IP Routing Commands

IP Routing Commands
1. NSM Commands
2. FPM Commands
Command Reference
NSM Commands
1 NSM Commands
1.1 clear ip route
Use this command to clear the route cache.
clear ip route
Parameter
{ * | network [ netmask ] | }
Parameter
Description
*
Clears all route cache.
network
Specifies the route cache of the network or subnet.
(Optional) Subnet mask. If no subnet mask is specified,
Description
the longest match principle is used when you match
netmask
network with the route. The cache of the longest match is
cleared.
Command
Mode
Privileged EXEC mode
Usage
Clearing route cache clears the corresponding routes and triggers the routing protocol relearning.
Guide
Please note that clearing all route cache leads to temporary network disconnection.
The following example clears the cache of the route which is the longest match with IP address
Examples
192.168.12.0.
clear ip route 192.168.12.0
Related
Command
Description
Commands
N/A
N/A
Platform
Description
1.2 ip default-network
Use this command to configure the default network globally. Use the no or default form of this
command to restore the default setting.
ip default-network network
no ip default-network network
default ip default-network network
Parameter
Parameter
Description
Description
network
Default network
Command Reference
Defaults
Command
Mode
NSM Commands
The default is 0.0.0.0/0.
Global configuration mode
The goal of this command is to generate the default route. The default network must be reachable in the
Usage
Guide
routing table, but not the directly connected network.
The default network always starts with an asterisk (“*”), indicating that it is the candidate of the default
route. If there is connected route and the route without the next hop in the default network, the default
route must be a static route.
The following example sets 192.168.100.0 as the default network. Since the static route to the network is
configured, the device will automatically generate a default route.
ip route 192.168.100.0 255.255.255.0 serial 0/1
Examples
ip default-network 192.168.100.0
The following example sets 200.200.200.0 as the default network. The route becomes the default one
only when it is available in the routing table.
ip default-network 200.200.200.0
Related
Command
Description
Commands
show ip route
Displays the routing table.
1.3 ip route
Use this command to configure a static route. Use the no or default form of this command to restore
the default setting.
ip route network net-mask { ip-address | interface [ ip-address ] } [ distance ] [ tag tag ] [ permanent ]
[ weight number ] [description description-text] [ disabled | enabled] [ global ]
no ip route network net-mask { ip-address | interface [ ip-address ] } [ distance ]
no ip route all
default ip route network net-mask { ip-address | interface [ ip-address ] } [ distance ]
Parameter
Description
Parameter
Description
network
Network address of the destination
net-mask
Mask of the destination
ip-address
The next hop IP address of the static route
interface
(Optional) The next hop egress of the static route
distance
(Optional) The administrative distance of the static route
tag
(Optional) The tag of the static route
permanent
(Optional) Permanent route ID
weight number
(Optional) Indicates the weight of the static route. The
Command Reference
NSM Commands
weight is 1 by default.
description description-text
(Optional) Indicates the description of the static route. By
default, no description is configured. description-text is a
string of one to 60 characters.
disabled/enabled
(Optional) Indicates the enable flag of the static route. The
flag is enabled by default.
global
(Optional) Indicates that the next hop belongs to a global
VRF. By default, the VRF of the next hop is the same as
the VRF specified by vrf name.
arp
(Optional) Indicates that the next hop belongs to a global
VRF. By default, the VRF of the next hop is the same as
the VRF specified by vrf name.
Defaults
Command
Mode
No static route is configured by default.
Global configuration mode
The default administrative distance of the static route is 1. Setting the administrative distance allows
the learnt dynamic route to overwrite the static route. Setting the administrative distance of the static
route can enable route backup, which is called floating route in this case. For example, the
administrative distance of the OSPF is 110. You can set its administrative distance to 125. Then the
data can switch over the static route when the route running OSPF fails.
The default weight of the static route is 1. To view the static route of non default weight, execute the
show ip route weight command. The parameter weight is used to enable WCMP. When there are
Usage Guide
load-balanced routes to the destination, the device assigns data flows by their weights. The higher the
weight of a route is, the more data flow the route carries.
Enablement/disablement shows the state of the static route. Disablement means the static route is
not used for forwarding. The forwarding table used the permanent route until administrator deletes it.
When you configure the static route on an Ethernet interface, do not set the next hop as an interface,
for example, ip route 0.0.0.0 0.0.0.0 Fastethernet 0/0. In this case, the switch may consider that all
unknown destination networks are directly connected to the Fastethernet 0/0. So it sends an ARP
request to every destination host, which occupies many CPU and memory resources. It is not
recommended to set the static route to an Ethernet interface.
The following example adds a static route to the destination network of 172.16.100.0/24 whose next
hop is 192.168.12.1 and administrative distance is 15.
ip route 172.16.199.0 255.255.255.0 192.168.12.1 155
Examples
If the static route has not a specific interface, data flows may be sent thought other interface in case
of interface failure. The following example configures data flows to be sent through fastehternet 0/0
to the destination network of 172.16.100.0/24.
ip route 172.16.199.0 255.255.255.0 fastethernet 0/0 192.168.12.1
Related
This command is not supported on 2-layer devices.
Command Reference
NSM Commands
Commands
批注 [l1]: 1.1缺 ip route static bfd
1.4 ip routing
Use this command to enable IP routing in the global configuration mode. Use the no or default form of this
296 字 (已补)
1.2ip route static inter-vrf 192 字
(已补)
command to disable this function.
ip routing
no ip routing
default ip routing
Defaults
Command
Mode
This function is enabled by default.
Global configuration mode
IP routing is not necessary when the switch serves as bridge or VoIP gateway.
When a device functions only as a bridge or VoIP gateway, the IP routing function of the RGOS
software is not required. In this case, the IP routing function of the RGOS software can be disabled.
After the IP routing function is disabled, the device functions as a common host. The device can send
and receive packets but cannot forward packets. All route-related configurations will be deleted
Usage Guide
except the static route configuration. A large number of static routes may be configured. If a user runs
the no ip routing command, the configuration of a large number of static routes may be lost. To
prevent this situation, the static route configuration will be hidden temporarily when the no ip routing
command is run. If the ip routing command is run again, the static route configuration can be
restored.
Note that if the process or whole system restarts when the no ip routing command is run, the static
route configuration will not be reserved.
Examples
The following example disables IP routing.
Ruijie(config)# no ip routing
Related
Commands
N/A
Platform
Description
1.5 ip static route-limit
Use this command to set the upper threshold of the static route. Use the no or default form of this
command to restore the default setting.
ip static route-limit number
批注 [l2]: 翻译此处
Command Reference
NSM Commands
no ip static route-limit number
default ip static route-limit
Parameter
Parameter
Description
number
Defaults
The default is 1024.
Command
Mode
Usage Guide
Description
Upper threshold of static routes in the range from 1 to
10000
Global configuration mode
The goal is to control the number of static routes. You can view the upper threshold of the configured
non-default static routes with the show running-config command.
The following example sets the upper threshold of the static routes to 900 and then restores the
Examples
setting to the default value.
ip static route-limit 900
Related
Commands
N/A
Platform
Description
1.6 ipv6 route
Use this command to configure an ipv6 static route. Use the no or default form of this command to restore
the default setting.
ipv6 route ipv6-prefix / prefix-length { ipv6-address
| interface [ ipv6-address ] } [ distance ] [ tag tag ]
[ weight number ] [description description-text]
no ipv6 routeipv6-prefix / prefix-length { ipv6-address | interface [ ipv6-address ] } [ distance ]
no ipv6 route all
Parameter
Description
Parameter
Description
prefix-length
Mask length of the destination
ipv6-address
The next hop IP address of the static route
interface
(Optional) The next hop egress of the static route
distance
tag
weight number
(Optional) The administrative distance of the static route.
The default is 1.
(Optional) The tag value of the static route. The default is 0.
(Optional) Indicates the weight of the static route, which
must be specified when you configure equal-cost routes.
Command Reference
NSM Commands
The weight ranges from 1 to 8. When the weights of all
equal-cost routes of a route are summed up, the sum
cannot exceed the maximum number of equal-cost routes
that can be configured for the route. Weighting of
equal-cost routes of a route indicates the traffic ratio of
these routes. The weight is 1 by default.
(Optional) Indicates the description of the static route. By
descriptiondescription-text
default, no description is configured. description-text is a
string of one to 60 characters.
Defaults
Command
Mode
No IPv6 static route is configured by default.
Global configuration mode
The default administrative distance of the static route is 1. Setting the administrative distance allows
the learnt dynamic route to overwrite the static route. Setting the administrative distance of the static
Usage Guide
route can enable route backup, which is called floating route in this case. For example, the
administrative distance of the OSPF is 110. You can set its administrative distance to 125. Then the
data can switch over the static route when the route running OSPF fails.
The following example adds a static route to the destination network of 2001::/64 whose next hop is
2002::2 and administrative distance are 115.
ipv6 route 2001::/64 2002::2 115
Examples
If the static route has not a specific interface, data flows may be sent thought other interface in case of
interface failure. The following example configures that data flows are sent through fastehternet 0/0 to
the destination network of 2001::/64.
ipv6 route 2001::/64 fastethernet 0/0 2002::2
Related
Command
Description
Commands
show ipv6 route
Displays IPv6 routing table.
Platform
Description
批注 [l3]: 缺 ipv6 route static bfd
1.7 ipv6 static route-limit
Use this command to set the upper threshold of the static route. Use the no or default form of this command
to restore the default setting.
Ipv6 static route-limit number
no ipv6 static route-limit number
default ipv6 static route-limit
312 字(已补)
Command Reference
Parameter
Parameter
Description
number
Defaults
The default is 1000.
Command
Mode
Usage Guide
NSM Commands
Description
Upper threshold of static routes in the range from 1 to
10000.
Global configuration mode
The goal is to control the number of static routes. You can view the upper threshold of the configured
non-default static routes with the show running config command.
The following example sets the upper threshold of the ipv6 static routes to 900 and then restores the
Examples
setting to the default value.
Ruijie# ipv6 static route-limit 900
Ruijie# no ipv6 static route-limit
Related
Commands
Command
Description
ipv6 route
Configures the IPv6 static route.
show ipv6 route
Displays the IPv6 routing table.
Platform
Description
1.8 ipv6 unicast-routing
Use this command to enable the IPv6 route function of the RGOS. Use the no or default form of this
command to disable this function.
ipv6 unicast-routing
no ipv6 unicast-routing
default ipv6 unicast-routing
Parameter
Description
Defaults
N/A
This function is enabled by default.
Command
Mode
Usage Guide
Global configuration mode
This function can be disabled if the device is just used as the bridge-connection device or the VOIP
gateway device.
Command Reference
Examples
Related
Commands
NSM Commands
The example disables the IPv6 route function of RGOS.
Ruijie# no ipv6 unicast-routing
Command
Description
ipv6 route
Configure the IPv6 static route.
show ipv6 route
Displays the IPv6 routing table.
Platform
Description
1.9 maximum-paths
Use this command to specify the number of equivalent routes. Use the no or default form of this command is
used to restore the default setting.
maximum-paths number
no maximum-paths number
default maximum-paths
Parameter
Parameter
Description
Description
number
Number of equivalent routes in the range from 1 to 64.
Defaults
The default value varies from products.
Command
Mode
Global configuration mode
The number of equivalent routes is configured to control the number of equivalent routes. After the
number of equivalent routes is configured by running the maximum-paths command, the number of
load-sharing channels in load-sharing mode will not exceed the number of configured static routes.
You can run the show running config command to query the number of configured static routes.
This command takes effect both to IPv4 and IPv6 addresses. After this command is configured, the
maximum number of equivalent routes to an IPv4 or IPv6 destination is equal to the configured value.
Usage Guide
S8600/S5750/S7600 supports 64 groups of equivalent routes. Each group supports a maximum
of 32 equivalent routes. The maximum number of equivalent routes on S3760/S5760 is 8. The
number of static route groups is not restricted, that is, each route supports equivalent routes. An
equivalent route group includes multiple equivalent next hops of the same prefix. On
S8600/S5750/S7600, when 64 groups of equivalent routes are configured and an equivalent
route needs to be configured for a prefix, the configuration is successful if the equivalent route
exists in the 64 groups. Otherwise, the configuration fails.
Examples
The following example sets the number of equivalent routes to 10 and then restores the default
批注 [l4]: 翻译此处
Command Reference
NSM Commands
setting.
maximum-paths 10
no maximum-paths 10
批注 [l5]: 1.3缺 show ip redirects
154 字 (已补)
1.10 show ip route
Use the commands to display the configuration of the IP routing table.
show ip route [[ network [ mask [longer-prefix] ] | count | protocol [ process-id ] | weight ] ]
show ip route [ [ normal | ecmp ] [ network [ mask ] ]
Parameter
Description
Parameter
Description
network
(Optional) Displays the route information to the network.
mask
(Optional)Displays the route information to the network of this mask.
longer-prefix
(optional) Displays the routes that match the specified prefix.
(Optional)Displays the number of existent routes. (for the
count
ECMP/WCMP route, displays one route)
protocol
(Optional) Displays the route information of specific protocol.
process-id
(Optional) Routing protocol process ID.
weight
(Optional) Displays the route information of non default weight.
normal
Displays normal routes and not equivalent routes or fast reroutes.
ecmp
Displays only equivalent routes.
Defaults
Command
Privileged EXEC mode/ Global configuration mode/Interface configuration mode/ Routing protocol
Mode
configuration mode/ Route map configuration mode
This command can display route information flexibly.
Usage Guide
This command shows all routes. To show different attributes of routes, specify normal | ecmp |
fast-reroute.
The following example displays the configuration of the IP routing table.
Ruijie# show ip route
Codes: C - Connected, L - Local, S - Static
R - RIP, O - OSPF, B - BGP, I - IS-IS, V - Overflow route
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
Examples
SU - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
IA - Inter area, * - candidate default
Gateway of last resort is no set
S
20.0.0.0/8 is directly connected, VLAN 1
S
22.0.0.0/8 [1/0] via 20.0.0.1
O E2 30.0.0.0/8 [110/20] via 192.1.1.1, 00:00:06, VLAN 1
Command Reference
NSM Commands
R
40.0.0.0/8 [120/20] via 192.1.1.2, 00:00:23, VLAN 1
B
50.0.0.0/8 [120/0] via 192.1.1.3, 00:00:41
C
192.1.1.0/24 is directly connected, VLAN 1
C
192.1.1.254/32 is local host.
Field
Description
Source routing protocol, which may be:
C: directly connected route
S: static route
O
R: RIP route
B: BGP route
O: OSPF route
I: IS-IS route
Route type, which may be:
E1: OSPF external route type 1
E2: OSPF external route type 2
N1: OSPF NSSA external type 1
E2
N2: OSPF NSSA external type 2
IA: OSPF area internal route
SU: IS-IS summary route
L1: IS-IS level-1 route
L2: IS-IS level-2 route
IA: IS-IS area internal route
20.0.0.0/8
Network address and mask of the destination network
[1/0]
Administrative distance/metric
Ruijie# show ip route 30.0.0.0
Routing entry for 30.0.0.0/8
Distance 110, metric 20
Routing Descriptor Blocks:
192.1.1.1, 00:01:11 ago, via VLAN 1, generated by OSPF, extern 2
Field
Description
Next hop IP address, source, update time, forwarding
Routing Descriptor Blocks
interface, source routing protocol and type of route
information
Command Reference
NSM Commands
Ruijie# show ip route count
--------- route info ---------the num of active route: 5
Ruijie# show ip route weight
------------[distance/metric/weight]----------S
23.0.0.0/8 [1/0/2] via 192.1.1.20
S
172.0.0.0/16 [1/0/4] via 192.0.0.1
Ruijie#show ip route normal
Codes: C - Connected, L - Local, S - Static
R - RIP, O - OSPF, B - BGP, I - IS-IS, V - Overflow route
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
SU - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
IA - Inter area, * - candidate default
Gateway of last resort is no set
S
20.0.0.0/8 is directly connected, VLAN 1
S
22.0.0.0/8 [1/0] via 20.0.0.1
O E2 30.0.0.0/8 [110/20] via 192.1.1.1, 00:00:06, VLAN 1
R
40.0.0.0/8 [120/20] via 192.1.1.2, 00:00:23, VLAN 1
B
50.0.0.0/8 [120/0] via 192.1.1.3, 00:00:41
C
192.1.1.0/24 is directly connected, VLAN 1
C
192.1.1.254/32 is local host
Ruijie#show ip route ecmp
Codes: C - Connected, L - Local, S - Static
R - RIP, O - OSPF, B - BGP, I - IS-IS, V - Overflow route
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
SU - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
IA - Inter area, * - candidate default
Gateway of last resort is 192.168.1.2 to network 0.0.0.0
S*
0.0.0.0/0 [1/0] via 192.168.1.2
[1/0] via 192.168.2.2
O IA 192.168.10.0/24 [110/1] via 35.1.10.2, 00:38:26, VLAN 1
[110/1] via 35.1.30.2, 00:38:26, VLAN 3
Ruijie#show ip route fast-reroute
Command Reference
NSM Commands
Codes: C - Connected, L - Local, S - Static
R - RIP, O - OSPF, B - BGP, I - IS-IS, V - Overflow route
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
SU - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
IA - Inter area, * - candidate default
Status codes: m - main entry, b - backup entry, a – active entry
Gateway of last resort is 192.168.1.2 to network 0.0.0.0
S*
0.0.0.0/0 [ma] via 192.168.1.2
[b] via 192.168.2.2
O IA 192.168.10.0/24 [m] via 35.1.10.2, 00:38:26, VLAN 1
[ba] via 35.1.30.2, 00:38:26, VLAN 3
Ruijie# show ip route fast-reroute 30.0.0.0
Routing entry for 30.0.0.0/8
Distance 110, metric 20
Routing Descriptor Blocks:
[m] 192.1.1.1, 00:01:11 ago, via VLAN 1, generated by OSPF, extern 2
[ba]192.1.1.1, 00:01:11 ago, via VLAN 1, generated by OSPF, extern 2
批注 [l6]: 1.4缺 show ip route
static bfd 136 字 (已补)
1.11 show ip route summary
Use this command to display the statistical information about one routing table.
show ip route summary
Use this command to display the statistical information about all routing tables.
show ip route summary all
Parameter
Parameter
Description
Description
N/A
N/A
Defaults
N/A
Command
Mode
Privileged EXEC mode
Usage
guideline
N/A
Command Reference
NSM Commands
The following example displays the statistics of the global routing table.
Ruijie# show ip route summary
Codes: NORMAL – Normal route ECMP – ECMP route FRR – Fast-Reroute route
Memory: 2000 bytes
Entries: 22,based on route prefixes
NORMAL ECMP FRR TOTAL
Connected 3 0 0 3
Static 2 1 1 4
RIP 1 2 1 4
OSPF 2 1 1 4
ISIS 1 2 0 3
BGP 2 1 1 4
TOTAL 11 7 4 22
The following example displays the statistics of all routing tables.
Ruijie# show ip route summary all
Codes: NORMAL – Normal route ECMP – ECMP route FRR – Fast-Reroute route
IP routing table count:2
Total
Examples
Memory: 4000 bytes
Entries: 44,based on route prefixes
NORMAL ECMP FRR TOTAL
Connected 6 0 0 6
Static 4 2 2 8
RIP 2 4 2 8
OSPF 4 2 2 8
ISIS 2 4 0 6
BGP 4 2 2 8
TOTAL 22 14 8 44
Global
Memory: 2000 bytes
Entries: 22,based on route prefixes
NORMAL ECMP FRR TOTAL
Connected 3 0 0 3
Static 2 1 1 4
RIP 1 2 1 4
OSPF 2 1 1 4
ISIS 1 2 0 3
BGP 2 1 1 4
TOTAL 11 7 4 22
Command Reference
NSM Commands
VRF1
Memory: 2000 bytes
Entries: 22,based on route prefixes
Entries: 29,based on route nexthops
NORMAL
ECMP FRR TOTAL
Connected 3 0 0 3
Static 2 1 1 4
RIP 1 2 1 4
OSPF 2 1 1 4
ISIS 1 2 0 3
BGP 2 1 1 4
TOTAL 11 7 4 22
Field
Description
Type of the table entries. Value:
NORMAL: common routes (not ECMP or FRR);
NORMAL
ECMP: equivalent route;
FRR: fast reroute;
TOTAL: total
Memory
Memory occupied by the table.
Entries
Number of entries (based on prefix, not next-hop)
Protocol type. Value:
Connected: direct connection;
Static: static;
Connected
RIP: RIP;
OSPF: OSPF;
ISIS: ISIS;
BGP: BGP;
TOTAL: total
1.12 show ipv6 route
Use the command to display the configuration of the IPv6 routing table.
show ipv6 route [ [ ipv6-prefix / prefix-length [ longer-prefixes ] |
Parameter
ipv6-prefix/prefix-length
Parameter
longer-prefixes
Description
protocol
process-id
protocol [ process-id ] | weight ] ]
Description
(Optional) Specifies a prefix for route’s IPv6 address.
(Optional) Displays the route with an IPv6 address
prefix mostly matched.
((Optional) Displays the route information of specific
protocol.
(Optional) Specifies a route process ID.
Command Reference
NSM Commands
weight
(Optional) Displays the non-default-weight routes only.
Defaults
Command
Mode
Privileged EXEC mode
Usage Guide
Use this command to display route information.
The following example displays the IPv6 routing table.
Ruijie(config)# show ipv6 route
IPv6 routing table -
Default - 7 entries
Codes: C - Connected, L - Local, S - Static
R - RIP, O - OSPF, B - BGP, I - IS-IS, V - Overflow route
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
SU - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
IA - Inter area
C
10::/64 via Loopback 1, directly connected
L
10::1/128 via Loopback 1, local host
S
20::/64 [20/0] via 10::4, Loopback 1C
C
FE80::/10 via Null 0, directly connected
C
FE80::/64 via Loopback 1, directly connected
L
FE80::2D0:F8FF:FE22:33AB/128 via Loopback 1, local host
Examples
Field
Description
Route type, which may be:
E1: OSPF external route type 1
E2: OSPF external route type 2
N1: OSPF NSSA external type 1
E2
N2: OSPF NSSA external type 2
IA: OSPF area internal route
SU: IS-IS summary route
L1: IS-IS level-1 route
L2: IS-IS level-2 route
IA: IS-IS area internal route
20::/64
Network address and mask of the destination network
[20/0]
Administrative distance/metric
Command Reference
NSM Commands
Related
Command
Description
Commands
ipv6 route
Configures the IPv6 static route.
Platform
Description
1.13 show ipv6 route summary
Use this command to display the statistics of the IPv6 routing table of a specified VRF.
show ipv6 route summary
Use this command to display statistics of all IPv6 routing tables.
show ipv6 route summary all
Parameter
Parameter
Description
Description
N/A
N/A
Defaults
N/A
Command
Mode
Privileged EXEC mode
Usage Guide
N/A
The following example displays statistics of IPv6 routing table of the global VRF.
Ruijie#show ipv6 route summary
IPv6 routing table name is - Default(0) global scope - 5 entries
IPv6 routing table default maximum-paths is 32
Local
Connected
Examples
2
3
Static
0
PIP
0
OSPF
0
BGP
0
-----------------------Total
5
Field
Description
Memory
The memory size occupied by the current routing
table.
Entries
The entries in the current routing table (based on
the entry prefix instead of the next hop entry.)
Connected
Describes the protocol type of the entry. The field
can be;
Connected: Connected route entry.
Command Reference
NSM Commands
Static: Static route entry.
RIP: RIP route entry.
OSPF: OSPF route entry.
ISIS: ISIS route entry.
BGP: BGP route entry.
TOTAL: Total number of all protocol entries.
IPv6 routing table count
The number of the routing tables.
Global
The name of the current routing table. The field
can be:
Global : Global (The default VRF)
VRF1: VRF name.
TOTAL: All VRF routing table summaries.
Related
Command
Description
Commands
N/A
N/A
Platform
Description
Command Reference
FPM Commands
2 FPM Commands
2.1 clear ip fpm counters
Use this command to clear counters about the IPv4 packets.
clear ip fpm counters
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example clears counters about the IPv4 packets.
Examples
Ruijie# clear ip fpm counters
Platform
Description
N/A
2.2 clear ip v6fpm counters
Use this command to clear counters about the IPv6 packets.
clear ip v6fpm counters
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example clears counters about the IPv6 packets.
Examples
Ruijie# clear ip v6fpm counters
Platform
Description
N/A
Command Reference
FPM Commands
2.3 ip session direct-trans-disable
Use this command to disable the function to transparently transmit packets when the flow table is full.
ip session direct-trans-disable
Use the no form of this command to restore the default setting.
no ip session direct-trans-disable
Parameter
Description
Defaults
Parameter
Description
N/A
N/A
This configuration takes effect only on ACs and APs. With this feature, packets are transparently
transmitted instead of establishing any flow on wireless products when the flow table is full, and service
processing is not accelerated, thereby ensuring that service flows are not interrupted.
Command
Global configuration mode
Mode
Usage Guide
N/A
Configuration
The following example disables the function to transparently transmit packets when the flow table is full.
Examples
Ruijie(config)# ip session direct-trans-disable
Platform
Description
N/A
2.4 ip session tcp-loose
Use this command to enable the loose TCP status transition check function.
ip session tcp-loose
Use the no form of this command to restore the default setting.
no ip session tcp-loose
Parameter
Description
Defaults
Parameter
Description
N/A
N/A
By default, the loose TCP status check function is disabled on FW products while enabled on wireless
and EG products.
Command
Global configuration mode
Command Reference
FPM Commands
Mode
Usage Guide
N/A
Configuration
The following example enables the loose TCP status transition check function.
Examples
Ruijie(config)# ip session tcp-loose
Platform
Description
N/A
2.5 ip session tcp-state-inspection-enable
Use this command to enable the TCP status tracing function.
ip session tcp-state-inspection- enable
Use the no form of this command to restore the default setting.
no ip session tcp-state-inspection- enable
Parameter
Description
Parameter
Description
N/A
N/A
Defaults
The TCP status tracing function is disabled on ACs and APs by default.
Command
Global configuration mode
Mode
Usage Guide
N/A
Configuration
The following example enables the TCP status tracing function.
Examples
Ruijie(config)# ip session tcp-state-inspection-enable
Platform
Description
N/A
2.6 ip session threshold
Use this command to configure the number of packets that can be received for each flow in a certain
status.
ip session threshold {icmp-closed | icmp-started | rawip-closed | tcp-syn-sent | tcp-syn-receive |
tcp-closed | udp-closed} { num }
Use the no form of this command to restore the default setting.
Command Reference
FPM Commands
no ip session threshold {icmp-closed | icmp-started | rawip-closed | tcp-syn-sent | tcp-syn-receive
| tcp-closed | udp-closed}
Parameter
Description
Parameter
icmp-closed
icmp-started
rawip-closed
tcp-syn-sent
tcp-syn-receive
tcp-closed
udp-closed
num
Defaults
Description
Sets the number of packets permitted to pass in each ICMP flow in closed status,
which is 10 by default and ranges from 1 to 2,000,000,000.
Sets the number of packets permitted to pass in each ICMP flow in started status,
which is 300 by default and ranges from 5 to 2,000,000,000.
Sets the number of packets permitted to pass in each RAWIP flow in closed status,
which is 10 by default and ranges from 1 to 2,000,000,000.
Sets the number of packets permitted to pass in each TCP flow in syn-send status,
which is 10 by default and ranges from 5 to 2,000,000,000.
Sets the number of packets permitted to pass in each TCP flow in syn-receive
status, which is 20 by default and ranges from 5 to 2,000,000,000.
Sets the number of packets permitted to pass in each TCP flow in closed status,
which is 20 by default and ranges from 5 to 2,000,000,000.
Sets the number of packets permitted to pass in each UDP flow in closed status,
which is 10 by default and ranges from 1 to 2,000,000,000.
Sets the number of packets permitted to pass.
icmp-closed: 10;
icmp-started: 300;
rawip-closed: 10;
tcp-syn-sent: 10;
tcp-syn-receive: 20;
tcp-closed: 20;
udp-closed: 10.
Command
Global configuration mode
Mode
Usage Guide
To activate this configuration, run the ip session track-state-strictly command.
Configuratio
The following example configures the number of packets that can be received for each flow in a certain
n Examples
status to 100.
Ruijie(config)# ip session threshold tcp-closed 100
Platform
Description
N/A
2.7 ip session timeout
Use this command to configure the aging time.
Command Reference
FPM Commands
ip session timeout {icmp-closed | icmp-connected | icmp-started | rawip-closed | rawip-connected
| rawip-established | rawip-started | tcp-close-wait | tcp-closed | tcp-established |
tcp-fin-wait1 |
tcp-fin-wait2 | tcp-syn-receive | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-closed |
udp-started | udp-connected | udp-established} { num }
Use the no form of this command to restore the default setting.
no ip session timeout {icmp-closed | icmp-connected | icmp-started | rawip-closed |
rawip-connected | rawip-established | rawip-started | tcp-close-wait | tcp-closed | tcp-established |
tcp-fin-wait1 | tcp-fin-wait2 | tcp-syn-receive | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait |
udp-closed |
Parameter
Description
udp-started | udp-connected | udp-established}
Parameter
icmp-closed
icmp-connected
icmp-started
rawip-closed
rawip-connected
rawip-established
rawip-started
tcp-close-wait
tcp-closed
tcp-established
tcp-fin-wait1
tcp-fin-wait2
tcp-syn-receive
tcp-syn-sent
tcp-syn_sent2
tcp-time-wait
Description
Sets the aging time of ICMP flows in closed status, which is 10 seconds by default
and ranges from 5 to 60.
Sets the aging time of ICMP flows in connected status, which is 10 seconds by
default and ranges from 5 to 120.
Sets the aging time of ICMP flows in started status, which is 10 seconds by default
and ranges from 5 to 120.
Sets the aging time of RAWIP flows in closed status, which is 10 seconds by default
and ranges from 5 to 60.
Sets the aging time of RAWIP flows in connected status, which is 300 seconds by
default and ranges from 10 to 300.
Sets the aging time of RAWIP flows in established status, which is 300 seconds by
default and ranges from 10 to 600.
Sets the aging time of TCP flows in started status, which is 300 seconds by default
and ranges from 10 to 300.
Sets the aging time of TCP flows in tcp-close-wait status, which is 30 seconds by
default and ranges from 10 to 120.
Sets the aging time of TCP flows in tcp-closed status, which is 10 seconds by
default and ranges from 5 to 20.
Sets the aging time of TCP flows in tcp-established status, which is 1,800 seconds
by default and ranges from 300 to 604,800.
Sets the aging time of TCP flows in tcp-fin-wait1 status, which is 60 seconds by
default and ranges from 10 to 120.
Sets the aging time of TCP flows in tcp-fin-wait2 status, which is 60 seconds by
default and ranges from 10 to 120.
Sets the aging time of TCP flows in tcp-syn-receive status, which is 10 seconds by
default and ranges from 5 to 30.
Sets the aging time of TCP flows in tcp-syn-sent status, which is 10 seconds by
default and ranges from 5 to 30.
Sets the aging time of TCP flows in tcp-syn_sent2 status, which is 10 seconds by
default and ranges from 5 to 30.
Sets the aging time of TCP flows in tcp-time-wait status, which is 10 seconds by
Command Reference
FPM Commands
default and ranges from 5 to 60.
udp-closed
udp-connected
udp-established
udp-started
num
Defaults
Sets the aging time of UDP flows in closed status, which is 10 seconds by default
and ranges from 5 to 60.
Sets the aging time of UDP flows in connected status, which is 30 seconds by
default and ranges from 10 to 300.
Sets the aging time of UDP flows in established status, which is 600 seconds by
default and ranges from 120 to 600.
Sets the aging time of UDP flows in started status, which is 10 seconds by default
and ranges from 10 to 300.
Sets the aging time.
icmp-closed: 10 seconds;
icmp-connected: 10 seconds;
icmp-started: 10 seconds;
rawip-closed: 10 seconds;
rawip-connected; 300 seconds;
rawip-established: 300 seconds;
rawip-started: 300 seconds;
tcp-close-wait: 60 seconds;
tcp-closed: 10 seconds;
tcp-established: 1,800 seconds;
tcp-fin-wait1: 60 seconds;
tcp-fin-wait2: 60 seconds;
tcp-syn-receive: 10 seconds;
tcp-syn-sent: 10 seconds;
tcp-syn_sent2: 10 seconds;
tcp-time-wait: 10 seconds;
udp-closed: 10 seconds;
udp-connected: 30 seconds;
udp-established: 600 seconds;
udp-started: 10 seconds
Command
Global configuration mode
Mode
Usage Guide
N/A
Configuratio
The following example sets the aging time of TCP flows in tcp-established status to 600 seconds.
n Examples
Ruijie(config)# ip session timeout tcp-established 600
Platform
Description
N/A
Command Reference
FPM Commands
2.8 ip session track-state-strictly
Use this command to configure packet threshold check for flows in various states.
ip session track-state-strictly
Use the no form of this command to restore the default setting.
no ip session track-state-strictly
Parameter
Description
Parameter
Description
N/A
N/A
Defaults
This function is disabled by default.
Command
Global configuration mode
Mode
Usage Guide
N/A
Configuration
The following example configures packet threshold check for flows.
Examples
Ruijie(config)# ip session track-state-strictly
Platform
Description
N/A
2.9 show ip fpm counters
Use this command to displays the counters about the IPv4 packets.
show ip fpmcounters
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
Use this command to display the counters about the IPv4 packets, including information about packet
loss and flows.
Configuration
The following example displays the counters about the IPv4 packets.
Examples
Ruijie#sh ip fpm 1 2 counters
Dropped packet counters:
Command Reference
Count
0
FPM Commands
Reason
Non-IPv4 packet
0
Bad IPv4 header length
0
Bad IPv4 total length
0
Fragment pkt
0
change flow state notify FW refuse
0
Bad IPv4 checksum
0
Invalid IPv4 address
0
Invalid TCP flags
0
Invalid TCP sequence
0
Invalid ICMP message type
0
Invalid icmp initial message type
54
Invalid tcp init flags
0
Invalid tcp connection state
0
Connect over config threshold
0
Connect has been terminated
0
Invalid egress fid
0
out of vfw session limit
0
Out of capability
<end>
Rejected or terminated connection counters:
Count
0
Reason
Out of life time
1968
0
Flow Terminated
Rejected by policy
<end>
Field Description
Platform
Description
Field
Description
count
Packet counters.
Reason
Packet loss reason.
N/A
2.10 show ip fpm flows
Use this command to display IPv4 packet flow information.
show ip fpm flows
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Command Reference
FPM Commands
Mode
Usage Guide
N/A
Configuration
The following example displays IPv4 packet flow information.
Examples
Ruijie#show ip fpm flows
Pr SrcAddr
DstPort
DstAddr
Vrf
dstif
SendBytes RecvBytes
SrcPort
St
srcif
ctrl_flag
Field Description
Platform
Description
Field
Description
Pr
Protocol.
SrcAddr
Source address.
DstAddr
Destination address.
SrcPort
Source Port.
DstPort
Destination port.
Vrf
The VRF of the destination interface.
SendBytes
The length of received packets in Tx.
RecvBytes
The length of received packets in Rx.
St
The current state of flows.
srcif
Source interface.
dstif
Destination interface.
ctrl_flag
Flows control flag.
N/A
2.11 show ip fpm flows filter
Use this command to display IPv4 packet flow information except specific IPv4 packet flows.
show ip fpm flows filter protocol saddr smask daddr dmask
Parameter
Description
Command
Parameter
Description
protocol
IP protocol in the range from 0 to 255.
saddr
Source IP addresses.
smask
Source IP mask in the range from 1 to 32.
daddr
Destination IP addresses.
dmask
Destination IP mask in the range from 1 to 32.
Privileged EXEC mode
Mode
Usage Guide
N/A
Command Reference
FPM Commands
Configuration
The following example displays IPv4 packet flow information except specific IPv4 packet flows.
Examples
Ruijie#show ip fpm flows filter 1 192.168.1.1 32 192.168.2.1 30
Pr SrcAddr
DstPort
DstAddr
Vrf
dstif
SendBytes RecvBytes
SrcPort
St
srcif
ctrl_flag
Field Description
Platform
Description
Field
Description
Pr
Protocol
SrcAddr
Source address.
DstAddr
Destination address.
SrcPort
Source Port.
DstPort
Destination port.
Vrf
The VRF of the destination interface.
SendBytes
The length of received packets in Tx.
RecvBytes
The length of received packets in Rx.
St
The current state of flows.
srcif
Source interface.
dstif
Destination interface.
ctrl_flag
Flows control flag.
N/A
2.12 show ip fpm statistics
Use this command to display IPv4 flow statistics.
show ip fpm statistics
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example displays IPv4 flow statistics on the EG device.
Examples
Ruijie#show ip fpm statistics
The capacity of the flow table:150016.
Active flows num:109.
event count:65,
Command Reference
FPM Commands
Fpm attribute is eg.
Field Description
Field
Description
The capacity of the flow table
The number of total flow tables.
Active flows num
The number of active flow tables.
event count:65,
The counter for current events.
Fpm attribute is eg
The flow tables are generated based on EG
products.
Platform
Description
N/A
2.13 show ip v6fpm counters
Use this command to displays the counters about the IPv6 packets.
show ip v6fpm counters
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
Use this command to display the counters about the IPv6 packets, including information about packet
loss and flows.
Configuration
The following example displays the counters about the IPv6 packets.
Examples
Ruijie#sh ip v6fpm 1 2 counters
Droped packet counters:
Count
Reason
0
Non-IPv6 packet
0
Err length
0
Fragment packet
0
Err address
0
Invalid TCP flags
0
Invalid TCP sequence
0
Invalid ICMPV6 message type
0
Invalid ICMPV6 initial message type
0
Invalid tcp init flag
0
Invalid tcp flow state
Command Reference
FPM Commands
0
Invalid pkt fid
0
Conn Terminated
0
Out of vfw session limit
0
Out of capability
<end>
Rejected or terminated connection counters:
Count
0
Reason
Out of life time
2105
0
Flow Terminated
Rejected by policy
<end>
Field Description
Platform
Description
Field
Description
count
Packet counters.
Reason
Packet loss reason.
N/A
2.14 show ip v6fpm flows
Use this command to display IPv6 packet flow information.
show ip v6fpm flows
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example displays IPv6 packet flow information.
Examples
Ruijie# show ip v6fpm flows
Pr Saddr
Sport Dport Sedby
Daddr
Recby
Vrf
st
src_if
ctrl_flag
Field Description
Field
Description
Pr
Protocol.
Saddr
Source address.
Daddr
Destination address.
Sport
Source Port.
dst_id
Command Reference
Platform
Description
FPM Commands
Dport
Destination port.
Sedby
The length of received packets in Tx.
Recby
The length of received packets in Rx.
Vrf
The VRF of the destination interface.
st
The current state of flows.
sifx
Source interface.
difx
Destination interface.
ctrl_flag
Flows control flag.
N/A
2.15 show ip v6fpm flows filter
Use this command to display IPv6 packet flow information except specific IPv6 packet flows.
show ip v6fpm flows filter protocol saddr smask daddr dmask
Parameter
Description
Command
Parameter
Description
protocol
Slot ID in the range from 0 to 255.
saddr
Source IPv6 addresses.
smask
Source IPv6 mask in the range from 1 to 128.
daddr
Destination IPv6 addresses.
dmask
Destination IPv6 mask in the range from 1 to 128.
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example displays IPv6 packet flow information except specific IPv6 packet flows.
Examples
Ruijie# show ip v6fpm flows
Pr Saddr
Sport Dport Sedby
Daddr
Recby
Vrf
st
src_if
dst_id
ctrl_flag
Field Description
Field
Description
Pr
Protocol.
Saddr
Source address.
Daddr
Destination address.
Sport
Source Port.
Sport
Destination port.
Sedby
The length of received packets in Tx.
Command Reference
Platform
Description
FPM Commands
Recby
The length of received packets in Rx.
Vrf
The VRF of the destination interface.
st
The current state of flows.
sifx
Source interface.
difx
Destination interface.
ctrl_flag
Flows control flag.
N/A
2.16 show ip v6fpm statistics
Use this command to display IPv6 flow statistics.
show ip v6fpm statistics
Parameter
Description
Command
Parameter
Description
N/A
N/A
Privileged EXEC mode
Mode
Usage Guide
N/A
Configuration
The following example displays IPv6 flow statistics.
Examples
Ruijie# show ip v6fpm statistics
The capacity of the flow table:150016.
Active flows num:109.
event count:65,
Fpmv6 state inspection disable.
Field Description
Platform
Description
Field
Description
The capacity of the flow table
The number of total flow tables.
Active flows num
The number of active flow tables.
event count
The counter for current events.
N/A