for the SSH server.
cur
Displays the current SSH server configuration.
RADIUS server configuration
Command: /cfg/sys/radius
[RADIUS Server
prisrv
secsrv
secret
secret2 port
retries timeout bckdoor secbd
on
off
cur
-
Menu]
Set primary RADIUS server address
Set secondary RADIUS server address
Set primary RADIUS server secret
Set secondary RADIUS server secret
Set RADIUS port
Set RADIUS server retries
Set RADIUS server timeout
Enable/disable RADIUS backdoor for telnet/ssh/http/https
Enable/disable RADIUS secure backdoor for telnet/ssh/http/https
Turn RADIUS authentication ON
Turn RADIUS authentication OFF
Display current RADIUS configuration
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on RADIUS.
The following table describes the RADIUS Server Configuration Menu options.
Table 81 RADIUS Server Configuration Menu options
Command
Description
prisrv <IP address>
Sets the primary RADIUS server address.
secsrv <IP address>
Sets the secondary RADIUS server address.
secret <1-32 characters>
This is the shared secret between the switch and the RADIUS server(s).
secret2 <1-32 characters>
This is the secondary shared secret between the switch and the RADIUS
server(s).
port <UDP port number>
Enter the number of the User Datagram Protocol (UDP) port to be
configured, between 1500-3000. The default is 1645.
retries <1-3>
Sets the number of failed authentication requests before switching to a
different RADIUS server. The range is 1-3 requests The default is 3 requests.
timeout <1-10>
Sets the amount of time, in seconds, before a RADIUS server authentication
attempt is considered to have failed. The range is 1-10 seconds. The default
is 3 seconds.
bckdoor enable|disable
Enables or disables the RADIUS back door for telnet/SSH/ HTTP/HTTPS.
This command does not apply when secure backdoor (secbd) is enabled.
secbd enable|disable
Enables or disables the RADIUS back door using secure password for
telnet/SSH/HTTP/HTTPS. This command does not apply when backdoor
(telnet) is enabled.
117
Configuration Menu
Table 81 RADIUS Server Configuration Menu options
Command
Description
on
Enables the RADIUS server.
off
Disables the RADIUS server. This is the default.
cur
Displays the current RADIUS server parameters.
IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting
via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can
connect using noradius and the administrator password even if the backdoor (telnet) or secure
backdoor (secbd) are disabled.
If Telnet backdoor is enabled (telnet ena), type in noradius as a backdoor to bypass RADIUS
checking, and use the administrator password to log into the switch. The switch allows this even if
RADIUS servers are available.
If secure backdoor is enabled (secbd ena), type in noradius as a backdoor to bypass RADIUS
checking, and use the administrator password to log into the switch. The switch allows this only if
RADIUS servers are not available.
TACACS+ server configuration
Command: /cfg/sys/tacacs+
[TACACS+ Server Menu]
prisrv - Set IP address of primary TACACS+ server
secsrv - Set IP address of secondary TACACS+ server
secret - Set secret for primary TACACS+ server
secret2 - Set secret for secondary TACACS+ server
port
- Set TACACS+ port number
retries - Set number of TACACS+ server retries
timeout - Set timeout value of TACACS+ server retries
bckdoor - Enable/disable TACACS+ back door for telnet/ssh/http/https
secbd - Enable/disable TACACS+ secure backdoor for telnet/ssh/http/https
cmap
- Enable/disable TACACS+ new privilege level mapping
usermap - Set user privilege mappings
on
- Enable TACACS+ authentication
off
- Disable TACACS+ authentication
cur
- Display current TACACS+ settings
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a
remote access server to forward a user's logon password to an authentication server to determine whether
access can be allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service
(RADIUS) protocols are more secure than the TACACS encryption protocol. TACACS+ is described in RFC
1492.
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol
(TCP) whereas RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication
and authorization in a user profile, whereas TACACS+ separates the two operations.
118
Configuration Menu
TACACS+ offers the following advantages over RADIUS as the authentication device:
•
•
•
TACACS+ is TCP-based, so it facilitates connection-oriented traffic.
It supports full-packet encryption, as opposed to password-only in authentication requests.
It supports decoupled authentication, authorization, and accounting.
The following table describes the TACACS+ Server Configuration Menu options.
Table 82 TACACS+ Server Configuration Menu options
Command
Description
prisrv <IP address>
Defines the primary TACACS+ server address.
secsrv <IP address>
Defines the secondary TACACS+ server address.
secret <1-32 characters>
This is the shared secret between the switch and the TACACS+ server(s).
secret2 <1-32 characters>
This is the secondary shared secret between the switch and the TACACS+
server(s).
port <TCP port number>
Enter the number of the TCP port to be configured, between 1 and 65000.
The default is 49.
retries <1-3>
Sets the number of failed authentication requests before switching to a
different TACACS+ server. The range is 1-3 requests. The default is 3
requests.
timeout <4-15>
Sets the amount of time, in seconds, before a TACACS+ server authentication
attempt is considered to have failed. The range is 4-15 seconds. The default
is 5 seconds.
bckdoor enable|disable
Enables or disables the TACACS+ back door for telnet/SSH/HTTP/HTTPS.
This command does not apply when secure backdoor (secbd) is enabled.
secbd enable|disable
Enables or disables the TACACS+ back door using secure password for
telnet/SSH/HTTP/HTTPS. This command does not apply when backdoor
(telnet) is enabled.
cmap enable|disable
Enables or disables TACACS+ privilege-level mapping.
The default value is disabled.
usermap <0-15>
user|oper|admin|none
Maps a TACACS+ authorization level to a switch user level. Enter a
TACACS+ authorization level (0-15), followed by the corresponding HP
10GbE switch user level.
on
Enables the TACACS+ server.
off
Disables the TACACS+ server.
cur
Displays current TACACS+ configuration parameters.
IMPORTANT: If TACACS+ is enabled, you must login using TACACS+ authentication when
connecting via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled,
so you can connect using notacacs and the administrator password even if the backdoor
(bckdoor) or secure backdoor (secbd) are disabled.
If Telnet backdoor is enabled (bckdoor ena), type notacacs as a backdoor to bypass
TACACS+ checking, and use the administrator password to log into the switch. The switch allows
this even if TACACS+ servers are available.
119
Configuration Menu
If secure backdoor is enabled (secbd ena), type in notacacs as a backdoor to bypass
TACACS+ checking, and use the administrator password to log into the switch. The switch allows
this only if TACACS+ servers are not available.
NTP server configuration
Command: /cfg/sys/ntp
[NTP Server Menu]
prisrv
- Set primary NTP server address
secsrv
- Set secondary NTP server address
intrval - Set NTP server resync interval
on
- Turn NTP service ON
off
- Turn NTP service OFF
cur
- Display current NTP configuration
This menu enables you to synchronize the switch clock to a Network Time Protocol (NTP) server. By
default, this option is disabled.
The following table describes the NTP Server Configuration Menu options.
Table 83 NTP Server Configuration Menu options
Command
Description
prisrv <IP address>
mgt|data
Configures the IP addresses of the primary NTP server to which you want to
synchronize the switch clock.
By default, the mgt option for the management port is used. To use data ports,
specify the data option.
secsrv <IP address>
mgt|data
Configures the IP addresses of the secondary NTP server to which you want to
synchronize the switch clock.
intrval <1-44640>
Specifies the interval, that is, how often, in minutes (1-44640), to resynchronize the
switch clock with the NTP server. The default is 1440 seconds.
on
Enables the NTP synchronization service.
off
Disables the NTP synchronization service. This is the default.
cur
Displays the current NTP service settings.
120
Configuration Menu
System SNMP configuration
Command: /cfg/sys/ssnmp
[SNMP Menu]
snmpv3
name
locn
cont
rcomm
wcomm
timeout
auth
linkt
ufd
cur
-
SNMPv3 Menu
Set SNMP "sysName"
Set SNMP "sysLocation"
Set SNMP "sysContact"
Set SNMP read community string
Set SNMP write community string
Set timeout for the SNMP state machine
Enable/disable SNMP "sysAuthenTrap"
Enable/disable SNMP link up/down trap
Enable/disable SNMP Uplink Failure Detection trap
Display current SNMP configuration
The switch software supports SNMP-based network management. In SNMP model of network management, a management station (client/manager) accesses a set of variables known as MIBs (Management
Information Base) provided by the managed device (agent). If you are running an SNMP network
management station on your network, you can manage the switch using the following standard SNMP
MIBs:
•
•
•
MIB II (RFC 1213)
Ethernet MIB (RFC 1643)
Bridge MIB (RFC 1493)
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP
messages. Each SNMP message sent to the agent contains a list of management objects to retrieve or to
modify.
•
•
•
•
•
•
•
SNMP parameters that can be modified include:
System name
System location
System contact
Use of the SNMP system authentication trap function
Read community string
Write community string
The following table describes the System SNMP Configuration Menu options.
Table 84 System SNMP Configuration Menu options
Command
Description
snmpv3
Displays SNMPv3 menu.
name <1-64 characters>
Configures the name for the system. The name can have a maximum of 64
characters.
locn <1-64 characters>
Configures the name of the system location. The location can have a maximum
of 64 characters.
cont <1-64 characters>
Configures the name of the system contact. The contact can have a maximum of
64 characters.
121
Configuration Menu
Table 84 System SNMP Configuration Menu options
Command
Description
rcomm <1-32 characters>
Configures the SNMP read community string. The read community string
controls SNMP “get” access to the switch. It can have a maximum of 32
characters. The default read community string is public.
wcomm <1-32 characters>
Configures the SNMP write community string. The write community string
controls SNMP “set” and “get” access to the switch. It can have a maximum of
32 characters. The default write community string is private.
timeout <1-30>
Sets the timeout value for the SNMP state machine. The range is 1-30 minutes.
The default value is 5 minutes.
auth disable|enable
Enables or disables the use of the system authentication trap facility. The default
setting is disabled.
linkt <port>
[disable|enable]
Enables or disables the sending of SNMP link up and link down traps. The
default setting is enabled.
ufd
Enables or disables the sending of Uplink Failure Detection traps. The default
setting is disabled.
cur
Displays the current SNMP configuration.
SNMPv3 configuration
Command: /cfg/sys/ssnmp/snmpv3
[SNMPv3 Menu]
usm
view
access
group
comm
taddr
tparam
notify
v1v2
cur
-
usmUser Table Menu
vacmViewTreeFamily Table Menu
vacmAccess Table Menu
vacmSecurityToGroup Table Menu
community Table Menu
targetAddr Table Menu
targetParams Table Menu
notify Table Menu
Enable/disable V1/V2 access
Display current SNMPv3 configuration
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework
by supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.
122
Configuration Menu
The following table describes the SNMPv3 Configuration Menu options.
Table 85 SNMPv3 Configuration Menu options
Command
Description
usm <1-16>
Configures a user security model (USM) entry for an authorized user. You can also
configure this entry through SNMP. The range is 1-16.
view <1-128>
Configures different MIB views. The range is 1-128.
access <1-32>
Configures access rights. The View-based Access Control Model defines a set of
services that an application can use for checking access rights of the user. You need
access control when you have to process retrieval or modification request from an
SNMP entity. The range is 1-32.
group <1-16>
Configures an SNMP group. A group maps the user name to the access group names
and their access rights needed to access SNMP management objects. A group defines
the access rights assigned to all names that belong to a particular group. The range is
1-16.
comm <1-16>
Configures a community table entry. The community table contains objects for
mapping community strings and version-independent SNMP message parameters. The
range is 1-16.
taddr <1-16>
Configures the destination address and user security levels for outgoing notifications.
This is also called the transport endpoint. The range is 1-16.
tparam <1-16>
Configures SNMP parameters, consisting of message processing model, security
model, security level, and security name information. There may be multiple transport
endpoints associated with a particular set of SNMP parameters, or a particular
transport endpoint may be associated with several sets of SNMP parameters.
notify <1-16>
Configures a notification index. A notification application typically monitors a system
for particular events or conditions, and generates Notification-Class messages based
on these events or conditions. The range is 1-16.
v1v2 disable|enable
Enables or disables the access to SNMP version 1 and version 2. This command is
enabled by default.
cur
Displays the current SNMPv3 configuration.
User Security Model configuration
Command: /cfg/sys/ssnmp/snmpv3/usm
[SNMPv3 usmUser
name
auth
authpw
priv
privpw
del
cur
-
1 Menu]
Set USM user name
Set authentication protocol
Set authentication password
Set privacy protocol
Set privacy password
Delete usmUser entry
Display current usmUser configuration
You can make use of a defined set of user identities using this Security Model. An SNMP engine must
have the knowledge of applicable attributes of a user.
This menu helps you create a user security model entry for an authorized user. You need to provide a
security name to create the USM entry.
123
Configuration Menu
The following table describes the User Security Model Configuration Menu options.
Table 86 User Security Model Configuration Menu options
Command
Description
name <1-32 characters>
Configures a string up to 32 characters long that represents the name of the user.
This is the login name that you need in order to access the switch.
auth md5|sha|none
Configures the authentication protocol between HMAC-MD5-96 or HMAC-SHA-96.
The default algorithm is none.
authpw
Configures your password for authentication. If you selected an authentication
algorithm using the above command, you need to provide a password; otherwise
you will get an error message during validation.
priv des|none
Configures the type of privacy protocol on the switch. The privacy protocol protects
messages from disclosure. The options are des (CBC-DES Symmetric Encryption
Protocol) or none. If you specify des as the privacy protocol, then be sure that you
have selected one of the authentication protocols (MD5 or HMAC-SHA-96). If you
select none as the authentication protocol, you will get an error message.
privpw
Configures the privacy password.
del
Deletes the USM user entries.
cur
Displays the USM user entries.
SNMPv3 View configuration
Command: /cfg/sys/ssnmp/snmpv3/view
[SNMPv3 vacmViewTreeFamily 1 Menu]
name
- Set view name
tree
- Set MIB subtree(OID) which defines a family of view subtrees
mask
- Set view mask
type
- Set view type
del
- Delete vacmViewTreeFamily entry
cur
- Display current vacmViewTreeFamily configuration
The following table describes the SNMPv3 View Configuration Menu options.
Table 87 SNMPv3 View Configuration Menu options
Command
Description
name <1-32
characters>
Defines the name for a family of view subtrees up to a maximum of 32 characters.
tree <1-64
characters>
Defines the Object Identifier (OID), a string which, when combined with the
corresponding mask, defines a family of view subtrees.
An example of an OID is 1.3.6.1.2.1.1.1.0
mask <1-32
characters>
Defines the bit mask, which in combination with the corresponding tree defines a
family of view subtrees. The mask can have a maximum of 32 characters.
type
included|excluded
Selects whether the corresponding instances of vacmViewTreeFamilySubtree
and vacmViewTreeFamilyMask define a family of view subtrees, which is included
in or excluded from the MIB view.
del
Deletes the vacmViewTreeFamily group entry.
124
Configuration Menu
Table 87 SNMPv3 View Configuration Menu options
Command
Description
cur
Displays the current vacmViewTreeFamily configuration.
View-based Access Control Model configuration
Command: /cfg/sys/ssnmp/snmpv3/access
[SNMPv3 vacmAccess 1 Menu]
name
- Set group name
model
- Set security model
level
- Set minimum level of security
rview
- Set read view index
wview
- Set write view index
nview
- Set notify view index
del
- Delete vacmAccess entry
cur
- Display current vacmAccess configuration
The view-based Access Control Model defines a set of services that an application can use for checking
access rights of the user. Access control is needed when the user has to process SNMP retrieval or
modification request from an SNMP entity.
The following table describes the User Access Control Configuration Menu options.
Table 88 View-based Access Control Configuration Menu options
Command
Description
name <1-32 characters>
Defines the name of the group, up to a maximum of 32 characters.
model usm|snmpv1|snmpv2 Selects the security model to be used.
level
Defines the minimum level of security required to gain access rights. The level
noAuthNoPriv|authNoPriv noAuthNoPriv means that the SNMP message will be sent without
|authPriv
authentication and without using a privacy protocol. The level authNoPriv
means that the SNMP message will be sent with authentication but without using a
privacy protocol. The authPriv means that the SNMP message will be sent both
with authentication and using a privacy protocol.
rview <1-32 characters>
Defines a 32 character long read view name that allows you read access to a
particular MIB view. If the value is empty or if there is no active MIB view having
this value then no access is granted.
wview <1-32 characters>
Defines a 32 character long write view name that allows you write access to the
MIB view. If the value is empty or if there is no active MIB view having this value
then no access is granted.
nview <1-32 characters>
Defines a 32 character long notify view name that allows you notify access to the
MIB view.
del
Deletes the View-based Access Control entry.
cur
Displays the View-based Access Control configuration.
125
Configuration Menu
SNMPv3 Group configuration
Command: /cfg/sys/ssnmp/snmpv3/group
[SNMPv3 vacmSecurityToGroup 1 Menu]
model
- Set security model
uname
- Set USM user name
gname
- Set group name
del
- Delete vacmSecurityToGroup entry
cur
- Display current vacmSecurityToGroup configuration
The following table describes the SNMPv3 Group Configuration Menu options.
Table 89 SNMPv3 Group Configuration Menu options
Command
Description
model usm|snmpv1|snmpv2
Defines the security model.
uname <1-32 characters>
Sets the user name as defined in /cfg/sys/ssnmp/snmpv3/usm/name.
The user name can have a maximum of 32 characters.
gname <1-32 characters>
Configures the name for the access group as defined in
/cfg/sys/ssnmp/snmpv3/access/name. The group name can have a
maximum of 32 characters.
del
Deletes the vacmSecurityToGroup entry.
cur
Displays the current vacmSecurityToGroup configuration.
SNMPv3 Community Table configuration
Command: /cfg/sys/ssnmp/snmpv3/comm
[SNMPv3 snmpCommunityTable 1 Menu]
index
- Set community index
name
- Set community string
uname
- Set USM user name
tag
- Set community tag
del
- Delete communityTable entry
cur
- Display current communityTable configuration
This command is used for configuring the community table entry. The configured entry is stored in the
community table list in the SNMP engine. This table is used to configure community strings in the Local
Configuration Datastore (LCD) of SNMP engine.
The following table describes the SNMPv3 Community Table Configuration Menu options.
Table 90 SNMPv3 Community Table Configuration Menu options
Command
Description
index <1-32
characters>
Configures the unique index value of a row in this table. The index can have a
maximum of 32 characters.
name <1-32 characters>
Configures the name as defined in /cfg/sys/ssnmp/snmpv3/usm/name. The
name can have a maximum of 32 characters.
uname <1-32
characters>
Defines a readable 32 character string that represents the corresponding value of
an SNMP community name in a security model.
126
Configuration Menu
Table 90 SNMPv3 Community Table Configuration Menu options
Command
Description
tag <1-255 characters>
Configures a tag of up to 255 characters maximum. This tag specifies a set of
transport endpoints to which a command responder application sends an SNMP
trap.
del
Deletes the community table entry.
cur
Displays the community table configuration.
SNMPv3 Target Address Table configuration
Command: /cfg/sys/ssnmp/snmpv3/taddr
[SNMPv3 snmpTargetAddrTable 1 Menu]
name
- Set target address name
addr
- Set target transport address IP
port
- Set target transport address port
taglist - Set tag list
pname
- Set targetParams name
del
- Delete targetAddrTable entry
cur
- Display current targetAddrTable configuration
This menu allows you to set passwords and display current user statistics. Passwords can be a maximum
of 15 characters. To disable a user, set the password to null by simply pressing the Enter key when
prompted for the password.
The following table describes the SNMPv3 Target Address Table Configuration Menu options.
Table 91 SNMPv3 Target Address Table Configuration Menu options
Command
Description
name <1-32 characters>
Configures the locally arbitrary, but unique identifier, target address name
associated with this entry.
addr <transport address ip>
Configures a transport address IP that can be used in the generation of
SNMP traps.
port <transport address port
(1-65535)>
Configures a transport address port that can be used in the generation of
SNMP traps.
taglist <1-255 characters>
Configures a list of tags (up to 255 characters maximum) that are used to
select target addresses for a particular operation.
pname <1-32 characters>
Defines the name as defined in
/cfg/sys/ssnmp/snmpv3/tparam/name.
del
Deletes the Target Address Table entry.
cur
Displays the current Target Address Table configuration.
127
Configuration Menu
SNMPv3 Target Parameters Table configuration
Command: /cfg/sys/ssnmp/snmpv3/tparam
[SNMPv3 snmpTargetParamsTable 1 Menu]
name
- Set targetParams name
mpmodel - Set message processing model
model
- Set security model
uname
- Set USM user name
level
- Set minimum level of security
del
- Delete targetParamsTable entry
cur
- Display current targetParamsTable configuration
You can configure the target parameters entry and store it in the target parameters table in the SNMP
engine. This table contains parameters that are used to generate a message. The parameters include the
message processing model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for
example: USM), the security name, and the security level (noAuthnoPriv, authNoPriv, or
authPriv).
The following table describes the SNMPv3 Target Parameters Table Configuration Menu options.
Table 92 SNMPv3 Target Parameters Table Configuration Menu options
Command
Description
name <1-32 characters>
Configures the locally arbitrary, but unique identifier that is associated with this
entry.
mpmodel
snmpv1|snmpv2c|snmpv3
Configures the message processing model that is used to generate SNMP
messages.
model usm|snmpv1|snmpv2
Selects the security model to be used when generating the SNMP messages.
uname <1-32 characters>
Defines the name that identifies the user in the USM table, on whose behalf the
SNMP messages are generated using this entry.
level
noAuthNoPriv|authNoPriv|
authPriv
Selects the level of security to be used when generating the SNMP messages
using this entry. The level noAuthNoPriv means that the SNMP message will
be sent without authentication and without using a privacy protocol. The level
authNoPriv means that the SNMP message will be sent with authentication
but without using a privacy protocol. The authPriv means that the SNMP
message will be sent both with authentication and using a privacy protocol.
del
Deletes the targetParamsTable entry.
cur
Displays the current targetParamsTable configuration.
SNMPv3 Notify Table configuration
Command: /cfg/sys/ssnmp/snmpv3/notify
[SNMPv3 snmpNotifyTable 1 Menu]
name
- Set notify name
tag
- Set notify tag
del
- Delete notifyTable entry
cur
- Display current notifyTable configuration
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for
particular events or conditions, and generates Notification-Class messages based on these events or
conditions.
128
Configuration Menu
The following table describes the SNMPv3 Notify Table Configuration menu options.
Table 93 SNMPv3 Notify Table Configuration Menu options
Command
Description
name <1-32 characters>
Defines a locally arbitrary but unique identifier associated with this SNMP notify
entry.
tag <1-255 characters>
Defines a tag of 255 characters maximum that contains a tag value which is
used to select entries in the Target Address Table. Any entry in the
snmpTargetAddrTable, that matches the value of this tag, is selected.
del
Deletes the notify table entry.
cur
Displays the current notify table configuration.
System Access configuration
Command: /cfg/sys/access
[System Access Menu]
mgmt
- Management Network Definition Menu
user
- User Access Control Menu (passwords)
http
- Enable/disable HTTP (Web) access
https
- HTTPS Web Access Menu
wport
- Set HTTP (Web) server port number
snmp
- Set SNMP access control
tsbbi
- Enable/disable telnet/ssh configuration from BBI
tnet
- Enable/disable Telnet access
tnport
- Set Telnet server port number
tport
- Set the TFTP Port for the system
cur
- Display current system access configuration
The following table describes the System Access Configuration menu options.
Table 94 System Access Configuration Menu options
Command
Description
mgmt
Displays the Management Configuration Menu.
user
Displays the User Access Control Menu.
http disable|enable
Enables or disables HTTP (Web) access to the Browser-based Interface. It is
enabled by default.
https
Displays the HTTPS Menu.
wport <TCP port number>
Sets the switch port used for serving switch Web content. The default is
HTTP port 80.
snmp disable|readonly|read-write
Disables or provides read-only/write-read SNMP access.
tsbbi enable|disable
Enables or disables BBI configuration control s for Telnet and SSH.
tnet disable|enable
Enables or disables Telnet access. You see this command only if you are
connected to the switch through a serial connection. The default setting is
enabled.
129
Configuration Menu
Table 94 System Access Configuration Menu options
Command
Description
tnport <TCP port number> Sets an optional telnet server port number for cases where the server listens for
telnet sessions on a non-standard port.
tport <TFTP port number> Sets an optional telnet server port number for cases where the server listens for
TFTP sessions on a non-standard port.
Displays the current system access parameters.
cur
Management Networks configuration
Command: /cfg/sys/access/mgmt
[Management Networks Menu]
add
- Add mgmt network definition
rem
- Remove mgmt network definition
cur
- Display current mgmt network definitions
clear
- Clear current mgmt network definitions
The following table describes the Management Networks Configuration menu options. You can configure
up to 10 management networks on the switch.
Table 95 Management Network Configuration menu options
Command
Description
add <IP address> <IP mask>
Adds a defined network through which switch access is allowed through
Telnet, SNMP, RIP, or the browser-based interface. A range of IP addresses is
produced when used with a network mask address. Specify an IP address
and mask address in dotted-decimal notation.
rem <IP address> <IP mask>
Removes a defined network, which consists of a management network
address and a management network mask address.
cur
Displays the current management networks parameters.
clear
Clears the management network definitions.
130
Configuration Menu
User Access Control configuration
Command: /cfg/sys/access/user
[User Access Control Menu]
uid
- User ID Menu
eject
- Eject user
usrpw
- Set user password (user)
opw
- Set operator password (oper)
admpw
- Set administrator password (admin)
cur
- Display current user status
The following table describes the User Access Control menu options.
Table 96 User Access Control Configuration menu options
Command
Description
uid <1-10>
Displays the User ID Menu for the selected user.
eject <username>
Ejects the selected user from the switch.
usrpw <1-128 characters> Sets the user (user) password (maximum 128 characters). The user has no direct
responsibility for switch management. He or she can view switch status
information and statistics, but cannot make any configuration changes.
opw <1-128 characters>
Sets the operator (oper) password (maximum 128 characters). The operator
manages all functions of the switch. He or she can view all switch information
and statistics and can reset ports or the entire switch.
admpw <1-128 characters> Sets the administrator (admin) password (maximum 128 characters). The super
user administrator has complete access to all menus, information, and
configuration commands on the switch, including the ability to change both the
user and administrator passwords.
cur
Displays the current user status.
131
Configuration Menu
User ID configuration
Command: /cfg/sys/access/user/uid
[User ID 1
cos
name
pswd
ena
dis
del
cur
Menu]
- Set class of service
- Set user name
- Set user password
- Enable user ID
- Disable user ID
- Delete user ID
- Display current user configuration
The following table describes the User ID Configuration menu options.
Table 97 User ID Configuration menu options
Command
Description
cos <user|oper|admin>
Sets the Class-of-Service to define the user’s authority level.
name <1-8 characters>
Defines the user name.
pswd <1-128 characters>
Sets the user password of up to 128 characters maximum.
ena
Enables the user ID.
dis
Disables the user ID.
del
Deletes the user ID.
cur
Displays the current user ID parameters.
132
Configuration Menu
HTTPS Access configuration
Command: /cfg/sys/access/https
[https Menu]
access
port
generate
certSave
cur
-
Enable/Disable HTTPS Web access
HTTPS WebServer port number
Generate self-signed HTTPS server certificate
save HTTPS certificate
Display current SSL Web Access configuration
The following table describes the HTTPS Access Configuration Menu options.
Table 98 HTTPS Access Configuration Menu options
Command
Description
access enable|disable
Enables or disables BBI access (Web access) using HTTPS. The default value is
disabled.
port <TCP port number>
Defines the HTTPS Web server port number.
generate
Allows you to generate a certificate to connect to the SSL to be used during the key
exchange. A default certificate is created when HTTPS is enabled for the first time.
The user can create a new certificate defining the information that they want to be
used in the various fields. For example:
•
•
•
•
•
•
•
Country Name (2 letter code) [ ]: CA
State or Province Name (full name) [ ]: Ontario
Locality Name (for example, city) [ ]: Ottawa
Organization Name (for example, company) [ ]: Hewlett-Packard
Organizational Unit Name (for example, section) [ ]: ProLiant
Common Name (for example, user’s name) [ ]: Mr Smith
Email (for example, email address) [ ]: info@hp.com
You must confirm if you want to generate the certificate. It takes approximately
30 seconds to generate the certificate. Then the switch restarts SSL agent.
certSave
Allows the client, or the Web browser, to accept the certificate and save the
certificate to Flash to be used when the switch is rebooted.
cur
Displays the current SSL Web Access configuration.
133
Configuration Menu
Port configuration
Command: /cfg/port <port number>
[Port 1 Menu]
gig
aclqos
8021ppri
pvid
name
rmon
tag
tagpvid
brate
mrate
drate
ena
dis
cur
-
Gig Phy Menu
Acl/Qos Configuration Menu
Set default 802.1p priority
Set default port VLAN id
Set port name
Enable/Disable RMON for port
Enable/disable VLAN tagging for port
Enable/disable tagging on pvid
Set BroadCast Threshold
Set MultiCast Threshold
Set Dest. Lookup Fail Threshold
Enable port
Disable port
Display current port configuration
This menu enables you to configure settings for individual switch ports. This command is enabled by
default.
NOTE: Port 17 is reserved for switch management.
The following table describes the Port Configuration Menu options.
Table 99 Port Configuration Menu options
Command
Description
gig
Displays the Gigabit Ethernet Physical Link Menu.
aclqos
Displays the Access Control List (ACL)/Quality of Service (QoS) configuration menu.
8021ppri
Configures the port’s 802.1p priority level.
pvid <1-4094>
Sets the default VLAN number which will be used to forward frames which are not
VLAN tagged. The default number is 1.
NOTE: VLAN 4095 is reserved for switch management.
name <1-64
characters>|none
Sets a name for the port (maximum 64 characters). The assigned port name displays
next to the port number on some information and statistics screens.
rmon enable|disable
Enables or disables Remote Monitoring for the port. RMON must be enabled for
any RMON configurations to function.
tag enable|disable
Disables or enables VLAN tagging for this port. It is disabled by default.
tagpvid
enable|disable
Disables or enables VLAN tag persistence. When disabled, the VLAN tag is
removed from packets whose VLAN tag matches the port PVID. The default value is
enabled.
brate <0-262143>|dis
Limits the number of broadcast packets per second to the specified value. If disabled
(dis), the port forwards all broadcast packets.
mrate <0-262143>|dis
Limits the number of multicast packets per second to the specified value. If disabled
(dis), the port forwards all multicast packets.
134
Configuration Menu
Table 99 Port Configuration Menu options
Command
Description
drate <0-262143>|dis
Limits the number of unknown unicast packets per second to the specified value. If
disabled (dis), the port forwards all unknown unicast packets.
ena
Enables the port.
dis
Disables the port. To temporarily disable a port without changing its configuration
attributes, see the “Temporarily disabling a port” section later in this chapter.
cur
Displays current port parameters.
Temporarily disabling a port
To temporarily disable a port without changing its stored configuration attributes, enter the following
command at any prompt:
Main# /oper/port <port number>/dis
Because this configuration sets a temporary state for the port, you do not need to use apply or save.
The port state will revert to its original configuration when the switch is reset. See the “Menu information”
section in the “Operations Menu” chapter for other operations-level commands.
135
Configuration Menu
Port link configuration
Command: /cfg/port <port number>/gig
[Gigabit Link
speed
mode
fctl
auto
cur
Menu]
- Set link speed
- Set full or half duplex mode
- Set flow control
- Set auto negotiation
- Display current gig link configuration
Use these menu options to set port parameters for the port link.
Link menu options are described in the following table and display on the Gigabit port configuration
menus for the switch. Using these configuration menus, you can set port parameters such as speed,
duplex, flow control, and negotiation mode for the port link.
The following table describes the Gigabit Link Configuration Menu options.
Table 100 Gigabit Link Configuration Menu options
Command
Description
speed 100|10000
Sets the link speed.
NOTE: All downlink and uplink ports are fixed at 10000 Mbps, and cannot be
changed. Management port 17 is fixed at 100 Mbps.
mode
Sets the operating mode, as follows:
• Full-duplex
NOTE: All ports are fixed at full duplex, and cannot be changed.
fctl rx|tx|both|none
Sets the flow control. The choices include:
•
•
•
•
Receive (rx) flow control
Transmit (tx) flow control
Both receive and transmit flow control (default)
No flow control
NOTE: Management port 17 is fixed at both, and cannot be changed.
auto on|off
Enables or disables auto-negotiation for the port.
NOTE: All downlink and uplink ports are fixed at 10000 Mbps, and cannot be
set to auto-negotiate.
cur
Displays current port parameters.
136
Configuration Menu
Port ACL/QoS configuration
Command: /cfg/port <port number>/aclqos
[Port 20 ACL Menu]
add
- Add ACL or ACL group to this port
rem
- Remove ACL or ACL group from this port
cur
- Display current ACLs for this port
The following table describes the port ACL/QoS Configuration Menu options.
Table 101 Port ACL/QoS Configuration Menu options
Command
Description
add acl <1-384>| grp <1-384>
Assigns an ACL or ACL Group to the port.
rem acl <1-384>| grp <1-384>
Removes an ACL or ACL Group from the port.
cur
Displays current port ACL/QoS parameters.
137
Configuration Menu
Layer 2 configuration
Command: /cfg/l2
[Layer 2 Menu]
8021x
mrst
stp
fdb
trunk
thash
lacp
vlan
upfast
update
cur
-
802.1x Menu
Multiple Spanning Tree/Rapid Spanning Tree Menu
Spanning Tree Menu
FDB Menu
Trunk Group Menu
IP Trunk Hash Menu
Link Aggregation Control Protocol Menu
VLAN Menu
Enable/disable Uplink Fast
UplinkFast station update rate
Display current layer 2 parameters
The following table describes the Layer 2 Configuration Menu options.
Table 102 L2 Configuration Menu options
Command
Description
8021x
Displays the 802.1x Configuration Menu.
mrst
Displays the Rapid Spanning Tree/Multiple Spanning Tree Protocol Configuration
Menu.
stp
Displays the Spanning Tree Configuration Menu.
fdb
Displays the Forwarding Database Configuration Menu.
trunk <1-12>
Displays the Trunk Group Configuration Menu for the selected trunk.
thash
Displays the IP Trunk Hash Menu.
lacp
Displays the Link Aggregation Control Protocol Menu.
vlan <1-4094>
Displays the VLAN Configuration Menu.
upfast enable|disable
Enables or disables Fast Uplink Convergence, which provides rapid Spanning Tree
convergence to an upstream switch during failover.
NOTE: When enabled, this feature increases bridge priorities to 65500 for all
STGs and path cost by 3000 for all external STP ports.
update <10-200>
Configures the station update rate, in packets per second.
The range is 10-200. The default value is 40.
cur
Displays current Layer 2 parameters.
138
Configuration Menu
802.1x configuration
Command: /cfg/l2/8021x
[802.1x Configuration Menu]
global
- Global 802.1x configuration menu
port
- Port 802.1x configuration menu
ena
- Enable 802.1x access control
dis
- Disable 802.1x access control
cur
- Show 802.1x configuration
This feature allows you to configure the HP 10GbE switch as an IEEE 802.1x Authenticator, to provide
port-based network access control. The following table describes the 802.1x Configuration Menu options.
Table 103 802.1x Configuration Menu options
Command
Description
global
Displays the global 802.1x Configuration Menu.
port <port number>
Displays the 802.1x Port Menu.
ena
Globally enables 802.1x.
dis
Globally disables 802.1x.
cur
Displays current 802.1x parameters.
802.1x Global configuration
Command: /cfg/l2/8021x/global
[802.1x Global Configuration Menu]
mode
- Set access control mode
qtperiod - Set EAP-Request/Identity quiet time interval
txperiod - Set EAP-Request/Identity retransmission timeout
suptmout - Set EAP-Request retransmission timeout
svrtmout - Set server authentication request timeout
maxreq
- Set max number of EAP-Request retransmissions
raperiod - Set reauthentication time interval
reauth
- Set reauthentication status to on or off
default - Restore default 802.1x configuration
cur
- Display current 802.1x configuration
The global 802.1x menu allows you to configure parameters that affect all ports in the switch (except
management port 17). The following table describes the 802.1x Global Configuration Menu options.
Table 104 802.1x Global Configuration Menu options
Command
Description
mode forceunauth|auto|forceauth
Sets the type of access control for all ports:
• force-unauth - the port is unauthorized unconditionally.
• auto - the port is unauthorized until it is successfully authorized by the RADIUS
server.
• force-auth - the port is authorized unconditionally, allowing all traffic.
The default value is force-auth.
139
Configuration Menu
Table 104 802.1x Global Configuration Menu options
Command
Description
qtperiod <0-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAP-Request/
Identity frame to the supplicant (client) after an authentication failure in the previous
round of authentication. The default value is 60 seconds.
txperiod <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response/Identity frame
from the supplicant (client) before retransmitting an EAP-Request/Identity frame. The
default value is 30 seconds.
suptmout <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response packet from
the supplicant (client) before retransmitting the EAP-Request packet from the
authentication server. The default value is 30 seconds.
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits for a response from the Radius
server before declaring an authentication timeout. The default value is 30 seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicant’s (client’s) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout (default is 3 seconds).
maxreq <1-10>
Sets the maximum number of times the authenticator retransmits an EAP-Request
packet to the supplicant (client). The default value is 2.
raperiod <1-604800>
Sets the time, in seconds, the authenticator waits before re-authenticating a supplicant
(client) when periodic re-authentication is enabled. The default value is 3600
seconds.
reauth on|off
Sets the re-authentication status to on or off. The default value is off.
default
Resets the global 802.1x parameters to their default values.
cur
Displays current global 802.1x parameters.
802.1x Port configuration
Command: /cfg/l2/8021x/port <port number>
[802.1x Port Configuration Menu]
mode
- Set access control mode
qtperiod - Set EAP-Request/Identity quiet time interval
txperiod - Set EAP-Request/Identity retransmission timeout
suptmout - Set EAP-Request retransmission timeout
svrtmout - Set server authentication request timeout
maxreq
- Set max number of EAP-Request retransmissions
raperiod - Set reauthentication time interval
reauth
- Set reauthentication status to on or off
default - Restore default 802.1x configuration
global
- Apply current global 802.1x configuration to this port
cur
- Display current 802.1x configuration
The 802.1x port menu allows you to configure parameters that affect the selected port in the switch. These
settings override the global 802.1x parameters.
140
Configuration Menu
The following table describes the 802.1x Port Configuration Menu options.
Table 105 802.1x Port Configuration Menu options
Command
Description
mode forceunauth|auto|forceauth
Sets the type of access control for the port:
• force-unauth—the port is unauthorized unconditionally.
• auto—the port is unauthorized until it is successfully authorized by the RADIUS
server.
• force-auth—the port is authorized unconditionally, allowing all traffic.
The default value is force-auth.
qtperiod <0-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAPRequest/ Identity frame to the supplicant (client) after an authentication failure in the
previous round of authentication. The default value is 60 seconds.
txperiod <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response/Identity frame
from the supplicant (client) before retransmitting an EAP-Request/Identity frame. The
default value is 30 seconds.
suptmout <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response packet from
the supplicant (client) before retransmitting the EAP-Request packet from the
authentication server. The default value is 30 seconds.
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits for a response from the RADIUS
server before declaring an authentication timeout. The default value is 30 seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicant’s (client’s) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout (default is 3 seconds).
maxreq <1-10>
Sets the maximum number of times the authenticator retransmits an EAP-Request
packet to the supplicant (client). The default value is 2.
raperiod <1-604800>
Sets the time, in seconds, the authenticator waits before re-authenticating a
supplicant (client) when periodic re-authentication is enabled. The default value is
3600 seconds.
reauth on|off
Sets the re-authentication status to on or off. The default value is off.
default
Resets the global 802.1x parameters to their default values.
global
Applies the global 802.1x parameters to the port.
cur
Displays current 802.1x parameters.
141
Configuration Menu
Rapid Spanning Tree Protocol/
Multiple Spanning Tree Protocol configuration
Command: /cfg/l2/mrst
[Multiple Spanning Tree Menu]
cist
- Common and Internal Spanning Tree menu
name
- Set MST region name
rev
- Set revision level of this MST region
maxhop - Set Maximum Hop Count for MST (4 - 60)
mode
- Spanning Tree Mode
on
- Globally turns RSTP/MSTP ON
off
- Globally turns RSTP/MSTP OFF
cur
- Display current MST parameters
The switch supports the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) and IEEE 802.1s Multiple
Spanning Tree Protocol (MSTP). MSTP allows you to map many VLANs to a small number of spanning
tree groups, each with its own topology.
MSTP supports up to 32 Spanning Tree Groups on the switch (STG 32 is reserved for switch
management). MRST is turned off by default.
NOTE: When Multiple Spanning Tree is turned on, VLAN 1 is moved from Spanning Tree Group 1
to the Common Internal Spanning Tree (CIST). When Multiple Spanning Tree is turned off, VLAN 1
is moved back to Spanning Tree Group 1.
The following table describes the Multiple Spanning Tree Configuration Menu options.
Table 106 Multiple Spanning Tree Configuration Menu options
Command
Description
cist
Displays the Common Internal Spanning Tree (CIST) Menu.
name <1-32
characters>
Configures a name for the MSTP region. All devices within a MSTP region must have the same
region name.
rev <0-65535>
Configures the revision level for the MSTP region. The revision level is used as a numerical
identifier for the region. All devices within a MSTP region must have the same revision level
number. The default value is 1.
maxhop <4-60>
Configures the maximum number of bridge hops a packet may to traverse before it is
dropped. The range is from 4 to 60 hops. The default value is 20.
mode rstp|mstp
Selects either Rapid Spanning Tree mode (rstp) or Multiple Spanning Tree mode (mstp). The
default mode is RSTP.
on
Globally turn RSTP/MSTP ON.
NOTE: When RSTP is turned on, the configuration parameters for STP group 1 apply to RSTP.
off
Globally turn RSTP/MSTP OFF.
cur
Displays the current RSTP/MSTP configuration.
142
Configuration Menu
NOTE:
• IEEE 802.1w standard-based RSTP implementation runs on one STG (i.e. same as one spanning tree
instance) only. As a result, if ‘rstp’ mode is selected under the /cfg/mrst/mode command, then only a
single RSTP instance (default for STG 1) is supported for all VLANs, including the Default VLAN 1.
• If multiple spanning tree instances are required, then select ‘mstp’ mode so that multiple VLANs are handled
by multiple spanning tree instances, as specified by IEEE 802.1s standard-based MSTP implementation.
• IEEE 802.1s MSTP supports rapid convergence using IEEE 802.1w RSTP.
• PVST+ does not support rapid convergence in current versions.
NOTE:
The following configurations are unsupported:
• HP PVST+ (default Spanning Tree setting) is NOT interoperable with Cisco Rapid PVST+.
• HP MSTP/RSTP (with mode set to either ‘mstp’ or ‘rstp’) is NOT interoperable with Cisco Rapid PVST+.
The following configurations are supported:
• HP PVST+ (default Spanning Tree setting) is interoperable with Cisco PVST+.
• HP MSTP/RSTP (with mode set to ‘mstp’) is interoperable with Cisco MST/RSTP.
Common Internal Spanning Tree configuration
Command: /cfg/l2/mrst/cist
[Common Internal Spanning Tree Menu]
brg
- CIST Bridge parameter menu
port
- CIST Port parameter menu
add
- Add VLAN(s) to CIST
default - Default Common Internal Spanning Tree and Member parameters
cur
- Display current CIST parameters
The Common Internal Spanning Tree (CIST) provides compatibility with different MSTP regions and with
devices running different Spanning Tree instances. It is equivalent to Spanning Tree Group 0.
The following table describes the commands used to configure Common Internal Spanning Tree
Configuration Menu options.
Table 107 Common Internal Spanning Tree Configuration Menu options
Command
Description
brg
Displays the CIST Bridge Menu.
port <port number>
Displays the CIST Port Menu.
add <1-4095>
Adds VLANs to the CIST. Enter one VLAN per line, and press Enter to add the VLANs.
default
Resets all CIST parameters to their default values.
cur
Displays the current CIST configuration.
143
Configuration Menu
CIST bridge configuration
Command: /cfg/l2/mrst/cist/brg
[CIST Bridge Menu]
prior
- Set CIST bridge
mxage
- Set CIST bridge
fwd
- Set CIST bridge
cur
- Display current
Priority (0-65535)
Max Age (6-40 secs)
Forward Delay (4-30 secs)
CIST bridge parameters
CIST bridge parameters are used only when the switch is in MSTP mode. CIST parameters do not affect
operation of STP/PVST.
The following table describes the commands used to configure CIST Bridge Configuration Menu options
parameters.
Table 108 CIST Bridge Configuration Menu options
Command
Description
prior <0-65535>
Configures the CIST bridge priority. The bridge priority parameter controls which bridge on
the network is the MSTP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other
switches and bridges on your network. The lower the value, the higher the bridge priority.
The range is 0 to 65535, and the default is 32768.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
mxage <6-40>
Configures the CIST bridge maximum age. The maximum age parameter specifies the
maximum time the bridge waits without receiving a configuration bridge protocol data unit
before it reconfigures the MSTP network. The range is 6 to 40 seconds, and the default is 20
seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
fwd <4-30>
Configures the CIST bridge forward delay parameter. The forward delay parameter
specifies the amount of time that a bridge port has to wait before it changes from the
listening state to the learning state and from the learning state to the forwarding state. The
range is 4 to 30 seconds, and the default is 15 seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
cur
Displays the current CIST bridge configuration.
144
Configuration Menu
CIST port configuration
Command: /cfg/l2/mrst/cist/port <port number>
[CIST Port
prior
cost
hello
link
edge
on
off
cur
1
-
Menu]
Set port Priority (0-240)
Set port Path Cost (1-200000000)
Set CIST port Hello Time (1-10 secs)
Set MSTP link type (auto, p2p, or shared; default: auto)
Enables or disables this port as an edge port
Turn port's Spanning Tree ON
Turn port's Spanning Tree OFF
Display current port Spanning Tree parameters
CIST port parameters are used to modify MRST operation on an individual port basis. CIST parameters do
not affect operation of STP/PVST.
For each port, CIST is turned on by default. Port parameters include:
•
•
•
•
•
•
•
Port priority
Port path cost
Port Hello time
Link type
Edge
On and off
Current port configuration
The port option of MRST is turned on by default.
The following table describes the commands used to configure CIST Port Configuration Menu options.
Table 109 CIST Port Configuration Menu options
Command
Description
prior <0-240>
Configures the CIST port priority. The port priority helps determine which bridge
port becomes the designated port. In a network topology that has multiple
bridge ports connected to a single segment, the port with the lowest port priority
becomes the designated port for the segment. The range is 0 to 240, in steps of
16 (0, 16, 32...), and the default is 128.
cost <1-200000000>
Configures the CIST port path cost. The port path cost is used to help determine
the designated port for a segment. Generally speaking, the faster the port, the
lower the path cost. The default for Gigabit ports is 20000, and for 10Gb ports
is 2000.
hello <1-10>
Configures the CIST port Hello time. The Hello time specifies how often the root
bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge
that is not the root bridge uses the root bridge Hello value. The range is 1 to 10
seconds, and the default is 2 seconds.
link auto|p2p|shared
Defines the type of link connected to the port, as follows:
• auto—Configures the port to detect the link type, and automatically match
its settings.
• p2p—Configures the port for Point-To-Point protocol.
• shared—Configures the port to connect to a shared medium (usually a hub).
The default link type is auto.
145
Configuration Menu
Table 109 CIST Port Configuration Menu options
Command
Description
edge disable|enable
Enables or disables this port as an edge port. An edge port is not connected to
a bridge, and can begin forwarding traffic as soon as the link is up. Configure
server ports as edge ports (enabled). This command is disabled by default.
on
Enables CIST on the port.
off
Disables CIST on the port.
cur
Displays the current CIST port configuration.
146
Configuration Menu
Spanning Tree configuration
Command: /cfg/l2/stp <1-128>
[Spanning Tree Group 1 Menu]
brg
- Bridge parameter menu
port
- Port parameter menu
add
- Add VLAN(s) to Spanning Tree Group
remove - Remove VLAN(s) from Spanning Tree Group
clear
- Remove all VLANs from Spanning Tree Group
on
- Globally turn Spanning Tree ON
off
- Globally turn Spanning Tree OFF
default - Default Spanning Tree and Member parameters
cur
- Display current bridge parameters
The HP 10GbE switch supports the IEEE 802.1d Spanning Tree Protocol (STP) and Cisco proprietary PVST
and PVST+ protocols. You can configure up to 127 spanning tree groups on the switch (STG 128 is
reserved for switch management). Spanning Tree is turned on by default.
NOTE: When RSTP is turned on, only STP group 1 can be configured.
The following table describes the Spanning Tree Configuration Menu options.
Table 110 Spanning Tree Configuration Menu options
Command
Description
brg
Displays the Bridge Spanning Tree Menu.
port <port number>
Displays the Spanning Tree Port Menu.
add <1-4094>
Associates a VLAN with a spanning tree and requires an external VLAN ID as a
parameter.
remove <1-4094>
Breaks the association between a VLAN and a spanning tree and requires an external
VLAN ID as a parameter.
clear
Removes all VLANs from a spanning tree.
on
Globally enables Spanning Tree Protocol.
off
Globally disables Spanning Tree Protocol.
default
Restores a spanning tree instance to its default configuration.
cur
Displays current Spanning Tree Protocol parameters.
147
Configuration Menu
Bridge Spanning Tree configuration
Command: /cfg/l2/stp/brg
[Bridge Spanning Tree Menu]
prior
- Set bridge Priority [0-65535]
hello
- Set bridge Hello Time [1-10 secs]
mxage
- Set bridge Max Age (6-40 secs)
fwd
- Set bridge Forward Delay (4-30 secs)
cur
- Display current bridge parameters
Spanning tree bridge parameters can be configured for each Spanning Tree Group. STP bridge
parameters include:
•
•
•
•
•
Bridge priority
Bridge hello time
Bridge maximum age
Forwarding delay
Current bridge configuration
The following table describes the Bridge Spanning Tree Configuration Menu options.
Table 111 Bridge Spanning Tree Configuration Menu options
Command
Description
prior <0-65535>
Configures the bridge priority. The bridge priority parameter controls which bridge on the
network is the STP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other
switches and bridges on your network. The lower the value, the higher the bridge priority.
The range is 0 to 65535, and the default is 32768.
RSTP/MSTP: The range is 0 to 61440, in steps of 4096 (0, 4096, 8192...), and the
default is 32768.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
hello <1-10>
Configures the bridge hello time. The hello time specifies how often the root bridge
transmits a configuration bridge protocol data unit (BPDU).
Any bridge that is not the root bridge uses the root bridge hello value. The range is 1 to
10 seconds, and the default is 2 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
mxage <6-40>
Configures the bridge maximum age. The maximum age parameter specifies the
maximum time the bridge waits without receiving a configuration bridge protocol data
unit before it reconfigures the STP network. The range is 6 to 40 seconds, and the default
is 20 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
fwd <4-30>
Configures the bridge forward delay parameter. The forward delay parameter specifies
the amount of time that a bridge port has to wait before it changes from the listening state
to the learning state and from the learning state to the forwarding state. The range is 4 to
30 seconds, and the default is 15 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
cur
Displays the current bridge STP parameters.
148
Configuration Menu
When configuring STP bridge parameters, the following formulas must be used:
•
•
2*(fwd-1) ≥ mxage
2*(hello+1) ≤ mxage
Spanning Tree port configuration
Command: /cfg/l2/stp <1-128>/port <port number>
[Spanning Tree Port 1 Menu]
prior
- Set port Priority (0-255)
cost
- Set port Path Cost (1-65535 (802.1d) /
1-200000000 (MSTP/RSTP)/0 for auto)
link
- Set port link type (auto, p2p, or shared; default: auto)
edge
- Enables or disables this port as an edge port
fastfwd - Enable/disable Port Fast Forwarding mode
on
- Turn port's Spanning Tree ON
off
- Turn port's Spanning Tree OFF
cur
- Display current port Spanning Tree parameters
The default configuration for STP/PVST+ is off for downlink ports (1-16) and the management port (17),
and on for uplink ports (18-21). The default configuration for RSTP/MSTP is Spanning Tree off for all
downlink ports (1-16) and the management port (17), and on for all uplink ports (18-21), with downlink
ports configured as edge ports.
Spanning tree port parameters are used to modify STP operation on an individual port basis. STP port
parameters include:
•
•
Port priority
Port path cost
The following table describes the Spanning Tree Port Configuration Menu options.
Table 112 Spanning Tree Port Configuration Menu options
Command
Description
prior <0-255>
Configures the port priority. The port priority helps determine which bridge port
becomes the designated port.
In a network topology that has multiple bridge ports connected to a single
segment, the port with the lowest port priority becomes the designated port for the
segment.
The range is 0 to 255, and the default is 128.
RSTP/MSTP: The range is 0 to 240, in steps of 16 (0, 16, 32...) and the default
is 128.
cost <1-65535>
Configures the port path cost. The port path cost is used to help determine the
designated port for a segment. Generally speaking, the faster the port, the lower
the path cost.
The range is 1 to 65535. The default is 100 for 10Mb ports, 10 for 100 Mb
ports, 4 for Gigabit ports, and 2 for 10Gb ports.
A value of 0 indicates that the default cost will be computed for an autonegotiated link speed.
RSTP/MSTP: The range is 1 – 200000000, and the default it 20000 for Gigabit
ports, 2000 for 10Gb ports.
149
Configuration Menu
Table 112 Spanning Tree Port Configuration Menu options
Command
Description
link auto|p2p|shared
Defines the type of link connected to the port, as follows:
• auto—Configures the port to detect the link type, and automatically match its
settings.
• p2p—Configures the port for Point-To-Point protocol.
• shared—Configures the port to connect to a shared medium (usually a hub).
This command only applies when RSTP is turned on. See the “Common Internal
Spanning Tree configuration” section for more information.
Enables or disables this port as an edge port. An edge port is not connected to a
bridge, and can begin forwarding traffic as soon as the link is up. Configure
server ports as edge ports (enabled).
edge disable|enable
This command only applies when RSTP is turned on. See the “Common Internal
Spanning Tree configuration” section for more information.
fastfwd disable|enable
Enables or disables Port Fast Forward on the port.
on
Enables STP on the port.
off
Disables STP on the port.
cur
Displays the current STP port parameters.
Forwarding Database configuration
Command: /cfg/l2/fdb
[FDB Menu]
static
aging
cur
- Static FDB Menu
- Configure FDB aging value
- Display current FDB configuration
The following table describes the Forwarding Database Configuration Menu options.
Table 113 FDB Configuration Menu options
Command
Description
static
Displays the Static FDB Configuration Menu.
aging <0-65535>
Configures the aging value for FDB entries. The default value is 300.
cur
Displays current FDB parameters.
150
Configuration Menu
Static FDB configuration
Command: /cfg/l2/fdb/static
[Static FDB Menu]
add
- Add a permanent FDB entry
del
- Delete a static FDB entry
clear
- Clear static FDB entries
cur
- Display current static FDB configuration
The following table describes the Static FDB Configuration Menu options.
Table 114 Static FDB Configuration Menu options
Command
Description
add <MAC address> <VLAN>
<port>
Adds a static entry to the forwarding database.
del <MAC address> <VLAN>
Deletes a static entry from the forwarding database.
clear mac <MAC
Address>|VLAN <1-4095>|
Port <port number>|All
Clears specified static FDB entries from the forwarding database, as follows:
cur
•
•
•
•
MAC address
VLAN
Port
All
Displays current static FDB parameters.
151
Configuration Menu
Trunk configuration
Command: /cfg/l2/trunk <1-12>
[Trunk group 1 Menu]
add
- Add port to trunk group
rem
- Remove port from trunk group
ena
- Enable trunk group
dis
- Disable trunk group
del
- Delete trunk group
cur
- Display current Trunk Group configuration
Trunk groups can provide super-bandwidth connections between switches or other trunk capable devices.
A trunk is a group of ports that act together, combining their bandwidth to create a single, larger port.
Up to 12 trunk groups can be configured on the switch, with the following restrictions.
•
•
•
•
Any physical switch port can belong to no more than one trunk group.
Up to six ports can belong to the same trunk group.
All ports in a trunk must have the same configuration for speed, flow control, and auto negotiation.
Trunking from other devices must comply with Cisco® EtherChannel® technology.
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on how to use port
trunks.
The following table describes the Trunk Group Configuration Menu options.
Table 115 Trunk Group Configuration Menu options
Command
Description
add <port number>
Adds a physical port to the current trunk group.
rem <port number>
Removes a physical port from the current trunk group.
ena
Enables the current trunk group.
dis
Turns the current trunk group off.
del
Removes the current trunk group configuration.
cur
Displays current trunk group parameters.
152
Configuration Menu
IP Trunk Hash configuration
Command: /cfg/l2/thash
[IP Trunk Hash Menu]
set
- IP Trunk Hash Settings Menu
cur
- Display current IP trunk hash configuration
The following table describes the IP Trunk Hash Configuration Menu options.
Table 116 IP Trunk Hash Configuration Menu options
Command
Description
set
Displays the Trunk Hash Settings menu.
cur
Display current trunk hash configuration.
Layer 2 IP Trunk Hash configuration
Command: /cfg/l2/thash/set
[set IP Trunk
smac
dmac
sip
dip
cur
Hash Settings Menu]
- Enable/disable smac hash
- Enable/disable dmac hash
- Enable/disable sip hash
- Enable/disable dip hash
- Display current trunk hash setting
Trunk hash parameters are set globally for the HP 10GbE switch. You can enable one or two parameters,
to configure any of the following valid combinations:
•
•
•
•
•
•
SMAC (source MAC only)
DMAC (destination MAC only)
SIP (source IP only)
DIP (destination IP only)
SIP + DIP (source IP and destination IP)
SMAC + DMAC (source MAC and destination MAC)
The following table describes the IP Trunk Hash Configuration Menu options.
Table 117 IP Trunk Hash Set Menu options
Command
Description
smac enable|disable
Enable or disable trunk hashing on the source MAC.
dmac enable|disable
Enable or disable trunk hashing on the destination MAC.
sip enable|disable
Enable or disable trunk hashing on the source IP.
dip enable|disable
Enable or disable trunk hashing on the destination IP.
cur
Display current trunk hash configuration.
153
Configuration Menu
Link Aggregation Control Protocol configuration
Command: /cfg/l2/lacp
[LACP Menu]
sysprio
timeout
port
cur
-
Set LACP system priority
Set LACP system timeout scale for timing out partner info
LACP port Menu
Display current LACP configuration
The following table describes the LACP Configuration Menu options.
Table 118 LACP Configuration Menu options
Command
Description
sysprio <1-65535>
Defines the priority value (1 through 65535) for the switch. Lower numbers
provide higher priority. The default value is 32768.
timeout short|long
Defines the timeout period before invalidating LACP data from a remote partner.
Choose short (3 seconds) or long (90 seconds). The default value is long.
NOTE: HP recommends that you use a timeout value of long, to reduce LACPDU
processing. If your switch’s CPU utilization rate remains at 100% for periods of
90 seconds or more, consider using static trunks instead of LACP.
port <port number>
Displays the LACP Port menu.
cur
Display current LACP configuration.
LACP Port configuration
Command: /cfg/l2/lacp/port <port number>
[LACP Port 2 Menu]
mode
- Set LACP mode
prio
- Set LACP port priority
adminkey - Set LACP port admin key
cur
- Display current LACP port configuration
The following table describes the LACP Port Configuration Menu options.
Table 119 LACP Port Configuration Menu options
Command
Description
mode off|active|passive
Set the LACP mode for this port, as follows:
• off—Turn LACP off for this port. You can use this port to manually configure
a static trunk. The default value is off.
• active—Turn LACP on and set this port to active. Active ports initiate
LACPDUs.
• passive—Turn LACP on and set this port to passive. Passive ports do not
initiate LACPDUs, but respond to LACPDUs from active ports.
prio <1-65535>
Sets the priority value for the selected port. Lower numbers provide higher
priority. The default is 128.
adminkey <1-65535>
Set the admin key for this port. Only ports with the same admin key and oper
key (operational state generated internally) can form a LACP trunk group.
154
Configuration Menu
Table 119 LACP Port Configuration Menu options
Command
Description
cur
Displays the current LACP configuration for this port.
155
Configuration Menu
VLAN configuration
Command: /cfg/l2/vlan <1-4094>
[VLAN 1 Menu]
name
stg
add
rem
def
ena
dis
del
cur
-
Set VLAN name
Assign VLAN to a Spanning Tree Group
Add port to VLAN
Remove port from VLAN
Define VLAN as list of ports
Enable VLAN
Disable VLAN
Delete VLAN
Display current VLAN configuration
The commands in this menu configure VLAN attributes, change the status of the VLAN, delete the VLAN,
and change the port membership of the VLAN.
By default, the VLAN menu option is disabled except VLAN 1, which is always enabled. The HP 10GbE
switch supports a maximum of 1,000 VLANs. VLAN 4095 is reserved for switch management.
NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on VLANs.
The following table describes the VLAN Configuration Menu options.
Table 120 VLAN Configuration Menu options
Command
Description
name <1-32 characters>
Assigns a name to the VLAN or changes the existing name. The default
VLAN name is the first one.
stg <1-127>
Assigns a VLAN to a spanning tree group. If MSTP is used, the range
is 0-32 (0 = CIST).
add <port number>
Adds ports to the VLAN membership.
rem <port number>
Removes ports from the VLAN membership.
def <list of port numbers>
Defines which ports are members of this VLAN. Every port must be a member
of at least one VLAN. By default, it defines ports to VLAN 1.
ena
Enables this VLAN.
dis
Disables this VLAN without removing it from the configuration.
del
Deletes this VLAN.
cur
Displays the current VLAN configuration.
IMPORTANT: All ports must belong to at least one VLAN. Any port which is removed from a
VLAN and which is not a member of any other VLAN is automatically added to default VLAN #1.
You cannot remove a port from VLAN #1 if the port has no membership in any other VLAN. Also,
you cannot add a port to more than one VLAN unless the port has VLAN tagging turned on. See the
tag command, in the “Port configuration” section earlier in this chapter.
156
Configuration Menu
Layer 3 configuration
Command: /cfg/l3
[Layer 3 Menu]
if
gw
route
arp
frwd
nwf
rmap
rip
ospf
igmp
dns
bootp
vrrp
rtrid
cur
-
Interface Menu
Default Gateway Menu
Static Route Menu
ARP Menu
Forwarding Menu
Network Filters Menu
Route Map Menu
Routing Information Protocol Menu
Open Shortest Path First (OSPF) Menu
IGMP Menu
Domain Name System Menu
Bootstrap Protocol Relay Menu
Virtual Router Redundancy Protocol Menu
Set router ID
Display current IP configuration
The following table describes the Layer 3 Configuration Menu options.
Table 121 L3 Configuration Menu options
Command
Description
if <1-250>
Displays the IP Interface Menu.
gw <1-4, 254>
Displays the IP Default Gateway Menu.
route
Displays the IP Static Route Menu.
arp
Displays the ARP (Address Resolution Protocol) Menu.
frwd
Displays the IP Forwarding Menu.
nwf <1-256>
Displays the Network Filter Configuration Menu.
rmap <1-32>
Displays the Route Map Menu.
rip
Displays the Routing Interface Protocol Menu.
ospf
Displays the OSPF Menu.
igmp
Displays the IGMP Menu.
dns
Displays the IP Domain Name System Menu.
bootp
Displays the Bootstrap Protocol Menu.
vrrp
Displays the Virtual Router Redundancy Configuration Menu.
rtrid <IP address (such
as, 192.4.17.101)>
Sets the router ID.
cur
Displays the current IP configuration.
157
Configuration Menu
IP interface configuration
Command: /cfg/l3/if <1-250>
[IP Interface
addr
mask
vlan
relay
ena
dis
del
cur
1
-
Menu]
Set IP address
Set subnet mask
Set VLAN number
Enable/disable BOOTP relay
Enable IP interface
Disable IP interface
Delete IP interface
Display current interface configuration
The switch can be configured with up to 250 IP interfaces. Each IP interface represents the switch on an IP
subnet on your network. The IP Interface option is disabled by default.
The following table describes the IP Interface Configuration Menu options.
Table 122 IP Interface Configuration Menu options
Command
Description
addr <IP address>
Configures the IP address of the switch interface, using dotted decimal
notation. For example, 192.2.14.101
mask <IP subnet mask>
Configures the IP subnet address mask for the interface using dotted decimal
notation. For example, 255.255.255.0
vlan <1-4094>
Configures the VLAN number for this interface. Each interface can belong to
one VLAN, though any VLAN can have multiple IP interfaces in it.
relay disable|enable
Enables or disables the BOOTP relay on this interface. The default value is
enabled.
ena
Enables this IP interface.
dis
Disables this IP interface.
del
Removes this IP interface.
cur
Displays the current interface settings.
NOTE: If you enter an IP address for interface 1, you are prompted to change the BOOTP setting.
158
Configuration Menu
Default Gateway configuration
Command: /cfg/l3/gw <1-4, 254>
[Default gateway 1 Menu]
addr
- Set IP address
intr
- Set interval between ping attempts
retry
- Set number of failed attempts to declare gateway DOWN
arp
- Enable/disable ARP only health checks
ena
- Enable default gateway
dis
- Disable default gateway
del
- Delete default gateway
cur
- Display current default gateway configuration
The switch supports up to four gateways, plus the management gateway 254. By default,
no gateways are configured on the switch. Enter 1, 2, 3, or 4, or 254 in the command as the
<gateway number>, depending upon which gateway you want to configure.
The following table describes the Default IP Gateway Configuration Menu options.
Table 123 Default IP Gateway Configuration Menu options
Command
Description
addr <IP address>
Configures the IP address of the default IP gateway using dotted decimal notation. For
example, 192.4.17.44.
intr <0-60>
The switch pings the default gateway to verify that it is up. The intr option sets the
time between health checks. The range is from 0 to 60 seconds. The default is 2
seconds.
retry <1-120>
Sets the number of failed health check attempts required before declaring this default
gateway inoperative. The range is from 1 to 120 attempts. The default is 8 attempts.
arp disable|enable
Enables or disables Address Resolution Protocol (ARP) health checks. This command is
disabled by default.
ena
Enables the gateway for use.
dis
Disables the gateway.
del
Deletes the gateway from the configuration.
cur
Displays the current gateway settings.
159
Configuration Menu
IP Static Route configuration
Command: /cfg/l3/route
[IP Static Route Menu]
add
- Add static route
rem
- Remove static route
cur
- Display current static route configuration
The following table describes the Static Route Configuration Menu options.
Table 124 Static Route Configuration Menu options
Command
Description
add <IP address> <IP subnet
mask> <gateway> <interface>
Adds a static route. You will be prompted to enter a destination IP
address, destination subnet mask, and gateway address. Enter all
addresses using dotted decimal notation.
rem <IP address> <IP subnet
mask>
Removes a static route. The destination address of the route to
remove must be specified using dotted decimal notation.
cur
Displays the current IP configuration.
Address Resolution Protocol configuration
Command: /cfg/l3/arp
[ARP Menu]
static
rearp
cur
- Static ARP Menu
- Set re-ARP period in minutes
- Display current ARP configuration
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves
a physical address from an IP address. ARP queries machines on the local network for their physical
addresses. ARP also maintains IP to physical address pairs in its cache memory. In any IP communication,
the ARP cache is consulted to see if the IP address of the computer or the router is present in the ARP
cache. Then the corresponding physical address is used to send a packet.
The following table describes the ARP Configuration Menu options.
Table 125 ARP Configuration Menu options
Command
Description
static
Displays the Static ARP Configuration menu.
rearp <2-120>
Defines re-ARP period in minutes. You can set this duration between two and 120 minutes.
cur
Displays the current ARP configurations.
160
Configuration Menu
Static ARP configuration
Command: /cfg/l3/arp/static
[Static ARP Menu]
add
- Add a permanent ARP entry
del
- Delete an ARP entry
clear
- Clear static ARP entries
cur
- Display current static ARP configuration
Static ARP entries are permanent in the ARP cache and do not age out like the ARP entries that are
learnt dynamically. Static ARP entries enable the switch to reach the hosts without sending an ARP
broadcast request to the network. Static ARPs are also useful to communicate with devices that do
not respond to ARP requests. Static ARPs can also be configured on some gateways as a protection
against malicious ARP Cache corruption and possible DOS attacks.
The following table describes the Static ARP Configuration Menu options.
Table 126 Static ARP Configuration Menu options
Command
Description
add <IP address> <MAC address>
<VLAN number> <port number>
Adds a permanent ARP entry.
del <IP address (such as,
192.4.17.101)>
Deletes a permanent ARP entry.
clear [<interface number>|<VLAN
number>|<port number>|all] <ARP
entry number>
Clears static ARP entries.
cur
Displays current static ARP configuration.
IP Forwarding configuration
Command: /cfg/l3/frwd
[IP Forwarding Menu]
dirbr
- Enable/disable forwarding directed broadcasts
on
- Globally turn IP Forwarding ON
off
- Globally turn IP Forwarding OFF
cur
- Display current IP Forwarding configuration
The following table describes the IP Forwarding Configuration Menu options.
Table 127 IP Forwarding Configuration Menu options
Command
Description
dirbr disable|enable
Enables or disables forwarding directed broadcasts. This command is disabled by
default.
on
Enables IP forwarding (routing) on the switch.
off
Disables IP forwarding (routing) on the switch. Forwarding is turned off by default.
cur
Displays the current IP forwarding settings.
161
Configuration Menu
Network Filter configuration
Command: /cfg/l3/nwf <1-256>
[IP Network Filter 1 Menu]
addr
- IP Address
mask
- IP Subnet mask
enable
- Enable Network Filter
disable - Disable Network Filter
delete
- Delete Network Filter
current - Display current Network Filter configuration
The following table describes the Network Filter Configuration Menu options.
Table 128 Network Filter Configuration Menu options
Command
Description
addr <IP address>
Sets the starting IP address for this filter. The default address is 0.0.0.0.
mask <IP subnet mask>
Sets the IP subnet mask that is used with /cfg/l3/nwf/addr to define the
range of IP addresses that will be accepted by the peer when the filter is
enabled. The default value is 0.0.0.0.
enable
Enables the Network Filter configuration.
disable
Disables the Network Filter configuration.
delete
Deletes the Network Filter configuration.
current
Displays the current the Network Filter configuration.
Route Map configuration
Command: /cfg/l3/rmap <1-32>
[IP Route Map
alist
metric
type
prec
enable
disable
delete
current
1
-
Menu]
Access List number
Set metric of the matched route
Set OSPF metric-type of the matched route
Set the precedence of this route map
Enable route map
Disable route map
Delete route map
Display current route map configuration
Routing maps control and modify routing information. The map number <1-32> represents the routing
map you wish to configure.
The following table describes the Route Map Configuration Menu options.
Table 129 Route Map Configuration Menu options
Command
Description
alist <1-8>
Displays the Access List menu.
metric <0-16777214>|none
Sets the metric of the matched route.
162
Configuration Menu
Table 129 Route Map Configuration Menu options
Command
Description
type 1|2|none
Assigns the type of OSPF metric. The default is type 1.
• 1—External routes are calculated using both internal and external
metrics.
• 2—External routes are calculated using only the external metrics. Type 2
routes have more cost than Type 2.
• none—Removes the OSPF metric.
prec <1-255>
Sets the precedence of the route map. The smaller the value, the higher the
precedence. Default value is 10.
enable
Enables the route map.
disable
Disables the route map.
delete
Deletes the route map.
cur
Displays the current route configuration.
IP Access List configuration
Command: /cfg/l3/rmap <1-32>/alist <1-8>
[IP Access List
nwf
metric
action
enable
disable delete
current -
1 Menu]
Network Filter number
Metric
Set Network Filter action
Enable Access List
Disable Access List
Delete Access List
Display current Access List configuration
The route map number <1-32> and the access list number <1-8> represent the IP access list you wish to
configure. The following table describes the IP Access List Configuration Menu options.
Table 130 IP Access List Configuration Menu options
Command
Description
nwf <1-256>
Sets the network filter number.
metric <1-16777214>|none
Sets the metric value in the AS-External (ASE) LSA.
action permit|deny
Permits or denies action for the access list.
enable
Enables the access list.
disable
Disables the access list.
delete
Deletes the access list.
cur
Displays the current Access List configuration.
163
Configuration Menu
Routing Information Protocol configuration
Command: /cfg/l3/rip
[Routing Information Protocol Menu]
if
- RIP Interface Menu
update
- Set update period in seconds
redist
- RIP Route Redistribute Menu
on
- Globally turn RIP ON
off
- Globally turn RIP OFF
current - Display current RIP configuration
The RIP Menu is used for configuring Routing Information Protocol parameters. This option is turned off by
default.
The following table describes the RIP Configuration Menu options.
Table 131 RIP Configuration Menu options
Command
Description
if <1-249>
Displays the RIP Interface menu.
update <1-120>
Configures the time interval for sending for RIP table updates, in seconds.
The default value is 30 seconds.
redist
Displays the RIP Route Redistribute menu.
on
Globally turns RIP on.
off
Globally turns RIP off.
cur
Displays the current RIP configuration.
RIP Interface configuration
Command: /cfg/l3/rip/if <1-249>
[RIP Interface 1 Menu]
version - Set RIP version
supply
- Enable/disable supplying route updates
listen
- Enable/disable listening to route updates
poison
- Enable/disable poisoned reverse
split
- Enable/disable split horizon
trigg
- Enable/disable triggered updates
mcast
- Enable/disable multicast updates
default - Set default route action
metric
- Set metric
auth
- Set authentication type
key
- Set authentication key
enable
- Enable interface
disable - Disable interface
current - Display current RIP interface configuration
The RIP Menu is used for configuring Routing Information Protocol parameters. This option is turned off by
default.
NOTE: Do not configure RIP version 1 parameters if your routing equipment uses RIP version 2.
164
Configuration Menu
The following table describes the RIP Interface Configuration Menu options.
Table 132 RIP Interface Configuration Menu options
Command
Description
version 1|2|both
Configures the RIP version used by this interface.
The default value is version 2.
supply disable|enable
When enabled, the switch supplies routes to other routers. This command is
enabled by default.
listen disable|enable
When enabled, the switch learns routes from other routers. This command is
enabled by default.
poison disable|enable
When enabled, the switch uses split horizon with poisoned reverse. When
disabled, the switch uses only split horizon. The default value is disabled.
split disable|enable
Enables or disables split horizon. The default value is enabled.
trigg disable|enable
Enables or disables Triggered Updates. Triggered Updates are used to speed
convergence. When enabled, Triggered Updates force a router to send update
messages immediately, even if it is not yet time for the update message. The
default value is enabled.
mcast disable|enable
Enables or disables multicast updates of the routing table (using address
224.0.0.9). The default value is enabled.
default
none|listen|supply|both
When enabled, the switch accepts RIP default routes from other routers, but
gives them lower priority than configured default gateways. When disabled, the
switch rejects RIP default routes. The default value is disabled.
metric <1-15>
Configures the route metric, which indicates the relative distance to the
destination. The default value is 1.
auth none|password
Configures the authentication type. The default is none.
key
Configures the authentication key password.
enable
Enables this RIP interface.
disable
Disables this RIP interface.
cur
Displays the current RIP configuration.
165
Configuration Menu
RIP Route Redistribution configuration
Command: /cfg/l3/rip/redist fixed|static|ospf|eospf
[RIP Redistribute Fixed Menu]
add
- Add rmap into route redistribution list
rem
- Remove rmap from route redistribution list
export
- Export all routes of this protocol
cur
- Display current route-maps added
The following table describes the RIP Route Redistribute Menu options.
Table 133 RIP Redistribute Configuration Menu options
Command
Description
add <1-32> <1-32>|all
Adds selected routing maps to the RIP route redistribution list. To add all the 32
route maps, enter all. To add specific route maps, enter routing map numbers
one per line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of the
redistribution protocol matched by the route maps in the route redistribution list
will be redistributed.
remove <1-32> <1-32>|all
Removes the route map from the RIP route redistribution list.
Removes routing maps from the list. To remove all 32 route maps, enter all.
To remove specific route maps, enter routing map numbers one per line, NULL
at end.
export <1-15>|none
Exports the routes of this protocol in which the metric and metric type are
specified. To remove a previous configuration and stop exporting the routes of
the protocol, enter none.
cur
Displays the current RIP route redistribute configuration.
166
Configuration Menu
Open Shortest Path First configuration
Command: /cfg/l3/ospf
[Open Shortest Path First Menu]
aindex
- OSPF Area (index) Menu
range
- OSPF Summary Range Menu
if
- OSPF Interface Menu
virt
- OSPF Virtual Links Menu
md5key
- OSPF MD5 Key Menu
host
- OSPF Host Entry Menu
redist
- OSPF Route Redistribute Menu
lsdb
- Set the LSDB limit for external LSA
default - Export default route information
on
- Globally turn OSPF ON
off
- Globally turn OSPF OFF
cur
- Display current OSPF configuration
The following table describes the Open Shortest Path First Menu options.
Table 134 OSPF Configuration Menu options
Command
Description
aindex <0-2>
Displays the area index menu. This area index does not represent the
actual OSPF area number.
range <1-16>
Displays summary routes menu for up to 16 IP addresses.
if <1-249>
Displays the OSPF interface configuration menu.
virt <1-3>
Displays the Virtual Links menu used to configure OSPF for a Virtual Link.
md5key <1-255 characters>
Assigns a string to MD5 authentication key.
host <1-128>
Displays the menu for configuring OSPF for the host routes. Up to 128
host routes can be configured. Host routes are used for advertising
network device IP addresses to external networks to perform server load
balancing within OSPF. It also makes Area Border Route (ABR) load
sharing and ABR failover possible.
redist <fixed|static|rip>
Displays Route Distribution Menu.
lsdb <0-2000>
Sets the link state database limit. Enter 0 (zero) for no limit.
default <1-16777214>|none
Sets one default route among multiple choices in an area.
Enter none for no default route.
on
Enables OSPF.
off
Disables OSPF.
cur
Displays the current OSPF configuration settings.
167
Configuration Menu
OSFP Area Index configuration
Command: /cfg/l3/ospf/aindex <0-2>
[OSPF Area (index) 1 Menu]
areaid
- Set area ID
type
- Set area type
metric
- Set stub area metric
auth
- Set authentication type
spf
- Set time interval between two SPF calculations
enable
- Enable area
disable - Disable area
delete
- Delete area
cur
- Display current OSPF area configuration
The following table describes the Area Index Configuration Menu options.
Table 135 OSPF Area Index Configuration Menu options
Command
Description
areaid <IP address>
Defines the area ID of the OSPF area number.
type transit|stub|nssa
Defines the type of area. For example, when a virtual link has to be established
with the backbone, the area type must be defined as transit.
• transit—allows area summary information to be exchanged between
routing devices. Any area that is not a stub area or NSSA is considered to be
transit area.
• stub—an area where external routing information is not distributed. Typically,
a stub area is connected to only one other area.
• nssa—Not-So-Stubby Area (NSSA) is similar to stub area with additional
capabilities. For example, routes originating from within the NSSA can be
propagated to adjacent transit and backbone areas. External routes from
outside the Autonomous System (AS) can be advertised within the NSSA but
are not distributed into other areas.
metric <1-65535>
Configures a stub area to send a numeric metric value. All routes received via that
stub area carry the configured metric to potentially influencing routing decisions.
Metric value assigns the priority for choosing the switch for default route. Metric
type determines the method for influencing routing decisions for external routes.
auth none|password|md5
Defines the authentication method, as follows:
• none—No authentication required.
• password—Authenticates simple passwords so that only trusted routing
devices can participate.
• md5—This parameter is used when MD5 cryptographic authentication is
required.
spf <0-255>
Sets time interval between two successive SPF (shortest path first) calculations of
the shortest path tree using the Dijkstra’s algorithm.
enable
Enables the OSPF area.
disable
Disables the OSPF area.
delete
Deletes the OSPF area.
cur
Displays the current OSPF configuration.
168
Configuration Menu
OSPF Summary Range configuration
Command: /cfg/l3/ospf/range <1-16>
[OSPF Summary
addr
mask
aindex
hide
enable
disable
delete
cur
Range 1 Menu]
- Set IP address
- Set IP mask
- Set area index
- Enable/disable hide range
- Enable range
- Disable range
- Delete range
- Display current OSPF summary range configuration
The following table describes the OSPF Summary Range Configuration Menu options.
Table 136 OSPF Summary Range Configuration Menu options
Command
Description
addr <IP Address>
Configures the base IP address for the range. For example, 100.10.1.1.
mask <IP address mask>
Configures the IP address mask for the range.
aindex <0-2>
Configures the area index used by the switch.
hide disable|enable
Hides the OSPF summary range.
enable
Enables the OSPF summary range.
disable
Disables the OSPF summary range.
delete
Deletes the OSPF summary range.
cur
Displays the current OSPF summary range.
169
Configuration Menu
OSPF Interface configuration
Command: /cfg/l3/ospf/if <1-249>
[OSPF Interface
aindex
prio
cost
hello
dead
trans
retra
key
mdkey
enable
disable delete
cur
-
1 Menu]
Set area index
Set interface router priority
Set interface cost
Set hello interval in seconds
Set dead interval in seconds
Set transit delay in seconds
Set retransmit interval in seconds
Set authentication key
Set MD5 key ID
Enable interface
Disable interface
Delete interface
Display current OSPF interface configuration
The following table describes the OSPF Interface Configuration Menu options.
Table 137 OSPF Interface Configuration Menu options
Command
Description
aindex <0-2>
Configures the OSPF area index.
prio <0-255>
Configures the assigned priority value to the OSPF interfaces.
(A priority value of 255 is the highest and 1 is the lowest. A priority value of 0
specifies that the interface cannot be used as Designated Router (DR) or Backup
Designated Router (BDR).)
cost <1-65535>
Configures cost set for the selected path—preferred or backup. Usually the cost is
inversely proportional to the bandwidth of the interface. Low cost indicates high
bandwidth.
hello <1-65535>
Configures the interval in seconds between the hello packets for the interfaces.
dead <1-65535>
Configures the health parameters of a hello packet, which is set for an interval of
seconds before declaring a silent router to be down.
trans <1-3600>
Configures the transit delay in seconds.
retra <1-3600>
Configures the retransmit interval in seconds.
key <key string>|none Sets the authentication key to clear the password.
mdkey <1-255>|none
Assigns an MD5 key to the interface.
enable
Enables the OSPF interface.
disable
Disables the OSPF interface.
delete
Deletes the OSPF interface.
cur
Displays the current settings for OSPF interface.
170
Configuration Menu
OSPF Virtual Link configuration
Command: /cfg/l3/ospf/virt <1-3>
[OSPF Virtual
aindex
hello
dead
trans
retra
nbr
key
mdkey
enable
disable
delete
cur
Link 1 Menu]
- Set area index
- Set hello interval in seconds
- Set dead interval in seconds
- Set transit delay in seconds
- Set retransmit interval in seconds
- Set router ID of virtual neighbor
- Set authentication key
- Set MD5 key ID
- Enable interface
- Disable interface
- Delete interface
- Display current OSPF interface configuration
The following table describes the OSPF Virtual Link Configuration Menu options.
Table 138 OSPF Virtual Link Configuration Menu options
Command
Description
aindex <0-2>
Configures the OSPF area index.
hello <1-65535>
Configures the authentication parameters of a hello packet, which is set to be in an
interval of seconds.
dead <1-65535>
Configures the health parameters of a hello packet, which is set to be in an interval
of seconds. Default is 40 seconds.
trans <1-3600>
Configures the delay in transit in seconds. Default is one second.
retra <1-3600>
Configures the retransmit interval in seconds. Default is five seconds.
nbr <IP address>
Configures the router ID of the virtual neighbor. Default is 0.0.0.0.
key <password>
Configures the password (up to eight characters) for each virtual link. Default is none.
mdkey <1-255>|none
Sets MD5 key ID for each virtual link. Default is none.
enable
Enables OSPF virtual link.
disable
Disables OSPF virtual link.
delete
Deletes OSPF virtual link.
cur
Displays the current OSPF virtual link settings.
171
Configuration Menu
OSPF Host Entry configuration
Command: /cfg/l3/ospf/host <1-128>
[OSPF Host Entry 1 Menu]
addr
- Set host entry IP address
aindex
- Set area index
cost
- Set cost of this host entry
enable
- Enable host entry
disable - Disable host entry
delete
- Delete host entry
cur
- Display current OSPF host entry configuration
The following table describes the OSPF Host Entry Configuration Menu options.
Table 139 OSPF Host Entry Configuration Menu options
Command
Description
addr <IP address>
Configures the base IP address for the host entry. For example, 100.10.1.1.
aindex <0-2>
Configures the area index of the host.
cost <1-65535>
Configures the cost value of the host.
enable
Enables OSPF host entry.
disable
Disables OSPF host entry.
delete
Deletes OSPF host entry.
cur
Displays the current OSPF host entries.
OSPF Route Redistribution configuration
Command: /cfg/l3/ospf/redist fixed|static|rip
[OSPF Redistribute Fixed Menu]
add
- Add rmap into route redistribution list
rem
- Remove rmap from route redistribution list
export
- Export all routes of this protocol
cur
- Display current route-maps added
The following table describes the OSPF Route Redistribution Configuration Menu options.
Table 140 OSPF Route Redistribution Configuration Menu options
Command
Description
add <1-32> <1-32>|all
Adds selected routing maps to the rmap list. To add all the 32 route maps,
enter all. To add specific route maps, enter routing map numbers one
per line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of
the redistribution protocol matched by the route maps in the route
redistribution list will be redistributed.
rem <1-32> <1-32> ... |all
Removes the route map from the route redistribution list.
Removes routing maps from the rmap list. To remove all 32 route maps,
enter all. To remove specific route maps, enter routing map numbers one
per line, NULL at the end.
172
Configuration Menu
Table 140 OSPF Route Redistribution Configuration Menu options
Command
Description
export <1-16777215> 1|2|none
Exports the routes of this protocol as external OSPF AS-external LSAs in
which the metric and metric type are specified. To remove a previous
configuration and stop exporting the routes of the protocol, enter none.
cur
Displays the current route map settings.
OSPF MD5 Key configuration
Command: /cfg/l3/ospf/md5key <key ID>
[OSPF MD5 Key
key
delete
cur
1
-
Menu]
Set authentication key
Delete key
Display current MD5 key configuration
The following table describes the OSPF MD5 Key Configuration Menu options.
Table 141 OSPF MD5 Key Configuration Menu options
Command
Description
key <1-16 characters>
Sets the authentication key for this OSPF packet.
delete
Deletes the authentication key for this OSPF packet.
cur
Displays the current MD5 key configuration.
IGMP configuration
Command: /cfg/l3/igmp
[IGMP Menu]
snoop
mrouter
igmpflt
on
off
cur
-
IGMP Snoop Menu
Static Multicast Router Menu
IGMP Filtering Menu
Globally turn IGMP ON
Globally turn IGMP OFF
Display current IGMP configuration
IGMP Snooping allows the switch to forward multicast traffic only to those ports that request it. IGMP
Snooping prevents multicast traffic from being flooded to all ports. The switch learns which server hosts
are interested in receiving multicast traffic, and forwards it only to ports connected to those servers.
The following table describes the IGMP Menu options.
Table 142 IGMP Snoop Menu options
Command
Description
snoop
Displays the IGMP Snoop Menu.
mrouter
Displays the Static Multicast Router Menu.
igmpflt
Displays the IGMP Filtering Menu.
173
Configuration Menu
Table 142 IGMP Snoop Menu options
Command
Description
on
Globally turns IGMP on.
off
Globally turns IGMP off.
cur
Displays the current IGMP configuration parameters.
IGMP snooping configuration
Command: /cfg/l3/igmp/snoop
[IGMP Snoop Menu]
igmpv3
- IGMP Version3 Snoop Menu
timeout - Set report timeout
mrto
- Set multicast router timeout
qintrval - Set IGMP query interval
robust
- Set expected packet loss on subnet
flood
- Flood unregistered IPMC
aggr
- Aggregate IGMP report
srcip
- Set source ip to use when proxying GSQ
add
- Add VLAN(s) to IGMP Snooping
rem
- Remove VLAN(s) from IGMP Snooping
clear
- Remove all VLAN(s) from IGMP Snooping
fastlv
- Enable/disable Fastleave processing in VLAN
cur
- Display current IGMP Snooping configuration
The following table describes the IGMP Snoop Configuration Menu options.
Table 143 IGMP Snoop Menu options
Command
Description
igmpv3
Displays the IGMPv3 Snooping menu.
timeout <1-255>
Sets the Maximum Response Time (MRT) for IGMP hosts. MRT is one of the
parameters used to determine the age out period of the IGMP hosts. Increasing the
timeout increases the age out period.
The range is from 1 to 255 seconds. The default is 10 seconds.
mrto <1-600>
Configures the age-out period for the IGMP Mrouters in the Mrouter table. If the
switch does not receive a General Query from the Mrouter for mrto seconds, the
switch removes the multicast router from its Mrouter table.
The range is from 1 to 600 seconds. The default is 255 seconds.
qintrval <1-600>
Sets the IGMP router query interval. The range is 1-600 seconds. The default value
is 125.
robust <2-10>
Configures the IGMP Robustness variable, which allows you to tune the switch for
expected packet loss on the subnet. If the subnet is expected to be lossy (high rate
of packet loss), then increase the value. The default value is 2.
flood disable|enable
Configures the switch to flood unregistered IP multicast reports to all ports.
aggr disable|enable
Enables or disables IGMP Membership Report aggregation.
174
Configuration Menu
Table 143 IGMP Snoop Menu options
Command
Description
srcip <IP address>
Configures the source IP address used as a proxy for IGMP Group Specific
Queries.
add <1-4094>
Adds the VLAN to IGMP Snooping.
rem <1-4094>
Removes the VLAN from IGMP Snooping.
clear
Removes all VLANs from IGMP Snooping.
fastlv <1-4094>
disable|enable
Enables or disables FastLeave processing. FastLeave allows the switch to
immediately remove a port from the IGMP port list, if the host sends a Leave
message, and the proper conditions are met. This command is disabled by default.
ena
Enables IGMP Snooping.
dis
Disables IGMP Snooping.
cur
Displays the current IGMP Snooping parameters.
IGMPv3 Snooping configuration
Command: /cfg/l3/igmp/snoop/igmpv3
[IGMP V3 Snoop Menu]
sources - Set the number of sources to snoop in group record
v1v2
- Enable/disable snooping IGMPv1/v2 reports
exclude - Enable/disable snooping EXCLUDE mode reports
ena
- Enable IGMPv3 Snooping
dis
- Disable IGMPv3 Snooping
cur
- Display current IGMP Snooping V3 configuration
The following table describes the IGMPv3 Snooping Configuration Menu options.
Table 144 IGMPv3 Snooping Menu options
Command
Description
sources <1-64>
Configures the maximum number of IGMP multicast sources to snoop
from within the group record. Use this command to limit the number of
IGMP sources to provide more refined control.
v1v2 enable|disable
Enables or disables snooping on IGMP version 1 and version 2 reports.
When disabled, the switch drops IGMPv1 and IGMPv2 reports. The
default value is enabled.
exclude enable|disable
Enables or disables snooping on IGMPv3 Exclude Reports. When
disabled, the switch ignores Exclude Reports. The default value is
enabled.
ena
Enables IGMP version 3. The default value is disabled.
dis
Disables IGMP version 3.
cur
Displays the current IGMP version 3 parameters.
175
Configuration Menu
IGMP static multicast router configuration
Command: /cfg/l3/igmp/mrouter
[Static
add
rem
cur
Multicast Router Menu]
- Add port as Multicast Router Port
- Remove port as Multicast Router Port
- Display current Multicast Router configuration
The following table describes the Static Multicast Router Configuration Menu options.
NOTE: When you configure a static multicast router on a VLAN, the process of learning multicast
routers is disabled for that VLAN.
Table 145 IGMP Static Multicast Router Menu
Command
Description
add <port number> <1-4094> <1-3>
Selects a port/VLAN combination on which the static multicast
router is connected, and configures the IGMP version (1, 2, or 3)
of the multicast router.
remove <port number> <1-4094>
Removes a static multicast router from the selected port/VLAN
combination.
cur
Displays the current IGMP Static Multicast Router parameters.
IGMP filtering configuration
Command: /cfg/l3/igmp/igmpflt
[IGMP Filter Menu]
filter - IGMP Filter Definition Menu
port - IGMP Filtering Port Menu
ena - Enable IGMP Filtering
dis - Disable IGMP Filtering
cur - Display current IGMP Filtering configuration
The following table describes the IGMP Filter Configuration Menu options.
Table 146 IGMP Filtering Menu options
Command
Description
filter <1-16>
Displays the IGMP Filter Definition Menu.
port <port number>
Displays the IGMP Filtering Port Menu.
ena
Enables IGMP filtering globally.
dis
Disables IGMP Filtering globally.
cur
Displays the current IGMP Filtering parameters.
176
Configuration Menu
IGMP filter definition
Command: /cfg/l3/igmp/igmpflt/filter <1-16>
[IGMP Filter 1 Definition Menu]
range - Set IP Multicast address range
action - Set filter action
ena - Enable filter
dis - Disable filter
del - Delete filter
cur - Display current IGMP filter configuration
The following table describes the IGMP Filter Definition Menu options.
Table 147 IGMP Filter Definition Menu options
Command
Description
range <IP multicast address>
<IP multicast address>
Configures the range of IP multicast addresses for this filter. Enter the first IP
multicast address of the ranger, followed by the second IP multicast
address of the range.
action allow|deny
Allows or denies multicast traffic for the IP multicast addresses specified.
ena
Enables this IGMP filter.
dis
Disables this IGMP filter.
del
Deletes this filter’s parameter definitions.
cur
Displays the current IGMP filter.
IGMP filtering port configuration
Command: /cfg/l3/igmp/igmpflt/port <port number>
[IGMP Port 20 Menu]
filt - Enable/disable IGMP Filtering on port
add - Add IGMP filter to port
rem - Remove IGMP filter from port
cur - Display current IGMP Filtering Port configuration
The following table describes the IGMP Port Filtering Configuration Menu options.
Table 148 IGMP Filtering Port Menu options
Command
Description
filt enable|disable
Enables or disables IGMP Filtering on this port.
add <1-16>
Adds an IGMP filter to this port.
rem <1-16>
Removes an IGMP filter from this port.
cur
Displays the current IGMP filter parameters for this port.
177
Configuration Menu
Domain Name System configuration
Command: /cfg/l3/dns
[Domain Name System Menu]
prima
- Set IP address of primary DNS server
secon
- Set IP address of secondary DNS server
dname
- Set default domain name
cur
- Display current DNS configuration
The Domain Name System (DNS) Configuration Menu is used for defining the primary and secondary
DNS servers on your local network, and for setting the default domain name served by the switch
services. DNS parameters must be configured prior to using hostname parameters with the ping,
traceroute, and tftp commands.
The following table describes the Domain Name System (DNS) Configuration Menu options.
Table 149 Domain Name System (DNS) Configuration Menu options
Command
Description
prima <IP address>
Sets the IP address for your primary DNS server. Use dotted decimal
notation. For example, 192.4.17.41.
secon <IP address>
Sets the IP address for your secondary DNS server. If the primary
DNS server fails, the configured secondary will be used instead.
Enter the IP address using dotted decimal notation. For example,
192.4.17.42.
dname <dotted DNS notation>|none
Sets the default domain name used by the switch. For example:
mycompany.com.
cur
Displays the current Domain Name System (DNS) settings.
178
Configuration Menu
Bootstrap Protocol Relay configuration
Command: /cfg/l3/bootp
[Bootstrap Protocol Relay Menu]
addr
- Set IP address of BOOTP server
addr2
- Set IP address of second BOOTP server
on
- Globally turn BOOTP relay ON
off
- Globally turn BOOTP relay OFF
cur
- Display current BOOTP relay configuration
The Bootstrap Protocol (BOOTP) Relay Menu is used to allow hosts to obtain their configurations from a
Dynamic Host Configuration Protocol (DHCP) server. The BOOTP configuration enables the switch to
forward a client request for an IP address to two DHCP/BOOTP servers with IP addresses that have been
configured on the switch.
BOOTP relay is turned off by default.
The following table describes the BOOTP Configuration Menu options.
Table 150 BOOTP Configuration Menu options
Command
Description
addr <IP address>
Sets the IP address of the BOOTP server. For example, 100.10.1.1.
addr2 <IP address>
Sets the IP address of the secondary BOOTP server. For example, 100.10.1.2.
on
Globally turns on BOOTP relay.
off
Globally turns on BOOTP relay.
cur
Displays the current BOOTP relay configuration.
179
Configuration Menu
Virtual Router Redundancy Protocol configuration
Command: /cfg/l3/vrrp
[Virtual Router
vr
group
if
track
on
off
cur
-
Redundancy Protocol Menu]
VRRP Virtual Router Menu
VRRP Virtual Router Group Menu
VRRP Interface Menu
VRRP Priority Tracking Menu
Globally turn VRRP ON
Globally turn VRRP OFF
Display current VRRP configuration
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy
between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID
number on each participating VRRP-capable routing device. One of the virtual routers is then elected as
the master, based on a number of priority criteria, and assumes control of the shared virtual router IP
address. If the master fails, one of the backup virtual routers will assume routing authority and take control
of the virtual router IP address.
By default, VRRP is disabled. For more information on VRRP, see the “High Availability” chapter in the
HP 10Gb Ethernet BL-c Switch Application Guide.
The following table describes the VRRP Configuration Menu options.
Table 151 VRRP Configuration Menu options
Command
Description
vr <1-250>
Displays the VRRP Virtual Router Menu. This menu is used for configuring virtual routers on
this switch.
group
Displays the VRRP virtual router group menu, used to combine all virtual routers together
as one logical entity. Group options must be configured when using two or more switches
in a hot-standby failover configuration where only one switch is active at any given time.
if <1-249>
Displays the VRRP Virtual Router Interface Menu.
track
Displays the VRRP Tracking Menu. This menu is used for weighting the criteria used when
modifying priority levels in the master router election process.
on
Globally enables VRRP on this switch.
off
Globally disables VRRP on this switch.
cur
Displays the current VRRP parameters.
180
Configuration Menu
VRRP Virtual Router configuration
Command: /cfg/l3/vrrp/vr <1-250>
[VRRP Virtual
track
vrid
addr
if
prio
adver
preem
ena
dis
del
cur
Router 1 Menu]
- Priority Tracking Menu
- Set virtual router ID
- Set IP address
- Set interface number
- Set renter priority
- Set advertisement interval
- Enable/disable preemption
- Enable virtual router
- Disable virtual router
- Delete virtual router
- Display current VRRP virtual router configuration
This menu is used for configuring virtual routers for this switch. A virtual router is defined by its virtual
router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this
virtual router, a virtual router will be configured to share the same virtual router ID and IP address.
Virtual routers are disabled by default.
The following table describes the Virtual Router Configuration Menu options.
Table 152 Virtual Router Configuration Menu options
Command
Description
track
Displays the VRRP Priority Tracking Menu for this virtual router. Tracking is a
proprietary extension to VRRP, used for modifying the standard priority system
used for electing the master router.
vrid <1-250>
Defines the virtual router ID. This is used in conjunction with addr (below) to
define a virtual router on this switch. To create a pool of VRRP-enabled routing
devices which can provide redundancy to each other, each participating VRRP
device must be configured with the same virtual router: one that shares the same
vrid and addr combination.
The vrid for standard virtual routers (where the virtual router IP address is not the
same as any virtual server) can be any integer between 1 and 250. The default
value is 1.
All vrid values must be unique within the VLAN to which the virtual router’s IP
interface belongs.
addr <IP address>
Defines the IP address for this virtual router using dotted decimal notation. This is
used in conjunction with the vrid (above) to configure the same virtual router on
each participating VRRP device. The default address is 0.0.0.0.
if <1-249>
Selects a switch IP interface. If the IP interface has the same IP address as the
addr option above, this switch is considered the “owner” of the defined virtual
router. An owner has a special priority of 255 (highest) and will always assume
the role of master router, even if it must preempt another virtual router which has
assumed master routing authority. This preemption occurs even if the preem
option below is disabled. The default value is 1.
181
Configuration Menu
Table 152 Virtual Router Configuration Menu options
Command
Description
prio <1-254>
Defines the election priority bias for this virtual server. This can be any integer
between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual router’s IP address (addr) is the same as the
one used by the IP interface, the priority for this virtual router will automatically be
set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/track or
/cfg/l3/vrrp/vr #/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default value is 1.
preem disable|enable
Enables or disables master preemption. When enabled, if this virtual router is in
backup mode but has a higher priority than the current master, this virtual router
will preempt the lower priority master and assume control. Note that even when
preem is disabled, this virtual router will always preempt any other master if this
switch is the owner (the IP interface address and virtual router addr are the
same). By default, this option is enabled.
ena
Enables this virtual router.
dis
Disables this virtual router.
del
Deletes this virtual router from the switch configuration.
cur
Displays the current configuration information for this virtual router.
VRRP Virtual Router Priority Tracking configuration
Command: /cfg/l3/vrrp/vr <1-250>/track
[VRRP Virtual
vrs
ifs
ports
cur
Router 1 Priority Tracking Menu]
- Enable/disable tracking master virtual routers
- Enable/disable tracking other interfaces
- Enable/disable tracking VLAN switch ports
- Display current VRRP virtual router configuration
This menu is used for modifying the priority system used when electing the master router from a pool of
virtual routers. Various tracking criteria can be used to bias the election results. Each time one of the
tracking criteria is met, the priority level for the virtual router is increased by an amount defined through
the VRRP Tracking Menu.
Criteria are tracked dynamically, continuously updating virtual router priority levels when enabled. If the
virtual router preemption option is enabled, this virtual router can assume master routing authority when its
priority level rises above that of the current master.
Some tracking criteria (vrs, ifs, and ports below) apply to standard virtual routers, otherwise called
virtual interface routers. A virtual server router is defined as any virtual router whose IP address (addr) is
the same as any configured virtual server IP address.
182
Configuration Menu
The following table describes the Virtual Router Priority Tracking Configuration Menu options.
Table 153 Virtual Router Priority Tracking Configuration Menu options
Command
Description
vrs disable|enable
When enabled, the priority for this virtual router will be increased for each virtual
router in master mode on this switch. This is useful for making sure that traffic for
any particular client/server pairing are handled by the same switch, increasing
routing and load balancing efficiency. This command is disabled by default.
ifs disable|enable
When enabled, the priority for this virtual router will be increased for each other IP
interface active on this switch. An IP interface is considered active when there is at
least one active port on the same VLAN. This helps elect the virtual routers with the
most available routes as the master. This command is disabled by default.
ports disable|enable
When enabled, the priority for this virtual router will be increased for each active
port on the same VLAN. A port is considered active if it has a link and is forwarding
traffic. This helps elect the virtual routers with the most available ports as the master.
This command is disabled by default.
cur
Displays the current configuration for priority tracking for this virtual router.
VRRP Virtual Router Group configuration
Command: /cfg/l3/vrrp/group
[VRRP Virtual
track
vrid
if
prio
adver
preem
ena
dis
del
cur
Router Group Menu]
- Priority Tracking Menu
- Set virtual router ID
- Set interface number
- Set renter priority
- Set advertisement interval
- Enable/disable preemption
- Enable virtual router
- Disable virtual router
- Delete virtual router
- Display current VRRP virtual router configuration
The Virtual Router Group menu is used for associating all virtual routers into a single logical virtual router,
which forces all virtual routers on the switch to either be master or backup as a group. A virtual router is
defined by its virtual router ID and an IP address. On each VRRP-capable routing device participating in
redundancy for this virtual router, a virtual router will be configured to share the same virtual router ID
and IP address.
183
Configuration Menu
The following table describes the Virtual Router Group Configuration Menu options.
Table 154 Virtual Router Group Configuration Menu options
Command
Description
track
Displays the VRRP Priority Tracking Menu for the virtual router group. Tracking is a
proprietary extension to VRRP, used for modifying the standard priority system
used for electing the master router.
vrid <1-250>
Defines the virtual router ID.
The vrid for standard virtual routers (where the virtual router IP address is not the
same as any virtual server) can be any integer between 1 and 250. All vrid
values must be unique within the VLAN to which the virtual router’s IP interface
(see if below) belongs. The default virtual router ID is 1.
if <1-249>
Selects a switch IP interface. The default switch IP interface number is 1.
prio <1-254>
Defines the election priority bias for this virtual router group. This can be any
integer between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual router’s IP address (addr) is the same as the
one used by the IP interface, the priority for this virtual router will automatically be
set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/track or
/cfg/l3/vrrp/vr #/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default is 1.
preem disable|enable
Enables or disables master preemption. When enabled, if the virtual router group
is in backup mode but has a higher priority than the current master, this virtual
router will preempt the lower priority master and assume control. Note that even
when preem is disabled, this virtual router will always preempt any other master
if this switch is the owner (the IP interface address and virtual router addr are the
same). By default, this option is enabled.
ena
Enables the virtual router group.
dis
Disables the virtual router group.
del
Deletes the virtual router group from the switch configuration.
cur
Displays the current configuration information for the virtual router group.
184
Configuration Menu
VRRP Virtual Router Group Priority Tracking configuration
Command: /cfg/l3/vrrp/group/track
[Virtual Router
ifs
ports
cur
-
Group Priority Tracking Menu]
Enable/disable tracking other interfaces
Enable/disable tracking VLAN switch ports
Display current VRRP Group Tracking configuration
NOTE: If Virtual Router Group Tracking is enabled, the tracking option will be available only under
group option. The tracking setting for the other individual virtual routers will be ignored.
The following table describes the Virtual Router Group Priority Tracking Configuration Menu options.
Table 155 Virtual Router Group Priority Tracking Configuration Menu options
Command
Description
ifs disable|enable
When enabled, the priority for this virtual router will be increased for each other IP
interface active on this switch. An IP interface is considered active when there is at
least one active port on the same VLAN. This helps elect the virtual routers with the
most available routes as the master. This command is disabled by default.
ports disable|enable
When enabled, the priority for this virtual router will be increased for each active
port on the same VLAN. A port is considered active if it has a link and is
forwarding traffic. This helps elect the virtual routers with the most available ports
as the master. This command is disabled by default.
cur
Displays the current configuration for priority tracking for this virtual router.
VRRP Interface configuration
Command: /cfg/l3/vrrp/if <1-249>
[VRRP Interface
auth
passw
del
cur
-
1 Menu]
Set authentication types
Set plain-text password
Delete interface
Display current VRRP interface configuration
This menu is used for configuring VRRP authentication parameters for the IP interfaces used with the virtual
routers. The interface-number represents the IP interface on which authentication parameters must be
configured.
The following table describes the VRRP Interface Configuration Menu options.
Table 156 VRRP Interface Configuration Menu options
Command
Description
auth none|password Defines the type of authentication that will be used: none (no authentication), or
password (password authentication).
passw <password>
Defines a plain text password up to eight characters long. This password will be added
to each VRRP packet transmitted by this interface when password authentication is
chosen (see auth above).
del
Clears the authentication configuration parameters for this IP interface. The IP interface
itself is not deleted.
185
Configuration Menu
Table 156 VRRP Interface Configuration Menu options
Command
Description
cur
Displays the current configuration for this IP interface’s authentication parameters.
VRRP Tracking configuration
Command: /cfg/l3/vrrp/track
[VRRP Tracking Menu]
vrs
- Set priority increment for virtual router tracking
ifs
- Set priority increment for IP interface tracking
ports
- Set priority increment for VLAN switch port tracking
cur
- Display current VRRP Priority Tracking configuration
This menu is used for setting weights for the various criteria used to modify priority levels during the
master router election process. Each time one of the tracking criteria is met, the priority level for the virtual
router is increased by an amount defined through this menu.
NOTE: These priority tracking options only define increment values. These options do not affect the
VRRP master router election process until options under the VRRP Virtual Router Priority Tracking
Menu are enabled.
The following table describes the VRRP Tracking Configuration Menu options.
Table 157 VRRP Tracking Configuration Menu options
Command
Description
vrs <0-254>
Defines the priority increment value (0 through 254) for virtual routers in master mode
detected on this switch. The default value is 2.
ifs <0-254>
Defines the priority increment value (0 through 254) for active IP interfaces detected on this
switch. The default value is 2.
ports <0-254>
Defines the priority increment value (0 through 254) for active ports on the virtual router’s
VLAN. The default value is 2.
cur
Displays the current configuration of priority tracking increment values.
186
Configuration Menu
Quality of Service configuration
Command: /cfg/qos
[QOS Menu]
8021p
- 802.1p Menu
Use the Quality of Service (QoS) menus to configure the IEEE 802.1p priority value of incoming packets.
This allows you to differentiate between various types of traffic, and provide different priority levels. The
following table describes the QoS Configuration Menu options.
Table 158 QoS Configuration Menu options
Command
Description
8021p
Displays 802.1p configuration menu.
QoS 802.1p configuration
Command: /cfg/qos/8021p
[802.1p Menu]
priq
qweight
numcos
default
cur
-
Set priority to COS queue mapping
Set weight to a COS queue
Set number of COS queue
Reset 802.1p configuration to default values.
Display current 802.1p configuration
This feature provides the HP 10GbE switch the capability to filter IP packets based on the IEEE 802.1p
bits in the packet's VLAN header. The 802.1p bits specify the priority that you should give to the packets
while forwarding them. The packets with a higher (non-zero) priority bits are given forwarding preference
over packets with numerically lower priority bits value.
The following table describes the 802.1p Configuration Menu options.
Table 159 802.1p Configuration Menu options
Command
Description
priq <0-7>
<queue (0-1)|(0-7)>
Maps the 802.1p priority of to the Class of Service queue (COSq) priority. Enter
the 802.1p priority value (0-7); followed by the Class of Service queue that
handles the matching traffic.
qweight <queue (0-1)|
(0-7)> <weight (0-15)>
Configures the weight of the selected Class of Service queue (COSq). Enter the
queue number, followed by the scheduling weight (0-15).
numcos 2|8
Sets the number of Class of Service queues for switch ports.
The default value is 2.
default
Resets 802.1p configuration to default values.
cur
Displays the current 802.1p parameters.
187
Configuration Menu
Access Control configuration
Command: /cfg/acl
[ACL Menu]
acl
group
cur
- Access Control List Item Config Menu
- Access Control List Group Config Menu
- Display current ACL configuration
Use this menu to create Access Control Lists (ACLs) and ACL Groups. ACLs define matching criteria used
for IP filtering and Quality of Service functions.
The following table describes the Access Control Configuration Menu options.
Table 160 Access Control Configuration Menu options
Command
Description
acl <1-384>
Displays Access Control List (ACL) configuration menu.
group <1-384>
Displays ACL Group configuration menu.
cur
Displays the current Access Control parameters.
Access Control List configuration
Command: /cfg/acl/acl <1-384>
[ACL 1 Menu]
ethernet
ipv4
tcpudp
meter
re-mark
pktfmt
egrport
action
stats
reset
cur
-
Ethernet Header Options Menu
IP Header Options Menu
TCP/UDP Header Options Menu
ACL Metering Configuration Menu
ACL Re-mark Configuration Menu
Set to filter specific packet format types
Set to filter for packets egressing this port
Set filter action
Enable/disable statistics for this acl
Reset filtering parameters
Display current filter configuration
These menus allow you to define filtering criteria for each Access Control List (ACL). The following table
describes the ACL Configuration Menu options.
Table 161 ACL Configuration Menu options
Command
Description
ethernet
Displays the ACL Ethernet configuration menu.
ipv4
Displays the ACL IP version 4 configuration menu.
tcpudp
Displays the ACL TCP/UDP configuration menu.
meter
Displays the ACL meter configuration menu.
re-mark
Displays the ACL re-mark configuration menu.
pktfmt
Displays the ACL Packet Format configuration menu.
188
Configuration Menu
Table 161 ACL Configuration Menu options
Command
Description
egrport <port number>
Configures the ACL to function on egress packets. The egress port
ACL will not match a Layer 2 broadcast or multicast packet. The
egress port ACL will not match packets if the destination port is a
trunk.
action permit|deny|setprio <0-7>
Configures a filter action for packets that match the ACL definitions.
You can choose to permit (pass) or deny (drop) packets, or set the
802.1p priority for the packets.
stats e|d
Enables or disables the statistics collection for the Access Control List.
reset
Resets the ACL parameters to their default values and removes the
ACL from all ports to which it is assigned.
cur
Displays the current ACL parameters.
189
Configuration Menu
ACL Ethernet Filter configuration
Command: /cfg/acl/acl <1-384>/ethernet
[Filtering Ethernet Menu]
smac
- Set to filter on source MAC
dmac
- Set to filter on destination MAC
vlan
- Set to filter on VLAN ID
etype
- Set to filter on ethernet type
pri
- Set to filter on priority
reset
- Reset all fields
cur
- Display current parameters
This menu allows you to define Ethernet matching criteria for an ACL. The following table describes the
Ethernet Filter Configuration Menu options.
Table 162 Ethernet Filter Configuration Menu options
Command
Description
smac <MAC address> <MAC mask>
Defines the source MAC address and MAC mask for this
ACL. For example:
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc
dmac <MAC address> <MAC mask>
Defines the destination MAC address and MAC mask for
this ACL. For example:
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc
vlan <1-4095> <VLAN mask (0xfff)>
Defines a VLAN number and mask for this ACL.
etype ARP|IP|IPv6|MPLS|RARP|any|0xXXXX
Defines the Ethernet type for this ACL.
pri <0-7>
Defines the Ethernet priority value for the ACL.
reset
Resets Ethernet parameters for the ACL to their default
values.
cur
Displays the current Ethernet parameters for the ACL.
190
Configuration Menu
ACL IP Version 4 Filter configuration
Command: /cfg/acl/acl <1-384>/ipv4
[Filtering IPv4 Menu]
sip
- Set to filter on source IP address
dip
- Set to filter on destination IP address
proto
- Set to filter on protocol
tos
- Set to filter on TOS
reset
- Reset all fields
cur
- Display current parameters
This menu allows you to define IPv4 matching criteria for an ACL. The following table describes the IP
version 4 Filter Configuration Menu options.
Table 163 IPv4 Filter Configuration Menu options
Command
Description
sip <IP address> <IP mask>
Defines a source IP address for the ACL. If defined, traffic with this source
IP address will match this ACL. Specify an IP address in dotted decimal
notation. For example, 100.10.1.1.
dip <IP address> <IP mask>
Defines a destination IP address for the ACL. If defined, traffic with this
destination IP address will match this ACL. For example, 100.10.1.2.
proto <0-255>
Defines an IP protocol for the ACL. If defined, traffic from the specified
protocol matches this filter. Specify the protocol number. Some of the wellknown protocols include:
•
•
•
•
•
•
1—icmp
2—igmp
6—tcp
17—udp
89—ospf
112—vrrp
tos <0-255>
Defines a Type of Service value for the ACL. For more information on ToS,
see RFC 1340 and 1349.
reset
Resets the IPv4 parameters for the ACL to their default values.
cur
Displays the current IPV4 parameters.
191
Configuration Menu
ACL TCP/UDP Filter configuration
Command: /cfg/acl/acl <1-384>/tcpudp
[Filtering TCP/UDP Menu]
sport
- Set to filter on TCP/UDP source port
dport
- Set to filter on TCP/UDP destination port
flags
- Set to filter TCP/UDP flags
reset
- Reset all fields
cur
- Display current parameters
This menu allows you to define TCP/UDP matching criteria for an ACL. The following table describes the
TCP/UDP Filter Configuration Menu options.
Table 164 TCP/UDP Filter Configuration Menu options
Command
Description
sport <1-65535> <port mask>
Defines a source port for the ACL. If defined, traffic with the specified TCP
or UDP source port will match this ACL. Specify the port number. Some of
the well-known ports include:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Number—Name
20—ftp-data
21—ftp
22—ssh
23—telnet
25—smtp
37—time
42—name
43—whois
53—domain
69—tftp
70—gopher
79—finger
80—http
dport <1-65535>
Defines a destination port for the ACL. If defined, traffic with the specified
TCP or UDP destination port will match this ACL. Specify the port number,
just as with sport above.
flags <value (0x0-0x3f)>
Defines a TCP/UDP flag for the ACL.
reset
Resets the TCP/UDP parameters for the ACL to their default values.
cur
Displays the current TCP/UDP Filtering parameters.
192
Configuration Menu
ACL Meter configuration
Command: /cfg/acl/acl <1-384>/meter
[Metering Menu]
cir
mbsize
enable
dpass
reset
cur
-
Set committed rate in KiloBits/s
Set maximum burst size in KiloBits
Enable/disable port metering
Set to Drop or Pass out of profile traffic
Reset meter parameters
Display current settings
This menu defines the metering profile for the selected ACL.
Table 165 ACL Meter Configuration Menu options
Command
Description
cir <1000-10000000>
Configures the committed rate, in Kilobits per second. The committed rate must be a
multiple of 1,000.
mbsize <32-4096>
Configures the maximum burst size, in Kilobits. Enter one of the following values for
mbsize: 32, 64, 128, 256, 512, 1024, 2048, or 4096.
enable e|d
Enables or disables metering on the ACL.
dpass drop|pass
Configures the ACL Meter to either drop or pass out-of-profile traffic.
reset
Reset ACL Metering parameters to their default values.
cur
Displays the current ACL metering parameters.
ACL Re-mark configuration
Command: /cfg/acl/acl <1-384>/re-mark
[Re-mark Menu]
inprof
outprof reset
cur
-
In Profile Menu
Out Profile Menu
Reset re-mark settings
Display current settings
You can choose to re-mark IP header data for the selected ACL. You can configure different remark
values, based on whether packets fall within the ACL Metering profile, or out of the ACL Metering profile.
Table 166 ACL Re-mark Configuration Menu options
Command
Description
inprof
Displays the Re-mark In-Profile Menu.
outprof
Displays the Re-mark Out-of-Profile Menu.
reset
Reset ACL Re-mark parameters to their default values.
cur
Displays the current ACL re-mark parameters.
193
Configuration Menu
ACL Re-mark In-Profile configuration
Command: /cfg/acl/acl <1-384>/re-mark/inprof
[Re-marking - In Profile Menu]
up1p
- Set Update User Priority Menu
updscp
- Set the update DSCP
reset
- Reset in profile settings
cur
- Display current settings
Table 167 ACL Re-mark In-Profile Configuration Menu options
Command
Description
up1p
Displays the Re-Mark In-Profile Update User Priority Menu.
updscp <0-63>
Sets the DiffServ Code Point (DSCP) of In-Profile packets to the selected value.
reset
Resets the update DSCP parameters to their default values.
cur
Displays the current ACL re-mark in-profile parameters.
ACL Re-mark In-Profile Update User Priority configuration
Command: /cfg/acl/acl <1-384>/re-mark/inprof/up1p
[Update User Priority Menu]
value
- Set the update user priority
utosp
- Enable/Disable use of TOS precedence
reset
- Reset in profile up1p settings
cur
- Display current settings
Table 168 ACL Update User Priority Configuration Menu options
Command
Description
value <0-7>
Defines 802.1p value. The value is the priority bits information in the packet
structure.
utosp enable|disable
Enable or disable mapping of TOS (Type of Service) priority to 802.1p priority for
In-Profile packets. When enabled, the TOS value is used to set the 802.1p value.
reset
Resets UP1P settings to their default values.
cur
Displays the current ACL Update User Priority parameters.
194
Configuration Menu
ACL Re-mark Out-of-Profile configuration
Command: /cfg/acl/acl <1-384>/re-mark/outprof
[Re-marking - Out Of Profile Menu]
updscp
- Set the update DSCP
reset
- Reset out of profile settings
cur
- Display current settings
Table 169 ACL Re-mark Out-of-Profile Configuration Menu options
Command
Description
updscp <0-63>
Sets the DiffServ Code Point (DSCP) of Out-of-Profile packets to the selected value. The
switch sets the DSCP value on Out-of-Profile packets.
reset
Resets the update DSCP parameters for Out-of-Profile packets to their default values.
cur
Displays the current ACL re-mark out-profile parameters.
ACL Packet Format configuration
Command: /cfg/acl/acl <1-384>/pktfmt
[Filtering Packet Format Menu]
ethfmt
- Set to filter on ethernet format
tagfmt
- Set to filter on ethernet tagging format
reset
- Reset all fields
cur
- Display current parameters
The following table describes the Packet Format Configuration Menu options.
Table 170 Packet Format Configuration Menu options
Command
Description
ethfmt eth2|snap|llc
Defines the Ethernet format for the ACL.
tagfmt none|tagged
Defines the tagging format for the ACL.
reset
Resets Packet Format parameters for the ACL to their default values.
cur
Displays the current Packet Format parameters for the ACL.
195
Configuration Menu
ACL Group configuration
Command: /cfg/acl/group <1-384>
[ACL Group 1 Menu]
add
- Add ACL to group
rem
- Remove ACL from group
cur
- Display current ACL items in group
This menu allows you to compile one or more ACLs into an ACL Group. Once you create an ACL Group,
you can assign the ACL Group to one or more ports.
The following table describes the ACL Group Configuration Menu options.
Table 171 ACL Group Configuration Menu options
Command
Description
add acl <1-384>
Adds the selected ACL to the ACL Group. You can add up to 96 ACLs to
each ACL Group.
rem acl <1-384>
Removes the selected ACL from the ACL Group.
cur
Displays the current ACL group parameters.
196
Configuration Menu
Remote Monitoring configuration
Command: /cfg/rmon
[RMON Menu]
hist
event
alarm
cur
-
RMON History Menu
RMON Event Menu
RMON Alarm Menu
Display current RMON configuration
Remote Monitoring (RMON) allows you to monitor traffic flowing through the switch. The RMON MIB is
described in RFC 1757.
The following table describes the RMON Configuration Menu options.
Table 172 RMON Menu options
Command
Description
hist
Displays the RMON History Menu.
event
Displays the RMON Event Menu.
alarm
Displays the RMON Alarm Menu.
cur
Displays the current RMON configuration.
RMON history configuration
Command: /cfg/rmon/hist <1-65535>
[RMON History
ifoid
rbnum
intrval
owner
delete
cur
1
-
Menu]
Set interface MIB object to monitor
Set the number of requested buckets
Set polling interval
Set owner for the RMON group of statistics
Delete this history and restore defaults
Display current history configuration
The following table describes the RMON History Menu options.
Table 173 RMON History Menu options
Command
Description
ifoid <1-127 characters>
Configures the interface MIB Object Identifier. The IFOID must correspond to the
standard interface OID, as follows:
1.3.6.1.2.1.2.2.1.1.x
where x is the ifIndex (1-16, 18-21)
The interface OID can have a maximum of 127 characters.
rbnum <1-65535>
Configures the requested number of buckets, which is the number of discrete
time intervals over which data is to be saved.
The range is from 1 to 65535. The default is 30.
NOTE: The maximum number of buckets that can be granted is 50.
intrval <1-3600>
Configures the time interval over which the data is sampled for each bucket.
The range is from 1 to 3600 seconds. The default value is 1800 seconds.
197
Configuration Menu
Table 173 RMON History Menu options
Command
Description
owner <1-127 characters>
Enter a text string that identifies the person or entity that uses this history index.
The owner can have a maximum of 127 characters.
delete
Deletes the selected history index.
cur
Displays the current RMON History parameters.
RMON event configuration
Command: /cfg/rmon/event <1-65535>
[RMON Event 1
descn
type
owner
delete
cur
Menu]
- Set description for the event
- Set event type
- Set owner for the event
- Delete this event and restore defaults
- Display current event configuration
The following table describes the RMON Event Menu options.
Table 174 RMON Event Menu options
Command
Description
descn <1-127 characters>
Enter a text string to describe the event.
The description can have a maximum of 127 characters.
type none|log|trap|both
Selects the type of notification provided for this event. For log events, an entry
is made in the log table and sent to the configured syslog host. For trap events,
an SNMP trap is sent to the management station (/cfg/snmp/trap).
owner <1-127 characters>
Enter a text string that identifies the person or entity that uses this event index.
The owner can have a maximum of 127 characters.
delete
Deletes this event index.
cur
Displays the current RMON Event parameters.
198
Configuration Menu
RMON alarm configuration
Command: /cfg/rmon/alarm <1-65535>
[RMON Alarm 1
oid
intrval
sample
almtype
rlimit
flimit
revtidx
fevtidx
owner
delete
cur
Menu]
- Set MIB oid datasource to monitor
- Set alarm interval
- Set sample type
- Set startup alarm type
- Set rising threshold
- Set falling threshold
- Set event index to fire on rising threshold crossing
- Set event index to fire on falling threshold crossing
- Set owner for the alarm
- Delete this alarm and restore defaults
- Display current alarm configuration
The Alarm RMON group can track rising or falling values for a MIB object. The MIB object must be a
counter, gauge, integer, or time interval. Each alarm index must correspond to an event index that
triggers once the alarm threshold is crossed.
The following table describes the RMON Alarm Menu options.
Table 175 RMON Alarm Menu options
Command
Description
oid <1-127 characters>
Configures an alarm MIB Object Identifier.
The alarm OID can have a maximum of 127 characters.
intrval <1-65535>
Configures the time interval over which data is sampled and
compared with the rising and falling thresholds.
The range is from 1 to 65535 seconds. The default is 1800
seconds.
sample abs|delta
Configures the method of sampling the selected variable and
calculating the value to be compared against the thresholds, as
follows:
• abs—absolute value, the value of the selected variable is
compared directly with the thresholds at the end of the
sampling interval.
• delta—delta value, the value of the selected variable at the
last sample is subtracted from the current value, and the
difference compared with the thresholds.
almtype rising|falling|either
Configures the alarm type as rising, falling, or either (rising or
falling).
rlimit <-2147483647 to 2147483647>
Configures the rising threshold for the sampled statistic. When the
current sampled value is greater than or equal to this threshold,
and the value at the last sampling interval was less than this
threshold, a single event is generated.
flimit <-2147483647 to 2147483647>
Configures the falling threshold for the sampled statistic. When the
current sampled value is less than or equal to this threshold, and
the value at the last sampling interval was greater than this
threshold, a single event is generated.
199
Configuration Menu
Table 175 RMON Alarm Menu options
Command
Description
revtidx <0-65535>
Configures the rising alarm event index that is triggered when a
rising threshold is crossed.
The range is from 0 to 65535. The default value is 0.
fevtidx <0-65535>
Configures the falling alarm event index that is triggered when a
falling threshold is crossed.
The range is from 0 to 65535. The default value is 0.
owner <1-127 characters>
Enter a text string that identifies the person or entity that uses this
alarm index.
The owner can have a maximum of 127 characters.
delete
Deletes this alarm index.
cur
Displays the current RMON Alarm parameters.
200
Configuration Menu
Port mirroring
Command: /cfg/pmirr
[Port Mirroring
mirror monport cur
-
Menu]
Enable/Disable Mirroring
Monitoring Port based PM Menu
Display All Mirrored and Monitoring Ports
The Port Mirroring Configuration Menu is used to configure, enable, and disable the monitored port.
When enabled, network packets being sent and/or received on a target port are duplicated and sent to a
monitor port. By attaching a network analyzer to the monitor port, you can collect detailed information
about your network performance and usage. Port mirroring is disabled by default.
NOTE: See the “Troubleshooting tools” appendix in the HP 10Gb Ethernet BL-c Switch Application
Guide for information on how to use port mirroring.
The following table describes the Port Mirroring Configuration Menu options.
Table 176 Port Mirroring Configuration Menu options
Command
Description
mirror disable|enable
Enables or disables port mirroring
monport <port number>
Displays port mirroring menu.
cur
Displays current settings of the mirrored and monitoring ports.
Port-based port mirroring
Command: /cfg/pmirr/monport <port number>
[Port 1 Menu]
add
rem
delete
cur
-
Add "Mirrored" port
Rem "Mirrored" port
Delete this “Monitor” port
Display current Port-based Port Mirroring configuration
The following table describes the port-based Port Mirroring Configuration Menu options.
Table 177 Port Mirroring Configuration Menu options
Command
Description
add <mirrored port> in|out|both
Adds the port to be mirrored. This command also allows you to enter
the direction of the traffic. It is necessary to specify the direction
because:
• If the source port of the frame matches the mirrored port and the
mirrored direction is ingress or both (ingress and egress), the
frame is sent to the mirrored port.
• If the destination port of the frame matches the mirrored port and
the mirrored direction is egress or both, the frame is sent to the
monitoring port.
rem <mirrored port>
Removes the mirrored port.
delete
Deletes this monitored port.
201
Configuration Menu
Table 177 Port Mirroring Configuration Menu options
Command
Description
cur
Displays the current settings of the monitoring port.
Uplink Failure Detection configuration
Command: /cfg/ufd
[Uplink Failure Detection Menu]
fdp - Failure Detection Pair Menu
on - Globally turn Uplink Failure Detection ON
off - Globally turn Uplink Failure Detection OFF
cur - Display current Uplink Failure Detection configuration
Uplink Failure Detection (UFD) supports network fault tolerance in network adapter teams. Use this menu
to configure a Failure Detection Pair of one Links to Monitor (LtM) group and one Links to Disable (LtD)
group. When UFD is enabled and a Failure Detection Pair is configured, the switch automatically disables
ports in the LtD if it detects a failure in the LtM. The failure conditions which are monitored in the LtM
group include port link state moving to down, or port state moving to Blocking if Spanning Tree Protocol is
enabled.
The following table describes the Uplink Failure Detection (UFD) Configuration Menu options.
Table 178 Uplink Failure Detection Configuration Menu options
Command
Description
fdp
Displays the Failure Detection Pair menu.
on
Globally turns Uplink Failure Detection ON.
off
Globally turns Uplink Failure Detection OFF.
cur
Displays the current Uplink Failure Detection configuration parameters.
202
Configuration Menu
Failure Detection Pair configuration
Command: /cfg/ufd/fdp
[FDP Menu]
ltm
ltd
ena
dis
current
-
Link to Monitor Menu
Link to Disable Menu
Enable FDP
Disable FDP
Display current FDP configuration
Use these commands to configure a Failure Detection Pair, which consists of one Link to Monitor (LtM) and
one Link to Disable (LtD). When the switch detects a failure on the LtM, it automatically disables the ports
in the LtD.
The following table describes the Failure Detection Pair (FDP) Configuration Menu options.
Table 179 Failure Detection Pair Configuration Menu options
Command
Description
ltm
Displays the Links to Monitor menu.
ltd
Displays the Links to Disable menu.
ena
Enables the FDP Parameters.
dis
Disables the FDP Parameters.
current
Displays the current FDP configuration.
Link to Monitor configuration
Command: /cfg/ufd/fdp/ltm
[Failure Link
addport
remport
addtrnk
remtrnk
addkey
remkey
cur
to Monitor Menu]
- Add port to Link to Monitor
- Remove port from Link to Monitor
- Add trunk to Link to Monitor
- Remove trunk from Link to Monitor
- Add adminkey to Link to Monitor
- Remove adminkey from Link to Monitor
- Display current LtM configuration
The following table describes the Link to Monitor (LtM) Menu options. The LtM can consist of only one
uplink port (ports 18-21) or a single trunk containing only uplink ports.
Table 180 Link to Monitor Menu options
Command
Description
addport <port number>
Adds a port to the LtM. Only uplink ports (18-21) are allowed in the LtM.
remport <port number>
Removes a port from the LtM.
addtrnk <1-12>
Adds a trunk group to the LtM. The LtM trunk group can contain only
uplink ports (18-21).
remtrnk <1-12>
Removes a trunk group from the LtM.
203
Configuration Menu
Table 180 Link to Monitor Menu options
Command
Description
addkey <1-65535>
Adds a LACP admin key to the LtM. LACP trunks formed with this admin
key will be included in the LtM.
remkey <1-65535>
Removes a LACP admin key from the LtM.
cur
Displays the current LtM configuration.
Link to Disable configuration
Command: /cfg/ufd/fdp/ltd
[Failure Link
addport
remport
addtrnk
remtrnk
addkey
remkey
cur
to Disable Menu]
- Add port to Link to Disable
- Remove port from Link to Disable
- Add trunk to Link to Disable
- Remove trunk from Link to Disable
- Add adminkey to Link to Disable
- Remove adminkey from Link to Disable
- Display current LtD configuration
The following table describes the Link to Disable (LtD) Menu options. The LtD can consist of any mix of
downlink ports (ports 1-16) and trunk groups that contain only downlink ports.
Table 181 Link to Disable Menu options
Command
Description
addport <port number>
Adds a port to the current LtD group. Only downlink ports (1-16) are allowed
in the LtD.
remport <port number>
Removes a port from the current LtD group.
addtrunk <1-12>
Adds a trunk group to the current LtD group. LtD trunk groups can contain only
downlink ports (1-16).
remtrunk <1-12>
Removes a trunk group from the current LtD group.
addkey <1-65535>
Adds a LACP admin key to the LtD. LACP trunks formed with this admin key will
be included in the LtD.
remkey <1-65535>
Removes a LACP admin key from the LtD.
cur
Displays the current LtD configuration.
204
Configuration Menu
Dump
Command: /cfg/dump
The dump program writes the current switch configuration to the terminal screen. To start the dump
program, at the Configuration# prompt, enter:
Configuration# dump
The configuration is displayed with parameters that have been changed from the default values. The
screen display can be captured, edited, and placed in a script file, which can be used to configure other
switches. Paste the configuration commands from the script file at the command line prompt of the switch.
The active configuration can also be saved or loaded via FTP/TFTP.
Saving the active switch configuration
Command: /cfg/ptcfg <FTP/TFTP server> <filename>
When the ptcfg command is used, the active configuration commands of the switch (as displayed using
/cfg/dump) will be uploaded to the specified script configuration file on the TFTP server. To start the
switch configuration upload, at the Configuration# prompt, enter:
Configuration# ptcfg <FTP/TFTP server> <filename>
Where <FTP/TFTP server> is the FTP or TFTP server IP address or hostname and <filename> is the
name of the target script configuration file.
NOTE: The output file is formatted with line-breaks but no carriage returns. The file cannot be
viewed with editors that require carriage returns (such as Microsoft Notepad).
NOTE: If the TFTP server is running SunOS™ or the Solaris™ operating system, the specified
ptcfg file must exist prior to executing the ptcfg command and must be writable (set with proper
permission, and not locked by any application). The contents of the specified file will be replaced
with the current configuration data.
Restoring the active switch configuration
Command: /cfg/gtcfg <FTP/TFTP server> <filename>
When the gtcfg command is used, the active configuration will be replaced with the commands found in
the specified configuration file. The file can contain a full switch configuration or a partial configuration.
The configuration loaded using gtcfg is not activated until the apply command is used. If the apply
command is found in the configuration script file loaded using this command, the apply action will be
performed automatically.
To start the switch configuration download, at the Configuration# prompt, enter:
Configuration#
gtcfg <FTP/TFTP server> <filename>
Where <FTP/TFTP server> is the FTP/TFTP server IP address or hostname and <filename> is the
name of the target script configuration file.
NOTE: The switch supports three configuration files: active, backup, and factory. See the “Selecting
a configuration block” section in the “Boot Options Menu” chapter for information on how to set
which configuration file to use upon boot up.
205
Operations Menu
Operations Menu
Introduction
Operations-level commands are used for making immediate and temporary changes to switch
configuration. The Operations Menu is used for bringing ports temporarily in and out of service. This
menu is available only from an administrator and operator login.
Menu information
Command: /oper
[Operations Menu]
port
- Operational Port Menu
vrrp
- Operational Virtual Router Redundancy Menu
passwd
- Change current user password
clrlog
- Clear syslog messages
ntpreq
- Send NTP request
The following table describes the Operations Menu options.
Table 182 Operations Menu options
Command
Description
port <port number>
Displays the Operational Port Menu.
vrrp
Displays the Operational Virtual Router Redundancy Menu.
passwd <1-128 characters>
Allows the user to change the password. You need to enter the current
password in use for validation.
clrlog
Clears all Syslog messages.
ntpreq
Allows the user to send requests to the NTP server.
206
Operations Menu
Operations-level port options
Command: /oper/port <port number>
[Operations Port 1 Menu]
8021x
- 8021.x Menu
rmon
- Enable/Disable RMON for port
ena
- Enable port
dis
- Disable port
cur
- Current port state
Operations-level port options are used for temporarily disabling or enabling a port.
Table 183 Operations-Level Port Menu options
Command
Description
8021x
Displays the 802.1x Port Menu.
rmon disable|enable
Enables or disables Remote Monitoring for the port. RMON must be enabled for any
RMON configurations to function.
ena
Temporarily enables the port. The port will be returned to its configured operation
mode when the switch is reset.
NOTE: This command does not enable a port that has been disabled by an ekeying
mismatch error.
dis
Temporarily disables the port. The port will be returned to its configured operation
mode when the switch is reset.
cur
Displays the current settings for the port.
Operations-level port 802.1x options
Command: /oper/port <port number>/8021x
[802.1x Operation Menu]
reset
- Reinitialize 802.1x access control on this port
reauth
- Initiate reauthentication on this port now
Operations-level port 802.1x options are used to temporarily set 802.1x parameters for a port.
Table 184 Operations-Level Port 802.1x Menu options
Command
Description
reset
Re-initializes the 802.1x access-control parameters for the port. The following actions take
place, depending on the 802.1x port configuration:
• force unauth—the port is placed in unauthorized state, and traffic is blocked.
• auto—the port is placed in unauthorized state, then authentication is initiated.
• force auth—the port is placed in authorized state, and authentication is not required.
reauth
Re-authenticates the supplicant (client) attached to the port. This command only applies if
the port’s 802.1x mode is configured as auto.
207
Operations Menu
Operations-level VRRP options
Command: /oper/vrrp
[VRRP Operations Menu]
back
- Set virtual router to backup
Operations-level VRRP options are described in the following table.
Table 185 Operations-Level VRRP Menu options
Command
Description
back <1-255>
Forces the specified master virtual router on this switch into backup mode. This is
generally used for passing master control back to a preferred switch once the
preferred switch has been returned to service after a failure. When this command
is executed, the current master gives up control and initiates a new election by
temporarily advertising its own priority level as 0 (lowest). After the new election,
the virtual router forced into backup mode by this command will resume master
control in the following cases:
• This switch owns the virtual router (the IP addresses of the virtual router and its
IP interface are the same)
• This switch’s virtual router has a higher priority and preemption is enabled.
• There are no other virtual routers available to take master control.
208
Boot Options Menu
Boot Options Menu
Introduction
You must be logged in to the switch as the administrator to use the Boot Options Menu.
The Boot Options Menu provides options for:
•
•
•
Selecting a switch software image to be used when the switch is next reset.
Selecting a configuration block to be used when the switch is next reset.
Downloading or uploading a new software image to the switch via FTP/TFTP.
Menu information
Command: /boot
[Boot Options
image
conf
mode
prompt
gtimg
ptimg
reset
cur
Menu]
- Select software image to use on next boot
- Select config block to use on next boot
- Select CLI mode to use on next boot
- Prompt for selectable boot mode
- Download new software image via FTP/TFTP
- Upload selected software image via FTP/TFTP
- Reset switch [WARNING: Restarts Spanning Tree]
- Display current boot options
Each of the Boot Options Menu commands is discussed in greater detail in the following sections.
Updating the switch software image
The switch software image is the executable code running on the switch. A version of the image ships
with the switch, and comes pre-installed on the device. As new versions of the image are released, you
can upgrade the software running on the switch.
Upgrading the software image on the switch requires the following:
•
•
•
Loading the new image onto a FTP/TFTP server on your network
Downloading the new image from the FTP/TFTP server to the switch
Selecting the new software image to be loaded into switch memory the next time the switch is reset
Downloading new software to the switch
The switch can store up to two different software images, called image1 and image2, as well as boot
software, called boot. When you download new software, you must specify where it should be placed:
either into image1, image2, or boot.
For example, if your active image is currently loaded into image1, you would probably load the new
image software into image2. This lets you test the new software and reload the original active image
(stored in image1), if needed.
209
Boot Options Menu
To download new software to the switch, you will need the following:
•
•
•
•
The image or boot software loaded on a FTP or TFTP server on your network
The hostname or IP address of the FTP or TFTP server
The user name and password for FTP server, if necessary
The name of the new software image or boot file
NOTE: The DNS parameters must be configured if specifying hostnames. See the “Domain name
system configuration” section in the “Configuration Menu” chapter.
When the above requirements are met, use the following procedure to download the new software to
your HP 10GbE switch.
1. At the Boot Options# prompt, enter:
Boot Options# gtimg
2. Enter the name of the HP 10GbE switch software to be replaced:
Enter name of switch software image to be replaced
["image1"/"image2"/"boot"]: <image>
3. Enter the hostname or IP address of the FTP or TFTP server:
Enter hostname or IP address of FTP/TFTP server: <server name or IP
address>
4. Enter the name of the new software file on the server:
Enter name of file on FTP/TFTP server: <filename>
The exact form of the name will vary by TFTP server. However, the file location is normally relative to
the TFTP directory.
5. Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
6. Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
7. Enter the port type to use for the file transfer:
Enter the port to use for downloading the image
["mgt"|"data"]:
8. The system prompts you to confirm your request.
You should next select a software image to run, as described in the “Selecting a Soft Image to Run”
section.
210
Boot Options Menu
9. If you are loading an image from which you are not currently booted, the system prompts you to
change the image.
image2 currently contains Software Version 1.0.0
that was downloaded at 15:46:36 Wed Mar 21, 2007.
New download will replace image2 with file "1.0.1_OS.img"
from TFTP server 10.168.2.4.
Confirm download operation [y/n]: y
Invoking TFTP over port 69...
Starting download...
File appears valid
Download in
progress....................................................
Image download complete (1333953 bytes)
Writing to flash...This takes about 90 seconds. Please wait
Write complete (1333953 bytes), now verifying FLASH...
Verification of new image2 in FLASH successful.
image2 now contains Software Version 1.0.1
Switch is currently set to boot software image1.
Do you want to change that to the new image2? [y/n] y
Next boot will use new software image2.
Selecting a software image to run
You can select which software image (image1 or image2) you want to run in switch memory for the
next reboot.
1. At the Boot Options# prompt, enter:
Boot Options# image
2. Enter the name of the image you want the switch to use upon the next boot. The system informs you
of which image is currently set to be loaded at the next reset, and prompts you to enter a new
choice:
Currently set to use switch software "image1" on next reset.
Specify new image to use on next reset ["image1"/"image2"]:
Uploading a software image from the switch
You can upload a software image from the switch to a FTP or TFTP server.
1. At the Boot Options# prompt, enter:
Boot Options# ptimg
2. The system prompts you for information. Enter the desired image:
Enter name of switch software image to be uploaded
["image1"|"image2"|"boot"]: <image> <hostname or server-IP-addr>
<server-filename>
3. Enter the name or the IP address of the FTP or TFTP server:
Enter hostname or IP address of FTP/TFTP server: <server name or IP
address>
4. Enter the name of the file into which the image will be uploaded on the FTP or TFTP server:
Enter name of file on FTP/TFTP server: <filename>
5. Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
211
Boot Options Menu
6. Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
7. The system then requests confirmation of what you have entered. To have the file uploaded, enter y.
image2 currently contains Software Version 1.0.0
Upload will transfer image2 (1889411 bytes) to file "test"
on TFTP server 10.1.1.1.
Confirm upload operation [y/n]: y
Selecting a configuration block
When you make configuration changes to the switch, you must save the changes so that they are retained
beyond the next time the switch is reset. When you execute the save command, your new configuration
changes are placed in the active configuration block. The previous configuration is copied into the
backup configuration block.
There is also a factory configuration block. This holds the default configuration set by the factory when the
switch was manufactured. Under certain circumstances, it may be desirable to reset the switch
configuration to the default. This can be useful when a custom-configured switch is moved to a network
environment where it will be re-configured for a different purpose.
Use the following procedure to set which configuration block you want the switch to load the next time it
is reset:
1. At the Boot Options# prompt, enter:
Boot Options# conf
2. Enter the name of the configuration block you want the switch to use.
The system indicates which configuration block is currently set to be loaded at the next reset, and
prompts you to enter a new choice:
Currently set to use active configuration block on next reset.
Specify new block to use ["active"/"backup"/"factory"]:
Resetting the switch
You can reset the switch to make your software image file and configuration block changes occur.
Resetting the switch causes the Spanning Tree Protocol to restart. This process can be lengthy, depending
on the topology of your network.
To reset the switch, at the Boot Options# prompt, enter:
>> Boot Options# reset
You are prompted to confirm your request.
To display current boot options, enter:
>> Boot Options# cur
212
Boot Options Menu
Accessing the ISCLI
To access the ISCLI, enter the following command from the AOS CLI, and reset the switch:
Boot Options# mode iscli
The default command-line interface for the HP 10GbE switch is the AOS CLI. To access the AOS CLI, enter
the following command and reset the switch:
>> Switch# boot cli-mode aos
Users can select the CLI mode upon login, if the /boot/prompt command is enabled. Only an
administrator connected through the console port can view and enable /boot/prompt. When
/boot/prompt is enabled, the first user to log in can select the CLI mode. Subsequent users must use the
selected CLI mode, until all users have logged out.
213
Maintenance Menu
Maintenance Menu
Introduction
The Maintenance Menu is used for debugging purposes, enabling you to generate a technical support
dump of the critical state information in the switch, and to clear entries in the Forwarding Database and
the Address Resolution Protocol (ARP) and routing tables. This menu is available only from an
administrator and operator login.
Menu information
Command: /maint
[Maintenance
sys
fdb
debug
arp
route
igmp
uudmp
ptdmp
ptfile
cldmp
panic
tsdmp
pttsdmp
Menu]
- System Maintenance Menu
- Forwarding Database Manipulation Menu
- Debugging Menu
- ARP Cache Manipulation Menu
- IP Route Manipulation Menu
- IGMP Multicast Group Menu
- Uuencode FLASH dump
- Upload FLASH dump via FTP/TFTP
- Upload FLASH dump via FTP/TFTP
- Clear FLASH dump
- Dump state information to FLASH and reboot
- Tech support dump
- Upload tech support dump via FTP/TFTP
Dump information contains internal switch state data that is written to flash memory on the switch after
any one of the following occurs:
•
The switch administrator forces a switch panic. The panic option, found in the Maintenance Menu,
causes the switch to dump state information to flash memory, and then causes the switch to reboot.
•
The switch administrator enters the switch reset key combination (Ctrl-Shift-6) on a device that is
attached to the console port.
•
The switch detects a hardware or software problem that requires a reboot.
The following table describes the Maintenance Menu options.
Table 186 Maintenance Menu options
Command
Usage
sys
Displays the System Maintenance Menu.
fdb
Displays the Forwarding Database Manipulation Menu.
debug
Displays the Debug Menu.
arp
Displays the ARP Cache Manipulation Menu.
route
Displays the IP Route Manipulation Menu.
214
Maintenance Menu
Table 186 Maintenance Menu options
Command
Usage
igmp
Displays the IGMP Maintenance Menu.
uudmp
Displays dump information in uuencoded format.
ptdmp
Saves the system dump information via FTP/TFTP.
ptfile
Saves a specified file from the switch root file system to an FTP/TFTP server.
cldmp
Clears dump information from flash memory.
panic
Dumps MP information to flash and reboots.
tsdmp
Dumps all switch information, statistics, and configuration.
pttsdmp
Redirects the technical support dump (tsdmp) to an external FTP/TFTP server.
System maintenance options
Command: /maint/sys
[System Maintenance Menu]
flags
- Set NVRAM flag word
The System Maintenance Menu is reserved for use by HP technical support. The options are used to
perform system debugging.
The following table describes the System Maintenance Menu options.
Table 187 System Maintenance Menu options
Command
Usage
flags <new NVRAM flags word as
0xXXXXXXXX>
Sets the flags that are used for debugging purposes by HP
technical support.
215
Maintenance Menu
Forwarding Database options
Command: /maint/fdb
[FDB Manipulation Menu]
find
- Show a single FDB entry by MAC address
port
- Show FDB entries for a single port
vlan
- Show FDB entries for a single VLAN
dump
- Show all FDB entries
clear
- Clear entire FDB, then re-add static entries
The Forwarding Database (FDB) Manipulation Menu can be used to view information and to delete a
MAC address from the Forwarding Database or clear the entire Forwarding Database. This is helpful in
identifying problems associated with MAC address learning and packet forwarding decisions.
The following table describes the FDB Manipulation Menu options.
Table 188 FDB Manipulation Menu options
Command
Usage
find <MAC address> [<1-4094>]
Displays a single database entry by its MAC address. You are prompted
to enter the MAC address of the device. Enter the MAC address using
one of the following:
• xx:xx:xx:xx:xx:xx format (for example: 08:00:20:12:34:56)
• xxxxxxxxxxxx format (for example: 080020123456)
port <port number>
Displays all FDB entries for a particular port.
vlan <1-4094>
Displays all FDB entries on a single VLAN.
dump
Displays all entries in the Forwarding Database.
clear
Clears the entire Forwarding Database from switch memory, and then
adds the static entries to the Forwarding Database.
Debugging options
Command: /maint/debug
[Miscellaneous Debug Menu]
tbuf
- Show MP trace buffer
snap
- Show MP snap (or post-mortem) trace buffer
clrcfg - Clear all flash configs
The Miscellaneous Debug Menu displays trace buffer information about events that can be helpful in
understanding switch operation. You can view the following information using the Debug Menu:
•
•
Events traced by the management processor (MP)
Events traced to a buffer area when a reset occurs
If the switch resets for any reason, the management processor (MP) trace buffer is saved into the snap
trace buffer area. The output from these commands can be interpreted by HP technical support.
216
Maintenance Menu
The following table describes the Miscellaneous Debug Menu options:
Table 189 Miscellaneous Debug Menu options
Command
Usage
tbuf
Displays the management processor trace buffer. Header information similar to the following
is shown:
MP trace buffer at 13:28:15 Fri May 25, 2002; mask: 0x2ffdf748
The buffer information is displayed after the header.
snap
Displays the management processor snap (or post-mortem) trace buffer. This buffer contains
information traced at the time that a reset occurred.
clrcfg
Deletes all flash configuration blocks. The next time the switch is rebooted, it returns to the
factory default settings.
ARP cache options
Command: /maint/arp
[Address Resolution Protocol Menu]
find
- Show a single ARP entry by IP address
port
- Show ARP entries on a single port
vlan
- Show ARP entries on a single VLAN
addr
- Show ARP entries for switch's interfaces
dump
- Show all ARP entries
clear
- Clear ARP cache
The following table describes the Address Resolution Protocol Menu options:
Table 190 Address Resolution Protocol Menu options
Command
Usage
find <IP address>
Shows a single ARP entry by IP address. For example, 192.4.17.35.
port <port number>
Shows ARP entries on a single port.
vlan <1-4094>
Shows ARP entries on a single VLAN.
addr
Shows the list of IP addresses that the switch will respond to for ARP requests.
dump
Shows all ARP entries.
clear
Clears the entire ARP list from switch memory.
NOTE: To display all ARP entries currently held in the switch, or a portion according to one of the
options listed on the menu above (find, port, vlan, dump), see the “ARP information”
section of the “Information Menu” chapter.
217
Maintenance Menu
IP Route Manipulation options
Command: /maint/route
[IP Routing Menu]
find
- Show a single route by destination IP address
gw
- Show routes to a single gateway
type
- Show routes of a single type
tag
- Show routes of a single tag
if
- Show routes on a single interface
dump
- Show all routes
clear
- Clear route table
The following table describes the IP Route Manipulation Menu options:
Table 191 IP Route Manipulation Menu options
Command
Usage
find <IP address>
Shows a single route by destination IP address.
gw <IP address>
Shows routes to a default gateway.
type indirect|direct|local|
broadcast|martian|multicast
Shows routes of a single type.
tag fixed|static|addr|rip|
ospf|broadcast|martian
Shows routes of a single tag.
if <1-250>
Shows routes on a single interface.
dump
Shows all routes.
clear
Clears the route table from switch memory.
IGMP Multicast Group options
Command: /maint/igmp
[IGMP Multicast
snoop
mrouter clear
-
Group Menu]
IGMP Snooping Menu
IGMP Multicast Router Port Menu
Clear group and mrouter tables
The following table describes the IGMP Multicast Group Maintenance Menu options.
Table 192 IGMP Multicast Group Menu options
Command
Usage
snoop
Displays the IGMP Snooping maintenance menu.
mrouter
Displays the IGMP Multicast Router maintenance menu.
clear
Clears IGMP Multicast data from switch memory.
218
Maintenance Menu
IGMP Snooping options
Command: /maint/igmp/snoop
[IGMP Multicast
find
vlan
port
trunk
detail
dump
clear
-
Group Menu]
Show a single group by IP group address
Show groups on a single vlan
Show groups on a single port
Show groups on a single trunk
Show detail of a single group by IP address
Show all groups
Clear group tables
The following table describes the IGMP Snoop Maintenance Menu options.
Table 193 IGMP Snooping Menu options
Command
Usage
find <IP address>
Shows a single IGMP Multicast group by IP address.
vlan <1-4094>
Shows IGMP Multicast groups on a single VLAN.
port <port number>
Shows IGMP Multicast groups on a single port.
trunk <1-40>
Displays all IGMP multicast groups on a single trunk group.
(To be added-LACP trunks)
detail <IP address>
Displays details about IGMP multicast groups, including source and timer
information.
dump
Shows all IGMP Multicast groups.
clear
Clears IGMP Multicast data from switch memory.
IGMP Mrouter options
Command: /maint/igmp/mrouter
[IGMP Multicast
vlan
dump
clear
-
Routers Menu]
Show all multicast router ports on a single vlan
Show all multicast router ports
Clear multicast router port table
The following table describes the IGMP Multicast Routers Maintenance Menu options.
Table 194 IGMP Multicast Group Menu options
Command
Usage
vlan <1-4094>
Shows IGMP Multicast groups on a single VLAN.
dump
Shows all IGMP Multicast routers.
clear
Clears IGMP Multicast router data from switch memory.
219
Maintenance Menu
Uuencode flash dump
Command: /maint/uudmp
Using this command, dump information is presented in uuencoded format. This format makes it easy to
capture the dump information as a file or a string of characters.
If you want to capture dump information to a file, set your communication software on your workstation to
capture session data prior to issuing the uudmp command. This will ensure that you do not lose any
information. Once entered, the uudmp command will cause approximately 23,300 lines of data to be
displayed on your screen and copied into the file.
Using the uudmp command, dump information can be read multiple times. The command does not cause
the information to be updated or cleared from flash memory.
Dump information is not cleared automatically. In order for any subsequent dump information to be
written to flash memory, you must manually clear the dump region. For more information on clearing the
dump region, see the “Clearing dump information” section later in this chapter.
To access dump information, at the Maintenance# prompt, enter:
Maintenance# uudmp
The dump information is displayed on your screen and, if you have configured your communication
software to do so, captured to a file. If the dump region is empty, the following displays:
No FLASH dump available.
FTP/TFTP system dump put
Command: /maint/ptdmp <server> <filename>
Use this command to put (save) the system dump to a FTP or TFTP server.
NOTE: If the FTP/TFTP server is running SunOS or the Solaris operating system, the specified
ptdmp file must exist prior to executing the ptdmp command, and must be writable (set with
proper permission, and not locked by any application). The contents of the specified file will be
replaced with the current dump data.
To save dump information via FTP/TFTP, at the Maintenance# prompt, enter:
Maintenance#
ptdmp <server> <filename>
Type the FTP/TFTP server IP address or hostname as <server>, and the target dump file as
<filename>. You are prompted to choose the port type (data port or management port) to use for the
file transfer.
Clearing dump information
Command: /maint/cldmp
To clear dump information from flash memory, at the Maintenance# prompt, enter:
Maintenance# cldmp
The switch clears the dump region of flash memory and displays the following message:
FLASH dump region cleared.
If the flash dump region is already clear, the switch displays the following message:
FLASH dump region is already clear.
220
Maintenance Menu
Panic command
Command: /maint/panic
The panic command causes the switch to immediately dump state information to flash memory and
automatically reboot.
To select panic, at the Maintenance# prompt, enter:
>> Maintenance# panic
A FLASH dump already exists.
Confirm replacing existing dump and reboot [y/n]:
Enter y to confirm the command:
Confirm dump and reboot [y/n]: y
A list of messages is displayed:
Starting system dump...done.
Reboot at 11:54:08 Wednesday March 21, 2007...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rebooted because of console PANIC command.
Booting complete
Unscheduled system dumps
If there is an unscheduled system dump to flash memory, the following message is displayed when you
log on to the switch:
Note: A system dump exists in FLASH. The dump was saved
at 13:43:22 Wednesday March 21, 2007. Use /maint/uudmp to
extract the dump for analysis and /maint/cldmp to
clear the FLASH region. The region must be cleared
before another dump can be saved.
221
Index
Index
8
802.1x information, 42
802.1x statistics, 77
A
abbreviating commands, 19
access control, user, 127
active configuration block, 112, 212
active switch configuration: gtcfg,
205; ptcfg, 205; restoring, 205
Address Resolution Protocol (ARP):
address list, 217
Address Resolution Protocol (ARP)
Menu, 56
aging: STP information, 45, 47
apply command, 17, 111
auto-negotiation: enable/disable on
port, 136; flow control
configuration, 136
B
backup configuration block, 112,
212
banner (system option), 114
Boot Options Menu, 209
bootstrap protocol (BOOTP): obtain
the IP address, 11
bridge maximum age parameter:
configuration, 148; information,
45, 47, 50
bridge parameter menu, for STP,
143
bridge priority, 45
Bridge Protocol Data Unit (BPDU),
45, 47, 50
bridge Spanning Tree parameters,
148
C
capture dump information to a file,
220
clear: ARP entries, 217; dump
information, 220
commands: abbreviations, 19;
global commands, 16; shortcuts,
19; tab completion, 19
Common Internal Spanning Tree
information, 49
configuration: apply changes, 111;
default gateway interval, for
health checks, 159; default
gateway IP address, 159; dump
command, 205; flow control, 136;
Gigabit Ethernet, 134; operating
mode, 136; port mirroring, 201;
port trunking, 152; revert
changes, 111; save changes,
112; switch IP address, 158;
view pending changes, 111;
VLAN default (PVID), 134; VLAN
IP interface, 158; VLAN tagging,
134
configuration block, 212
configuring RMON (remote
monitoring), 197
connecting: via console, 10; via
Secure Shell (SSH), 12; via
Telnet, 11
console port, connecting, 10
cost: STP information, 46, 48, 50;
STP port option, 149
D
debugging, 214
default gateway, interval for health
checks, 159
default password: administrator, 21;
operator, 24; user, 23
diff command, 16, 111
diff flash command, 16, 111
disconnect idle timeout, 14
download software, 209
dump: configuration, 205;
information, 74; state
information, 221; statistics, 109
duplex mode, link status, 25, 71
dynamic routes, 218
F
factory configuration block, 212
factory default configuration, 20
first-time configuration, 20
flow control: configuration, 136;
display setting, 25; link status, 71
Forwarding Database (FDB):
maintenance, 216
Forwarding Database Information
Menu, 39
Forwarding Database Manipulation
Menu, 216
forwarding state (FWD), 40, 45, 47,
50, 51
fwd (STP bridge option), 148
FwdDel (forward delay), bridge port,
45, 47, 50
G
gig (Port Menu option), 134
Gigabit Ethernet Physical Link, 134
Gigabit Ethernet, configuration, 134
global commands, 16
gtcfg (TFTP load command), 205
H
health checks: default gateway
interval, retries, 159; retry,
number of failed health checks,
159
hello, STP information, 45, 47, 50
history command, 17
I
idle timeout, overview, 14
IEEE standards, 802.1d Spanning
Tree Protocol, 45
IGMP Mrouter options, 219
IGMP Multicast Group options, 218
IGMP Snooping options, 219
IGMPv3: configuration, 175
image: download, 209; software,
selection, 211
information dump, 74
Information Menu, 25
interface statistics, 82, 83, 84
Internet Protocol (IP) statistics, 83
IP address: ARP information, 56;
BOOTP, 11; default gateway
configuration, 159
active IP interface: active, 185
IP interface: address configuration,
158; information, 62; VLAN
configuration, 158
IP Interface Configuration Menu,
158
IP Route Manipulation options, 218
L
LACP statistics, 87
Layer 2 information, 38
Layer 2 statistics, 87
Layer 3 information, 53
Layer 3 statistics, 88
LEARNING (port state), 45, 47, 50
lines command, 16
Link Aggregation Control Protocol
information, 41
222
Index
link status: command, 71; display
setting, 25; duplex mode, 25, 71;
port speed, 25, 71
log, syslog messages, 115
login notice, 114
M
Main Menu, 15
Maintenance Menu, 214
management processor (MP): trace
buffer, 216
mask, IP interface subnet address,
158
MD5 cryptographic authentication,
168
media access control (MAC)
address: ARP information, 56;
display address, 11; FDB
information, 39; FDB
manipulation, 216
Miscellaneous Debug Menu, 216
monitor port, 201
N
Network Time Protocol (NTP):
synchronization, 120
null modem cable, 10
O
online help, 16
operating mode, configuration, 136
Operations-level port 802.1x
options, 207
Operations-level port options, 207
Operations-level VRRP options,
208
ospf: area index, 167; interface,
167; Not-So-Stubby Area, 168;
stub area, 168; transit area, 168
OSPF configuration, 167
OSPF information, 57
P
panic: command, 221; switch, 214
passwords, defaults, 21
ping command, 17
popd command, 17
port configuration, 134
Port Menu: configuration options,
136, 137; Gigabit Ethernet (gig)
configuration, 134
port mirroring, configuration, 201
port number, 71
port speed, 25, 71
port statistics, 76
port trunking configuration, 152
ports: disable (temporarily), 135;
information, 72; membership of
the VLAN, 51; priority, 46, 48, 50;
STP port priority, 149
preemption: assuming VRRP
master routing authority, 182
priority (STP port option), 149
prisrv, primary radius server, 117
ptcfg (TFTP save command), 205
pushd command, 17
pwd command, 17
Q
quiet (screen display option), 17
R
Rapid Spanning Tree and Multiple
Spanning Tree information, 46
read community string (SNMP
option), 122
reboot, 214, 221
retries, radius server, 117
retry, health checks for default
gateway, 159
revert apply command, 17, 111
revert command, 17, 111
RMON: alarm information, 69;
event information, 70; history
information, 68
RMON configuration: alarm, 199;
event, 198; history, 197
RMON Information Menu, 68
poisoned reverse, as used with split
horizon: poisoned reverse, 165
Routing Information Protocol (RIP):
version 1 parameters, 161, 164
split horizon: split horizon, 165
S
save command, 17, 112, 212
save n command, 17
secret, radius server, 117
secsrv, secondary radius server,
117
Secure Shell (SSH): encryption and
authentication methods, 12
Secure Shell Server (SSHD) Menu,
116
Setup utility: introduction, 20; start,
20
shortcuts, 19
Simple Network Management
Protocol (SNMP): optional setup,
21
snap traces, buffer, 216
SNMP: set and get access, 122
SNMPv3 Access Table information,
30
SNMPv3 Community Table
information, 31
SNMPv3 dump, 34
SNMPv3 Group Table information,
31
SNMPv3 Information Menu, 27
SNMPv3 Notify Table information,
33
SNMPv3 Target Address Table
information, 32
SNMPv3 Target Parameters Table
information, 32
SNMPv3 USM User Table
information, 28
SNMPv3 View Table information,
29
software: image, 209
Spanning Tree Protocol (STP):
bridge parameters, 148;
information, 45; port cost option,
149; port priority option, 149; root
bridge, 148; switch reset effect,
212; with trunk groups, 51
sshport, 116
starting switch setup, 20
state (STP information), 46, 48, 50
statistics dump, 109
Statistics Menu, 75
subnet address mask configuration,
IP subnet address, 158
subnets: IP interface, 158
switch: reset, 212
syslog: display messages, 36
system: date and time, 26, 27, 28,
30, 31, 32, 33, 37, 38, 53, 87;
information, 35, 74
System Configuration Menu, 113
System Information Menu, 26
system options: login banner, 114;
tnport, 114
T
tab completion, 19
TCP statistics, 102, 103
Telnet: requirements, 11
telnet command, 17
timeout, radius server, 117
timeouts, idle connection, 14
tnport, system option, 114
trace buffer, 216
traceroute command, 17
Tracking: VRRP; tracking, 181
transmit flow control, 136
223
Index
Trivial File Transfer Protocol
(TFTP): PUT and GET
commands, 205; use for
updating switch software image,
209
typographical conventions, 14
U
UCB statistics, 103
UDP statistics, 94
unscheduled system dump, 221
upgrade, switch software, 209
user access control configuration,
127
user access levels, 13
uuencode flash dump, 220
V
verbose n command, 17
view pending configuration
changes, 111
virtual router: description, 181;
tracking criteria, 182
virtual router group: VRRP priority
tracking, 184
Virtual Router Redundancy Protocol
(VRRP): password,
authentication; VRRP
authentication, 185; group
options (prio); virtual router;
priority, 184; priority election for
the virtual router, 182
virtual routers: increasing priority
level of, 182; master preemption
(preem); virtual router, 184;
master preemption (prio); virtual
router, 182
VLAN: active port; VLAN, 185
VLAN tagging: port configuration,
134
VLANs: ARP entry information, 56;
configuration, 156; information,
51; name, 51; port membership,
51; setting default number
(PVID), 134; tagging, 26, 72;
VLAN number, 51
VRID (virtual router ID), 181, 184
VRRP: master advertisements, 182
VRRP configuration, 180
VRRP information, 64
VRRP master advertisements: time
interval, 184
VRRP statistics menu, 100
224