Mellanox MLNX-OS® User Manual for Ethernet

Add to my manuals
1041 Pages

advertisement

Mellanox MLNX-OS® User Manual for Ethernet | Manualzz

Mellanox MLNX-OS® User Manual for Ethernet

Rev 4.20

Software Version 3.4.300

2 www.mellanox.com

Rev 4.20

NOTE:

THIS HARDWARE, SOFTWARE OR TEST SUITE PRODUCT (“PRODUCT(S)”) AND ITS RELATED

DOCUMENTATION ARE PROVIDED BY MELLANOX TECHNOLOGIES “AS-IS” WITH ALL FAULTS OF ANY

KIND AND SOLELY FOR THE PURPOSE OF AIDING THE CUSTOMER IN TESTING APPLICATIONS THAT USE

THE PRODUCTS IN DESIGNATED SOLUTIONS. THE CUSTOMER'S MANUFACTURING TEST ENVIRONMENT

HAS NOT MET THE STANDARDS SET BY MELLANOX TECHNOLOGIES TO FULLY QUALIFY THE PRODUCT(S)

AND/OR THE SYSTEM USING IT. THEREFORE, MELLANOX TECHNOLOGIES CANNOT AND DOES NOT

GUARANTEE OR WARRANT THAT THE PRODUCTS WILL OPERATE WITH THE HIGHEST QUALITY. ANY

EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF

MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT ARE DISCLAIMED.

IN NO EVENT SHALL MELLANOX BE LIABLE TO CUSTOMER OR ANY THIRD PARTIES FOR ANY DIRECT,

INDIRECT, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING, BUT NOT

LIMITED TO, PAYMENT FOR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,

OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,

WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY FROM THE USE OF THE PRODUCT(S) AND RELATED DOCUMENTATION EVEN IF

ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

2

Mellanox Technologies

350 Oakmead Parkway Suite 100

Sunnyvale, CA 94085

U.S.A.

www.mellanox.com

Tel: (408) 970-3400

Fax: (408) 970-3403

Mellanox Technologies, Ltd.

Hakidma 26

Ofer Industrial Park

Yokneam 2069200

Israel www.mellanox.com

Tel: +972 (0)74 723 7200

Fax: +972 (0)4 959 3245

© Copyright 2015. Mellanox Technologies. All Rights Reserved.

Mellanox®, Mellanox logo, BridgeX®, ConnectX®, Connect-IB®, CoolBox®, CORE-Direct®, GPUDirect®, InfiniBridge®,

InfiniHost®, InfiniScale®, Kotura®, Kotura logo, Mellanox Connect. Accelerate. Outperform logo, Mellanox Federal

Systems® Mellanox Open Ethernet®, Mellanox Virtual Modular Switch®, MetroX®, MetroDX®, MLNX-OS®, Open

Ethernet logo, PhyX®, ScalableHPC®, SwitchX®, TestX®, The Generation of Open Ethernet logo, UFM®, Virtual Protocol

Interconnect®, Voltaire® and Voltaire logo are registered trademarks of Mellanox Technologies, Ltd.

CyPU™, ExtendX™, FabricIT™, FPGADirect™, HPC-X™, Mellanox Care™, Mellanox CloudX™, Mellanox NEO™,

Mellanox Open Ethernet™, Mellanox PeerDirect™, NVMeDirect™, StPU™, Switch-IB™, Unbreakable-Link™ are trademarks of Mellanox Technologies, Ltd.

All other trademarks are property of their respective owners.

Mellanox Technologies Confidential Document Number: MLNX-15-1560-ETH

Table of Contents

Document Revision History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

About this Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

1.1 System Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

1.2 Ethernet Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

1.3 Gateway Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Chapter 2 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2.1 Configuring the Switch for the First Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2.1.1 Re-Running the Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

2.2 Starting the Command Line (CLI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

2.3 Starting the Web User Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

2.4 Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

2.4.1 Installing MLNX-OS® License (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

2.4.2 Installing MLNX-OS License (Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

2.4.3 Retrieving a Lost License Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

2.4.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Chapter 3 User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.1 Command Line Interface (CLI) Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.1.1 CLI Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.1.2 Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

3.1.3 Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

3.1.4 Prompt and Response Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

3.1.5 Using the “no” Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

3.1.6 Parameter Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.1.7 Command Output Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

3.2 Web Interface Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

3.2.1 Setup Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.2.2 System Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

3.2.3 Security Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

3.2.4 Ports Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

3.2.5 Status Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

3.2.6 ETH Mgmt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

3.2.7 IP Route. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

3.3 Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

3.3.1 Adding a Host and Providing an SSH Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

3.3.2 Retrieving Return Codes when Executing Remote Commands . . . . . . . . . . . . . . 62

3.4 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

3.4.1 CLI Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

3.4.2 Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

3.4.3 SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

3.4.4 Remote Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Mellanox Technologies Confidential 3

Rev 4.20

3.4.5 Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Chapter 4 System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

4.1 Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

4.1.1 Configuring Management Interfaces with Static IP Addresses . . . . . . . . . . . . . 109

4.1.2 Configuring IPv6 Address on the Management Interface. . . . . . . . . . . . . . . . . . 109

4.1.3 Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . . . . . . . . . . . . . . . . 109

4.1.4 Default Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

4.1.5 In-Band Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

4.1.6 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

4.2 NTP, Clock & Time Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

4.2.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

4.3 Software Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

4.3.1 Upgrading MLNX-OS Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

4.3.2 Upgrading MLNX-OS HA Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

4.3.3 Deleting Unused Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

4.3.4 Downgrading MLNX-OS Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

4.3.5 Upgrading System Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

4.3.6 Image Maintenance via Mellanox ONIE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

4.3.7 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

4.4 Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

4.4.1 Saving a Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

4.4.2 Loading a Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

4.4.3 Restoring Factory Default Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

4.4.4 Managing Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

4.4.5 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

4.5 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

4.5.1 Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

4.5.2 Remote Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

4.5.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

4.6 Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

4.6.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

4.7 Event Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

4.7.1 Supported Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

4.7.2 Terminal Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

4.7.3 Email Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

4.7.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

4.8 mDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

4.8.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

4.9 User Management and Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

4.9.1 User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

4.9.2 Authentication, Authorization and Accounting (AAA) . . . . . . . . . . . . . . . . . . . 282

4.9.3 System Secure Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

4.9.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

4.10 Cryptographic (X.509, IPSec) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

4.10.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Mellanox Technologies Confidential 4

Rev 4.20

4.11 Scheduled Jobs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

4.11.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

4.12 Statistics and Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

4.12.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

4.13 Chassis Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

4.13.1 System Health Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

4.13.2 Power Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

4.13.3 Monitoring Environmental Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374

4.13.4 USB Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

4.13.5 System Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

4.13.6 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

4.14 Network Management Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

4.14.1 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

4.14.2 XML API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413

4.14.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414

4.15 Puppet Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

4.15.1 Setting the Puppet Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

4.15.2 Accepting the Switch Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

4.15.3 Installing Modules on the Puppet Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

4.15.4 Writing Configuration Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

4.15.5 Supported Configuration Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433

4.15.6 Supported Resources for Each Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437

4.15.7 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438

4.15.8 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439

4.16 Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446

4.16.1 Virtual Machine Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446

4.16.2 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448

Chapter 5 Ethernet Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

5.1 Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

5.1.1 Break-Out Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

5.1.2 56GbE Link Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

5.1.3 Transceiver Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

5.1.4 High Power Transceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

5.1.5 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477

5.2 Link Aggregation Group (LAG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493

5.2.1 Configuring Static Link Aggregation Group (LAG) . . . . . . . . . . . . . . . . . . . . . 493

5.2.2 Configuring Link Aggregation Control Protocol (LACP) . . . . . . . . . . . . . . . . . 493

5.2.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495

5.3 MLAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

5.3.1 MLAG Keepalive and Failover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

5.3.2 Unicast and Multicast Sync. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

5.3.3 MLAG Port Sync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

5.3.4 MLAG Virtual System-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

5.3.5 Upgrading MLAG Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

5.3.6 MLAG Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516

Mellanox Technologies Confidential 5

Rev 4.20

5.3.7 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

5.4 VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

5.4.1 Configuring Access Mode and Assigning Port VLAN ID (PVID). . . . . . . . . . . 537

5.4.2 Configuring Hybrid Mode and Assigning Port VLAN ID (PVID). . . . . . . . . . . 538

5.4.3 Configuring Trunk Mode VLAN Membership. . . . . . . . . . . . . . . . . . . . . . . . . . 538

5.4.4 Configuring Hybrid Mode VLAN Membership . . . . . . . . . . . . . . . . . . . . . . . . . 539

5.4.5 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540

5.5 QinQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549

5.5.1 QinQ Operation Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549

5.5.2 Configuring QinQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549

5.5.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

5.6 MAC Address Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

5.6.1 Configuring Unicast Static MAC Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

5.6.2 MAC Learning Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

5.6.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554

5.7 Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

5.7.1 Port Priority and Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

5.7.2 Port Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

5.7.3 BPDU Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

5.7.4 BPDU Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

5.7.5 Loop Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

5.7.6 Root Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

5.7.7 MSTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

5.7.8 RPVST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

5.7.9 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565

5.8 OpenFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594

5.8.1 Flow Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594

5.8.2 Configuring OpenFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595

5.8.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596

5.9 IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

5.9.1 Configuring IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

5.9.2 Defining a Multicast Router Port on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . 603

5.9.3 IGMP Snooping Querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605

5.9.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606

5.10 Link Layer Discovery Protocol (LLDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622

5.10.1 Configuring LLDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622

5.10.2 DCBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622

5.10.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624

5.11 Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640

5.11.1 Priority Flow Control and Link Level Flow Control . . . . . . . . . . . . . . . . . . . . . 640

5.11.2 Enhanced Transmission Selection (ETS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641

5.11.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644

5.12 Access Control List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654

5.12.1 Configuring Access Control List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654

5.12.2 ACL Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654

Mellanox Technologies Confidential 6

Rev 4.20

5.12.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656

5.13 Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668

5.13.1 Mirroring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668

5.13.2 Configuring Mirroring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

5.13.3 Verifying Mirroring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673

5.13.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674

5.14 sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683

5.14.1 Flow Samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683

5.14.2 Statistical Samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683

5.14.3 sFlow Datagrams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684

5.14.4 Sampled Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684

5.14.5 Configuring sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684

5.14.6 Verifying sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685

5.14.7 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686

5.15 Transport Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698

5.15.1 RDMA over Converged Ethernet (RoCE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698

5.16 802.1x Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702

5.16.1 802.1x Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702

5.16.2 Configuring 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703

5.16.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704

Chapter 6 IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720

6.1 General. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720

6.1.1 IP Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720

6.1.2 Equal Cost Multi-Path Routing (ECMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723

6.1.3 Virtual Routing and Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724

6.1.4 IPv4 Routing Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725

6.1.5 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726

6.2 IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766

6.2.1 Neighbor Discovery Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766

6.2.2 Configuring IPv6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767

6.2.3 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770

6.3 OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796

6.3.1 Router ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796

6.3.2 ECMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796

6.3.3 Configuring OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797

6.3.4 Verifying OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798

6.3.5 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801

6.4 BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836

6.4.1 State Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836

6.4.2 Configuring BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836

6.4.3 Verifying BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838

6.4.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839

6.4.5 IP AS-Path Access-List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891

6.4.6 IP Community-List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893

6.5 Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 896

Mellanox Technologies Confidential 7

Rev 4.20

6.5.1 Route Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 896

6.5.2 IP Prefix-List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926

6.6 Multicast (IGMP and PIM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929

6.6.1 Basic PIM-SM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929

6.6.2 Bidirectional PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930

6.6.3 PIM Load-Sharing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930

6.6.4 Bootstrap Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931

6.6.5 Configuring Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931

6.6.6 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 934

6.7 VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 976

6.7.1 Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 976

6.7.2 Configuring VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977

6.7.3 Verifying VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 978

6.7.4 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980

6.8 MAGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991

6.8.1 MAGP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991

6.8.2 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993

6.9 DHCP Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999

6.9.1 Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000

Appendix A Enhancing System Security According to NIST SP 800-131A . . . . . . 1008

A.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008

A.2 Web Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008

A.3 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009

A.4 SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009

A.5 HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010

A.6 LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011

A.7 Password Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013

Appendix B Security Vulnerabilities and Exposures . . . . . . . . . . . . . . . . . . . . . . . . . 1014

Appendix C UI Changes in Version 3.4.2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030

C.1 Interface Addressing Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030

C.2 CLI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030

C.3 MIB ifTable Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1031

C.4 WebUI Ports Page Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032

C.5 Interface Speed Configuration Change . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032

C.6 CLI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032

C.7 WebUI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033

C.8 IB SM Link Speed Change. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034

C.9 Multi-ASIC Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1035

C.10 CLI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1035

C.11 MIB entPhysicalTable Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037

C.12 MGMT Module Display Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038

C.13 MLNX-OS Image Name Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039

C.14 CLI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039

C.15 WebUI Status Page Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039

C.16 CPU Module Display Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040

Mellanox Technologies Confidential 8

Rev 4.20

C.17 CLI Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040

C.18 WebUI System Inventory Page Change . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041

Rev 4.20

Mellanox Technologies Confidential 9

List of Tables

Table 1 -Reference Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Table 2 -Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Table 3 -General System Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Table 4 -Ethernet Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Table 5 -Gateway Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Table 6 -Serial Terminal Program Configuration for x86 Based Systems . . . . . . . . . . . . . . 32

Table 7 -Serial Terminal Program Configuration for PPC Based Systems . . . . . . . . . . . . . 32

Table 8 -Configuration Wizard Session - IP Configuration by DHCP . . . . . . . . . . . . . . . . . 33

Table 9 -Configuration Wizard Session - IP Zeroconf Configuration . . . . . . . . . . . . . . . . . 35

Table 10 -Configuration Wizard Session - Static IP Configuration . . . . . . . . . . . . . . . . . . . 36

Table 11 -MLNX-OS Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Table 12 -CLI Modes and Config Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Table 13 -Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Table 14 -Angled Brackets Parameter Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Table 15 -WebUI Setup Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Table 16 -WebUI System Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Table 17 -WebUI Security Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Table 18 -WebUI Ports Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Table 19 -WebUI Status Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Table 20 -WebUI ETH Mgmt Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Table 21 -WebUI IP Route Submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Table 22 -Supported Event Notifications and MIB Mapping . . . . . . . . . . . . . . . . . . . . . . . 257

Table 23 -User Roles (Accounts) and Default Passwords . . . . . . . . . . . . . . . . . . . . . . . . . 282

Table 24 -Chassis Manager Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

Table 25 -System Health Monitor Alerts Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

Table 26 -LWR Configuration Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

Table 27 -Standard MIBs – Textual Conventions and Conformance MIBs . . . . . . . . . . . . 403

Table 28 -Standard MIBs – Chassis and Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

Table 29 -Private MIBs Supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405

Table 30 -SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405

Table 31 -Supported SET OIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

Table 32 -Ethernet, Port-Channel, and InfiniBand Interface Capabilities . . . . . . . . . . . . . 433

Table 33 -VLAN Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

Table 34 -L2 Ethernet and Port-Channel Interface Capabilities . . . . . . . . . . . . . . . . . . . . . 434

Table 35 -LAG Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

Mellanox Technologies Confidential 10

Rev 4.20

Table 36 -L3 Interface Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

Table 37 -OSPF Interface Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

Table 38 -OSPF Area Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

Table 39 -Router OSPF Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

Table 40 -Protocol Enable/Disable Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

Table 41 -Fetched Image Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

Table 42 -Installed Image Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437

Table 43 -Fetched Image Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437

Table 44 -Key for Port Splitting Figure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

Table 45 -Port Splitting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473

Table 46 -Supported VLANs by RPVST per Switch System . . . . . . . . . . . . . . . . . . . . . . 563

Table 47 -Mirroring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669

Table 48 -List of Statistical Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683

Table 49 -Common Vulnerabilities and Exposures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014

Rev 4.20

Mellanox Technologies Confidential 11

List of Figures

Figure 1: Managing an Ethernet Fabric Using MLNX-OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Figure 2: Console Ports SX10xx Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Figure 3: MLNX-OS Login Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Figure 4: EULA Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Figure 5: Welcome Popup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Figure 6: Display After Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Figure 7: No Licenses Installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Figure 8: Enter License Key(s) in Text Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Figure 9: Installed License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Figure 10: WebUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Figure 11: SX65xx Downgrade Attention Sticker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

Figure 12: Accepting an Agent Request through the Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

Figure 13: Break-Out Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

Figure 14: Port Splitting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

Figure 15: Basic MLAG Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

Figure 16: Basic MLAG Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516

Figure 17: MAC Learning Disable Example Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

Figure 18: RPVST Network Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

Figure 19: RPVST and RSTP Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

Figure 20: Overview of Mirroring Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668

Figure 21: Mirror to Analyzer Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668

Figure 22: Header Format Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

Figure 23: Mirroring Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672

Figure 24: sFlow Functionality Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683

Figure 25: RoCEv2 and RoCE Frame Format Differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698

Figure 26: RoCEv2 Protocol Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699

Figure 27: ECMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723

Figure 28: Multiple Hash Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724

Figure 29: IPv6 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767

Figure 30: OSPF Basic Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797

Figure 31: Basic BGP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836

Figure 32: Common VRRP Configuration with Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . 976

Figure 33: 1U MIB ifTable Before Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1031

Figure 34: 1U MIB ifTable After Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1031

Figure 35: Director Switch MIB ifTable Before Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032

Mellanox Technologies Confidential 12

Rev 4.20

Figure 36: Director Switch MIB ifTable After Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032

Figure 37: Ports WebUI Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034

Figure 38: MIB entPhysicalTable Before Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037

Figure 39: MIB entPhysicalTable After Screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038

Figure 40: Status WebUI Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040

Figure 41: System Inventory WebUI Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041

Rev 4.20

Mellanox Technologies Confidential 13

Document Revision History

Rev 4.20 – August 16, 2015

Added:

Section 4.3.6, “Image Maintenance via Mellanox ONIE,” on page 175

Section 4.9.3, “System Secure Mode,” on page 284

• the command

“system secure-mode enable” on page 327

• the command

“show system secure-mode” on page 328

• the command

“switchport dot1q-tunnel qos-mode” on page 545

Section 5.5, “QinQ,” on page 549

• the command

“dot1x host-mode” on page 707

• the command

“show ip route” on page 754

• the command

“vlan-pop” on page 663

• the command

“vlan-push” on page 664

Updated:

Table 8, “Configuration Wizard Session - IP Configuration by DHCP,” on page 33

Section 2.4, “Licenses,” on page 40

• the command

“ssh server host-key” on page 77

• notes of the command

“aaa authorization” on page 300

Table 25, “System Health Monitor Alerts Scenarios,” on page 371

• the command

“show module” on page 389

• the command

“snmp-server user” on page 424

Section 5.1.2, “56GbE Link Speed,” on page 474

• the command

“switchport mode” on page 543

• the command

“ip ospf authentication-key” on page 824

• the command

“neighbor password” on page 866

• the command

“neighbor peer-group” on page 867

Appendix B, “Security Vulnerabilities and Exposures” on page 1014

Rev 4.10 – June 11, 2015

Added:

Section 2.1, “Configuring the Switch for the First Time,” on page 31

with MLNX-OS®

Boot Menu step

• the command

“ssh server security strict” on page 82

• the command

“ssh server tcp-forwarding enable” on page 83

Section 4.1.5, “In-Band Management,” on page 110

This feature can now be enabled with IP Routing. Also updated the flow of setting an in-band management channel.

Mellanox Technologies Confidential 14

Rev 4.20

• the command

“show module” on page 389

Section 5.1.1, “Break-Out Cables,” on page 471

• the command

“ip address dhcp” on page 484

• the command

“ip address dhcp” on page 502

Section 5.3.4, “MLAG Virtual System-MAC,” on page 515

Section 5.3.5, “Upgrading MLAG Pair,” on page 515

Section 5.16, “802.1x Protocol,” on page 702

Section 6.1.3, “Virtual Routing and Forwarding,” on page 724

• the command

“ip l3” on page 726

• the command

“vrf definition” on page 727

• the command

“routing-context vrf” on page 728

• the command

“description” on page 730

• the command

“rd” on page 731

• the command

“vrf forwarding” on page 732

• the command

“show routing-context vrf” on page 734

• the command

“show vrf” on page 735

• the command

“ip address dhcp” on page 740

Section 6.2, “IPv6,” on page 766

commands by adding loopback interface configuration mode to the commands

Section 6.6.3, “PIM Load-Sharing,” on page 930

• the command

“ip pim multipath rp” on page 948

Appendix C,“UI Changes in Version 3.4.2008,” on page 1030

Updated:

• the command

“tcpdump” on page 158

Section 4.3.1, “Upgrading MLNX-OS Software,” on page 166 with HA group note

Section 4.3.2, “Upgrading MLNX-OS HA Groups,” on page 169

• the command

“show inventory” on page 388

• the command

“show asic-version” on page 391

Section 5.3.1, “MLAG Keepalive and Failover,” on page 515

Step 10 in Section 5.3.6, “MLAG Configuration,” on page 516

• the example of the command

“upgrade-timeout” on page 531

• the command

“ip routing” on page 729

• the command

“show ip routing” on page 733

• the command

“show ip interface” on page 747

• the command

“interface loopback” on page 748 “id” parameter range

• the command

“ip route” on page 752

• the command

“show ip route” on page 754

• the command

“clear ip arp” on page 759

Mellanox Technologies Confidential 15

Rev 4.20

• the command

“show ip arp” on page 760

• the command

“ping” on page 761

• the command

“traceroute” on page 762

• the command

“tcpdump” on page 764

Removed:

• the command “interface vlan create” from

Section 4.1.6, “Commands,” on page 112

• the command “ipv6 dhcp client”

• Section B.9, “Security Vulnerabilities and Exposures,” on page 1330 and added it to the

RN

Split:

• the command “ipv6 dhcp”

Rev 3.70 – March 19, 2015

Updated:

• the command “speed” on page 1065

• the command “show interfaces ib” on page 1071

• the command “show interfaces ib status” on page 1072

Rev 3.70 – March 19, 2015

No changes

Rev 3.60 – March 05, 2015

Added:

• MLAG configuration

Step 10

• the command

“system-mac” on page 530

• the command

“upgrade-timeout” on page 531

Section 5.7.4, “BPDU Guard,” on page 561

Updated:

• MLAG configuration verification

Step 1

with system MAC and upgrade timeout

• the command

“show mlag” on page 532

Table 46, “Supported VLANs by RPVST per Switch System,” on page 563

Rev 3.60 – March 05, 2015

No changes

Rev 3.50 – February 24, 2015

Added:

• the command

“show version concise” on page 385

Mellanox Technologies Confidential 16

Rev 4.20

Updated:

• the command

“show uboot” on page 386

Rev 3.40 – February 11, 2015

Added:

• “List of Tables” and “List of Figures” Sections

Updated Section 2.4, “Licenses,” on page 40

• the command

“license delete” on page 47

• the command

“license install” on page 48

• the command

“telnet” on page 91

• the command

“terminal” on page 68

• the command

“web cache-enable” on page 95

• the command

“ip default-gateway” on page 114

• the command

“boot system” on page 179

• the command

“configuration write” on page 214

• the command

“logging trap” on page 234

• the command

“email autosupport enable” on page 261

• the command

“email autosupport event” on page 262

• the command

“crypto ipsec ike” on page 330

• the command

“lacp-individual enable” on page 501

• the command

“show interfaces port-channel” on page 509

• the command

“show interfaces port-channel compatibility-parameters” on page 510

• the command

“show interfaces port-channel load-balance” on page 511

• the command

“show interfaces port-channel summary” on page 512

Section 5.7.8, “RPVST,” on page 562

• the command

“spanning-tree vlan forward-time” on page 584

• the command

“spanning-tree vlan hello-time” on page 585

• the command

“spanning-tree vlan max-age” on page 586

• the command

“spanning-tree vlan priority” on page 587

• the command

“show spanning-tree vlan” on page 593

Section 6.2, “IPv6,” on page 766

• the command

“auto-cost reference-bandwidth” on page 805

• the command “show ip multicast interface proxy-arp” on page 1326

Updated:

Section 2.3, “Starting the Web User Interface,” on page 38

• the command

“image options” on page 185

• the command

“reload” on page 195

Mellanox Technologies Confidential 17

Rev 4.20

Section 4.5.2, “Remote Logging,” on page 218

• the command

“logging debug-files” on page 221

Section 4.6.1, “Commands,” on page 238

Section 4.9.1, “User Accounts,” on page 282

• the command

“username” on page 286

• the command

“aaa authentication attempts track” on page 293

• the command

“radius-server host” on page 305

• the command

“tacacs-server host” on page 309

Table 25, “System Health Monitor Alerts Scenarios,” on page 371

• the command

“snmp-server auto-refresh” on page 414

• the command

“snmp-server user” on page 424

• the command

“show interfaces ethernet [<inf>] description” on page 489

• the command

“show interfaces ethernet [<inf>] status” on page 490

• the command

“show interfaces port-channel summary” on page 512

• the command

“show interfaces mlag-port-channel summary” on page 535

• the command

“spanning-tree mode” on page 566

• the command

“show spanning-tree” on page 588

• the command

“show spanning-tree detail” on page 589

• the command

“show spanning-tree interface” on page 590

• the command

“show spanning-tree mst” on page 591

• the command

“show spanning-tree root” on page 592

Section 5.9.2, “Defining a Multicast Router Port on a VLAN,” on page 603

• the command

“dcb application-priority” on page 631

• the command

“dcb priority-flow-control enable” on page 650

Section 5.14.1, “Flow Samples,” on page 683

• the command

“ip arp timeout” on page 758

• the command

“redistribute” on page 807

Rev 3.30 – November 19, 2014

Added:

Section 5.1.4, “High Power Transceivers,” on page 476

Updated:

the command “web https” on page 102

the command “show interfaces ethernet” on page 486

the command “show interfaces ethernet [<inf>] transceiver” on page 491

• the command

“dcb application-priority” on page 631

Section A.5, “HTTPS,” on page 1010

Section A.7, “Password Hashing,” on page 1013

Mellanox Technologies Confidential 18

Rev 4.20

Rev 3.20 – November 09, 2014

Added:

Section 4.16, “Virtual Machine,” on page 446

Section 5.6.2, “MAC Learning Considerations,” on page 553

• the command

“mac-learning disable” on page 556

Section 6.1.4, “IPv4 Routing Mode,” on page 725

Appendix A,“Enhancing System Security According to NIST SP 800-131A,” on page

1008

Updated:

Section 1.2, “Ethernet Features,” on page 29

Section 3.2, “Web Interface Overview,” on page 56

• the command

“reset factory” on page 196

Section 4.14.1.7, “SNMP SET Operations,” on page 408

• the command

“interface port-channel” on page 495

• the command

“show lacp interfaces neighbor” on page 505

Section 5.3, “MLAG,” on page 513

the command “mlag-channel-group mode” on page 527

the command “show mlag statistics” on page 536

• the command

“ip icmp redirect” on page 746

Section 6.4, “BGP,” on page 836

Section 6.7.2, “Configuring VRRP,” on page 977

Replaced:

• the command “show lacp interfaces port-channel” with the command

“show lacp” on page 507

the command “show lacp system-identifier” with the command “show lacp interfaces system-identifier” on page 508

Rev 3.10 – July 20, 2014

Added:

Section 5.15, “Transport Applications,” on page 698

Section 6.1.1, “IP Interfaces,” on page 720

Section 6.4, “BGP,” on page 836

• the command

“show ip pim upstream joins” on page 957

Updated:

Chapter 1, “Introduction” on page 28

Section 4.14.1.8, “IF-MIB and Interface Information,” on page 412

Section 4.14.2, “XML API,” on page 413

• MAC addresses note in

Section 5.3, “MLAG,” on page 513

Mellanox Technologies Confidential 19

Rev 4.20

Chapter 6, “IP Routing” on page 720

with the appropriate configuration modes for the new configuration contexts and commands added

• the command

“route-map” on page 897

• the command

“continue <sequence-number>” on page 898

• the command

“abort” on page 899

• the command

“exit” on page 900

Section 6.6, “Multicast (IGMP and PIM),” on page 929

• the command

“ip pim join-prune-interval” on page 945

• the command

“show ip pim bsr” on page 951

• the command

“show ip mroute” on page 961

Rev 3.00 – June 05, 2014

Updated:

Section 6.6, “Multicast (IGMP and PIM),” on page 929

Section 6.7.3, “Verifying VRRP,” on page 978

Rev 2.90 – 19 May, 2014

Added:

Section 6.6, “Multicast (IGMP and PIM),” on page 929

Updated:

• the command

“show configuration” on page 216

• the command

“show uboot” on page 386

• the command

“show voltage” on page 395

Section 5.3, “MLAG,” on page 513

• the command

“show mlag” on page 532

Section 6.1.5.2, “IP Interfaces,” on page 736

Section 6.1.5.4, “Loopback Interface,” on page 748

Rev 2.80 – May 08, 2014

Added:

supported versions note in Section 5.9, “IGMP Snooping,” on page 603

Section 6.7, “VRRP,” on page 976

Section 6.8, “MAGP,” on page 991

Section 6.9, “DHCP Relay,” on page 999

Rev 2.70 – April 30, 2014

Added:

Appendix A,“Enhancing System Security According to NIST SP 800-131A,” on page

1008

Mellanox Technologies Confidential 20

Rev 4.20

supported versions note in Section 5.9, “IGMP Snooping,” on page 603

Updated:

• the command

“show ssh server” on page 90

• the command

“web auto-logout” on page 94

• the command

“web https” on page 102

• the command

“show web” on page 108

• the command

“show usernames” on page 288

• the command

“ldap base-dn” on page 312

• the command

“ldap ssl” on page 322

Rev 2.60 – April 10, 2014

Updated:

Table 29, “Private MIBs Supported,” on page 405

Rev 2.50 – April 2014

Updated:

Section 3.1.7, “Command Output Filtering,” on page 55

• the command

“show protocols” on page 401

• the command

“show mac-address-table” on page 558

• the command

“deny/permit (MAC ACL rule)” on page 658

• the command

“show mac/ipv4 access-lists” on page 666

Added:

Section 5.3, “MLAG,” on page 513

• configuration mode Config Interface MLAG Port Channel to the following commands:

“flowcontrol” on page 478

“mtu” on page 479

“shutdown” on page 480

“description” on page 481

“speed” on page 482

“load-interval” on page 483

“clear counters” on page 485

“switchport mode” on page 543

“switchport access” on page 546

“spanning-tree port-priority” on page 570

“spanning-tree cost” on page 571

“spanning-tree port type” on page 572

“spanning-tree guard” on page 573

“ip igmp snooping fast-leave” on page 609

Mellanox Technologies Confidential 21

Rev 4.20

“dcb priority-flow-control mode on” on page 652

“ipv4/mac port access-group” on page 657

“sflow enable (interface)” on page 696

Rev 2.40 – February, 2014

Updated:

Section 4.3.5.2, “Importing Firmware and Changing the Default Firmware,” on page 174

– updated Step 1

• the command

“show running-config” on page 217

• the command

“show log” on page 236

Section 4.10, “Cryptographic (X.509, IPSec),” on page 329

Section 5.2.1, “Configuring Static Link Aggregation Group (LAG),” on page 493 –

removed unnecessary step

• the command

“lldp tlv-select” on page 630

• the command

“show lldp interface” on page 633

Added:

Section 3.1.7, “Command Output Filtering,” on page 55

FCoE and SX1700 GW license in Section 2.4, “Licenses,” on page 40

Section 4.14.1.8, “IF-MIB and Interface Information,” on page 412

Rev 2.30 – January, 2014

Updated:

Section 4.15.4, “Writing Configuration Classes,” on page 431

• the command

“crypto certificate generation” on page 335

• the command

“crypto certificate name” on page 336

Rev 2.20 – January, 2014

Updated:

Section 4.15.5.11, “Installed Image Capabilities,” on page 437

Rev 2.10 – January, 2014

Added:

Section 4.13.2.1, “Width Reduction Power Saving,” on page 372

Updated:

Section 2.2, “Starting the Command Line (CLI),” on page 37

Section 2.3, “Starting the Web User Interface,” on page 38

Section 4.3.1, “Upgrading MLNX-OS Software,” on page 166 with EULA note

Section 4.15, “Puppet Agent,” on page 430

• the command

“load-interval” on page 483

with Config Interface Port Channel

Mellanox Technologies Confidential 22

Rev 4.20

• the command

“spanning-tree port-priority” on page 570

with Config Interface Port

Channel

Section 5.8, “OpenFlow,” on page 594

• the command

“openflow description” on page 597

• the command

“show openflow” on page 602

• the command

“switchport {hybrid, trunk} allowed-vlan” on page 547

with Config

Interface Port Channel

• the command

“spanning-tree cost” on page 571

with Config Interface Port Channel

• the command

“spanning-tree port type” on page 572

with Config Interface Port Channel

• the command

“spanning-tree guard” on page 573

with Config Interface Port Channel

• the command

“spanning-tree bpdufilter” on page 574

with Config Interface Port Channel

• the command

“deny/permit (IPv4 ACL rule)” on page 659

• the command

“sflow enable (interface)” on page 696

with Config Interface Port Channel

Section 6.3, “OSPF,” on page 796

• the command

“router-id” on page 803

Rev 2.00 – December 2013

Added:

Section 5.1.3, “Transceiver Information,” on page 476

• the command

“run-interval” on page 442

Updated:

Section 4.3.1, “Upgrading MLNX-OS Software,” on page 166

Section 4.3.3, “Deleting Unused Images,” on page 170

Section 4.6, “Debugging,” on page 237

the example of the command “show cpld” on page 387

• “Notification Indicator” column in Section 8.3.2, “Standalone Proxy-ARP Configuration,” on page 1271

• the command

“show puppet-agent” on page 444

• the command

“lldp tlv-select” on page 630

Moved:

Section 3.3, “Secure Shell (SSH),” on page 62

from 4.13.2

Removed:

• mention of the MLNX-OS Command Reference Guide

• the command “lldp tlv-select dcbx”

Rev 4.20

Mellanox Technologies Confidential 23

Rev 1.90 – November 2013

Added Appendix A,“MEX6200 System,” on page 1329

Rev 1.80 – October 2013

Added:

Section 4.15, “Puppet Agent,” on page 430

Section 5.7.7, “MSTP,” on page 562

Section 5.8, “OpenFlow,” on page 594

Section 5.9.3, “IGMP Snooping Querier,” on page 605

• the command

“ip igmp snooping querier”

• the command

“igmp snooping querier query-interval”

• the command

“show ip igmp snooping querier”

Section 5.10.2, “DCBX,” on page 622

• the command “lldp tlv-select dcbx”

• the command

“dcb application-priority”

• the command

“show dcb application-priority”

Updated:

• the command

“show lldp interface”

• the command

“show lldp interfaces ethernet <inf> remote”

Rev 1.7.0 – October 2013

Merged “MLNX-OS Command Reference Guide” Rev. 1.6.9 and “MLNX-OS User Manual”

Rev. 1.6.9.

Rev 4.20

Mellanox Technologies Confidential 24

Rev 4.20

About this Manual

This manual provides general information concerning the scope and organization of this User’s

Manual.

Intended Audience

This manual is intended for network administrators who are responsible for configuring and managing Mellanox Technologies’ SwitchX based Switch Platforms.

Related Documentation

The following table lists the documents referenced in this User’s Manual.

Table 1 - Reference Documents

Document Name

InfiniBand Architecture Specification, Vol. 1,

Release 1.2.1

Director switch Installation Guide

System Hardware User Manual

Switch Product Release Notes

Mellanox Virtual Modular Switch

Reference Guide

Configuring Mellanox Hardware for VPI

Operation Application Note

Description

The InfiniBand Architecture Specification that is provided by IBTA.

Each Mellanox Technologies' switch platform is shipped with an Installation Guide document to bring-up and initialize the switch platform.

This document contains hardware descriptions, LED assignments and hardware specifications among other things.

Please look up the relevant SwitchX®-based switch system/series release note file

This reference architecture provides general information concerning Mellanox L2 and L3 Virtual Modular

Switch (VMS) configuration and design.

This manual provides information on basic configuration of the converged VPI networks.

All of these documents can be found on the Mellanox website. They are available either through the product pages or through the support page with a login and password.

Glossary

Table 2 - Glossary

AAA

ARP

Authentication, Authorization, and Accounting.

Authentication - verifies user credentials (username and password).

Authorization - grants or refuses privileges to a user/client for accessing specific services.

Accounting - tracks network resources consumption by users.

Address Resolution Protocol. A protocol that translates IP addresses into

MAC addresses for communication over a local area network (LAN).

Mellanox Technologies Confidential 25

Rev 4.20

Table 2 - Glossary

CLI

DCB

DCBX

DHCP

DNS

ETS

FTP/TFTP/sFTP

Command Line Interface. A user interface in which you type commands at the prompt

Data Center Bridging

DCBX protocol is an extension of the Link Layer Discovery Protocol

(LLDP). DCBX end points exchange request and acknowledgment messages.

For flexibility, parameters are coded in a type-length-value (TLV) format.

The Dynamic Host Configuration Protocol (DHCP) is an automatic configuration protocol used on IP networks.

Domain Name System. A hierarchical naming system for devices in a computer network

ETS provides a common management framework for assignment of bandwidth to traffic classes.

File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet.

Gateway

HA (High Availability)

Host

LACP

LDAP

A network node that interfaces with another network using a different network protocol

A system design protocol that provides redundancy of system components, thus enables overcoming single or multiple failures in minimal downtime

A computer platform executing an Operating System which may control one or more network adapters

Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel.

LACP allows a network device to negotiate an automatic bundling of links by sending LACP packets to the peer (directly connected device that also implements LACP).

The Lightweight Directory Access Protocol is an application protocol for reading and editing directories over an IP network.

MAC

MTU (Maximum Transfer Unit) The maximum size of a packet payload (not including headers) that can be sent /received from a port

Network Adapter A hardware device that allows for communication between computers in a network

PFC/FC

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet.

RADIUS

Priority Based Flow Control applies pause functionality to traffic classes OR classes of service on the Ethernet link.

Remote Authentication Dial In User Service. A networking protocol that enables AAA centralized management for computers to connect and use a network service.

Mellanox Technologies Confidential 26

Rev 4.20

Table 2 - Glossary

RDMA (Remote Direct Memory

Access)

RSTP

Accessing memory in a remote side without involvement of the remote CPU

SA (Subnet Administrator)

SCP

SNMP

NTP

SSH syslog

TACACS+

XML Gateway

Rapid Spanning Tree Protocol. A spanning-tree protocol used to prevent loops in bridge configurations. RSTP is not aware of VLANs and blocks ports at the physical level.

The interface for querying and manipulating subnet management data

Secure Copy or SCP is a means of securely transferring computer files between a local and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.

Simple Network Management Protocol. A network protocol for the management of a network and the monitoring of network devices and their functions

Network Time Protocol. A protocol for synchronizing computer clocks in a network

Secure Shell. A protocol (program) for securely logging in to and running programs on remote machines across a network. The program authenticates access to the remote machine and encrypts the transferred information through the connection.

A standard for forwarding log messages in an IP network

Terminal Access Controller Access-Control System Plus. A networking protocol that enables access to a network of devices via one or more centralized servers. TACACS+ provides separate AAA services.

Extensible Markup Language Gateway. Provides an XML request-response protocol for setting and retrieving HW management information.

Mellanox Technologies Confidential 27

1 Introduction

Mellanox® Operating System (MLNX-OS®) enables the management and configuration of Mellanox Technologies’ SwitchX® Family silicon based switch platforms. MLNX-OS supports the

Virtual Protocol Interconnect (VPI) technology which enables it to be used for both Ethernet and

InfiniBand technology providing the user with greater flexibility.

MLNX-OS provides a full suite of management options, including support for SNMPv1, 2, 3, and web user interface (WebUI). In addition, it incorporates a familiar industry-standard CLI, which enables administrators to easily configure and manage the system.

1.1

System Features

Table 3 - General System Features

Feature

Software Management

File management

Logging

Management Interface

Chassis Management

Network Management

Interfaces

Security

Date and Time

Cables & Transceivers

Unbreakable links

Virtual Port Interconnect®

(VPI)

Description

• Dual software image

• Software and firmware updates

• FTP

• TFTP

• SCP

• Event history log

• SysLog support

• DHCP/Zeroconf

• IPv6

• Monitoring environmental controls

• Power management

• Auto-temperature control

• High availability

• SNMP v1,v2c,v3

• interfaces (XML Gateway)

• Puppet Agent

• SSH

• Telnet

• RADIUS

• TACACS+

• NTP

• Transceiver info

• LLR

• Ethernet

• InfiniBand

Rev 4.20

Mellanox Technologies Confidential 28

1.2

Ethernet Features

Table 4 - Ethernet Features

Feature

General

Ethernet support

IP routing

Description

• ACL – 24K rules (permit/deny)

• Breakout cables

• Jumbo Frames (9K)

• 48K Unicast MAC addresses

• DCBX

• DHCP Relay

• ETS (802.1Qaz)

• Flow control (802.3x)

• IGMP snooping v1,2

• LAG/LACP (802.3ad), 16 links per LAG (64 LAGs)

• LLDP

• MLAG

• MSTP

• OpenFlow

• PFC (802.1Qbb)

• Rapid Spanning Tree (802.1w)

• sFlow

• VLAN (802.1Q) - 4K

• BGP

• DHCP Relay

• ECMP

• IGMP

• IPv4

• IPv6

• OSPF

• PIM

• VLAN interface

• Loopback interface

• Router interface

• VRRP

1.3

Gateway Features

Table 5 - Gateway Features

Proxy-ARP

Feature Description

• Proxy-ARP interface

• Unicast

• Multicast

• High availability Proxy-ARP

Rev 4.20

Mellanox Technologies Confidential 29

Figure 1: Managing an Ethernet Fabric Using MLNX-OS

Rev 4.20

Mellanox Technologies Confidential 30

Rev 4.20

2 Getting Started

The procedures described in this chapter assume that you have already installed and powered on your switch according to the instructions in the Hardware Installation Guide, which was shipped with the product.

2.1

Configuring the Switch for the First Time

To configure the switch:

Step 1.

Connect the host PC to the console (RJ-45) port of the switch system using the supplied cable.

The console ports for systems are shown below.

Figure 2: Console Ports SX10xx Systems

Make sure to connect to the console RJ-45 port of the switch and not to the MGT port.

DHCP is enabled by default over the MGT port. Therefore, if you have configured your DHCP server and connected an RJ-45 cable to the MGT port, simply log in using the designated IP address.

Step 2.

Configure a serial terminal with the settings described below.

This step may be skipped if the DHCP option is used and an IP is already configured for the MGT port.

Mellanox Technologies Confidential 31

Rev 4.20

Table 6 - Serial Terminal Program Configuration for PPC Based Systems

Setting Parameter

Baud Rate

Data bits

Stop bits

Parity

Flow Control

9600

8

1

None

None

Table 7 - Serial Terminal Program Configuration for x86 Based Systems

Setting Parameter

Baud Rate

Data bits

Stop bits

Parity

Flow Control

115200

8

1

None

None

Step 3.

You are prompted with the boot menu.

Mellanox MLNX-OS Boot Menu:

1: <image #1>

2: <image #2>

u: USB menu (if USB device is connected) (password required)

c: Command prompt (password required)

Choice:

Step 4.

Step 5.

Select “1” to boot with software version installed on partition #1.

Select “2” to boot with software version installed on partition #2.

Selecting “u” is not currently supported.

Select “c” to proceed to advanced booting options – available to Mellanox Support only.

The MLNX-OS Boot Menu features a countdown timer. It is recommended to allow the timer to run out by not selecting any of the options.

Login as admin and use admin as password.

If the machine is still initializing, you might not be able to access the CLI until initialization completes. As an indication that initialization is ongoing, a countdown of the number of remaining modules to be configured is displayed in the following format: “<no. of modules>

Modules are being configured”.

Go through the Mellanox configuration wizard.

Mellanox Technologies Confidential 32

The following table shows an example of a wizard session.

Table 8 - Configuration Wizard Session - IP Configuration by DHCP (Sheet 1 of 2)

Wizard Session Display (Example) Comments

Mellanox configuration wizard

Do you want to use the wizard for initial configuration? yes

Step1: Hostname? [switch-1]

You must perform this configuration the first time you operate the switch or after resetting the switch to the factory defaults. Type “y” and then press <Enter>.

If you wish to accept the default hostname, then press <Enter>. Otherwise, type a different hostname and press <Enter>.

Step 2: Use DHCP on mgmt0 interface? [yes] Perform this step to obtain an IP address for the switch. (mgmt0 is the management port of the switch.)

If you wish the DHCP server to assign the IP address, type “yes” and press <Enter>.

Step 3: Enable IPv6 [yes]

If you type “no” (no DHCP), then you will be asked whether you wish to use the “zeroconf” configuration or not. If you enter “yes” (yes

Zeroconf), the session will continue as shown in

Table 9

.

If you enter “no” (no Zeroconf), then you need to enter a static IP, and the session will continue as shown in

Table 10

.

Perform this step to enable IPv6 on management ports.

Step 4: Enable IPv6 autoconfig (SLAAC) on mgmt0 interface

If you wish to enable IPv6, type “yes” and press <Enter>.

If you enter “no” (no IPv6), then you will automatically be referred to Step 5.

Perform this step to enable StateLess address autoconfig on external management port.

If you wish to enable it, type “yes” and press

<Enter>.

Step 5: Use DHCPv6 on mgmt0 interface?

[yes]

Step 5: Admin password (Press <Enter> to leave unchanged)? <new_password>

Step 4: Confirm admin password? <new_password>

If you wish to disable it, enter “no”.

Perform this step to enable DHCPv6 on the

MGMT0 interface.

To avoid illegal access to the machine, please type a password and then press <Enter>. Then confirm the password by re-entering it.

Note that password characters are not printed.

Mellanox Technologies Confidential 33

Rev 4.20

Table 8 - Configuration Wizard Session - IP Configuration by DHCP (Sheet 2 of 2)

Wizard Session Display (Example) Comments

You have entered the following information:

1. Hostname: <switch name>

2. Use DHCP on mgmt0 interface: yes

3. Enable IPv6: yes

4. Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes

5. Enable DHCPv6 on mgmt0 interface: no

6. Admin password (Enter to leave unchanged):

(CHANGED)

The wizard displays a summary of your choices and then asks you to confirm the choices or to re-edit them.

Either press <Enter> to save changes and exit, or enter the configuration step number that you wish to return to.

To change an answer, enter the step number to return to.

Otherwise hit <enter> to save changes and exit.

Note:

To run the command “configuration jumpstart” you must be in Config mode.

Choice: <Enter>

Configuration changes saved.

To return to the wizard from the CLI, enter the

“configuration jump-start” command from configuration mode. Launching CLI...

<switch name> [standalone: master] >

Rev 4.20

Mellanox Technologies Confidential 34

Table 9 - Configuration Wizard Session - IP Zeroconf Configuration

Wizard Session Display - IP Zeroconf Configuration (Example)

Mellanox configuration wizard

Do you want to use the wizard for initial configuration? y

Step 1: Hostname? [switch-112126]

Step 2: Use DHCP on mgmt0 interface? [no]

Step 3: Use zeroconf on mgmt0 interface? [no] yes

Step 4: Default gateway? [192.168.10.1]

Step 5: Primary DNS server?

Step 6: Domain name?

Step 7: Enable IPv6? [yes] yes

Step 8: Enable IPv6 autoconfig (SLAAC) on mgmt0 interface? [no] no

Step 9: Admin password (Enter to leave unchanged)?

You have entered the following information:

1. Hostname: switch-112126

2. Use DHCP on mgmt0 interface: no

3. Use zeroconf on mgmt0 interface: yes

4. Default gateway: 192.168.10.1

5. Primary DNS server:

6. Domain name:

7. Enable IPv6: yes

8. Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes

9. Admin password (Enter to leave unchanged): (unchanged)

To change an answer, enter the step number to return to.

Otherwise hit <enter> to save changes and exit.

Choice:

Configuration changes saved.

To return to the wizard from the CLI, enter the “configuration jump-start” command from configure mode. Launching CLI...

<switch name> [standalone: master] >

Rev 4.20

Mellanox Technologies Confidential 35

Table 10 - Configuration Wizard Session - Static IP Configuration

Wizard Session Display - Static IP Configuration (Example)

Mellanox configuration wizard

Do you want to use the wizard for initial configuration? y

Step 1: Hostname? [switch-112126]

Step 2: Use DHCP on mgmt0 interface? [yes] n

Step 3: Use zeroconf on mgmt0 interface? [no]

Step 4: Primary IP address? 192.168.10.4

Mask length may not be zero if address is not zero (interface mgmt0)

Step 5: Netmask? [0.0.0.0] 255.255.255.0

Step 6: Default gateway? 192.168.10.1

Step 7: Primary DNS server?

Step 8: Domain name?

Step 9: Enable IPv6? [yes] yes

Step 10: Enable IPv6 autoconfig (SLAAC) on mgmt0 interface? [no] no

Step 11: Admin password (Enter to leave unchanged)?

You have entered the following information:

1. Hostname: switch-112126

2. Use DHCP on mgmt0 interface: no

3. Use zeroconf on mgmt0 interface: no

4. Primary IP address: 192.168.10.4

5. Netmask: 255.255.255.0

6. Default gateway: 192.168.10.1

7. Primary DNS server:

8. Domain name:

9. Enable IPv6: yes

10. Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: no

11. Admin password (Enter to leave unchanged): (unchanged)

To change an answer, enter the step number to return to.

Otherwise hit <enter> to save changes and exit.

Choice:

Configuration changes saved.

To return to the wizard from the CLI, enter the “configuration jump-start” command from configure mode. Launching CLI...

<switch name>[standalone: master] >

Mellanox Technologies Confidential 36

Rev 4.20

Rev 4.20

Step 6.

Check the mgmt0 interface configuration before attempting a remote (for example, SSH) connection to the switch. Specifically, verify the existence of an IP address.

switch # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 169.254.15.134

Netmask: 255.255.0.0

IPv6 enabled: yes

Autoconf enabled: yes

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe11:a1b2/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface source: physical

MTU: 1500

HW address: 00:02:C9:11:A1:B2

Comment:

RX bytes: 11700449 TX bytes: 15139846

RX packets: 55753 TX packets: 28452

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000

2.1.1

Re-Running the Wizard

To rerun the wizard:

Step 1.

Enter the config mode.

switch > enable switch # config terminal

Step 2.

Rerun the wizard.

switch (config) # configuration jump-start

2.2

Starting the Command Line (CLI)

Step 1.

Step 2.

Step 3.

Step 4.

Set up an Ethernet connection between the switch and a local network machine using a standard RJ-45 connector.

Start a remote secured shell (SSH) to the switch using the command “ssh -l <username>

<switch ip address>.” rem_mach1 > ssh -l <username> <ip address>

Login to the switch (default username is admin, password admin)

Read and accept the EULA when prompted.

Mellanox Technologies Confidential 37

Rev 4.20

Step 5.

Once you get the prompt, you are ready to use the system.

Mellanox MLNX-OS Switch Management

Password:

Last login: <time> from <ip-address>

Mellanox Switch

Please read and accept the Mellanox End User License Agreement located at: http://www.mellanox.com/related-docs/prod_management_software/MLNX-OS_EULA.pdf

switch >

2.3

Starting the Web User Interface

To start a WebUI connection to the switch platform:

Step 1.

Step 2.

Set up an Ethernet connection between the switch and a local network machine using a standard RJ-45 connector.

Open a web browser – Firefox 12, Chrome 18, IE 8, Safari 5 or higher.

Note: Make sure the screen resolution is set to 1024*768 or higher.

Step 3.

Step 4.

Type in the IP address of the switch or its DNS name in the format: http://<switch_IP_address>.

Login to the switch (default user name is admin, password admin).

Figure 3: MLNX-OS Login Window

Mellanox Technologies Confidential 38

Step 5.

Read and accept the EULA if prompted.

You are only prompted if you have not accessed the switch via CLI before.

Figure 4: EULA Prompt

Rev 4.20

Step 6.

The Welcome popup appears. After reading through the content, click OK to continue.

You may click on the links under Documentation to reach the MLNX-OS documentation.

The link under What’s New takes you straight to the RN Changes and New Features section.

Figure 5: Welcome Popup

Mellanox Technologies Confidential 39

Rev 4.20

Step 7.

You may also tick the box to not show this popup again. But should you wish to see this window again, click “Product Documents” on the upper right corner of the WebUI.

A default status summary is displayed as shown in

Figure 6

.

Figure 6: Display After Login

2.4

Licenses

Gateway is not supported in MLNX-OS® release 3.4.1110.

MLNX-OS software package can be extended with premium features. Installing a license allows you to access the specified premium features.

This section is relevant only to switch systems with an internal management capability.

The following licenses are offered with MLNX-OS software:

Table 11 - MLNX-OS Licenses

OPN

UPGR-6012-GW

UPGR-1012-GW

Valid on Product

SX6012

SX1012

Description

Ethernet L2/L3, Gateway

InfiniBand, Ethernet L3, Gateway

Mellanox Technologies Confidential 40

Rev 4.20

Table 11 - MLNX-OS Licenses

OPN Valid on Product Description

UPGR-6018-GW

UPGR-6036-GW

UPGR-1036-GW

SX6018

SX6036

SX1036

UPGR-1710-GW

UPGR-6710-GW

SX1710

SX6710

LIC-fabric-inspector SX6036F/T; 6012F/T;

6018F/T; SX65xx

UPGR-xxxx-FCOE-J All systems supporting Ethernet directly or via license.

Ethernet L2/L3, Gateway

Ethernet L2/L3, Gateway

InfiniBand, Ethernet L3, Gateway

InfiniBand, Ethernet L3, Gateway

InfiniBand, Ethernet L3, Gateway

InfiniBand fabric inspector monitoring and health

Enables FCoE protocol

2.4.1

Installing MLNX-OS® License (CLI)

To install an MLNX-OS license via CLI:

Step 1.

Login as admin and change to Config mode.

switch > enable switch # config terminal

Step 2.

Step 3.

Step 4.

Install the license using the key. Run: switch (config) # license install <license key>

Display the installed license(s) using the following command.

switch (config) # show licenses

License 1: <license key>

Feature: EFM_SX

Valid: yes

Active: yes switch (config) #

Make sure that the “Valid” and “Active” fields both indicate “yes”.

Save the configuration to complete the license installation. Run: switch (config) # configuration write

If you do not save the installation session, you will lose the license at the next system start up.

2.4.2

Installing MLNX-OS License (Web)

To install an MLNX-OS license via WebUI:

Step 1.

Log in as admin.

Mellanox Technologies Confidential 41

Step 2.

Click the Setup tab and then Licensing on the left side navigation pane.

Figure 7: No Licenses Installed

Rev 4.20

Step 3.

Enter your license key(s) in the text box. If you have more than one license, please enter each license in a separate line. Click “Add Licenses” after entering the last license key to install them.

If you wish to add another license key in the future, you can simply enter it in the text box and click “Add Licenses” to install it.

Mellanox Technologies Confidential 42

Figure 8: Enter License Key(s) in Text Box

Rev 4.20

All installed licenses should now be displayed.

Figure 9: Installed License

Mellanox Technologies Confidential 43

Step 4.

Save the configuration to complete the license installation.

If you do not save the installation session, you will lose the installed licenses at the next system boot.

Rev 4.20

2.4.3

Retrieving a Lost License Key

In case of a lost MLNX-OS® license key, contact your authorized Mellanox reseller and provide the switch’s chassis serial number.

To obtain the switch’s chassis serial number:

Step 1.

Step 2.

Login to the switch.

Retrieve the switch’s chassis serial number using the command “show inventory”.

switch (config) # show inventory

================================================================================

Module Type Part number Serial Number

Step 3.

Step 4.

================================================================================

CHASSIS SX1035 MSX6036F-1BFR MT1121X02692

MGMT SX1035 MSX6036F-1BFR MT1121X02692

FAN SXX0XX_FAN MSX60-FF MT1121X02722

PS1 SXX0XX_PS N/A N/A switch (config) #

Send your Mellanox reseller the following information to obtain the license key:

• The chassis serial number

The type of license you need to retrieve. Refer to “Licenses” on page 40.

Once you receive the license key, you can install the license as described in the sections above.

Mellanox Technologies Confidential 44

Rev 4.20

2.4.4

Commands

file eula upload

file eula upload <filename> <URL>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Uploads the Mellanox End User License Agreement to a specified remote location.

filename The Mellanox End User License Agreement

URL URL or scp://username[:password]@hostname/path/ filename

N/A

Config

3.4.1100

monitor/admin switch (config) # file help-docs upload Mellanox_End_User_

License_Agreement.pdf <scp://username[:password]@hostname/path/

 filename> switch (config) # license

Mellanox Technologies Confidential 45

file help-docs upload

file help-docs upload <filename> <URL or scp://username[:password]@hostname/path/filename>

Syntax Description

Uploads the MLNX-OS UM or RN to a specified remote location.

filename The file to upload to a remote host

URL URL or scp://username[:password]@hostname/path/ filename

Default N/A

Configuration Mode Config

History

Role

Example

3.4.1100

admin switch (config) # file help-docs upload MLNX-OS_ETH_User_Manual.pdf

<scp://username[:password]@hostname/path/filename> switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 46

license delete

license delete <license-key>

Syntax Description

Default

Removes license keys by ID.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.4.1100

admin switch (config) # license delete <license-key> switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 47

license install

licenses install <license-key>

Syntax Description

Default

Installs a new license key.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.4.1100

admin switch (config) # licenses install <license-key> switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 48

show licenses

show licenses

Syntax Description

Default

Displays a list of all installed licenses. For each license, the following is displayed:

• a unique ID which is a small integer

• the text of the license key as it was added

• whether or not it is valid and active

• which feature(s) it is activating

• a list of all licensable features specifying whether or not it is currently activated by a license

N/A

N/A

Configuration Mode Config

History 3.4.1100

Role

Example admin switch (config) # show licenses

License 1: <license key>

Feature: SX_CONFIG

Valid: yes

Active: yes switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 49

Rev 4.20

3 User Interfaces

3.1

Command Line Interface (CLI) Overview

MLNX-OS® is equipped with an industry-standard CLI. The CLI is accessed through SSH or

Telnet sessions, or directly via the console port on the front panel (if it exists).

3.1.1

CLI Modes

The CLI can be in one of following modes, and each mode makes available a certain group (or level) of commands for execution. The different CLI configuration modes are:

Table 12 - CLI Modes and Config Context

Standard

Configuration Mode

Enable

Config

Config Interface Management

Config Interface Ethernet

Config Interface Port Channel

Config VLAN

Any Command Mode

Description

When the CLI is launched, it begins in Standard mode. This is the most restrictive mode and only has commands to query a restricted set of state information. Users cannot take any actions that directly affect the system, nor can they change any configuration.

The enable command moves the user to Enable mode. This mode offers commands to view all state information and take actions like rebooting the system, but it does not allow any configurations to be changed. Its commands are a superset of those in Standard mode.

The configure terminal command moves the user from

Enable mode to Config mode. Config mode is allowed only for user accounts in the “admin” role (or capabilities). This mode has a full unrestricted set of commands to view anything, take any action, and change any configuration. Its commands are a superset of those in Enable mode. To return to Enable mode, enter exit or no configure.

Note that moving directly from/to Standard mode to/from Config mode is not possible.

Configuration mode for management interface mgmt0, mgmt1 and loopback.

Configuration mode for Ethernet interface.

Configuration mode for Port channel (LAG).

Configuration mode for VLAN.

Several commands such as “show” can be applied within any context.

Mellanox Technologies Confidential 50

3.1.2

Syntax Conventions

To help you identify the parts of a CLI command, this section explains conventions of presenting the syntax of commands.

Table 13 - Syntax Conventions

Syntax Convention

< > Angled brackets

[ ] Square brackets

{ } Braces

| Vertical bars

Description Example

Indicate a value/variable that must be replaced.

Enclose optional parameters.

However, only one parameter out of the list of parameters listed can be used. The user cannot have a combination of the parameters unless stated otherwise.

<1...65535> or <switch interface>

[destination-ip | destination-port | destination-mac]

Enclose alternatives or variables that are required for the parameter in square brackets.

Identify mutually exclusive choices.

[mode {active | on | passive}] active | on | passive

Rev 4.20

Do not type the angled or square brackets, vertical bar, or braces in command lines. This guide uses these symbols only to show the types of entries.

CLI commands and options are in lowercase and are case-sensitive.

For example, when you enter the enable command, enter it all in lowercase. It cannot be ENABLE or Enable. Text entries you create are also case-sensitive.

3.1.3

Getting Help

You may request context-sensitive help at any time by pressing “?” on the command line. This will show a list of choices for the word you are on, or a list of top-level commands if you have not typed anything yet.

For example, if you are in Standard mode and you type “?” at the command line, then you will get the following list of available commands.

switch > ?

cli Configure CLI shell options enable Enter enable mode exit Log out of the CLI help View description of the interactive help system no Negate or clear certain configuration options show Display system configuration or statistics

Mellanox Technologies Confidential 51

slogin Log into another system securely using ssh switch Configure switch on system telnet Log into another system using telnet terminal Set terminal parameters traceroute Trace the route packets take to a destination switch-11a596 [standalone: master] >

If you type a legal string and then press “?” without a space character before it, then you will either get a description of the command that you have typed so far or the possible command/ parameter completions. If you press “?” after a space character and “<cr>” is shown, this means that what you have entered so far is a complete command, and that you may press Enter (carriage return) to execute it.

Try the following to get started:

?

show ?

show c?

show clock?

show clock ?

show interfaces ? (from enable mode)

You can also enter “help” to view a description of the interactive help system.

Note also that the CLI supports command and/or parameter tab-completions and their shortened forms. For example, you can enter “en” instead of the “enable” command, or “cli cl” instead of

“cli clear-history”. In case of ambiguity (more than one completion option is available, that is), then you can hit double tabs to obtain the disambiguation options. Thus, if you are in Enable mode and wish to learn which commands start with the letter “c”, type “c” and click twice on the tab key to get the following: switch # c<tab> clear cli configure switch # c

(There are three commands that start with the letter “c”: clear, cli and configure.)

3.1.4

Prompt and Response Conventions

The prompt always begins with the hostname of the system. What follows depends on what command mode the user is in. To demonstrate by example, assuming the machine name is

“switch”, the prompts for each of the modes are: switch > (Standard mode) switch # (Enable mode) switch (config) # (Config mode)

The following session shows how to move between command modes: \ switch > (You start in Standard mode) switch > enable (Move to Enable mode) switch # (You are in Enable mode) switch # configure terminal (Move to Config mode) switch (config) # (You are in Config mode) switch (config) # exit (Exit Config mode) switch # (You are back in Enable mode) switch # disable (Exit Enable mode) switch > (You are back in Standard mode)

Rev 4.20

Mellanox Technologies Confidential 52

Commands entered do not print any response and simply show the command prompt after you press <Enter>.

If an error is encountered in executing a command, the response will begin with “%”, followed by some text describing the error.

3.1.5

Using the “no” Form

Several Config mode commands offer the negation form using the keyword “no”. This no form can be used to disable a function, to cancel certain command parameters or options, or to reset a parameter value to its default. To re-enable a function or to set cancelled command parameters or options, enter the command without the “no” keyword (with parameter values if necessary).

The following example performs the following:

1. Displays the current CLI session options.

2. Disables auto-logout.

3. Displays the new CLI session options (auto-logout is disabled).

4. Re-enables auto-logout (after 15 minutes).

5. Displays the final CLI session options (auto-logout is enabled)

// 1. Display the current CLI session options switch (config) # show cli

CLI current session settings:

Maximum line size: 8192

Terminal width: 157 columns

Terminal length: 60 rows

Terminal type: xterm

Auto-logout: 15 minutes

Paging: enabled

Progress tracking: enabled

Prefix modes: enabled

...

// 2. Disable auto-logout switch (config) # no cli session auto-logout

// 3. Display the new CLI session options switch-1 [standalone: master] (config) # show cli

CLI current session settings:

Maximum line size: 8192

Terminal width: 157 columns

Terminal length: 60 rows

Terminal type: xterm

Auto-logout: disabled

Paging: enabled

Progress tracking: enabled

Prefix modes: enabled

...

// 4. Re-enable auto-logout after 15 minutes switch (config) # cli session auto-logout 15

Rev 4.20

Mellanox Technologies Confidential 53

Rev 4.20

// 5. Display the final CLI session options switch (config) # show cli

CLI current session settings:

Maximum line size: 8192

Terminal width: 157 columns

Terminal length: 60 rows

Terminal type: xterm

Auto-logout: 15 minutes

Paging: enabled

Progress tracking: enabled

Prefix modes: enabled

...

3.1.6

Parameter Key

This section provides a key to the meaning and format of all of the angle-bracketed parameters in all the commands that are listed in this document.

Table 14 - Angled Brackets Parameter Description

Parameter

<domain>

<hostname>

<ifname>

<index>

<IP address>

<log level>

<GUID>

<MAC address>

<netmask>

<network prefix>

<regular expression>

<node id>

<cluster id>

<port>

Description

A domain name, e.g. “mellanox.com”.

A hostname, e.g. “switch-1”.

An interface name, e.g. “mgmt0”, “mgmt1”, “lo” (loopback), etc.

A number to be associated with aliased (secondary) IP addresses.

An IPv4 address, e.g. “192.168.0.1”.

A syslog logging severity level. Possible values, from least to most severe, are:

“debug”, “info”, “notice”, “warning”, “error”, “crit”, “alert”, “emerg”.

Globally Unique Identifier. A number that uniquely identifies a device or component.

A MAC address. The segments may be 8 bits or 16 bits at a time, and may be delimited by “:” or “.”. So you could say “11:22:33:44:55:66”,

“1122:3344:5566”, “11.22.33.44.55.66”, or “1122.3344.5566”.

A netmask (e.g. “255.255.255.0”) or mask length prefixed with a slash (e.g. “/

24”). These two express the same information in different formats.

An IPv4 network prefix specifying a network. Used in conjunction with a netmask to determine which bits are significant. e.g. “192.168.0.0”.

An extended regular expression as defined by the “grep” in the man page. (The value you provide here is passed on to “grep -E”.)

ID of a node belonging to a cluster. This is a numerical value greater than zero.

A string specifying the name of a cluster.

TCP/UDP port number.

Mellanox Technologies Confidential 54

Rev 4.20

Table 14 - Angled Brackets Parameter Description

Parameter

<TCP port>

<URL>

Description

A TCP port number in the full allowable range [0...65535].

A normal URL, using any protocol that wget supports, including http, https, ftp, sftp, and tftp; or a pseudo-URL specifying an scp file transfer. The scp pseudo-

URL format is scp://username:password@hostname/path/filename.

Note that the path is an absolute path. Paths relative to the user's home directory are not currently supported. The implementation of ftp does not support authentication, so use scp or sftp for that.

Note also that if you omit the “:password” part, you may be prompted for the password in a follow up prompt, where you can type it securely (without the characters being echoed). This prompt will occur if the “cli default prompt empty-password” setting is true; otherwise, the CLI will assume you do not want any password. If you include the “:” character, this will be taken as an explicit declaration that the password is empty, and you will not be prompted in any case.

3.1.7

Command Output Filtering

The MLNX-OS CLI supports filtering “show” commands to display lines containing or excluding certain phrases or characters. To filter the outputs of the “show” commands use the following format: switch (config) # <show command> | [include | exclude] <extended regular expression>

[<ignore-case>] [next <lines>] [prev <lines>]

The filtering parameters are separated from the show command they filter by a pipe character

(i.e. “|”). Quotation marks may be used to include or exclude a string including space, and multiple filters can be used simultaneously. For example: switch (config) # <show command> | [include <extended regular expression> [<ignore-case>]

[next <lines>] [prev <lines>] | exclude <extended regular expression> [<ignore-case>]

[next <lines>] [prev <lines>]]

Examples: switch (config) # show asic-version | include SX

MGMT SX 9.3.3150

arc-switch14 [standalone: master] (config) # show module | exclude PS

====================================================

Module Type Present Power Is Fatal

====================================================

MGMT SX1036 1 1 Not Fatal

FAN SXX0XX_FAN 1 1 Not Fatal switch (config) # show interfaces | include "Eth|discard pac"

Eth1/1

0 discard packets

0 discard packets

Eth1/2

0 discard packets

0 discard packets

Mellanox Technologies Confidential 55

Eth1/3

0 discard packets

0 discard packets

Eth1/4

0 discard packets

0 discard packets switch (config) # show interfaces | include "Tx" next 5 | exclude broad

Tx

0 packets

0 unicast packets

0 multicast packets

0 bytes

--

Tx

0 packets

0 unicast packets

0 multicast packets

0 bytes

3.2

Web Interface Overview

MLNX-OS® package equipped with web interface which is a web GUI that accept input and provide output by generating webpages which can be viewed by the user using a web browser.

The following web browsers are supported:

• Internet Explorer 8.0 or higher

• Chrome 18 or higher

• Mozilla Firefox 12 or higher

• Safari 5 or higher

The web interface makes available the following perspective tabs:

• Setup

• System

• Security

• Ports

• Status

• IB SM Management

• Fabric Inspector

• Ethernet Management

• IP Route

• Gateway

Make sure to save your changes before switching between menus or submenus. Click the

“Save” button to the right of “Save Changes?”.

Rev 4.20

Mellanox Technologies Confidential 56

Figure 10: WebUI

Rev 4.20

3.2.1

Setup Menu

The Setup menu makes available the following submenus (listed in order of appearance from top to bottom):

Table 15 - WebUI Setup Submenus

Submenu Title

Interfaces

HA

Routing

Hostname

DNS

Login Messages

Address Resolution

Description

Obtains the status of, configures, or disables interfaces to the InfiniBand fabric.

Thus, you can: set or clear the IP address and netmask of an interface; enable

DHCP to dynamically assign the IP address and netmask; and set interface attributes such as MTU, speed, duplex, etc.

Creates, joins or modifies an InfiniBand subnet.

Configures, removes or displays the default gateway, and the static and dynamic routes.

Configures or modifies the hostname.

Configures or deletes static hosts.

Configures, removes, modifies or displays static and dynamic name servers.

Edits the login messages: Message of the Day (MOTD), Remote Login message, and Local Login message.

Adds static and dynamic ARP entries, and clears the dynamic ARP cache.

Mellanox Technologies Confidential 57

Rev 4.20

Table 15 - WebUI Setup Submenus

Submenu Title

IPSec

Neighbors

Virtualization

Virtual Switch Mgmt

Web

SNMP

Email Alerts

XML gateway

Logs

Configurations

Date and Time

NTP

Licensing

Description

Configures IPSec.

Displays IPv6 neighbor discovery protocol.

Manages the virtualization and virtual machines.

Configures the system profile.

Configures web user interface and proxy settings.

Configures SNMP attributes, SNMP admin user, and trap sinks.

Configures the destination of email alerts and the recipients to be notified.

Provides an XML request-response protocol to get and set hardware management information.

Sets up system log files, remote log sinks, and log formats.

Manages, activates, saves, and imports MLNX-OS SwitchX configuration files, and executes CLI commands.

Configures the date, time, and time zone of the switch system.

Configures NTP (Network Time Protocol) and NTP servers.

Manages MLNX-OS licenses.

3.2.2

System Menu

The System menu makes available the following sub-menus (listed in order of appearance from top to bottom):

Table 16 - WebUI System Submenus

Submenu Title

Modules

Inventory

Power Management

MLNX-OS Upgrade

Description

Displays a graphic illustration of the system modules. By moving the mouse over the ports in the front view, a pop-up caption is displayed to indicate the status of the port. The port state (active/down) is differentiated by a color scheme

(green for active, gray/black for down). By moving the mouse over the rear view, a pop-up caption is displayed to indicate the leaf part information.

Displays a table with the following information about the system modules: module name, type, serial number, ordering part number and Asic firmware version.

Displays a table with the following information about the system power supplies: power supply name, power, voltage level, current consumption, and status. A total power summary table is also displayed providing the power used, the power capacity, and the power available.

Displays the installed MLNX-OS images (and the active partition), uploads a new image, and installs a new image.

Mellanox Technologies Confidential 58

Rev 4.20

Table 16 - WebUI System Submenus

Submenu Title

Reboot

Description

Reboots the system. Make sure that you save your configuration prior to clicking reboot.

3.2.3

Security Menu

The Security menu makes available the following sub-menus (listed in order of appearance from top to bottom):

Table 17 - WebUI Security Submenus

Submenu Title

Users

Admin Password

SSH

AAA

Login Attempts

RADIUS

TACACS+

LDAP

Certificate

Description

Manages (setting up, removing, modifying) user accounts.

Modifies the system administrator password.

Displays and generate host keys.

Configures AAA (Authentication, Authorization, and Accounting) security services such as authentication methods and authorization.

Manages login attempts

Manages Radius client.

Manages TACACS+ client.

Manages LDAP client.

Manages certificates.

3.2.4

Ports Menu

The Ports menu displays the port state and enables some configuration attributes of a selected port. It also enables modification of the port configuration. A graphical display of traffic over time (last hour or last day) through the port is also available.

Table 18 - WebUI Ports Submenus

Ports

Submenu Title

Phy Profile

Monitor Session

Description

Manages port attributes, counters, transceiver info and displays a graphical counters histogram.

Provides the ability to manage phy profiles.

Displays monitor session summary and enables configuration of a selected

 session.

Mellanox Technologies Confidential 59

3.2.5

Status Menu

The Status menu makes available the following sub-menus (listed in order of appearance from top to bottom):

Table 19 - WebUI Status Submenus

Submenu Title Description

Summary

Profile and Capabilities Displays general information about the switch system capabilities such as the enabled profiles (e.g IB/ETH) and their corresponding values.

Temperature Provides a graphical display of the switch module sensors’ temperature levels over time (1 hour). It is possible to display either the temperature level of one module’s sensor or the temperature levels of all the module sensors’ together.

Power Supplies

Displays general information about the switch system and the MLNX-OS image, including current date and time, hostname, uptime of system, system memory,

CPU load averages, etc.

Fans

Provides a graphical display of one of the switch’s power supplies voltage level over time (1 hour).

Provides a graphical display of fan speeds over time (1 hour). The display is per fan unit within a fan module.

CPU Load

Memory

Network

Logs

Provides a graphical display of the management CPU load over time (1 hour).

Provides a graphical display of memory utilization over time (1 day).

Provides a graphical display of network usage (transmitted and received packets) over time (1 day). It also provides per interface statistics.

Displays the system log messages. It is possible to display either the currently saved system log or a continuous system log.

Maintenance

Alerts

Virtualization

Performs specific maintenance operations automatically on a predefined schedule.

Displays a list of the recent health alerts and enables the user to configure health settings.

Displays the virtual machines, networks and volumes.

Rev 4.20

Mellanox Technologies Confidential 60

3.2.6

ETH Mgmt

The Eth Mgmt menu is not applicable when the switch profile is not Ethernet or

VPI.

The ETH Mgmt menu makes available the following sub-menus (listed in order of appearance from top to bottom):

Table 20 - WebUI ETH Mgmt Submenus

Submenu Title

Spanning Tree

MAC Table

Link Aggregation

VLAN

IGMP Snooping

ACL

Priority Flow Control

Description

Configures and monitors spanning tree protocol.

Configures static mac addresses in the switch, and displays the MAC address table.

Configures and monitors aggregated Ethernet links (LAG) and configures

LACP.

Manages the switch VLAN table.

Manages IGMP snooping in the switch.

Manages Access Control in the switch.

Manages priority flow control.

3.2.7

IP Route

The IP Route menu makes available the following sub-menus (listed in order of appearance from top to bottom):

Table 21 - WebUI IP Route Submenus

Submenu Title

Router Global

IP Route

IP Interface

Address Resolution

IP Diagnostic

Description

Enables/disables IP Routing protocol on the machine.

Not implemented.

Not implemented.

Not implemented.

Not implemented.

Rev 4.20

Mellanox Technologies Confidential 61

Rev 4.20

3.3

Secure Shell (SSH)

It is recommended not to use more than 100 concurrent SSH sessions to the switch.

3.3.1

Adding a Host and Providing an SSH Key

To add entries to the global known-hosts configuration file and its SSH value:

Step 1.

Change to Config mode Run: switch [standalone: master] > enable switch [standalone: master] # configure terminal switch [standalone: master] (config) #

Step 2.

Step 3.

Add an entry to the global known-hosts configuration file and its SSH value. Run: switch [standalone: master] (config) # ssh client global known-host "myserver ssh-rsa

AAAAB3NzaC1yc2EAAAABIwAAAIEAsXeklqc8T0EN2mnMcVcfhueaRYzIVqt4rVsrERIjmlJh4mkYYIa8hGGikNa+ t5xw2dRrNxnHYLK51bUsSG1ZNwZT1Dpme3pAZeMY7G4ZMgGIW9xOuaXgAA3eBeoUjFdi6+1BqchWk0nTb+gMfI/

MK/heQNns7AtTrvqg/O5ryIc=” switch [standalone: master] (config) #

Verify what keys exist in the host. Run: switch [standalone: master] (config) # show ssh client

SSH client Strict Hostkey Checking: ask

SSH Global Known Hosts:

Entry 1: myserver

Finger Print: d5:d7:be:d7:6c:b1:e4:16:df:61:25:2f:b1:53:a1:06

No SSH user identities configured.

No SSH authorized keys configured.

switch [standalone: master] (config) #

3.3.2

Retrieving Return Codes when Executing Remote Commands

To stop the CLI and set the system to send return errors if some commands fail:

Step 1.

Step 2.

Connect to the system from the host SSH.

Add the -h parameter after the cli (as shown in the example below) to notify the system to halt on failure and pass through the exit code.

ssh <username>@<hostname> cli -h '"enable" "show interfaces brief"'

Mellanox Technologies Confidential 62

3.4

Commands

3.4.1

CLI Session

This chapter displays all the relevant commands used to manage CLI session terminal.

cli clear-history

cli clear-history

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Clears the command history of the current user.

N/A

N/A

Config

3.1.0000

admin switch (config) # cli clear-history switch (config) #

N/A

Rev 4.20

Mellanox Technologies Confidential 63

Rev 4.20

cli default

cli default {auto-logout <minutes> | paging enable | prefix-modes {enable | showconfig} | progress enable | prompt {confirm-reload | confirm-reset | confirmunsaved | empty-password}} no cli default {auto-logout | paging enable | prefix-modes {enable | show-config} | progress enable prompt {confirm-reload | confirm-reset | confirm-unsaved | empty-password}

Syntax Description

Configures default CLI options for all future sessions.

The no form of the command deletes or disables the default CLI options.

minutes Configures keyboard inactivity timeout for automatic logout. Range is 0-35791 minutes. Setting the value to

0 or using the no form of the command disables the auto-logout.

paging enable prefix-modes {enable | show-config}

Enables text viewing one screen at a time.

Configures the prefix modes feature of CLI.

• “prefix-modes enable” enables prefix modes for current and all future sessions

• “prefix-modes show-config” uses prefix modes in “show configuration” output for current and all future sessions progress enable prompt confirm-reload prompt confirm-reset prompt confirm-unsaved prompt empty-password

Enables progress updates.

Prompts for confirmation before rebooting.

Prompts for confirmation before resetting to factory state.

Confirms whether or not to save unsaved changes before rebooting.

Prompts for a password if none is specified in a pseudo-

URL for SCP.

Default N/A

Configuration Mode Config

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 64

Rev 4.20

Example switch (config) # cli default prefix-modes enable switch (config) # show cli

CLI current session settings:

Maximum line size: 8192

Terminal width: 171 columns

Terminal length: 38 rows

Terminal type: xterm

X display setting: (none)

Auto-logout: disabled

Paging: enabled

Progress tracking: enabled

Prefix modes: disabled

CLI defaults for future sessions:

Auto-logout: disabled

Paging: enabled

Progress tracking: enabled

Prefix modes: enabled (and use in 'show configuration')

Settings for both this session and future ones:

Show hidden config: yes

Confirm losing changes: yes

Confirm reboot/shutdown: no

Confirm factory reset: yes

Prompt on empty password: yes switch (config) #

Related Commands show cli

Note

Mellanox Technologies Confidential 65

Rev 4.20

cli session

cli session {auto-logout <minutes> | paging enable | prefix-modes {enable | showconfig} | progress enable | terminal {length <size> | resize | type <terminal-type>

| width} | x-display full <display>} no cli session {auto-logout | paging enable | prefix-modes {enable | show-config} | progress enable | terminal type | x-display}

Syntax Description

Configures default CLI options for all future sessions.

The no form of the command deletes or disables the CLI sessions.

minutes Configures keyboard inactivity timeout for automatic logout. Range is 0-35791 minutes. Setting the value to

0 or using the no form of the command disables the auto logout.

paging enable prefix-modes enable | show-config

Enables text viewing one screen at a time.

Configures the prefix modes feature of CLI.

• “prefix-modes enable” enables prefix modes for current and all future sessions

• “prefix-modes show-config” uses prefix modes in “show configuration” output for current and all future sessions progress enable terminal length terminal resize terminal-type terminal width

Enables progress updates.

Sets the number of lines for the current terminal. Valid range is 5-999.

Resizes the CLI terminal settings (to match the actual terminal window).

Sets the terminal type. Valid options are:

• ansi

• console

• dumb

• linux

• unknown

• vt52

• vt100

• vt102

• vt220

• vt320

• xterm

Sets the width of the terminal in characters. Valid range is 34-999.

Specifies the display as a raw string, e.g localhost:0.0.

Default x-display full <display>

N/A

Configuration Mode Config

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 66

Example switch (config) # cli session auto-logout switch (config) #

Related Commands show terminal

Note

Rev 4.20

Mellanox Technologies Confidential 67

Rev 4.20

terminal

terminal {length <number of lines> | resize | type <terminal type> | width <number of characters>} no terminal type

Syntax Description

Configures default CLI options for all future sessions.

The no form of the command clears the terminal type.

length Sets the number of lines for this terminal

Range: 5-999 resize type

Resizes the CLI terminal settings (to match with real terminal)

Sets the terminal type. Possible values: ansi, console, dumb, linux, screen, vt52, vt100, vt102, vt220, xterm.

width Sets the width of this terminal in characters

Range: 34-999

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # terminal length 500 switch (config) #

Related Commands show terminal

Note

Mellanox Technologies Confidential 68

Rev 4.20

terminal sysrq enable

terminal sysrq enable no terminal sysrq enable

Syntax Description

Default

Enable SysRq over the serial connection (RS232 or Console port).

The no form of the command disables SysRq over the serial connection (RS232 or

Console port).

N/A

Enabled

Configuration Mode Config

History 3.4.3000

Role

Example admin switch (config) # terminal sysrq enable switch (config) #

Related Commands show terminal

Note

Mellanox Technologies Confidential 69

show cli

show cli

Syntax Description

Default

Displays the CLI configuration and status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show cli

CLI current session settings:

Maximum line size: 8192

Terminal width: 171 columns

Terminal length: 38 rows

Terminal type: xterm

X display setting: (none)

Auto-logout: disabled

Paging: enabled

Progress tracking: enabled

Prefix modes: disabled

CLI defaults for future sessions:

Auto-logout: disabled

Paging: enabled

Progress tracking: enabled

Prefix modes: enabled (and use in 'show configuration')

Settings for both this session and future ones:

Show hidden config: yes

Confirm losing changes: yes

Confirm reboot/shutdown: no

Confirm factory reset: yes

Prompt on empty password: yes switch (config) #

Related Commands cli default

Note

Rev 4.20

Mellanox Technologies Confidential 70

Rev 4.20

3.4.2

Banner

banner login

banner {login | login-remote | login-local} <string> no banner login

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets the CLI welcome banner message. The login-remote refers to the SSH connections banner, while the login-local refers to the serial connection banner.

The no form of the command resets the system login banner to its default.

string Text string.

“Mellanox MLNX-OS Switch Management”

Config

3.1.0000

admin switch (config) # banner login example switch (config) # show banner

Banners:

MOTD:

Mellanox Switch

Related Commands

Note

Login: example switch (config) # show banner

If more then one word is used (there is a space) quotation marks should be added (i.e.

“xxxx xxxx”).

Mellanox Technologies Confidential 71

Rev 4.20

banner login-local

banner login-local <string> no banner login-local

Syntax Description

Default

Sets system login local banner.

The no form of the command resets the banner.

string

N/A

Configuration Mode Config

History 3.1.0000

Text string.

Role

Example admin switch (config) # banner login-local Testing switch (config) #

Related Commands show banner

Note If more then one word is used (there is a space) quotation marks should be added (i.e.

“xxxx xxxx”).

Mellanox Technologies Confidential 72

Rev 4.20

banner login-remote

banner login-remote <string> no banner login-remote

Syntax Description

Default

Sets system login remote banner.

The no form of the command resets the banner.

string

N/A

Configuration Mode Config

History 3.1.0000

Text string.

Role

Example admin switch (config) # banner login-remote Testing switch (config) #

Related Commands show banner

Note If more then one word is used (there is a space) quotation marks should be added (i.e.

“xxxx xxxx”).

Mellanox Technologies Confidential 73

Rev 4.20

banner motd

banner motd <string> no banner motd

Syntax Description

Default

Sets the message of the day banner.

The no form of the command resets the system Message of the Day banner.

string

“Mellanox Switch”

Configuration Mode Config

History 3.1.0000

Text string.

Role

Example admin switch (config) # banner motd “My Banner” switch (config) # show banner

Banners:

MOTD: My-Banner

Login:

Mellanox MLNX-OS Switch Management switch (config) #

Related Commands show banner

Note • If more then one word is used (there is a space) quotation marks should be added (i.e.

"xxxx xxxx").

• To insert a multi-line MotD, hit Ctrl-V (escape sequence) followed by Ctrl-J (new line sequence). The symbol “^J” should appear. Then, whatever is typed after it becomes the new line of the MotD. Remember to also include the string between quotation marks.

Mellanox Technologies Confidential 74

show banner

show banner

Syntax Description

Default

Displays configured banners.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

unpriv/monitor/admin switch (config) # show banner

Banners:

MOTD: Testing

Login:

Mellanox MLNX-OS Switch Management switch (config) #

Related Commands banner login banner motd

Note

Rev 4.20

Mellanox Technologies Confidential 75

Rev 4.20

3.4.3

SSH

ssh server enable

ssh server enable no ssh server enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables the SSH server.

The no form of the command disables the SSH server.

N/A

SSH server is enabled

Config

3.1.0000

admin switch (config) # ssh server enable switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Server security strict mode: no

Minimum protocol version: 2

TCP forwarding enabled: yes

X11 forwarding enabled: no

SSH server ports: 22

Related Commands

Note

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68 switch (config) # show ssh server

Disabling SSH server does not terminate existing SSH sessions, it only prevents new ones from being established.

Mellanox Technologies Confidential 76

Rev 4.20

ssh server host-key

ssh server host-key {<key-type> {private-key <private-key>| public-key <publickey>} | generate}

Syntax Description

Manipulates host keys for SSH.

key-type private-key

• rsa1 - RSAv1

• rsa2 - RSAv2

• dsa2 - DSAv2

Sets new private-key for the host keys of the specified type.

public-key Sets new public-key for the host keys of the specified type.

generate

Default

Configuration Mode Config

Generates new RSA and DSA host keys for SSH.

SSH keys are locally generated

History 3.1.0000

3.4.2300

Added notes

Role admin

Mellanox Technologies Confidential 77

Rev 4.20

Example switch (config) # ssh server host-key dsa2 private-key

Key: ***********************************************

Confirm: *********************************************** switch (config) # show ssh server host-keys

SSH server configuration:

SSH server enabled: yes

Minimum protocol version: 2

X11 forwarding enabled: no

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68

Host Keys:

RSA v1 host key: "switch-5ea5d8 1024 35

12457497995374010105491416867919987976776882016984375942831915584962796

99375406596085804272219042450456598705866658144854493132172365068789517

13570509420864336951833046700451354269467758379288848962624165330724512

16091899983038691571036219385577978596282214644533444813712105628654158

3022982220576029771297093"

RSA v2 host key: "switch-5ea5d8 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAA-

IEArB9i5OnukAHNUOkwpCmEl0m88kJgBzL22+F5tfaSn+S0pVYxrceZeyuzXsoZ1VtFTk2-

Fydwy0YvMS0Kcv2PuCrPZV/

GYd31QEnn22rEmrlPrKCrMl1XlUy6DFlr3OgwWm1baobmDlG/gSziWz/gc4Jgqf2CyX-

Fq4pzaR1jar1Vk="

DSA v2 host key: "switch-5ea5d8 ssh-dss AAAAB3NzaC1kc3MAAAC-

BAMeJ3S+nyaHhRbwv3tJqlWttDC35RZVC5iG4ZEvMMHp28VL94OcyyuGh39VCdM9pEVaI7h zZrsgHrNqakb/YLD/7anGH3wpl9Fx8lfe0RH3bloJzG+mJ6R5momdoPCrKwEKiKABKE00jLzlVznpP0IHxjwF+TbR3dK5HwVzQYw/bAAAAFQCBoDPqBZZa+2KylKlzUsbZ2pKhgQAAA-

IAJK+StiQdtORw1B5UCMzTrTef5L07DSfVreMEYtTRnBBtgVSNqQFWpSQIYbVDHQr9T6qCM

4VO39DuHUGQ1TMDIX7t+9mfbB87YyUu5a/ndbf3GhNhxHWwbzlr9hgLL7FSHA7DYH7bVOZ-

RlqxH64eQKGZqy1ps/F4E31lyn7GC4EQAAAIA/2osHipXf+NRjplgfmHROVVf/mGE9Vzc9/

AMUxlJJn5VhvEJ5CZW9cI+LxMOJojhOj3YW3B1czGxRObDA9vUbKXTNc8bkgoUrxySAH1rH

N0PqJgeT4L009AItSp3m1mxHqdS7jixfTvOTEKWXrgpczlmTB8+zjhUah/YuuBl2H g==" switch (config) #

Related Commands show ssh server system secure-mode enable

Note When working in secure mode, the commands “ssh server host-key rsa1” and “ssh server host-key generate” do not create RSAv1 key-type.

Mellanox Technologies Confidential 78

Rev 4.20

ssh server listen

ssh server listen {enable | interface <inf>} no ssh server listen {enable | interface <inf>}

Syntax Description

Enables the listen interface restricted list for SSH. If enabled, and at least one non-

DHCP interface is specified in the list, the SSH connections are only accepted on those specified interfaces.

The no form of the command disables the listen interface restricted list for SSH.

When disabled, SSH connections are not accepted on any interface.

enable interface <inf>

Enables SSH interface restrictions on access to this system.

Adds interface to SSH server access restriction list.

Possible interfaces are “lo”, and “mgmt0”.

Default SSH listen is enabled

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ssh server listen enable switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Minimum protocol version: 2

X11 forwarding enabled: no

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68 switch (config) #

Related Commands show ssh server

Note

Mellanox Technologies Confidential 79

Rev 4.20

ssh server min-version

ssh server min-version <version> no ssh server min-version

Syntax Description

Default

Sets the minimum version of the SSH protocol that the server supports.

The no form of the command resets the minimum version of SSH protocol supported.

version

2

Configuration Mode Config

History 3.1.0000

Possible versions are 1 and 2.

Role

Example admin switch (config) # ssh server min-version 2 switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Minimum protocol version: 2

X11 forwarding enabled: no

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68 switch (config) #

Related Commands show ssh server

Note

Mellanox Technologies Confidential 80

ssh server ports

ssh server ports {<port1> [<port2>...]}

Syntax Description

Default

Specifies which ports the SSH server listens on.

port

22

Configuration Mode Config

Port number in [1...65535].

History

Role

Example

3.1.0000

admin switch (config) # ssh server ports 22 switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Minimum protocol version: 2

X11 forwarding enabled: no

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68 switch (config) #

Related Commands show ssh server

Note • Multiple ports can be specified by repeating the <port> parameter

• The command will remove any previous ports if not listed in the command

Rev 4.20

Mellanox Technologies Confidential 81

ssh server security strict

ssh server security strict

Syntax Description

Default

Enables strict security settings.

The no form of the command disables strict security settings.

N/A

N/A

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ssh server security strict switch (config) #

Related Commands show ssh server

Note

Rev 4.20

Mellanox Technologies Confidential 82

ssh server tcp-forwarding enable

ssh server tcp-forwarding enable

Syntax Description

Default

Enables TCP port forwarding.

The no form of the command disables TCP port forwarding.

N/A

N/A

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ssh server tcp-forwarding enable switch (config) #

Related Commands show ssh server

Note

Rev 4.20

Mellanox Technologies Confidential 83

ssh server x11-forwarding

ssh server x11-forwarding enable no ssh server x11-forwarding enable

Syntax Description

Default

Enables X11 forwarding on the SSH server.

The no form of the command disables X11 forwarding.

N/A

X11-forwarding is disabled.

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ssh server x11-forwarding enable switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Minimum protocol version: 2

X11 forwarding enabled: yes

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints:

RSA v1 host key: a0:63:db:96:e2:95:5a:5a:fd:a8:d0:f4:ab:e3:5f:f8

RSA v2 host key: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

DSA v2 host key: 7c:4a:f7:72:51:67:b5:0b:cd:a2:d2:b9:f3:be:3e:68 switch (config) #

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 84

Rev 4.20

ssh client global

ssh client global {host-key-check <policy>} | known-host <known-host-entry>} no ssh client global {host-key-check | known-host localhost}

Syntax Description

Configures global SSH client settings.

The no form of the command negates global SSH client settings.

host-key-check <policy> Sets SSH client configuration to control how host key checking is performed. This parameter may be set in 3 ways.

• If set to “no” it always permits connection, and accepts any new or changed host keys without checking

• If set to “ask” it prompts user to accept new host keys, but does not permit a connection if there was already a known host entry that does not match the one presented by the host

• If set to “yes” it only permits connection if a matching host key is already in the known hosts file known-host known-host-entry

Adds an entry to the global known-hosts configuration file.

Adds/removes an entry to/from the global known-hosts configuration file. The entry consist of “<IP> <keytype> <key>”.

Default host-key-check - ask, no keys are configured by default

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ssh client global host-key-check no switch (config) # ssh client global known-host "72.30.2.2 ssh-rsa

AAAAB3NzaC1yc2EAAAABIwAAAIEArB9i5OnukAHNUOkwpCmEl0m88kJgBzL22+F5tfaSn+S0pVYxrceZeyuzXsoZ1VtFTk2Fydwy0YvMS0Kcv2PuCrPZV/

GYd31QEnn22rEmrlPrKCrMl1XlUy6DFlr3OgwWm1baobmDlG/gSziWz/gc4Jgqf2CyX-

Fq4pzaR1jar1Vk=" switch (config) # show ssh client

SSH client Strict Hostkey Checking: ask

SSH Global Known Hosts:

Entry 1: 72.30.2.2

Finger Print: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

No SSH user identities configured.

No SSH authorized keys configured.

switch (config) #

Mellanox Technologies Confidential 85

Related Commands show ssh client

Note

Rev 4.20

Mellanox Technologies Confidential 86

Rev 4.20

ssh client user

ssh client user <username> {authorized-key sshv2 <public key> | identity <key type> {generate | private-key [<private key>] | public-key [<public key>]} | known-host <known host> remove} no ssh client user admin {authorized-key sshv2 <public key ID> | identity <key type>}

Syntax Description

Adds an entry to the global known-hosts configuration file, either by generating new key, or by adding manually a public or private key.

The no form of the command removes a public key from the specified user's authorized key list, or changes the key type.

username The specified user must be a valid account on the system. Possible values for this parameter are “admin”,

“monitor”, “xmladmin”, and “xmluser”.

authorized-key sshv2

<public key> identity <key type> generate private-key

Adds the specified key to the list of authorized SSHv2

RSA or DSA public keys for this user account. These keys can be used to log into the user's account.

Sets certain SSH client identity settings for a user, dsa2 or rsa2.

Generates SSH client identity keys for specified user.

public-key known-host <known host> remove

Sets private key SSH client identity settings for the user.

Sets public key SSH client identity settings for the user.

Removes host from user's known host file.

Default No keys are created by default

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ssh client user admin known-host 172.30.1.116 remove switch (config) #

Related Commands show ssh client

Note If a key is being pasted from a cut buffer and was displayed with a paging program, it is likely that newline characters have been inserted, even if the output was not long enough to require paging. One can specify “no cli session paging enable” before running the “show” command to prevent the newlines from being inserted.

Mellanox Technologies Confidential 87

Rev 4.20

slogin

slogin [<slogin options>] <hostname>

Syntax Description

Invokes the SSH client. The user is returned to the CLI when SSH finishes.

slogin options usage: slogin [-1246AaCfgkNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] [-D port] [-e escape_char] [-F configfile] [-i identity_file] [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option] [-p port] [-R port:host:hostport] [user@]hostname [command]

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

monitor/admin switch (config) # slogin 192.168.10.70

The authenticity of host '192.168.10.70 (192.168.10.70)' can't be established.

RSA key fingerprint is 2e:ad:2d:23:45:4e:47:e0:2c:ae:8c:34:f0:1a:88:cb.

Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added '192.168.10.70' (RSA) to the list of known hosts.

Mellanox MLNX-OS Switch Management

Last login: Sat Feb 28 22:55:17 2009 from 10.208.0.121

Mellanox Switch switch (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 88

Rev 4.20

show ssh client

show ssh client

Syntax Description

Default

Displays the client configuration of the SSH server.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show ssh client

SSH client Strict Hostkey Checking: ask

SSH Global Known Hosts:

Entry 1: 72.30.2.2

Finger Print: 1e:b7:8b:ec:ab:35:98:be:6b:d6:12:c2:18:72:12:d6

No SSH user identities configured.

No SSH authorized keys configured.

switch (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 89

Rev 4.20

show ssh server

show ssh server

Syntax Description

Default

Displays SSH server configuration.

N/A

N/A

Configuration Mode Config

History 3.1.0000

3.4.0000

Updated Example

Role

Example admin switch (config) # show ssh server

SSH server configuration:

SSH server enabled: yes

Server security strict mode: no

Minimum protocol version: 2

TCP forwarding enabled: yes

X11 forwarding enabled: no

SSH server ports: 22

Interface listen enabled: yes

No Listen Interfaces.

Host Key Finger Prints and Key Lengths:

RSA v1 host key: 5f:4e:5f:4a:81:bb:6a:b4:06:52:77:eb:d3:ad:78:92 (2048)

RSA v2 host key: 15:e2:a8:45:1c:58:1b:00:cc:29:ec:00:38:83:49:00 (2048)

DSA v2 host key: df:c0:ac:a6:3e:a5:52:a5:d1:f6:22:37:ef:f1:08:f9 (1024) switch (config) #

Related Commands ssh server

Note

Mellanox Technologies Confidential 90

3.4.4

Remote Login

telnet

telnet

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Logs into another system using telnet.

N/A

N/A

Config

3.1.0000

admin switch (config) # (config) # telnet telnet> telnet-server

Rev 4.20

Mellanox Technologies Confidential 91

telnet-server enable

telnet-server enable no telnet-server enable

Syntax Description

Default

Enables the telnet server.

The no form of the command disables the telnet server.

N/A

Telnet server is disabled

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # telnet-server enable switch (config) # show telnet-server

Telnet server enabled: yes

Related Commands show telnet-server

Note

Rev 4.20

Mellanox Technologies Confidential 92

show telnet-server

show telnet-server

Syntax Description

Default

Displays telnet server settings.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show telnet-server

Telnet server enabled: yes switch (config) #

Related Commands telnet-server enable

Note

Rev 4.20

Mellanox Technologies Confidential 93

Rev 4.20

3.4.5

Web Interface

web auto-logout

web auto-logout <number of minutes> no web auto-logout <number of minutes>

Syntax Description

Default

Configuration Mode

History

Role

Example

Configures length of user inactivity before auto-logout of a web session.

The no form of the command disables the web auto-logout (web sessions will never logged out due to inactivity).

number of minutes The length of user inactivity in minutes.

0 will disable the inactivity timer (same as a “no web auto-logout” command).

60 minutes

Config

3.1.0000

3.4.0000

admin

Updated Example switch (config) # web auto-logout 60 switch (config) # show web

Related Commands

Note

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) # show web

The no form of the command does not automatically log users out due to inactivity.

Mellanox Technologies Confidential 94

web cache-enable

web cache-enable no web cache-enable

Syntax Description

Default

Enables web clients to cache webpages.

The no form of the command disables web clients from caching webpages.

N/A

Enabled

Configuration Mode Config

History 3.4.1100

Role

Example admin switch (config) # no web cache-enable

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 95

web client cert-verify

web client cert-verify no web client cert-verify

Syntax Description

Default

Enables verification of server certificates during HTTPS file transfers.

The no form of the command disables verification of server certificates during

HTTPS file transfers.

N/A

N/A

Configuration Mode Config

History 3.2.3000

Role

Example admin switch (config) # web client cert-verify

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 96

Rev 4.20

web client ca-list

web client ca-list {<ca-list-name> | default-ca-list | none} no web client ca-list

Syntax Description

Configures supplemental CA certificates for verification of server certificates during

HTTPS file transfers.

The no form of the command uses no supplemental certificates.

ca-list-name default-ca-list

Specifies CA list to configure.

Configures default supplemental CA certificate list.

Uses no supplemental certificates.

Default none default-ca-list

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # web client ca-list default-ca-list

Related Commands N/A

Note

Mellanox Technologies Confidential 97

web enable

web enable no web enable

Syntax Description

Default

Enables the web-based management console.

The no form of the command disables the web-based management console.

N/A enable

Configuration Mode Config

History 3.1.0000

Role

Example

3.4.0000

admin

Updated Example switch (config) # web enable switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands show web

Note

Rev 4.20

Mellanox Technologies Confidential 98

Rev 4.20

web http

web http {enable | port <port number> | redirect} no web http {enable | port | redirect}

Syntax Description

Configures HTTP access to the web-based management console.

The no form of the command negates HTTP settings for the web-based management console.

enable port number redirect

Enables HTTP access to the web-based management console.

Sets a port for HTTP access.

Enables redirection to HTTPS. If HTTP access is enabled, this specifies whether a redirect from the

HTTP port to the HTTPS port should be issued to mandate secure HTTPS access.

Default HTTP is enabled

HTTP TCP port is 80

HTTP redirect to HTTPS is disabled

Configuration Mode Config

History 3.1.0000

Role

Example

3.4.0000

admin

Updated Example switch (config) # web http enable switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Mellanox Technologies Confidential 99

Related Commands show web web enable

Note Enabling HTTP is meaningful if the WebUI as a whole is enabled.

Rev 4.20

Mellanox Technologies Confidential 100

Rev 4.20

web httpd

web httpd listen {enable | interface <ifName> } no web httpd listen {enable | interface <ifName> }

Syntax Description

Enables the listen interface restricted list for HTTP and HTTPS.

The no form of the command disables the HTTP server listen ability.

enable Enables Web interface restrictions on access to this system.

interface <ifName> Adds interface to Web server access restriction list (i.e. mgmt0, mgmt1)

Default Listening is enabled.

all interfaces are permitted.

Configuration Mode Config

History 3.1.0000

Role

Example

3.4.0000

admin

Updated Example switch (config) # web httpd listen enable switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands N/A

Note If enabled, and if at least one of the interfaces listed is eligible to be a listen interface, then HTTP/HTTPS requests will only be accepted on those interfaces. Otherwise,

HTTP/HTTPS requests are accepted on any interface.

Mellanox Technologies Confidential 101

Rev 4.20

web https

web https {certificate {regenerate | name | default-cert} | enable | port <port number> | ssl ciphers {all | TLS | TLS1.2}} no web https {enable | port <port number>}

Syntax Description

Configures HTTPS access to the web-based management console.

The no form of the command negates HTTPS settings for the web-based management console.

certificate regenerate certificate name

Re-generates certificate to use for HTTPS connections.

Configure the named certificate to be used for HTTPS connections certificate default-cert enable port ssl ciphers {all | TLS |

TLS1.2}

Configure HTTPS to use the configured default certificate

Enables HTTPS access to the web-based management console.

Sets a TCP port for HTTPS access.

Sets ciphers to be used for HTTPS.

Default HTTPS is enabled

Default port is 443

Configuration Mode Config

History 3.1.0000

Role

3.4.0000

3.4.0010

admin

Added “ssl ciphers” parameter

Added TLS parameter to “ssl ciphers”

Mellanox Technologies Confidential 102

Rev 4.20

Example switch (config) # web https enable switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands show web web enable

Note • Enabling HTTPS is meaningful if the WebUI as a whole is enabled.

• See the command “crypto certificate default-cert name” for how to change the default certificate if inheriting the configured default certificate is preferred

Mellanox Technologies Confidential 103

Rev 4.20

web session

web session {renewal <minutes> | timeout <minutes>} no web session {renewal | timeout}

Syntax Description

Default

Configures session settings.

The no form of the command resets session settings to default.

renewal <minutes> timeout <minutes> timeout - 2.5 hours renewal - 30 min

Configures time before expiration to renew a session.

Configures time after which a session expires.

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # web session renewal 60 switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 60 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 104

Rev 4.20

web proxy auth

web proxy auth {authtype <type>| basic [password <password> | username

<username>]} no web proxy auth {authtype | basic {password | username }

Syntax Description

Configures authentication settings for web proxy authentication.

The no form of the command resets the attributes to their default values.

type Configures the type of authentication to use with web proxy.

The possible values are:

• basic - HTTP basic authentication

• none - No authentication basic password

Configures HTTP basic authentication settings for proxy. T he password is accepted and stored in plaintext.

A password used for HTTP basic authentication with the web proxy.

username A username used for HTTP basic authentication with the web proxy.

Default Web proxy is disabled.

Configuration Mode Config

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 105

Example switch (config) # web proxy auth authtype basic switch (config) # web proxy auth basic username web-user switch (config) # web proxy auth basic password web-password switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: yes

Proxy address: 10.10.10.11

Proxy port: 40

Authentication type: basic

Basic auth username: web-user

Basic auth password: web-password

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands show web web proxy host

Note

Rev 4.20

Mellanox Technologies Confidential 106

web proxy host

web proxy host <IP address> [port <port number>] no web proxy

Syntax Description

Adds and enables a proxy to be used for any HTTP or FTP downloads.

The no form of the command disables the web proxy.

IP address port number

IPv4 or IPv6 address.

Sets the web proxy default port.

Default 1080

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # web proxy host 10.10.10.10 port 1080 switch (config) # show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: yes

Proxy address: 10.10.10.10

Proxy port: 1080

Authentication type: basic

Basic auth username: web-user

Basic auth password: web-password

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands web proxy auth

Note

Mellanox Technologies Confidential 107

Rev 4.20

show web

show web

Syntax Description

Default

Displays the web configuration.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

3.4.0000

3.4.1100

admin

Updated Example

Updated Example switch (config) # show web

Web User Interface:

Web interface enabled: yes

Web caching enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: all

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: 1 hr

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: yes

Proxy address: 10.10.10.11

Proxy port: 40

Authentication type: basic

Basic auth username: web-user

Basic auth password: web-password

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config) #

Related Commands show web web proxy auth

Note

Mellanox Technologies Confidential 108

Rev 4.20

4 System Management

4.1

Management Interface

4.1.1

Configuring Management Interfaces with Static IP Addresses

If your switch system was set during initialization to obtain dynamic IP addresses through DHCP and you wish to switch to static assignments, perform the following steps:

Step 1.

Enter Config mode. Run: switch > switch > enable switch # configure terminal switch (config) #

Step 2.

Step 3.

Disable setting IP addresses using the DHCP using the following command: switch (config) # no interface <ifname> dhcp

Define your interfaces statically using the following command: switch (config) # interface <ifname> ip address <IP address> <netmask>

4.1.2

Configuring IPv6 Address on the Management Interface

Step 1.

Enable IPv6 on this interface.

switch (config) # interface mgmt0 ipv6 enable

Step 2.

Step 3.

Set the IPv6 address to be configured automatically.

switch (config) # interface mgmt0 ipv6 address autoconfig

Verify the IPv6 address is configured correctly.

switch (config) # show interfaces mgmt0 brief

4.1.3

Dynamic Host Configuration Protocol (DHCP)

DHCP is used for automatic retrieval of management IP addresses.

For all other systems (and software versions) DHCP is disabled by default.

If a user connects through SSH, runs the wizard and turns off DHCP, the connection is immediately terminated as the management interface loses its IP address.

<localhost># ssh admin@<ip-address>

Mellanox MLNX-OS Switch Management

Password:

Mellanox Switch

Mellanox configuration wizard

Do you want to use the wizard for initial configuration? yes

Step 1: Hostname? [my-switch]

Step 2: Use DHCP on mgmt0 interface? [yes] no

<localhost>#

In such case the serial connection should be used.

Rev 4.20

Mellanox Technologies Confidential 109

4.1.4

Default Gateway

To configure manually the default gateway, use the “ip route” command, with “0.0.0.0” as prefix and mask. The next-hop address must be within the range of one of the IP interfaces on the system.

switch (config)# ip route 0.0.0.0 0.0.0.0 10.209.0.2

switch (config)# show ip route

Destination Mask Gateway Interface Source default 0.0.0.0 10.209.0.2 mgmt0 static

10.209.0.0 255.255.254.0 0.0.0.0 mgmt0 direct switch (config)#

4.1.5

In-Band Management

In-band management is a management path passing through the data ports. In-band management can be created over one of the VLANs in the systems.

The in-band management feature does not require any license. However, it works only for system profiles VPI and Ethernet. It can be enabled with IP Routing but not with IP Proxy-ARP.

To set an in-band management channel:

Step 1.

Create a VLAN. Run: switch (config) # vlan 10 switch (config vlan 10) #

Step 2.

Step 3.

Create a VLAN interface. Run: switch (config) # interface vlan 10

Enter the VLAN interface configuration mode and configure L3 attributes. Run: switch (config) # interface vlan 10 switch (config interface vlan 10)#ip address 10.10.10.10 /24

Rev 4.20

Mellanox Technologies Confidential 110

Step 4.

(Optional) Verify in-band management configuration. Run: switch (config) # show interfaces vlan 10

Admin state: Enabled

Operational state: Up

Mac Address: f4:52:14:67:07:e8

Internet Address: 10.10.10.10/24

Broadcast address: 10.10.10.255

MTU: 1500 bytes

Arp timeout: 1500 seconds

Icmp redirect: Disabled

Description: N/A

VRF: default

Counters: Enabled

RX

0 Unicast packets

0 Multicast packets

0 Unicast bytes

0 Multicast bytes

0 Bad packets

0 Bad bytes

TX

0 Unicast packets

0 Multicast packets

0 Unicast bytes

0 Multicast bytes

switch (config) #

Rev 4.20

Mellanox Technologies Confidential 111

4.1.6

Commands

4.1.6.1 Interface

This chapter describes the commands should be used to configure and monitor the management interface.

interface

interface {mgmt0 | mgmt1 | lo | vlan<id>}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Enters a management interface context.

mgmt0 Management port 0 (out of band).

mgmt1 lo

Management port 1 (out of band).

Loopback interface.

In-band management interface (e.g. vlan10).

vlan<id>

N/A

Config

3.1.0000

admin switch (config) # interface mgmt0 switch (config interface mgmt0) # show interfaces <ifname>

Rev 4.20

Mellanox Technologies Confidential 112

ip address

ip address <IP address> <netmask> no ip address

Syntax Description

Sets the IP address and netmask of this interface.

The no form of the command clears the IP address and netmask of this interface.

IP address netmask

IPv4 address

Subnet mask of IP address

Default 0.0.0.0/0

Configuration Mode Config Interface Management

History

Role

Example

3.1.0000

admin switch (config) # interface mgmt0 switch (config interface mgmt0) # ip address 10.10.10.10 255.255.255.0

switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 10.10.10.10

Netmask: 255.255.255.0

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80:202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment:

RX bytes: 2946769856 TX bytes: 467577486

RX packets: 44866091 TX packets: 1385520

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Related Commands show interfaces <ifname>

Notes If DHCP is enabled on the specified interface, then the DHCP IP assignment will hold until DHCP is disabled.

Rev 4.20

Mellanox Technologies Confidential 113

ip default-gateway

ip default-gateway <next hop IP address or interface name> no ip default-gateway

Syntax Description

Configures a default route.

The no form of the command removes the current default route.

next hop IP address or interface name

IP address, lo, mgmt0, or mgmt1.

Default N/A

Configuration Mode Config Interface Management

History

Role

Example

3.1.0000

admin switch (config) # ip default-gateway mgmt1 switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 114

Rev 4.20

alias

alias <index> ip address < IP address> <netmask> no alias <index>

Syntax Description

Adds an additional IP address to the specified interface. The secondary address will appear in the output of “show interface” under the data of the primary interface along with the alias.

The no form of the command removes the secondary address to the specified interface.

index A number that is to be aliased to (associated with) the secondary IP.

IP address netmask

Default N/A

Configuration Mode Config Interface Management

Additional IP address.

Subnet mask of the IP address.

History

Role

Example

3.1.0000

admin switch (config interface mgmt0) # alias 2 ip address 9.9.9.9

255.255.255.255

switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

Secondary address: 9.9.9.9/32 (alias: 'mgmt0:2')

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment:

RX bytes: 2970074221 TX bytes: 468579522

RX packets: 44983023 TX packets: 1390539

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Mellanox Technologies Confidential 115

Rev 4.20

Related Commands show interfaces <ifname>

Notes • If DHCP is enabled on the specified interface, then the DHCP IP assignment will hold until

DHCP is disabled

• More than one additional IP address can be added to the interface

Mellanox Technologies Confidential 116

mtu

mtu <bytes> no mtu <bytes>

Syntax Description

Default

Role

Example

Sets the Maximum Transmission Unit (MTU) of this interface.

The no form of the command resets the MTU to its default.

bytes

1500

Configuration Mode Config Interface Management

History 3.1.0000

admin

The entry range is 68-1500.

switch (config interface mgmt0) # mtu 1500 switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

Secondary address: 9.9.9.9/32 (alias: 'mgmt0:2')

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80:202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment:

RX bytes: 2970074221 TX bytes: 468579522

RX packets: 44983023 TX packets: 1390539

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Related Commands show interfaces <ifname>

Notes

Rev 4.20

Mellanox Technologies Confidential 117

Rev 4.20

duplex

duplex <duplex> no duplex

Sets the interface duplex.

The no form of the command resets the duplex setting for this interface to its default value.

Syntax Description duplex

Default auto

Configuration Mode Config Interface Management

Sets the duplex mode of the interface. The following are the possible values:

• half - half duplex

• full - full duplex

• auto - auto duplex sensing (half or full)

History

Role

Example

3.1.0000

admin switch (config interface mgmt0) # duplex auto switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

Secondary address: 9.9.9.9/32 (alias: 'mgmt0:2')

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment:

RX bytes: 2970074221 TX bytes: 468579522

RX packets: 44983023 TX packets: 1390539

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Mellanox Technologies Confidential 118

Rev 4.20

Related Commands show interfaces <ifname>

Notes • Setting the duplex to “auto” also sets the speed to “auto”

• Setting the duplex to one of the settings “half” or “full” also sets the speed to a manual setting which is determined by querying the interface to find out its current auto-detected state

Mellanox Technologies Confidential 119

speed

speed <speed> no speed

Sets the interface speed.

The no form of the command resets the speed setting for this interface to its default value.

Syntax Description speed

Default auto

Configuration Mode Config Interface Management

Sets the speed of the interface. The following are the possible values:

• 10 - fixed to 10Mbps

• 100 - fixed to 1000Mbps

• 1000 - fixed to 1000Mbps

• auto - auto speed sensing (10/100/1000Mbps)

History

Role

Example

3.1.0000

admin switch (config interface mgmt0) # speed auto switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

Secondary address: 9.9.9.9/32 (alias: 'mgmt0:2')

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment:

RX bytes: 2970074221 TX bytes: 468579522

RX packets: 44983023 TX packets: 1390539

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Rev 4.20

Mellanox Technologies Confidential 120

Rev 4.20

Related Commands show interfaces <ifname>

Notes • Setting the speed to “auto” also sets the duplex to “auto”

• Setting the speed to one of the manual settings (generally “10”, “100”, or “1000”) also sets the duplex to a manual setting which is determined by querying the interface to find out its current auto-detected state

Mellanox Technologies Confidential 121

Rev 4.20

dhcp

dhcp [renew] no dhcp

Syntax Description

Enables DHCP on the specified interface.

The no form of the command disables DHCP on the specified interface.

renew Forces a renewal of the IP address. A restart on the

DHCP client for the specified interface will be issued.

Default Could be enabled or disabled (per part number) manufactured with 3.2.0500

Configuration Mode Config Interface Management

History

Role

Example

3.1.0000

admin switch (config interface mgmt0) # dhcp switch (config) # show interfaces mgmt0 configured

Interface mgmt0 configuration

Enabled: yes

DHCP: yes

Zeroconf: no

IP address:

Netmask:

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 0

Speed: auto

Duplex: auto

MTU: 1500

Comment:

Related Commands show interfaces <ifname> configured

Notes • When enabling DHCP, the IP address and netmask are received via DHCP hence, the static

IP address configuration is ignored

• Enabling DHCP disables zeroconf and vice versa

• Setting a static IP address and netmask does not disable DHCP. DHCP is disabled by using the “no” form of this command, or by enabling zeroconf.

Mellanox Technologies Confidential 122

shutdown

shutdown no shutdown

Syntax Description

Default

Role

Example

Disables the specified interface.

The no form of the command enables the specified interface.

N/A no shutdown

Configuration Mode Config Interface Management

History 3.1.0000

admin switch (config interface mgmt0) # no shutdown switch (config) # show interfaces mgmt0 configured

Interface mgmt0 configuration

Enabled: yes

DHCP: yes

Zeroconf: no

IP address:

Netmask:

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 0

Speed: auto

Duplex: auto

MTU: 1500

Comment: switch (config) #

Related Commands show interfaces <ifname> configured

Notes

Rev 4.20

Mellanox Technologies Confidential 123

Rev 4.20

zeroconf

zeroconf no zeroconf

Syntax Description

Default

Role

Example

Enables zeroconf on the specified interface. It randomly chooses a unique link-local

IPv4 address from the 169.254.0.0/16 block. This command is an alternative to

DHCP.

The no form of the command disables the use of zeroconf on the specified interface.

N/A no zeroconf

Configuration Mode Config Interface Management

History 3.1.0000

admin switch (config interface mgmt0) # zeroconf switch (config) # show interfaces mgmt0 configured

Interface mgmt0 configuration

Enabled: yes

DHCP: no

Zeroconf: yes

IP address:

Netmask:

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 0

Speed: auto

Duplex: auto

MTU: 1500

Comment:

Related Commands show interfaces <ifname> configured

Notes Enabling zeroconf disables DHCP and vice versa.

Mellanox Technologies Confidential 124

comment

comment <comment> no comment

Syntax Description

Adds a comment for an interface.

The no form of the command removes a comment for an interface.

comment A free-form string that has no semantics other than being displayed when the interface records are listed.

Default no comment

Configuration Mode Config Interface Management

History

Role

Example

3.1.0000

admin switch (config interface mgmt0) # comment my-interface switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment: my-interface

RX bytes: 962067812 TX bytes: 40658219

RX packets: 3738865 TX packets: 142345

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 125

ipv6 enable

ipv6 enable no ipv6 enable

Syntax Description

Default

Enables all IPv6 addressing for this interface.

The no form of the command disables all IPv6 addressing for this interface.

N/A

IPv6 addressing is disabled

Configuration Mode Config Interface Management

History 3.1.0000

Role

Example admin switch (config interface mgmt0) # ipv6 enable switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment: my-interface

RX bytes: 962067812 TX bytes: 40658219

RX packets: 3738865 TX packets: 142345

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Rev 4.20

Mellanox Technologies Confidential 126

Rev 4.20

Related Commands ipv6 address show interface <ifname>

Notes • The interface identifier is a 64-bit long modified EUI-64, which is based on the MAC address of the interface

• If IPv6 is enabled on an interface, the system will automatically add a link-local address to the interface. Link-local addresses can only be used to communicate with other hosts on the same link, and packets with link-local addresses are never forwarded by a router.

• A link-local address, which may not be removed, is required for proper IPv6 operation. The link-local addresses start with “fe80::”, and are combined with the interface identifier to form the complete address.

Mellanox Technologies Confidential 127

Rev 4.20

ipv6 address

Syntax Description ipv6 address {<IPv6 address/netmask> | autoconfig [default | privacy]} no ipv6 {<IPv6 address/netmask> | autoconfig [default | privacy]}

Configures IPv6 address and netmask to this interface, static or autoconfig options are possible.

The no form of the command removes the given IPv6 address and netmask or disables the autoconfig options.

IPv6 address/netmask Configures a static IPv6 address and netmask.

Format example: 2001:db8:1234::5678/64.

autoconfig default autoconfig privacy

(SLAAC) for this interface. An address will be automatically added to the interface based on an IPv6 prefix learned from router advertisements, combined with an interface identifier.

Enables default learning routes. The default route will be discovered automatically, if the autoconfig is enabled.

Uses privacy extensions for SLAAC to construct the autoconfig address, if the autoconfig is enabled.

Default No IP address available, auto config is enabled

Configuration Mode Config Interface Management

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 128

Example switch (config interface mgmt0) # ipv6 fe80::202:c9ff:fe5e:a5d8/64 switch (config interface mgmt0) # show interfaces mgmt0

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment: my-interface

RX bytes: 962067812 TX bytes: 40658219

RX packets: 3738865 TX packets: 142345

RX mcast packets: 0 TX discards: 0

RX discards: 0 TX errors: 0

RX errors: 0 TX overruns: 0

RX overruns: 0 TX carrier: 0

RX frame: 0 TX collisions: 0

TX queue len: 1000 switch (config interface mgmt0) #

Related Commands ipv6 enable show interface <ifname>

Notes • Unlike IPv4, IPv6 can have multiple IPv6 addresses on a given interface

• For Ethernet, the default interface identifier is a 64-bit long modified EUI-64, which is based on the MAC address of the interface

Rev 4.20

Mellanox Technologies Confidential 129

ipv6 dhcp primary-intf

ipv6 dhcp primary-intf <if-name> no ipv6 dhcp primary-intf

Syntax Description

Sets the interface from which non-interface-specific (resolver) configuration is accepted via DHCPv6.

The no form of the command resets non-interface-specific (resolver) configuration.

if-name Interface name:

• lo

• mgmt0

• mgmt1

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ipv6 dhcp primary-intf mgmt0 switch (config) #

Related Commands ipv6 enable ipv6 address show interface <ifname>

Notes

Rev 4.20

Mellanox Technologies Confidential 130

ipv6 dhcp stateless

ipv6 dhcp stateless no ipv6 dhcp stateless

Syntax Description

Default

Enables stateless DHCPv6 requests.

The no form of the command disables stateless DHCPv6 requests.

N/A

N/A

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ipv6 dhcp stateless switch (config) #

Related Commands ipv6 enable ipv6 address show interface <ifname>

Notes • This command only gets DNS configuration, not an IPv6 address

• The no form of the command requests all information, including an IPv6 address

Rev 4.20

Mellanox Technologies Confidential 131

Rev 4.20

show interface

show interface {<ifname> [configured | brief]}

Syntax Description

Displays information about the specified interface, configuration status, and counters.

ifname The interface name e.g., “mgmt0”, “mgmt1”, “lo”

(loopback), etc.

configured brief

Displays the interface configuration.

Displays a brief info on the interface configuration and status.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) #show interfaces mgmt0 configured

Interface mgmt0 configuration

Enabled: yes

DHCP: yes

Zeroconf: no

IP address:

Netmask:

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 0

Speed: auto

Duplex: auto

MTU: 1500

Comment: my-interface switch (config) # show interfaces mgmt0 brief

Interface mgmt0 state

Admin up: yes

Link up: yes

IP address: 172.30.2.2

Netmask: 255.255.0.0

IPv6 enabled: yes

Autoconf enabled: no

Autoconf route: yes

Autoconf privacy: no

IPv6 addresses: 1

IPv6 address: fe80::202:c9ff:fe5e:a5d8/64

Speed: 1000Mb/s (auto)

Duplex: full (auto)

Interface type: ethernet

Interface ifindex: 2

Interface source: physical

MTU: 1500

HW address: 00:02:C9:5E:A5:D8

Comment: my-interface switch (config) #

Mellanox Technologies Confidential 132

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 133

4.1.6.2 Hostname Resolution

hostname

hostname <hostname> no hostname

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sets a static system hostname.

The no form of the command clears the system hostname.

hostname

Default hostname

A free-form string.

Config

3.1.0000

admin switch (config) # hostname my-switch-hostname my-switch-hostname (config) # show hosts

• Hostname may contain letters, numbers, and hyphens ('-'), in any combination

• Hostname may not contain other letters, such as ‘%’, ‘_’, ‘.’etc

• Hostname may not begin with a hyphen

• Hostname may be 1-63 characters long

• Changing hostname stamps a new HTTPS certificate

Rev 4.20

Mellanox Technologies Confidential 134

ip name-server

ip name-server <IPv4/IPv6 address> no name-server <IPv4/IPv6 address>

Syntax Description

Default

Sets the static name server.

The no form of the command clears the name server.

IPv4/v6 address

No server name

Configuration Mode Config

History 3.1.0000

IPv4 or IPv6 address.

Role

Example admin switch (config) # ip name-server 9.9.9.9

switch (config) # show hosts

Hostname: switch

Name server: 9.9.9.9 (configured)

Name server: 10.211.0.121 (dynamic)

Name server: 172.30.0.126 (dynamic)

Name server: 10.4.0.135 (dynamic)

Domain name: lab.mtl.com (dynamic)

Domain name: vmlab.mtl.com (dynamic)

Domain name: yok.mtl.com (dynamic)

Domain name: mtl.com (dynamic)

IP 127.0.0.1 maps to hostname localhost

IPv6 ::1 maps to hostname localhost6

Automatically map hostname to loopback address: yes

Automatically map hostname to IPv6 loopback address: no switch (config) #

Related Commands show hosts

Notes

Rev 4.20

Mellanox Technologies Confidential 135

Rev 4.20

ip domain-list

ip domain-list <domain-name> no ip domain-list <domain-name>

Syntax Description

Sets the static domain name.

The no form of the command clears the domain name.

domain-name The domain name in a string form.

A domain name is an identification string that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS).

Default No static domain name

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ip domain-list mydomain.com

switch (config) # show hosts

Hostname: switch

Name server: 10.211.0.121 (dynamic)

Name server: 172.30.0.126 (dynamic)

Name server: 10.4.0.135 (dynamic)

Domain name: mydomain.com (configured)

Domain name: lab.mtl.com (dynamic)

Domain name: vmlab.mtl.com (dynamic)

Domain name: yok.mtl.com (dynamic)

Domain name: mtl.com (dynamic)

IP 1.1.1.1 maps to hostname p

IP 127.0.0.1 maps to hostname localhost

IPv6 ::1 maps to hostname localhost6

Automatically map hostname to loopback address: yes

Automatically map hostname to IPv6 loopback address: no switch (config) #

Related Commands show hosts

Notes

Mellanox Technologies Confidential 136

ip/ipv6 host

{ip | ipv6} host <hostname> <IP Address> no {ip | ipv6} host <hostname> <IP Address>

Syntax Description

Configures the static hostname IPv4 or IPv6 address mappings.

The no form of the command clears the static mapping.

hostname

IP Address

The hostname in a string form.

The IPv4 or IPv6 address.

Default No static domain name.

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # ip host my-host 2.2.2.2

switch (config) # ipv6 host my-ipv6-host 2001::8f9 switch (config) # show hosts

Hostname: switch

Name server: 9.9.9.9 (configured)

Name server: 10.211.0.121 (dynamic)

Name server: 172.30.0.126 (dynamic)

Name server: 10.4.0.135 (dynamic)

Domain name: mydomain.com (configured)

Domain name: lab.mtl.com (dynamic)

Domain name: vmlab.mtl.com (dynamic)

Domain name: yok.mtl.com (dynamic)

Domain name: mtl.com (dynamic)

IP 1.1.1.1 maps to hostname p

IP 127.0.0.1 maps to hostname localhost

IP 2.2.2.2 maps to hostname my-host

IPv6 2001::8f9 maps to hostname my-ipv6-host

IPv6 ::1 maps to hostname localhost6

Automatically map hostname to loopback address: yes

Automatically map hostname to IPv6 loopback address: yes switch (config) #

Related Commands show hosts

Notes

Rev 4.20

Mellanox Technologies Confidential 137

Rev 4.20

ip/ipv6 map-hostname

{ip |ipv6} map-hostname no {ip | ipv6} map-hostname

Syntax Description

Default

Maps between the currently-configured hostname and the loopback address

127.0.0.1.

The no form of the command clears the mapping.

N/A

IPv4 mapping is enabled by default

IPv6 mapping is disabled by default

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ip map-hostname switch (config) # # show hosts

Hostname: switch

Name server: 9.9.9.9 (configured)

Name server: 10.211.0.121 (dynamic)

Name server: 172.30.0.126 (dynamic)

Name server: 10.4.0.135 (dynamic)

Domain name: mydomain.com (configured)

Domain name: lab.mtl.com (dynamic)

Domain name: vmlab.mtl.com (dynamic)

Domain name: yok.mtl.com (dynamic)

Domain name: mtl.com (dynamic)

IP 1.1.1.1 maps to hostname p

IP 127.0.0.1 maps to hostname localhost

IP 2.2.2.2 maps to hostname my-host

IPv6 2001::8f9 maps to hostname my-ipv6-host

IPv6 ::1 maps to hostname localhost6

Automatically map hostname to loopback address: yes

Automatically map hostname to IPv6 loopback address: yes switch (config) # switch (config) # ping my-host-name

PING localhost (127.0.0.1) 56(84) bytes of data.

64 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.078 ms

64 bytes from localhost (127.0.0.1): icmp_seq=2 ttl=64 time=0.052 ms

64 bytes from localhost (127.0.0.1): icmp_seq=3 ttl=64 time=0.058 ms

Related Commands show hosts

Notes • If no mapping is configured, a mapping between the hostname and the IPv4 loopback address 127.0.0.1 will be added

• The no form of the command maps the hostname to the IPv6 loopback address if there is no statically configured mapping from the hostname to an IPv6 address (disabled by default)

• Static host mappings are preferred over DNS results. As a result, with this option set, you will not be able to look up your hostname on your configured DNS server; but without it set, some problems may arise if your hostname cannot be looked up in DNS.

Mellanox Technologies Confidential 138

show hosts

show hosts

Syntax Description

Default

Displays hostname, DNS configuration, and static host mappings.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show hosts

Hostname: my-host-name

Name server: 9.9.9.9 (configured)

Name server: 10.211.0.121 (dynamic)

Name server: 172.30.0.126 (dynamic)

Name server: 10.4.0.135 (dynamic)

Domain name: mydomain.com (configured)

Domain name: lab.mtl.com (dynamic)

Domain name: vmlab.mtl.com (dynamic)

Domain name: yok.mtl.com (dynamic)

Domain name: mtl.com (dynamic)

IP 1.1.1.1 maps to hostname p

IP 127.0.0.1 maps to hostname localhost

IP 2.2.2.2 maps to hostname my-host

IPv6 ::1 maps to hostname localhost6

Automatically map hostname to loopback address: yes

Automatically map hostname to IPv6 loopback address: no switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 139

Rev 4.20

4.1.6.3 Routing

ip/ipv6 route

{ip | ipv6} route <network-prefix> <netmask> {<nexthop-address> | <ifname>} no ip route <network-prefix> <netmask> {<nexthop-address> | <ifname>}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sets a static route for a given IP.

The no form of the command deletes the static route.

network-prefix netmask

IPv4 or IPv6 network prefix.

nexthop-address

IPv4 netmask formats are:

• /24

• 255.255.255.0

IPv6 netmask format is:

• /48 (as a part of the network prefix)

The IPv4 or IPv6 address of the next hop router for this route.

The interface name (e.g., mgmt0, mgmt1).

ifname

N/A

Config

3.1.0000

admin switch (config) # ip route 20.20.20.0 255.255.255.0 mgmt0 switch (config) # show ip route

Destination Mask Gateway Interface Source default 0.0.0.0 172.30.0.1 mgmt0 DHCP

10.10.10.10 255.255.255.255 0.0.0.0 mgmt0 static

20.10.10.10 255.255.255.255 172.30.0.1 mgmt0 static

20.20.20.0 255.255.255.0 0.0.0.0 mgmt0 static

172.30.0.0 255.255.0.0 0.0.0.0 mgmt0 interface show ip route

Mellanox Technologies Confidential 140

ipv6 default-gateway

ipv6 default-gateway {<ip-address> | <ifname>} no ipv6 default-gateway

Syntax Description

Sets a static default gateway.

The no form of the command deletes the default gateway.

ip address ifname

The default gateway IP address (IPv4 or IPv6).

The interface name (e.g., mgmt0, mgmt1).

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

3.2.0500

First version removed IPv4 configuration option admin switch (config) # ip default-gateway ::1 switch (config) # show ip default-gateway static

Configured default gateways:

::1 switch (config) #

Related Commands show ip route

Notes • The configured default gateway will not be used if DHCP is enabled.

• In order to configure ipv4 default-gateway use ‘ip route’ command.

Rev 4.20

Mellanox Technologies Confidential 141

Rev 4.20

show ip/ipv6 route

show {ip | ipv6} route [static]

Syntax Description

Default

Displays the routing table in the system.

static

N/A

Configuration Mode Any Command Mode

Filters the table with the static route entries.

History

Role

Example

3.1.0000

admin switch (config) # show ip route

Destination Mask Gateway Interface Source default 0.0.0.0 172.30.0.1 mgmt0 DHCP

10.10.10.10 255.255.255.255 0.0.0.0 mgmt0 static

20.10.10.10 255.255.255.255 172.30.0.1 mgmt0 static

20.20.20.0 255.255.255.0 0.0.0.0 mgmt0 static

172.30.0.0 255.255.0.0 0.0.0.0 mgmt0 interface switch (config) # show ipv6 route

Destination prefix

Gateway Interface Source

-----------------------------------------------------------------------

::/0

:: mgmt0 static

::1/128

:: lo local

2222:2222:2222::/64

:: mgmt1 interface switch (config) #

Related Commands show ip default-gateway

Notes

Mellanox Technologies Confidential 142

Rev 4.20

show ip/ipv6 default-gateway

show {ip | ipv6} default-gateway [static]

Syntax Description

Default

Displays the default gateway.

static

N/A

Configuration Mode Any Command Mode

Displays the static configuration of the default gateway.

History

Role

Example

3.1.0000

admin switch (config) # ip default-gateway 10.10.10.10

switch (config) # show ip default-gateway

Active default gateways:

172.30.0.1 (interface: mgmt0) switch (config) # show ip default-gateway static

Configured default gateway: 10.10.10.10

Related Commands show ip default-gateway

Notes The configured IPv4 default gateway will not be used if DHCP is enabled.

Mellanox Technologies Confidential 143

4.1.6.4 Network to Media Resolution (ARP & NDP)

IPv4 network use Address Resolution Protocol (ARP) to resolve IP address to MAC address, while IPv6 network uses Network Discovery Protocol (NDP) that performs basically the same as

ARP.

ip arp

ip arp <IP address> <MAC address> no ip arp <IP address> <MAC address>

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets a static ARP entry.

The no form of the command deletes the static ARP.

IP address

MAC address

IPv4 address.

MAC address.

N/A

Config Interface Management

3.2.0500

admin switch (config interface mgmt0) #ip arp 20.20.20.20 aa:aa:aa:aa:aa:aa switch (config interface mgmt0) # show ip arp

Total number of entries: 6

Related Commands

Address Type MAC Address Interface

10.209.1.103 Dynamic 00:02:C9:11:A1:78 mgmt0

10.209.1.168 Dynamic 00:02:C9:5E:C3:28 mgmt0

10.209.1.104 Dynamic 00:02:C9:11:A1:E6 mgmt0

10.209.1.153 Dynamic 00:02:C9:11:A1:86 mgmt0

10.209.1.105 Dynamic 00:02:C9:5E:0B:56 mgmt0

10.209.0.1 Dynamic 00:00:5E:00:01:01 mgmt0

20.20.20.20 Static AA:AA:AA:AA:AA:AA mgmt0 switch (config interface mgmt0) # show ip arp ip route

Notes

Rev 4.20

Mellanox Technologies Confidential 144

ip arp timeout

ip arp timeout <timeout-value> no ip arp timeout

Syntax Description

Sets the dynamic ARP cache timeout.

The no form of the command sets the timeout to default.

timeout-value Time (in seconds) that an entry remains in the ARP cache. Range: 60-28800.

Default 1500 seconds

Configuration Mode Config

History

Role

3.2.0230

admin

Example switch (config) # ip arp timeout 2000 switch (config) #

Related Commands ip arp show ip arp

Notes This value is used as the ARP timeout whenever a new IP interface is created.

Rev 4.20

Mellanox Technologies Confidential 145

Rev 4.20

show ip arp

Syntax Description show ip arp [interface <type>| <ip-address> | count]

Displays ARP table.

interface type ip-address

Filters the table according to a specific interface (i.e. mgmt0)

Filters the table to the specific ip-address

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3000

admin switch-626a54 [standalone: master] (config) # show ip arp

Total number of entries: 3

Address Type Hardware Address Interface

---------------------------------------------------------------------

---

10.209.0.1 Dynamic ETH 00:00:5E:00:01:01 mgmt0

10.209.1.120 Dynamic ETH 00:02:C9:62:E8:C2 mgmt0

10.209.1.121 Dynamic ETH 00:02:C9:62:E7:42 mgmt0 switch (config) # show ip arp count

ARP Table size: 3 (inband: 0, out of band: 3) switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 146

Rev 4.20

ipv6 neighbor

ipv6 neighbor <IPv6 address> <ifname> <MAC address> no ipv6 neighbor <IPv6 address> <ifname> <MAC address>

Syntax Description

Adds a static neighbor entry.

The no form of the command deletes the static entry.

IPv6 address ifname

The IPv6 address.

The management interface (i.e. mgmt0, mgmt1).

Default

MAC address

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin

The MAC address.

switch (config) # ipv6 neighbor 2001:db8:701f::8f9 mgmt0

00:11:22:33:44:55 switch (config) #

Related Commands show ipv6 neighbor ipv6 route arp clear ipv6 neighbors

Notes • ARP is used only with IPv4. In IPv6 networks, Neighbor Discovery Protocol (NDP) is used similarly.

• Use The no form of the command to remove static entries. Dynamic entries can be cleared via the “clear ipv6 neighbors” command.

Mellanox Technologies Confidential 147

clear ipv6 neighbors

clear ipv6 neighbors

Syntax Description

Default

Clears the dynamic neighbors cache.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # clear ipv6 neighbors switch (config) #

Related Commands ipv6 neighbor show ipv6 neighbor arp

Notes • Clearing Neighbor Discovery Protocol (NDP) cache removes only the dynamic entries learned and not the static entries configured

• Use the no form of the command to remove static entries

See “clear ipv6 neighbors” on page 790 for the interface or VLAN specific command

Rev 4.20

Mellanox Technologies Confidential 148

Rev 4.20

show ipv6 neighbors

show ipv6 neighbors [static]

Syntax Description

Default

Displays the Neighbor Discovery Protocol (NDP) table.

static

N/A

Configuration Mode Config

Filters only the table of the static entries.

History

Role

Example

3.1.0000

admin switch (config) # show ipv6 neighbors

IPv6 Address Age MAC Address State Interf

------------------------------------- ----- ----------------- ---------- ---

2001::2 9428 AA:AA:AA:AA:AA:AA permanent mgmt0 switch (config) #

Related Commands ipv6 neighbor clear ipv6 neighbor show ipv6

Notes

Mellanox Technologies Confidential 149

Rev 4.20

4.1.6.5 DHCP

ip dhcp

ip dhcp {default-gateway yield-to-static| hostname <hostname>| primary-intf

<ifname> | send-hostname } no ip dhcp {default-gateway yield-to-static| hostname | | primary-intf | send-hostname}

Syntax Description

Sets global DHCP configuration.

The no form of the command deletes the DHCP configuration.

yield-to-static| Does not allow you to install a default gateway from

DHCP if there is already a statically configured one.

hostname primary-intf <ifname> send-hostname

Specifies the hostname to be sent during DHCP client negotiation if send-hostname is enabled.

Sets the interface from which a non-interface-specific configuration (resolver and routes) will be accepted via

DHCP.

Enables the DHCP client to send a hostname during negotiation.

Default no ip dhcp yield-to-static no ip dhcp hostname ip ip dhcp primary-intf mgmt0 no ip dhcp send-hostname

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # ip dhcp default-gateway yield-to-static switch (config) # show ip dhcp

DHCP DHCP Valid

Interface Enabled Running lease

------------------------------------lo no no no mgmt0 yes yes yes mgmt1 yes yes no

DHCP primary interface:

Configured: mgmt0

Active: mgmt0

DHCP default gateway yields to static configuration: yes

DHCP client options:

Send Hostname: no

Client Hostname: switch (using system hostname) switch (config) #

Mellanox Technologies Confidential 150

Related Commands show ip dhcp dhcp [renew]

Notes DHCP is supported for IPv4 networks only.

Rev 4.20

Mellanox Technologies Confidential 151

show ip dhcp

show ip dhcp

Syntax Description

Default

Displays the DHCP configuration and status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show ip dhcp

DHCP primary interface:

Configured: mgmt0

Active: mgmt0

DHCP: yield default gateway to static configuration: yes

DHCP Client Options:

Send Hostname: no

Client Hostname: switch (using system hostname) switch (config) #

Related Commands ip dhcp dhcp [renew]

Notes

Rev 4.20

Mellanox Technologies Confidential 152

4.1.6.6 General IPv6 Commands

ipv6 enable

ipv6 enable no ipv6 enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Enables IPv6 globally on the management interface.

The no form of the command disables IPv6 globally on the management interface.

N/A

IPv6 is disabled

Config

3.1.0000

admin switch (config) # ipv6 enable switch (config) # show ipv6

IPv6 summary

IPv6 supported: yes

IPv6 admin enabled: yes

IPv6 interface count: 2 switch (config) # ipv6 default-gateway ipv6 host ipv6 map-hostname ipv6 neighbor ipv6 route show ipv6 show ipv6 default-gateway show ipv6 route

Notes

Rev 4.20

Mellanox Technologies Confidential 153

Rev 4.20

4.1.6.7 IP Diagnostic Tools

ping

ping [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [-

T timestamp option ] [-Q tos ] [hop1 ...] destination

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sends ICMP echo requests to a specified host.

Linux Ping options http://linux.about.com/od/commands/l/blcmdl8_ping.htm

N/A

Config

3.1.0000

admin switch (config) # ping 172.30.2.2

PING 172.30.2.2 (172.30.2.2) 56(84) bytes of data.

64 bytes from 172.30.2.2: icmp_seq=1 ttl=64 time=0.703 ms

64 bytes from 172.30.2.2: icmp_seq=2 ttl=64 time=0.187 ms

64 bytes from 172.30.2.2: icmp_seq=3 ttl=64 time=0.166 ms

64 bytes from 172.30.2.2: icmp_seq=4 ttl=64 time=0.161 ms

64 bytes from 172.30.2.2: icmp_seq=5 ttl=64 time=0.153 ms

64 bytes from 172.30.2.2: icmp_seq=6 ttl=64 time=0.144 ms

^C

--- 172.30.2.2 ping statistics ---

6 packets transmitted, 6 received, 0% packet loss, time 5004ms rtt min/avg/max/mdev = 0.144/0.252/0.703/0.202 ms switch (config) # traceroutes

Mellanox Technologies Confidential 154

Rev 4.20

traceroute

traceroute [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m max_ttl] [-N squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s src_addr]

[-z sendwait] host [packetlen]

Traces the route packets take to a destination.

Mellanox Technologies Confidential 155

Syntax Description

-I

-T

-U

-n

-r

-4

-6

-d

-F

-A

-V

-f

-g

-i

-m

-N

-p

-t

-l

-w

-q

-s

-z

Rev 4.20

Uses IPv4.

Uses IPv6.

Enables socket level debugging.

Sets DF (do not fragment bit) on.

Uses ICMP ECHO for tracerouting.

Uses TCP SYN for tracerouting.

Uses UDP datagram (default) for tracerouting.

Does not resolve IP addresses to their domain names.

Bypasses the normal routing and send directly to a host on an attached network.

Performs AS path lookups in routing registries and print results directly after the corresponding addresses.

Prints version info and exit.

Starts from the first_ttl hop (instead from 1).

Routes packets throw the specified gateway (maximum

8 for IPv4 and 127 for IPv6).

Specifies a network interface to operate with.

Sets the max number of hops (max TTL to be reached).

Default is 30.

Sets the number of probes to be tried simultaneously

(default is 16).

Uses destination port. It is an initial value for the UDP destination port (incremented by each probe, default is

33434), for the ICMP seq number (incremented as well, default from 1), and the constant destination port for

TCP tries (default is 80).

Sets the TOS (IPv4 type of service) or TC (IPv6 traffic class) value for outgoing packets.

Uses specified flow_label for IPv6 packets.

Sets the number of seconds to wait for response to a probe (default is 5.0). Non-integer (float point) values allowed too.

Sets the number of probes per each hop. Default is 3.

Uses source src_addr for outgoing packets.

Sets minimal time interval between probes (default is

0). If the value is more than 10, then it specifies a number in milliseconds, else it is a number of seconds (float point values allowed too).

Mellanox Technologies Confidential 156

Rev 4.20

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # traceroute 192.168.10.70

traceroute to 192.168.10.70 (192.168.10.70), 30 hops max, 40 byte packets

1 172.30.0.1 (172.30.0.1) 3.632 ms 2.849 ms 3.544 ms

2 10.222.128.46 (10.222.128.46) 3.176 ms 3.289 ms 3.656 ms

3 10.158.128.30 (10.158.128.30) 15.331 ms 15.819 ms 16.388 ms

4 10.158.128.65 (10.158.128.65) 20.468 ms 7.893 ms 12.27 ms

5 10.7.34.115 (10.7.34.115) 16.405 ms 11.985 ms 12.264 ms

6 192.168.10.70 (192.168.10.70) 16.377 ms 16.091 ms 20.475 ms switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 157

Rev 4.20

tcpdump

tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [ -C file_size ]

[ -E algo:secret ] [ -F file ] [ -i interface ] [ -M secret ]

[ -r file ] [ -s snaplen ] [ -T type ] [ -w file ]

[ -W filecount ] [ -y datalinktype ] [ -Z user ]

[ -D list possible interfaces ] [ expression ]

Syntax Description

Default

Invokes standard binary, passing command line parameters straight through. Runs in foreground, printing packets as they arrive, until the user hits Ctrl+C.

N/A

N/A

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # tcpdump

......

09:37:38.678812 IP 192.168.10.7.ssh > 192.168.10.1.54155: P

1494624:1494800(176) ack 625 win 90

<nop,nop,timestamp 5842763 858672398>

09:37:38.678860 IP 192.168.10.7.ssh > 192.168.10.1.54155: P

1494800:1495104(304) ack 625 win 90

<nop,nop,timestamp 5842763 858672398>

...

9141 packets captured

9142 packets received by filter

0 packets dropped by kernel switch (config) #

Related Commands N/A

Notes

Mellanox Technologies Confidential 158

4.2 NTP, Clock & Time Zones

Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is intended to synchronize all participating computers to within a few milliseconds of Coordinated Universal Time

(UTC) and is designed to mitigate the effects of variable network latency. NTP can usually maintain time to within tens of milliseconds over the public Internet, and can achieve better than one millisecond accuracy in local area networks under ideal conditions.

Rev 4.20

Mellanox Technologies Confidential 159

4.2.1

Commands

clock set

clock set <hh:mm:ss> [<yyyy/mm/dd>]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sets the time and date.

hh:mm:ss yyyy/mm/dd

N/A

Config

3.1.0000

admin

Time.

Date.

switch (config) # clock set 23:23:23 2010/08/19 switch (config) # show clock

Time: 23:23:26

Date: 2010/08/19

Time zone: UTC

(Etc/UTC)

UTC offset: same as UTC switch (config) # show clock

If not specified, the date will be left the same.

Rev 4.20

Mellanox Technologies Confidential 160

Rev 4.20

clock timezone

clock timezone [<zone word> [<zone word> [<zone word>] [<zone word>]]]

Syntax Description

Sets the system time zone. The time zone may be specified in one of three ways:

• A nearby city whose time zone rules to follow. The system has a large list of cities which can be displayed by the help and completion system. They are organized hierarchically because there are too many of them to display in a flat list. A given city may be required to be specified in two, three, or four words, depending on the city.

• An offset from UTC. This will be in the form UTC-offset UTC, UTC-offset UTC+<0-14>,

UTC-offset UTC-<1-12>.

• UTC (Universal Time, which is almost identical to GMT), and this is the default time zone

The no form of the command resets time zone to its default (GMT).

zone word The possible forms this could take include: continent, city, continent, country, city, continent, region, country, city, ocean, and/or island.

Default GMT

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # clock timezone America North United_States Other

New_York switch (config) # show clock

Time: 04:21:44

Date: 2012/02/26

Time zone: America North United_States Other New_York switch (config) #

Related Commands show clock

Notes

Mellanox Technologies Confidential 161

Rev 4.20

ntp

ntp {disable | enable | {peer | server} <IP address> [version <number> | disable]} no ntp {disable | enable | {peer | server} <IP address> [disable]}

Syntax Description

Configures NTP.

The no form of the command negates NTP options.

disable enable

Disables NTP.

Enables NTP.

peer or server

IP address version <number>

Configures an NTP peer or server node.

IPv4 or IPv6 address.

Specifies the NTP version number of this peer. Possible values are 3 or 4.

Default

Configuration Mode Config

History 3.1.0000

Role

Example

NTP is enabled.

NTP version number is 4.

admin switch (config) # no ntp peer 192.168.10.24 disable switch (config) #

Related Commands N/A

Notes

Mellanox Technologies Confidential 162

Rev 4.20

ntpdate

ntpdate <IP address>

Syntax Description

Default

Sets the system clock using the specified SNTP server.

IP address

N/A

Configuration Mode Config

IP.

History

Role

Example

3.1.0000

admin switch (config) # ntpdate 192.168.10.10

26 Feb 17:25:40 ntpdate[15206]: adjust time server 192.168.10.10 offset

-0.000092 sec switch (config) #

Related Commands N/A

Notes This is a one-time operation and does not cause the clock to be kept in sync on an ongoing basis. It will generate an error if SNTP is enabled since the socket it requires will already be in use.

Mellanox Technologies Confidential 163

show clock

show clock

Syntax Description

Default

Displays the current system time, date and time zone.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show clock

Time: 04:21:44‘

Date: 2012/02/26

Time zone: America North United_States Other New_York switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 164

show ntp

show ntp

Syntax Description

Default

Displays the current NTP settings.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show ntp

NTP is enabled.

Clock is unsynchronized.

No NTP peers or servers configured.

switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 165

Rev 4.20

4.3

Software Management

4.3.1

Upgrading MLNX-OS Software

When upgrading from a software version older than 3.2.0100 to software version

3.3.0000 or higher, the upgrade procedure must be done in two steps. First update the software to 3.2.0300-100 (for InfiniBand platforms) or 3.2.0506 (for Ethernet platforms), then update to the desired software version.

The system being upgraded becomes indisposed throughout the upgrade procedure.

The upgrade procedure burns the software image as well as the firmware should there be a need.

To upgrade the MLNX-OS version of on a gateway, SM, or MLAG cluster, please

refer to Section 4.3.2, “Upgrading MLNX-OS HA Groups,” on page 169 .

You have to read and accept the End-User License Agreement (EULA) after image upgrade in case the EULA is modified. The EULA link is only available upon first login to CLI.

To upgrade MLNX-OS software on your system, perform the following steps:

Step 1.

Change to Config mode.

switch > enable switch # configure terminal switch (config) #

Step 2.

Obtain the previously available image (.img file). You must delete this image in the next step to make room for fetching the new image.

switch (config) # show images

Installed images:

Partition 1:

SX_PPC_M460EX 3.3.3130 2013-03-20 21:32:25 ppc

Partition 2:

SX_PPC_M460EX 3.3.3130 2013-03-20 21:32:25 ppc

Images available to be installed:

Mellanox Technologies Confidential 166

Rev 4.20

image-PPC_M460EX-SX_3.3.3256.img

SX_PPC_M460EX 3.3.3256 2013-03-20 21:32:25 ppc

Serve image files via HTTP/HTTPS: no

No image install currently in progress.

Boot manager password is set.

No image install currently in progress.

Step 3.

Require trusted signature in image being installed: yes (default) switch (config) #

Delete the old image (if one exists) that is listed under Images available to be installed prior to fetching the new image. Use the command image delete for this purpose.

switch (config) # image delete image-PPC_M460EX-3.0.1224.img

switch (config) #

When deleting an image, you delete the file but not the partition. This is recommended so as to not overload system resources.

Step 4.

Step 5.

Fetch the new software image.

switch (config) # image fetch scp://username:[email protected]/var/www/html/

<image_name>

Password (if required): ****** 100.0%[##################################################

###############] switch (config) #

Display the available images.

To recover from image corruption (e.g., due to power interruption), there are two installed images on the system. See the commands: image boot next image boot location .

switch (config) # show images

Installed images:

Partition 1:

SX <old ver> 2013-04-28 16:02:50

Partition 2:

SX <new ver> 2013-04-28 16:52:50

Images available to be installed:

new_image.img

SX <new ver> 2013-04-28 16:52:50

Mellanox Technologies Confidential 167

Serve image files via HTTP/HTTPS: no

No image install currently in progress.

Boot manager password is set.

No image install currently in progress.

Step 6.

Require trusted signature in image being installed: yes (default) switch (config) #

Install the new image.

switch (config) # image install <image_name>

Step 1 of 4: Verify Image

100.0% [#############################################################]

Step 2 of 4: Uncompress Image

100.0% [#############################################################]

Step 3 of 4: Create Filesystems

100.0% [#############################################################]

Step 4 of 4: Extract Image

100.0% [#############################################################] switch (config) #

CPU utilization may go up to 100% during image upgrade.

Step 7.

Step 8.

Have the new image activate during the next boot. Run: switch (config) # image boot next

Run show images to review your images. Run: switch (config) # show images

Images available to be installed:

new_image.img

SX <new ver> 2011-04-28 16:52:50

Installed images:

Partition 1:

SX <old ver> 2011-04-28 16:02:50

Partition 2:

SX <new ver> 2011-04-28 16:52:50

Last boot partition: 1

Next boot partition: 2

Mellanox Technologies Confidential 168

Rev 4.20

Rev 4.20

Step 9.

No boot manager password is set.

switch (config) #

Save current configuration. Run: switch (config) # configuration write switch (config)#

Step 10.

Reboot the switch to run the new image. Run: switch (config) # reload

Configuration has been modified; save first? [yes] yes

Configuration changes saved.

Rebooting...

switch (config)#

After software reboot, the software upgrade will also automatically upgrade the firmware version.

In order to upgrade the system on dual management system refer to

Section 4.3.1,

“Upgrading MLNX-OS Software,” on page 166 .

When performing upgrade from the WebUI, make sure that the image you are trying to upgrade to is not located already in the system (i.e. fetched from the CLI).

4.3.2

Upgrading MLNX-OS HA Groups

In case fallback is ever necessary in an HA group, all cluster nodes must have the same MLNX-

OS version installed and they must be immediately reloaded.

To upgrade MLNX-OS version without affecting an HA group:

Step 1.

Identify the HA group master.

for MLAG. Run: switch (config)# show mlag-vip

MLAG VIP

========

MLAG group name: my-mlag-group

MLAG VIP address: 1.1.1.1/30

Active nodes: 2

Step 2.

Hostname VIP-State IP Address

----------------------------------------------------

SwitchA master 10.10.10.1

SwitchB standby 10.10.10.2

Upgrade standby nodes in the HA group according to steps 1-8 in section Section 4.3.1, on page 166 .

Mellanox Technologies Confidential 169

Rev 4.20

Step 3.

Step 4.

Wait until all standby nodes have rejoined the group.

Upgrade the master node in the HA group according to steps 1-8 in section Section 4.3.1, on page 166

.

4.3.3

Deleting Unused Images

To delete unused images:

Step 1.

Enter Config mode. Run: switch > switch > enable switch # configure terminal

Step 2.

Step 3.

Get a list of the unused images. Run switch (config) # show images

Images available to be installed:

image-PPC_M460EX-3.1.1224.img

SX-OS_PPC_M460EX 3.1.1224 2011-04-28 12:29:48 ppc

Installed images:

Partition 1:

SX-OS_PPC_M460EX 3.1.0000-dev-HA 2011-04-10 12:02:49 ppc

Partition 2:

SX-OS_PPC_M460EX 3.1.0000-dev-HA 2011-04-10 12:02:49 ppc

Last boot partition: 1

Next boot partition: 1

Boot manager password is set.

No image install currently in progress.

Require trusted signature in image being installed: yes switch (config) #

Delete the unused images. Run: switch config) # image delete image-PPC_M460EX-3.0.1224.img

switch (config) #

When deleting an image, you delete the file but not the partition. This is recommended so as to not overload system resources.

4.3.4

Downgrading MLNX-OS Software

IMPORTANT NOTE

If in possession of an SX65xx director switch with the notice presented in Figure 11, the

lowest MLNX-OS version you can downgrade to is 3.3.5006; otherwise, the switch system will malfunction.

Mellanox Technologies Confidential 170

Figure 11: SX65xx Downgrade Attention Sticker

Rev 4.20

Prior to downgrading software, please make sure the following prerequisites are met:

Step 1.

Step 2.

Log into your switch via the CLI using the console port.

Backup your configuration according to the following steps:

1. Change to Config mode. Run: switch-112094 [standalone: master] > enable switch-112094 [standalone: master] # configure terminal switch-112094 [standalone: master] (config) #

2. Disable paging of CLI output. Run: switch-112094 [standalone: master] (config) # no cli default paging enable

3. Display commands to recreate current running configuration. Run: switch-112094 [standalone: master] (config) # show running-config

4. Copy the output to a text file.

4.3.4.1 Downloading Image

Step 1.

Log into the system to obtain the serial number. Run: switch-112094 [standalone: master] (config) # show inventory

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Download the requested MLNX-OS version from the following link: http://support.mellanox.com/SupportWeb/

Enter your username and password when prompted.

Log into the switch via the CLI using the console port.

Change to Config mode. Run: switch > enable switch # configure terminal switch (config) #

Delete all previous images from the Images available to be installed prior to fetching the new image. Run: switch (config) # image delete image-EFM_PPC_M405EX-ppc-m405ex 20090531-190132.img

Mellanox Technologies Confidential 171

Step 7.

Fetch the requested software image. Run: switch (config) # image fetch scp://username:[email protected]/var/www/html/

<image_name>

100.0%[################################################## ###############]

4.3.4.2 Downgrading Image

The procedure below assumes that booting and running is done from Partition 1 and the downgrade procedure is performed on Partition 2.

Step 1.

Step 2.

Step 3.

Step 4.

Step 5.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Show all image files on the system. Run: switch (config) # show images

Images available to be installed: new_image.img

<downgrade version> 2010-09-19 16:52:50

Installed images:

Partition 1:

<current version> 2010-09-19 03:46:25

Partition 2:

<current version> 2010-09-19 03:46:25

Last boot partition: 1

Next boot partition: 1

No boot manager password is set.

switch (config) #

Install the MLNX-OS image. Run: switch (config) # image install <image_name>

Step 1 of 4: Verify Image

100.0% [#################################################################]

Step 2 of 4: Uncompress Image

100.0% [#################################################################]

Step 3 of 4: Create Filesystems

100.0% [#################################################################]

Step 4 of 4: Extract Image

100.0% [#################################################################] switch (config) #

Show all image files on the system. Run: switch (config) # show images

Images available to be installed: new_image.img

<downgrade version> 2010-09-19 16:52:50

Mellanox Technologies Confidential 172

Rev 4.20

Rev 4.20

Step 6.

Installed images:

Partition 1:

<current version> 2010-09-19 03:46:25

Partition 2:

<downgrade version> 2010-09-19 16:52:50

Last boot partition: 1

Next boot partition: 2

No boot manager password is set.

switch (config) #

Set the boot location to be the other partition (next). Run: switch (config) # image boot next

There are two installed images on the system. Therefore, if one of the images gets corrupted (due to power interruption, for example), in the next reboot the image will go up from the second partition.

Step 7.

In case you are downloading to an older software version which has never been run yet on the switch, use the following command sequence as well: switch (config) # no boot next fallback-reboot enable switch (config) # configuration write

Reload the switch. Run: switch (config) # reload

4.3.4.3 Switching to Partition with Older Software Version

The system saves a backup configuration file when upgrading from an older software version to a newer one. If the system returns to the older software partition, it uses this backup configuration file. Note that all configuration changes done with the new software are lost when returning to the older software version.

There are 2 instances where the backup configuration file does not exist:

• The user has run “reset factory” command, which clears all configuration files in the system

• The user has run “configuration switch-to” to a configuration file with different name then the backup file

Also note that the configuration file becomes empty if the switch is downgraded to a software version which has never been installed yet.

To allow switching partition to the older software version, in these cases above, follow the steps below:

Step 1.

Run the command: switch (config)# no boot next fallback-reboot enable

Step 2.

Set the boot partition. Run: switch (config)# image boot next

Mellanox Technologies Confidential 173

Step 3.

Step 4.

Save the configuration. Run: switch (config)# configuration write

Reload the system. Run: switch (config)# reload

4.3.5

Upgrading System Firmware

Each MLNX-OS software package version has a default switch firmware version. When you update the MLNX-OS software to a new version, an automatic firmware update process will be attempted by MLNX-OS. This process is described below.

4.3.5.1 After Updating MLNX-OS Software

Upon rebooting your switch system after updating the MLNX-OS software, MLNX-OS compares its default firmware version with the currently programmed firmware versions on all the switch modules (leafs and spines on director-class switches, or simply the switch card on edge switch systems).

If one or more of the switch modules is programmed with a firmware version other than the default version, then MLNX-OS automatically attempts to burn the default firmware version instead.

Rev 4.20

If a firmware update takes place, then the login process is delayed a few minutes.

To verify that the firmware update was successful, log into MLNX-OS and run the command

“show asic-version” (can be run in any mode). This command lists all of the switch modules along with their firmware versions. Make sure that all the firmware versions are the same and match the default firmware version. If the firmware update failed for one or more modules, then the following warning is displayed.

Some subsystems are not updated with a default firmware.

If you detect a mismatch in firmware version for one or more modules of the switch system, please contact your assigned Mellanox Technologies field application engineer.

4.3.5.2 Importing Firmware and Changing the Default Firmware

To perform an automatic firmware update by MLNX-OS for a different switch firmware version without changing the MLNX-OS version, import the firmware package as described below.

MLNX-OS sets it as the new default firmware and performs the firmware update automatically as described in the previous subsections.

Mellanox Technologies Confidential 174

Rev 4.20

Default Firmware Change on Standalone Systems

Step 1.

Import the firmware image (.mfa file). Run: switch (config) # image fetch image fetch scp://[email protected]:/tmp/fw-SX-rel-9_2_6440-

FIT.tgz

Password (if required): *******

100.0% [###############################################################################] switch (config) # image default-chip-fw fw-SX-rel-9_2_6440-FIT.mfa

Installing default firmware image. Please wait...

Default Firmware 9.2.6440 updated. Please save configuration and reboot for new FW to take effect.

switch (config) #

Step 2.

Step 3.

Save the configuration. Run: switch (config) # configuration write switch (config) #

Reboot the system to enable auto update.

4.3.6

Image Maintenance via Mellanox ONIE

Supported only on MSX1710-BS2F2O switch system.

The switch system MSX1710-BS2F2O allows booting ONIE and burning a different OS on the switch system.

When booting or rebooting the switch system an ONIE entry has been added to the boot loader options. For example:

GNU GRUB version 2.02~beta2

X86_64 3.4.1932 2015-04-24 18:04:12 x86_64 1

X86_64 3.4.1932 2015-04-24 18:04:12 x86_64 2

ONIE

While MLNX-OS is installed, editing grub entry and grub command line are restricted.

ONIE may be selected from this prompt to allow ONIE functionality over this system. To do so, the MLNX-OS image burned must be uninstalled from the system. Once MLNX-OS is uninstalled, ONIE boots and the user is presented with ONIE command prompt which allows regular

ONIE functionality according to Mellanox SwitchX ONIE Switch User Manual.

To return to MLNX-OS mode, MLNX-OS must be reinstalled using the ONIE Network OS installer file according to the preferred ONIE Network OS installation flow.

Mellanox Technologies Confidential 175

The switch system then loads from factory set configurations (automatically saved configuration is not supported).

All previous MLNX-OS installation flows are supported, therefore, the command

“image fetch” or “image install” may be used to save previous configuration.

Rev 4.20

Mellanox Technologies Confidential 176

Rev 4.20

4.3.7

Commands

This chapter displays all the relevant commands used to manage the system software image.

image boot

image boot {location <location ID> | next}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Specifies the default location where the system should be booted from.

location ID Specifies the default destination location. There can be up to 2 images on the system. The possible values are 1 or 2. next Sets the boot location to be the next once after the one currently booted from, thus avoiding a cycle through all the available locations.

N/A enable/config

3.1.0000

admin switch (config) # image boot location 2 switch (config) # show images

Mellanox Technologies Confidential 177

Rev 4.20

boot next

boot next fallback-reboot enable no boot next fallback-reboot enable

Syntax Description

Default

Sets the default setting for next boot. Normally, if the system fails to apply the configuration on startup (after attempting upgrades or downgrades, as appropriate), it will reboot to the other partition as a fallback.

The no form of the command tells the system not to do that, only for the next boot.

N/A

N/A

Configuration Mode Config

History 3.2.0506

Role

Example admin switch (config) # boot next fallback-reboot enable switch (config) #

Related Commands show images

Notes • Normally, if the system fails to apply the configuration on startup (after attempting upgrades or downgrades, as appropriate) it reboots to the other partition as a fallback.

• The no form of this command tells the system not to do that only for the next boot. In other words, this setting is not persistent, and goes back to enabled automatically after each boot.

• When downgrading to an older software version which has never been run yet on a system, the “fallback reboot” always happens, unless the command “no boot next fallback-reboot enable” is used. However, this also happens when the older software version has been run before, but the configuration file has been switched since upgrading. In general, a downgrade only works (without having the fallback reboot forcibly disabled) if the process can find a snapshot of the configuration file (by the same name as the currently active one) which was taken before upgrading from the older software version. If that is not found, a fallback reboot is performed in preference to falling back to the initial database because the latter generally involves a loss of network connectivity, and avoiding that is of paramount importance.

Mellanox Technologies Confidential 178

boot system

boot system {location | next} no boot system next

Syntax Description

Configures which system image to boot by default.

The no form of the command resets the next boot location to the current active one.

location Specifies location from which to boot system

• 1 – installs to location 1

• 2 – installs to location 2 next Boots system from next location after one currently booted

Default N/A

Configuration Mode Config

History

Role

Example

3.2.0506

admin switch (config) # boot system location 2 switch (config) #

Related Commands show images

Notes

Rev 4.20

Mellanox Technologies Confidential 179

Rev 4.20

image default-chip-fw

image default-chip-fw <file name>

Syntax Description

Default

Sets the default firmware package to be installed.

filename

N/A

Configuration Mode Config

Specifies the firmware filename.

History

Role

Example

3.1.0000

admin switch (config) # image default-chip-fw image-SX_PPC_M460EX-ppc-m460ex-

20120122-084759.img

switch (config) #

Related Commands image install-chip fw show images

Notes

Mellanox Technologies Confidential 180

image delete

image delete <image name>

Syntax Description

Default

Deletes the specified image file.

image name

N/A

Configuration Mode Config

Specifies the image name.

History

Role

Example

3.1.0000

admin switch (config) # image delete image-MLXNX-OS-201140526-010145.img

switch (config) #

Related Commands show images

Notes

Rev 4.20

Mellanox Technologies Confidential 181

image fetch

image fetch <URL> [<filename>]

Syntax Description

Downloads an image from the specified URL or via SCP.

URL HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported. Example: scp://username[:password]@hostname/path/filename.

filename Specifies a filename for this image to be stored as locally.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # image fetch scp://<username>@192.168.10.125/var/www/ html/<image_name>

Password ******

100.0%[############################################################] switch (config) #

Related Commands show images

Notes • Please delete the previously available image, prior to fetching the new image

• See section “Upgrading MLNX-OS SX Software,” in the Mellanox SwitchX® User Man-

ual for a full upgrade example

Rev 4.20

Mellanox Technologies Confidential 182

image install

image install <image filename> [location <location ID>] | [progress <progoptions>] [verify <ver-options>]

Syntax Description

Installs the specified image file.

image filename Specifies the image name.

location ID prog-options ver-options

Specifies the image destination location.

• “no-track” overrides CLI default and does not track the installation progress

• “track” overrides CLI default and tracks the installation progress

• “check-sig” requires an image to have either a valid signature or no signature

• “ignore-sig” allows unsigned or invalidly signed images to be installed

• “require-sig” requires from the installed image to have a valid signature. If a valid signature is not found on the image, the image cannot be installed.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # image install SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-

22 08:47:59 ppc

Step 1 of 4: Verify Image

100.0%

[################################################################]

Step 2 of 4: Uncompress Image

100.0%

[################################################################]

Step 3 of 4: Create Filesystems

100.0%

[################################################################]

Step 4 of 4: Extract Image

100.0%

[################################################################] switch (config) #

Related Commands show images

Notes • The image cannot be installed on the “active” location (the one which is currently being booted)

• On a two-location system, the location is chosen automatically if no location is specified

Rev 4.20

Mellanox Technologies Confidential 183

image move

image move <src image name> <dest image name>

Syntax Description

Renames the specified image file.

src image name Specifies the old image name.

Specifies the new image name.

Default dest image name

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # image move image1.img image2.img

switch (config) #

Related Commands show images

Notes

Rev 4.20

Mellanox Technologies Confidential 184

image options

image options {require-sig | serve} no image options {require-sig | serve all}

Syntax Description

Configures options and defaults for image usage.

The no form of the command disables options and defaults for image usage.

require-sig serve all

Requires images to be signed by a trusted signature

Configures options for serving image files from this appliance all Makes all image files on this appliance available for

HTTP and HTTPS download

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # image options require-sig switch (config) #

Related Commands show images

Notes

Rev 4.20

Mellanox Technologies Confidential 185

show bootvar

show bootvar

Syntax Description

Default

Displays the installed system images and the boot parameters.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show bootvar

Installed images:

Partition 1:

SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-22 08:47:59 ppc

Last dobincp: 2012/01/23 14:54:23

Partition 2:

SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-18 09:52:41 ppc

Last dobincp: 2012/01/19 16:48:23

Last boot partition: 1

Next boot partition: 1

Boot manager password is set.

No image install currently in progress.

Image signing: trusted signature always required

Admin require signed images: yes

Settings for next boot only:

Fallback reboot on configuration failure: yes (default) switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 186

show images

show image

Syntax Description

Default

Displays information about the system images and boot parameters.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show images

Images available to be installed:

image-SX_PPC_M460EX-ppc-m460ex-20120122-084759.img

SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-22 08:47:59 ppc

Installed images:

Partition 1:

SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-22 08:47:59 ppc

Last dobincp: 2012/01/23 14:54:23

Partition 2:

SX_PPC_M460EX 3.0.0000-dev-HA 2012-01-18 09:52:41 ppc

Last dobincp: 2012/01/19 16:48:23

Last boot partition: 1

Next boot partition: 1

Boot manager password is set.

No image install currently in progress.

Image signing: trusted signature always required

Admin require signed images: yes

Settings for next boot only:

Fallback reboot on configuration failure: yes (default) switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 187

4.4

Configuration Management

4.4.1

Saving a Configuration File

To save the current configuration to the active configuration file, you can either use the configuration write command (requires running in Config mode) or the write memory command

(requires running in Enable mode).

• To save the configuration to the active configuration file, run: switch (config) # configuration write

• To save the configuration to a user-specified file without making the new file the active configuration file, run: switch (config) # configuration write to myconf no-switch

• To save the configuration to a user-specified file and make the new file the active configuration file, run: switch (config) # configuration write to myconf

• To display the available configuration files and the active file, run: switch (config) # show configuration files initial myconf (active) switch (config) #

4.4.2

Loading a Configuration File

By default, or after a system reset, the system loads the default “initial” configuration file.

To load a different configuration file and make it the active configuration: switch [standalone: master] > switch [standalone: master] > enable switch [standalone: master] # configure terminal switch [standalone: master] (config) # configuration switch-to myconfig switch [standalone: master] (config) #

4.4.3

Restoring Factory Default Configuration

In cases where the system configuration becomes corrupted it is suggested to restore the factory default configuration.

To restore factory default configuration on a single management module system:

Step 1.

Run the command reset factory [reboot] [keep-basic] [keep-all-config]:.

switch (config) # reset factory keep-basic

4.4.4

Managing Configuration Files

There are two types of configuration files that can be applied on the switch, BIN files (binary) and text-based configuration files.

Rev 4.20

Mellanox Technologies Confidential 188

4.4.4.1 BIN Configuration Files

BIN configuration files are not human readable and cannot be edited.

To create a new BIN configuration file switch (config) # configuration new my-filename

To upload a BIN configuration file from a switch to an external file server switch (config) # configuration upload my-filename scp://root@my-server/root/tmp/myfilename

To fetch a BIN configuration file switch (config) # configuration fetch scp://root@my-server/root/tmp/my-filename

To see the available configuration files switch (config) # show configuration files initial (active) my-filename

Active configuration: initial

Unsaved changes: no switch (config) #

To load a BIN configuration file: switch (config) # configuration switch-to my-filename

Applying a new BIN configuration file changes the whole switch’s configuration and requires system reboot which can be preformed using the command reload .

4.4.4.2 Text Configuration Files

Text configuration files are text based and editable.

To create a new text-based configuration file: switch (config) # configuration text generate active running save my-filename

To apply a text-based configuration file: switch (config) # configuration text file my-filename apply

Applying a text-based configuration file to an existing/running data port configuration may result in unpredictable behavior. It is therefore suggested to first clear the switch’s

configuration by applying a specific configuration file (following the procedure in Section 4.4.4.1

) or by resetting the switch back to factory default.

Rev 4.20

Mellanox Technologies Confidential 189

To upload a text-based configuration file from a switch to an external file server switch (config) # configuration text file my-filename upload scp://root@my-server/root/ tmp/my-filename

To fetch a text-based configuration file from an external file server to a switch switch (config) # configuration text fetch scp://root@my-server/root/tmp/my-filename

To apply a text-based configuration file: switch (config) # configuration text file my-filename apply

When applying a text-based configuration file, the configuration is appended to the switch’s existing configuration. Reboot is not required.

Rev 4.20

Mellanox Technologies Confidential 190

4.4.5

Commands

4.4.5.1 File System

debug generate dump

debug generate dump

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Generates a debug dump.

N/A

N/A

Config

3.1.0000

admin switch (config) # debug generate dump

Generated dump sysdump-switch-112104-201140526-091707.tgz

switch (config) # file debug-dump

The dump can then be manipulated using the “file debug-dump...” commands.

Rev 4.20

Mellanox Technologies Confidential 191

Rev 4.20

file debug-dump

file debug-dump {delete {<filename> | latest} | email {<filename> | latest} | upload {{<filename> | latest} <URL>}}

Syntax Description

Manipulates debug dump files.

delete {<filename> | latest}

Deletes a debug dump file.

email {<filename> | latest} upload {{<filename> | latest} <URL>}}

Emails a debug dump file to pre-configured recipients for “informational events”, regardless of whether they have requested to receive “detailed” notifications or not.

Uploads a debug dump file to a remote host. The URL to the remote host: HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported. Example: scp://username[:password]@hostname/path/filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

3.3.4000

Initial release

Added “latest” parameter admin switch (config) # file debug-dump email sysdump-switch-112104-20114052-

091707.tgz

switch (config) #

Related Commands show files debug-dump

Notes

Mellanox Technologies Confidential 192

Rev 4.20

file stats

file stats {delete <filename> | move {<source filename> | <destination filename>}

| upload <filename> <URL>}

Syntax Description

Manipulates statistics report files.

delete <filename> Deletes a stats report file.

Renames a stats report file.

move <source filename>

<destination filename> upload <filename>

<URL>

Uploads a stats report file.

URL - HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported. Example: scp://username[:password]@hostname/path/filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # file stats move memory-1.csv memory-2.csv

switch (config) #

Related Commands show files stats show files stats <filename>

Notes

Mellanox Technologies Confidential 193

Rev 4.20

file tcpdump

Syntax Description file tcpdump {delete <filename> | upload <filename> <URL>}

Manipulates tcpdump output files.

delete <filename> Deletes the specified tcpdump output file.

upload <filename>

<URL>

Uploads the specified tcpdump output file to the specified URL.

URL - HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported. Example: scp://username[:password]@hostname/path/filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # file tcmpdump delete my-tcpdump-file.txt

switch (config) #

Related Commands show files stats tcpdump

Notes

Mellanox Technologies Confidential 194

reload

reload [force immediate | halt [noconfirm] | noconfirm]

Syntax Description

Reboots or shuts down the system.

force immediate Forces an immediate reboot of the system even if the system is busy.

halt noconfirm

Shuts down the system.

Reboots the system without asking about unsaved changes.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # reload

Configuration has been modified; save first? [yes] yes

Configuration changes saved.

...

switch (config) #

Related Commands reset factory

Notes

Rev 4.20

Mellanox Technologies Confidential 195

Rev 4.20

reset factory

reset factory [keep-all-config | keep-basic | keep-virt-vols | only-config] [halt]

Syntax Description

Clears the system and resets it entirely to its factory state.

keep-all-cofig Preserves everything in the running configuration file.

The user will be prompted for confirmation before honoring this command, unless confirmation is disabled with the command: “no cli default prompt confirmreset”.

keep-basic keep-virt-vols

Preserves licenses in the running configuration file

Preserve all virtual disk volumes only-config halt

Default N/A

Configuration Mode Config

History 3.1.0000

3.4.0000

Role

Example

Resets only configuration

The system is halted after this process completes

Added notes and “keep-virt-vols” parameter admin switch (config) # reset factory

Type 'YES' to confirm reset: YES

Resetting and rebooting the system -- please wait...

...

Related Commands reload

Notes • Effects of parameter “keep-all-cofig”: Licenses – not deleted; profile – no change;

 configuration – unchanged; management IP – unchanged

• Effects of parameter “keep-basic”: Licenses – not deleted; profile – reset; configuration – reset; management IP – reset

• Effects of parameter “keep-virt-vols”: Licenses – deleted; profile – reset; configuration – reset; management IP – unchanged

• Effects of parameter “only-config”: Licenses – deleted; profile – reset; configuration – reset; management IP – unchanged

Mellanox Technologies Confidential 196

Rev 4.20

show files debug-dump

show files debug-dump [<filename>]

Syntax Description

Displays a list of debug dump files.

filename Displays a summary of the contents of a particular debug dump file.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show files debug-dump sysdump-switch-112104-20114052-

091707.tgz

System information:

Hostname: switch-112104

Version: SX_PPC 3.1.0000 2011-05-25 13:59:00 ppc

Date: 2012-01-26 09:17:07

Uptime: 0d 18h 47m 48s

==================================================

Output of 'uname -a':

Linux switch-112104 2.6.27-MELLANOXuni-m405ex SX_PPC 3.1.0000 #1 2012-

01-25 13:59:00 ppc ppc ppc GNU/Linux

==================================================

..................................................

switch (config) #

Related Commands file debug-dump

Notes

Mellanox Technologies Confidential 197

Rev 4.20

show files stats

show files stats <filename>

Syntax Description

Default

Displays a list of statistics report files.

filename

N/A

Configuration Mode Config

Display the contents of a particular statistics report file.

History

Role

Example

3.1.0000

admin switch (config) # show files stats memory-201140524-111745.csv

switch (config) #

Related Commands file stats

Notes

Mellanox Technologies Confidential 198

show files system

show files system [detail]

Syntax Description

Default

Displays usage information of the file systems on the system.

detail

N/A

Configuration Mode Config

Displays more detailed information on file-system.

History

Role

Example

3.1.0000

admin switch (config) # show files system

Statistics for /config filesystem:

Bytes Total 100 MB

Bytes Used 3 MB

Bytes Free 97 MB

Bytes Percent Free 97%

Bytes Available 97 MB

Inodes Total 0

Inodes Used 0

Inodes Free 0

Inodes Percent Free 0%

Statistics for /var filesystem:

Bytes Total 860 MB

Bytes Used 209 MB

Bytes Free 651 MB

Bytes Percent Free 75%

Bytes Available 651 MB

Inodes Total 0

Inodes Used 0

Inodes Free 0

Inodes Percent Free 0% switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 199

show files tcpdump

show files tcpdump

Syntax Description

Default

Displays a list of statistics report files.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show files stats test dump3 switch (config) #

Related Commands file tcpdump tcpdump

Notes

Rev 4.20

Mellanox Technologies Confidential 200

4.4.5.2 Configuration Files

configuration audit

configuration audit max-changes <number>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Chooses settings related to configuration change auditing.

max-changes Set maximum number of audit messages to log per change.

1000

Config

3.1.0000

admin switch (config) # configuration audit max-changes 100 switch (config) # show configuration audit

Maximum number of changes to log: 100 switch (config) # show configuration

N/A

Rev 4.20

Mellanox Technologies Confidential 201

Rev 4.20

configuration copy

configuration copy <source name> <dest name>

Syntax Description

Copies a configuration file.

source name Name of source file.

dest name Name of destination file. If the file of specified filename does not exist a new file will be created with said filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration copy initial.bak example switch (config) #

Related Commands

Notes • This command does not affect the current running configuration

• The active configuration file may not be the target of a copy. However, it may be the source of a copy in which case the original remains active.

Mellanox Technologies Confidential 202

configuration delete

configuration delete <filename>

Syntax Description

Default

Deletes a configuration file.

filename

N/A

Configuration Mode Config

Name of file to delete.

History

Role

Example

3.1.0000

admin switch (config) # show configuration files example initial initial.bak initial.prev

switch (config) # configuration delete example switch (config) # show configuration files initial initial.bak initial.prev

switch (config) #

Related Commands show configuration

Notes • This command does not affect the current running configuration

• The active configuration file may not be deleted

Rev 4.20

Mellanox Technologies Confidential 203

Rev 4.20

configuration fetch

configuration fetch <URL> [<name>]

Syntax Description

Downloads a configuration file from a remote host.

URL HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported. Example: scp://username[:password]@hostname/path/filename.

The configuration file name.

Default name

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration fetch scp://root:password@

192.168.10.125/tmp/conf1 switch (config) #

Related Commands configuration switch-to

Notes • The downloaded file should not override the active configuration file, using the <name> parameter

• If no name is specified for a configuration fetch, it is given the same name as it had on the server

• No configuration file may have the name “active”

Mellanox Technologies Confidential 204

Rev 4.20

configuration jump-start

configuration jump-start

Syntax Description

Default

Runs the initial-configuration wizard.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration jump-start

Mellanox configuration wizard

Step 1: Hostname? [switch-3cc29c]

Step 2: Use DHCP on mgmt0 interface? y

Step 3: Admin password (Enter to leave unchanged)?

You have entered the following information:

1. Hostname: switch-3cc29c

2. Use DHCP on mgmt0 interface: yes

3. Enable IPv6: yes

4. Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes

53. Admin password (Enter to leave unchanged): (unchanged)

To change an answer, enter the step number to return to.

Otherwise hit <enter> to save changes and exit.

Choice:

Configuration changes saved.

switch (config) #

Related Commands N/A

Notes • The wizard is automatically invoked whenever the CLI is launched when the active configuration file is fresh (i.e. not modified from its initial contents)

• This command invokes the wizard on demand – see chapter “Initializing the Switch for the

First Time” in the Mellanox MLNX-OS SwitchX User Manual

Mellanox Technologies Confidential 205

configuration merge

configuration merge <filename>

Syntax Description

Default

Merges the “shared configuration” from one configuration file into the running configuration.

filename

N/A

Configuration Mode Config

History 3.1.0000

Name of file from which to merge settings.

Role

Example admin switch (config) # configuration merge new-config-file switch (config) #

Related Commands

Notes • No configuration files are modified during this process

• The configuration name must be a non-active configuration file

Rev 4.20

Mellanox Technologies Confidential 206

configuration move

configuration move <source name> <dest name>

Syntax Description

Moves a configuration file.

source name Old name of file to move.

New name for moved file.

Default dest name

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show configuration files example1 initial initial.bak initial.prev

switch (config) # configuration move example1 example2 switch (config) # show configuration files example2 initial initial.bak initial.prev

switch (config) #

Related Commands show configuration

Notes • This command does not affect the current running configuration

• The active configuration file may not be the target of a move

Rev 4.20

Mellanox Technologies Confidential 207

configuration new

configuration new <filename> [factory [keep-basic] [keep-connect]]

Syntax Description

Creates a new configuration file under the specified name. The parameters specify what configuration, if any, to carry forward from the current running configuration.

filename factory

Names for new configuration file.

Creates new file with only factory defaults.

keep-basic keep-connect

Keeps licenses and host keys.

Keeps configuration necessary for connectivity (interfaces, routes, and ARP).

Default Keeps licenses and host keys

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show configuration files initial initial.bak initial.prev

switch (config) # configuration new example2 switch (config) # show configuration files example2 initial initial.bak initial.prev

switch (config) #

Related Commands show configuration

Notes

Rev 4.20

Mellanox Technologies Confidential 208

Rev 4.20

configuration switch-to

configuration switch-to <filename>

Syntax Description

Default

Loads the configuration from the specified file and makes it the active configuration file.

N/A

N/A

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # show configuration files initial (active) newcon initial.prev

initial.bak

switch (config) # configuration switch-to newcon switch (config) # show configuration files initial newcon (active) initial.prev

initial.bak

switch (config) #

Related Commands show configuration files

Notes The current running configuration is lost and not automatically saved to the previous active configuration file.

Mellanox Technologies Confidential 209

Rev 4.20

configuration text fetch

configuration text fetch <URL> [apply [discard | fail-continue | filename | overwrite | verbose] | filename <filename> | overwrite [apply | filename <filename>]]

Syntax Description

Fetches a text configuration file (list of CLI commands) from a specified URL.

apply Applies the file to the running configuration (i.e. executes the commands in it). This option has the following parameters:

• discard: Does not keep downloaded configuration text file after applying it to the system

• fail-continue: If applying commands, continues execution even if one of them fails

• overwrite: If saving the file and the filename already exists, replaces the old file

• verbose: Displays all commands being executed and their output instead of just those that get errors filename overwrite

Specifies filename for saving downloaded text file.

Downloads the file and saves it using the same name it had on the server. This option has the following parameters:

• apply: Applies the downloaded configuration to the running system

• filename: Specifies filename for saving downloaded text file

Default N/A

Configuration Mode Config

History

Role

Example

3.2.1000

3.2.3000

First version

Updated command admin switch (config) # configuration fetch text scp://username[:password]@hostname/path/filename

Related Commands N/A

Notes

Mellanox Technologies Confidential 210

configuration text file

configuration text file <filename> {apply [fail-continue] [verbose] | delete | rename <filename> | upload < URL>}

Syntax Description

Performs operations on text-based configuration files.

filename <file> Specifies the filename.

apply fail-continue

Applies the configuration on the system.

Continues execution of the commands even if some commands fail.

verbose delete rename <filename> upload <URL>

Displays all commands being executed and their output, instead of just those that get errors.

Deletes the file.

Renames the file.

Supported types are HTTP, HTPPS, FTP, TFTP, SCP and SFTP. For example: scp://username[:password]@hostname/path/filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration text file my-config-file delete switch (config) #

Related Commands show configuration files

Notes

Rev 4.20

Mellanox Technologies Confidential 211

configuration text generate

configuration text generate {active {running | saved} | file <filename> } {save

<filename> | upload <URL>}

Syntax Description

Generates a new text-based configuration file from this system's configuration.

active Generates from currently active configuration.

running saved

Uses running configuration.

Uses saved configuration.

file <filename> save upload <URL>

Generates from inactive saved configuration.

Saves new file to local persistent storage.

Supported types are HTTP, HTPPS, FTP, TFTP, SCP and SFTP. For example: scp://username[:password]@hostname/path/filename.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration text generate file initial.prev save example switch (config) # show configuration files initial (active) initial.prev

initial.bak

Active configuration: initial

Unsaved changes: yes switch (config) #

Related Commands show configuration files

Notes

Rev 4.20

Mellanox Technologies Confidential 212

configuration upload

configuration upload {active | <name>} <URL or scp or sftp://username:password@hostname[:port]/path/filename>

Syntax Description

Default

Uploads a configuration file to a remote host.

active

N/A

Configuration Mode Config

Upload the active configuration file.

History

Role

Example

3.1.0000

admin switch (config) # configuration upload active scp://root:password@

192.168.10.125/tmp/conf1 switch (config) #

Related Commands N/A

Notes No configuration file may have the name “active”.

Rev 4.20

Mellanox Technologies Confidential 213

Rev 4.20

configuration write

configuration write [local | to <filename> [no-switch]]

Syntax Description

Saves the running configuration to the active configuration file.

local Saves the running configuration locally (same as “write memory local”) to <filename> no-switch

Saves the running configuration to a new file under a different name and makes it the active file

Saves the running configuration to this file but keep the current one active

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # configuration write switch (config) #

Related Commands write

Notes

Mellanox Technologies Confidential 214

Rev 4.20

write

write {memory [local] | terminal}

Syntax Description

Saves or displays the running configuration.

memory Saves running configuration to the active configuration file. It is the same as “configuration write”.

local terminal

Saves the running configuration only on the local node.

It is the same as “configuration write local”.

Displays commands to recreate current running configuration. It is the same as “show running-config”.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # write terminal

##

## Running database "initial"

## Generated at 20114/05/27 10:05:16 +0000

## Hostname: switch

##

##

## Network interface configuration

## interface mgmt0 comment "" interface mgmt0 create interface mgmt0 dhcp interface mgmt0 display interface mgmt0 duplex auto interface mgmt0 mtu 1500 no interface mgmt0 shutdown interface mgmt0 speed auto no interface mgmt0 zeroconf

##

## Local user account configuration

## username a** capability admin no username a** disable username a** disable password

......

switch (config) #

Related Commands show running-config configuration write

Notes

Mellanox Technologies Confidential 215

Rev 4.20

show configuration

show configuration [audit | files [<filename>] | running | text files]

Syntax Description

Default N/A

Configuration Mode Config

History 3.1.0000

3.3.5006

Role

Example monitor/admin

Removed “running full” and “full” parameters switch (config) # show configuration

##

## Active saved database "newcon"

## Generated at 20114/05/25 10:18:52 +0000

## Hostname: switch-3cc29c

##

##

## Network interface configuration

## interface mgmt0 comment "" interface mgmt0 create interface mgmt0 dhcp interface mgmt0 display interface mgmt0 duplex auto interface mgmt0 mtu 1500 no interface mgmt0 shutdown interface mgmt0 speed auto no interface mgmt0 zeroconf switch (config) #

Related Commands

Notes

Displays a list of CLI commands that will bring the state of a fresh system up to match the current persistent state of this system.

audit files [<filename>]

Displays settings for configuration change auditing.

Displays a list of configuration files in persistent storage if no filename is specified. If a filename is specified, it displays the commands to recreate the configuration in that file. In the latter case, only nondefault commands are shown, as for the normal “show configuration” command.

running text files

Displays commands to recreate current running configuration. Same as “show configuration” except that it applies to the currently running configuration, rather than the current persisted configuration.

Displays names of available text-based configuration files.

Mellanox Technologies Confidential 216

show running-config

show running-config

Syntax Description

Default

Displays commands to recreate current running configuration.

N/A

N/A

Configuration Mode Config

History 3.1.0000

3.3.4402

Removed “full” parameter

Role

Example monitor/admin switch (config) # show running-config

##

## Running database "initial"

## Generated at 2012/02/28 14:59:02 +0000

## Hostname: switch-5ea5d8

##

##

## License keys

##

license install LK2-EFM_SX-5M11-5K11-5HGL-0KAL-64QK-8C2Q-60Q3-6C1G

##

## Network interface configuration

##

interface mgmt0 create

interface mgmt0 comment ""

interface mgmt0 dhcp

interface mgmt0 display

interface mgmt0 duplex auto

interface mgmt0 mtu 1500 no interface mgmt0 shutdown

...

switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 217

Rev 4.20

4.5

Logging

4.5.1

Monitor

To print logging events to the terminal:

Set the modules or events you wish to print to the terminal. For example, run: switch (config) # logging monitor events notice switch (config) # logging monitor sx-sdk warning

These commands print system events in severity “notice” and sx-sdk module notifications in severity

“warning” to the screen. For example, in case of interface-down event, the following gets printed to the screen.

switch (config) #

Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN

Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN switch (config) #

To see a list of the events, refer to Table 22, “Supported Event Notifications and MIB Mapping,” on page 257

.

4.5.2

Remote Logging

To configure remote syslog to send syslog messages to a remote syslog server:

Step 1.

Enter Config mode. Run: switch > switch > enable switch # configure terminal

Step 2.

Step 3.

Step 4.

Set remote syslog server. Run switch (config) # logging <IP address>

Set the minimum severity of the log level to info. Run: switch (config) # logging <IP address> trap info

Override the log levels on a per-class basis. Run: switch (config) # logging <IP address> trap override class <class name> priority <level>

Mellanox Technologies Confidential 218

Rev 4.20

4.5.3

Commands

logging <syslog IP address>

logging <syslog IP address> [trap {<log-level> | override class <class> priority

<log-level>}] no logging <syslog IP address> [trap {<log-level> | override class <class> priority <log-level>}]

Syntax Description

Enables (by setting the IP address) sending logging messages, with ability to filter the logging messages according to their classes.

The no form of the command stops sending messages to the remote syslog server.

syslog IP address log-level

IPv4 address of the remote syslog server.

• alert - alert notification, action must be taken immediately

• crit - critical condition

• debug - debug level messages

• emerg - system is unusable (emergency)

• err - error condition

• info - informational condition

• none - disables the logging locally and remotely

• notice - normal, but significant condition

• warning - warning condition class log-level

Sets or removes a per-class override on the logging level. All classes which do not have an override set will use the global logging level set with “logging local

<log level>”. Classes that do have an override will do as the override specifies. If “none” is specified for the log level, MLNX-OS will not log anything from this class.

Classes available:

• iss-modules - protocol stack

• mgmt-back - system management back-end

• mgmt-core - system management core

• mgmt-front - system management front-end

• mlx-daemons - management daemons

• sx-sdk - switch SDK

• alert - alert notification, action must be taken immediately

• crit - critical condition

• debug - debug level messages

• emerg - system is unusable (emergency)

• err - error condition

• info - informational condition

• none - disables the logging locally and remotely

• notice - normal, but significant condition

• warning - warning condition

Default Remote logging is disabled

Configuration Mode Config

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 219

Example switch (config) # logging local info switch (config) # show logging

Local logging level: info

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: disabled

Levels at which messages are logged:

CLI commands: notice

Audit messages: notice switch (config) #

Related Commands show logging logging local override

Notes

Rev 4.20

Mellanox Technologies Confidential 220

Rev 4.20

logging debug-files

logging debug-files {delete {current | oldest} | rotation {criteria | force | maxnum} | update {<number> | current} | upload <log-file> <upload URL>}

Syntax Description

Configures settings for debug log files.

delete {current | oldest} Deletes certain debug-log files.

• current: Deletes the current active debug-log file

• oldest: Deletes some of the oldest debug-log files rotation {criteria

{frequency {daily | weekly | monthly} | size

<size> | size-pct

<percentage>} | force | max-num} update {<number> | current}

Configures automatic rotation of debug-logging files.

• criteria: Sets how the system decides when to rotate debug files.

• frequency: Rotate log files on a fixed time-based schedule

• size: Rotate log files when they pass a size threshold in megabytes

• size-pct: Rotate logs when they surpass a specified percentage of disk

• forces: Forces an immediate rotation of the log files

• max-num: Specifies the maximum number of old log files to keep

Uploads a local debug-log file to a remote host.

• current: Uploads log file “messages” to a remote host

• number: Uploads compressed log file “debug.<number>.gz” to a remote host. Range is 1-10 upload log-file upload URL

Uploads debug log file to a remote host

Possible values: 1-7, or current

HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported (e.g.: scp://username[:password]@hostname/ path/filename)

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config) # logging debug-files delete current switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 221

Rev 4.20

logging local override

logging local override [class <class> priority <log-level>] no logging local override [class <class> priority <log-level>]

Syntax Description

Enables class-specific overrides to the local log level.

The no form of the command disables all class-specific overrides to the local log level without deleting them from the configuration, but disables them so that the logging level for all classes is determined solely by the global setting.

override class

Enables class-specific overrides to the local log level.

log-level

Sets or removes a per-class override on the logging level. All classes which do not have an override set will use the global logging level set with “logging local

<log level>”. Classes that do have an override will do as the override specifies. If “none” is specified for the log level, MLNX-OS will not log anything from this class.

Classes available:

• debug-module - debug module functionality

• protocol-stack - protocol stack modules functionality

• mgmt-back - system management back-end components

• mgmt-core - system management core

• mgmt-front - system management front-end components

• mlx-daemons - management daemons

• sx-sdk - switch SDK

• alert - alert notification, action must be taken immediately

• crit - critical condition

• debug - debug level messages

• emerg - system is unusable (emergency)

• err - error condition

• info - informational condition

• none - disables the logging locally and remotely

• notice - normal, but significant condition

• warning - warning condition

Default Override is disabled.

Configuration Mode Config

History 3.1.0000

3.3.4150

Added debug-module class

Changed iss-modules with protocol-stack

Role admin

Mellanox Technologies Confidential 222

Example switch (config) # logging local override class mgmt-front priority warning switch (config) # show logging

Local logging level: info

Override for class mgmt-front: warning

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: disabled

Levels at which messages are logged:

CLI commands: notice

Audit messages: notice switch (config) #

Related Commands show logging logging local

Notes

Rev 4.20

Mellanox Technologies Confidential 223

Rev 4.20

logging fields

logging fields seconds {enable | fractional-digits <f-digit> | whole-digits <wdigit>} no logging fields seconds {enable | fractional-digits <f-digit> | whole-digits <wdigit>}

Syntax Description

Specifies whether to include an additional field in each log message that shows the number of seconds since the Epoch or not.

The no form of the command disallows including an additional field in each log message that shows the number of seconds since the Epoch.

enable Specifies whether to include an additional field in each log message that shows the number of seconds since the Epoch or not.

f-digit w-digit

The fractional-digits parameter controls the number of digits to the right of the decimal point. Truncation is done from the right.

Possible values are: 1, 2, 3, or 6.

The whole-digits parameter controls the number of digits to the left of the decimal point. Truncation is done from the left. Except for the year, all of these digits are redundant with syslog's own date and time.

Possible values: 1, 6, or all.

Default disabled

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # logging fields seconds enable switch (config) # logging fields seconds whole-digits 1 switch (config) # show logging

Local logging level: info

Override for class mgmt-front: warning

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: enabled

Subsecond timestamp precision: 1 whole digit; 3 fractional digits

Levels at which messages are logged:

CLI commands: notice

Audit messages: notice switch (config) #

Mellanox Technologies Confidential 224

Related Commands show logging

Notes This is independent of the standard syslog date and time at the beginning of each message in the format of “July 15 18:00:00”. Aside from indicating the year at full precision, its main purpose is to provide subsecond precision.

Rev 4.20

Mellanox Technologies Confidential 225

logging files delete

logging files delete {current | oldest [<number of files>]}

Syntax Description

Deletes the current or oldest log files.

current Deletes current log file.

oldest number of files

Deletes oldest log file.

Sets the number of files to be deleted.

Default CLI commands and audit message are set to notice logging level

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # logging files delete current switch (config) #

Related Commands show logging show log files

Notes

Rev 4.20

Mellanox Technologies Confidential 226

Rev 4.20

logging files rotation

logging files rotation {criteria { frequency <freq> | size <size-mb>| size-pct <sizepercentage>} | force | max-number <number-of-files>}

Syntax Description

Sets the rotation criteria of the logging files.

freq size-mb

Sets rotation criteria according to time. Possible options are:

• Daily

• Weekly

• Monthly

Sets rotation criteria according to size in mega bytes.

The range is 1-9999.

size-percentage force number-of-files

Sets rotation criteria according to size in percentage of the partition where the logging files are kept in. The percentage given is truncated to three decimal points

(thousandths of a percent).

Forces an immediate rotation of the log files. This does not affect the schedule of auto-rotation if it was done based on time: the next automatic rotation will still occur at the same time for which it was previously scheduled. Naturally, if the auto-rotation was based on size, this will delay it somewhat as it reduces the size of the active log file to zero.

The number of log files will be kept. If the number of log files ever exceeds this number (either at rotation time, or when this setting is lowered), the system will delete as many files as necessary to bring it down to this number, starting with the oldest.

Default 10 files are kept by default with rotation criteria of 5% of the log partition size

Configuration Mode Config

History

Role

3.1.0000

admin

Mellanox Technologies Confidential 227

Example switch (config) # logging files rotation criteria size-pct 6 switch (config) # show logging

Local logging level: info

Override for class mgmt-front: warning

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 6.000% of partition (51.60 megabytes)

Log format: standard

Subsecond timestamp field: enabled

Subsecond timestamp precision: 1 whole digit; 3 fractional digits

Levels at which messages are logged:

CLI commands: info

Audit messages: notice switch (config)

Related Commands show logging show log files

Notes

Rev 4.20

Mellanox Technologies Confidential 228

logging files upload

logging files upload {current | <file-number>} <url>

Syntax Description

Uploads a log file to a remote host.

current The current log file.

The current log file will have the name “messages” if you do not specify a new name for it in the upload

URL.

file-number url

An archived log file.

The archived log file will have the name “messages<n>.gz” (while “n” is the file number) if you do not specify a new name for it in the upload URL. The file will be compressed with gzip.

Uplaods URL path.

FTP, TFTP, SCP, and SFTP are supported. For example: scp://username[:password]@hostname/path/filename.

Default 10 files are kept by default with rotation criteria of 5% of the log partition size

Configuration Mode Config

History

Role

3.1.0000

admin

Example switch (config) # logging files uplaod 1 scp://admin@scpserver

Related Commands show logging show log files

Notes

Rev 4.20

Mellanox Technologies Confidential 229

logging format

logging format {standard | welf [fw-name <hostname>]} no logging format {standard | welf [fw-name <hostname>]}

Sets the format of the logging messages.

The no form of the command resets the format to its default.

Syntax Description welf hostname

Default standard

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # logging format standard switch (config) # show logging

Local logging level: info

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: yes

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: disabled

Levels at which messages are logged:

CLI commands: notice

Audit messages: notice switch (config) #

Related Commands show logging

Notes

WebTrends Enhanced Log file (WELF) format.

Specifies the firewall hostname that should be associated with each message logged in WELF format. If no firewall name is set, the hostname is used by default.

Rev 4.20

Mellanox Technologies Confidential 230

Rev 4.20

logging level

logging level {cli commands <log-level> | audit mgmt <log-level>}

Syntax Description

Sets the severity level at which CLI commands or the management audit message that the user executes are logged. This includes auditing of both configuration changes and actions.

cli commands audit mgmt

Sets the severity level at which CLI commands which the user executes are logged.

Sets the severity level at which all network management audit messages are logged.

log-level

Default

Configuration Mode Config

• alert - alert notification, action must be taken immediately

• crit - critical condition

• debug - debug level messages

• emerg - system is unusable (emergency)

• err - error condition

• info - informational condition

• none - disables the logging locally and remotely

• notice - normal, but significant condition

• warning - warning condition

CLI commands and audit message are set to notice logging level

History

Role

Example

3.1.0000

admin switch (config) # logging level cli commands info switch (config) # show logging

Local logging level: info

Override for class mgmt-front: warning

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: enabled

Subsecond timestamp precision: 1 whole digit; 3 fractional digits

Levels at which messages are logged:

CLI commands: info

Audit messages: notice switch (config) #

Related Commands show logging

Notes

Mellanox Technologies Confidential 231

logging monitor

logging monitor <facility> <priority-level> no logging monitor <facility> <priority-level>

Syntax Description

Default no logging monitor

Configuration Mode Config

History

Role

Example

3.3.4000

admin switch (config) # logging monitor events notice switch (config) #

Related Commands

Notes

Sets monitor log facility and level to print to the terminal.

The no form of the command disables printing logs of facilities to the terminal.

facility priority-level

• mgmt-front

• mgmt-back

• mgmt-core

• events

• sx-sdk

• mlnx-daemons

• iss-modules

• none

• emerg

• alert

• crit

• err

• warming

• notice

• info

• debug

Rev 4.20

Mellanox Technologies Confidential 232

Rev 4.20

logging receive

logging receive no logging receive

Syntax Description

Default

Enables receiving logging messages from a remote host.

The no form of the command disables the option of receiving logging messages from a remote host.

N/A

Receiving logging is disabled

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # logging receive switch (config) # show logging

Local logging level: info

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: yes

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: disabled

Levels at which messages are logged:

CLI commands: notice

Audit messages: notice switch (config) #

Related Commands show logging logging local logging local override

Notes • This does not log to the console TTY port

• In-band management should be enabled in order to open a channel from the host to the

CPU

• If enabled, only log messages matching or exceeding the minimum severity specified with the “logging local” command will be logged, regardless of what is sent from the remote host

Mellanox Technologies Confidential 233

logging trap

logging trap no logging trap

Configures the minimum severity of log messages sent to syslog servers.

The no form of the command disables sending event log messages to syslog servers.

Syntax Description

Default severity level

Receiving logging is disabled

Configuration Mode Config

The minimum severity level for all configured syslog servers:

• none – disable logging

• emerg – emergency: system is unusable

• alert – action must be taken immediately

• crit – critical conditions

• err – error conditions

• warning – warning conditions

• notice – normal but significant condition

• info – informational messages

• debug – debug-level messages

History

Role

Example

3.1.0000

admin switch (config) # logging trap info switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 234

show logging

show logging

Syntax Description

Default

Displays the logging configurations.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show logging

Local logging level: info

Override for class mgmt-front: warning

Default remote logging level: notice

No remote syslog servers configured.

Allow receiving of messages from remote hosts: no

Number of archived log files to keep: 10

Log rotation size threshold: 5.000% of partition (43 megabytes)

Log format: standard

Subsecond timestamp field: enabled

Subsecond timestamp precision: 1 whole digit; 3 fractional digits

Levels at which messages are logged:

CLI commands: info

Audit messages: notice switch (config) #

Related Commands logging fields logging files rotation logging level logging local logging receive logging <syslog IP address>

Notes

Rev 4.20

Mellanox Technologies Confidential 235

Rev 4.20

show log

show log [continues | files [<file-number>]] [[not] matching <reg-exp>]

Syntax Description

Displays the log file with optional filter criteria.

continues Displays the last few lines of the current log file and then continues to display new lines as they come in until the user hits Ctrl+C, similar to LINUX “tail” utility.

files

<file-number>

Displays the list of log files.

Displays an archived log file, where the number may range from 1 up to the number of archived log files available.

History

[not] matching <reg-exp> The file is piped through a LINUX “grep” utility to only include lines either matching, or not matching, the provided regular expression.

Default N/A

Configuration Mode Any Command Mode

3.1.0000

3.3.4402

Updated example and added note

Role

Example admin switch (config) # show log matching "Executing|Action"

Jan 19 10:55:38 arc-switch14 cli28202: [cli.NOTICE]: user admin: Executing command: en

Jan 19 11:19:32 arc-switch14 cli28202: [cli.NOTICE]: user admin: Executing command: image install image-SX_PPC_M460EX-ppc-m460ex-20140119-115026.img

Jan 19 11:19:32 arc-switch14 mgmtd4064: [mgmtd.NOTICE]: Action ID 326: requested by: user admin (System Administrator) via CLI

Jan 19 11:19:32 arc-switch14 mgmtd4064: [mgmtd.NOTICE]: Action ID 326: descr: install system software image

Jan 19 11:19:32 arc-switch14 mgmtd4064: [mgmtd.NOTICE]: Action ID 326: param: image filename: image-SX_PPC_M460EX-ppc-m460ex-20140119-115026.img, version: SX_PPC_M460EX

3.0.0000-dev-master-HA 2014-01-19 11:50:26 ppc

Jan 19 11:19:32 arc-switch14 mgmtd4064: [mgmtd.NOTICE]: Action ID 326: param: switch next boot location after install: no switch (config) #

Related Commands logging fields logging files rotation logging level logging local logging receive logging <syslog IP address> show logging

Notes When using a regular expression containing | (OR), the expression should be surrounded by quotes (“<expression>”), otherwise it is parsed as filter (PIPE) command.

Mellanox Technologies Confidential 236

4.6

Debugging

To use the debugging logs feature:

Step 1.

Enable debugging. Run: switch (config) # debug ethernet all

Step 2.

Step 3.

Display the debug level set. Run: switch (config) # show debug ethernet

Display the logs. Run: switch (config) # show log debug {match|continue}

Rev 4.20

Mellanox Technologies Confidential 237

4.6.1

Commands

debug ethernet all

debug ethernet all no debug ethernet all

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables debug traces for Ethernet modules.

The no form of the command disables the debug traces for all Ethernet modules.

N/A

N/A

Config

3.3.4150

admin switch (config) # debug ethernet all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 238

debug ethernet dcbx

debug ethernet dcbx {all | management | fail-all | control-panel | tlv}

Syntax Description

Configures the trace level for DCBX.

The no form of the command disables the configured DCBX debug traces.

all management

Enables all traces.

Management messages.

fail-all control-panel

Default tlv

N/A

Configuration Mode Config

All failure traces.

Control plane traces.

TLV related trace configuration.

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet dcbx all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 239

debug ethernet ip all

debug ethernet ip all

Syntax Description

Default

Enables debug traces for all routing modules.

The no form of the command disables debug traces for all routing modules.

N/A

N/A

Configuration Mode Config

History 3.3.4150

Role

Example admin switch (config) # debug ethernet ip all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 240

debug ethernet ip arp all

debug ethernet ip arp all no debug ethernet ip arp all

Syntax Description

Default

Enables the trace level for ARP.

The no form of the command disables the trace level for ARP.

N/A

N/A

Configuration Mode Config

History 3.3.4150

Role

Example admin switch (config) # debug ethernet ip arp all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 241

Rev 4.20

debug ethernet ip bgp

debug ethernet ip bgp {all | control-path | dampening | graceful-restart | internal

| keep-alive | receive | resources | rtm | transmit | update} no debug ethernet ip bgp {all | control-path | dampening | graceful-restart | internal | keep-alive | receive | resources | rtm | transmit | update}

Syntax Description neighbor receive resources rtm transmit update

Default N/A

Configuration Mode Config

Enables the trace level for BGP.

The no form of the command disables tracking a specified level.

all control-path

Enable track traces

Control path dump trace dampening graceful-restart internal keep-alive

Dampening information

Graceful-restart events

Internal events

Keep-alive packets exchange

Peer connection/state changes traces

All received packets

OS Resource trace

Route change notifications

All transmitted packets

Update packets exchange

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet ip arp all switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 242

debug ethernet ip dhcp-relay

debug ethernet ip dhcp-relay {all | error} no debug ethernet ip dhcp-relay {all | error}

Syntax Description

Configures the trace level for DHCP.

The no form of the command disables tracking a specified level.

all error

Enables track traces

Error code debug messages

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet ip dhcp-relay all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 243

Rev 4.20

debug ethernet ip igmp-l3

debug ethernet ip igmp-l3 {all | control-plane | data-path | fail-all | init-shut | management | memory | packet-path | resources} no debug ethernet ip igmp-l3 {all | control-plane | data-path | fail-all | init-shut | management | memory | packet-path | resources}

Syntax Description memory packet-dump

Default resources

N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

Memory related messages

Packet dump messages

OS resource trace switch (config) # debug ethernet ip igmp-l3 all switch (config) #

Related Commands

Notes

Configures the trace level for IGMP.

The no form of the command disables tracking a specified level.

all control-plane

Enable track traces

Control plane traces data-path fail-all init-shut management

IP packet dump trace

All failures including Packet Validation Trace

Init and shutdown messages

Management messages

Mellanox Technologies Confidential 244

Rev 4.20

debug ethernet ip igmp-snooping

debug ethernet ip igmp-snooping {all | forward-db-messages | group-info | initshut | packet-dump | query | source-info | system-resources-management | timer | vlan-info} no debug ethernet ip igmp-snooping {all | forward-db-messages | group-info | init-shut | packet-dump | query | source-info | system-resources-management | timer | vlan-info}

Syntax Description

Configures the trace level for IGMP snooping.

The no form of the command disables tracking a specified level.

all forward-db-messages

Enable track traces

Forwarding database messages group-info init-shut packet-dump query source-info system-resources-

 management

Group information messages

Init and shutdown messages

Packet dump messages

Query related messages

Source information messages

System resources management messages timer vlan-info

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

Timer messages

VLAN information messages switch (config) # debug ethernet ip igmp-snooping all switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 245

Rev 4.20

debug ethernet ip interface

debug ethernet ip interface {all | arp-packet-dump | buffer | enet-packet-dump | error | fail-all | filter | trace-error | trace-event} no debug ethernet ip interface {all | arp-packet-dump | buffer | enet-packetdump | error | fail-all | filter | trace-error | trace-event}

Syntax Description filter trace-error

Default trace-event

N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

Lower layer traces

Trace error messages

Trace event messages switch (config) # debug ethernet ip interface all switch (config) #

Related Commands

Notes

Configures the trace level for interface.

The no form of the command disables tracking a specified level.

all arp-packet-dump

Enable track traces

ARP packet dump trace buffer enet-packet-dump error fail-all

Buffer trace

ENET packet dump trace

Trace error messages

All failures including Packet Validation Trace

Mellanox Technologies Confidential 246

debug ethernet ip ospf

debug ethernet ip ospf {adjacency | all | configuration | ddp-packet | helper |

Interface | ism | lrq-packet | lsa_packet | lsu-packet}

Syntax Description

Configures the trace level for OSPF.

The no form of the command disables tracking a specified level.

adjacency all

Adjacency formation debug messages

Enable track traces configuration ddp-packet helper

Interface

Configuration debug messages

DDP packet debug messages

Helper debug messages

Interface debug messages ism lrq-packet lsa_packet lsu-packet

Interface State Machine debug messages

Link State Request Packet debug messages

Link State Acknowledge Packet debug messages

Link State Update Packet debug messages

Neighbor State Machine debug messages

Default nsm

N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet ip ospf all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 247

debug ethernet lacp

debug ethernet lacp {all | all-resource | data-path | fail-all | init-shut |

 management | memory | packet} no debug ethernet lacp {all | all-resources | data-path | fail-all | init-shut |

 management | memory | packet}

Syntax Description

Configures the trace level for LACP.

The no form of the command disables the configured LACP debug traces.

all all-resource

Enables all traces.

BPDU related messages.

data-path fail-all init-shut management memory

Init and shutdown traces.

Management messages.

Memory related messages.

IP packet dump trace.

memory packet

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

All failure traces.

OS resource trace.

switch (config) # debug ethernet lacp all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 248

Rev 4.20

debug ethernet lldp

debug ethernet lldp {all | control-panel | critical-event | data-path | fail-all | initshut | management | memory | neigh-add | neigh-age-out | neigh-del | neigh-drop

| neigh-updt | tlv} no debug ethernet lldp {all | control-panel | critical-event | data-path | fail-all | init-shut | management | memory | neigh-add | neigh-age-out | neigh-del | neighdrop | neigh-updt | tlv}

Syntax Description

Configures the trace level for LLDP.

The no form of the command disables the configured LLDP debug traces.

all control-panel

Enables all traces.

Control plane traces.

critical-event data-path fail-all init-shut

Critical traces.

IP packet dump trace.

All failure traces.

Init and shutdown traces.

management memory neigh-add neigh-age-out neigh-del neigh-drop neigh-updt tlv

Management messages.

Memory related messages.

Neighbor add traces.

Neighbor ageout traces.

Neighbor delete traces.

Neighbor drop traces.

Neighbor update traces.

TLV related trace configuration

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet lldp all switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 249

debug ethernet port

debug ethernet port all

Syntax Description

Default

Configures the trace level for port.

The no form of the command disables the configured port debug traces.

N/A

N/A

Configuration Mode Config

History 3.3.4150

Role

Example admin switch (config) # debug ethernet port all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 250

Rev 4.20

debug ethernet qos

debug ethernet qos {all | all-resource | control-panel | fail-all | filters | init-shut | management | memory | packet} no debug ethernet qos {all | all-resource | control-panel | fail-all | filters | init-shut

| management | memory | packet}

Syntax Description management memory

Default packet

N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

Management messages.

Memory related messages.

BPDU related messages.

switch (config) # debug ethernet port all switch (config) #

Related Commands

Notes

Configures the trace level for QoS.

The no form of the command disables the configured QoS debug traces.

all all-resource

Enables all traces.

OS resource traces.

control-panel fail-all filters init-shut

Control plane traces.

All failure traces.

Lower layer traces.

Init and shutdown traces.

Mellanox Technologies Confidential 251

Rev 4.20

debug ethernet spanning-tree

debug ethernet spanning-tree {all | error | event | filters | init-shut | management

| memory | packet | port-info-state-machine | port-receive-state-machine | portrole-selection-state-machine | port-transit-state-machine | port-transmit-statemachine | protocol-migration-state-machine | timers} no debug ethernet spanning-tree {all | error | event | filters | init-shut | management | memory | packet | port-info-state-machine | port-receive-state-machine | port-role-selection-state-machine | port-transit-state-machine | port-transmitstate-machine | protocol-migration-state-machine | timers}

Syntax Description

Configures the trace level for spanning-tree.

The no form of the command disables the configured spanning-tree debug traces.

all error

Enables all traces.

Error messages trace.

event filters init-shut management

Events related messages.

Lower later traces.

Init and shutdown traces.

Management messages.

memory packet port-info-state-machine port-receive-statemachine

Memory related messages.

BPDU related messages.

Port information messages.

Port received messages.

port-role-selection-statemachine

Port role selection messages.

port-transit-state-machine Port transition messages.

port-transmit-statemachine

Port transmission messages.

protocol-migration-statemachine

Protocol migration messages.

Default timers

N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin

Timer modules message.

switch (config) # debug ethernet spanning-tree all switch (config) #

Mellanox Technologies Confidential 252

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 253

debug ethernet vlan

debug ethernet vlan {all | fwd | priority | filters} no debug ethernet vlan {all | fwd | priority | filters}

Syntax Description

Configures the trace level for VLAN.

The no form of the command disables the configured VLAN debug traces.

all fwd

Enables all traces

Forward.

priority filters

Default N/A

Configuration Mode Config

Priority.

Lower layer traces.

History

Role

Example

3.3.4150

admin switch (config) # debug ethernet vlan all switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 254

Rev 4.20

show debug ethernet

show debug ethernet {dcbx | ip {arp | dhcp-relay | igmp-snooping | interface | ospf} | lacp | lldp | port | qos | spanning-tree | vlan}

Syntax Description

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config) # show debug ethernet dcbx dcbx protocol :

management is ON

fail-all is ON

control-panel is ON

tlv is ON switch (config) #

Related Commands

Notes

Displays debug level configuration on a specific switch.

dcbx Displays the trace level for spanning tree.

ip lacp lldp port qos spanning-tree vlan

Displays debug trace level for ethernet routing module.

• arp

• dhcp-relay

• igmp-snooping

• interface

• ospf

Displays the trace level for LACP.

Displays the trace level for LLDP.

Displays the trace level for port.

Displays the trace level for QoS.

Displays the trace level for spanning tree.

Displays the trace level for VLAN.

Mellanox Technologies Confidential 255

Rev 4.20

show log debug

show log debug [continuous | files | matching | not]

Syntax Description

Displays current event debug-log file in a scrollable pager.

continuous Displays new event log messages as they arrive.

files matching

Displays archived debug log files.

Displays event debug logs that match a given regular expression.

not Displays event debug logs that do not meet certain criteria.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config) # show log debug

Jun 15 16:20:47 switch-627e4c last message repeated 7 times

Jun 15 16:20:47 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>QoSHwQueueDelete i4IfIndex[137]

Jun 15 16:20:47 switch-627e4c last message repeated 7 times

Jun 15 16:20:47 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>QoSHwQueueDelete i4IfIndex[141]

Jun 15 16:20:47 switch-627e4c last message repeated 7 times

Jun 15 16:20:48 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: ==FsHwSetSpeed sx_api_port_speed_admin_set = 0

Jun 15 16:20:48 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: ==FsHwGetSpeed sx_api_port_speed_oper_get = 0

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[89], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[33], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[73], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[121], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[133], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[13], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[81], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[117], u1ConfigOption[6]

Jun 15 16:20:49 switch-627e4c issd[6509]: TID 1274844336: [issd.DEBUG]: NPAPI: >>CfaGddConfigPort NS u4IfIndex[65], u1ConfigOption[6]

.

.

.

switch (config) #

Related Commands

Notes

Mellanox Technologies Confidential 256

Rev 4.20

4.7

Event Notifications

MLNX-OS features a variety of supported events. Events are printed in the system log file, and, optionally, can be sent to the system administrator via email, SNMP trap or directly prompted to the terminal.

4.7.1

Supported Events

The following table presents the supported events and maps them to their relevant MIB OID.

Table 22 - Supported Event Notifications and MIB Mapping

Event Name asic-chip-down cpu-util-high disk-space-low health-module-status insufficient-fans insufficient-fans-recover insufficient-power interface-down interface-up internal-bus-error liveness-failure low-power low-power-recover

Event Description MIB OID Comments

ASIC (chip) down

CPU utilization has risen too high

File system free space has fallen too low

Health module status changed

Insufficient amount of fans in system

Insufficient amount of fans in system recovered

Insufficient power supply

An interface’s link state has changed to DOWN

An interface’s link state has changed to UP

Mellanox-EFM-MIB: asicChipDown

Mellanox-EFM-MIB: cpuUtilHigh

Mellanox-EFM-MIB: diskSpaceLow

Mellanox-EFM-MIB: systemHealthStatus

Mellanox-EFM-MIB: insufficientFans

Mellanox-EFM-MIB: insufficientFansRecover

Mellanox-EFM-MIB: insufficientPower

RFC1213: linkdown

(SNMPv1)

RFC1213: linkup

(SNMPv1)

Not supported

Supported for

Ethernet, InfiniBand and management interfaces for 1U and blade systems

Supported for

Ethernet, InfiniBand and management interfaces for 1U and blade systems

Internal bus (I

2

C) error

Mellanox-EFM-MIB: internalBusError

Not implemented A process in the system is detected as hung

Low power supply Mellanox-EFM-MIB: lowPower

Low power supply recover Mellanox-EFM-MIB: lowPowerRecover

Mellanox Technologies Confidential 257

Rev 4.20

Table 22 - Supported Event Notifications and MIB Mapping

Event Name Event Description new_root paging-high

Local bridge became a root bridge

Paging activity has risen too high power-redundancy-mismatch Power redundancy mismatch

MIB OID

Bridge-MIB: newRoot

N/A process-crash process-exit snmp-authtrap topology_change unexpected-shutdown

A process in the system has crashed

A process in the system unexpectedly exited

An SNMPv3 request has failed authentication

Topology change triggered by a local bridge

Unexpected system shutdown

Send a testing event

Comments

Supported for

Ethernet

Not supported

Mellanox-EFM-MIB: powerRedundancyMismatch

Mellanox-EFM-MIB: procCrash

Mellanox-EFM-MIB: procUnexpectedExit

Not implemented

Supported for

SX65xx only

 systems

Bridge-MIB: topology-

Change

Mellanox-EFM-MIB: unexpectedShutdown testTrap

Supported for

Ethernet

To send, use the CLI command: snmp-server notify send-test

N/A Not supported temperature-too-high

Reset occurred due to over-heating of ASIC

Temperature is too high

Mellanox-EFM-MIB: asicOverTempReset

Mellanox-EFM-MIB: asicOverTemp

4.7.2

Terminal Notifications

To print events to the terminal:

Set the events you wish to print to the terminal. Run: switch (config) # logging monitor events notice

This command prints system events in the severity “notice” to the screen. For example, in case of interface-down event, the following gets printed to the screen.

switch (config) #

Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN

Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN switch (config) #

Mellanox Technologies Confidential 258

Rev 4.20

4.7.3

Email Notifications

To configure MLNX-OS to send you emails for all configured events and failures:

Step 1.

Enter to Config mode. Run: switch > switch > enable switch # configure terminal

Step 2.

Step 3.

Step 4.

Step 5.

Set your mailhub to the IP address to be your mail client’s server – for example, Microsoft Outlook exchange server.

switch (config) # email mailhub <IP address>

Add your email address for notifications. Run: switch (config) # email notify recipient <email address>

Configure the system to send notifications for a specific event. Run: switch (config) # email notify event <event name>

Show the list of events for which an email is sent. Run: switch (config) # show email events

Failure events for which emails will be sent:

process-crash: A process in the system has crashed

unexpected-shutdown: Unexpected system shutdown

Step 6.

Informational events for which emails will be sent:

asic-chip-down: ASIC (Chip) Down

cpu-util-high: CPU utilization has risen too high

cpu-util-ok: CPU utilization has fallen back to normal levels

disk-io-high: Disk I/O per second has risen too high

disk-io-ok: Disk I/O per second has fallen back to acceptable levels

disk-space-low: Filesystem free space has fallen too low

.

.

.

switch (config) #

Have the system send you a test email. Run: switch # email send-test

The last command should generate the following email:

-----Original Message-----

From: Admin User [mailto:do-not-reply@switch.]

Sent: Sunday, May 01, 2011 11:17 AM

To: <name>

Subject: System event on switch: Test email for event notification

==== System information:

Hostname: switch

Version: <version> 2011-05-01 14:56:31

...

Date: 2011/05/01 08:17:29

Mellanox Technologies Confidential 259

Uptime: 17h 8m 28.060s

This is a test email.

==== Done.

Rev 4.20

Mellanox Technologies Confidential 260

Rev 4.20

4.7.4

Commands

4.7.4.1 Email Notification

email autosupport enable

email autosupport enable no email autosupport enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

N/A

Sends automatic support notifications via email.

The no form of the command stops sending automatic support notifications via email.

N/A

N/A

Config

3.2.3000

admin switch (config) # email autosupport enable

Mellanox Technologies Confidential 261

Rev 4.20

email autosupport event

email autosupport event <event> no email autosupport event

Syntax Description

Specifies for which events to send auto-support notification emails.

The no form of the command resets auto-support email security mode to its default.

event • process-crash – a process has crashed

• process-exit – a process unexpectedly exited

• liveness-failure – a process iss detected as hung

• cpu-util-high – CPU utilization has risen too high

• cpu-util-ok – CPU utilization has fallen back to normal levels

• paging-high – paging activity has risen too high

• paging-ok – paging activity has fallen back to normal levels

• disk-space-low – filesystem free space has fallen too low

• disk-space-ok – filesystem free space is back in the normal range

• memusage-high – memory usage has risen too high

• memusage-ok – memory usage has fallen back to acceptable levels

• netusage-high – network utilization has risen too high

• netusage-ok – network utilization has fallen back to acceptable levels

• disk-io-high – disk I/O per second has risen too high

• disk-io-ok – disk I/O per second has fallen back to acceptable levels

• unexpected-cluster-join – node has unexpectedly joined the cluster

• unexpected-cluster-leave – node has unexpectedly left the cluster

• unexpected-cluster-size – the number of nodes in the cluster is unexpected

• unexpected-shutdown – unexpected system shutdown

• interface-up – an interface’s link state has changed to up

• interface-down – an interface's link state has changed to down

• user-login – a user has logged into the system

• user-logout – a user has logged out of the system

• health-module-status – health module Status

• temperature-too-high – temperature has risen too high

• low-power – low power supply

• low-power-recover – low power supply Recover

• insufficient-power – insufficient power supply

• power-redundancy-mismatch – power redundancy mismatch

• insufficient-fans – insufficient amount of fans in system

• insufficient-fans-recover – insufficient amount of fans in system recovered

• asic-chip-down – ASIC (Chip) Down

• internal-bus-error – internal bus (I2C) Error

• internal-link-speed-mismatch – internal links speed mismatch

Mellanox Technologies Confidential 262

Default N/A

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # email autosupport event process-crash

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 263

email autosupport ssl mode

email autosupport ssl mode {none | tls | tls-none} no email autosupport ssl mode

Syntax Description

Configures type of security to use for auto-support email.

The no form of the command resets auto-support email security mode to its default.

none tls

Does not use TLS to secure auto-support email.

Uses TLS over the default server port to secure autosupport email and does not send an email if TLS fails.

tls-none Attempts TLS over the default server port to secure auto-support email, and falls back on plaintext if this fails.

Default tls-none

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # email autosupport ssl mode tls

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 264

email autosupport ssl cert-verify

email autosupport ssl cert-verify no email autosupport ssl cert-verify

Syntax Description

Default

Verifies server certificates.

The no form of the command does not verify server certificates.

N/A

N/A

Configuration Mode Config

History 3.2.3000

Role

Example admin switch (config) # email autosupport ssl cert-verify

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 265

email autosupport ssl ca-list

email autosupport ssl ca-list {<ca-list-name> | default_ca_list | none} no email autosupport ssl ca-list

Syntax Description

Configures supplemental CA certificates for verification of server certificates.

The no form of the command removes supplemental CA certificate list.

default_ca_list none

Default supplemental CA certificate list.

No supplemental list; uses built-in list only.

Default default_ca_list

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # email autosupport ssl ca-list default_ca_list

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 266

Rev 4.20

email dead-letter

email dead-letter {cleanup max-age <duration> | enable} no email dead-letter

Syntax Description

Default

Configures settings for saving undeliverable emails.

The no form of the command disables sending of emails to vendor auto-support upon certain failures.

duration enable

Save dead letter is enabled

The default duration is 14 days

Example: “5d4h3m2s” for 5 days, 4 hours, 3 minutes, 2 seconds.

Saves dead-letter files for undeliverable emails.

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # email dead-letter enable switch (config) #

Related Commands show email

Notes

Mellanox Technologies Confidential 267

Rev 4.20

email domain

email domain <hostname or IP address> no email domain

Syntax Description

Default

Sets the domain name from which the emails will appear to come from (provided that the return address is not already fully-qualified). This is used in conjunction with the system hostname to form the full name of the host from which the email appears to come.

The no form of the command clears email domain override.

hostname or IP address

No email domain

Configuration Mode Config

History 3.1.0000

IP address.

Role

Example admin switch (config) # email domain mellanox switch (config) # show email

Mail hub: 10.0.8.11

Mail hub port: 125

Domain: mellanox

Return address: do-not-reply

Include hostname in return address: yes

...

switch (config) #

Related Commands show emails

Notes

Mellanox Technologies Confidential 268

email mailhub

email mailhub <hostname or IP address> no email mailhub

Syntax Description

Default

Sets the mail relay to be used to send notification emails.

The no form of the command clears the mail relay to be used to send notification emails.

hostname or IP address

N/A

Configuration Mode Config

History 3.1.0000

Hostname or IP address.

Role

Example admin switch (config) # email mailhub 10.0.8.11

switch (config) # show email

Mail hub: 10.0.8.11

Mail hub port: 25

Domain: (not specified)

Return address: do-not-reply

Include hostname in return address: yes

... switch (config) #

Related Commands show email [events]

Notes

Rev 4.20

Mellanox Technologies Confidential 269

email mailhub-port

email mailhub-port <hostname or IP address> no email mailhub-port

Syntax Description

Default

Sets the mail relay port to be used to send notification emails.

The no form of the command resets the port to its default.

hostname or IP address

25

Configuration Mode Config

History 3.1.0000

hostname or IP address.

Role

Example admin switch (config) # email mailhub-port 125 switch (config) # show email

Mail hub: 10.0.8.11

Mail hub port: 125

Domain: (system domain name)

Return address: do-not-reply

Include hostname in return address: yes

...

switch (config) #

Related Commands show email

Notes

Rev 4.20

Mellanox Technologies Confidential 270

Rev 4.20

email notify event

email notify event <event name> no email notify event <event name>

Syntax Description

Enables sending email notifications for the specified event type.

The no form of the command disables sending email notifications for the specified event type.

event name Example event names would include “process-crash” and “cpu-util-high”.

Default No events are enabled

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # email notify event process-crash switch (config) # show email events

Failure events for which emails will be sent: process-crash: A process in the system has crashed unexpected-shutdown: Unexpected system shutdown

Informational events for which emails will be sent: liveness-failure: A process in the system was detected as hung process-exit: A process in the system unexpectedly exited cpu-util-ok: CPU utilization has fallen back to normal levels cpu-util-high: CPU utilization has risen too high disk-io-ok: Disk I/O per second has fallen back to acceptable levels

...

temperature-too-high: Temperature has risen too high

All events for which autosupport emails will be sent: process-crash: A process in the system has crashed liveness-failure: A process in the system was detected as hungswitch

(config) # switch (config) #

Related Commands show email

Notes This does not affect auto-support emails. Auto-support can be disabled overall, but if it is enabled, all auto-support events are sent as emails.

Mellanox Technologies Confidential 271

Rev 4.20

email notify recipient

email notify recipient <email addr> [class {info | failure} | detail] no email notify recipient <email addr> [class {info | failure} | detail]

Syntax Description

Adds an email address from the list of addresses to which to send email notifications of events.

The no form of the command removes an email address from the list of addresses to which to send email notifications of events.

email addr class

Email address of intended recipient.

Specifies which types of events are sent to this recipient.

info failure

Default detail

No recipients are added

Configuration Mode Config

Sends informational events to this recipient.

Sends failure events to this recipient.

Sends detailed event emails to this recipient.

History

Role

Example

3.1.0000

admin switch (config) # email notify recipient [email protected]

switch (config) # show email

Mail hub:

Mail hub port: 25

Domain: (not specified)

Return address: user1

Include hostname in return address: no

Dead letter settings:

Save dead.letter files: yes

Dead letter max age: (none)

Email notification recipients: [email protected] (all events, in detail)

Autosupport emails

Enabled: no

Recipient: [email protected]

Mail hub: autosupport.mellanox.com

switch (config) #

Related Commands show email

Notes

Mellanox Technologies Confidential 272

Rev 4.20

email return-addr

email return-addr <username> no email domain

Sets the username or fully-qualified return address from which email notifications are sent.

• If the string provided contains an “@” character, it is considered to be fully-qualified and used as-is.

• Otherwise, it is considered to be just the username, and we append “@<hostname>.<domain>”. The default is “do-not-reply”, but this can be changed to “admin” or whatnot in case something along the line does not like fictitious addresses.

The no form of the command resets this attribute to its default.

username do-not-reply

Username.

Syntax Description

Default

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # email return-addr user1 switch (config) # show email

Mail hub:

Mail hub port: 25

Domain: (not specified)

Return address: user1

Include hostname in return address: yes

...

switch (config) #

Related Commands show email

Notes

Mellanox Technologies Confidential 273

Rev 4.20

email return-host

email return-host no email return-host

Syntax Description

Default

Includes the hostname in the return address for emails.

The no form of the command does not include the hostname in the return address for emails.

N/A

No return host

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # no email return-host switch (config) # show email

Mail hub:

Mail hub port: 25

Domain: (system domain name)

Return address: my-address

Include hostname in return address: no

Current reply address: host@localdomain

Dead letter settings:

Save dead.letter files: yes

Dead letter max age: 5 days

No recipients configured.

Autosupport emails

Enabled: no

Recipient: [email protected]

Mail hub: autosupport.mellanox.com

switch (config) #

Related Commands show email

Notes This only takes effect if the return address does not contain an “@” character.

Mellanox Technologies Confidential 274

email send-test

email send-test

Syntax Description

Default

Sends test-email to all configured event and failure recipients.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # email autosupport enable switch (config) #

Related Commands show email [events]

Notes

Rev 4.20

Mellanox Technologies Confidential 275

Rev 4.20

email ssl mode

email ssl mode {none | tls | tls-none} no email ssl mode

Syntax Description

Sets the security mode(s) to try for sending email.

The no form of the command resets the email SSL mode to its default.

none tls

No security mode, operates in plaintext.

Attempts to use TLS on the regular mailhub port, with

STARTTLS. If this fails, it gives up.

tls-none Attempts to use TLS on the regular mailhub port, with

STARTTLS. If this fails, it falls back on plaintext.

Default default-cert

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # email ssl mode tls-none

Related Commands N/A

Notes

Mellanox Technologies Confidential 276

Rev 4.20

email ssl cert-verify

email ssl cert-verify no email ssl cert-verify

Syntax Description

Default

Enables verification of SSL/TLS server certificates for email.

The no form of the command disables verification of SSL/TLS server certificates for email.

N/A

N/A

Configuration Mode Config

History 3.2.3000

Role

Example admin switch (config) # email ssl cert-verify

Related Commands N/A

Notes This command has no impact unless TLS is used.

Mellanox Technologies Confidential 277

email ssl ca-list

email ssl ca-list {<ca-list-name> | default-ca-list | none} no email ssl ca-list

Syntax Description

Specifies the list of supplemental certificates of authority (CA) from the certificate configuration database that is to be used for verification of server certificates when sending email using TLS, if any.

The no form of the command uses no list of supplemental certificates.

ca-list-name default-ca-list

Specifies CA list name.

Uses default supplemental CA certificate list.

Uses no list of supplemental certificates.

Default none default-ca-list

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # email ssl ca-list none

Related Commands N/A

Notes This command has no impact unless TLS is used, and certificate verification is enabled.

Rev 4.20

Mellanox Technologies Confidential 278

show email

show email [events]

Syntax Description

Default

Shows email configuration or events for which email should be sent upon.

events

N/A

Configuration Mode Any Command Mode show event list

History

Role

Example

3.1.0000

admin switch (config) # show email

Mail hub:

Mail hub port: 25

Domain: (system domain name)

Return address: my-address

Include hostname in return address: no

Current reply address: host@localdomain

Dead letter settings:

Save dead.letter files: yes

Dead letter max age: 5 days

No recipients configured.

Autosupport emails

Enabled: no

Recipient: [email protected]

Mail hub: autosupport.mellanox.com

switch (config) #

Related Commands show email

Notes

Rev 4.20

Mellanox Technologies Confidential 279

4.8

mDNS

Multicast DNS (mDNS) protocol is used by the SM HA to deliver control information between the InfiniBand nodes via the management interface. To block sending mDNS traffic from the management interface run the command no ha dns enable.

Rev 4.20

Mellanox Technologies Confidential 280

4.8.1

Commands

ha dns enable

ha dns enable no ha dns enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Allows mDNS traffic.

The no form of the command blocks mDNS traffic from being sent from mgmt0.

N/A

Enabled.

Config

3.3.4000

admin switch (config) # no ha dns enable switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 281

4.9

User Management and Security

4.9.1

User Accounts

There are two general user account types: admin and monitor. As admin, the user is privileged to execute all the available operations. As monitor, the user can execute operations that display system configuration and status, or set terminal settings.

Table 23 - User Roles (Accounts) and Default Passwords

User Role admin monitor xmladmin xmluser

Default Password admin monitor xmladmin xmluser

To remove passwords from the XML users, run the command username <username>

 nopassword .

4.9.2

Authentication, Authorization and Accounting (AAA)

AAA is a term describing a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

These combined processes are considered important for effective network management and security. The AAA feature allows you to verify the identity of, grant access to, and track the actions of users managing the MLNX-OS switch. The MLNX-OS switch supports Remote Access Dial-In

User Service (RADIUS) or Terminal Access Controller Access Control device Plus (TACACS+) protocols.

Authentication - authentication provides the initial method of identifying each individual user, typically by entering a valid username and password before access is granted.

The AAA server compares a user's authentication credentials with the user credentials stored in a database. If the credentials match, the user is granted access to the network or devices. If the credentials do not match, authentication fails and network access is denied.

Authorization - following the authentication, a user must gain authorization for performing certain tasks. After logging into a system, for instance, the user may try to issue commands. The authorization process determines whether the user has the authority to issue such commands. Simply put, authorization is the process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted. Usually, authorization occurs within the context of authentication. Once you have authenticated a user, they may be authorized for different types of access or activity.

Accounting - the last level is accounting, which measures the resources a user consumes during access. This includes the amount of system time or the amount of data a user has sent and/or received during a session. Accounting is carried out by logging of session statistics and usage information, and is used for authorization control, billing, trend analysis, resource utilization, and capacity planning activities.

Rev 4.20

Mellanox Technologies Confidential 282

Authentication, authorization, and accounting services are often provided by a dedicated AAA server, a program that performs these functions. Network access servers interface with AAA servers using the Remote Authentication Dial-In User Service (RADIUS) protocol.

4.9.2.1 RADIUS

RADIUS (Remote Authentication Dial-In User Service), widely used in network environments, is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. It is commonly used for embedded network devices such as routers, modem servers, switches and so on. RADIUS is currently the de-facto standard for remote authentication. It is prevalent in both new and legacy systems.

It is used for several reasons:

• RADIUS facilitates centralized user administration

• RADIUS consistently provides some level of protection against an active attacker

4.9.2.2 TACACS+

TACACS (Terminal Access Controller Access Control System), widely used in network environments, is a client/server protocol that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. It is commonly used for providing NAS (Network Access Security). NAS ensures secure access from remotely connected users. TACACS implements the TACACS Client and provides the AAA (Authentication, Authorization and Accounting) functionalities.

TACACS is used for several reasons:

• Facilitates centralized user administration

• Uses TCP for transport to ensure reliable delivery

• Supports inbound authentication, outbound authentication and change password request for the authentication service

• Provides some level of protection against an active attacker

4.9.2.3 LDAP

LDAP (Lightweight Directory Access Protocol) is an authentication protocol that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system. LDAP is based on a client/server model. The switch acts as a client to the LDAP server. A remote user (the remote administrator) interacts only with the switch, not the back-end server and database.

LDAP authentication consists of the following components:

• A protocol with a frame format that utilizes TCP over IP

• A centralized server that stores all the user authorization information

• A client: in this case, the switch

Each entry in the LDAP server is referenced by its Distinguished Name (DN). The DN consists of the user-account name concatenated with the LDAP domain name. If the user-account name is

John, the following is an example DN: uid=John,ou=people,dc=domain,dc=com

Rev 4.20

Mellanox Technologies Confidential 283

Rev 4.20

4.9.3

System Secure Mode

System secure mode is a state that configures the switch system to run secure algorithms in compliance with FIPS 140-2 requirements. In this mode, unsecure algorithms are disabled and unsecure feature configurations are disallowed.

In this mode the system supports Federal Information Processing Standards (FIPS) 140-2, Security Requirements for Cryptographic Modules, which is a NIST (National Institute of Standards and Technology) publication that specifies the requirement for system cypher functionality.

When this mode is activated, all the modules which are used by the system are verified to work in compliance with the secure mode.

Note that if system fails to load in secure mode it is loaded in non-secure mode.

Prerequisites:

Step 1.

Disable SNMPv1 and v2. Run: switch (config) # no snmp-server enable communities

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Step 7.

Step 8.

Only allow SNMPv3 users with sha and aes-128. Run: switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>

Only allow SNMPv3 traps with sha and aes-128. Run: switch (config) # snmp-server host <ip-address> informs version 3 user <username> auth sha <password1> priv aes-128 <password2>

Only allow SSHv2. Run: switch (config) # ssh server min-version 2

Enable SSH server strict security mode. Run: switch (config) # ssh server security strict

Disable HTTP access. Run: switch (config) # no web http enable

Enable HTTPS strict cyphers. Run: switch (config) # web https ssl ciphers TLS1.2

Disable router BGP neighbor password configuration. Run: switch (config) # no router bgp <as-number> neighbor <ip-address> password

Step 9.

Disable router BGP peer group password configuration. Run: switch (config) # no router bgp <as-number> peer-group <peer-group-name> password

Step 10.

Disable BGP password configuration. Run: switch (config) # no neighbor <ip-address> password

Step 11.

Disable MD5 password hashing on for users. Run: switch (config) # username <username> password <password>

If a necessary prerequisite is not fulfilled the system does not activate secure mode and issues an advisory message accordingly.

Mellanox Technologies Confidential 284

Secure mode is not supported on director switch systems.

To activate secure mode: switch (config) # system secure-mode enable

Warning! Configuration is about to be saved and the system will be reloaded.

Type 'YES' to confirm the change in secure mode: YES

To deactivate secure mode: switch (config) # no system secure-mode enable

Warning! Configuration is about to be saved and the system will be reloaded.

Type 'YES' to confirm the change in secure mode: YES

To verify secure mode configuration and state: switch (config)# show system secure-mode

Secure mode configured: yes

Secure mode enabled: yes switch (config) #

Rev 4.20

Mellanox Technologies Confidential 285

Rev 4.20

4.9.4

Commands

4.9.4.1 User Accounts

username

username <username> [capability <cap> | disable [login | password] | full-name

<name> | nopassword | password [0 | 7] <password>] no username <username> [capability | disable [login | password] | full-name]

Syntax Description

Creates a user and sets its capabilities, password and name.

The no form of the command deletes the user configuration.

username Specifies a username and creates a user account. New users are created initially with admin privileges but is disabled.

capability <cap> Defines user capabilities.

• admin - full administrative capabilities

• monitor - read only capabilities, can not change the running configuration

• unpriv – can only query the most basic information, and cannot take any actions or change any configuration

• v_admin – basic administrator capabilities disable [login | password] • Disable - disable this account

• Disable login - disable all logins to this account

• Disable password - disable login to this account using a local password name Full name of the user.

nopassword

0 | 7 password

The next login of the user will not require password.

• 0: specifies a login password in cleartext

• 7: specifies a login password in encrypted text

Specifies a password for the user in string form. If [0 |

7] was not specified then the password is in cleartext.

Default The following usernames are available by default:

• admin

• monitor

• xmladmin

• xmluser

Configuration Mode Config

History

Role

3.1.0000

3.4.0000

3.4.1100

admin

Updated Example

Updated Example

Mellanox Technologies Confidential 286

Rev 4.20

Example switch (config) # username monitor full-name smith switch (config) # show usernames

USERNAME FULL NAME CAPABILITY ACCOUNT STATUS

USERID System Administrator admin Password set admin System Administrator admin Password set monitor smith monitor Password set (SHA512) xmladmin XML Admin User admin Password set (SHA512) xmluser XML Monitor User monitor Password set (SHA512) switch (config) #

Related Commands show usernames show users

Notes • To enable a user account, just set a password on it (or use the command username <user> nopassword to enable it with no password required for login)

• Removing a user account does not terminate any current sessions that user has open; it just prevents new sessions from being established

• Encrypted password is useful for the command show configuration, since the cleartext password cannot be recovered after it is set

Mellanox Technologies Confidential 287

show usernames

show usernames

Syntax Description

Default

Displays list of users and their capabilities.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show usernames

USERNAME FULL NAME CAPABILITY ACCOUNT STATUS

USERID System Administrator admin Password set admin System Administrator admin Password set monitor smith monitor Password set (SHA512) xmladmin XML Admin User admin No password required xmluser XML Monitor User monitor No password required switch (config) #

Related Commands username show users

Notes

Rev 4.20

Mellanox Technologies Confidential 288

Rev 4.20

show users

show users [history]

Syntax Description

Default

Displays logged in users and related information such as idle time and what host they have connected from.

history

N/A

Configuration Mode Any Command Mode

History 3.1.0000

Displays current and historical sessions.

Role

Example admin switch (config) # show users

USERNAME FULL NAME LINE HOST IDLE admin System Administrator pts/0 172.22.237.174 0d0h34m4s admin System Administrator pts/1 172.30.0.127 1d3h30m49s admin System Administrator pts/3 172.22.237.34 0d0h0m0s switch (config) #show users history admin pts/3 172.22.237.34 Wed Feb 1 11:56 still logged in admin pts/3 172.22.237.34 Wed Feb 1 11:42 - 11:46 (00:04) wtmp begins Wed Feb 1 11:38:10 2012 switch (config) #

Related Commands username show usernames

Notes

Mellanox Technologies Confidential 289

show whoami

show whoami

Syntax Description

Default

Displays username and capabilities of user currently logged in.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show whoami

Current user: admin

Capabilities: admin switch (config) #

Related Commands username show usernames show users

Notes

Rev 4.20

Mellanox Technologies Confidential 290

Rev 4.20

4.9.4.2 AAA Methods

aaa accounting

aaa accounting changes default stop-only tacacs+ no aaa accounting changes default stop-only tacacs+

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Enables logging of system changes to an AAA accounting server.

The no form of the command disables the accounting.

N/A

N/A

Config

3.1.0000

3.2.3000

admin

First version

Removed ‘time’ parameter from the command.

switch (config) # aaa accounting changes default stop-only tacacs+ switch (config) # show aaa

AAA authorization:

Default User: admin

Map Order: local-only

Authentication method(s):

local

radius

tacacs+

ldap

Accounting method(s):

tacacs+ switch (config) # show aaa

• TACACS+ is presently the only accounting service method supported

• Change accounting covers both configuration changes and system actions that are visible under audit logging, however this feature operates independently of audit logging, so it is unaffected by the “logging level audit mgmt” or “configuration audit” commands

• Configured TACACS+ servers are contacted in the order in which they appear in the configuration until one accepts the accounting data, or the server list is exhausted

• Despite the name of the “stop-only” keyword, which indicates that this feature logs a

TACACS+ accounting “stop” message, and in contrast to configuration change accounting, which happens after configuration database changes, system actions are logged when the action is started, not when the action has completed

Mellanox Technologies Confidential 291

Rev 4.20

aaa authentication login

aaa authentication login default <auth method> [<auth method> [<auth method> [<auth method> [<auth method>]]]] no aaa authentication login

Syntax Description

Sets a sequence of authentication methods. Up to four methods can be configured.

The no form of the command resets the configuration to its default.

auth-method • local

• radius

• tacacs+

• ldap

Default local

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # aaa authentication login default local radius tacacs+ ldap switch (config) # show aaa

AAA authorization:

Default User: admin

Map Order: local-only

Authentication method(s):

local

radius

tacacs+

ldap

Accounting method(s):

tacacs+ switch (config) #

Related Commands show aaa

Notes The order in which the methods are specified is the order in which the authentication is attempted. It is required that “local” is one of the methods selected. It is recommended that “local” be listed first to avoid potential problems logging in to local accounts in the face of network or remote server issues.

Mellanox Technologies Confidential 292

Rev 4.20

aaa authentication attempts track

aaa authentication attempts track {downcase | enable} no aaa authentication attempts track {downcase | enable}

Syntax Description

Configure tracking for failed authentication attempts.

The no form of the command clears configuration for tracking authentication failures.

downcase Does not convert all usernames to lowercase (for authentication failure tracking purposes only).

Disables tracking of failed authentication attempts

Default enable

N/A

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # aaa authentication attempts track enable

Related Commands N/A

Notes • This is required for the lockout functionality described below, but can also be used on its own for informational purposes.

• Disabling tracking does not clear any records of past authentication failures, or the locks in the database. However, it does prevent any updates to this database from being made: no new failures are recorded. It also disables lockout, preventing new lockouts from being recorded and existing lockouts from being enforced.

Mellanox Technologies Confidential 293

Rev 4.20

aaa authentication attempts lockout

aaa authentication attempts lockout {enable | lock-time | max-fail | unlock-time} no aaa authentication attempts lockout {enable | lock-time | max-fail | unlocktime}

Configures lockout of accounts based on failed authentication attempts.

The no form of the command clears configuration for lockout of accounts based on failed authentication attempts.

Mellanox Technologies Confidential 294

Syntax Description enable lock-time max-fail unlock-time

Rev 4.20

Enables locking out of user accounts based on authentication failures.

This both suspends enforcement of any existing lockouts, and prevents any new lockouts from being recorded. If lockouts are later re-enabled, any lockouts that had been recorded previously resume being enforced; but accounts which have passed the max-fail limit in the meantime are NOT automatically locked at this time. They would be permitted one more attempt, and then locked, because of how the locking is done: lockouts are applied after an authentication failure, if the user has surpassed the threshold at that time.

Lockouts only work if tracking is enabled. Enabling lockouts automatically enables tracking. Disabling tracking automatically disables lockouts.

Sets maximum permitted consecutive authentication failures before locking out users.

Unlike the “max-fail” setting, this does take effect immediately for all accounts

If both unlock-time and lock-time are set, the unlocktime must be greater than the lock-time

This is not based on the number of consecutive failures, and is therefore divorced from most of the rest of the tally feature, except for the tracking of the last login failure

Sets maximum permitted consecutive authentication failures before locking out users.

This setting only impacts what lockouts are imposed while the setting is active; it is not retroactive to previous logins. So if max-fail is disabled or changed, this does not immediately cause any users to be changed from locked to unlocked or vice-versa.

Enables the auto-unlock of an account after a specified number of seconds if a user account is locked due to authentication failures, counting from the last valid login attempt.

Unlike the “max-fail” setting, this does take effect immediately for all accounts.

If both unlock-time and lock-time are set, the unlocktime must be greater than the lock-time.

Careful with disabling the unlock-time, particularly if you have max-fail set to something, and have not overridden the behavior for the admin (i.e. they are subject to lockouts also). If the admin account gets locked out, and there are no other administrators who can aid, the user may be forced to boot single-user and use the pam_tallybyname command-line utility to unlock your account manually. Even if one is careful not to incur this many authentication failures, it makes the system more subject to DOS attacks.

Mellanox Technologies Confidential 295

Default N/A

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # aaa authentication attempts lockout enable

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 296

Rev 4.20

aaa authentication attempts class-override

aaa authentication attempts class-override {admin [no-lockout] | unknown {notrack | hash-username}} no aaa authentication attempts class-override {admin | unknown {no-track | hash-username}}

Syntax Description

Overrides the global settings for tracking and lockouts for a type of account.

The no form of the command removes this override and lets the admin be handled according to the global settings.

admin Overrides the global settings for tracking and lockouts for the admin account. This applies only to the single account with the username “admin”. It does not apply to any other users with administrative privileges.

no-lockout unknown

Prevents the admin user from being locked out, though the authentication failure history is still tracked (if tracking is enabled overall).

Overrides the global settings for tracking and lockouts for unknown accounts. The “unknown” class here contains the following categories:

• Real remote usernames which simply failed authentication

• Mis-typed remote usernames

• Passwords accidentally entered as usernames

• Bogus usernames made up as part of an attack on the system hash-username no-track

Applies a hash function to the username, and stores the hashed result in lieu of the original.

Does not track authentication for such users (which of course also implies no-lockout).

Default N/A

Configuration Mode Config

History

Role

Example

3.2.3000

admin switch (config) # aaa authentication attempts class-override admin nolockout

Related Commands N/A

Notes

Mellanox Technologies Confidential 297

Rev 4.20

aaa authentication attempts reset

aaa authentication attempts reset {all | user <username>} [{no-clear-history | nounlock}]

Syntax Description

Clears the authentication history for and/or unlocks specified users.

all Applies function to all users.

user no-clear-history

Applies function to specified user.

Leaves the history of login failures but unlocks the account.

no-unlock Leaves the account locked but clears the history of login failures.

Default N/A

Configuration Mode Config

History

Role

3.2.3000

admin

Example switch (config) # aaa authentication attempts reset user admin all

Related Commands N/A

Notes

Mellanox Technologies Confidential 298

Rev 4.20

clear aaa authentication attempts

clear aaa authentication attempts {all | user <username>} [no-clear-history | nounlock]

Syntax Description

Clears the authentication history for and/or unlocks specified users all Applies function to all users.

user no-clear-history

Applies function to specified user.

Clears the history of login failures.

Default no-unlock

N/A

Configuration Mode Config

History

Role

Example

3.2.3000

admin

Unlocks the account.

switch (config) # aaa authentication attempts reset user admin noclear-history

Related Commands N/A

Notes

Mellanox Technologies Confidential 299

Rev 4.20

aaa authorization

aaa authorization map [default-user <username> | order <policy>] no aaa authorization map [default-user | order]

Syntax Description

Sets the mapping permissions of a user in case a remote authentication is done.

The no form of the command resets the attributes to default.

username Specifies what local account the authenticated user will be logged on as when a user is authenticated (via

RADIUS or TACACS+) and does not have a local account. If the username is local, this mapping is ignored.

order <policy> Sets the user mapping behavior when authenticating users via RADIUS or TACACS+ to one of three choices. The order determines how the remote user mapping behaves. If the authenticated username is valid locally, no mapping is performed. The setting has the following three possible behaviors:

• remote-first – if a local-user mapping attribute is returned and it is a valid local username, it maps the authenticated user to the local user specified in the attribute. Otherwise, it uses the user specified by the default-user command.

• remote-only – maps a remote authenticated user if the authentication server sends a local-user mapping attribute. If the attribute does not specify a valid local user, no further mapping is tried.

• local-only – maps all remote users to the user specified by the “aaa authorization map default-user <user name>” command. Any vendor attributes received by an authentication server are ignored.

Default

Role

Example

Default user - admin

Map order - remote-first

Configuration Mode Config

History 3.1.0000

admin switch (config) # aaa authorization map default-user admin switch (config) # show aaa

AAA authorization:

Default User: admin

Map Order: remote-first

Authentication method(s):

local

Accounting method(s):

tacacs+ switch (config) #

Mellanox Technologies Confidential 300

Rev 4.20

Related Commands show aaa username

Notes • If, for example, the user is locally defined to have admin permission, but in a remote server such as RADIUS the user is authenticated as monitor and the order is remote-first, then the user is given monitor permissions.

• If AAA authorization order policy is configured to remote-only, then when upgrading to

3.4.3000 or later from an older MLNX-OS version, this policy is changed to remote-first.

Mellanox Technologies Confidential 301

show aaa

show aaa

Syntax Description

Default

Displays the AAA configuration.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show aaa

AAA authorization:

Default User: admin

Map Order: remote-first

Authentication method(s):

local

Accounting method(s):

tacacs+ switch (config) #

Related Commands aaa accounting aaa authentication aaa authorization show aaa show usernames username

Notes

Rev 4.20

Mellanox Technologies Confidential 302

Rev 4.20

show aaa authentication attempts

show aaa authentication attempts [configured | status user <username>]]

Syntax Description

Shows the current authentication, authorization and accounting settings.

authentication attempts Displays configuration and history of authentication failures.

configured status user

Displays configuration of authentication failure tracking.

Displays status of authentication failure tracking and lockouts for specific user.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.1000

admin switch (config) # show aaa authentication attempts

Configuration for authentication failure tracking and locking:

Track authentication failures: yes

Lock accounts based on authentication failures: yes

Override treatment of 'admin' user: (none)

Override treatment of unknown usernames: hash-usernames

Configuration for lockouts based on authentication failures:

Lock account after consecutive auth failures: 5

Allow retry on locked accounts (unlock time): after 15 second(s)

Temp lock after each auth failure (lock time): none

Username Known Locked Failures Last fail time Last fail from

-------- ----- ------ -------- -------------- -------

-------

0Q72B43EHBKT8CB5AF5PGRX3U3B3TUL4CYJP93N(*) no no 1 2012/

08/20 14:29:19 ttyS0

(*) Hashed for security reasons switch-627d3c [standalone: master] (config) # switch (config) #

Related Commands N/A

Notes

Mellanox Technologies Confidential 303

4.9.4.3 RADIUS

radius-server

radius-server {key <secret>| retransmit <retries> | timeout <seconds>} no radius-server {key | retransmit | timeout}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sets global RADIUS server attributes.

The no form of the command resets the attributes to their default values.

secret Sets a secret key (shared hidden text string), known to the system and to the RADIUS server.

retries Number of retries (0-5) before exhausting from the authentication.

Timeout in seconds between each retry (1-60).

seconds

3 seconds, 1 retry

Config

3.1.0000

admin switch (config) #radius-server retransmit 3 switch (config) # show radius

RADIUS defaults:

Key: 3333

Timeout: 3

Retransmit: 1

No RADIUS servers configured.

switch (config) # aaa authorization radius-server host show radius

Each RADIUS server can override those global parameters using the command

“radius-server host”.

Rev 4.20

Mellanox Technologies Confidential 304

radius-server host

radius-server host <IP address> [enable | auth-port <port> | key <secret> | prompt-key | retransmit <retries> | timeout <seconds>] no radius-server host <IP address> [auth-port | enable]

Syntax Description

Default

Configures RADIUS server attributes.

The no form of the command resets the attributes to their default values and deletes the RADIUS server.

IP address enable auth-port

RADIUS server IP address

Administrative enable of the RADIUS server port key

Configures authentication port to use with this

RADIUS server

RADIUS server UDP port number prompt-key retransmit

Configures shared secret to use with this RADIUS server

Prompt for key, rather than entering on command line retries

Configures retransmit count to use with this RADIUS server

Number of retries (0-5) before exhausting from the authentication timeout seconds

3 seconds, 1 retry

Default UDP port is 1812

Configures timeout between each try

Timeout in seconds between each retry (1-60)

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # radius-server host 40.40.40.40

switch (config) # show radius

RADIUS defaults:

Key: 3333

Timeout: 3

Retransmit: 1

RADIUS servers:

40.40.40.40:1812

Enabled: yes

Key: 3333 (default)

Timeout: 3 (default)

Retransmit: 1 (default) switch (config) #

Rev 4.20

Mellanox Technologies Confidential 305

Rev 4.20

Related Commands aaa authorization radius-server show radius

Notes • RADIUS servers are tried in the order they are configured

• If you do not specify a parameter for this configured RADIUS server, the configuration will be taken from the global RADIUS server configuration. Refer to “radius-server” command.

Mellanox Technologies Confidential 306

show radius

show radius

Syntax Description

Default

Displays RADIUS configurations.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show radius

RADIUS defaults:

Key: 3333

Timeout: 3

Retransmit: 1

RADIUS servers:

40.40.40.40:1812

Enabled: yes

Key: 3333 (default)

Timeout: 3 (default)

Retransmit: 1 (default) switch (config) #

Related Commands aaa authorization radius-server radius-server host

Notes

Rev 4.20

Mellanox Technologies Confidential 307

4.9.4.4 TACACS+

tacacs-server

tacacs-server {key <secret>| retransmit <retries> | timeout <seconds>} no tacacs-server {key | retransmit | timeout}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Sets global TACACS+ server attributes.

The no form of the command resets the attributes to default values.

secret Set a secret key (shared hidden text string), known to the system and to the TACACS+ server.

retries Number of retries (0-5) before exhausting from the authentication.

Timeout in seconds between each retry (1-60).

seconds

3 seconds, 1 retry

Config

3.1.0000

admin switch (config) #tacacs-server retransmit 3 switch (config) # show tacacs

TACACS+ defaults:

Key: 3333

Timeout: 3

Retransmit: 1

No TACACS+ servers configured.

switch (config) # aaa authorization show radius show tacacs tacacs-server host

Each TACACS+ server can override those global parameters using the command

“tacacs-server host”.

Rev 4.20

Mellanox Technologies Confidential 308

Rev 4.20

tacacs-server host

tacacs-server host <IP address> {enable | auth-port <port> | auth-type <type> | key <secret> | prompt-key | retransmit <retries> | timeout <seconds>} no tacacs-server host <IP address> {enable | auth-port}

Syntax Description

Configures TACACS+ server attributes.

The no form of the command resets the attributes to their default values and deletes the TACACS+ server.

IP address enable auth-port

TACACS+ server IP address

Administrative enable for the TACACS+ server port auth-type

Configures authentication port to use with this

TACACS+ server

TACACS+ server UDP port number type

Configures authentication type to use with this

TACACS+ server

Authentication type. Possible values are:

• ASCII

• PAP (Password Authentication Protocol) key secret prompt-key retransmit

Configures shared secret to use with this TACACS+ server

Sets a secret key (shared hidden text string), known to the system and to the TACACS+ server

Prompts for key, rather than entering key on command line

Configures retransmit count to use with this TACACS+ server retries Number of retries (0-5) before exhausting from the authentication

Configures timeout to use with this TACACS+ server

Timeout in seconds between each retry (1-60)

Default timeout seconds

3 seconds, 1 retry

Default TCP port is 49

Default auth-type is PAP

Configuration Mode Config

History 3.1.0000

Role admin

Mellanox Technologies Confidential 309

Rev 4.20

Example switch (config) # tacacs-server host 40.40.40.40

switch (config) # show tacacs

TACACS+ defaults:

Key: 3333

Timeout: 3

Retransmit: 1

TACACS+ servers:

40.40.40.40:49

Enabled: yes

Auth-type PAP

Key: 3333 (default)

Timeout: 3 (default)

Retransmit: 1 (default) switch (config) #

Related Commands aaa authorization show tacacs tacacs-server

Notes • TACACS+ servers are tried in the order they are configured

• A PAP auth-type similar to an ASCII login, except that the username and password arrive at the network access server in a PAP protocol packet instead of being typed in by the user, so the user is not prompted

• If the user does not specify a parameter for this configured TACACS+ server, the configuration will be taken from the global TACACS+ server configuration. Refer to “tacacsserver” command.

Mellanox Technologies Confidential 310

show tacacs

show tacacs

Syntax Description

Default

Displays TACACS+ configurations.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show tacacs

TACACS+ defaults:

Key: 3333

Timeout: 3

Retransmit: 1

TACACS+ servers:

40.40.40.40:49

Enabled: yes

Auth-type PAP

Key: 3333 (default)

Timeout: 3 (default)

Retransmit: 1 (default) switch (config) #

Related Commands aaa authorization tacacs-server tacacs-server host

Notes

Rev 4.20

Mellanox Technologies Confidential 311

Rev 4.20

4.9.4.5 LDAP

ldap base-dn

ldap base-dn <string> no ldap base-dn

Syntax Description

Default ou=users,dc=example,dc=com

Configuration Mode Config

History 3.1.0000

3.4.0000

Updated Example

Role

Example

Sets the base distinguished name (location) of the user information in the schema of the LDAP server.

The no form of the command resets the attribute to its default values.

string A case-sensitive string that specifies the location in the

LDAP hierarchy where the server should begin searching when it receives an authorization request.

For example:

“ou=users,dc=example,dc=com”, with no spaces.

when: ou - Organizational unit dc - Domain component cn - Common name sn - Surname admin switch (config) # ldap base-dn ou=department,dc=example,dc=com switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : sAMAccountName

Bind DN :

Bind password :

Group base DN :

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Mellanox Technologies Confidential 312

Related Commands show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 313

Rev 4.20

ldap bind-dn/bind-password

ldap {bind-dn | bind-password} <string> no ldap {bind-dn | bind-password}

Syntax Description

Role

Example

Gives the distinguished name or password to bind to on the LDAP server. This can be left empty for anonymous login (the default).

The no form of the command resets the attribute to its default values.

string A case-sensitive string that specifies distinguished name or password to bind to on the LDAP server.

Default “”

Configuration Mode Config

History 3.1.0000

3.4.0000

admin

Updated Example switch (config) # ldap bind-dn my-dn switch (config) # ldap bind-password my-password switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : sAMAccountName

Bind DN : my-dn

Bind password : my-password

Group base DN :

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show ldap

Notes For anonymous login, bind-dn and bind-password should be empty strings “”.

Mellanox Technologies Confidential 314

ldap group-attribute/group-dn

ldap {group-attribute {<group-att> |member | uniqueMember} | group-dn

<group-dn>} no ldap {group-attribute | group-dn}

Syntax Description

Default

Sets the distinguished name or attribute name of a group on the LDAP server.

The no form of the command resets the attribute to its default values.

group-att member

Specifies a custom attribute name.

groupOfNames or group membership attribute.

uniqueMember group-dn group-att: member group-dn: “” groupOfUniqueNames membership attribute.

DN of group required for authorization.

Configuration Mode Config

History 3.1.0000

Role

Example

3.4.0000

admin

Updated Example switch (config) # ldap group-attribute member switch (config) # ldap group-dn my-group-dn switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : sAMAccountName

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Rev 4.20

Mellanox Technologies Confidential 315

Rev 4.20

Related Commands show ldap

Notes • The user’s distinguished name must be listed as one of the values of this attribute, or the user will not be authorized to log in

• After login authentication, if the group-dn is set, a user must be a member of this group or the user will not be authorized to log in. If the group is not set (“” - the default) no authorization checks are done.

Mellanox Technologies Confidential 316

ldap host

ldap host <IP Address> [order <number> last] no ldap host <IP Address>

Syntax Description

Adds an LDAP server to the set of servers used for authentication.

The no form of the command deletes the LDAP host.

IP Address number

IPv4 or IPv6 address.

The order of the LDAP server.

Default last

No hosts configured

Configuration Mode Config

History 3.1.0000

3.4.0000

Role

Example

The LDAP server will be added in the last location.

Updated Example admin switch (config) # ldap host 10.10.10.10

switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : sAMAccountName

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes • The system will select the LDAP host to try according to its order

• New servers are by default added at the end of the list of servers

Rev 4.20

Mellanox Technologies Confidential 317

ldap login-attribute

ldap login-attribute {<string> | uid | sAMAccountName} no ldap login-attribute

Syntax Description

Sets the attribute name which contains the login name of the user.

The no form of the command resets this attribute to its default.

string uid

Custom attribute name.

LDAP login name is taken from the user login username.

SAM Account name, active directory login name.

Default sAMAccountName sAMAccountName

Configuration Mode Config

History 3.1.0000

3.4.0000

Updated Example

Role

Example admin switch (config) # ldap login-attribute uid switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 318

ldap port

ldap port <port> no ldap port

Syntax Description

Default

Sets the TCP port on the LDAP server to connect to for authentication.

The no form of the command resets this attribute to its default value.

port

389

Configuration Mode Config

History 3.1.0000

TCP port number.

Role

Example

3.4.0000

admin

Updated Example switch (config) # ldap port 1111 switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 1111

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 319

ldap referrals

ldap referrals no ldap referrals

Syntax Description

Default

Enables LDAP referrals.

The no form of the command disables LDAP referrals.

N/A

LDAP referrals are enabled

Configuration Mode Config

History 3.1.0000

Role

Example

3.4.0000

admin

Updated Example switch (config) # no ldap referrals switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes Referral is the process by which an LDAP server, instead of returning a result, will return a referral (a reference) to another LDAP server which may contain further information.

Rev 4.20

Mellanox Technologies Confidential 320

Rev 4.20

ldap scope

ldap scope <scope> no ldap scope

Syntax Description

Specifies the extent of the search in the LDAP hierarchy that the server should make when it receives an authorization request.

The no form of the command resets the attribute to its default value.

scope • one-level - searches the immediate children of the base dn

• subtree - searches at the base DN and all its children

Default subtree

Configuration Mode Config

History 3.1.0000

3.4.0000

Role

Example

Updated Example admin switch (config) # ldap scope subtree switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 5

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Mellanox Technologies Confidential 321

Rev 4.20

ldap ssl

Syntax Description

Default ldap ssl {ca-list <options> | cert-verify | ciphers {all | TLS1.2} | mode <mode> | port <port-number>} no ldap ssl {cert-verify | ciphers | mode | port}

Sets SSL parameter for LDAP.

The no form of the command resets the attribute to its default value.

options This command specifies the list of supplemental certificates of authority (CAs) from the certificate configuration database that is to be used by LDAP for authentication of servers when in TLS or SSL mode.

The options are:

• default-ca-list - u ses default supplemental CA certificate list

• none - n o supplemental list, uses the built-in one only

CA certificates are ignored if “ldap ssl mode” is not configured as either “tls” or “ssl”, or if “no ldap ssl cert-verify” is configured.

The default-ca-list is empty in the factory default configuration. Use the command: “crypto certificate ca-list default-ca-list name” to add trusted certificates to that list.

The “default-ca-list” option requires LDAP to consult the system’s configured global default CA-list for supplemental certificates.

cert-verify Enables verification of SSL/TLS server certificates.

This may be required if the server's certificate is selfsigned, or does not match the name of the server.

Sets SSL mode to be used.

ciphers {all | TLS1.2} mode port-number

Sets the security mode for connections to the LDAP server.

• none – requests no encryption for the LDAP connection

• ssl – the SSL-port configuration is used, an SSL connection is made before LDAP requests are sent (LDAP over

SSL)

• start-tls – the normal LDAP port is used, an LDAP connection is initiated, and then TLS is started on this existing connection

Sets the port on the LDAP server to connect to for authentication when the SSL security mode is enabled

(LDAP over SSL).

cert-verify: enabled mode: none (LDAP SSL is not activated) port-number: 636 ciphers: all

Mellanox Technologies Confidential 322

Rev 4.20

Configuration Mode Config

History

Role

Example

3.1.0000

3.2.3000

3.4.0000

First version

Added ca-list argument.

Added “ssl ciphers” parameter

Updated Example admin switch (config) # ldap ssl mode ssl switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 5

SSL mode : ssl

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes • If available, the TLS mode is recommended, as it is standardized, and may also be of higher security

• The port number is used only for SSL mode. In case the mode is TLS, the LDAP port number will be used.

Mellanox Technologies Confidential 323

ldap timeout

ldap {timeout-bind | timeout-search} <seconds> no ldap {timeout-bind | timeout-search}

Syntax Description

Sets a global communication timeout in seconds for all LDAP servers to specify the extent of the search in the LDAP hierarchy that the server should make when it receives an authorization request.

The no form of the command resets the attribute to its default value.

timeout-bind timeout-search

Sets the global LDAP bind timeout for all LDAP servers.

Sets the global LDAP search timeout for all LDAP servers.

Range: 1-60 seconds.

Default seconds

5 seconds

Configuration Mode Config

History 3.1.0000

3.4.0000

Updated Example

Role

Example admin switch (config) # ldap timeout-bind 10 switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 10

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 324

ldap version

ldap version <version> no ldap version

Syntax Description

Default

Sets the LDAP version.

The no form of the command resets the attribute to its default value.

version

3

Configuration Mode Config

History 3.1.0000

Sets the LDAP version. Values: 2 and 3.

Role

Example

3.4.0000

admin

Updated Example switch (config) # ldap version 3 switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 10

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 325

show ldap

show ldap

Syntax Description

Default

Displays LDAP configurations.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.4.0000

Updated Example

Role

Example admin switch (config) # show ldap

User base DN : ou=department,dc=example,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : my-dn

Bind password : my-password

Group base DN : my-group-dn

Group attribute : member

LDAP version : 3

Referrals : no

Server port : 1111

Search Timeout : 5

Bind Timeout : 10

SSL mode : none

Server SSL port : 636 (not active)

SSL ciphers : TLS1.2 (not active)

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.10.10.10

2: 10.10.10.12

switch (config) #

Related Commands show aaa show ldap

Notes

Rev 4.20

Mellanox Technologies Confidential 326

4.9.4.6 System Secure Mode

system secure-mode enable

system secure-mode enable no system secure-mode enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables secure mode on the switch.

The no form of the command disables secure mode.

N/A

Disabled

Config

3.4.2300

admin switch (config) # system secure-mode enable

Related Commands

Notes

Warning! Configuration is about to be saved and the system will be reloaded.

Type 'YES' to confirm the change in secure mode: YES user <username> password <password> ssh server min-version ssh server security strict snmp-server user no neighbor <ip-address> password router bgp neighbor password router bgp peer-group password

Before enabling secure mode, the command performs the following configuration checks:

• SSH min-version cannot be 1 when enabling secure mode

• SSH security must be set to strict security

• SNMPv3 user auth cannot be md5 when enabling secure mode

• SNMPv3 user priv cannot be des when enabling secure mode

• SNMPv3 trap auth cannot be md5 when enabling secure mode

• SNMPv3 trap priv cannot be des when enabling secure mode

• Router BGP neighbor password cannot be set when enabling secure mode

• Router BGP peer-group password cannot be set when enabling with secure mode

• User password hash cannot be MD5 when secure mode is enabled

Only if the check passes, secure mode is enabled on the switch system.

Rev 4.20

Mellanox Technologies Confidential 327

show system secure-mode

show system secure-mode

Syntax Description

Default

Displays the security mode of the switch system.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2300

admin switch (config) # show system secure-mode

Secure mode configured: yes

Secure mode enabled : yes switch (config) #

Related Commands system secure-mode enable

Notes “Secure mode configuration” describes the user configuration

“Secure mode enabled” describes the system state

Rev 4.20

Mellanox Technologies Confidential 328

4.10 Cryptographic (X.509, IPSec)

This chapter contains commands for configuring, generating and modifying x.509 certificates used in the system. Certificates are used for creating a trusted SSL connection to the system.

Crypto commands also cover IPSec configuration commands used for establishing a secure connection between hosts over IP layer which is useful for transferring sensitive information.

Rev 4.20

Mellanox Technologies Confidential 329

Rev 4.20

4.10.1 Commands

crypto ipsec ike

crypto ipsec ike {clear sa [peer {any | <IPv4 or IPv6 address>} local <IPv4 or

IPv6 address>] | restart}

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Manage the IKE (ISAKMP) process or database state clear Clears IKE (ISAKMP) peering state sa peer

Clears IKE generated ISAKMP and IPSec security associations (remote peers are affected)

Clears security associations for the specified IKE peer

(remote peers are affected) all – clears security associations for all IKE peerings with a specific local address (remote peers are affected)

IPv4 or IPv6 address – clears security associations for specific IKE peering with a specific local address

(remote peers are affected)

IPv4 or IPv6 address local restart

Clears security associations for the specified IKE peering (remote peer is affected)

Clear security associations for the specified/all IKE peering (remote peer is affected)

Restarts the IKE (ISAKMP) daemon (clears all IKE state, peers may be affected)

N/A

Config

3.2.3000

admin switch (config)# crypto ipsec ike restart switch (config)#

N/A

Mellanox Technologies Confidential 330

Rev 4.20

crypto ipsec peer local

crypto ipsec peer <IPv4 or IPv6 address> local <IPv4 or IPv6 address> {enable | keying {ike [auth {hmac-md5 | hmac-sha1 | hmac-sha256 | null} | dh-group | disable | encrypt | exchange-mode | lifetime | local | mode | peer-identity | pfs-group | preshared-key | prompt-preshared-key | transform-set] | manual [auth | disable | encrypt | local-spi | mode | remote-spi]}}

Syntax Description

Configures ipsec in the system.

enable Enables IPSec peering.

ike Configures IPSec peering using IKE ISAKMP to manage SA keys. It has the following optional parameters:

• auth: Configures the authentication algorithm for IPSec peering

• dh-group: Configures the phase1 Diffie-Hellman group proposed for secure IKE key exchange

• disable: Configures this IPSec peering administratively disabled

• encrypt: Configures the encryption algorithm for IPSec peering

• exchange-mode: Configures the IKE key exchange mode to propose for peering

• lifetime: Configures the SA lifetime to propose for this

IPSec peering

• local-identity: Configures the ISAKMP payload identification value to send as local endpoint's identity

• mode: Configures the peering mode for this IPSec peering

• peer-identity: Configures the identification value to match against the peer's ISAKMP payload identification

• pfs-group: Configures the phase2 PFS (Perfect Forwarding Secrecy) group to propose for Diffie-Hellman exchange for this IPSec peering

• preshared-key: Configures the IKE pre-shared key for the

IPSec peering

• prompt-preshared-key: Prompts for the pre-shared key, rather than entering it on the command line

• transform-set: Configures transform proposal parameters keying manual

Configures key management for this IPSec peering:

• auth: Configures the authentication algorithm for this

IPSec peering

• disable: Configures this IPSec peering administratively disabled

• encrypt: Configures the encryption algorithm for this

IPSec peering

• local-spi: Configures the local SPI for this manual IPSec peering

• mode: Configures the peering mode for this IPSec peering

• remote-spi: Configures the remote SPI for this manual

IPSec peering

Configures IPSec peering using manual keys.

Mellanox Technologies Confidential 331

Rev 4.20

Default N/A

Configuration Mode Config

History

Role

Example

3.2.3000

admin switch (config)# crypto ipsec peer 10.10.10.10 local 10.7.34.139 enable switch (config)#

Related Commands N/A

Notes

Mellanox Technologies Confidential 332

Rev 4.20

crypto certificate ca-list

crypto certificate ca-list [default-ca-list name {<cert-name> | system-selfsigned}] no crypto certificate ca-list [default-ca-list name {<cert-name> | system-selfsigned}]

Syntax Description

Default

Adds the specified CA certificate to the default CA certificate list.

The no form of the command removes the certificate from the default CA certificate list.

cert-name

N/A

Configuration Mode Config

History 3.2.3000

The name of the certificate.

Role

Example admin switch (config) # crypto certificate default-cert name test

Related Commands N/A

Notes • Two certificates with the same subject and issuer fields cannot both be placed onto the CA list

• The no form of the command does not delete the certificate from the certificate database

• Unless specified otherwise, applications that use CA certificates will still consult the wellknown certificate bundle before looking at the default-ca-list

Mellanox Technologies Confidential 333

crypto certificate default-cert

crypto certificate default-cert name {<cert-name> | system-self-signed} no crypto certificate default-cert name {<cert-name> | system-self-signed}

Syntax Description

Default

Designates the named certificate as the global default certificate role for authentication of this system to clients.

The no form of the command reverts the default-cert name to “system-self-signed”

(the “cert-name” value is optional and ignored).

cert-name

N/A

Configuration Mode Config

History 3.2.3000

The name of the certificate.

Role

Example admin switch (config) # crypto certificate default-cert name test

Related Commands N/A

Notes • A certificate must already be defined before it can be configured in the default-cert role

• If the named default-cert is deleted from the database, the default-cert automatically becomes reconfigured to the factory default, the “system-self-signed” certificate

Rev 4.20

Mellanox Technologies Confidential 334

Rev 4.20

crypto certificate generation

crypto certificate generation default {country-code | days-valid | email-addr | hash-algorithm {sha1 | sha256} | key-size-bits | locality | org-unit | organization | state-or-prov}

Syntax Description

Configures default values for certificate generation.

country-code Configures the default certificate value for country code with a two-alphanumeric-character code or -- for none.

days-valid email-addr

Configures the default certificate value for days valid.

Configures the default certificate value for email address.

Configures the default certificate hashing algorithm.

hash-algorithm {sha1 | sha256} key-size-bits Configures the default certificate value for private key size. (Private key length in bits – at least 1024, but 2048 is strongly recommended.) locality org-unit organization state-or-prov

Configures the default certificate value for locality.

Configures the default certificate value for organizational unit.

Configures the default certificate value for the organization name.

Configures the default certificate value for state or province.

Default N/A

Configuration Mode Config

History

Role

Example

3.2.1000

3.3.4350

First version

Added “hash-algorithm” parameter admin switch (config) # crypto certificate generation default hash-algorithm sha256

Related Commands N/A

Notes The default hashing algorithm used is sha1.

Mellanox Technologies Confidential 335

Rev 4.20

crypto certificate name

crypto certificate name {<cert-name> | system-self-signed} {comment <new comment> | generate self-signed [comment <cert-comment> | common-name

<domain> | country-code <code> | days-valid <days> | email-addr <address> | hash-algorithm {sha1 | sha256} | key-size-bits <bits> | locality <name> | org-unit

<name> | organization <name> | serial-num <number> | state-or-prov <name>]}

| private-key pem <PEM string> | prompt-private-key | public-cert [comment

<comment string> | pem <PEM string>] | regenerate days-valid <days> | rename

<new name>} no crypto certificate name <cert-name>

Syntax Description

Default

Configures default values for certificate generation.

The no form of the command clears/deletes certain certificate settings.

cert-name comment generate self-signed

Unique name by which the certificate is identified.

Specifies a certificate comment.

Generates certificates. This option has the following parameters which may be entered sequentially in any order:

• comment: Specifies a certificate comment (free string)

• common-name: Specifies the common name of the issuer and subject (e.g. a domain name)

• country-code: Specifies the country codwo-alphanumeric-character country code, or “--” for none)

• days-valid: Specifies the number of days the certificate is valid

• email-addr: Specifies the email address

• hash-algorithm: Specifies the hashing function used for signature algorithm

• key-size-bits: Specifies the size of the private key in bits

(private key length in bits - at least 1024 but 2048 is strongly recommended)

• locality: Specifies the locality name

• org-unit: Specifies the organizational unit name

• organization: Specifies the organization name

• serial-num: Specifies the serial number for the certificate

(a lower-case hexadecimal serial number prefixed with

“0x”)

• state-or-prov: Specifies the state or province name private-key pem prompt-private-key public-cert regenerate rename

N/A

Specifies certificate contents in PEM format.

Prompts for certificate private key with secure echo.

Installs a certificate.

Regenerates the named certificate using configured certificate generation default values for the specified validity period

Renames the certificate.

Mellanox Technologies Confidential 336

Rev 4.20

Configuration Mode Config

History 3.2.3000

Role

Example

3.3.4402

admin

First version

Added “hash-algorithm” parameter switch (config) # crypto certificate name system-self-signed generate self-signed hash-algorithm sha256

Related Commands N/A

Notes

Mellanox Technologies Confidential 337

crypto certificate system-self-signed

crypto certificate system-self-signed regenerate [days-valid <days>]

Syntax Description

Default

Configures default values for certificate generation.

days-valid

N/A

Configuration Mode Config

Specifies the number of days the certificate is valid

History

Role

Example

3.2.1000

admin switch (config) # crypto certificate system-self-signed regenerate days-valid 3

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 338

Rev 4.20

show crypto certificate

show crypto certificate [detail | public-pem | default-cert [detail | public-pem] |

[name <cert-name> [detail | public-pem] | ca-list [default-ca-list]]

Syntax Description

Displays information about all certificates in the certificate database.

ca-list Displays the list of supplemental certificates configured for the global default system CA certificate role.

default-ca-list default-cert

Displays information about the currently configured default certificates of the CA list.

Displays information about the currently configured default certificate.

detail name public-pem

Displays all attributes related to the certificate.

Displays information about the certificate specified.

Displays the uninterpreted public certificate as a PEM formatted data string

Default N/A

Configuration Mode Config

History

Role

3.2.1000

admin

Mellanox Technologies Confidential 339

Rev 4.20

Example switch (config)# show crypto certificate

Certificate with name 'system-self-signed' (default-cert)

Comment: system-generated self-signed certificate

Private Key: present

Serial Number: 0x546c935511bcafc21ac0e8249fbe0844

SHA-1 Fingerprint: fe6df38dd26801971cb2d44f62dbe492b6063c5f

Validity:

Starts: 2012/12/02 13:45:05

Expires: 2013/12/02 13:45:05

Subject:

Common Name: IBM-DEV-Bay4

Country: IS

State or Province:

Locality:

Organization:

Organizational Unit:

E-mail Address:

Issuer:

Common Name: IBM-DEV-Bay4

Country: IS

State or Province:

Locality:

Organization:

Organizational Unit:

E-mail Address: switch (config)#

Related Commands N/A

Notes

Mellanox Technologies Confidential 340

show crypto ipsec

show crypto ipsec [brief | configured | ike | policy | sa]

Syntax Description

Default

Displays information ipsec configuration.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.2.1000

admin switch (config)# show crypto ipsec

IPSec Summary

-------------

Crypto IKE is using pluto (Openswan) daemon.

Daemon process state is stopped.

No IPSec peers configured.

IPSec IKE Peering State

-----------------------

Crypto IKE is using pluto (Openswan) daemon.

Daemon process state is stopped.

No active IPSec IKE peers.

IPSec Policy State

------------------

No active IPSec policies.

IPSec Security Association State

--------------------------------

No active IPSec security associations.

switch (config)#

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 341

4.11 Scheduled Jobs

Use the commands in this section to manage and schedule the execution of jobs

4.11.1 Commands

job

job <job ID> no job <job ID>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Creates a job.

The no form of the command deletes the job.

job ID

N/A

An integer.

Config

3.1.0000

admin switch (config) # job 100 switch (config job 100) # show jobs

Job state is lost on reboot.

Rev 4.20

Mellanox Technologies Confidential 342

Rev 4.20

command

command <sequence #> | <command> no command <sequence #>

Syntax Description

Adds a CLI command to the job.

The no form of the command deletes the command from the job. sequence # An integer that controls the order the command is executed relative to other commands in this job. The commands are executed in an ascending order.

Default command

N/A

Configuration Mode Config job

History

Role

Example

3.1.0000

admin

A CLI command.

switch (config)# job 100 switch (config job 100) # command 10 “show power” switch (config job 100) #

Related Commands show jobs

Notes • The command must be defined with inverted commas (“”)

• The command must be added as it was executed from the “config” mode. For example, in order to change the interface description you need to add the command: “interface <type>

<number> description my-description”.

Mellanox Technologies Confidential 343

comment

comment <comment> no comment

Syntax Description

Default

Adds a comment to the job.

The no form of the command deletes the comment.

comment

“”

Configuration Mode Config job

History 3.1.0000

The comment to be added (string).

Role

Example admin switch (config)# job 100 switch (config job 100) # comment Job_for_example switch (config job 100) #

Related Commands show jobs

Notes

Rev 4.20

Mellanox Technologies Confidential 344

enable

enable no enable

Syntax Description

Default

Enables the specified job.

The no form of the command disables the specified job.

N/A

N/A

Configuration Mode Config job

History 3.1.0000

Role

Example admin switch (config)# job 100 switch (config job 100) # enable switch (config job 100) #

Related Commands show jobs

Notes If a job is disabled, it will not be executed automatically according to its schedule; nor can it be executed manually.

Rev 4.20

Mellanox Technologies Confidential 345

execute

execute

Syntax Description

Default

Forces an immediate execution of the job.

N/A

N/A

Configuration Mode Config job

History

Role

Example

3.1.0000

admin switch (config)# job 100 switch (config job 100) # execute switch (config job 100) #

Related Commands show jobs

Notes • The job timer (if set) is not canceled and the job state is not changed: i.e. the time of the next automatic execution is not affected

• The job will not be run if not currently enabled

Rev 4.20

Mellanox Technologies Confidential 346

fail-continue

fail-continue no fail-continue

Syntax Description

Default

Continues the job execution regardless of any job failures.

The no form of the command returns fail-continue to its default.

N/A

A job will halt execution as soon as any of its commands fails

Configuration Mode Config job

History 3.1.0000

Role

Example admin switch (config)# job 100 switch (config job 100) # fail-continue switch (config job 100) #

Related Commands show jobs

Notes

Rev 4.20

Mellanox Technologies Confidential 347

name

name <job name> no name

Syntax Description

Default

Configures a name for this job.

The no form of the command resets the name to its default.

name

“”.

Configuration Mode Config job

History 3.1.0000

Specifies a name for the job (string).

Role

Example admin switch (config)# job 100 switch (config job 100) # name my-job switch (config job 100) #

Related Commands show jobs

Notes

Rev 4.20

Mellanox Technologies Confidential 348

Rev 4.20

schedule type

schedule type <recurrence type> no schedule type

Syntax Description

Sets the type of schedule the job will automatically execute on.

The no form of the command resets the schedule type to its default.

recurrence type The available schedule types are:

• daily - the job is executed every day at a specified time

• weekly - the job is executed on a weekly basis

• monthly - the job is executed every month on a specified day of the month

• once - the job is executed once at a single specified date and time

• periodic - the job is executed on a specified fixed time interval, starting from a fixed point in time.

Default once

Configuration Mode Config job

History

Role

Example

3.1.0000

admin switch (config)# job 100 switch (config job 100) # schedule type once switch (config job 100) #

Related Commands show jobs

Notes A schedule type is essentially a structure for specifying one or more future dates and times for a job to execute.

Mellanox Technologies Confidential 349

Rev 4.20

schedule <recurrence type>

schedule <recurrence type> <interval and date> no schedule

Syntax Description

Sets the type of schedule the job will automatically execute on.

The no form of the command resets the schedule type to its default.

recurrence type The available schedule types are:

• daily - the job is executed every day at a specified time

• weekly - the job is executed on a weekly basis

• monthly - the job is executed every month on a specified day of the month

• once - the job is executed once at a single specified date and time

• periodic - the job is executed on a specified fixed time interval, starting from a fixed point in time.

Default interval and date once

Configuration Mode Config job

History

Role

Example

3.1.0000

admin

Interval and date, per recurrence type.

switch (config)# job 100 switch (config job 100) # schedule monthly interval 10 switch (config job 100) #

Related Commands show jobs

Notes A schedule type is essentially a structure for specifying one or more future dates and times for a job to execute.

Mellanox Technologies Confidential 350

show jobs

show jobs [<job-id>]

Syntax Description

Default

Displays configuration and state (including results of last execution, if any exist) of all jobs, or of one job if a job ID is specified.

job-id

N/A

Configuration Mode Config

History 3.1.0000

Job ID.

Role

Example admin switch (config) # show jobs 10

Job 10:

Status: inactive

Enabled: yes

Continue on failure: no

Schedule Type: once

Time and date: 1970/01/01 00:00:00 +0000

Last Exec Time: Thu 2012/04/05 13:11:42 +0000

Next Exec Time: N/A

Commands:

Command 10: show power

Last Output:

=====================

Module Status

=====================

PS1 OK

PS2 NOT PRESENT switch (config) #

Related Commands show jobs

Notes

Rev 4.20

Mellanox Technologies Confidential 351

Rev 4.20

4.12 Statistics and Alarms

4.12.1 Commands

stats alarm <alarm-id> clear

stats alarm <alarm ID> clear

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Clears alarm state.

alarm ID Alarms supported by the system, for example:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

N/A

Config

3.1.0000

admin switch (config) # stats alarm cpu_util_indiv clear switch (config) # show stats alarm

Mellanox Technologies Confidential 352

Rev 4.20

stats alarm <alarm-id> enable

stats alarm <alarm-id> enable no stats alarm <alarm-id> enable

Enables the alarm.

The no form of the command disables the alarm, notifications will not be received.

Syntax Description alarm ID

Default

Configuration Mode Config

Alarms supported by the system, for example:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

The default is different per alarm-id

History

Role

Example

3.1.0000

admin switch (config) # stats alarm cpu_util_indiv enable switch (config) #

Related Commands show stats alarm

Notes

Mellanox Technologies Confidential 353

Rev 4.20

stats alarm <alarm-id> event-repeat

stats alarm <alarm ID> event-repeat {single | while-not-cleared} no stats alarm <alarm ID> event-repeat

Syntax Description

Configures repetition of events from this alarm.

alarm ID single

Alarms supported by the system, for example:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

Does not repeat events: only sends one event whenever the alarm changes state.

Repeats error events until the alarm clears.

Default while-not-cleared single

Configuration Mode Config

History

Role

Example

3.1.0000

monitor/admin switch (config) # stats alarm cpu_util_indiv event-repeat single switch (config) #

Related Commands show stats alarm

Notes

Mellanox Technologies Confidential 354

Rev 4.20

stats alarm <alarm-id> {rising | falling}

stats alarm <alarm ID> {rising | falling} {clear-threshold | error-threshold}

<threshold-value>

Syntax Description

Configure alarms thresholds.

alarm ID falling

Alarms supported by the system, for example:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

Configures alarm for when the statistic falls too low.

rising error-threshold

Configures alarm for when the statistic rises too high.

Sets threshold to trigger falling or rising alarm.

threshold-value

Default

Configuration Mode Config

The desired threshold value, different per alarm.

Default is different per alarm-id

History

Role

Example

3.1.0000

admin switch (config) # stats alarm cpu_util_indiv falling clear-threshold 10 switch (config) #

Related Commands show stats alarm

Notes Not all alarms support all four thresholds.

Mellanox Technologies Confidential 355

Rev 4.20

stats alarm <alarm-id> rate-limit

stats alarm <alarm ID> rate-limit {count <count-type> <count> | reset | window

<window-type> <duration>}

Syntax Description

Default

Configures alarms rate limit.

alarm ID count-type

Alarms supported by the system, for example:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

Long medium, or short count (number of alarms).

reset Set the count and window durations to default values for this alarm.

Long medium, or short count, in seconds.

window-type

Short window: 5 alarms in 1 hour

Medium window: 20 alarms in 1 day

Long window: 50 alarms in 7 days

Configuration Mode Config

History 3.1.0000

Role

Example monitor/admin switch (config) # stats alarm paging rate-limit window long 2000 switch (config) #

Related Commands show stats alarm

Notes

Mellanox Technologies Confidential 356

stats chd <chd-id> clear

stats chd <CHD ID> clear

Syntax Description

Clears CHD counters.

CHD ID CHD supported by the system, for example:

• cpu_util - CPU utilization: percentage of time spent

• cpu_util_ave - CPU utilization average: percentage of time spent

• cpu_util_day - CPU utilization average: percentage of time spent

• disk_device_io_hour - Storage device I/O read/write statistics for the last hour: bytes

• disk_io - Operating system aggregate disk I/O average

(KB/sec)

• eth_day

• eth_hour

• eth_ip_day

• eth_ip_hour

• fs_mnt_day - Filesystem system usage average: bytes

• fs_mnt_month - Filesystem system usage average: bytes

• fs_mnt_week - Filesystem system usage average: bytes

• ib_day

• ib_hour

• intf_day - Network interface statistics aggregation: bytes

• intf_hour - Network interface statistics (same as “interface” sample)

• intf_util - Aggregate network utilization across all interfaces

• memory_day - Average physical memory usage: bytes

• memory_pct - Average physical memory usage

• paging - Paging activity: page faults

• paging_day - Paging activity: page faults

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # stats chd memory_day clear switch (config) #

Related Commands show stats chd

Notes

Rev 4.20

Mellanox Technologies Confidential 357

stats chd <chd-id> enable

stats chd <chd-id> enable no stats chd <chd-id> enable

Syntax Description

Enables the CHD.

The no form of the command disables the CHD.

chd-id CHD supported by the system, for example:

• cpu_util - CPU utilization: percentage of time spent

• cpu_util_ave - CPU utilization average: percentage of time spent

• cpu_util_day - CPU utilization average: percentage of time spent

• disk_device_io_hour - Storage device I/O read/write statistics for the last hour: bytes

• disk_io - Operating system aggregate disk I/O average:

KB/sec

• eth_day

• eth_hour

• fs_mnt_day - Filesystem system usage average: bytes

• fs_mnt_month - Filesystem system usage average: bytes

• fs_mnt_week - Filesystem system usage average: bytes

• ib_day

• ib_hour

• intf_day - Network interface statistics aggregation: bytes

• intf_hour - Network interface statistics (same as “interface” sample)

• intf_util - Aggregate network utilization across all interfaces

• memory_day - Average physical memory usage: bytes

• memory_pct - Average physical memory usage

• paging - Paging activity: page faults

• paging_day - Paging activity: page faults

Default Enabled

Configuration Mode Config

History

Role

Example

3.1.0000

monitor/admin switch (config) # stats chd memory_day enable switch (config) #

Related Commands show stats chd

Notes

Rev 4.20

Mellanox Technologies Confidential 358

stats chd <chd-id> compute time

stats chd <CHD ID> compute time {interval | range} <number of seconds>

Syntax Description

Sets parameters for when this CHD is computed.

CHD ID interval

Possible IDs:

• cpu_util - CPU utilization: percentage of time spent

• cpu_util_ave - CPU utilization average: percentage of time spent

• cpu_util_day - CPU utilization average: percentage of time spent

• disk_device_io_hour - Storage device I/O read/write statistics for the last hour: bytes

• disk_io - Operating system aggregate disk I/O average:

KB/sec

• eth_day

• eth_hour

• fs_mnt_day - Filesystem system usage average: bytes

• fs_mnt_month - Filesystem system usage average: bytes

• fs_mnt_week - Filesystem system usage average: bytes

• ib_day

• ib_hour

• intf_day - Network interface statistics aggregation: bytes

• intf_hour - Network interface statistics (same as “interface” sample)

• intf_util - Aggregate network utilization across all interfaces

• memory_day - Average physical memory usage: bytes

• memory_pct - Average physical memory usage

• paging - Paging activity: page faults

• paging_day - Paging activity: page faults

Specifies calculation interval (how often to do a new calculation) in number of seconds.

range number of seconds

Specifies calculation range, in number of seconds.

Number of seconds.

Default Different per CHD

Configuration Mode Config

History

Role

Example

3.1.0000

monitor/admin switch (config) # stats chd memory_day compute time interval 120 switch (config) # show stats chd memory_day

CHD "memory_day" (Average physical memory usage: bytes):

Source dataset: sample "memory"

Computation basis: time

Interval: 120 second(s)

Range: 1800 second(s) switch (config) #

Rev 4.20

Mellanox Technologies Confidential 359

Related Commands show stats chd

Notes

Rev 4.20

Mellanox Technologies Confidential 360

stats sample <sample-id> clear

stats sample <sample ID> clear

Syntax Description

Clears sample history.

sample ID Possible sample IDs are:

• congested

• cpu_util - CPU utilization: milliseconds of time spent

• disk_device_io - Storage device I/O statistics

• disk_io - Operating system aggregate disk I/O: KB/sec

• eth

• eth-abs

• eth_ip

• fan - Fan speed

• fs_mnt_bytes - Filesystem usage: bytes

• fs_mnt_inodes - Filesystem usage: inodes

• ib

• interface - Network interface statistics

• intf_util - Network interface utilization: bytes

• memory - System memory utilization: bytes

• paging - Paging activity: page faults

• power - Power supply usage

• power-consumption

• temperature - Modules temperature

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # stats sample temperature clear switch (config) #

Related Commands show stats sample

Notes

Rev 4.20

Mellanox Technologies Confidential 361

stats sample <sample-id> enable

stats sample <sample-id> enable no states sample <sample-id> enable

Syntax Description

Enables the sample.

The no form of the command disables the sample.

sample-id Possible sample IDs are:

• congested

• cpu_util - CPU utilization: milliseconds of time spent

• disk_device_io - Storage device I/O statistics

• disk_io - Operating system aggregate disk I/O: KB/sec

• eth

• fan - Fan speed

• fs_mnt_bytes - Filesystem usage: bytes

• fs_mnt_inodes - Filesystem usage: inodes

• ib

• interface - Network interface statistics

• intf_util - Network interface utilization: bytes

• memory - System memory utilization: bytes

• paging - Paging activity: page faults

• power - Power supply usage

• power-consumption

• temperature - Modules temperature

Default Enabled

Configuration Mode Config

History

Role

3.1.0000

admin

Example switch (config) # stats sample temperature enable switch (config) #

Related Commands show stats sample

Notes

Rev 4.20

Mellanox Technologies Confidential 362

stats sample <sample-id> interval

stats sample <sample ID> interval <number of seconds>

Syntax Description

Sets the amount of time between samples for the specified group of sample data.

sample ID Possible sample IDs are:

• congested

• cpu_util - CPU utilization: milliseconds of time spent

• disk_device_io - Storage device I/O statistics

• disk_io - Operating system aggregate disk I/O: KB/sec

• eth

• fan - Fan speed

• fs_mnt_bytes - Filesystem usage: bytes

• fs_mnt_inodes - Filesystem usage: inodes

• ib

• interface - Network interface statistics

• intf_util - Network interface utilization: bytes

• memory - System memory utilization: bytes

• paging - Paging activity: page faults

• power - Power supply usage

• power-consumption

• temperature - Modules temperature

Interval in seconds.

Default number of seconds

Different per sample

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # stats sample temperature interval 1 switch (config) # show stats sample temperature

Sample "temperature" (Modules temperature):

Enabled: yes

Sampling interval: 1 second switch (config) #

Related Commands show stats sample

Notes

Rev 4.20

Mellanox Technologies Confidential 363

stats clear-all

stats clear all

Syntax Description

Default

Clears data for all samples, CHDs, and status for all alarms.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # stats clear-all switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 364

Rev 4.20

stats export

stats export <format> <report name> [{after | before} <yyyy/mm/dd>

<hh:mm:ss>] [filename <filename>]

Syntax Description

Exports statistics to a file.

format report name after | before yyyy/mm/dd hh:mm:ss filename

Currently the only supported value for <format> is

“csv” (comma-separated value).

Determines dataset to be exported. Possible report names are:

• memory - Memory utilization

• paging - Paging I/O

• cpu_util - CPU utilization

Only includes stats collected after or before a specific time.

Date: It must be between 1970/01/01 and 2038/01/19.

Time: It must be between 00:00:00 and 03:14:07 UTC and is treated as local time.

Specifies filename to give new report. If a filename is specified, the stats will be exported to a file of that name; otherwise a name will be chosen automatically and will contain the name of the report and the time and date of the export. Any automatically-chosen name will be given a .csv extension.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # stats export csv memory filename mellanoxexample before 2000/08/14 15:59:50 after 2000/08/14 15:01:50

Generated report file: mellanoxexample.csv

switch (config) # show files stats mellanoxexample.csv

switch (config) #

Related Commands show files stats

Notes

Mellanox Technologies Confidential 365

Rev 4.20

show stats alarm

show stats alarm [<Alarm ID> [rate-limit]]

Syntax Description

Displays status of all alarms or the specified alarm.

Alarm ID rate-limit

May be:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

Displays rate limit parameters.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show stats alarm

Alarm cpu_util_indiv (Average CPU utilization too high): ok

Alarm disk_io (Operating System Disk I/O per second too high): (disabled)

Alarm fs_mnt (Free filesystem space too low): ok

Alarm intf_util (Network utilization too high): (disabled)

Alarm memory_pct_used (Too much memory in use): (disabled)

Alarm paging (Paging activity too high): ok

Alarm temperature (Temperature is too high): ok switch (config) #

Related Commands stats alarm

Notes

Mellanox Technologies Confidential 366

Rev 4.20

show stats chd

show stats chd [<CHD ID>]

Syntax Description

Default

Displays configuration of all statistics CHDs.

CHD ID May be:

• cpu_util_indiv - Average CPU utilization too high: percent utilization

• disk_io - Operating System Disk I/O per second too high: kilobytes per second

• fs_mnt - Free filesystem space too low: percent of disk space free

• intf_util - Network utilization too high: bytes per second

• memory_pct_used - Too much memory in use: percent of physical memory used

• paging - Paging activity too high: page faults

• temperature - Temperature is too high: degrees

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show stats chd disk_device_io_hour

CHD "disk_device_io_hour" (Storage device I/O read/write statistics for the last

hour: bytes):

Enabled: yes

Source dataset: sample "disk_device_io"

Computation basis: data points

Interval: 1 data point(s)

Range: 1 data point(s) switch (config) #

Related Commands stats chd

Notes

Mellanox Technologies Confidential 367

show stats cpu

show stats cpu

Displays some basic stats about CPU utilization:

• the current level

• the peak over the past hour

• the average over the past hour

N/A Syntax Description

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show stats cpu

CPU 0

Utilization: 6%

Peak Utilization Last Hour: 16% at 2012/02/28 08:47:32

Avg. Utilization Last Hour: 8% switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 368

show stats sample

show stats sample [<sample ID>]

Syntax Description

Displays sampling interval for all samples, or the specified one.

sample ID Possible sample IDs are:

• congested

• cpu_util - CPU utilization: milliseconds of time spent

• disk_device_io - Storage device I/O statistics

• disk_io - Operating system aggregate disk I/O: KB/sec

• eth

• fan - Fan speed

• fs_mnt_bytes - Filesystem usage: bytes

• fs_mnt_inodes - Filesystem usage: inodes

• ib

• interface - Network interface statistics

• intf_util - Network interface utilization: bytes

• memory - System memory utilization: bytes

• paging - Paging activity: page faults

• power - Power supply usage

• power-consumption

• temperature - Modules temperature

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show stats sample fan

Sample "fan" (Fan speed):

Enabled: yes

Sampling interval: 1 minute 11 seconds switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 369

4.13

Chassis Management

The Chassis Manager provides the user access to the following information:

Table 24 - Chassis Manager Information

Accessible Parameters switch temperatures power supply voltages fan unit power unit

Flash memory

Description

Displays system’s temperature

Displays power supplies’ voltage levels

Displays system fans’ status

Displays system power consumers

Displays information about system memory utilization.

Additionally, it monitors:

• AC power to the PSUs

• DC power out from the PSUs

• Chassis failures

4.13.1 System Health Monitor

The system health monitor scans the system to decide whether or not the system is healthy. When the monitor discovers that one of the system's modules (leaf, spine, fan, or power supply) is in an unhealthy state or returned from an unhealthy state, it notifies the users through the following methods:

• System logs – accessible to the user at any time as they are saved permanently on the system

• Status LEDs – changed by the system health monitor when an error is found in the system and is resolved

• email/SNMP traps – notification on any error found in the system and resolved

4.13.1.1 Re-Notification on Errors

When the system is in an unhealthy state, the system health monitor notifies the user about the current unresolved issue every X seconds. The user can configure the re-notification gap by running the “health notif-cntr <counter>” command.

Rev 4.20

Mellanox Technologies Confidential 370

Rev 4.20

4.13.1.2 System Health Monitor Alerts Scenarios

• System Health Monitor sends notification alerts in the following cases:

Table 25 - System Health Monitor Alerts Scenarios (Sheet 1 of 2)

Alert Message Scenario Notification Indicator Recovery Action Recovery Message

Fan <fan_number> speed is below minimal range

Fan <fan_number> speed in spine number

<spine_number> is below minimal range

Fan <fan_number> is unresponsive

Fan <fan_number> in spine number

<spine_number> is unresponsive

Fan <fan_number> is not present

Fan <fan_number> in spine number

<spine_number> is not present.

Insufficient number of working fans in the system

Power supply

<ps_number> is unresponsive

A chassis fan speed is below minimal threshold:

15% of maximum speed

A spine fan speed is below minimal threshold:

30% of maximum speed

A chassis fan is not responsive on MLNX-OS systems

A spine fan is not responsive on MLNX-OS systems

A chassis fan is missing

A spine fan is missing

Insufficient number of working fans in the system

A power supply unit is not responsive, or the power supplied to the PS unit is below 10V on MLNX-OS systems

Email, fan LED and system status LED set red, log alert, SNMP.

Email, fan LED and system status LED set red, log alert, SNMP

Email, fan LED and system status LED set red, log alert, SNMP

Email, fan LED and system status LED set red, log alert, SNMP

Email, fan LED and system status LED set red, log alert, SNMP

Email, fan LED and system status LED set red, log alert, SNMP

Email, fan LED and system status LED set red, log alert, SNMP

Email, power supply

LED and system status LED set red, log alert, SNMP

Check the fan and replace it if required

Check the fan and replace it if required

“Fan <fan_number> has been restored to its normal state”

“Fan speed

<fan_number> in spine number

<spine_number> has been restored to its normal state”

“Fan <fan_number> has been restored to its normal state”

Check fan connectivity and replace it if required

Check fan connectivity and replace it if required

“Fan <fan_number> in spine number

<spine_number> has been restored to its normal state”

Insert a fan unit “Fan <fan_number> has been restored to its normal state”

Insert a fan unit “Fan <fan_number> in spine number

<spine_number> has been restored to its normal state”

Plug in additional fans or change faulty fans

Check the PS module

“The system currently has sufficient number of working fans”

“Power supply

<ps_number> has been restored to its normal state”

Mellanox Technologies Confidential 371

Rev 4.20

Table 25 - System Health Monitor Alerts Scenarios (Sheet 2 of 2)

Alert Message

Power supply

<ps_number> temperature is too hot

Unit/leaf/spine

<leaf/spine number> is unresponsive

Unit/leaf/spine voltage is out of range

ASIC temperature is too hot

Power Supply

<number> is unresponsive

Scenario Notification Indicator Recovery Action Recovery Message

A power supply unit temperature is higher than the maximum threshold of 70

Celsius on MLNX-OS systems

A leaf/spine is not responsive

Email, power supply

LED and system status LED set red, log alert, SNMP

Email, system status

LED set red, log alert,

SNMP

Email, system status

LED set red, log alert,

SNMP

Check chassis fans connections. On

MLNX-OS systems, check system fan connections.

Check leaf/ spine connectivity and replace it if required

Check leaf connectivity

“Power supply

<ps_number> temperature is back to normal”

“Leaf/spine number <leaf/spine number> has been restored to its normal state”

“Unit voltage is in range”

One of the voltages in a

MLNX-OS unit is below minimal threshold or higher than the maximum threshold - both thresholds are 15% of the expected voltage

A SwitchX unit temperature is higher than the maximum threshold of 105

Celsius on MLNX-OS systems

A power supply is malfunctioning or disconnected

Email, system status

LED set red, log alert,

SNMP

Check the fans system

Email, system status

LED set red, log alert,

SNMP

Connect power cable or replace malfunctioning

PS

“SwitchX temperature is back to normal”

“Power supply has been removed” or “PS has been restored to its normal state”

4.13.2 Power Management

4.13.2.1 Width Reduction Power Saving

Link width reduction (LWR) is a Mellanox proprietary power saving feature to be utilized to economize the power usage of the fabric. LWR may be used to manually or automatically configure a certain connection between Mellanox switch systems to lower the width of a link from 4X operation to 1X based on the traffic flow.

LWR is relevant only for 40GbE and InfiniBand FDR speeds in which the links are operational at a 4X width.

When “show interfaces” is used, a port’s speed appears unchanged even when only one lane is active.

Mellanox Technologies Confidential 372

Rev 4.20

LWR has three operating modes per interface:

• Disabled – LWR does not operate and the link remains in 4X under all circumstances.

• Automatic – the link automatically alternates between 4X and 1X based on traffic flow.

• Force – a port is forced to operate in 1X mode lowering the throughput capability of the port. This mode should be chosen in cases where constant low throughput is expected on the port for a certain time period – after which the port should be configured to one of the other two modes, to allow higher throughput to pass through the port.

See command

“power-management width” on page 381

.

Table 26 - LWR Configuration Behavior

Switch-A Configuration Switch-B Configuration

Disable

Disable

Disable

Force

Disable

Auto

Auto

Force

Auto

Force

Auto

Force

Behavior

LWR is disabled.

Transmission from Switch-B to Switch-A operates at

1X. On the opposite direction, LWR is disabled.

Depending on traffic flow, transmission from Switch-

B to Switch-A may operate at 1X. On the opposite direction, LWR is disabled.

Transmission from Switch-B to Switch-A operates at

1 lane. Transmission from Switch-A to Switch-B may operate at 1X depending on the traffic.

Width of the connection depends on the traffic flow

Connection between the switches operates at 1x

Mellanox Technologies Confidential 373

4.13.3 Monitoring Environmental Conditions

Step 1.

Display module’s temperature. Run: switch (config) # show temperature

============================================

Module Sensor CurTemp Status

(Celsius)

============================================

MGMT CPU_BOARD_MONITOR 40.00 OK

L01 BOARD_MONITOR 27.00 OK

L01 QSFP_TEMP1 24.00 OK

L01 QSFP_TEMP2 22.00 OK

L01 QSFP_TEMP3 21.00 OK

L01 SX 38.00 OK

L02 BOARD_MONITOR 27.00 OK

L02 QSFP_TEMP1 24.50 OK

L02 QSFP_TEMP2 22.50 OK

L02 QSFP_TEMP3 21.50 OK

L02 SX 32.00 OK

PS2 PS_MONITOR 24.66 OK

PS3 PS_MONITOR 31.04 OK

PS4 PS_MONITOR 28.06 OK

S01 BOARD_MONITOR 23.00 OK

S01 SX 34.00 OK

S01 SX_AMBIENT_TEMP 22.50 OK

S02 BOARD_MONITOR 24.00 OK

S02 SX 49.00 OK

S02 SX_AMBIENT_TEMP 24.00 OK switch (config) #

Rev 4.20

Mellanox Technologies Confidential 374

Step 2.

Display measured voltage levels of power supplies. Run: switch (config) # show voltage

======================================================

Module Power Meter Reg Expected Actual Status

Voltage Voltage

======================================================

PS2 PS_MONITOR V1 48.00 46.88 OK

PS3 PS_MONITOR V1 48.00 48.29 OK

PS4 PS_MONITOR V1 48.00 48.29 OK

MGMT CPU_BOARD_MONITOR V1 12.00 11.92 OK

MGMT CPU_BOARD_MONITOR V2 2.50 2.48 OK

MGMT CPU_BOARD_MONITOR V3 3.30 3.31 OK

MGMT CPU_BOARD_MONITOR V4 3.30 3.30 OK

MGMT CPU_BOARD_MONITOR V5 1.80 1.81 OK

MGMT CPU_BOARD_MONITOR V6 1.20 1.26 OK

S01 BOARD_MONITOR V1 3.30 3.33 OK

S01 BOARD_MONITOR V2 2.27 2.15 OK

S01 BOARD_MONITOR V3 1.80 1.76 OK

S01 BOARD_MONITOR V4 3.30 3.30 OK

S01 BOARD_MONITOR V5 0.90 0.93 OK

S01 BOARD_MONITOR V6 1.20 1.19 OK

S02 BOARD_MONITOR V1 3.30 3.26 OK

S02 BOARD_MONITOR V2 2.27 2.16 OK

S02 BOARD_MONITOR V3 1.80 1.79 OK

S02 BOARD_MONITOR V4 3.30 3.31 OK

S02 BOARD_MONITOR V5 0.90 0.95 OK

S02 BOARD_MONITOR V6 1.20 1.20 OK

L01 BOARD_MONITOR V1 3.30 3.33 OK

L01 BOARD_MONITOR V2 2.27 2.16 OK

L01 BOARD_MONITOR V3 1.80 1.76 OK

L01 BOARD_MONITOR V4 3.30 3.30 OK

L01 BOARD_MONITOR V5 0.90 0.93 OK

L01 BOARD_MONITOR V6 1.20 1.19 OK

L02 BOARD_MONITOR V1 3.30 3.26 OK

L02 BOARD_MONITOR V2 2.27 2.17 OK

L02 BOARD_MONITOR V3 1.80 1.79 OK

L02 BOARD_MONITOR V4 3.30 3.30 OK

L02 BOARD_MONITOR V5 0.90 0.89 OK

L02 BOARD_MONITOR V6 1.20 1.19 OK switch (config) #

Rev 4.20

Mellanox Technologies Confidential 375

Step 3.

Step 4.

Display the fan speed and status. Run: switch (config) # show fan

=====================================================

Module Device Fan Speed Status

(RPM)

=====================================================

FAN1 FAN F1 6994.00 OK

FAN2 FAN F1 6792.00 OK

FAN3 FAN F1 6870.00 OK

FAN4 FAN F1 6818.00 OK

S01 FAN F1 7800.00 OK

S01 FAN F2 8130.00 OK

S02 FAN F1 8130.00 OK

S02 FAN F2 8490.00 OK

S03 FAN - - NOT PRESENT

S04 FAN - - NOT PRESENT

S05 FAN - - NOT PRESENT

S06 FAN - - NOT PRESENT switch (config) #

Display the voltage current and status of each module in the system. Run: switch (config) # show power consumers

================================================

Module Power Voltage Current Status

(Watts) (Amp)

================================================

FAN1 15.55 48.00 0.32 OK

FAN2 16.26 48.00 0.34 OK

FAN3 15.30 48.00 0.32 OK

FAN4 14.98 48.00 0.31 OK

L01 32.45 48.00 0.68 OK

L02 28.75 48.00 0.60 OK

MGMT 16.08 48.00 0.34 OK

S01 37.34 48.00 0.78 OK

S02 35.09 48.00 0.73 OK

Total power used : 211.79 W

Max power : 686.00 W switch (config) #

4.13.4 USB Access

MLNX-OS can access USB devices attached to switch systems. USB devices are automatically recognized and mounted upon insertion. To access a USB device for reading or writing a file, you need to provide the path to the file on the mounted USB device in the following format: scp://username:password@hostname/var/mnt/usb1/<file name>

While username and password are the admin username and password and hostname is the IP of the switch.

Rev 4.20

Mellanox Technologies Confidential 376

Examples:

To fetch an image from a USB device, run the command: switch (config) # “image fetch scp://admin:[email protected]/var/mnt/usb1/image.img

To save log file ‘my-logfile’ to a USB device under the name test_logfile using the logging files command, run (in Enable or Config mode): switch (config) # logging files upload my-logfile scp://username:password@hostname/var/ mnt/usb1/test_logfile switch (config) #

To safely remove the USB and to flush the cache, after writing (log files, for example) to a

USB, use the usb eject command (in Enable or Config mode). switch (config) # usb eject switch (config) #

4.13.5 System Reboot

4.13.5.1 Rebooting 1U Switches

To reboot a 1U switch system:

Step 1.

Enter Config mode. Run: switch > switch > enable switch # configure terminal

Step 2.

Reboot the system. Run: switch (config) # reload

Rev 4.20

Mellanox Technologies Confidential 377

4.13.6 Commands

4.13.6.1 Chassis Management

clear counters

clear counters [all | interface <type> <number>]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Clears switch counters.

all type number

N/A

Config Interface Port Channel

3.2.3000

admin

Clears all switch counters.

A specific interface type

The interface number.

switch (config) # clear counters

Rev 4.20

Mellanox Technologies Confidential 378

Rev 4.20

health

health {max-report-len <length> | re-notif-cntr <counter> | report-clear}

Syntax Description

Default

Configures health daemon settings.

max-report-len <length> Sets the length of the health report - number of line entries. Possible values: 10-2048.

re-notif-cntr <counter> Health control changes notification counter, in seconds.

Possible values: 120-7200 seconds.

Clears the health report.

report-clear max-report-len: 50 re-notif-cntr:

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # health re-notif-cntr 125 switch (config) #

Related Commands show health-report

Notes

Mellanox Technologies Confidential 379

power enable

power enable <module name> no power enable <module name>

Syntax Description

Default

Powers on the module.

The no form of the command shuts down the module.

module name Enables power for selected module.

Power is enabled on all modules.

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # power enable L01 switch (config) #

Related Commands show power show power consumers

Notes This command is not applicable for 1U systems.

Rev 4.20

Mellanox Technologies Confidential 380

power-management width

power-management width {auto | force} no power-management width

Syntax Description

Sets the width of the interface to be automatically adjusted.

The no form of the command disables power-saving.

auto Allows the system to automatically decide whether to work in power-saving mode or not.

force

Disabled

Forces power-saving mode on the port.

Default

Configuration Mode

History

Role

Example

Config Interface Ethernet

3.3.4000

admin switch (config interface ib 1/1) # power-management width auto switch (config) #

Related Commands show interface

Notes

Rev 4.20

Mellanox Technologies Confidential 381

usb eject

usb eject

Syntax Description

Default

Gracefully turns off the USB interface.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # usb eject switch (config) #

Related Commands N/A

Notes Applicable only for systems with USB interface.

Rev 4.20

Mellanox Technologies Confidential 382

show fan

show fan

Syntax Description

Default

Displays fans status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show fan switch (config) # show fan

=====================================================

Module Device Fan Speed Status

(RPM)

=====================================================

FAN FAN F1 5340.00 OK

FAN FAN F2 5340.00 OK

FAN FAN F3 5640.00 OK

FAN FAN F4 5640.00 OK

PS1 FAN F1 5730.00 OK

PS2 FAN - - NOT PRESENT switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 383

show version

show version

Syntax Description

Default

Displays version information for the currently running system image.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show version

Product name: MLNX-OS

Product release: 3.1.0000

Build ID: #1-dev

Build date: 2012-02-26 08:47:51

Target arch: ppc

Target hw: m460ex

Built by: root@r-fit16

Uptime: 1d 3h 32m 24.656s

Product model: ppc

Host ID: 0002c911a15e

System memory: 110 MB used / 1917 MB free / 2027 MB total

Swap: 0 MB used / 0 MB free / 0 MB total

Number of CPUs: 1

CPU load averages: 0.18 / 0.19 / 0.16

switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 384

show version concise

show version concise

Syntax Description

Default

Displays concise version information for the currently running system image.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show version concise

SX_PPC_M460EX SX_3.4.0000 2014-10-14 20:26:41 ppc switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 385

Rev 4.20

show uboot

show uboot

Syntax Description

Default

Displays u-boot version.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.5006

3.4.1110

Role

Example

Updated output admin switch (config) # show uboot

UBOOT version : U-Boot 2009.01 SX_PPC_M460EX SX_3.2.0330-82 ppc (Dec 20 2012 - 17:53:54) switch (config) #

Related Commands N/A

Notes

Mellanox Technologies Confidential 386

show cpld

show cpld

Syntax Description

Default

Displays status of all CPLDs in the system.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.4302

Updated example

Role

Example admin switch (config) # show cpld

=====================================

Name Type Version

=====================================

Cpld1 CPLD_TOR 4

Cpld2 CPLD_PORT1 2

Cpld3 CPLD_PORT2 2

Cpld4 CPLD_MEZZ 3 switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 387

show inventory

show inventory

Syntax Description

Default

Displays system inventory.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.4.1604

Removed CPU module output from Example

Role

Example admin switch (config) # show inventory

===================================================================================

Module Type Part number Serial Number Asic revision

===================================================================================

CHASSIS SX1036 MSX1036B-1SFR MT1205X01549 N/A

MGMT SX1036 MSX1036B-1SFR MT1205X01549 0

FAN SXX0XX_FAN MSX60-FF MT1206X07209 N/A

PS1 SXX0XX_PS MSX60-PF MT1206X06697 N/A switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 388

show module

show module

Syntax Description

Default

Displays modules status.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.0000

Role

Example

3.4.2008

3.4.3000

First version

Added “Is Fatal” column

Updated command output

Updated command output and added note admin switch (config) # show module

======================

Module Status

======================

MGMT ready

FAN1 ready

FAN2 ready

PS1 ready

PS2 not-present switch (config) #

Related Commands N/A

Notes The Status column may have one of the following values: error, fatal, not-present, powered-off, powered-on, ready.

Rev 4.20

Mellanox Technologies Confidential 389

show memory

show memory

Syntax Description

Default

Displays memory status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show memory

Total Used Free Used+B/C Free-B/C

Physical 2027 MB 761 MB 1266 MB 1214 MB 813 MB

Swap 0 MB 0 MB 0 MB

Physical Memory Borrowed for System Buffers and Cache:

Buffers: 0 MB

Cache: 452 MB

Total Buffers/Cache: 452 MB switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 390

show asic-version

show asic-version

Syntax Description

Default

Displays firmware ASIC version.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.4.2008

Updated Example

Role

Example admin switch (config) # show asic-version

================================================

Module Device Version

================================================

MGMT SX 9.2.9160

switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 391

show power

show power

Syntax Description

Default

Displays power supplies and power usage.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show power

==================================================================

Module Power Voltage Current Capacity Grid Status

(Watts) (Amp) (Watts) Group

==================================================================

PS1 0.00 47.11 0.00 1008 A OK

PS2 248.82 48.05 5.18 1008 A OK

PS3 0.00 46.88 0.00 1008 A OK

PS4 - - - NOT PRESENT

PS5 46.72 47.82 0.98 1008 A OK

PS6 - - - NOT PRESENT

PS7 - - - NOT PRESENT

PS8 - - - NOT PRESENT

PS9 - - - NOT PRESENT

PS10 - - - NOT PRESENT

Total power used : 295.54 W

Total power capacity : 4032.00 W

Total power budget : 4032.00 W

Total power available : 3736.46 W

Redundancy mode: combined

Redundancy status: OK switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 392

show power consumers

show power consumers

Syntax Description

Default

Displays power consumers.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show power consumers

================================================

Module Power Voltage Current Status

(Watts) (Amp)

================================================

MGMT 17.47 48.00 0.36 OK

S01 33.26 48.00 0.69 OK

S02 33.50 48.00 0.70 OK

L01 31.73 48.00 0.66 OK

L02 29.76 48.00 0.62 OK

L30 28.61 48.00 0.60 OK

FAN5 14.91 48.00 0.31 OK

FAN2 13.70 48.00 0.29 OK

FAN1 14.21 48.00 0.30 OK

FAN6 15.10 48.00 0.31 OK

FAN4 14.53 48.00 0.30 OK

FAN7 15.04 48.00 0.31 OK

FAN3 15.17 48.00 0.32 OK

FAN8 14.98 48.00 0.31 OK

Total power used : 291.97 W

Max power : 1636.00 W switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 393

show temperature

show temperature

Syntax Description

Default

Displays the system's temperature sensors status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show temperature

===================================================

Module Component Reg CurTemp Status

(Celsius)

===================================================

MGMT BOARD_MONITOR T1 25.00 OK

MGMT CPU_BOARD_MONITOR T1 26.00 OK

MGMT CPU_BOARD_MONITOR T2 41.00 OK

MGMT QSFP_TEMP1 T1 23.00 OK

MGMT QSFP_TEMP2 T1 22.50 OK

MGMT QSFP_TEMP3 T1 23.00 OK

MGMT SX T1 37.00 OK switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 394

Rev 4.20

show voltage

show voltage

Syntax Description

Default

Displays power supplies voltage level.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.5006

Updated Example

Role

Example admin switch (config) # show voltage

===========================================================================================

Module Power Meter Reg Expected Actual Status High Low

Voltage Voltage Range Range

===========================================================================================

MGMT BOARD_MONITOR USB 5V sensor 5.00 5.15 OK 5.55 4.45

MGMT BOARD_MONITOR Asic I/O sensor 2.27 2.11 OK 2.55 1.99

MGMT BOARD_MONITOR 1.8V sensor 1.80 1.79 OK 2.03 1.57

MGMT BOARD_MONITOR SYS 3.3V sensor 3.30 3.28 OK 3.68 2.92

MGMT BOARD_MONITOR CPU 0.9V sensor 0.90 0.93 OK 1.04 0.76

MGMT BOARD_MONITOR 1.2V sensor 1.20 1.19 OK 1.37 1.03

MGMT CPU_BOARD_MONITOR 12V sensor 12.00 11.67 OK 13.25 10.75

MGMT CPU_BOARD_MONITOR 12V sensor 2.50 2.46 OK 2.80 2.20

MGMT CPU_BOARD_MONITOR 2.5V sensor 3.30 3.26 OK 3.68 2.92

MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 3.30 3.24 OK 3.68 2.92

MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 1.80 1.79 OK 2.03 1.57

MGMT CPU_BOARD_MONITOR 1.8V sensor 1.20 1.24 OK 1.37 1.03

switch (config) #

Related Commands N/A

Notes

Mellanox Technologies Confidential 395

show health-report

show health-report

Syntax Description

Default

Displays health report.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.0000

Role

Example

First version

Output update admin switch (config) # show health-report

========================

| ALERTS CONFIGURATION |

========================

Re-notification counter (sec):[3600]

Report max counter: [50]

========================

| HEALTH REPORT |

========================

No Health issues file switch (config) #

Related Commands N/A

Notes Problems with the power supply cannot be monitored on SX1016 switch systems.

Rev 4.20

Mellanox Technologies Confidential 396

show resources

show resources

Syntax Description

Default

Displays system resources.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show resources

Total Used Free

Physical 2027 MB 761 MB 1266 MB

Swap 0 MB 0 MB 0 MB

Number of CPUs: 1

CPU load averages: 0.11 / 0.23 / 0.23

CPU 1

Utilization: 5%

Peak Utilization Last Hour: 19% at 2012/02/15 13:26:19

Avg. Utilization Last Hour: 7% switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 397

show system profile

show system profile

Syntax Description

Default

Displays system profile.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0000

admin switch (config) # show system profile eth-single-switch switch (config) #

Related Commands system profile

Notes

Rev 4.20

Mellanox Technologies Confidential 398

show system capabilities

show system capabilities

Syntax Description

Default

Displays system capabilities.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.0000

First version

Added gateway support

Role

Example admin switch (config) # show system capabilities

IB: Supported

Ethernet: Supported, Full L2

GW: Supported

Max number of GW ports: 0

Max SM nodes: 648

IB Max licensed speed: FDR

Ethernet Max licensed speed: 56Gb switch (config) #

Related Commands show system profile

Notes

Rev 4.20

Mellanox Technologies Confidential 399

show system mac

show system mac

Syntax Description

Default

Displays system MAC address.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show system mac

00:02:C9:5E:AF:18 switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 400

show protocols

show protocols

Syntax Description

Default

Displays all protocols enabled in the system.

N/A

N/A

Configuration Mode Any Command Mode

History 3.2.3000

3.3.4550

Updated Example

Role

Example admin switch (config) # show protocols

Ethernet enabled spanning-tree rstp lacp disabled lldp enabled igmp-snooping disabled ets enabled priority-flow-control disabled sflow disabled openflow enabled

IP routing disabled ospf disabled dhcp-relay disabled

MLAG enabled

Infiniband enabled sm enabled switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 401

show bios

show bios

Syntax Description

Default

Displays the bios version information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config) # show bios

BIOS version : 4.6.5

BIOS subversion : Official AMI Release

BIOS release date : 07/02/2013 switch (config) #

Related Commands

Notes The command is available only on X86 systems (not on PPC).

Rev 4.20

Mellanox Technologies Confidential 402

4.14

Network Management Interfaces

4.14.1 SNMP

Simple Network Management Protocol (SNMP), is a network protocol for the management of a network and the monitoring of network devices and their functions. SNMP supports asynchronous event (trap) notifications and queries.

MLNX-OS supports:

• SNMP versions v1, v2c and v3

• SNMP trap notifications

• Standard MIBs

• Mellanox private MIBs

4.14.1.1 Standard MIBs

Table 27 - Standard MIBs – Textual Conventions and Conformance MIBs

MIB

INET-ADDRESS-MIB

SNMPV2-CONF

SNMPV2-TC

SNMPV2-TM

SNMP-USM-AES-MIB

IANA-LANGUAGE-MIB

IANA-RTPROTO-MIB

IANAifType-MIB

IANA-ADDRESS-FAMILY-NUMBERS-

MIB

Standard

RFC-4001

RFC 2579

RFC 3417

RFC 3826

RFC 2591

RFC 2932

Comments

Rev 4.20

Starting from version 3.4.1600, IB interfaces in interfaces tables (i.e. ifTable, ifxTable) have changed from SX<if>/<port> to IB/port.

Table 28 - Standard MIBs – Chassis and Switch

MIB

RFC1213-MIB

IF-MIB

ENTITY-MIB

Standard

RFC 1213

RFC 2863

RFC 4133

Comments ifXTable only supported.

Mellanox Technologies Confidential 403

Rev 4.20

Table 28 - Standard MIBs – Chassis and Switch

MIB

ENTITY-SENSOR-MIB

ENTITY-STATE-MIB

Bridge MIB

Q-Bridge MIB

RSTP-MIB

LLDP-MIB

Standard

RFC 3433

RFC 4268

RFC 4188

RFC 4363

RFC 4318

802.1AB-2005

Comments

Fan and temperature sensors

Fan and temperature states dot1dTpFdbGroup and dot1dStaticGroup are not supported in this MIB, it is supported as a part of Q-Bridge-MIB.

This MIB is not relevant to InfiniBand.

The following SNMP groups are not supported:

• qBridgeVlanStatisticsGroup,

• qBridgeVlanStatisticsOverflowGroup ,

• qBridgeVlanHCStatisticsGroup,

• qBridgeLearningConstraintsGroup.

The following SNMP tables are not supported:

• dot1qTpFdbTable (dynamic UC MAC addresses)

• dot1qTpGroupTable (dynamic MC MAC addresses)

• dot1qForwardAllTable (GMRP)

• dot1qForwardUnregisteredTable (GMRP)

• dot1qVlanCurrentTable (GVRP)

This MIB is not relevant to InfiniBand.

This MIB is not relevant to InfiniBand.

This MIB is not relevant to InfiniBand.

Mellanox Technologies Confidential 404

4.14.1.2 Private MIB

Table 29 - Private MIBs Supported

MIB

MELLANOX-SMI-MIB

MELLANOX-PRODUCTS-MIB

MELLANOX-IF-VPI-MIB

MELLANOX-EFM-MIB

MELLANOX-ENTITY-MIB

MELLANOX-POWER-CYCLE

MELLANOX-SW-UPDATE-MIB

MELLANOX-CONFIG-DB

Description

Mellanox Private MIB main structure (no objects)

List of OID – per managed system (sysObjID)

IfTable extensions

Partially deprecated MIB (based on Mellanox-MIB)

Traps definitions and test trap set scalar are supported.

Enhances the standard ENTITY-MIB (contains GUID and ASIC revision).

Allows rebooting the switch system

Allows viewing what SW images are installed, uploading and installing new SW images

Allows loading, uploading, or deleting configuration files

Mellanox private MIBs can be downloaded from the Mellanox Support webpage.

4.14.1.3 Mellanox Private Traps

The following private traps are supported by MLNX-OS.

Table 30 - SNMP Traps

Trap asicChipDown asicOverTempReset asicOverTemp lowPower internalBusError procCrash cpuUtilHigh procUnexpectedExit diskSpaceLow systemHealthStatus lowPowerRecover insufficientFans

Action Required

Reboot the system.

Check fans and environmental temperature.

Check fans and environmental temperature.

Add/connect power supplies.

N/A

Generate SysDump and contact Mellanox support.

N/A

Generate SysDump and contact Mellanox support.

Clean images and sysDump files using the commands “image delete” and “file debug-dump delete”.

Refer to Health Status table.

N/A

Check Fans and environmental conditions.

Rev 4.20

Mellanox Technologies Confidential 405

Rev 4.20

Table 30 - SNMP Traps

Trap insufficientFansRecover insufficientPower

Action Required

N/A

Add/connect power supplies, or change power mode using the command “power redundancy mode”.

N/A insufficientPowerRecover

For additional information refer to MELLANOX-EFM-MIB.

For event-to-MIB mapping, please refer to

Table 22, “Supported Event Notifications and MIB Mapping,” on page 257 .

4.14.1.4 Configuring SNMP

To set up the SNMP:

Step 1.

Activate the SNMP server on the MLNX-OS switch (in configure mode) using the following commands:

Community strings are case sensitive.

Director switches (SX65xx systems) require SNMP timeout configuration on the agent of 60 seconds.

switch (config) # snmp-server enable switch (config) # snmp-server enable notify switch (config) # snmp-server community public ro switch (config) # snmp-server contact "contact name" switch (config) # snmp-server host <host IP address> traps version 2c public switch (config) # snmp-server location "location name" switch (config) # snmp-server user admin v3 enable switch (config) # snmp-server user admin v3 prompt auth md5 priv des

4.14.1.5 Configuring an SNMPv3 User

To configure SNMPv3 user:

Step 1.

Configure the user using the command: switch (config) # snmp-server user [role] v3 prompt auth <hash type> priv <privacy type> where

• user role – admin

Mellanox Technologies Confidential 406

Rev 4.20

Step 2.

Step 3.

• auth type – md5 or sha

• priv type – des or aes-128

Enter authentication password and its confirmation.

Enter privacy password and its confirmation.

switch (config) # snmp-server user admin v3 prompt auth md5 priv des

Auth password: ********

Confirm: ********

Privacy password: ********

Confirm: ******** switch (config) #

To retrieve the system table, run the following SNMP command: snmpwalk -v3 -l authPriv -a MD5 -u admin -A “<Authentication password>” -x DES -X “<privacy password>” <system ip> SNMPv2-MIB::system

4.14.1.6 Configuring an SNMP Notification

To set up the SNMP Notification (traps or informs):

Step 1.

Make sure SNMP and SNMP notification are enable. Run: switch (config) # snmp-server enable switch (config) # snmp-server enable notify switch (config) #

Step 2.

Step 3.

Configure SNMP host with the desired arguments (IP Address, SNMP version, authentication methods). More than one host can be configured. Each host may have different attributes. Run: switch (config) # snmp-server host 10.134.47.3 traps version 3 user my-username auth sha my-password switch (config) #

Verify the SNMP host configuration. Run: switch (config) # show snmp host

Notifications enabled: yes

Default notification community: public

Default notification port: 162

Notification sinks:

10.134.47.3

Enabled: yes

Port: 162 (default)

Notification type: SNMP v3 trap

Username: my-username

Authentication type: sha

Privacy type: aes-128

Authentication password: (set)

Privacy password: (set) switch (config) #

Mellanox Technologies Confidential 407

Step 4.

Configure the desired event to be sent via SNMP. Run: switch (config) # snmp-server notify event interface-up switch (config) #

This particular event is used as an example only.

Step 5.

Verify the list of traps and informs being sent to out of the system. Run: switch (config) # show snmp events

Events for which traps will be sent:

asic-chip-down: ASIC (Chip) Down

cpu-util-high: CPU utilization has risen too high

disk-space-low: Filesystem free space has fallen too low

health-module-status: Health module Status

insufficient-fans: Insufficient amount of fans in system

insufficient-fans-recover: Insufficient amount of fans in system recovered

insufficient-power: Insufficient power supply

interface-down: An interface's link state has changed to down

interface-up: An interface's link state has changed to up

internal-bus-error: Internal bus (I2C) Error

liveness-failure: A process in the system was detected as hung

low-power: Low power supply

low-power-recover: Low power supply Recover

new_root: local bridge became a root bridge

paging-high: Paging activity has risen too high

power-redundancy-mismatch: Power redundancy mismatch

process-crash: A process in the system has crashed

process-exit: A process in the system unexpectedly exited

snmp-authtrap: An SNMP v3 request has failed authentication

topology_change: local bridge trigerred a topology change

unexpected-shutdown: Unexpected system shutdown switch (config) #

To print event notifications to the terminal (SSH or CONSOLE) refer to Section 4.5.1,

“Monitor,” on page 218 .

4.14.1.7 SNMP SET Operations

MLNX-OS allows the user to use SET operations via SNMP interface. This is needed to configure a user/community supporting SET operations.

Enabling SNMP SET

To allow SNMP SET operations using SNMPv1/v2:

Step 1.

Enable SNMP communities. Run: switch (config) # snmp-server enable communities

Rev 4.20

Mellanox Technologies Confidential 408

Rev 4.20

Step 2.

Step 3.

Configure a read-write community. Run: switch (config) # snmp-server community my-community-name rw

Make sure SNMP communities are enabled (enabled by default). Make sure “(DISABLED)” does not appear beside “Read-only communities” / “Read-write communities”. Run: switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact:

System location:

Read-only communities:

public

Read-write communities:

my-community-name switch (config) # show snmp

No Listen Interfaces.

Step 4.

Configure this RW community in your MIB browser.

To allow SNMP SET operations using SNMPv3:

Step 1.

Create an SNMPv3 user. Run: switch (config) # snmp-server user myuser v3 auth sha <password1> priv aes-128 <password2>

It is possible to use other configuration options not specified in the example above.

Please refer to the command

“snmp-server user” on page 424 for more information.

Step 2.

Make sure the username is enabled for SET access and has admin capability level. Run: switch (config) # show snmp user

User name: myuser

Enabled overall: yes

Authentication type: sha

Privacy type: aes-128

Authentication password: (set)

Privacy password: (set)

Require privacy: yes

SET access:

Enabled: yes

Capability level: admin

MLNX-OS supports the OIDs for SET operation listed in Table 31 which are expanded upon in

the following subsections.

Table 31 - Supported SET OIDs

MIB Name

MELLANOX-EFM-MIB

OID Name sendTestTrapSet

OID

1.3.6.1.4.1.33049.2.1.1.1.6.0

Mellanox Technologies Confidential 409

Table 31 - Supported SET OIDs

MIB Name

SNMPv2-MIB

MELLANOX-CONFIG-DB

MELLANOX-POWER-

CYCLE

MELLANOX-SW-UPDATE

OID Name sysName mellanoxConfigDBCmdExecute mellanoxConfigDBCmdFilename mellanoxConfigDBCmdStatus mellanoxConfigDBCmdStatusString mellanoxConfigDBCmdUri mellanoxPowerCycleCmdExecute mellanoxPowerCycleCmdStatus mellanoxPowerCycleCmdStatusString mellanoxSWUpdateCmdSetNext mellanoxSWUpdateCmdUri mellanoxSWUpdateCmdExecute mellanoxSWUpdateCmdStatus mellanoxSWUpdateCmdStatusString mellanoxSWActivePartition mellanoxSWNextBootPartition

OID

1.3.6.1.2.1.1.5.0

1.3.6.1.4.1.33049.12.1.1.2.3.0

1.3.6.1.4.1.33049.12.1.1.2.2.0

1.3.6.1.4.1.33049.12.1.1.2.4.0

1.3.6.1.4.1.33049.12.1.1.2.5.0

1.3.6.1.4.1.33049.12.1.1.2.1.0

1.3.6.1.4.1.33049.10.1.1.2.1.0

1.3.6.1.4.1.33049.10.1.1.2.2.0

1.3.6.1.4.1.33049.10.1.1.2.3.0

1.3.6.1.4.1.33049.11.1.1.2.1.0

1.3.6.1.4.1.33049.11.1.1.2.2.0

1.3.6.1.4.1.33049.11.1.1.2.3.0

1.3.6.1.4.1.33049.11.1.1.2.4.0

1.3.6.1.4.1.33049.11.1.1.2.5.0

1.3.6.1.4.1.33049.11.1.1.3.0.0

1.3.6.1.4.1.33049.11.1.1.4.0.0

Sending a Test Trap SET Request

MLNX-OS allows the user to use test the notification mechanism via SNMP SET. Sending a SET request with the designated OID triggers a test trap.

Prerequisites:

1. Enable SET operations by following the instructions in

Section , “Enabling SNMP SET,” on page 408

.

2. Configure host to which to send SNMP notifications.

3. Set a trap receiver in the MIB browser.

To send a test trap:

Step 1.

Step 2.

Send a SET request to the switch IP with the OID 1.3.6.1.4.1.33049.2.1.1.1.6.0.

Make sure the test trap is received by the aforementioned trap receiver (OID:

1.3.6.1.4.1.33049.2.1.2.13).

Setting Hostname with SNMP

Mellanox supports setting system hostname using an SNMP SET request as described in

SNMPv2-MIB (sysName, OID: 1.3.6.1.2.1.1.5.0).

The restrictions on setting a hostname via CLI also apply to setting a hostname through SNMP.

Refer to the command

“hostname” on page 134

for more information.

Power Cycle with SNMP

Mellanox supports power cycling its systems using an SNMP SET request as described in MEL-

LANOX-POWER-CYCLE MIB.

Power cycle command is issued via the OID mellanoxPowerCycleCmdExecute. The following options are available:

• Reload – saves any unsaved configuration and reloads the switch

Rev 4.20

Mellanox Technologies Confidential 410

• Reload discard – reboots the system and discards of any unsaved changes

• Reload force – forces an expedited reload on the system even if it is busy without saving unsaved configuration (equals the CLI command reload force)

• Reload slave – reloads the slave management on dual management systems (must be executed from the master management module)

On dual management systems it is advised to connect via the BIP to make sure commands are executed from the master management.

Changing Configuration with SNMP

Mellanox supports making configuration changes on its systems using SNMP SET requests.

Configuration requests are performed by setting several values (arguments) and then executing a command by setting the value for the relevant operation.

It is possible to set the parameters and execute the commands on the same SNMP request or separate them to several SET operations. Upon executing a command, the values of its arguments remain and can be read using GET commands.

Once a command is executed there may be two types of errors:

• Immediate: This error results in a failure of the SNMP request. This means a critical error in the SNMP request has occurred or that a previous SET request is being executed

• Delayed: The SET request has been accepted by the switch but an error occurred during its execution.

For example, when performing a fetch (download) operation, an immediate error can occur when the given URL is invalid. A delayed error can occur if the download process fails due to network connectivity issues.

The following parameters are arguments are supported:

• Command URI – URI to fetch the configuration file from or upload the file to (for sup-

ported URI format please refer to the CLI command “configuration fetch” for more

details)

• Config file name – filename to save the configuration file to or to upload to remote location

The following commands are supported:

• BinarySwitchTo – replaces the configuration file with a new binary configuration file.

This option fetches the configuration file from the URI provided in the mellanoxConfigDBCmdUri and switches to that configuration file. This command should be preceded by a reload command in order for the new configuration to apply.

• TextApply – fetches a configuration file in human-readable format and applies its configuration upon the current configuration.

• BinaryUpload – uploads a binary format configuration file of the current running configuration or an existing configuration file on the switch to the URI in the mellanoxConfigDBCmdUri command. The filename parameter indicates what configuration file on the switch to upload.

Rev 4.20

Mellanox Technologies Confidential 411

Rev 4.20

• TextUpload – uploads a human-readable configuration file of the current running configuration or an existing configuration file on the switch to the URI in the mellanoxConfigDBCmdUri command. The filename parameter indicates what configuration file on the switch to upload.

• ConfigWrite – saves active configuration to a filename on the switch as given in the filename parameter. In case filename is “active”, active configuration is saved to the current saved configuration (same as the CLI command configuration write).

Upgrading MLNX-OS Software with SNMP

Mellanox supports upgrading MLNX-OS software using an SNMP SET request as described in

MELLANOX-SW-UPDATE MIB.

The software upgrade command is issued via the OID mellanoxSWUpdateCmdExecute. The following options are available:

• Update – fetches the image from a specified URI (equivalent to the command “image fetch” followed by “image install”)

The image to update from is defined by the OID mellanoxSWUpdateCmdUri. The restrictions on the

URI are identical to what is supported in the CLI command “image fetch” on page 182.

• Set-Next – changes the image for the next boot equivalent to the CLI command “image boot”)

The partition from which to boot is defined by the OID mellanoxSWUpdateCmdSetNext. The parameters for this OID are as follows:

• 0 – no change

• 1 – partition 1

• 2 – partition 2

• 3 – next partition (default)

Using the OIDs mellanoxSWUpdateCmdStatus and mellanoxSWUpdateCmdStatusString you may view the status of the latest operation performed from the aforementioned in either integer values, or human-readable forms, respectively. The integer values presented may be as follows:

• 0 – no operation

• 1-100 – progress%

• 101 – success

• 200 – failure

4.14.1.8 IF-MIB and Interface Information

MLNX-OS supports displaying information of switch ports, LAG ports, MLAG ports and VLAN interfaces on all systems via SNMP interface. This feature is enabled by default. The interface information is available in the ifTables, ifXTable and mellanoxIfVPITable. Additionally, traps for interface up/down, and internal link suboptimal speed are enabled. The user has the ability to enable one or both of these traps.

Interface up/down traps are sent whenever there is a change in the interface’s operational state.

These traps are suppressed for internal links when the internal link’s speed does not match the configured speed of the link (mismatch condition).

Mellanox Technologies Confidential 412

4.14.2 XML API

MLNX-OS XML API is currently under development. For further information please contact

Mellanox support.

Rev 4.20

Mellanox Technologies Confidential 413

4.14.3 Commands

4.14.3.1 SNMP

The commands in this section are used to manage the SNMP server.

snmp-server auto-refresh

snmp-server auto-refresh {enable | interval <time>} no snmp-server auto-refresh enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Configures SNMPD refresh settings.

The no form of the command disables SNMPD refresh mechanism.

enable interval

Enables SNMPD refresh mechanism.

Sets SNMPD refresh interval.

time

Enabled.

Interval: 60 secs

In seconds. Range: 20-500.

Config

3.2.3000

3.4.1100

admin

Added time parameter and updated notes switch (config) # snmp-server auto-refresh interval 120 show snmp

• When configuring an interval lower than 60 seconds, the following warning message appears asking for confirmation: “Warning: this configuration may increase CPU utilization, Type 'YES' to confirm: YES”.

• When disabling SNMP auto-refresh, information is retrieved no more than once every 60 seconds just like SNMP tables that do not have an auto-refresh mechanism.

Rev 4.20

Mellanox Technologies Confidential 414

snmp-server community

snmp-server community <community> [ ro | rw] no snmp-server community <community>

Syntax Description

Default

Sets a community name for either read-only or read-write SNMP requests.

The no form of the command sets the community string to default.

community ro

Community name.

Sets the read-only community string.

rw Sets the read-write community string.

Read-only community: “public”

Read-write community: “”

Configuration Mode Config

History 3.1.0000

Role

Example admin switch(config) # snmp-server community private rw switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact:

System location:

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch(config) #

Related Commands show snmp

Notes • If neither the “ro” or the “rw” parameters are specified, the read-only community is set as the default community

• If the read-only community is specified, only queries can be performed

• If the read-write community is specified, both queries and sets can be performed

Rev 4.20

Mellanox Technologies Confidential 415

snmp-server contact

snmp-server contact <contact name> no snmp-server contact

Syntax Description

Default

Sets a value for the sysContact variable in MIB-II.

The no form of the command resets the parameter to its default value.

contact name

“”

Configuration Mode Config

History 3.1.0000

Contact name.

Role

Example admin switch (config) # snmp-server contact my-name switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact: my-name

System location:

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch (config) #

Related Commands show snmp

Notes

Rev 4.20

Mellanox Technologies Confidential 416

snmp-server enable

snmp-server enable [communities | mult-communities | notify] no snmp-server enable [communities | mult-communities | notify]

Syntax Description

Default

Enables SNMP-related functionality.

The no form of the command disables the SNMP server.

enable Enables SNMP-related functionality:

• SNMP engine

• SNMP traps communities Enables community-based authentication on this system.

Enables multiple communities to be configured.

mult-communities notify Enables sending of SNMP traps and informs from this system.

SNMP is enabled by default

SNMP server communities are enabled by default

SNMP notifies are enabled by default

SNMP server multi-communities are disabled by default

Configuration Mode Config

History 3.1.0000

Role

Example

3.2.1050

admin

First version

Change traps to notify switch (config) # snmp-server enable switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact: my-name

System location:

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch (config) #

Related Commands show snmp

Notes SNMP traps are only sent if there are trap sinks configured with the “snmp-server host...” command, and if these trap sinks are themselves enabled.

Rev 4.20

Mellanox Technologies Confidential 417

snmp-server host

snmp-server host <IP address> {disable | {traps | informs} [<community> |

<port> | version <snmp version>]} no snmp-server host <IPv4 or IPv6 address> {disable | {traps| informs} [<community> | <port>]}

Syntax Description

Default

Configures hosts to which to send SNMP traps.

The no form of the commands removes a host from which SNMP traps should be sent.

IP address disable

IPv4 or IPv6 address.

Temporarily disables sending of traps to this host.

community port

Specifies trap community string.

Overrides default UDP port for this trap sink.

snmp version

No hosts are configured

Default community is “public”

Default UDP port is 162

Default SNMP version is 2c

Specifies the SNMP version of traps to send to this host.

Configuration Mode Config

History 3.1.0000

Role

3.2.1050

admin

First version

Add inform option

Rev 4.20

Mellanox Technologies Confidential 418

Rev 4.20

Example switch (config) # snmp-server host 10.10.10.10 traps version 1 switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact:

System location:

Read-only communities:

public

Read-write communities:

(none)

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

Trap sinks:

10.10.10.10

Enabled: yes

Type: traps version 1

Port: 162 (default)

Community: public (default) switch (config) #

Related Commands show snmp snmp-server enable

Notes This setting is only meaningful if traps are enabled, though the list of hosts may still be edited if traps are disabled. Refer to “snmp-server enable” command.

Mellanox Technologies Confidential 419

Rev 4.20

snmp-server listen

snmp-server listen {enable | interface <ifName>} no snmp-server listen {enable | interface <ifName> }

Syntax Description

Configures SNMP server interface access restrictions.

The no form of the command disables the listen interface restricted list for SNMP server. enable ifName

Enables SNMP interface restrictions on access to this system.

Adds an interface to the “listen” list for SNMP server.

For example: “mgmt0”, “mgmt1”.

Default N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # snmp listen enable switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact:

System location:

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

Trap sinks:

10.10.10.10

Enabled: yes

Type: traps version 1

Port: 3

Community: public (default) switch (config) #

Related Commands show snmp

Notes If enabled, and if at least one of the interfaces listed is eligible to be a listen interface, then SNMP requests will only be accepted on those interfaces. Otherwise, SNMP requests are accepted on any interface.

Mellanox Technologies Confidential 420

snmp-server location

snmp-server location <system location> no snmp-server location

Syntax Description

Default

Sets a value for the sysLocation variable in MIB-II.

The no form of the command clears the contents of the sysLocation variable.

system location

“”

Configuration Mode Config

History 3.1.0000

String.

Role

Example admin switch (config) # snmp-server location lab switch (config) # show snmp

SNMP enabled: yes

SNMP port: 161

System contact: my-name

System location: lab

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch (config) #

Related Commands show snmp

Notes

Rev 4.20

Mellanox Technologies Confidential 421

snmp-server notify

snmp-server notify {community <community> | event <event name> | port

<port> | send-test} no snmp-server notify {community | event <event name> | port}

Syntax Description

Configures SNMP notifications (traps and informs).

The no form of the commands negate the SNMP notifications.

community Sets the default community for traps sent to hosts which do not have a custom community string set.

event port

Specifies which events will be sent as traps.

Sets the default port to which traps are sent.

Default send-test Sends a test trap.

Community: public

All informs and traps are enabled

Port: 162

Configuration Mode Config

History 3.1.0000

Role

Example

3.2.1050

admin

First version

Changed traps to notify switch (config) # snmp-server community public switch (config) # show snmp

SNMP enabled: yes

SNMP port: 1000

System contact: my-name

System location: lab

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch (config) #

Related Commands show snmp show snmp events

Notes • This setting is only meaningful if traps are enabled, though the list of hosts may still be edited if traps are disabled

• Refer to Mellanox MIB file for the list of supported traps

Rev 4.20

Mellanox Technologies Confidential 422

snmp-server port

snmp-server port <port> no snmp-server port

Syntax Description

Default

Sets the UDP listening port for the SNMP agent.

The no form of the command resets the parameter to its default value.

port

161

Configuration Mode Config

History 3.1.0000

UDP port.

Role

Example admin switch (config) # snmp-server port 1000 switch (config) # show snmp

SNMP enabled: yes

SNMP port: 1000

System contact: my-name

System location: lab

Read-only community: public

Read-write community: private

Interface listen enabled: yes

No Listen Interfaces.

Traps enabled: yes

Default trap community: public

Default trap port: 162

No trap sinks configured.

switch (config) #

Related Commands show snmp

Notes

Rev 4.20

Mellanox Technologies Confidential 423

snmp-server user

snmp-server user {admin | <username>} v3 {[encrypted] auth <hash-type>

<password> [priv <privacy-type> [<password>]] | capability <cap> | enable

<sets> | prompt auth <hash-type> [priv <privacy-type>] | require-privacy} no snmp-server user {admin | <username> } v3 {[encrypted] auth <hash-type>

<password> [priv <privacy-type> [<password>]] | capability <cap> | enable

<sets> | prompt auth <hash-type> [priv <privacy-type>]}

Syntax Description

Specifies an existing username, or a new one to be added.

The no form of the command disables access via SNMP v3 for the specified user.

v3 auth

Configures SNMP v3 users

Configures SNMP v3 security parameters, specifying passwords in plaintext on the command line (note: passwords are always stored encrypted) capability enable encrypted

Sets capability level for SET requests

Enables SNMP v3 access for this user prompt require-privacy

Configures SNMP v3 security parameters, specifying passwords in encrypted form

Configures SNMP v3 security parameters, specifying passwords securely in follow-up prompts, rather than on the command line

Requires privacy (encryption) for requests from this user

Default No SNMP v3 users defined

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # snmp-server user admin v3 enable switch (config) # show snmp user

User name: admin

Enabled overall: yes

Authentication type: sha

Privacy type: aes-128

Authentication password: (NOT SET; user disabled)

Privacy password: (NOT SET; user disabled)

SET access:

Enabled: yes

Capability level: admin switch (config) #

Rev 4.20

Mellanox Technologies Confidential 424

Rev 4.20

Related Commands show snmp user

Notes • The username chosen here may be anything that is valid as a local UNIX username (alphanumeric, plus '-', '_', and '.'), but these usernames are unrelated to, and independent of, local user accounts. That is, they need not have the same capability level as a local user account of the same name. Note that these usernames should not be longer than 31 characters, or they will not work.

• The hash algorithm specified is used both to create digests of the authentication and privacy passwords for storage in configuration, and also in HMAC form for the authentication protocol itself.

• If the command ends after the auth password, the privacy algorithm is set to its default, which is AES-128, and the privacy password is set to whatever was specified for the authentication password. You may also specify the privacy algorithm while still not specifying a separate password.

• There are three variants of the command, which branch out after the “v3” keyword. If

“auth” is used next, the passwords are specified in plaintext on the command line. If

“encrypted” is used next, the passwords are specified encrypted (hashed) on the command line. If “prompt-pass” is used, the passwords are not specified on the command line the user is prompted for them when the command is executing. If “priv” is not specified, only the auth password is prompted for. If “priv” is specified, the privacy password is prompted for; entering an empty string for this prompt will result in using the same password specified for authentication.

Mellanox Technologies Confidential 425

show snmp

show snmp [auto-refresh | engineID | events | host | user]

Syntax Description

Displays SNMP-server configuration and status.

auto-refresh SNMP refreshed mechanism status.

engineID events

SNMP Engine ID.

SNMP events.

host user

Default N/A

Configuration Mode Config

List of notification sinks.

SNMP users.

History

Role

Example

3.1.0000

admin switch (config) # show snmp user

User name: Hendrix

Enabled overall: yes

Authentication type: sha

Privacy type: des

Authentication password: (set)

Privacy password: (set)

Require privacy: yes

SET access:

Enabled: yes

Capability level: admin switch (config) #

Related Commands show snmp

Notes

Rev 4.20

Mellanox Technologies Confidential 426

show snmp auto-refresh

show snmp auto-refresh

Syntax Description

Default

Displays SNMPD refresh mechanism status.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch(config) # show snmp auto-refresh

=================

SNMP auto refresh

=================

Auto-refresh enabled: yes

Refresh interval (sec): 60

=====================

Auto-Refreshed tables

===================== entPhysicalTable ifTable ifXTable switch(config) #

Related Commands snmp-server auto-refresh

Notes

Rev 4.20

Mellanox Technologies Confidential 427

4.14.3.2 XML API

xml-gw enable

xml-gw enable no xml-gw enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Enables the XML gateway.

The no form of the command disables the XML gateway.

N/A

XML Gateway is enabled

Config

3.1.0000

admin switch (config) # xml-gw enable switch (config) # show xml-gw

XML Gateway enabled: yes switch (config) # show xml-gw

Rev 4.20

Mellanox Technologies Confidential 428

show xml-gw

show xml-gw

Syntax Description

Default

Displays the XML gateway setting.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # show xml-gw

XML Gateway enabled: yes switch (config) #

Related Commands xml-gw enable

Notes

Rev 4.20

Mellanox Technologies Confidential 429

4.15

Puppet Agent

Puppet is a software that allows network administrators to automate repetitive tasks. MLNX-OS includes a built-in agent for the open-source “Puppet” configuration change management system.

The Puppet agent enables configuring Mellanox switches in accordance with the standard “puppet-netdev-stdlib” type library and with the “Mellanox-netdev-stdlib-mlnxos” and “Mellanoxnetdev-ospf-stdlib” type libraries provided by Mellanox Technologies to the Puppet community.

For more information, please refer to the CLI commands, to the NetDev documentation at https:/

/github.com/puppetlabs/puppet-netdev-stdlib and to Mellanox’s Puppet modules GitHub page at https://github.com/Mellanox .

4.15.1 Setting the Puppet Server

To set the puppet server:

Step 1.

Define the Puppet server (the name has to be a DNS and not IP). Run: switch (config) # puppet-agent master-hostname <please_type_your_hostname_DNS_here> switch (config) #

Step 2.

Step 3.

Enable the Puppet agent. Run: switch (config) # puppet-agent enable switch (config) #

(Optional) Verify there are no errors in the Puppet agent log. Run: switch (config) # show puppet-agent log continuous switch (config) #

4.15.2 Accepting the Switch Request

Rev 4.20

This is to be performed on the first run only.

To accept the switch’s request:

Option 1 – using Puppet CLI commands:

Step 1.

Ensure the certificate request. Run:

# puppet cert list

"<switch>"

(F4:B4:20:3B:2B:11:76:37:14:34:D0:D1:03:ED:3D:B5)

Step 2.

Sign the certificate request if the cert_name parameter (e.g. switch1.domain) is in the list. Run:

# puppet cert sign <full_domain_name>

Step 3.

Verify the request is removed from the Puppet certification list. Run:

# puppet cert list

Option 2 – accept certificate requests in the puppet server console:

Step 1.

Go to the “nodes requests” page (the button is at the top right), and wait for a certificate request for the switch and then accept it.

Mellanox Technologies Confidential 430

 

Figure 12: Accepting an Agent Request through the Console

Rev 4.20

4.15.3 Installing Modules on the Puppet Server

Mellanox uses netdev-stdlib types and provides a package of Mellanox providers for those types which have to be installed at the Puppet server prior to the first Puppet configuration run (before configuring resources on the Mellanox switch).

To install those modules, run the following commands in the Puppet server:

# puppet module install netdevops-netdev_stdlib

# puppet module install mellanox-netdev_ospf_stdlib

# puppet module install mellanox-netdev_stdlib_mlnxos

In case of an already installed module, please use the command “ puppet module upgrade <module_name> ” or “ puppet module install <module_name> -

-force ” instead of “ puppet module install <module_name> ” to reinstall the modules.

For more information please refer to the Network Automation Tools document or Puppet category in the Mellanox community site at: http://community.mellanox.com/community/support/ solutions .

4.15.4 Writing Configuration Classes

To write configuration classes:

Step 1.

Assigning Configuration Classes to a Node

Configuration files can be written and changed in the puppet server machine in the directory

“/etc/puppetlabs/puppet/manifests/” (or “/etc/puppet/manifests” in case of an open source puppet server).

The file “/etc/puppetlabs/puppet/manifests/site.pp” is the main file for Puppet-classes-to-nodes association. To associate a configuration to a Puppet agent node, just append association lines as below: import "netdev_vlan_example" import "netdev_l2_vlan_example" import "netdev_lag_example" node 'switch-6375dc.mtr.labs.mlnx'{

netdev_device { $hostname: }

include vlan_example # Asserts a class vlan_example in one of the files

include l2_interface_example

Mellanox Technologies Confidential 431

Rev 4.20

include lag_example

Step 2.

}

If you have a puppet console, you may assign classes of configuration in the following way:

• Add the relevant classes (using the console add class button on the “nodes” page).

• Assign the classes to the relevant nodes/groups in the puppet server console (in the console node/group page -> edit -> Classes).

Update VLAN

Manifest example (located in “/etc/puppetlabs/puppet/manifests/netdev_vlan_example.pp”).

class vlan_example{

$vlans = {

'Vlan244' => {vlan_id => 244, ensure => present},

'Vlan245' => {vlan_id => 245, ensure => present},

}

Step 3.

create_resources( netdev_vlan, $vlans )

}

Update Layer 2 Interface.

Manifest example (located in “/etc/puppetlabs/puppet/manifests/netdev_l2_interface_example.pp”) class vlans_ensure_example{

$vlans = {

'Vlan347' => {vlan_id => 347, ensure => present},

'Vlan348' => {vlan_id => 348, ensure => present},

'Vlan349' => {vlan_id => 349, ensure => present},

}

create_resources( netdev_vlan, $vlans )

} class l2_interface_example{

include vlans_ensure_example #class to Ensure VLANs before assigning

$l2_interfaces = {

'ethernet 1/3' => {ensure => absent, vlan_tagging => disable}, #default

'ethernet 1/4' => {ensure => present, vlan_tagging => enable, tagged_vlans => [Vlan348,Vlan347], untagged_vlan => Vlan349} #hybrid

}

create_resources( netdev_l2_interface, $l2_interfaces )

}

Mellanox Technologies Confidential 432

Rev 4.20

Step 4.

Update LAG.

Manifest example (located in “/etc/puppetlabs/puppet/manifests/netdev_lag_example.pp”) class lag_example{

$lags = {

'port-channel 101' => {ensure => present, links => ['ethernet 1/12', 'ethernet 1/13'], lacp => active},

'port-channel 102' => {ensure => present, links => ['ethernet 1/6','ethernet 1/5'], lacp => disabled},

}

create_resources( netdev_lag, $lags )

}

You may add classes to ensure that all assigned links are with the same layer 1 and layer 2 configurations (similarly to the way we did in update l2_interface section with vlans_ensure_example class).

4.15.5 Supported Configuration Capabilities

4.15.5.1 Ethernet, Port-Channel, and InfiniBand Interface Capabilities

Table 32 - Ethernet, Port-Channel, and InfiniBand Interface Capabilities

Field ensure speed admin mtu description

Description Values

Sets the given values or restores the interface to default

Sets the speed of the interface.

Disables/enables interface admin state.

Configures the maximum transmission unit frame size for the interface.

Sets the Ethernet, LAG and

InfiniBand description.

absent, present auto*|10m|100m|1g|10g|40 g|56g up, down

Ethernet: 1518-9216

Text

Example ensure => present speed => 1g admin => up mtu => 1520 description =>

“changed_by_puppet”

Mellanox Technologies Confidential 433

Rev 4.20

4.15.5.2 VLAN Capabilities

Table 33 - VLAN Capabilities ensure vlan_id

Field Description Values

Creates or destroys the

VLAN given as a resource

ID

The VLAN ID absent, present

1-4094 (integer)

4.15.5.3 Layer 2 Ethernet Interface Capabilities

Table 34 - L2 Ethernet and Port-Channel Interface Capabilities ensure

Field vlan_tagging tagged_vlans untagged_vlan

Description

Sets the given values or restores the Layer 2 interface to default.

VLAN tagging mode

List of tagged (trunked)

VLANs

Untag (access) VLAN

Values absent, present enable,disable

2-4994 (range)

<VLAN name>

4.15.5.4 LAG (Port-Channel) Capabilities

Table 35 - LAG Capabilities ensure lacp links

Field Description Values creates or destroys the port-channel given as a resource ID

The LACP mode of the

LAG

List of ports assigned to the

LAG absent, present passive | active | on

List of link names

4.15.5.5 Layer 3 Interface Capabilities

Table 36 - L3 Interface Capabilities ensure

Field Description

Creates or destroys the interface VLAN specified in the resource ID.

Values present, absent

Example ensure => present vlan_id => 245

Example ensure => present vlan_tagging => enable tagged_vlans =>

[Vlan348,Vlan347] untagged_vlan => Vlan349

Example ensure => present lacp => on links => ['ethernet 1/6','ethernet 1/5']

Example ensure => present

Mellanox Technologies Confidential 434

Rev 4.20

Table 36 - L3 Interface Capabilities

Field ipaddress netmask method

Description

Sets IP address on the

Layer 3 interface (requires netmask).

Sets netmask for the IP address.

Configures the method of the L3 interface (currently supports only static method).

Values

A valid IP address

A valid netmask (of the form X.1X2.X3.X4), which creates a valid combination with the given IP address static

Example ipaddress => ‘192.168.4.2’ netmask =>

‘255.255.255.0’ method => static

4.15.5.6 OSPF Interface Capabilities

Table 37 - OSPF Interface Capabilities ensure area_id

Type

Field Description Values

Creates or destroys the

OSPF interface of the associated interface of the

VLAN specified in the resource ID

The associated area ID

The network type present, absent

Integer representing an IP broadcast, point_to_point

Example ensure => present area_id => ‘7200’ type => ‘point_to_point’

4.15.5.7 OSPF Area Capabilities

Table 38 - OSPF Area Capabilities ensure

Field router_id ospf_area_mode subnets

Description Values

Creates or destroys the

OSPF area specified in the resource ID

The OSPF area associated router ID (currently supports only default router) present, absent default

The OSPF area mode normal, stub, nssa

A list of associated subnets List of subnets

Example ensure => present router_id => 'default' ospf_area_mode => 'stub'

["192.168.4.0/24",

"192.168.5.0/24"]

Mellanox Technologies Confidential 435

4.15.5.8 Router OSPF Capabilities

Table 39 - Router OSPF Capabilities ensure

Field Description Values

Enables/disables the router

ID specified in the resource

ID present, absent

4.15.5.10Fetched Image Capabilities

Table 41 - Fetched Image Capabilities ensure

Field protocol host user password location force_delete

Description Values

Enables/disables the protocol specified in the resource ID

Specifies the protocol for fetch method

The host where the filename located

The username for fetching the image

The password for fetching the image

The location of the file name in the host file system

Remove all the images or only the ones which are not installed on any partition, before fetching present, absent http, https, ftp, tftp, scp, sftp

DNS/IP

Username

Password

Directory full path yes, no

Example ensure => present

4.15.5.9 Protocol LLDP, SNMP, IP Routing and Spanning Tree Capabilities

Table 40 - Protocol Enable/Disable Capabilities

Field ensure

Description

Enables/disables the protocol specified in the resource ID

Values present, absent

Example ensure => present

Example ensure => present protocol => scp host => my_DNS user => my_username password => my_pass location => '/tmp' force_delete => no

Rev 4.20

Mellanox Technologies Confidential 436

Rev 4.20

4.15.5.11Installed Image Capabilities

Table 42 - Installed Image Capabilities

Field Description ensure is_next_boot

Specifies if the image version given in as resource

ID is ensured to be installed or not

Ensures that the installed image is the next boot partition configuration_write Writes configurations to database.

force_reload Reload if image is in other partition.

yes, no yes, no yes, no

Values present, absent

Example ensure => present is_next_boot => yes configuration_write => yes force_reload => no

4.15.6 Supported Resources for Each Type

Table 43 - Fetched Image Capabilities

Resource Type

Network device

Puppet Type Name netdev_device

Layer 1 interface

Layer 2 interface

VLAN

LAG

Layer 3 interface

OSPF interface

OSPF area netdev_interface netdev_l2_interface netdev_vlan netdev_lag netdev_l3_interface netdev_ospf_interface netdev_ospf_area

Supported Resource IDS

$hostname

'ethernet <#ID>', 'portchannel <#id>', 'ib <#ID>'

'ethernet <#ID>', 'portchannel <#id>'

VLAN name string

'port-channel <#id>'

'vlan <#ID>'

'vlan <#ID>'

Valid area ID (representing an IP)

Example netdev_device { $hostname: } netdev_interface{'ethernet

1/3': ensure => absent} netdev_l2_interface{'ethernet 1/3': ensure => absent} netdev_vlan {'Vlan244': vlan_id => 244, ensure => present } netdev_lag {'port-channel

101': ensure => present } netdev_l3_interface{ 'vlan

4': ipaddress =>

'192.168.4.2', netmask =>

'255.255.255.0'} netdev_ospf _interface{

'vlan 4': ensure => present, area_id => '10' } netdev_ospf _area{ '10': ensure => present, ospf_area_mode=>'stub'}

Mellanox Technologies Confidential 437

Rev 4.20

Table 43 - Fetched Image Capabilities

Resource Type

OSPF router

Puppet Type Name netdev_router_ospf

Protocol

Fetched image

Installed image mlnx_protocol mlnx_fetched_img mlnx_installed_img

Supported Resource IDS

Currently only supports

'default' ip_routing, lldp, snmp, spanning_tree

The image file name

The image version name

Example netdev_router_ospf

{'default':

ensure => present } mlnx_protocol { 'ip_routing': ensure => present} mlnx_fetched_image {

'image-PPC_M460EX-

3.3.4300.img': ensure => present} mlnx_installed_img {

'3.3.4300': ensure => present}

4.15.7 Troubleshooting

This section presents common issues that may prevent the switch from connecting to the puppet server.

4.15.7.1 Switch and Server Clocks are not Synchronized

This can be fixed by using NTP to synchronize the clocks at the switch (using the CLI command ntp ) and at the server (e.g. using ntpdate).

4.15.7.2 Outdated or Invalid SSL Certificates Either on the Switch or the Server

This can be fixed on the switch using the CLI command puppet-agent clear-certificates

(requires puppet-agent restart to take effect).

On the server it can be fixed by running puppet cert clean <switch_fqdn> (FQDN is the

Fully Qualified Domain Name which consists of a hostname and a domain suffix).

4.15.7.3 Communications Issue

Make sure it is possible to ping the puppet server hostname from the switch (using the CLI command ping).

If the hostname is not reachable (e.g. no DNS server) it can be statically added to the switch local hosts lookup (using the CLI command ip host).

Make sure that port 8140 is open (using the command tracepath {<hostname> | <ip>}/8140).

Mellanox Technologies Confidential 438

4.15.8 Commands

puppet-agent

puppet-agent

Syntax Description

Default

Configuration Mode

History

Role

Example

Enters puppet agent configuration mode.

N/A

None

Config

3.3.4200

admin switch (config) # puppet-agent switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 439

master-hostname

master-hostname <hostname> no master-hostname

Syntax Description

Default

Sets the puppet server hostname.

The no form of the command resets the parameter to its default.

hostname puppet

Configuration Mode Config Puppet

History 3.3.4200

Puppet server hostname. Free string may be entered.

Role

Example admin switch (config puppet-agent) # master-hostname my-puppet-server-hostname switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 440

enable

enable no enable

Syntax Description

Default

Enables the puppet server on the switch.

The no form of the command disables the puppet server.

N/A

Disabled

Configuration Mode Config Puppet

History 3.3.4200

Role

Example admin switch (config puppet-agent) # enable switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 441

run-interval

run-interval <time>

Syntax Description

Configures the time interval in which the puppet agent reports to the puppet server.

time Can be in seconds (“30” or “30s”), minutes (“30m”), hours (“6h”), days (“2d”), or years (“5y”).

Default 30m

Configuration Mode Config Puppet

History

Role

Example

3.3.4302

admin switch (config puppet-agent) # run-interval 40m switch (config puppet-agent) #

Related Commands show puppet-agent

Notes

Rev 4.20

Mellanox Technologies Confidential 442

restart

puppet-agent restart

Syntax Description

Default

Restarts the puppet agent.

N/A

N/A

Configuration Mode Config Puppet

History

Role

Example

3.3.4200

admin switch (config puppet-agent) # restart switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 443

show puppet-agent

show puppet-agent

Syntax Description

Default

Displays Puppet agent status and configuration.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.4200

3.3.4302

Updated output with run interval

Role

Example admin switch (config puppet-agent) # show puppet-agent

Puppet agent is disabled

Puppet master hostname: puppet

Run interval: 40m switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 444

show puppet-agent log

show puppet-agent log [[not] [matching | continuous] <string> | files [[not] matching] <string>]

Syntax Description

Displays the Puppet agent’s log file.

continuous Puppet agent log messages as they arrive.

files matching not

Displays archived Puppet agent log files.

Displays Puppet agent log that match a given string.

Displays Puppet agent log that do not meet a certain string.

Free string.

Default string

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4200

admin switch (config puppet-agent) # show puppet-agent log

Mon Nov 04 11:52:42 +0000 2013 Puppet (notice): Starting Puppet client version 3.2.3

Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Unable to fetch my node definition, but the agent run will continue:

Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Could not intern from pson: source '"#<Puppet::Node:0x7f' not in PSON!

Mon Nov 04 11:53:21 +0000 2013 /Netdev_vlan[Vlan104]/ensure (notice): created

Mon Nov 04 11:53:22 +0000 2013 /Netdev_vlan[Vlan101]/ensure (notice): created

Mon Nov 04 11:53:23 +0000 2013 /Netdev_vlan[Vlan102]/ensure (notice): created

Mon Nov 04 11:53:24 +0000 2013 /Netdev_vlan[Vlan103]/ensure (notice): created

Mon Nov 04 11:53:40 +0000 2013 /Netdev_l2_interface[ethernet 1/6]/untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan103'

Mon Nov 04 11:53:43 +0000 2013 /Netdev_l2_interface[ethernet 1/7]/untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan103'

Mon Nov 04 11:53:48 +0000 2013 /Netdev_vlan[Vlan100]/ensure (notice): created

Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/vlan_tagging (notice): vlan_tagging changed 'enable' to 'disable'

Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/tagged_vlans (notice): tagged_vlans changed '[]' to

'[Vlan100,Vlan101,Vlan102]'

Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'

Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'

Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'

Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'

Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/vlan_tagging (notice): vlan_tagging changed 'enable' to 'disable'

Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/tagged_vlans (notice): tagged_vlans changed '[]' to

'[Vlan100,Vlan101,Vlan102]'

Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'

Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'

Mon Nov 04 11:54:06 +0000 2013 Puppet (notice): Finished catalog run in 47.90 seconds switch (config puppet-agent) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 445

4.16

Virtual Machine

A virtual machine (VM) on a switch is added to allow additional OS to run on top of the switch.

The VM OS can connect through mgmt0 interface to the switch system’s management interface.

In addition, the VM is also connected to the out-of-band network. This allows it to communicate through the network and to control the switch management software.

The number of VMs that may run on a system is user-configurable and also relies on resource availability.

Rev 4.20

The number of configurable VMs is limited to 4.

Each VM consumes the following resources:

• Memory

• Processing power which is not policed (the user may determine the core to be used)

• MACs which are required for each vNIC (user configurable)

4.16.1 Virtual Machine Configuration

To configure a VM:

The example below installs Ubuntu 14 and defines 3GB storage with 512MB memory

(default) using the first core of the switch system (default) through mgmt0 interface

(default) with an auto-generated MAC (default).

Step 1.

Step 2.

Step 3.

Step 4.

Enable the VM feature. Run: switch (config) # virtual-machine enable

Create a VM. Run: switch (config) # virtual-machine host my-vm switch (config virtual-machine host my-vm) #

Define storage for the VM. Run: switch (config virtual-machine host my-vm) # storage create disk size-max 3000

100.0% [#################################################################]

Created empty virtual disk volume 'vdisk001.img' in pool 'default'

Device attached to drive number 1.

switch (config virtual-machine host my-vm) #

Display the VM parameters (notice boldface). Run: switch (config virtual-machine host my-vm) # show virtual-machine host my-vm

VM 'my-vm'

Status: shut off Architecture: x86_64

VCPU used: 0 sec Number of VCPUs: 1

Boot order: hd, cdrom Memory size: 512 MB

Consoles: text, graphics

Storage:

IDE bus, drive 1: default/vdisk001.img (3000 MB capacity)

Interfaces:

1: on bridge 'mgmt0' address unknown (MAC 52:54:00:2F:89:69)

Mellanox Technologies Confidential 446

Rev 4.20

Step 5.

Step 6.

Step 7.

switch (config virtual-machine host my-vm) # exit switch (config) #

Import the VM image. Run: switch (config) # virtual-machine volume fetch url scp://root@<ip>/.../ubuntu-14.04server-amd64.iso

Password (if required): *************

100.0% [#################################################################]

Install the imported image. Run: switch (config) # virtual-machine host my-vm switch (config virtual-machine host my-vm) # install cdrom file ubuntu-14.04-serveramd64.iso

Switch to a different terminal, and run the following command to connect VNC viewer to the

VM:

$ vncviewer -via admin@<switch IP> 127.0.0.1:0

...

Mellanox MLNX-OS Switch Management

Password: ************

Continue VM installation from the VNC prompt.

The switch prompt is unresponsive pending a successful VM installation. Successful

VM installation is indicated by the reboot of the VM.

VM IP is determined by DHCP configuration according to the MAC address in

Step 4 .

To verify VM configuration, run: switch (config virtual-machine host my-vm) # show virtual-machine host my-vm

VM 'my-vm'

Status: running Architecture: x86_64

VCPU used: 12 min 27.440 sec Number of VCPUs: 1

Boot order: cdrom, hd Memory size: 512 MB

Consoles: text, graphics

Storage:

IDE bus, drive 1: default/vdisk001.img (3000 MB capacity)

IDE bus, drive 2: default/ubuntu-14.04-server-amd64.iso (564 MB capacity) READ-ONLY

Interfaces:

1: on bridge 'mgmt0' address unknown (MAC 52:54:00:2F:89:69)

To remove a storage assigned to a VM:

Step 1.

Remove the VM assigned the disk space. Run: switch (config) # no virtual-machine host my-vm

Step 2.

Remove the disk space assigned to that VM. Run: switch (config) # no virtual-machine volume file mydisk.img

Mellanox Technologies Confidential 447

4.16.2 Commands

4.16.2.1 Config

virtual-machine enable

virtual-machine enable no virtual-machine enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Enables VM feature on the switch.

The no form of the command disables VM feature on the switch.

N/A no virtual-machine enable

Config

3.4.0000

admin switch (config) # virtual-machine enable

Rev 4.20

Mellanox Technologies Confidential 448

virtual-machine host

virtual-machine host <vm-name> no virtual-machine host <vm-name>

Syntax Description

Default

Creates a VM, or enters its configuration context if it already exists.

The no form of the command removes the VM of the specified name.

vm-name

N/A

Configuration Mode Config

History 3.4.0000

Configures a name for the VM.

Role

Example admin switch (config)# virtual-machine host my-vm switch (config virtual-machine host my-vm)#

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 449

arch

arch {i386 | x86_64}

Syntax Description

Configures VM CPU architecture.

i386 32-bit x86 CPU architecture

Default x86_64 x86_64

Configuration Mode Config Virtual Machine Host

64-bit x86 CPU architecture

History

Role

Example switch (config virtual-machine host my-vm)# arch i386

Related Commands virtual-machine

Notes

3.4.0000

admin

Rev 4.20

Mellanox Technologies Confidential 450

comment

comment <string> no comment

Syntax Description

Default

Configures a comment describing the VM.

The no form of the command deletes the configured comment.

string

N/A

Configuration Mode Config Virtual Machine Host

History 3.4.0000

Free string

Role

Example admin switch (config virtual-machine host my-vm)# comment “example VM”

Related Commands virtual-machine

Notes To configure a multi-word string, the string must be placed within quotation marks.

Rev 4.20

Mellanox Technologies Confidential 451

Rev 4.20

console

console {connect [graphics | text [force]] | graphics vnc | text tty} no console {graphics vnc | text tty}

Syntax Description

Configures or connects to a text or graphical console.

The no form of the command clears console settings.

connect Connects to the text console unless specified otherwise:

• graphics – connects to the X11 graphical (VNC) console

• text – connects to the text console graphics vnc text tty

Enables graphical (VNC) console access

Enables TTY text console access

Default Graphical and textual consoles are enabled

Configuration Mode Config Virtual Machine Host

History

Role

3.4.0000

admin

Example switch (config virtual-machine host my-vm)# console connect text

Related Commands virtual-machine ssh server x11-forwarding enable

Notes • To exit the text console press Ctrl-6 (or Ctrl-Shift-6)

• If the guest OS is not configured to receive input from a serial console (ttyS0), the VM console becomes unresponsive when connected to.

• To view the graphical console, X display must be enabled. There are two options to activate it, the command vncviewer -via admin@<switchIP> 127.0.0.1:<VNC display num> (which is run from an external Linux host) and the command ssh server

 x11-forwarding enable (which is run from within the switch and requires that you log out and log back in again using ssh -X). The latter command weakens the switch security, therefore, it is recommended to opt for the second option. The VNC display num parameter may be procured by running the command show virtual-machine <vm-name> detail.

Mellanox Technologies Confidential 452

Rev 4.20

install

install {cancel |cdrom [pool <pool-name>] {file <volume-name> [connect-console

<console-type> | disk-overwrite | timeout {<minutes> | none}]}}

Syntax Description

Installs an operating system onto this VM (temporarily attach a CD and boot from it).

cancel Cancels an install already in progress cdrom pool <pool-name>

Installs an operating system from a CD-ROM (ISO) image

Configures storage pool in which to find image to install:

• default

• usb

Specifies CD-ROM (ISO) image from which to install file <volume-name> connect-console <consoletype>

Connects to the console during installation. The types may be:

• text – text console

• graphics – graphical console disk-overwrite timeout {<minutes> | none}

Installs even if primary target volume is not empty

Configures a timeout for installation in minutes (default is no timeout).

Default N/A

Configuration Mode Config Virtual Machine Host

History

Role

Example

3.4.0000

admin switch (config virtual-machine host my-vm)# install cdrom pool usb file

<image>

Related Commands virtual-machine

Notes The default pool from which the system installs the ISO image is the /var/ partition in the switch.

Mellanox Technologies Confidential 453

interface

interface <id> {bridge <bridge> | macaddr <mac> | model <model> | name

<name>}

Syntax Description

Configures virtual interfaces.

<id> Interface ID number (1-8 permitted) bridge <bridge> macaddr <mac> model <model>

Configures bridge for this interface (i.e. mgmt0 or mgmt1)

Configures MAC address (e.g. ff:ee:dd:cc:bb:aa) name <name>

Configures virtual interface model:

• realtek-8139 – Realtek 8139 (default)

• virtio – Virtual IO

Configures virtual interface name. The name must begin with “vif”.

Default N/A

Configuration Mode Config Virtual Machine Host

History

Role

3.4.0000

admin

Example switch (config virtual-machine host my-vm)# interface 1 model virtio

Related Commands virtual-machine

Notes

Rev 4.20

Mellanox Technologies Confidential 454

memory

memory <MB>

Syntax Description

Default

Configures memory allowance.

MB

512MB

Configuration Mode Config Virtual Machine Host

Size in megabytes.

History

Role

3.4.0000

admin

Example switch (config virtual-machine host my-vm)# memory 1024

Related Commands virtual-machine

Notes It is recommended not to allocate more than 1GB of memory per VM.

Rev 4.20

Mellanox Technologies Confidential 455

Rev 4.20

power

power {cycle [force | connect-console {graphics | text}] | off [force] | on [connectconsole {graphics | text}]}

Syntax Description

Turns the VM on or off, or other related options.

cycle Powers the VM down and then on again immediately force connect-console <consoletype>

Forces an action on the system.

Connects to the console after power-on. The types may be:

• text – text console

• graphics – graphical console off on

Default N/A

Configuration Mode Config Virtual Machine Host

Powers down the VM

Powers on VM:

History

Role

Example switch (config virtual-machine host my-vm)# power cycle force

Related Commands virtual-machine

Notes

3.4.0000

admin

Mellanox Technologies Confidential 456

Rev 4.20

storage create

storage create disk [drive-number <number> | file <filename> | mode {read-only

| read-write} | pool <pool-name> | size-max <MB>]

Syntax Description

Creates a new storage device for the VM, with an automatically assigned name.

create disk Creates a new virtual disk image for this VM.

drive-number <number> Specifies the drive number to be assigned to the volume. Insert “new” to assign a new drive number to the volume.

file <filename> mode {read-only | readwrite}

Specifies filename for new volume to be created

Specifies initial device mode pool <pool-name> size-max <MB>

Default N/A

Configuration Mode Config Virtual Machine Host

Specifies storage pool in which to create new volume

Specifies maximum disk capacity in megabytes

History

Role

Example

3.4.0000

admin switch (config virtual-machine host my-vm)# storage create disk sizemax 2000

Related Commands virtual-machine

Notes

Mellanox Technologies Confidential 457

Rev 4.20

storage device

storage device [bus ide] drive-number <number> [mode {read-only | readwrite}] source {[pool <pool-name>] file <filename>} no storage device [bus ide] drive-number <id>

Syntax Description

Modifies existing storage device, or create a new one with a specific name.

The no form of the command removes a storage device from the VM.

device Modifies existing storage device, or creates a new one with a specific name bus ide drive-number <number> mode {read-only | readwrite}

Configures bus type to IDE

Selects device to configure by drive number

Configures the device mode:

• read-only – sets the read-only attribute of the volume

• read-write – sets the read-write attribute of the volume source file <filename> pool <pool-name> file

<filename>

Default N/A

Configuration Mode Config Virtual Machine Host

History

Role

3.4.0000

admin

Specifies where the data for this volume resides

Specifies the filename for this volume

Specifies the storage pool for this volume

Example switch (config virtual-machine host my-vm)# storage create disk bus ide

Related Commands virtual-machine

Notes

Mellanox Technologies Confidential 458

vcpus

vcpus {count <count> | vcpu <vcpu> pin <cpu-list> [<cpu-list>]} no vcpus {pin | vcpu <vcpu> pin}

Syntax Description

Specifies virtual CPUs.

The no form of the command removes certain CPU configuration.

count <count> vcpu <vcpu>

Specifies the number of virtual CPUs

Specifies options for a particular virtual CPU

Default pin <cpu-list>

N/A

Configuration Mode Config Virtual Machine Host

Specifies physical CPUs to pin to this vCPU

History

Role

3.4.0000

admin switch (config virtual-machine host my-vm)# vcpus count 1 Example

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 459

Rev 4.20

virtual-machine volume fetch url

virt volume fetch url <download-url> [filename <filename> | pool <pool-name> filename <filename>]

Syntax Description

Default N/A

Configuration Mode Config Virtual Machine Host

History

Role

Example

3.4.0000

admin switch (config) # virtual-machine volume fetch scp://admin[:adminpass]@<hostname/path/filename>

Related Commands

Notes

Fetches volume image from a remote host.

download-url Specifies URL from which to fetch a volume. Format: http, https, ftp, tftp, scp and sftp are supported (e.g. scp://username[:password]@hostname/path/filename) filename <filename> pool-name <pool-name>

Specifies new filename for fetched volume image

Specifies storage pool for fetched volume image

Mellanox Technologies Confidential 460

Rev 4.20

virt volume file

virt volume file <name> {create disk size-max <MB> | move {new-name <newname> | pool <pool-name> new-name <new-name>} | upload <upload-url>} no virt volume file <volume-name>

Syntax Description

Specifies name of volume file to manage.

The no form of the command deletes the volume file.

file <name> create

Specifies name of volume file to manage

Creates a new volume file under this name disk size-max <MB> move new-name <filename> pool <pool-name> newname <filename> upload <upload-url>

Specifies maximum capacity of virtual disk to create

Moves or renames this volume

Specifies a name for the destination file

Specifies a storage pool for the copy

Uploads this volume file to a remote host. Format: ftp, tftp, scp and sftp are supported (e.g.

 scp://username[:password]@hostname/path/filename)

Default N/A

Configuration Mode Config Virtual Machine Host

History

Role

Example

3.4.0000

admin switch (config) # virt volume file my-vm_file create cdrom extract cdrom1

Related Commands

Notes

Mellanox Technologies Confidential 461

4.16.2.2 Show

show virtual-machine configured

show virtual-machine configured

Syntax Description

Default

Configuration Mode

History

Role

Example

Displays global virtualization configuration.

N/A

N/A

Any Command Mode

3.4.0000

admin switch (config) # show virtual-machine configured

Virtualization enabled: yes

Virtual machines: 2 configured

Virtual networks: 0 configured switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 462

Rev 4.20

show virtual-machine host

show virtual-machine host [<vm-name>]

Syntax Description

Default

Displays status for this VM.

vm-name

N/A

Configuration Mode Any Command Mode

The name of the VM.

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm

VM 'my-vm'

Status: shut off Architecture: x86_64

VCPU used: 0 sec Number of VCPUs: 1

Boot order: hd, cdrom Memory size: 512 MB

Consoles: text, graphics

Storage:

IDE bus, drive 1: default/vdisk001.img (3000 MB capacity)

Interfaces:

1: on bridge 'mgmt0' address unknown (MAC 52:54:00:2F:89:69) switch (config) #

Related Commands

Notes If the command is run in the middle of an installation, the following banner appears:

*** INSTALL IN PROGRESS: begun <time> ago ***

Mellanox Technologies Confidential 463

show virtual-machine host configured

show virtual-machine host <vm-name> configured [detail]

Syntax Description

Displays configuration for this VM.

vm-name The name of the VM.

Displays detailed configuration for this VM.

Default detail

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm configured detail

VM 'my-vm'

UUID: 0a177a99-f780-5951-877a-bd660e12e5db

Text console: enabled

Graphics console: enabled

Auto-power: last

Boot order: hd, cdrom

Architecture: x86_64

Memory size: 512 MB

Features: ACPI, APIC

Number of VCPUs: 1

(No VCPUs pinned)

Storage:

IDE bus, drive 1

Source pool: default

Source file: vdisk001.img (3000 MB capacity)

Mode: read-write

Interfaces:

Interface 1

Name: vif1

MAC address: 52:54:00:2F:89:69

Model: realtek-8139

Bound to: bridge 'mgmt0' switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 464

show virtual-machine host detail

show virtual-machine host <vm-name> detail

Syntax Description

Default

Displays detailed status for this VM.

vm-name

N/A

Configuration Mode Any Command Mode

The name of the VM.

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm detail

VM 'my-vm'

Status: shut off

UUID: 0a177a99-f780-5951-877a-bd660e12e5db

Text console: enabled

Device: N/A

Graphics console: enabled

VNC display num: N/A

Boot order: hd, cdrom

Architecture: x86_64

Memory size: 512 MB

Features: ACPI, APIC

Number of VCPUs: 1

(State of individual VCPUs unavailable when VM is powered off)

Storage:

IDE bus, drive 1

Source pool: default

Source file: vdisk001.img (3000 MB capacity)

Mode: read-write

Device type: disk

Read requests: N/A

Read bytes: N/A

Write requests: N/A

Write bytes: N/A

Interfaces:

Interface 1

Name: vif1

MAC address: 52:54:00:2F:89:69

Model: realtek-8139

Bound to: bridge 'mgmt0'

IP address:

RX bytes: 0 TX bytes: 0

RX packets: 0 TX packets: 0

RX errors: 0 TX errors: 0

RX drop: 0 TX drop: 0 switch (config) #

Rev 4.20

Mellanox Technologies Confidential 465

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 466

show virtual-machine install

show virtual-machine host <vm-name> install

Syntax Description

Default

Displays status of installation of guest OS.

vm-name

N/A

Configuration Mode Any Command Mode

The name of the VM.

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm install

Install status for VM 'my-vm'

Install in progress, begun 2 minutes 28 seconds ago.

No previous install information available.

switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 467

show virtual-machine interface

show virtual-machine host <vm-name> interface [brief | configure]

Syntax Description

Displays full status of all interfaces for this VM.

vm-name The name of the VM.

brief configure

Displays brief status of all interfaces for this VM.

Displays configuration of all interfaces for this VM.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm interface

Interface 1

Name: vif1

MAC address: 52:54:00:2F:89:69

Model: realtek-8139

Bound to: bridge 'mgmt0'

IP address:

RX bytes: 0 TX bytes: 0

RX packets: 0 TX packets: 0

RX errors: 0 TX errors: 0

RX drop: 0 TX drop: 0 switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 468

show virtual-machine storage

show virtual-machine host <vm-name> storage

Syntax Description

Default

Displays statistics for attached storage.

vm-name

N/A

Configuration Mode Any Command Mode

The name of the VM.

History

Role

Example

3.4.0000

admin switch (config) # show virtual-machine host my-vm storage

Storage for VM 'my-vm'

IDE bus, drive 1

Source pool: default

Source file: vdisk001.img (3000 MB capacity)

Mode: read-write

Device type: disk

Read requests: N/A

Read bytes: N/A

Write requests: N/A

Write bytes: N/A switch (config) #

Related Commands

Notes

Rev 4.20

Mellanox Technologies Confidential 469

Mellanox Technologies Confidential 470

Rev 4.20

5 Ethernet Switching

5.1

Interface

Interface Ethernet have the following physical set of configurable parameters

• Admin state – enabling or disabling the interface

• Flow control – admin state per direction (send or receive)

• MTU (Maximum Transmission Unit) – 1500-9216 bytes

• Speed – 1/10/40/56GbE (depends on the interface type and system)

• Description – user defined string

• Module-type – the type of the module plugged in the interface

To use 40GbE QSFP interfaces as 10GbE (via QSA adapter), the speed must be manually set with the command “speed 10000” under the interface configuration mode.

5.1.1

Break-Out Cables

The break-out cable is a unique Mellanox capability, where a single physical 40Gbps port is divided into 2x10Gbps or 4x10Gbps ports. It maximizes the flexibility of the end user to use the

Mellanox switch with a combination of 10Gbps and 40Gbps interfaces according to the specific requirements of its network. Certain ports cannot be split at all and there are ports which can be split into 2 ports only. Splitting a port changes the notation of that port from x/y to x/y/z with “x/ y” indicating the previous notation of the port prior to the split and “z” indicating the number of the resulting 10G port (1,2 or 1,2,3,4). Each sub-physical port is then handled as an individual port. For example: splitting port 10 into 4 will give the following new ports: 1/10/1, 1/10/2, 1/10/

3, 1/10/4.

Figure 13: Break-Out Cable

Rev 4.20

A split-4 operation results in blocking a 40G port in addition to the one being split. A set of hardware restrictions determine which of the ports can be split.

Mellanox Technologies Confidential 471

Specific ports can be split by using a QSFP 1X4 breakout cable to split one 40 Gb/s port into 4 lanes (4 SFP+ connectors). These 4 lanes then go, one lane to each of the 4 SFP+ connectors.

Some ports can be split into 2 10 Gb/s ports, using lanes 1 and 2 only. When a QSFP port is split into 2 10Gb/s ports then only SFP+ connectors #1 and #2 are used. Connectors #3 and #4 are left unconnected.

Rev 4.20

Splitting the interface deletes all configuration on that interface.

1

When splitting an interface’s traffic into 4 10Gb/s data streams (four lanes) one of the other ports on the switch must be disabled (unmapped).

• some ports can be split into 4

• some ports can be split into 2

• some ports become unmapped due to a 1X4 split

2 3 4 5 6

Figure 14: Port Splitting Options

7 8 9 10 11 12 13 14 15 16 17 18

Table 44 - Key for Port Splitting Figure

Color Description

Dark green

Light green

This port can be split into 4 10Gb/s SFP+

This port can be split into 2 10Gb/s SFP+

Red X This port is unmapped by the neighboring split 4 port

The maximum number of 10Gb/s Ethernet ports configurable with this switch is 34.

Mellanox Technologies Confidential 472

Rev 4.20

7

8

5

6

9

3

4

1

2

Table 45 - Port Splitting Options

Port #

Can be split to 4

Turns off port

#

Can be split to 2

— YES

YES 2

YES

YES

5

8

YES

Port #

14

15

16

17

18

10

11

12

13

Can be split to 4

Turns off port

#

YES 11

Can be split to 2

YES 14

YES

17

YES

YES

To see the exact splitting options available per system, refer to each specific system’s hardware user manual (Cabling chapter) located on the Mellanox website.

5.1.1.1 Changing the Module Type to a Split Mode

To split an interface:

Step 1.

Shut down all the ports related to the interface. Run:

• in case of split-2, shut down the current interface only

• in case of split-4, shut down the current interface and the other interface according to the table above switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # shutdown switch (config interface ethernet 1/1) # exit switch (config) # interface ethernet 1/4 switch (config interface ethernet 1/4) # shutdown

Step 2.

Step 3.

Split the ports as desired. Run: switch (config interface ethernet 1/4) # module-type qsfp-split-4 switch (config interface ethernet 1/4) #

The following warning will be displayed:

 the following interfaces will be unmapped: 1/4 1/1 .

Choose Yes when prompted Type 'yes' to confirm split

The <ports> field in the warning refers to the affected ports from splitting port <inf> in the applied command.

Please beware that splitting a port into 4 prevents you from accessing the splittable port, and an additional one. For example, in the procedure above, ports 3 and 4 become unaccessible.

Mellanox Technologies Confidential 473

5.1.1.2 Unsplitting a Split Port

To unsplit a split port:

Step 1.

Shut down all of the split ports. Run: switch (config interface ethernet 1/4/4) # shutdown switch (config interface ethernet 1/4/4) # exit switch (config) # interface ethernet 1/4/3 switch (config interface ethernet 1/4/3) # shutdown switch (config interface ethernet 1/4/3) # exit switch (config) # interface ethernet 1/4/2 switch (config interface ethernet 1/4/2) # shutdown switch (config interface ethernet 1/4/2) # exit switch (config) # interface ethernet 1/4/1 switch (config interface ethernet 1/4/1) # shutdown

Step 2.

From the first member of the split (1/4/1), change the module-type back to QSFP. Run: switch (config interface ethernet 1/4/1) # module-type qsfp

Rev 4.20

The module-type can be changed only from the first member of the split and not from the interface that was split.

Step 3.

The following warning will be displayed:

The following interfaces will be unmapped: 1/4/1 1/4/2 1/4/3 1/4/4.

Type “yes” when prompted “Type 'yes' to confirm unsplit.”

5.1.2

56GbE Link Speed

Mellanox offers proprietary speed of 56Gb/s per Ethernet interface.

The following OPNs support 56GbE:

• MSX6036F-xxxx

• MSX1036x-xxxS

• MSX1024x-xxxS

• MSX1012x-xxxx

• MSX6012F-xxxx

• MSX6018F-xxxx

The following OPNs do not support 56GbE:

• MSX6036T-xxxx

• MSX1036x-xxxR

• MSX6012T-xxxx

• MSX6018T-xxxx

56Gb/s speed is not supported on SwitchX® (A1) ASIC based switch systems.

Mellanox Technologies Confidential 474

To achieve 56GbE link speed:

Step 1.

Make sure your system is 56Gb/s capable (i.e. SX6036F, SX1024, and SX1036).

56GbE can only be achieved on 1U FDR capable systems.

Step 2.

Install Ethernet license. Run: switch (config) # license install <license key>

For a list of the available licenses see

Section 2.4, “Licenses,” on page 40 .

Step 3.

Step 4.

Step 5.

Set the system profile to be eth-single-switch, and reset the system: switch (config) # system profile eth-single-profile

Set the speed for the desired interface to 56GbE as follows. Run: switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # speed 56000 switch (config interface ethernet 1/1) #

Verify the speed is 56GbE switch (config) # show interface ethernet 1/1

Eth1/1

Admin state: Enabled

Operational state: Down

Description: N\A

Mac address: 00:02:c9:5d:e0:26

MTU: 1522 bytes

Flow-control: receive off send off

Actual speed: 56 Gbps

Switchport mode: access

Rx

0 frames

0 unicast frames

0 multicast frames

0 broadcast frames

0 octets

0 error frames

0 discard frames

Tx

0 frames

0 unicast frames

0 multicast frames

0 broadcast frames

0 octets

0 discard frames switch (config) #

Mellanox Technologies Confidential 475

Rev 4.20

5.1.3

Transceiver Information

MLNX-OS offers the option of viewing the transceiver information of a module or cable connected to a specific interface. The information is a set of read-only parameters burned onto the

EEPROM of the transceiver by the manufacture. The parameters include identifier (connector type), cable type, speed and additional inventory attributes.

To display transceiver information of a specific interface, run: switch (config) # show interfaces ethernet 1/60 transceiver

Port 1/60 state

identifier : QSFP+

cable/ module type : Passive copper, unequalized

ethernet speed and type: 56GigE

vendor : Mellanox

cable length : 1m

part number : MC2207130-001

revision : A3

serial number : MT1238VS04936 switch (config) #

Rev 4.20

The indicated cable length is rounded up to the nearest natural number.

5.1.4

High Power Transceivers

Mellanox switch systems offer high power transceiver (LR4) support in the following ports:

• SX1036/SX1700 – ports 1, 3, 33, 35

• SX1024/SX1400 – ports 50, 52, 54, 56, 58, 60

• SX1012/SX1710 – all ports

If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does not go up, and the following warning message is displayed: “Warning: High power transceiver is not supported” when the command “show interfaces ethernet” is run.

Mellanox Technologies Confidential 476

5.1.5

Commands

interface ethernet

interface ethernet <slot>/<port>[/<subport>]-[<slot>/<port>[/<subport>]]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enters the Ethernet interface or Ethernet interface range configuration mode.

<slot>/<port> Ethernet port number.

subport Ethernet subport number. to be used in case of split port.

N/A

Config

3.1.0000

3.2.1100

admin

First version

Added range support switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # exit switch (config) # interface ethernet 1/1-1/10 switch (config interface ethernet 1/1-1/10) # show interfaces ethernet

Rev 4.20

Mellanox Technologies Confidential 477

Rev 4.20

flowcontrol

flowcontrol {receive | send} {off | on} [force]

Syntax Description

Enables or disables IEEE 802.3x link-level flow control per direction for the specified interface.

receive | send receive - ingresses direction send - egresses direction off | on on - enables IEEE 802.3x link-level flow control for the specified interface on receive or send.

off - disables IEEE 802.3x link-level flow control for the specified interface on receive or send

Forces command implementation.

Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History force receive off, send off

3.1.0000

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # flowcontrol receive off switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note N/A

Mellanox Technologies Confidential 478

mtu

mtu <frame-size>

Syntax Description

Default

History

Configures the Maximum Transmission Unit (MTU) frame size for the interface.

frame-size

1522 bytes

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

3.1.0000

3.3.4500

This value may be 1500-9216 bytes.

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # mtu 9216 switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note

Rev 4.20

Mellanox Technologies Confidential 479

shutdown

shutdown no shutdown

Syntax Description

Default

Disables the interface.

The no form of the command enables the interface.

N/A

The interface is enabled.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.0000

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # shutdown switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note

Rev 4.20

Mellanox Technologies Confidential 480

description

description <string> no description

Syntax Description

Default

Role

Example

Sets an interface description.

The no form of the command returns the interface description to its default value.

string

“”

40 bytes

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.0000

3.3.4500

Added MLAG port-channel configuration mode admin switch (config interface ethernet 1/1) # description my-interface switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note

Rev 4.20

Mellanox Technologies Confidential 481

Rev 4.20

speed

speed <port speed> [force] no speed

Syntax Description

Sets the speed of the interface.

The no form of the command sets the speed of the interface to its default value.

port speed 1000 - 1GbE

10000 - 10GbE

40000 - 40GbE

56000 - 56GbE

Default

History force

Depends on the port module type, see the “Notes” section below.

Configuration Mode Config Interface Ethernet

Config Interface MLAG Port Channel

3.1.0000

3.3.4500

Forces speed change configuration

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # speed 40000 switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note • 56Gbps port speed requires a license (LIC-6036F-56GE)

• The default speed depends on the interface capabilities, interface capable with 40Gbps will have 40Gbps speed by default

• Not all interfaces support all speed options

Mellanox Technologies Confidential 482

load-interval

load-interval <time> no load-interval

Syntax Description

Default

Role

Example

Sets the interface counter interval.

The no form of the command resets the interval to its default value.

time

300 seconds.

In seconds.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.3.0000

3.3.4500

Added MLAG port-channel configuration mode admin switch (config interface ethernet 1/1) # load-interval 30 switch (config interface ethernet 1/1) #

Related Commands show interfaces ethernet

Note This interval is used for the ingress rate and egress rate counters.

Rev 4.20

Mellanox Technologies Confidential 483

ip address dhcp

ip address dhcp no ip address dhcp

Syntax Description

Default

Enables DHCP on this Ethernet interface.

N/A

Disabled

Configuration Mode Config Interface Ethernet set as router interface

Config Interface Port Channel set as router interface

History

Role

3.4.2008

admin

Example

Related Commands interface ethernet show interfaces ethernet

Note switch (config interface ethernet 1/1) # ip address dhcp switch (config interface ethernet 1/1) #

Rev 4.20

Mellanox Technologies Confidential 484

clear counters

clear counters

Syntax Description

Default

History

Clears the interface counters.

N/A

N/A

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

3.1.0000

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # clear counters

Related Commands show interfaces ethernet

Note

Rev 4.20

Mellanox Technologies Confidential 485

Rev 4.20

show interfaces ethernet

show interfaces ethernet <inf> [counters [priority]]

Syntax Description

Displays the configuration and status for the interface.

inf Interface number: <slot>/<port>.

counters priority

Displays interface extended counters.

Displays interface extended counters per priority (0-7).

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show interfaces ethernet 1/1

Eth1/1

Admin state: Enabled

Operational state: Up

Description: N\A

Mac address: 00:02:c9:71:ed:2d

MTU: 1500 bytes(Maximum packet size 1522 bytes)

Flow-control: receive off send off

Actual speed: 40 Gbps

Width reduction mode: Not supported

Switchport mode: access

Last clearing of "show interface" counters 00:20:39

60 seconds Ingress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

60 seconds Egress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

Rx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 error packets

0 discard packets

Tx

63 packets

0 unicast packets

63 multicast packets

0 broadcast packets

4032 bytes

0 discard packets switch (config) #

Mellanox Technologies Confidential 486

Rev 4.20

Related Commands

Note If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does not go up, and the following warning message is displayed: “Warning: High power transceiver is not supported” when running the command “show interfaces ethernet” is run. For more information, please refer to

Section 5.1.4, “High Power

Transceivers,” on page 476

.

Mellanox Technologies Confidential 487

show interfaces ethernet [<inf>] capabilities

show interfaces ethernet [<inf>] capabilities

Syntax Description

Displays the interface capabilities.

inf shows only one interface capabilities.

Interface number: <slot>/<port>.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show interfaces ethernet 1/1 capabilities

Eth1/1

Speed : 10000,40000

FlowControl : Send, Receive switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 488

show interfaces ethernet [<inf>] description

show interfaces ethernet [<inf>] description

Syntax Description

Default

Displays the admin status and protocol status for the specified interface. inf

N/A

Configuration Mode Any Command Mode

Interface number: <slot>/<port>.

History 3.1.0000

3.4.1100

Updated Example

Role

Example admin switch (config) # show interfaces ethernet description

Interface Admin state Operational state

--------- ----------- -----------------

Eth1/58 Enabled Down

Eth1/59 Enabled Up

Eth1/60 Enabled Down (Suspend) switch (config) # show interfaces ethernet 1/60

Eth1/60

Admin state: Enabled

Operational state: Down (Suspend) switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 489

show interfaces ethernet [<inf>] status

show interfaces ethernet [<inf>] status

Syntax Description

Default

Displays the status, speed and negotiation mode of the specified interface.

inf

N/A

Configuration Mode Any Command Mode

Interface number: <slot>/<port>.

History 3.1.0000

3.4.1100

Updated Example

Role

Example admin switch (config) # show interfaces ethernet status

Port Operational state Speed Negotiation

---- ----------------- ----- -----------

Eth1/58 Down 40 Gbps No-Negotiation

Eth1/59 Up 40 Gbps No-Negotiation

Eth1/60 Down (Suspend) 40 Gbps No-Negotiation switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 490

Rev 4.20

show interfaces ethernet [<inf>] transceiver

show interfaces ethernet [<inf>] transceiver

Syntax Description

Default

Displays the transceiver info.

inf

N/A

Configuration Mode Any Command Mode interface number: <slot>/<port>

History

Role

Example

3.1.0000

admin switch (config) # show interfaces ethernet 1/1 transceiver

Port 1/1 state

identifier : QSFP+

cable/module type : Optical cable/module

ethernet speed and type: 40GBASE - SR4

vendor : Mellanox

cable_length : 50 m

part number : MC2210411-SR4

revision : A1

serial number : TT1151-00006 switch (config) #

Related Commands

Note • For a full list of the supported cables and transceivers, please refer to the LinkX™ Cables and Transceivers webpage in Mellanox.com: http://www.mellanox.com/page/ cables?mtag=cable_overview.

• If a high power transceiver (e.g. LR4) is used, it will be indicated in the field “cable/module type”.

Mellanox Technologies Confidential 491

module-type

module-type <type> [force]

Syntax Description

Splits or un-splits the interface, as desired.

type qsfp - Port runs at 40000/56000Mbps.

qsfp-split-2 - Port is split and runs at 2X10000Mbps.

qsfp-split-4 - Port is split and runs at 4X10000Mbps.

force force the split operation without asking for user confirmation.

Default interface module type is qsfp (if the interface supports 40Gbps speed)

Configuration Mode Config Interface Ethernet

History

Role

Example

3.1.1400

admin switch (config interface ethernet 1/4) # module-type qsfp-split-4 the following interfaces will be unmapped: 1/4 1/1

Type 'yes' to confirm split: yes switch (config interface ethernet 1/4) #

Related Commands switchport mode switchport [trunk | hybrid] allowed-vlan show vlan

Note • The affected interfaces should be disabled prior to the operation

• in order to un-split the interface - used the command with “qsfp”, the speed is set to

40Gbps “module-type qsfp”.

• This command is applicable only on 40Gbps Ethernet ports

Rev 4.20

Mellanox Technologies Confidential 492

5.2

Link Aggregation Group (LAG)

Link Aggregation protocol describes a network operation in which several same speed links are combined into a single logical entity with the accumulated bandwidth of the originating ports.

LAG groups exchange Lag Aggregation Control Protocol (LACP) packets in order to align the functionality between both endpoints of the LAG. To equally send traffic on all LAG links, the switch uses a hash function which can use a set of attributes as key to the hash function.

As many as 16 physical ports can be aggregated on a single LAG.

5.2.1

Configuring Static Link Aggregation Group (LAG)

To configure a static LAG:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Step 5.

Create a port-channel entity. Run: switch (config) # interface port-channel 1 switch (config interface port-channel 1) #

Change back to config mode.

switch (config interface port-channel 1) # exit switch (config) #

Add a physical port to the port-channel. Run: switch (config interface ethernet 1/4) # channel-group 1 mode on switch (config interface ethernet 1/4) #

Rev 4.20

If the physical port is operationally up, this port becomes an active member of the aggregation. Consequently, it becomes able to convey traffic.

5.2.2

Configuring Link Aggregation Control Protocol (LACP)

To configure LACP:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Create a port-channel entity. Run: switch (config) # interface port-channel 1 switch (config interface port-channel 1) #

Change back to config mode. Run: switch (config interface port-channel 1) # exit switch (config) #

Mellanox Technologies Confidential 493

Step 5.

Step 6.

Enable LACP in the switch. Run: switch (config) # lacp switch (config) #

Add a physical port to the port-channel. Run: switch (config interface ethernet 1/4) # channel-group 1 mode active/passive switch (config interface ethernet 1/4) #

Rev 4.20

Mellanox Technologies Confidential 494

Rev 4.20

5.2.3

Commands

interface port-channel

interface port-channel <1-4096>[-<2-4096>] no interface port-channel <1-4096>[-<2-4096>]

Syntax Description

Default

Configuration Mode

History

Role

Example

Creates a LAG and enters the LAG configuration mode. There is an option to create a range of LAG interfaces.

The no form of the command deletes the LAG, or range of LAGs.

1-4096 / 2-4096

N/A

LAG number

Config

3.1.1400

3.2.1100

3.4.0000

admin

First version

Added range support

Added note switch (config)# interface port-channel 1 switch (config interface port-channel 1) # exit switch (config)# interface port-channel 1-10 switch (config interface port-channel 1-10) #

Related Commands

Note If a LAG is also an IPL, attempting to delete it without first deleting the IPL is rejected by the management.

Mellanox Technologies Confidential 495

lacp

lacp no lacp

Syntax Description

Default

Enables LACP in the switch.

The no form of the command disables LACP in the switch.

N/A

LACP is disabled.

Configuration Mode Config

History 3.1.1400

Role

Example admin switch (config)# lacp switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 496

lacp system-priority

lacp system-priority <1-65535> no lacp system-priority

Syntax Description

Default

Configures the LACP system priority.

The no form of the command sets the LACP system-priority to default.

1-65535

32768

Configuration Mode Config

History 3.1.1400

LACP system-priority.

Role

Example admin switch (config)# lacp system-priority 1 switch (config)# show lacp interfaces port-channel

Port-channel Module Admin Status is enabled

Port-channel System Identifier is 00:02:c9:5c:61:70

LACP System Priority: 3 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 497

Rev 4.20

lacp (interface)

lacp {rate fast | port-priority <1-65535>} no lacp {rate fast | port-priority}

Syntax Description

Configures the LACP interface parameters.

The no form of the command sets the LACP interface configuration to default.

rate fast Sets LACP PDUs on the port to be in fast (1 second) or slow rate. (30 seconds).

Default

Role

Example rate - slow (30 seconds) port-priority 32768

Configuration Mode Config

History 3.1.1400

admin switch (config interface ethernet 1/7)# lacp rate fast switch (config interface ethernet 1/7)# show lacp interfaces ethernet

1/7

Port : 1/7

-------------

Port State = Down

Channel Group : 1

Pseudo port-channel = Po1

LACP port-priority = 32768

LACP Rate = Slow

LACP Activity : Passive

LACP Timeout : Short

Aggregation State : Aggregation, Defaulted,

LACP Port Admin Oper Port Port

Port State Priority Key Key Number State

-------------------------------------------------------------------

1/7 Down 128 1 1 0x7 0x0 switch (config)#

Related Commands

Note Configuring LACP rate (fast or slow) will configure the peer port to send (fast or slow), it does not make any affect on the local port LACP rate.

Mellanox Technologies Confidential 498

port-channel load-balance ethernet

port-channel load-balance ethernet <method> no port-channel load-balance ethernet <method>

Syntax Description

Configures the port-channel load balancing distribution function method.

The no form of the command sets the distribution function method to default.

method Possible load balance methods:

• destination-ip

• destination-mac

• destination-port

• source-destination-ip

• source-destination-mac

• source-destination-port

• source-ip

• source-mac

• source-port

Default source-destination-mac

Configuration Mode Config

History

Role

Example

3.1.1400

admin switch (config)# port-channel load-balance ethernet destination-ip source-port source-mac switch (config)# show interfaces port-channel load-balance destination-ip,source-mac,source-port switch (config)#

Related Commands

Note Several load balance methods can be configured (refer to the example)

Rev 4.20

Mellanox Technologies Confidential 499

Rev 4.20

channel-group

channel-group <1-4096> [mode {on | active | passive}] no channel-group

Syntax Description

Assigns and configures a physical interface to a port channel.

The no form of the command removes a physical interface from the port-channel.

1-4096 mode on

The port channel number.

Static assignment the port to LAG. LACP will not be enabled on this port.

mode active/passive Dynamic assignment of the port to LAG. LACP will be enabled in either passive or active mode.

Default N/A

Configuration Mode Config Interface Ethernet

History 3.1.1400

3.4.0008

Role

Example

Added a note admin switch (config interface ethernet 1/7)# channel-group 1 mode active

Related Commands show interfaces port-channel summary show interfaces port-channel compatibility-parameters show lacp interfaces ethernet

Note • Setting the mode to active/passive is possible only in LACP is enabled.

• The first port in the LAG decide if the LAG will be static (“on”) or LACP (“active” ,

“pasive”).

• All the ports in the LAG must have the same configuration, determines by the first port added to the LAG. The port with a different configuration will be rejected, for the list of dependencies refer to ‘show interfaces port-channel compatibility-parameters’

• A physical port may only be part of one channel-group

Mellanox Technologies Confidential 500

Rev 4.20

lacp-individual enable

lacp-individual enable [force] no lacp-individual enable [force]

Syntax Description

Default

Configures the LAG to act with LACP-individual capabilities.

The no form of the command disables the LACP-individual capability.

force

N/A

Configuration Mode Config Interface Port Channel

History 3.4.1100

Toggles the interface after enabling LACP-individual.

Role

Example

Related Commands

Note admin switch (config interface port-channel 10)# lacp-individual enable force

If a switch is connected via LAG to a host without LACP capability, running this command on that LAG allows a member port (with the lowest numerical priority value), acting as an individual, to communicate with the host.

Mellanox Technologies Confidential 501

ip address dhcp

ip address dhcp no ip address dhcp

Syntax Description

Default

Enables DHCP on this LAG interface.

N/A

Disabled

Configuration Mode Config Interface Port Channel set as router interface

History

Role

3.4.2008

admin

Example

Related Commands interface port-channel show interface port-channel

Note switch (config interface port channel 10) # ip address dhcp switch (config interface port channel 10) #

Rev 4.20

Mellanox Technologies Confidential 502

Rev 4.20

show lacp counters

show lacp counters

Displays the LACP PDUs counters.

Syntax Description

Default

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config)# show lacp counters

LACPDUs Marker Marker Response LACPDUs

Port Sent Recv Sent Recv Sent Recv Illegal Unknown

----------------------------------------------------------------------

Port-channel: 1

------------------

1/7 0 0 0 0 0 0 0 0 switch (config) # switch (config)#

Related Commands

Note

Mellanox Technologies Confidential 503

show lacp interfaces ethernet

show lacp interface ethernet <inf>

Syntax Description

Default

Displays the LACP interface configuration and status.

inf

N/A

Configuration Mode Any Command Mode

Interface number, for example “1/1”.

History

Role

Example

3.1.1400

admin switch (config) # show lacp interfaces ethernet 1/4

Port : 1/4

-------------

Port State = Down

Channel Group : 1

Pseudo port-channel = Po1

LACP port-priority = 128

LACP Rate = Slow

LACP Activity : Passive

LACP Timeout : Short

Aggregation State : Aggregation, Defaulted,

LACP Port Admin Oper Port Port

Port State Priority Key Key Number State

-------------------------------------------------------------------

1/4 Down 128 1 1 0x4 0x0 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 504

show lacp interfaces neighbor

show lacp interfaces neighbor

Syntax Description

Default

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Displays the LACP interface neighbor status.

3.1.1400

3.4.0000

admin

First version

Updated output

Rev 4.20

Mellanox Technologies Confidential 505

Example

Related Commands

Note switch (config) # show lacp interfaces neighbor

Flags:

A - Device is in Active mode

P - Device is in Passive mode

Channel group 1 neighbors

Port 1/4

----------

Partner System ID : 00:00:00:00:00:00

Flags : A

LACP Partner Port Priority : 0

LACP Partner Oper Key : 0

LACP Partner Port State : 0x0

Port State Flags Decode

------------------------

Activity : Active

Aggregation State : Aggregation, Sync, Collecting, Distributing

MLAG channel group 25 neighbors

Port 1/49

----------

Partner System ID : 00:02:c9:fa:c4:c0

Flags : A

LACP Partner Port Priority : 255

LACP Partner Oper Key : 33

LACP Partner Port State : 0xbc

Port State Flags Decode

------------------------

Activity : Active

Aggregation State : Aggregation, Sync, Collecting, Distributing,

MLAG channel group 28 neighbors

Port 1/51

----------

Partner System ID : f4:52:14:10:d8:f1

Flags : A

LACP Partner Port Priority : 255

LACP Partner Oper Key : 33

LACP Partner Port State : 0xbc

Port State Flags Decode

------------------------

Activity : Active

Aggregation State : Aggregation, Sync, Collecting, Distributing, switch (config) #

Rev 4.20

Mellanox Technologies Confidential 506

show lacp

show lacp

Syntax Description

Default

Displays the LACP global parameters.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.0000

admin switch (config) # show lacp

Port-channel Module Admin Status is enabled switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 507

show lacp interfaces system-identifier

show lacp interfaces {mlag-port-channel | port-channel} <instance> systemidentifier

Syntax Description

Default

Displays the system identifier of LACP.

instance

N/A

Configuration Mode Any Command Mode

LAG or MLAG instance.

History

Role

Example

3.4.0000

admin switch (config)# show lacp interfaces port-channel 2 system-identifier

Priority: 12345

MAC: 00:02:C9:AC:2A:60 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 508

show interfaces port-channel

show interfaces port-channel <port-channel>

Syntax Description

Default

Displays port-channel configuration properties.

port-channel

N/A

Configuration Mode Any Command Mode

LAG interface whose properties to display

History 3.3.4000

3.4.1100

Update Example

Role

Example admin switch (config) # show interfaces port-channel 2

Po2

Admin state: Enabled

Operational state: Up

Description: N\A

Mac address: 00:00:00:00:00:00

MTU: 9216 bytes (Maximum packet size 9238 bytes)

lacp-individual mode: Enabled

Flow-control: receive off send off

Actual speed: 2 X 40 Gbps

Width reduction mode: Not supported

Switchport mode: trunk

MAC learning mode: Enabled

Last clearing of "show interface" counters : Never

60 seconds ingress rate: 2440 bits/sec, 305 bytes/sec, 5 packets/sec

60 seconds egress rate: 2440 bits/sec, 305 bytes/sec, 5 packets/sec

Rx

24060 packets

23447 unicast packets

598 multicast packets

15 broadcast packets

1796876 bytes

0 error packets

0 discard packets

Tx

23961 packets

23454 unicast packets

496 multicast packets

11 broadcast packets

1805778 bytes

4 discard packets switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 509

Rev 4.20

show interfaces port-channel compatibility-parameters

show interfaces port-channel compatibility-parameters

Syntax Description

Default

Displays port-channel parameters.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4000

admin switch (config) # show interfaces port-channel compatibility-parameters

* Port-mode

* Speed

* MTU

* Flow Control

* Access VLAN

* Allowed VLAN list

* Flowcontrol & PFC

* Channel-group mode

* CoS parameters

* MAC learning disable

Static configuration on the port should be removed:

* ACL port binding

* Static mrouter

* sflow

* OpenFlow

* port mirroring local analyzer port

* Static mac address switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 510

show interfaces port-channel load-balance

show interfaces port-channel load-balance

Syntax Description

Default

Displays the type of load-balancing in use for port-channels.

N/A

N/A

Configuration Mode Any Command Mode

N/A

History

Role

Example

3.3.4000

admin switch (config) # show interfaces port-channel load-balance source-destination-mac switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 511

Rev 4.20

show interfaces port-channel summary

show interfaces port-channel summary

Syntax Description

Default

Displays a summary for the port-channel interfaces.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.1400

3.4.1100

Updated Example

Role

Example admin switch (config) # show interfaces port-channel summary

Flags: D - Down, U - Up, P - Up in port-channel (members)

S - Suspend in port-channel (members), I - Individual

-----------------------------------------------------------------------

Group Port- Type Member Ports

Channel

-----------------------------------------------------------------------

1 Po2(U) LACP Eth1/58(D) Eth1/59(I) Eth1/60(S)

2 Po5(D) LACP Eth1/1(S) Eth1/33(I)

3 Po10(U) LACP Eth1/49(P) Eth1/50(P) Eth1/51(S) Eth1/52(S) switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 512

5.3

MLAG

Figure 15: Basic MLAG Setup

Rev 4.20

All nodes in an MLAG must be of the same CPU type (i.e. PPC or x86).

Each switch configuration is independent and it is user responsibility to make sure to configure both switches similarly pertaining MLAG (e.g. MLAG port-channel VLAN membership, static MAC, ACL, etc).

A link aggregation group (LAG) is used for extending the bandwidth from a single link to multiple links and provide redundancy in case of link failure. Extending the implementation of the

LAG to more than a single device provides yet another level of redundancy that extends from the link level to the node level. This extrapolation of the LAG from single to multiple switches is referred to as multi-chassis link aggregation (MLAG).

MLAG is currently supported for 2 switches only.

The VIP address must be on the same management IP subnet.

Mellanox Technologies Confidential 513

A peered device (host or switch) connecting to switches running an MLAG runs a standard LAG and is unaware of the fact that the LAG connects to two separate switches.

MLAG links currently mandate disabling xSTP control protocol. However, interfaces not part of an MLAG can run any protocol independently.

The MLAG switches share an inter-peer link (IPL) between them for carrying control messages in a steady state or data packages in failure scenarios. Thus, the bandwidth of the IPL should be defined accordingly. The IPL itself can be a LAG and be constructed of either 10GbE or 40GbE

links. In such a case, PFC must be configured on this IPL. Figure 16, “Basic MLAG Topology,” on page 516

illustrates. The IPL serves the following purposes:

• MLAG protocol control – keepalive messages, MAC sync, MLAG port sync, etc.

• MLAG port failure – serves redundancy in case of a fallen link on one of the MLAG switches.

• Layer-3 failure – serves redundancy in case of a failed connection between the MLAG switches and the rest of the L3 network should there be one.

The MLAG protocol is made up of the following components to be expanded later:

• Keepalive

• Unicast and multicast sync

• MLAG port sync

When positioned at the top of rack (ToR) and connecting with a Layer-3 uplink, the MLAG pair acts as the L3 border for the hosts connected to it. To allow default gateway redundancy, both

MLAG switches should be addressed by the host via the same default gateway address.

MLAG uses an IP address (VIP) that is always directed to the MLAG-VIP master node.

When running MLAG with L3, VRRP or MAGP must be deployed. For more information, refer to

Section 6.7, “VRRP,” on page 976 or

Section 6.8, “MAGP,” on page 991

respectively.

When MLAG is connected through a Layer-2 based uplink, there is no need to apply default gateway redundancy towards hosts since this function is implemented on the L2/

L3 border points of the network.

The two peer switches need to carry the exact same configuration of the MLAG attributes for guaranteeing proper functionality of the MLAG.

Ensuring that both switches are configured identically is the responsibility of the user and is not monitored by the MLNX-OS software.

Rev 4.20

When working with MLAG the maximum number of MAC addresses is limited to

47,970. Without it, the number of MAC addresses would be 55,872.

Mellanox Technologies Confidential 514

When transitioning from standalone into a group or vice versa, a few seconds are required for the node state to stabilize. During that time, group features such as Gateway HA, SM HA, and MLAG commands should not be executed. To run group features, wait for the CLI prompt to turn into [standalone:master], [<group>:master] or

[<group>:standby] instead of [standalone:*unknown*] or [<group>:*unknown*].

5.3.1

MLAG Keepalive and Failover

Master election in MLAG is based on the IPs of the nodes taking part of the MLAG. The master elected is that which has the highest IPL VLAN interface local IP address.

MLAG master/slave roles take effect in fault scenarios such as split-brain, peer faults, and during software upgrades.

The MLAG pair of switches periodically exchanges a keepalive message on a user configurable interval. If the keepalive message fails to arrive for three consecutive intervals the switches break into two standalone switches. In such case the remaining active switch begins to act as a standalone switch and assumes that its previously peering MLAG switch has failed.

To avoid a scenario where failure on the IPL causes both MLAG peers to assume that their peer has failed, a safety mechanism based on UDP packets running via the management plane is maintained and alerts both peers of IPL failure. In such a case of IPL failure, the slave shuts down its interfaces to avoid a split brain scenario and the master becomes a standalone switch.

5.3.2

Unicast and Multicast Sync

Unicast and multicast sync is a mechanism which syncs the unicast and multicast FDBs of the

MLAG peers. It prevents unicast asymmetric traffic from loading the network with flood traffic and multicast traffic from being processed.

5.3.3

MLAG Port Sync

Under normal circumstances, traffic from the IPL cannot pass through the MLAG ports (the IPL is isolated from the MLAG ports). If one of the MLAG links break, the other MLAG switch opens that isolation and allows traffic from its peer through the IPL to flow via the MLAG port which accesses the destination of the fallen link.

5.3.4

MLAG Virtual System-MAC

A pair of MLAG switches uses a single virtual system MAC for L2 protocols (such as LACP) operating on the MLAG ports.

The virtual system MAC is automatically computed based on the MLAG VIP name, but can be manually set using the command

“system-mac”

.

MLAG relies on systems to have the same virtual system MAC. Therefore, if a system MAC mismatch is detected, the slave shuts down its interfaces.

5.3.5

Upgrading MLAG Pair

Switches in the same MLAG group must have the same MLNX-OS version.

Mellanox Technologies Confidential 515

Rev 4.20

When peers identify having different versions, they enter an upgrading state in which the slave

peer waits for a specific period of time (according to the command “upgrade-timeout” on page 531 ) before closing its ports.

For more information on MLAG upgrade, please see

Section 4.3.2, “Upgrading MLNX-OS HA

Groups,” on page 169

.

5.3.6

MLAG Configuration

This section provides an example of how to configure two switches and a server in an MLAG setup.

Figure 16: Basic MLAG Topology

Rev 4.20

To configure L2 MLAG:

Prerequisites:

Step 1.

Enable IP routing. Run: switch (config)# ip routing

Step 2.

(Recommended) Enable LACP in the switch. Run: switch (config)# lacp

Step 3.

Step 4.

Enable QoS on the switch to avoid congestion on the IPL port. Run: switch (config)# dcb priority-flow-control enable force

Enable the MLAG protocol commands. Run: switch (config)# protocol mlag

Configuring the IPL:

Step 1.

Create a VLAN for the inter-peer link (IPL) to run on. Run: switch (config)# vlan 4000 switch (config vlan 4000)#

Mellanox Technologies Confidential 516

Rev 4.20

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Step 7.

Create a LAG. Run: switch (config)# interface port-channel 1 switch (config interface port-channel 1)#

Map a physical port to the LAG in active mode (LACP). Run: switch (config)# interface ethernet 1/1 channel-group 1 mode active

Set this LAG as an IPL. Run: switch (config interface port-channel 1)# ipl 1

Enable QoS on this specific interface. Run: switch (config interface port-channel 1)# dcb priority-flow-control mode on force

Create a VLAN interface. Run: switch (config)# interface vlan 4000 switch (config interface vlan 4000)#

Set an IP address and netmask for the VLAN interface.

On SwitchA, run: switch (config interface vlan 4000)# ip address 10.10.10.1 /30

Step 8.

Step 9.

On SwitchB, run: switch (config interface vlan 4000)# ip address 10.10.10.2 /30

Map the VLAN interface to be used on the IPL and set the peer IP address (the IP address of the

IPL port on the second switch) of the IPL peer port. IPL peer ports must be configured on the same netmask.

On SwitchA, run: switch (config interface vlan 4000)# ipl 1 peer-address 10.10.10.2

On SwitchB, run: switch (config interface vlan 4000)# ipl 1 peer-address 10.10.10.1

Configure a virtual IP (VIP) for the MLAG. Run:

On SwitchA, run: switch (config)# mlag-vip my-vip ip 10.10.10.254 /24 //mask may also be 255.255.255.0

On SwitchB, run: switch (config)# mlag-vip my-vip

Step 10.

(Optional) Configure a virtual system MAC for the MLAG. Run: switch (config)# mlag system-mac 00:00:5E:00:01:5D

Creating an MLAG interface:

Step 1.

Create an MLAG interface for the host. Run: switch (config)# interface mlag-port-channel 1 switch (config interface mlag-port-channel 1)#

Step 2.

Disable STP. Run: switch (config interface mlag-port-channel 1)# spanning-tree port type edge switch (config interface mlag-port-channel 1)# spanning-tree bpdufilter enable

Mellanox Technologies Confidential 517

Rev 4.20

Step 3.

Step 4.

Bind an Ethernet port to the MLAG group. Run: switch (config interface ethernet 1/2)# mlag-channel-group 1 mode on

Create and enable the MLAG interface. Run: switch (config interface mlag-port-channel 1)# no shutdown

STP must be disabled (no spanning-tree) on the MLAG switches when there is at least 1 MLAG port-channel connected to a switch and not to a host.

Enabling MLAG:

Step 1.

Enable MLAG. Run: switch [my-vip: master] (config mlag)# no shutdown

When running MLAG with L3, VRRP or MAGP must be deployed. For more information, refer to

Section 6.7, “VRRP,” on page 976

or Section 6.8, “MAGP,” on page 991

respectively.

To verify MLAG configuration:

Step 1.

Examine MLAG configuration and status. Run:

SX2 [mellanox: master] (config)# show mlag

Admin status: Enabled

Operational status: Up

Reload-delay: 1 sec

Keepalive-interval: 30 sec

Upgrade-timeout: 60 min

System-mac: 00:00:5E:00:01:5D

MLAG Ports Configuration Summary:

Configured: 1

Disabled: 0

Enabled: 1

MLAG Ports Status Summary:

Inactive: 0

Active-partial: 0

Active-full: 1

Mellanox Technologies Confidential 518

MLAG IPLs Summary:

ID Group Vlan Operational Local Peer

Port-Channel Interface State IP address IP address

---------------------------------------------------------------------

1 Po1 1 Up 10.10.10.1 10.10.10.2

Step 2.

Peers state Summary:

System-id State Hostname

-----------------------------------

F4:52:14:2D:9B:88 Up <SX2>

F4:52:14:2D:9B:08 Up SX1 switch [mellanox: master] (config)#

Examine the MLAG summary table. Run: switch [my-vip: master] (config)# show interfaces mlag-port-channel summary

MLAG Port-Channel Flags: D-Down, U-Up

P-Partial UP, S - suspended by MLAG

Port Flags: D - Down, P - Up in port-channel (members)

S - Suspend in port-channel (members), I - Individual

Group

Port-Channel Type Local Ports Peer Ports

(D/P/S/I) (D/P/S/I) (D/P/S/I)

----------------------------------------------------------------------

1 Mpo2(U) Static Eth1/2(P) Eth1/2(P)

Step 3.

switch (config)#

Examine the MLAG statistics. Run: switch [my-vip: master] (config)# show mlag statistics

IPL 1:

Rx Heartbeat : 516

Tx Heartbeat : 516

Rx IGMP tunnel : 0

Tx IGMP tunnel : 0

RX mlag-notification: 0

TX mlag-notification: 0

Rx port-notification : 0

Tx port-notification : 0

Rx FDB sync : 0

Tx FDB sync : 0

RX LACP manager: 1

TX LACP manager: 0 switch (config)#

Rev 4.20

Mellanox Technologies Confidential 519

Rev 4.20

5.3.7

Commands

protocol mlag

protocol mlag no protocol mlag

Enables MLAG functionality and unhides the MLAG commands.

The no form of the command hides the MLAG commands and deletes its database.

Syntax Description

Default

Configuration Mode

History

Role

Example no protocol mlag

Config

3.3.4500

admin switch (config) # protocol mlag switch (config) #

Related Commands

Note • Running the no form of this command hides MLAG commands.

• MLAG may be enabled without IP routing, but without IP routing an IPL vLAN interface cannot be configured and thus MLAG does not function.

• MLAG may be enabled without IGMP snooping, but if IGMP snooping is disabled, multicast FDBs do not sync.

Mellanox Technologies Confidential 520

mlag

mlag

Syntax Description

Default

Enters MLAG configuration mode.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.3.4500

admin switch (config) # mlag switch (config mlag) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 521

shutdown

shutdown no shutdown

Syntax Description

Default

Enables MLAG.

The no form of the command disables MLAG.

N/A

Disabled

Configuration Mode Config MLAG

History 3.3.4500

Role

Example admin switch (config mlag) # no shutdown switch (config mlag) #

Related Commands

Note This parameter must be similar in all MLAG peers.

Rev 4.20

Mellanox Technologies Confidential 522

interface mlag-port-channel

interface mlag-port-channel <if-number> no interface mlag-port-channel <if-number>

Syntax Description

Default

Creates an MLAG interface.

The no form of the command deletes the MLAG interface.

if-number

N/A

Configuration Mode Config

History 3.3.4500

Integer. Interface number range: 1-1000.

Role

Example admin switch (config) # interface mlag-port-channel 1 switch (config interface mlag-port-channel 1) #

Related Commands

Note • The maximum number of interfaces is 64.

• The default Admin state is disabled.

• Range configuration is possible on this interface.

• This interface number must be the same in all the MLAG switches.

Rev 4.20

Mellanox Technologies Confidential 523

ipl

ipl <ipl-id> no ipl <ipl-id>

Syntax Description

Default

Sets this LAG as an IPL port.

The no form of the command resets this LAG as regular LAG.

ipl-id no ipl

Configuration Mode Config Interface Port Channel

History 3.3.4500

IPL ID. Only “1” IPL port is supported.

Role

Example

Related Commands

Note admin switch (config interface port-channel 1)# ipl 1

• If a LAG is set as IPL, only the commands “[no] shutdown”, “no ipl” and “no interface port-channel” become applicable.

• A LAG interface set as IPL must have default LAG configuration, otherwise the set is rejected. Force option can be used.

Rev 4.20

Mellanox Technologies Confidential 524

Rev 4.20

ipl peer-address

ipl <ipl-id> peer-address <IP-Address> no ipl <ipl-id>

Syntax Description

Maps a VLAN interface to be used for an IPL LAG and sets the peer IP address of the

IPL peer port.

The no form of the command deletes a peer IPL LAG and unbinds this VLAN interface from the IPL function.

ipl-id

IP-Address

IPL ID. Only “1” IPL port is supported.

IPv4 address.

Default N/A

Configuration Mode Config Interface VLAN

History

Role

Example

3.3.4500

admin switch (config interface vlan 1)# ipl 1 peer-address 10.10.10.10

switch (config interface vlan 1)#

Related Commands

Note • The subnet mask is the same subnet mask of the VLAN interface.

• This VLAN interface should be used for IPL only.

Mellanox Technologies Confidential 525

keep-alive-interval

keep-alive-interval <value> no keep-alive-interval

Syntax Description

Default

Configures the interval during which keep-alive messages are issued between the

MLAG switches.

The no form of the command resets this parameter to its default value.

value

1 second

Configuration Mode Config MLAG

History 3.3.4500

Time in seconds. Range: 1-300.

Role

Example admin switch (config mlag) # keep-alive-interval 1 switch (config mlag) #

Related Commands

Note This parameter must be similar in all MLAG peers.

Rev 4.20

Mellanox Technologies Confidential 526

mlag-channel-group mode

mlag-channel-group <if-number> mode {on | active | passive} no mlag-channel-group

Syntax Description

Binds an Ethernet port to the MLAG LAG.

The no form of the command deletes the binding.

if-number on

Integer. Interface number range: 1-1000.

Binds to static MLAG.

active passive

Default N/A

Configuration Mode Config Interface Ethernet

Sets MLAG LAG in LACP active mode.

Sets MLAG LAG in LACP passive mode.

History

Role

Example

3.3.4500

admin switch (config interface ethernet 1/1)# mlag-channel-group 1 mode on switch (config interface ethernet 1/1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 527

mlag-vip

Syntax Description mlag-vip <domain-name> ip [<ip-address> {<masklen> | netmask> [force]] no mlag-vip

Sets the VIP domain and IP address for MLAG.

The no form of the command deletes the VIP domain and IP address.

domain-name MLAG group name

<masklen>

<netmask> force

Format example: /24. Note that a space is required between the IP address and the mask.

Format example: 255.255.255.0. Note that a space is required between the IP address and the mask.

Forces the IP address if another IP is already configured.

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4500

admin switch (config)# mlag-vip my-mlag-domain ip 10.10.10.254/24 switch (config)#

Related Commands

Note • This IP address must be configured in one of the MLAG switches and must be in the box management subnet.

• Other switches in the MLAG must join the same domain name.

Rev 4.20

Mellanox Technologies Confidential 528

Rev 4.20

reload-delay

reload-delay <value> no reload-delay

Syntax Description

Default

Specifies the amount of time that MLAG ports are disabled after system reboot.

The no form of the command resets this parameter to its default value.

value

30 seconds

Configuration Mode Config MLAG

History 3.3.4500

Time in seconds. Range: 0-300.

Role

Example admin switch (config mlag) # reload-delay 30 switch (config mlag) #

Related Commands

Note • This interval allows the switch to learn the IPL topology to identify the master and sync the

MAC address before opening the MLAG ports.

• This parameter must be similar in all MLAG peers.

Mellanox Technologies Confidential 529

system-mac

system-mac <virtual-mac> no system-mac <virtual-mac>

Configures virtual system MAC.

The no form of the command resets this value to its default value.

virtual-mac MAC address Syntax Description

Default Default is calculated according to the MLAG-VIP name, using the base MAC as

VRRP MAC prefix (00:00:5E:00:01:xx) with the suffix hashed from the mlag-vip name 0...255.

Configuration Mode Config MLAG

History 3.4.2008

Role

Example admin switch (config mlag) # system-mac 00:00:5E:00:01:5D switch (config mlag) #

Related Commands

Note This parameter must be configured the same in all MLAG peers.

Rev 4.20

Mellanox Technologies Confidential 530

Rev 4.20

upgrade-timeout

upgrade-timeout <time> no upgrade-timeout

Syntax Description

Default

Configures the time period during which an MLAG slave keeps its ports active while in upgrading state.

The no form of the command resets the parameter value to its default.

time

60

Configuration Mode Config MLAG

History 3.4.2008

Time in minutes. Range: 0-120 minutes.

Role

Example admin switch (config mlag) # upgrade-timeout 60 switch (config mlag) #

Related Commands

Note This parameter must be configured the same in all MLAG peers.

Mellanox Technologies Confidential 531

show mlag

show mlag

Syntax Description

Default

Displays MLAG configuration and status.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.4500

3.3.5006

3.4.2008

Updated example

Updated example with system MAC and upgrade

 timeout

Role

Example admin

SX2 [mellanox: master] (config)# show mlag

Admin status: Enabled

Operational status: Up

Reload-delay: 1 sec

Keepalive-interval: 30 sec

Upgrade-timeout: 60 min

System-mac: 00:00:5E:00:01:5D

MLAG Ports Configuration Summary:

Configured: 1

Disabled: 0

Enabled: 1

MLAG Ports Status Summary:

Inactive: 0

Active-partial: 0

Active-full: 1

MLAG IPLs Summary:

ID Group Vlan Operational Local Peer

Port-Channel Interface State IP address IP address

---------------------------------------------------------------------

1 Po1 1 Up 10.10.10.1 10.10.10.2

MLAG Members Summary:

System-id State Hostname

-----------------------------------

F4:52:14:2D:9B:88 Up <SX2>

F4:52:14:2D:9B:08 Up SX1

SX2 [mellanox: master] (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 532

show mlag-vip

show mlag-vip

Syntax Description

Default

Displays MLAG VIP configuration and status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4500

admin switch (config)# show mlag-vip

MLAG VIP

========

MLAG group name: my-mlag-group

MLAG VIP address: 1.1.1.1/30

Active nodes: 2

Hostname VIP-State IP Address

----------------------------------------------------

SwitchA master 10.10.10.1

SwitchB standby 10.10.10.2

switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 533

show interfaces mlag-port-channel

show interfaces mlag-port-channel <if-number>

Syntax Description

Default

Displays the MLAG LAG configuration and status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4500

admin switch (config)# show interfaces mlag-port-channel 1

Mpo1

Admin state: Enabled

Operational state: Down

Description: N\A

Mac address: 00:00:00:00:00:00

MTU: 1500 bytes (Maximum packet size 1522 bytes)

Flow-control: receive off send off

Actual speed: 0 Gbps

Width reduction mode: Not supported Switchport mode: access

Last clearing of "show interface" counters : Never

60 seconds ingress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

60 seconds egress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

Rx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 error packets

0 discard packets

Tx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 discard packets switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 534

Rev 4.20

show interfaces mlag-port-channel summary

show interfaces mlag-port-channel summary

Syntax Description

Default

Displays MLAG summary table.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.4500

3.4.0000

First version

Added notes and updated example

Role

Example

3.4.1100

admin

Updated Example switch [my-vip: standby] (config)# show interfaces mlag-port-channel summary

MLAG Port-Channel Flags: D-Down, U-Up

P-Partial UP, S - Suspended by MLAG

Port Flags: D - Down, P - Up in port-channel (members)

S - Suspend in port-channel (members), I - Individual

Group

Port-Channel Type Local Ports Peer Ports

(D/U/P/S) (D/P/S/I) (D/P/S/I)

----------------------------------------------------------------------

1 Mpo2(U) Static Eth1/2(P) Eth1/2(P)

2 Mpo3(U) Static Eth1/4(P) Eth1/8(P)

3 Mpo4(U) LACP Eth1/5(P) Eth1/5(P) switch (config)#

Related Commands

Note • If a cluster is not available, the column “Peer Ports” shows “N/A”. If the cluster is available but is not configured on the peer, the “Peer Ports” column shows nothing.

• If the system happens to be busy, peer ports may be unavailable and the following prompt may appear in the output: “System busy and partial information is presented – please try again later”.

• The “I” flag indicates an interface which is part of a port-channel and in individual state

• The “S” flag indicates an interface which is part of a port-channel and in suspended state

Mellanox Technologies Confidential 535

show mlag statistics

show mlag statistics

Syntax Description

Default

Displays the MLAG IPL counters.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.4500

3.4.0000

Updated example

Role

Example admin switch (config)# show mlag statistics

IPL 1:

RX Heartbeat: 439908

TX Heartbeat: 439951

RX IGMP tunnel: 0

TX IGMP tunnel: 1

RX mlag-notification: 0

TX mlag-notification: 12

RX port-notification: 56

TX port-notification: 73

RX FDB sync: 424

TX FDB sync: 778

RX LACP manager: 38

TX LACP manager: 21

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 536

5.4

VLANs

A Virtual Local Area Network (VLAN) is an L2 segment of the network which defines a broadcast domain and is identified by a tag added to all Ethernet frames running within the domain.

This tag is called a VLAN ID (VID) and can take a value of 1-4094.

Each port can have a switch mode of either:

• Access – Access port is a port connected to a host. It can accept only untagged frames, and assigns them a default configured VLAN (Port VLAN ID). On egress, traffic sent from the access port is untagged.

• Access-dcb – This mode is Mellanox specific that receives ingress untagged traffic but sends egress priority tag (VLAN ID = 0)

• Hybrid – Hybrid port is a port connected to either switches or hosts. It can receive both tagged and untagged frames and assigns untagged frames a default configured VLAN (Port VLAN

ID). It receives tagged frames with VLANs of which the port is a member (these VLANs’ names are allowed). On egress, traffic of allowed VLANs sent from the Hybrid port is sent tagged, while traffic sent with PVID is untagged.

• Trunk – Trunk port is a port connecting 2 switches. It accepts only tagged frames with

VLANs of which the port is a member. On egress, traffic sent from the Trunk port is tagged.

By default, a Trunk port is, automatically, a member on all current VLANs.

5.4.1

Configuring Access Mode and Assigning Port VLAN ID (PVID)

To configure Access mode and assign PVID to interfaces:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Create a VLAN. Run: switch (config) # vlan 6 switch (config vlan 6) #

Change back to config mode. Run: switch (config vlan 6) # exit switch (config) #

Step 5.

Step 6.

Step 7.

Enter the interface context. Run: switch (config) # interface ethernet 1/36 switch (config interface ethernet 1/36) #

From within the interface context, configure the interface mode to Access. Run: switch (config interface ethernet 1/36) # switchport mode access switch (config interface ethernet 1/36) #

From within the interface context, configure the Access VLAN membership. Run: switch (config interface ethernet 1/36) # switchport access vlan 6 switch (config interface ethernet 1/36) #

Rev 4.20

Mellanox Technologies Confidential 537

Step 8.

Change back to config mode. Run: switch (config interface ethernet 1/36) # exit switch (config) #

5.4.2

Configuring Hybrid Mode and Assigning Port VLAN ID (PVID)

To configure Hybrid mode and assign PVID to interfaces:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Create a VLAN. Run: switch (config) # vlan 6 switch (config vlan 6) #

Change back to config mode. Run: switch (config vlan 6) # exit switch (config) #

Step 5.

Step 6.

Step 7.

Step 8.

Enter the interface context. Run: switch (config) # interface ethernet 1/36 switch (config interface ethernet 1/36) #

From within the interface context, configure the interface mode to Access. Run: switch (config interface ethernet 1/36) # switchport mode hybrid switch (config interface ethernet 1/36) #

From within the interface context, configure the Access VLAN membership. Run: switch (config interface ethernet 1/36) # switchport hybrid vlan 6 switch (config interface ethernet 1/36) #

Change to config mode again. Run: switch (config interface ethernet 1/36) # exit switch (config) #

5.4.3

Configuring Trunk Mode VLAN Membership

To configure Trunk mode VLAN membership:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Create a VLAN. Run: switch (config) # vlan 10 switch (config vlan 10) #

Change back to config mode. Run: switch (config vlan 10) # exit switch (config) #

Mellanox Technologies Confidential 538

Rev 4.20

Step 5.

Step 6.

Enter the interface context. Run: switch [standalone: master] (config) # interface ethernet 1/35 switch [standalone: master] (config interface ethernet 1/35) #

From within the interface context, configure the interface mode to Trunk. Run: switch [standalone: master] (config interface ethernet 1/35) # switchport mode trunk switch [standalone: master] (config interface ethernet 1/35) #

5.4.4

Configuring Hybrid Mode VLAN Membership

To configure Hybrid mode VLAN membership:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Create a VLAN. Run: switch (config) # vlan 10 switch (config vlan 10) #

Change back to config mode. Run: switch (config vlan 10) # exit switch (config) #

Step 5.

Step 6.

Step 7.

Step 8.

Enter the interface context. Run: switch (config) # interface ethernet 1/35 switch (config interface ethernet 1/35) #

From within the interface context, configure the interface mode to Hybrid. Run: switch (config interface ethernet 1/35) # switchport mode hybrid switch (config interface ethernet 1/35) #

From within the interface context, configure the allowed VLAN membership. Run: switch (config interface ethernet 1/35) # switchport hybrid allowed-vlan add 10 switch (config interface ethernet 1/35) #

Change to config mode again. Run: switch (config interface ethernet 1/35) # exit switch (config) #

Rev 4.20

Mellanox Technologies Confidential 539

5.4.5

Commands

vlan

vlan {<vlan-id> | <vlan-range>} no vlan {<vlan-id> | <vlan-range>}

Syntax Description

Default

Configuration Mode

History

Role

Example

Creates a VLAN or range of VLANs, and enters a VLAN context.

The no form of the command deletes the VLAN or VLAN range.

vlan-id 1-4094.

vlan-range Any range of VLANs.

VLAN 1 is enabled by default.

Config

3.1.1400

admin switch (config) # vlan 10 switch (config vlan 10) # show vlan

Related Commands

Note

VLAN Name Ports

---- ----------- --------------------------------------

1 default Eth1/2, Eth1/3, Eth1/4/1, Eth1/4/2 ...

10 switch (config vlan 10) # show vlan switchport mode switchport [trunk | hybrid] allowed-vlan

Interfaces are not added automatically to VLAN unless configured with trunk or hybrid mode with “all” option turned on.

Rev 4.20

Mellanox Technologies Confidential 540

Rev 4.20

name

name <vlan-name> no name

Adds VLAN name.

The no form of the command deletes the VLAN name.

40-character long string.

Syntax Description

Default vlan-name

No name available.

Configuration Mode Config VLAN

History

Role

Example

3.1.1400

admin switch (config) # vlan 10 switch (config vlan 10) # name my-vlan-name switch (config vlan 10) # show vlan

VLAN Name Ports

---- ----------- --------------------------------------

1 default Eth1/2, Eth1/3, Eth1/4/1, Eth1/4/2, Eth1/

5,

Eth1/6, Eth1/7, Eth1/8, Eth1/9, Eth1/10,

Eth1/11, Eth1/12, Eth1/13, Eth1/14, Eth1/

15,

Eth1/16, Eth1/17, Eth1/18, Eth1/19, Eth1/

20,

Eth1/21, Eth1/22, Eth1/23, Eth1/24, Eth1/

25,

Eth1/26, Eth1/27, Eth1/28, Eth1/29, Eth1/

30,

Eth1/31, Eth1/32, Eth1/33, Eth1/34, Eth1/

35,

Eth1/36, Po34, Po4096

10 my-vlan-name

Related Commands show vlan switchport mode switchport [trunk | hybrid] allowed-vlan

Note Name can not be added to a range of VLANs.

Mellanox Technologies Confidential 541

show vlan

show vlan [id <vlan-id>]

Syntax Description

Displays the VLAN table.

vlan-id 1-4094.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config vlan 10) # show vlan

VLAN Name Ports

---- ----------- --------------------------------------

1 default Eth1/2, Eth1/3, Eth1/4/1, Eth1/4/2 ...

10 my-vlan-name

Related Commands show vlan switchport mode switchport [trunk | hybrid] allowed-vlan vlan

Note

Rev 4.20

Mellanox Technologies Confidential 542

Rev 4.20

switchport mode

switchport mode {access | dot1q-tunnel | trunk | hybrid | access-dcb}

no switchport mode

Syntax Description

Sets the switch port mode.

The no form of the command sets the switch port mode to access.

access Untagged port. 802.1q tagged traffic are filtered. Egress traffic is untagged.

dot1q-tunnel Allows both tagged and untagged ingress Ethernet packets. Egress packets are tagged with a second

VLAN (802.1Q) header.

trunk hybrid

802.1q tagged port, untagged traffic is filtered.

Both 802.1q tagged and untagged traffic is allowed on the port.

Untagged port, egress traffic is priority tagged.

Default

Role

Example access-dcb access

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.1400

3.3.4500

3.4.3000

admin

Added MLAG port-channel configuration mode

Added dot1q-tunnel parameter switch (config) # interface ethernet 1/7 switch (config interface ethernet 1/7) # switchport mode access switch (config interface ethernet 1/7) # show interfaces switchport

Interface | Mode | Access vlan | Allowed vlans

-----------|------------|-------------|---------------------------

Eth1/2 access 1

Eth1/3 access 1

Eth1/4/1 access 1

Eth1/4/2 access 1

Eth1/5 access 1

Eth1/6 access 1

....

Po34 access 1

Po4096 access 1 switch (config interface ethernet 1/7) #

Mellanox Technologies Confidential 543

Related Commands show vlan show interfaces switchport switchport access vlan switchport [trunk | hybrid] allowed-vlan switchport dot1q-tunnel qos-mode vlan

Note

Rev 4.20

Mellanox Technologies Confidential 544

Rev 4.20

switchport dot1q-tunnel qos-mode

switchport dot1q-tunnel qos-mode {pipe | uniform} no switchport dot1q-tunnel qos-mode

Syntax Description

Default pipe

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

Role

Example

Assigns QoS to the service provider’s traffic.

The no form of the command resets the parameter value to its default.

pipe uniform

Gives the service provider’s traffic QoS 0

Gives the service provider’s traffic the same QoS as the customer’s traffic

3.4.3000

admin switch (config interface ethernet 1/1) # switchport dot1q-tunnel qosmode uniform switch (config interface ethernet 1/1) #

Related Commands show vlan show interfaces switchport switchport access vlan switchport [trunk | hybrid] allowed-vlan vlan

Note

Mellanox Technologies Confidential 545

Rev 4.20

switchport access

switchport access vlan <vlan-id> no switchport access vlan

Syntax Description

Default

Sets the port access VLAN.

The no form of the command sets the port access VLAN to 1.

vlan-id

1

1-4094.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.1400

3.2.0500

First version

Format change (removed hybrid and access-dcb options). Previous command format was: “switchport

{hybrid | access-dcb | access} vlan <vlan-id>”

Role

Example

3.3.4500

admin

Added MLAG port-channel configuration mode switch (config) # interface ethernet 1/7 switch (config interface ethernet 1/7) # switchport access vlan 10 switch (config interface ethernet 1/7) # show interfaces switchport

Interface | Mode | Access vlan | Allowed vlans

-----------|------------|-------------|---------------------------

Eth1/2 access 1

Eth1/3 access 1

Eth1/4/1 access 1

Eth1/4/2 access 1

Eth1/5 access 1

Eth1/6 access 1

Eth1/7 access 10

....

Po4096 access 1 switch (config interface ethernet 1/7) #

Related Commands show vlan show interfaces switchport switchport mode switchport [trunk | hybrid] allowed-vlan vlan

Note This command is not applicable for interfaces with port mode trunk.

only one option (“access”, “access-dcb” or “hybrid”) is applicable to configure on the port, depends on the switchport mode of the port.

Mellanox Technologies Confidential 546

Rev 4.20

switchport {hybrid, trunk} allowed-vlan

switchport {hybrid, trunk} allowed-vlan {<vlan> | add <vlan> | remove <vlan> all | except <vlan> | none}

Syntax Description

Sets the port allowed VLANs.

vlan add

VLAN ID (1-4094) or VLAN range.

Adds VLAN or range of VLANs.

remove all

Default N/A

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

Role

Example except none

3.1.1400

admin

Removes VLANs or range of VLANs.

Adds all VLANs in available in the VLAN table.

New VLANs added to the VLAN table are added automatically.

Adds all VLANs expect this VLAN or VLAN range.

Removes all VLANs.

switch (config) # interface ethernet 1/7 switch (config interface ethernet 1/7) # switchport hybrid allowed-vlan all switch (config interface ethernet 1/7) #show interfaces switchport

Interface | Mode | Access vlan | Allowed vlans

-----------|------------|-------------|---------------------------

Eth1/2 access 1

Eth1/3 access 1

Eth1/4/1 access 1

Eth1/4/2 access 1

Eth1/5 access 1

Eth1/6 access 1

Eth1/7 hybrid 1 1, 10

....

Po34 access 1

Po4096 access 1 switch (config interface ethernet 1/7) #

Related Commands show vlan show interfaces switchport switchport access vlan switchport mode vlan

Note This command is not applicable for interfaces with port mode access or access-dcb.

Mellanox Technologies Confidential 547

show interface switchport

show interface switchport

Displays all interface switch port configurations.

Syntax Description

Default

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) #show interfaces switchport

Interface | Mode | Access vlan | Allowed vlans

-----------|------------|-------------|---------------------------

Eth1/2 access 1

Eth1/3 access 1

Eth1/4/1 access 1

Eth1/4/2 access 1

Eth1/5 access 1

Eth1/6 access 1

Eth1/7 hybrid 1 1, 10

....

Po34 access 1

Po4096 access 1 switch (config)#

Related Commands show vlan switchport access vlan switchport mode vlan

Note

Rev 4.20

Mellanox Technologies Confidential 548

5.5

QinQ

A QinQ VLAN tunnel enables a service provider (SP) to segregate the traffic of different customers in their infrastructure, while still giving the customer a full range of VLANs for their internal use by adding a second 802.1Q VLAN tag to an already tagged frame.

So let us assume for example that an SP exists which needs to offer L2 connectivity to two corporations, “X” and “Y”, that have campuses located in both “A”, “B”. All campuses run Ethernet

LANs, and the customers intend to connect through the SP’s L2 VPN network so that their campuses are in the same LAN (L2 network). Hence, it would be desirable for “X”, “Y” to have a single LAN each in both “A”, “B” which could easily exceed the VLAN limit of 4096 of the

802.1Q specification.

5.5.1

QinQ Operation Modes

QinQ can be enabled on a port or according to predefined conditions.

Rev 4.20

C-VLAN is the VLAN tag assigned to the ingress traffic of a QinQ-enabled interface.

S-VLAN is the VLAN tag assigned to the egress traffic of a QinQ-enabled interface.

• ACL-mode: Adding and removing S-VLAN is determined by an ACL-dependent action

• Port-mode: All ingress traffic to a specific QinQ-enabled interface is tagged with an additional VLAN 802.1Q tag (also known as S-VLAN). The S-VLAN ID is equal to that interface’s PVID (access VLAN).

The S-VLAN tag is added regardless of whether the traffic is tagged or untagged. Traffic coming out from this port, has the S-VLAN stripped from it.

5.5.2

Configuring QinQ

To configure QinQ:

Step 1.

Create the C-VLAN. Run: switch (config) # vlan 200 switch (config vlan 200) # exit

Step 2.

Step 3.

Step 4.

Enter the configuration mode of an Ethernet, LAG, or MLAG interface. Run: switch (config) # interface port-channel 100

Change the switchport mode of the interface to enable QinQ. Run: switch (config interface port-channel 100) # switchport mode dot1q-tunnel

Change its port VLAN ID (PVID). This configures the S-VLAN. Run: switch (config interface port-channel 100) # switchport access vlan 200

Mellanox Technologies Confidential 549

Step 5.

Verify the configuration. Run: switch (config interface port-channel 100) # show interface port-channel 100

Po100

Admin state: Enabled

Operational state: Up

Description: N\A

Mac address: 00:00:00:00:00:00

MTU: 1500 bytes(Maximum packet size 1522 bytes)

lacp-individual mode: Disabled

Flow-control: receive off send off

Actual speed: 1 X 40 Gbps

Width reduction mode: Not supported

Switchport mode: dot1q-tunnel

QoS mode: uniform

MAC learning mode: Enabled

Last clearing of "show interface" counters : Never

60 seconds ingress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

60 seconds egress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

Rx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 error packets

0 discard packets

Tx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 discard packets switch (config interface port-channel 100) #

Rev 4.20

Mellanox Technologies Confidential 550

Step 6.

Verify the configuration. Run: switch (config interface port-channel 100) # show interfaces switchport

Interface Mode Access vlan Allowed vlans

-------------------------------------------------------------------------

Eth1/1 access 1

Eth1/2 access 1

Eth1/3 access 1

Eth1/4 access 1

Eth1/5 access 1

Eth1/6 access 1

...

Eth1/27 access 1

Eth1/33 access 1

Eth1/34 access 1

Eth1/35 access 1

Eth1/36 access 1

Po400 dot1q-tunnel 200 switch (config interface port-channel 100) #

Rev 4.20

Mellanox Technologies Confidential 551

Rev 4.20

5.5.3

Commands

switchport dot1q-tunnel qos-mode

switchport dot1q-tunnel qos-mode {pipe | uniform} no switchport dot1q-tunnel qos-mode

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Assigns QoS to the service provider’s traffic.

The no form of the command resets the parameter value to its default.

pipe Gives the service provider’s traffic the same QoS as the customer’s traffic uniform pipe

Gives the service provider’s traffic QoS 0

Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

3.4.3000

admin switch (config interface ethernet 1/1) # switchport dot1q-tunnel qosmode uniform switch (config interface ethernet 1/1) # show vlan show interfaces switchport switchport access vlan switchport [trunk | hybrid] allowed-vlan vlan

Note

Mellanox Technologies Confidential 552

Rev 4.20

5.6

MAC Address Table

5.6.1

Configuring Unicast Static MAC Address

You can configure static MAC addresses for unicast traffic. This feature improves security and reduces unknown unicast flooding.

To configure Unicast Static MAC address:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Run the command mac-address-table static unicast <destination mac address> vlan <vlan identifier(1-4094)> interface ethernet <slot>/ <port>

.

switch (config) # mac-address-table static unicast 00:11:22:33:44:55 vlan 1 interface ethernet 0/1

5.6.2

MAC Learning Considerations

MAC learning may be disabled using the command mac-learning disable which is beneficial in the following situations:

• To prevent denial-of-service attacks

• To manage the available MAC address table space by controlling which interfaces can learn

MAC addresses

• To duplicate to a dedicated server (port7) all the packets that one host (host1; port1) sends to another (host2; port2), like in port mirroring. To accomplish this, MAC learning is disabled on port2. In this case the FDB does not obtain the MAC address of host2. Also, to prevent broadcast to every port, it is possible to configure a VLAN (VLAN 80) which ports 1, 2 and 7 are member of.

Figure 17: MAC Learning Disable Example Case

Server host2

SA=2

2

VLAN 80

7 VLAN 80

SX

1

VLAN 80 host1

SA=1; DA=2

Mellanox Technologies Confidential 553

5.6.3

Commands

mac-address-table aging-time

mac-address-table aging-time <age> no mac-address-table aging-time

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets the maximum age of a dynamically learnt entry in the MAC address table.

The no form of the command resets the aging time of the MAC address table to its default.

age 10-1000000 seconds.

300

Config

3.1.0600

admin switch (config) # mac-address-table aging-time 50 switch (config) # show mac-address-table aging-time

Mac Address Aging Time: 50

Related Commands switch (config) # show mac-address-table show mac-address-table aging time

Note

Rev 4.20

Mellanox Technologies Confidential 554

Rev 4.20

mac-address-table static

mac-address-table static <mac address> vlan <vlan> interface <if-type> <ifnumber> no mac-address-table static <mac address> vlan <vlan> interface <if-type> <ifnumber>

Configures a static MAC address in the forwarding database.

The no form of the command deletes a configured static MAC address from the forwarding database.

Syntax Description mac address vlan

Default

Configuration Mode Config

Destination MAC address.

if-type if-number

VLAN ID or VLAN range.

Ethernet or port-channel interface type.

The interface number (i.e. 1/1, 3).

No static MAC addresses available in default.

History

Role

Example

3.1.0600

admin switch (config) # mac-address-table static aa:aa:aa:aa:aa:aa vlan 1 interface ethernet 1/7 switch (config) # show mac-address-table

Switch ethernet-default

Vlan Mac Address Type Interface

---- ----------- ---- ------------

1 aa:aa:aa:aa:aa:aa static Eth1/7

Number of unicast: 1

Number of multicast: 0 switch (config) #

Related Commands show mac-address-table mac-address-table aging time

Note The no form of the command will not clear a dynamic MAC address. Dynamic MAC addresses are cleared using the “clear mac-address-table dynamic” command.

Mellanox Technologies Confidential 555

Rev 4.20

mac-learning disable

mac-learning disable no mac-learning disable

Syntax Description N/A

Enabled Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

History

Role

Example

Related Commands

Note

Disables MAC-address learning.

The no form of the command enables MAC-address learning.

3.1.0600

admin switch (config interface ethernet 1/1) # mac-learning disable

• When adding a port to a LAG, the port needs to be aligned with the LAG’s configuration

• When removing a port from a LAG, the port remains in whichever configuration the LAG is in

• Disabling MAC learning is not supported on a local analyzer port.

• Disabling MAC learning is not supported on an IPL LAG.

Mellanox Technologies Confidential 556

clear mac-address-table dynamic

clear mac-address-table dynamic

Syntax Description

Default

Clear the dynamic entries in the MAC address table.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0600

admin switch (config) # clear mac-address-table dynamic switch (config) #

Related Commands mac-address-table aging-time mac-address-table static show mac-address-table

Note This command does not clear the MAC addresses learned on the mgmt0 port. Static entries are deleted using the “no mac-address-table static” command.

Rev 4.20

Mellanox Technologies Confidential 557

Rev 4.20

show mac-address-table

show mac-address-table [address <mac-address> | interface ethernet <if-number> | vlan [<vlan> | range <range>] | unicast | multicast]

Syntax Description

Displays the static and dynamic unicast and multicast MAC addresses for the switch.

Various of filter options available.

mac-address if-number

Filter the table to a specific MAC address.

Filter the table to a specific interface.

vlan range unicast multicast

Filter the table to a specific VLAN number (1-4094).

Filter the table to a range of VLANs.

Filter the table to a unicast addresses only.

Filter the table to a multicast addresses only.

Default N/A

Configuration Mode Any Command Mode

History 3.1.0600

3.3.4500

Role

Example

Updated Example admin switch (config) # show mac-address-table

Switch ethernet-default

Vlan Mac Address Type Interface

---- ----------- ---- ------------

1 00:00:00:00:00:01 Static Po5

1 00:00:3D:5C:FE:16 Dynamic Eth1/1

1 00:00:3D:5D:FE:1B Dynamic Eth1/2

Number of unicast: 2

Number of multicast: 0 switch (config) #

Related Commands mac-address-table static clear mac-address-table

Note

Mellanox Technologies Confidential 558

show mac-address-table aging-time

show mac-address-table aging-time

Syntax Description

Default

Displays the MAC address table aging time.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0600

admin switch (config) # mac-address-table aging-time 300 switch (config) # show mac-address-table aging-time

Mac Address Aging Time: 300 switch (config) #

Related Commands mac-address-table aging-time mac-address-table static clear mac-address-table

Note MAC addresses learned on the mgmt0 is not shown by this command.

Rev 4.20

Mellanox Technologies Confidential 559

5.7

Spanning Tree

The operation of Rapid Spanning Tree Protocol (RSTP) provides for rapid recovery of connectivity following the failure of a bridge/bridge port or a LAN. The RSTP component avoids this delay by calculating an alternate root port, and immediately switching over to the alternate port if the root port becomes unavailable. Thus, using RSTP, the switch immediately brings the alternate port to forwarding state, without the delays caused by the listening and learning states. The RSTP component conforms to IEEE standard 802.1D 2004.

RSTP enhancements is a set of functions added to increase the volume of RSTP in Mellanox switches. It adds a set of capabilities related to the behavior of ports in different segments of the network. For example: the required behavior of a port connected to a non-switch entity, such as host, is to converge quickly, while the required behavior of a port connected to a switch entity is to converge based on the RSTP parameters.

Additionally, it adds security issues on a port and switch basis, allowing the operator to determine the state and role of a port or the entire switch should an abnormal event occur. For example: If a port is configured to be root-guard, the operator will not allow it to become a root-port under any circumstances, regardless of any BPDU that will have been received on the port.

5.7.1

Port Priority and Cost

When two ports on a switch are part of a loop, the STP port priority and port path cost configuration determine which port on the switch is put in the forwarding state and which port is put in the blocking state.

To configure port priority use the following command: switch (config interface etherent <inf>)# spanning-tree port-priority <0-240>

To configure port path cost use the following command: switch (config interface etherent <inf>)# spanning-tree cost <1-200000000>

5.7.2

Port Type

Port type has the following configuration options:

edge – is not assumed to be converged by the RSTP learning/forwarding mechanism. It converges to forwarding quickly.

Rev 4.20

It is recommended to configure the port type for all ports connected to hosts as edge ports.

normal – is assumed to be connected to a switch, thus it tries to be converged by the RSTP learning/forwarding. However, if it does not receive any BPDUs, it is operationally moved to be edge.

network – is assumed to be connected to a switch. If it does not receive any BPDUs, it is moved to discarding state.

Each of these configuration options is mutually exclusive.

Port type is configured using the command spanning-tree port type. It may be applied globally on the switch (Config) level, which configures all switch interfaces. Another option is to configure ports individually by entering the interface’s configuration mode.

Mellanox Technologies Confidential 560

• Global configuration: switch (config)# spanning-tree port type {edge , normal , network} default

• Interface configuration: switch (config interface etherent <inf>)# spanning-tree port type {edge , normal, network}

5.7.3

BPDU Filter

Using BPDU filter prevents the CPU from sending/receiving BPDUs on specific ports.

BPDU filtering is configured per interface. When configured, the port does not send any BPDUs and drops all BPDUs that it receives. To configure BPDU filter, use the following command: switch (config interface etherent <inf>)# spanning-tree bpdufilter {enable , disable}

Rev 4.20

Configuring BPDU filtering on a port connected to a switch can cause bridging loops because the port filters any BPDU it receives and goes to forwarding state.

5.7.4

BPDU Guard

BPDU guard is a security feature which, when enabled, shuts down the port in case it receives

BPDU packets. This feature becomes useful when connecting to an unauthorized switch.

To configure BPDU guard use the following command: switch (config interface etherent <inf>)# spanning-tree port type <type> bpduguard

5.7.5

Loop Guard

Loop guard is a feature that prevents loops in the network.

When a blocking port in a redundant topology transitions to the forwarding state (accidentally), an STP loop occurs. This happens when BPDUs are no longer received by one of the ports in a physically redundant topology.

Loop guard is useful in switched networks where devices are connected point-to-point. A designated bridge cannot disappear unless it sends an inferior BPDU or brings the link down on a point-to-point connection.

The loop guard configuration is only allowed on “network” port type.

If loop guard is enabled and the port does not receive BPDUs, the port is put into an inconsistent state (blocking) until the port starts to receive BPDUs again. A port in the inconsistent state does not transmit BPDUs. If BPDUs are received again, loop guard alters its inconsistent state condition. STP converges to a stable topology without the failed link or bridge after loop guard isolates the failure.

Disabling loop guard moves all loop-inconsistent ports to listening state.

Mellanox Technologies Confidential 561

To configure loop guard use the following command: switch (config interface etherent <inf>)# spanning-tree guard loop

5.7.6

Root Guard

Configuring root guard on a port prevents that port from becoming a root port. A port put in rootinconsistent (blocked) state if an STP convergence is triggered by a BPDU that makes that port a root port. The port is unblocked after the port stops sending BPDUs.

To configure loop guard use the following command: switch (config interface etherent <inf>)# spanning-tree guard root

5.7.7

MSTP

Spanning Tree Protocol (STP) is a mandatory protocol to run on L2 Ethernet networks to eliminate network loops and the resulting broadcast storm caused by these loops. Multiple STP

(MSTP) enables the virtualization of the L2 domain into several VLANs, each governed by a separate instance of a spanning tree which results in a network with higher utilization of physical links while still keeping the loop free topology on a logical level.

Up to 64 MSTP instances can be defined in the switch. Up to 64 VLANs can be mapped to a single MSTP instance. MSTP instance 0 (the default instance) may have all possible VLANs (1-

4094) mapped to it.

For MSTP network design over Mellanox L2 VMS, please refer to Mellanox Virtual Modular

Switch Reference Guide .

5.7.8

RPVST

Rapid Per-VLAN Spanning Tree (RPVST) flavor of the STP provides finer-grained traffic by paving a spanning-tree instance per each configured VLAN. Like MSTP, it allows a better utilization of the network links comparing to RSTP.

Figure 18 exhibits a typical RPVST network configuration to get a better utilization on the inter-

switch trunk ports.

Figure 18: RPVST Network Config

Rev 4.20

Root VLAN 10

Root VLAN 20

VLAN 20,30

Root VLAN 30

Mellanox Technologies Confidential 562

5.7.8.1 RPVST and VLAN Limitations

When the STP of the switch is set to RPVST, spanning tree is set on each of the configured

VLANs in the system by default. To enable the spanning tree mode, the command “spanningtree” must be run.

Each VLAN runs an STP state machine and an RPVST instance. There is a global limitation on the number of active state machines that can operate in MLNX-OS. Enforcement of this limitation is done through the maximum number of VLANs allowed in the system. On x86 switch systems the limitation is 128 VLANs and on PPC systems it ranges from 13-18 VLANs depending on the switch system. The more ports the switch system has the less VLANs it can support.

Table 46 - Supported VLANs by RPVST per Switch System

Switch System Model x86 systems

SX1012

SX1016

SX1024

SX1035

SX1036

128

17

13

13

13

13

Number of Supported VLANs

The state machine takes attributes like forward time, hello time, max age and priority, etc.

When configuring priority on a VLAN in RPVST, the operational priority given to the

VLAN is a summation of what the user configured and the value of the VLAN itself.

For example running “spanning-tree vlan 10 priority 32768” yields a priority of 32778 for VLAN 10.

5.7.8.2 RPVST and RSTP Interoperability

Figure 19: RPVST and RSTP Cluster

Rev 4.20

RSTP Domain

RPVST

Domain

RPVST

Domain

RPVST

Domain

Mellanox Technologies Confidential 563

RPVST domains can be interconnected by a standard 802.1Q domain that runs RSTP protocol.

While the RSTP domain builds a single common instance spanning tree, the RPVST domains at the edge continue to build a tree per VLAN while exchanging tagged RPVST multicast BPDUs.

(This exchange may happen on untagged RPVST BPDUs as well.) The switch devices that are in the boundary between the RPVST and the RSTP domains should be configured as RPVST mode.

When set to RPVST mode, the switch continues to run the common instance spanning tree

(CIST) state machine on VLAN 1 by exchanging IEEE BPDUs with the legacy RSTP switches.

To successfully connect RSTP and RPVST domains, the system administrator must align the native VLAN configuration across all network switches, or in other words, the internal identification of untagged packets to VLAN.

Rev 4.20

Mellanox Technologies Confidential 564

5.7.9

Commands

spanning-tree

spanning-tree no spanning-tree

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Globally enables the spanning tree feature.

The no form disables the spanning tree feature.

N/A

Spanning tree is enabled.

Config

3.1.0000

admin switch (config) # no spanning-tree switch (config) # show spanning-tree

Rev 4.20

Mellanox Technologies Confidential 565

spanning-tree mode

spanning-tree mode {rst | mst | rpvst} no spanning-tree mode

Syntax Description

Changes the spanning tree mode.

The no form of the command sets the parameter to its default value.

mst rst

Multiple spanning tree.

Rapid spanning tree.

Rapid per-VLAN spanning tree.

Default rpvst rst

Configuration Mode Config

History

Role

3.3.4150

admin

Example

Related Commands

Note switch (config)# spanning-tree mode mst

• On x86 switch systems, the number of VLANs supported by RPVST are 128

• On PPC switch systems, the number of VLANs supported by RPVST are between 13-18

Rev 4.20

Mellanox Technologies Confidential 566

Rev 4.20

spanning-tree (timers)

spanning-tree [forward-time <time in secs> | hello-time <time in secs> | max-age

<time in secs>] no spanning-tree [forward-time | hello-time | max-age | priority]

Syntax Description

Sets the spanning tree timers.

The no form of the command sets the timer to default.

forward-time Controls how fast a port changes its spanning tree state from Blocking state to Forwarding state.

Parameter range: 4-30 seconds.

hello-time max-age

Determines how often the switch broadcasts its hello message to other switches when it is the root of the spanning tree.

Parameter range: 1-2 seconds.

Sets the maximum age allowed for the Spanning Tree

Protocol information learnt from the network on any port before it is discarded.

Parameter range: 6-40 seconds.

Default forward-time: 15 seconds hello-time:2 seconds max-age: 20 seconds

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config) # spanning-tree forward-time switch (config) #

Related Commands show spanning-tree

Note The following formula applies on the spanning tree timers:

2*(ForwardTime -1)>=MaxAgeTime >= 2*(Hello Time + 1)

Mellanox Technologies Confidential 567

Rev 4.20

spanning-tree port type (default global)

spanning-tree port type {edge [bpdufilter | bpduguard] | network [bpduguard] | normal [bpduguard]} default no spanning-tree port type default

Syntax Description

Configures all switch interfaces as edge/network/normal ports. These ports can be connected to any type of device.

The no form of the command disables the spanning tree operation.

edge bpdufilter

Assumes all ports are connected to hosts/servers.

Configures to enable the spanning tree BPDU filter.

bpduguard network normal

Configures to enable the spanning tree BPDU guard.

Assumes all ports are connected to switches and bridges.

The port type (edge or network) determines according to the spanning tree operational mode.

Default Normal

Configuration Mode Config

History 3.1.0000

3.4.0008

Role

Example

Updated command syntax admin switch (config) # spanning-tree port type edge default switch (config) #

Related Commands show spanning-tree

Note

Mellanox Technologies Confidential 568

spanning-tree priority

spanning-tree priority <bridge-priority> no spanning-tree priority

Syntax Description

Sets the spanning tree bridge priority.

The no form of the command sets the bridge priority to default.

bridge-priority Sets the bridge priority for the spanning tree. Its value must be in steps of 4096, starting from 0. Only the following values are applicable: 0, 4096, 8192, 12288,

16384, 20480, 24576, 28672, 32768, 36864, 40960,

45056, 49152, 53248, 57344, 61440.

Default 32786

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # spanning-tree priority 4096 switch (config) #

Related Commands show spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 569

Rev 4.20

spanning-tree port-priority

spanning-tree port-priority <priority> no spanning-tree port-priority

Syntax Description

Role

Example

Configures the spanning-tree interface priority.

The no form of the command returns configuration to its default.

priority Spanning tree interface priority. The possible values are: 0, 16, 32,48, 64, 80, 96, 112, 128,144, 160, 176,

192, 208, 224, 240.

Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

128

3.1.0000

3.3.4500

Added MLAG port-channel configuration mode admin switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # spanning-tree port-priority 16 switch (config interface ethernet 1/1) #

Related Commands show spanning-tree

Note

Mellanox Technologies Confidential 570

Rev 4.20

spanning-tree cost

spanning-tree cost <port cost> no spanning-tree cost

Syntax Description

Role

Example

Configures the interface cost of the spanning tree.

The no form of the command returns configuration to its default.

port cost Sets the spanning tree cost of an interface.

Value range is 0-200000000.

Default

History

The default cost is derived from the speed.

1Gbps 20000

10Gbps 2000

40Gbps 500

56Gbps 357

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

3.1.0000

3.3.4500

Added MLAG port-channel configuration mode admin switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # spanning-tree cost 1000 switch (config interface ethernet 1/1) #

Related Commands show spanning-tree

Note • LAG default cost is calculated by dividing the port speed by the number of active links in

UP state. For example: if there were 4 links in the LAG out of which only two are in UP state, assuming the port speed is 10Gbps, the LAG cost will be 2000/2 = 1000.

• When configuring the cost for a LAG, the cost will be fixed to this configuration, no matter what the number of active links (UIP state) in the LAG is

• Unstable network may cause the LAG cost to change dynamically assuming the cost parameter is not configured for anything else other than default

Mellanox Technologies Confidential 571

spanning-tree port type

spanning-tree port type <port type> no spanning-tree port type

Syntax Description

Configures spanning-tree port type

The no form of the command returns configuration to default.

default edge normal

According to global configuration

Assumes all ports are connected to hosts/servers.

network

The port type (edge or network) determines according to the spanning tree operational mode.

Assumes all ports are connected to switches and bridges.

Role

Example bpdufilter bpduguard

Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

Globally defined by the command “spanning-tree port type <port-type> default”

3.1.0000

3.3.4500

Added MLAG port-channel configuration mode admin

Configures to enable the spanning tree BPDU filter.

Configures to enable the spanning tree BPDU guard.

switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # spanning-tree port type edge switch (config interface ethernet 1/1) #

Related Commands show spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 572

Rev 4.20

spanning-tree guard

spanning-tree guard {loop | root} no spanning-tree guard {loop | root}

Syntax Description

Configures spanning-tree guard.

The no form of the command returns configuration to default.

loop Enables loop-guard on the interface.

If the loop-guard is enabled, upon a situation where the interface fails to receive BPDUs the switch will not egress data traffic on this interface.

root Enables root-guard on the interface.

If root-guard is enabled on the interface, the interface will never be selected as root port.

loop-guard and loop-guard are disabled.

Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.0000

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # spanning-tree guard root switch (config interface ethernet 1/1) #

Related Commands show spanning-tree

Note

Mellanox Technologies Confidential 573

Rev 4.20

spanning-tree bpdufilter

spanning-tree bpdufilter {disable | enable} no spanning-tree bpdufilter

Syntax Description

Configures spanning-tree BPDU filter on the interface. The interface will ignore any

BPDU that it receives and will not send PDBUs, The STP state on the port will move to the forwarding state.

The no form of the command returns the configuration to default.

disable enable

Disables the BPDU filter on this port.

Enables the BPDU filter on this port.

Default BPDU filter is disabled.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

Role

Example

3.1.0000

admin switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # spanning-tree bpdufilter enable

Related Commands show spanning-tree

Note This command can be used when the switch is connected to hosts.

Mellanox Technologies Confidential 574

clear spanning-tree counters

clear spanning-tree counters

Syntax Description

Default

Clears the spanning-tree counters.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config) # clear panning-tree counters switch (config) #

Related Commands show spanning tree

Note

Rev 4.20

Mellanox Technologies Confidential 575

Rev 4.20

spanning-tree mst max-hops

spanning-tree mst max-hops <max-hops> no spanning-tree mst max-hops

Syntax Description

Default

Specifies the max hop value inserts into BPDUs that sent out as the root bridge.

The no form of the command sets the parameter to its default value.

max-hops

20

Configuration Mode Config

History 3.3.4150

Max hop value. The range is 6-40.

Role

Example admin switch (config)# spanning-tree mst max-hops 20 switch (config)#

Related Commands

Note • The max hop setting determines the number of bridges in an MST region that a BPDU can traverse before it is discarded

• This command is available when global STP mode is set to MST

Mellanox Technologies Confidential 576

spanning-tree mst priority

spanning-tree mst <mst-instance> priority <priority> no spanning-tree mst <mst-instance> priority

Syntax Description

Configures the specified instance’s priority number.

The no form of the command sets the parameter to its default value.

mst-instance priority

MST instance. Range is 1-64.

MST instance port priority. Possible values are: 0,

4096, 8192, 12288, 16384, 20480, 24576, 28672,

32768, 36864, 40960, 45056, 49152,

53248, 57344, 61440

Default 32768

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config)# spanning-tree mst 1 priority 32768 switch (config)#

Related Commands

Note • The bridge priority is the four most significant digits of the bridge ID, which is used by spanning tree algorithms to select the root bridge and choose among redundant links.

Bridge ID numbers range from 0-65535 (16 bits); bridges with smaller bridge IDs are elected over other bridges.

• This command is available when global STP mode is set to MST

Rev 4.20

Mellanox Technologies Confidential 577

spanning-tree mst vlan

spanning-tree mst <mst-instance> vlan <vlan-range> no spanning-tree mst <mst-instance> vlan <vlan-range>

Syntax Description

Maps a VLAN or a range of VLANs into an MSTP instance.

The no form of the command unmaps a VLAN or a range of VLANs from MSTP instances.

mst-instance vlan <vlan-range>

MST instance. Range is 1-64.

A single VLAN or a a range of VLANs. The format is

<vlan> or <from-vlan>-<to-vlan>.

Default N/A

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config)# spanning-tree mst 1 vlan 10-20 switch (config)#

Related Commands

Note This command is available when global STP mode is set to MST

Rev 4.20

Mellanox Technologies Confidential 578

spanning-tree mst revision

spanning-tree mst revision <number> no spanning-tree mst revision

Syntax Description

Default

Configures the MSTP revision number.

The no form of the command sets the parameter to its default value.

number

0

Configuration Mode Config

History 3.3.4150

The MST revision number. Range is 0-65535.

Role

Example admin switch (config)# spanning-tree mst revision 1 switch (config)#

Related Commands

Note • The revision number is one of three parameters, along with the MST name and VLAN-toinstance map, that identify the switch’s MST region

• This command is available when global STP mode is set to MST

Rev 4.20

Mellanox Technologies Confidential 579

spanning-tree mst name

spanning-tree mst name <name> no spanning-tree mst name

Syntax Description

Default

Configures the MSTP name.

The no form of the command sets the parameter to its default value.

name

N/A

Configuration Mode Config

History 3.3.4150

MST name: Up to 32 characters.

Role

Example admin switch (config)# spanning-tree mst name my-mst switch (config)#

Related Commands

Note • The name is one of three parameters, along with the MST revision number and VLAN-toinstance map, that identifies the switch’s MST region

• This command is available when global STP mode is set to MST

Rev 4.20

Mellanox Technologies Confidential 580

Rev 4.20

spanning-tree mst root

spanning-tree mst <mst-instance> root <role> no spanning-tree mst <mst-instance> root

Syntax Description

Changes the bridge priority for the specified MST instance to the following values:

• Primary – 8192

• Secondary – 16384

The no form of the command sets the parameter to its default value.

mst-instance role

MSTP instance. Possible range is 1-64.

Values: “primary” or “secondary”.

Default primary

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config)# spanning-tree mst name my-mst switch (config)#

Related Commands

Note • The root command is a way to automate a system configuration while ‘playing’ with the priority field. The priority field granularity may be too explicit for some users in case you wish to have 2 levels of priority (primary and secondary). So by default all the switches get the same priority and while using the root option you can get the role of master and backup by setting the priority field to a predefined value.

• This command is available when global STP mode is set to MST.

Mellanox Technologies Confidential 581

Rev 4.20

spanning-tree mst port-priority

spanning-tree mst {mst-instance} port-priority <priority> no spanning-tree mode

Syntax Description

Changes the spanning tree mode.

The no form of the command sets the parameter to its default value.

mst-instance priority

MST instance. Range is 0-4094.

MST instance port priority. Valid values are: 0, 16, 32,

48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224 and 240.

Default

History

Role rst

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

3.3.4150

Example admin switch (config interface ethernet 1/1)# spanning-tree mst 1 port-

 priority 32768 switch (config interface port-channel 1)# spanning-tree mst 1 port-

 priority 32768

Related Commands

Note This command is available when global STP mode is set to MST.

Mellanox Technologies Confidential 582

Rev 4.20

spanning-tree mst cost

spanning-tree mst {mst-instance} cost <cost-value> no spanning-tree mode

Syntax Description

Configures the cost per MSTP instance.

The no form of the command sets the parameter to its default value.

mst-instance cost-value

MST instance. Range is 1-64.

MST instance port cost. Range is 0-200000000.

Default 2000 for 10Gb/s, 500 for 40Gb/s, 20000 for 1Gb/s, 357 for 56Gb/s

Configuration Mode Config Interface Port Channel

History

Role

Example

3.3.4150

admin switch (config interface ethernet 1/1)# spanning-tree mst 1 cost 4000 switch (config interface port-channel 1)# spanning-tree mst 1 cost 4000 switch (config)#

Related Commands

Note This command is available when global STP mode is set to MST.

Mellanox Technologies Confidential 583

spanning-tree vlan forward-time

spanning-tree vlan <vid> forward-time <secs> no spanning-tree vlan <vid> forward-time

Syntax Description

Default

Configures how fast an interface changes its spanning tree state from Blocking to

Forwarding.

The no form of the command resets the parameter value to its default.

secs

15 seconds

Configuration Mode Config

History 3.4.1100

Parameter range: 4-30 seconds.

Role

Example admin switch (config) # spanning-tree vlan 10 forward-time 15

Related Commands show spanning-tree

Note • The following formula applies on the spanning tree timers:

2*(ForwardTime -1)>=MaxAgeTime >= 2*(Hello Time + 1)

• This command is available when global STP mode is set to RPVST

Rev 4.20

Mellanox Technologies Confidential 584

Rev 4.20

spanning-tree vlan hello-time

spanning-tree vlan <vid> hello-time <secs> no spanning-tree vlan <vid> hello-time

Syntax Description

Default

Configures how often the switch broadcasts its hello message to other switches when it is the root of the spanning tree.

The no form of the command resets the parameter value to its default.

secs

2 seconds

Configuration Mode Config

History 3.4.1100

Parameter range: 1-2 seconds.

Role

Example admin switch (config) # spanning-tree vlan 10 hello-time 2

Related Commands show spanning-tree

Note • The following formula applies on the spanning tree timers:

2*(ForwardTime -1)>=MaxAgeTime >= 2*(Hello Time + 1)

• This command is available when global STP mode is set to RPVST

Mellanox Technologies Confidential 585

spanning-tree vlan max-age

spanning-tree vlan <vid> max-age <secs> no spanning-tree vlan <vid> max-age

Syntax Description

Default

Sets the maximum age allowed for the Spanning Tree Protocol information learned from the network on any port before it is discarded.

The no form of the command resets the parameter value to its default.

secs

20 seconds

Configuration Mode Config

History 3.4.1100

Parameter range: 6-40 seconds.

Role

Example admin switch (config) # spanning-tree vlan 10 max-age 20

Related Commands show spanning-tree

Note • The following formula applies on the spanning tree timers:

2*(ForwardTime -1)>=MaxAgeTime >= 2*(Hello Time + 1)

• This command is available when global STP mode is set to RPVST

Rev 4.20

Mellanox Technologies Confidential 586

spanning-tree vlan priority

spanning-tree vlan <vid> priority <priority> no spanning-tree vlan <vid> priority

Syntax Description

Configures RPVST instance port priority.

The no form of the command resets the parameter value to its default.

priority Possible values are: 0, 4096, 8192, 12288, 16384,

20480, 24576, 28672, 32768, 36864, 40960, 45056,

49152, 53248, 57344, 61440.

Default 32768

Configuration Mode Config

History

Role

3.4.1100

admin

Example switch (config) # spanning-tree vlan 10 priority 32768

Related Commands show spanning-tree

Note • The following formula applies on the spanning tree timers:

2*(ForwardTime -1)>=MaxAgeTime >= 2*(Hello Time + 1)

• This command is available when global STP mode is set to RPVST

Rev 4.20

Mellanox Technologies Confidential 587

show spanning-tree

show spanning-tree

Syntax Description

Default

Displays spanning tree information.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.4.1100

Updated Example with R and G flags

Role

Example admin switch (config) # show spanning-tree

Switch ethernet-default

Spanning tree protocol is enabled rst

Spanning tree force version:2

Root ID

Priority 32768

Address 00:02:c9:7a:e9:40

Cost 1000

Port Eth1/32

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID

Priority 32768

Address 00:02:c9:96:c6:d0

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

L - Loop Inconsistent

R - Root Inconsistent

G - BPDU Guard Inconsistent

Interface Role Sts Cost Prio Type

---- ---- ----- ---- ---- ----

Eth1/9 Designated Forwarding 500 128 normal

Eth1/22 Designated Discarding(R) 500 128 normal

Eth1/32 Root Forwarding 500 128 normal

Eth1/39 Disabled Discarding(G) 2000 128 normal switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 588

Rev 4.20

show spanning-tree detail

show spanning-tree detail

Syntax Description

Default

Displays detailed spanning-tree configuration and statistics.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config) # show spanning-tree detail

Switch ethernet-default

Spanning tree protocol is enabled

Bridge is executing the rst compatible Spanning Tree Protocol

Bridge Identifier has priority 32768, address 00:02:c9:96:c6:d0

Configured hello time 2, max age 20, forward delay 15

Current root has priority 32768, address 00:02:c9:7a:e9:40

Root port is Eth1/32( Ethernet1/32),cost of root path is 1000

Number of topology changes 21,last change occurred 00:00:03 ago

Timers: hold 6 hello 2, max age 20, forward delay 15

default port type: normal, default bpdu filter: disabled, default bpdu guard: disabled switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Mellanox Technologies Confidential 589

show spanning-tree interface

show spanning-tree interface {ethernet <slot>/<port> | port-channel

<port-channel> | mlag-port-channel <mlag-port-channel>

Syntax Description

Display running state for specific interfaces.

ethernet Ethernet interface.

port-channel mlag-port-channel

LAG instance.

MLAG instance.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config) # show spanning-tree interface ethernet 1/2

Eth1/2 is Disabled Discarding

Port path cost 500, Port priority 128, Port Identifier 128.5

Designated root has priority 0, address unknown

Designated bridge has priority 0, address unknown

Designated port id 0.0, designated path cost 0

Number of transitions to forwarding state: 0

Port type: normal

PortFast is: off

Bpdu filter: disabled

Bpdu guard: disabled

Loop guard: disabled

Root guard: disabled

Link type: point-to-point

BPDU: sent: 0 received: 0 switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 590

Rev 4.20

show spanning-tree mst

show spanning-tree mst [details | <instance> interface {ethernet <slot>/<port> | port-channel <port-channel> | mlag-port-channel <mlag-port-channel>}]

Syntax Description

Displays basic multi-spanning-tree information.

details Displays detailed multi-spanning-tree configuration and statistics.

ethernet port-channel

Ethernet interface.

LAG instance.

Default mlag-port-channel

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin

MLAG instance.

switch (config) # show spanning-tree mst

MST0 vlans mapped: 1-1023,1025-2047,2049-3071,3073-4094

Interface Role Sts Cost Prio Type

---- ---- ----- ---- ---- ----

Eth1/9 Designated Forwarding 500 128.9 point-to-point

Eth1/10 Designated Forwarding 500 128.10 point-to-point

Eth1/11 Back Up Discarding 500 128.22 point-to-point switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Mellanox Technologies Confidential 591

show spanning-tree root

show spanning-tree root

Syntax Description

Default

Displays root multi-spanning-tree information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config) # show spanning-tree root

Instance Priority MAC addr Root Cost Hello Time Max Age FWD Dly Root Port

------- ------ -------- --------- -------- -------- ------- ---------

MST0 32768 00:02:c9:71:ed:40 500 2 20 15 Eth1/20

MST1 32768 00:02:c9:71:f0:c0 0 2 20 15 -

MST2 0 00:02:c9:71:f0:c0 0 2 20 15 -

MST3 32768 00:02:c9:71:f0:c0 0 2 20 15 switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 592

show spanning-tree vlan

show spanning-tree vlan <vid> [detail | interface {ethernet <slot>/<port> | portchannel <port-channel> | mlag-port-channel <mlag-port-channel>}]

Syntax Description

Displays spanning tree information.

vid VLAN ID. Range is also supported.

Format: <vid1>[-<vid2>] detail ethernet

Displays detailed RPVST configuration and statistics.

Ethernet interface.

port-channel mlag-port-channel

Default N/A

Configuration Mode Any Command Mode

LAG instance.

MLAG instance.

History

Role

Example

3.4.1100

admin switch (config) # show spanning-tree vlan 10

Switch ethernet-default

Spanning tree protocol is enabled rpvst

Spanning tree force version:2

Vlan 10

Root ID

Priority 10

Address 00:02:c9:96:c6:d0

This bridge is the root

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID

Priority 10

Address 00:02:c9:96:c6:d0

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

L - Loop Inconsistent

Interface Role Sts Cost Prio Type

---- ---- ----- ---- ---- ----

Mpo21 Designated Forwarding 500 128 normal

Mpo20 Back Up Discarding 500 128 normal switch (config) #

Related Commands clear spanning-tree counters spanning-tree

Note

Rev 4.20

Mellanox Technologies Confidential 593

5.8

OpenFlow

MLNX-OS supports OpenFlow 1.0. OpenFlow is a network protocol that facilitates direct communication between network systems via Ethernet. Software Defined Networks (SDN) allows a centralist management of network equipment. OpenFlow allows the SDN controller to manage

SDN equipment. The OpenFlow protocol allows communication between the OpenFlow controller and OpenFlow agent.

OpenFlow is useful to manage switches and allow applications running on the OpenFlow controller to have access to the switch’s datapath and provide functionality such as flow steering, security enhancement, traffic monitoring and more.

The OpenFlow controller communicates with the OpenFlow switch over secured channel using

OpenFlow protocol.

An OpenFlow switch contains a flow table which contains flows inserted by the OpenFlow controller. And the OpenFlow switch performs packet lookup and forwarding according to those rules.

Mellanox OpenFlow switch implementation is based on the hybrid model, allowing the coexistence of an OpenFlow pipeline and a normal pipeline. In this model, a packet is forwarded according to OpenFlow configuration, if such configuration is matched with the packet parameters. Otherwise, the packet is handled by the normal (regular forwarding/routing) pipeline.

The OpenFlow specification defines:

“OpenFlow-hybrid switches support both OpenFlow operation and normal Ethernet switching operation, i.e. traditional L2 Ethernet switching, VLAN isolation, L3 routing (IPv4 routing, IPv6 routing...), ACL and QoS processing. Those switches must provide a classification mechanism outside of OpenFlow that routes traffic to either the OpenFlow pipeline or the normal pipeline. For example, a switch may use the VLAN tag or input port of the packet to decide whether to process the packet using one pipeline or the other, or it may direct all packets to the OpenFlow pipeline.”

Utilizing the built-in capabilities of the hybrid switch/router is the main benefit of the hybrid mode. It increases network performance and efficiency – faster processing of new flows as well as lower load on the controllers. The hybrid switch processes non-OpenFlow data through its local management plane and achieve better efficiency and use of resources, compared to the pure

OpenFlow switch.

5.8.1

Flow Table

The flow table contains flows which are used to perform packet lookup, modification and forwarding. Each flow has a 12 tuple key. The key is used in order to classify a packet into a certain flow. The key contains the flowing fields: ingress port, source MAC, destination MAC, Ether-

Type, VLAN ID, PCP, source IP, destination IP, IP protocol, IP ToS bits, TCP/UDP source port and TCP/UDP destination port.

The flow key can have a specific value for each field or wildcard which signals to the switch to ignore this part of the key.

Each packet passes through the flow table once a match is found; the switch performs the actions configured to the specific flow by the OpenFlow controller.

Upkeeping a flow table enables the switch to forward incoming traffic with a simple lookup on its flow table entries. OpenFlow switches perform a check for matching entries on, or ignore using a wildcard, specific fields of the ingress traffic. If the entry exists, the switch performs the

Rev 4.20

Mellanox Technologies Confidential 594

action associated with that flow entry. Packets without a flow entry match are forwarded according to the normal pipeline (hybrid switch).

Every flow entry contains one of the following parameters:

1. Header fields for matching purposes with each entry containing a specific value or a wildcard which could match all entries.

2. Matching packet counters which are useful for statistical purposes, in order to keep track of the number of packets.

3. Actions which specify the manner in which to handle the packets of a flow which can be any of the following: a. Forwarding the packet b. Dropping the packet c. Forwarding the packet to the OpenFlow controller d. Modifying the VLAN, VLAN priority (PCP), and/or stripping the VLAN header

Rev 4.20

The flow table supports up to 1000 flows.

5.8.2

Configuring OpenFlow

To run OpenFlow on a switch:

Step 1.

Unlock the OpenFlow CLI commands. Run: switch (config) # protocol openflow

Step 2.

Step 3.

Step 4.

Configure interfaces to be managed by OpenFlow. Run: switch (config) # interface ethernet 1/1-1/4 openflow mode hybrid

Configure the OpenFlow controller IP and TCP port. Run: switch (config) # openflow controller-ip 10.209.0.205 tcp-port 6633

(Optional) Verify the OpenFlow configuration. Run: switch (config) # show openflow

OpenFlow version: OF VERSION 1.0

Table size: 1000, 0 in use

Active controller ip: 10.209.0.205 port: 6633

Connection status: HANDSHAKE_COMPLETE (CONNECTED)

Forward-to-controller: ospf lldp arp-unicast arp-broadcast (all)

Enabled ports: Eth1/1 Eth1/2 Eth1/3 Eth1/4 switch (config) #

To be able to configure the switch using the controller, you should see the following line in the output:

Connection status must be: HANDSHAKE_COMPLETE (CONNECTED).

Mellanox Technologies Confidential 595

5.8.3

Commands

protocol openflow

protocol openflow no protocol openflow

Syntax Description

Default

Configuration Mode

History

Role

Example

Unhides the OpenFlow commands.

The no form of the command hides the OpenFlow commands.

N/A no protocol openflow

Config

3.3.4200

admin switch (config) # protocol openflow switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 596

openflow description

openflow description <string>

Syntax Description

Default

Sets the OpenFlow description.

string

N/A

Configuration Mode Config

Free string.

History

Role

Example

3.3.4302

admin switch (config) # openflow description OF-switch-104 switch (config) # show openflow detail

OpenFlow version: OF VERSION 1.0

Table size: 1000, 0 in use

Active controller ip: 10.209.1.39 port: 6633

Connection status: HANDSHAKE_COMPLETE (CONNECTED)

Forward-to-controller: ospf lldp arp-unicast arp-broadcast (all)

Enabled ports: Eth1/10 Eth1/11 Eth1/13 Eth1/19

Echo period: 10 sec

Keep alive period: 30 sec

Messages in (last session): 86290

Messages out (last session): 47984

Disconnect count: 0

Openflow description: OF-switch-104

Datapath ID: 00:00:00:02:c9:a8:e3:50

Not supporting buffering

Not supporting emergency flows

Not supporting port statistics

Not supporting IP reassemble

Supporting spanning tree

Not supporting queue statistics switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 597

openflow mode hybrid

openflow mode hybrid no openflow mode

Syntax Description

Default

Enables OpenFlow on the port.

The no form of the command returns the port to its default state.

N/A no openflow mode

Configuration Mode Config Interface Ethernet

History 3.3.4200

Role

Example admin switch (config interface etherent 1/1)# openflow mode hybrid switch (config interface etherent 1/1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 598

controller-ip

controller-ip <ip-address> [tcp-port <port-number>] no controller-ip <ip-address> tcp-port

Syntax Description

Sets the OpenFlow controller’s IP & TCP port.

The no form of the command sets the parameter to its default.

ip-address tcp-port <port-number>

The IPv4 address of the OpenFlow controller.

Sets the TCP port number of the OpenFlow controller.

Default 0.0.0.0; TCP port 6633

Configuration Mode Config OpenFlow

History

Role

Example

3.3.4200

admin switch (config openflow) # controller-ip 10.10.10.10 tcp-port 6633 switch (config openflow) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 599

datapath-id

datapath-id <value> no datapath-id

Syntax Description

Sets a specific identifier for the switch with which the controller is communicating.

The no form of the command resets the parameter to its default value.

value The most significant 16 bits of the agent data-path ID.

Range is 0x0000-0xFFFF in hexa.

Default 0x0000

Configuration Mode Config OpenFlow

History

Role

Example

3.3.4200

admin switch (config openflow) # datapath-id 0x1234 switch (config openflow) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 600

Rev 4.20

forward-to-controller

forward-to-controller {[ospf] [lldp] [arp-unicast] [arp-broadcast] all | none}

Syntax Description

Forwards the selected traffic types to the controller from all the ports on which Open-

Flow enabled.

ospf lldp

Forwards OSPF traffic to the controller.

Forwards LLDP traffic to the controller.

arp-unicast arp-broadcast all none

Forwards ARP-unicast traffic to the controller.

Forwards ARP-broadcast traffic to the controller.

Forwards all traffic types to the controller.

Forwards no traffic to the controller.

Default None

Configuration Mode Config OpenFlow

History

Role

Example

3.3.4200

admin switch (config openflow) # forward-to-controller all switch (config openflow) #

Related Commands

Note

Mellanox Technologies Confidential 601

Rev 4.20

show openflow

show openflow [detail | tables | flows <id>]

Syntax Description

Displays general information about the OpenFlow protocol configuration.

detail Displays detailed information about the OpenFlow protocol.

tables flows <id>

Displays information about the OpenFlow tables (size, type, etc.).

Displays specific flows inside the OpenFlow tables. ID may be a range (e.g. 1-10).

Displays OpenFlow statistics.

Default statistics

None

Configuration Mode Any Command Mode

History 3.3.4200

3.3.4302

Removed flow-id parameter

Added “flows” and “statistics” parameters

Role

Example admin switch (config openflow) # show openflow flows 2

Flow id: 2 priority: 1 hard timeout: infinite idle timeout: 0 sec match:

ingress interface: Eth1/18

source Ethernet address: 11:22:33:44:55:66

destination Ethernet address: 77:88:aa:bb:cc:fe

Ethernet type: 0x800

VLAN ID: 308

PCP: 4

SIP: 1.1.1.1

DIP: 2.2.2.2

Dport: 1790

Protocol: 86

TOS: 120 actions:

output controller statistics:

0 packets, 0 bytes switch (config openflow) #

Related Commands

Note

Mellanox Technologies Confidential 602

5.9

IGMP Snooping

Only IGMP Snooping v1 and v2 are supported.

The Internet Group Multicast Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships. The host joins a multicast-group by sending a join request message towards the network router, and responds to queries sent from the network router by dispatching a join report.

A given port can be either manually configured to be a router-port or it can be dynamically manifested when having received a query, hence, the network router is connected to this port. All

IGMP Snooping Control packets received from hosts (joins/leaves) are forwarded to the routerport, and the router-port updates its multicast-group data-base accordingly. Each dynamically learnt multicast group will be added to all of the router-ports on the switch.

As many as 5K multicast groups can be created on the switch.

5.9.1

Configuring IGMP Snooping

You can configure IGMP snooping to establish multicast group memberships.

To configure IGMP snooping:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Enable IGMP snooping globally. Run: switch (config) # ip igmp snooping switch (config) #

Enable IGMP snooping on a VLAN. Run: switch (config) # vlan 2 switch (config vlan 2) # ip igmp snooping

5.9.2

Defining a Multicast Router Port on a VLAN

You can define a Multicast Router (MRouter) port on a VLAN in one of the following methods:

To change the interface switchport to trunk:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Enable IGMP snooping globally. Run: switch (config) # ip igmp snooping switch (config) #

Rev 4.20

Mellanox Technologies Confidential 603

Rev 4.20

Step 4.

Step 5.

Change the interface switchport mode of the port (the interface is member of VLAN 1 by default). Run: switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # switchport mode trunk

Change back to config mode. Run: switch (config interface ethernet 1/1) # exit switch (config) #

Step 6.

Define the MRouter port on the VLAN. Run: switch (config) # vlan 2 switch (config vlan 2) # ip igmp snooping mrouter interface ethernet 1/1 switch (config vlan 2) #

To change the interface switchport to hybrid:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Step 5.

Step 6.

Step 7.

Step 8.

Step 9.

Enable IGMP snooping globally. Run: switch (config) # ip igmp snooping switch (config) #

Create a VLAN. Run: switch (config) # vlan 200 switch (config vlan 200) #

Change back to config mode. Run: switch (config vlan 200) # exit switch (config) #

Change the interface switchport mode of the port (the interface is member of VLAN 1 by default). Run: switch (config) # interface ethernet 1/36 switch (config interface ethernet 1/36) # switchport mode hybrid

Attach the VLAN to the port’s interface. Run: switch (config interface ethernet 1/36) # switchport mode hybrid allowed-vlan 200 switch (config interface ethernet 1/36) #

Change to config mode again. Run: switch (config interface ethernet 1/36) # exit switch (config) #

Define the MRouter port on the VLAN. Run: switch (config) # vlan 200 switch (config vlan 200) # ip igmp mrouter interface ethernet 1/36 switch (config vlan 200) #

Mellanox Technologies Confidential 604

5.9.3

IGMP Snooping Querier

IGMP Snooping Querier compliments the IGMP snooping functionality. IGMP Snooping Querier is used to support IGMP snooping in a VLAN where PIM and IGMP are not configured because the multicast traffic does not need to be routed. When IGMP Snooping Querier is enabled, IGMP queries are sent out periodically by the switch through all ports in the VLAN and to which hosts wishing to receive IP multicast traffic respond with IGMP report messages. IGMP

Snooping Querier must be used in conjunction with IGMP snooping as IGMP snooping listens to these IGMP reports to establish appropriate forwarding.

To configure IGMP Snooping Querier:

Step 1.

Enable the IGMP snooping on the switch. Run: switch (config) # ip igmp snooping

Step 2.

Step 3.

Step 4.

Enable the IGMP snooping querier on a specific VLAN. Run: switch (config) # vlan 10 switch (config vlan 10)# ip igmp snooping querier

Set the query interval time. Run: switch (config vlan 10)# igmp snooping querier query-interval 25

(Optional) Verify the IGMP snooping querier configuration. Run: switch (config vlan 10)# show ip igmp snooping querier

VLAN 10 IGMP Querier Present query-interval: 125 address: 1.1.1.2 version: 2 switch (config vlan 10)#

Rev 4.20

Mellanox Technologies Confidential 605

Rev 4.20

5.9.4 Commands

ip igmp snooping (admin)

ip igmp snooping no ip igmp snooping

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables IGMP snooping globally or per VLAN.

The no form of the command disables IGMP snooping globally or per VLAN.

N/A

IGMP snooping is disabled, globally and per VLAN.

Config

Config VLAN

3.1.1400

admin switch (config) # ip igmp snooping switch (config) # vlan 10 switch (config vlan 10) # ip igmp snooping switch (config vlan 10) # exit switch (config) # show ip igmp snooping

Related Commands

Note

IGMP snooping global configuration:

IGMP snooping globally enabled

IGMP snooping operationally enabled

Proxy-reporting globally disabled

Last member query interval is 1 seconds

Mrouter timeout is 125 seconds

Port purge timeout is 260 seconds

Report suppression interval is 5 seconds switch (config vlan 10) # show ip igmp snooping vlan 10

Vlan 10 configuration parameters:

IGMP snooping is enabled

IGMP version is V2

Snooping switch is acting as Non-Querier

mrouter static port list: none

mrouter dynamic port list: none switch (config vlan 10) # vlan 10 switch (config vlan 10) # show ip igmp snooping

IGMP snooping has global admin state, and per VLAN admin state. Both states need to be enabled in order to enable the IGMP snooping on a specific VLAN.

Mellanox Technologies Confidential 606

Rev 4.20

ip igmp snooping (config)

ip igmp snooping {last-member-query-interval <1-25> | proxy reporting mrouter-timeout <60-600> | port-purge-timeout <130-1225> | report-suppression-interval <1-25>} no ip igmp snooping {last-member-query-interval | proxy reporting | mroutertimeout | report-suppression-interval}

Syntax Description

Configures IGMP global parameters.

The no form of the command resets the IGMP global parameters to default.

last-member-query-interval <1-25>

Sets the time period (in seconds) with which the general queries are sent by the IGMP quarrier. After timeout expiration the port will be removed from the multicast group.

proxy reporting mrouter-timeout <60-

600>

Enables proxy reporting

Sets the IGMP snooping router port purge time-out after which the port gets deleted if no IGMP router control packets are received.

The default value is 125 seconds.

port-purge-timeout <130-

1225> report-suppression-interval <1-25>

Sets the IGMP snooping port purge time interval after which the port gets deleted if no IGMP reports are received.

Sets the IGMP snooping report-suppression time interval for which the IGMPv2 report messages for the same group will not get forwarded onto the router ports.

The default value is 5 seconds.

Default last-member-query-interval – 1 second proxy reporting is disabled mrouter-timout – 125 port-purge-timeout – 260 seconds report-suppression-interval – 5 seconds

Configuration Mode Config

History 3.1.1400

Role admin

Mellanox Technologies Confidential 607

Example switch (config) # ip igmp snooping report-suppression-interval 3 switch (config) # show ip igmp snooping

IGMP snooping global configuration:

IGMP snooping globally enabled

IGMP snooping operationally enabled

Proxy-reporting globally disabled

Last member query interval is 1 seconds

Mrouter timeout is 125 seconds

Port purge timeout is 260 seconds

Report suppression interval is 3 seconds switch (config) #

Related Commands ip igmp snooping (admin) show ip igmp snooping

Note

Rev 4.20

Mellanox Technologies Confidential 608

ip igmp snooping fast-leave

ip igmp snooping fast-leave no ip igmp snooping fast-leave

Syntax Description

Default

Enables fast leave processing on a specific interface.

The no form of the command disables fast leave processing on a specific interface.

N/A

Normal-leave is enabled.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.1400

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # ip igmp snooping fast-leave switch (config interface ethernet 1/1) # show ip igmp snooping interfaces interface leave-mode

----------- ------------

Eth1/1 Fast

Eth1/2 Normal

Eth1/3 Normal

...

switch (config interface ethernet 1/1) #

Related Commands show ip igmp snooping interfaces

Note

Rev 4.20

Mellanox Technologies Confidential 609

Rev 4.20

ip igmp snooping static-group

ip igmp snooping static-group <IP address> interface <type> <number> no ip igmp snooping static-group <IP address> interface <type> <number>

Syntax Description

Creates a static multicast group and attaches a port to a specified group.

The no form of the command deletes the interface from the multicast group.

Ip address Multicast IP address <224.x.x.x - 239.255.255.255> interface <type> <number>

Attach the group to a specific interface. type - ethernet or port-channel

Default No static groups are configured.

Configuration Mode Config VLAN

History

Role

Example

3.1.1400

admin switch (config)# vlan 1 switch (config vlan 1) # ip igmp snooping static-group 230.0.0.1 interface ethernet 1/1 switch (config vlan 1) # show ip igmp snooping groups

Vlan ID Group St/Dyn Ports

-------- ------------ ------- -------

1 230.0.0.1 St Eth1/1

Total Num of Dynamic Group Addresses 0

Total Num of Static Group Addresses 1 switch (config vlan 1) #

Related Commands show ip igmp snooping groups

Note If the deleted interface is the last port, it deletes the entire multicast group.

Mellanox Technologies Confidential 610

Rev 4.20

ip igmp snooping mrouter

ip igmp snooping mrouter interface <type> <number> no ip igmp snooping mrouter interface <type> <number>

Syntax Description

Creates a static multicast router port on a specific VLAN, on a specific interface.

The no form of the command removes the static multicast router port from a specific

VLAN.

interface <type> <number>

Attaches the group to a specific interface. type - ethernet or port-channel.

Default No static mrouters are configured.

Configuration Mode Config VLAN

History

Role

Example

3.1.1400

admin switch (config)# vlan 1 switch (config vlan 1) # ip igmp snooping mrouter interface ethernet 1/1 switch (config vlan 1) # show ip igmp snooping mrouter

Vlan Ports

-------- ------------

1 Eth1/1(static) switch (config vlan 1) #

Related Commands show ip igmp snooping mrouter

Note The multicast router port can be created only if IGMP snooping is enabled both globally and on the VLAN.

Mellanox Technologies Confidential 611

ip igmp snooping unregistered multicast

ip igmp snooping unregistered multicast <options> no ip igmp snooping unregistered multicast

Syntax Description

Sets the behavior of the snooping switch for unregistered multicast traffic.

The no form of the command sets it default.

options • flood

• forward-to-mrouter-ports

Default flood

Configuration Mode Config

History

Role

Example

3.2.0500

admin switch (config) # ip igmp snooping unregisted multicast flood switch (config) # show ip igmp snooping

IGMP snooping global configuration:

IGMP snooping globally enabled

IGMP snooping operationally enabled

Proxy-reporting globally disabled

Last member query interval is 1 seconds

Mrouter timeout is 125 seconds

Port purge timeout is 260 seconds

Report suppression interval is 5 seconds

IGMP snooping unregistered multicast: flood switch (config) #

Related Commands show ip igmp snooping

Note

Rev 4.20

Mellanox Technologies Confidential 612

ip igmp snooping querier

ip igmp snooping querier no ip igmp snooping querier

Syntax Description

Default

Enables the IGMP Snooping Querier on a VLAN.

The no form of the command disables the IGMP Snooping Querier on a VLAN.

N/A

Disable

Configuration Mode Config VLAN

History 3.3.4200

Role

Example admin switch (config vlan 1)# ip igmp snooping querier switch (config vlan 1)#

Related Commands igmp snooping querier query-interval show ip igmp snooping querier

Note

Rev 4.20

Mellanox Technologies Confidential 613

igmp snooping querier query-interval

igmp snooping querier query-interval <time> no igmp snooping querier query-interval

Syntax Description

Default

Configures the query interval.

The no form of the command rests the parameter to its default.

time

125 seconds

Configuration Mode Config VLAN

History 3.3.4200

Time interval between queries (in seconds).

Role

Example admin switch (config vlan 1)# igmp snooping querier query-interval 20 switch (config vlan 1)#

Related Commands igmp snooping querier query-interval show ip igmp snooping querier

Note

Rev 4.20

Mellanox Technologies Confidential 614

show ip igmp snooping

show ip igmp snooping

Syntax Description

Default

Displays IGMP snooping information for all VLANs or a specific VLAN.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show ip igmp snooping

IGMP snooping global configuration:

IGMP snooping globally enabled

IGMP snooping operationally enabled

Proxy-reporting globally disabled

Last member query interval is 1 seconds

Mrouter timeout is 125 seconds

Port purge timeout is 260 seconds

Report suppression interval is 3 seconds

IGMP snooping unregistered multicast: flood switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 615

Rev 4.20

show ip igmp snooping groups

show ip igmp snooping groups

Syntax Description

Default

Displays per VLAN the list of multicast groups attached (static or dynamic allocated) per port.

N/A

N/A

Configuration Mode Any Command Mode

History 3.1.1400

Role

Example admin switch (config) # show ip igmp snooping groups

Vlan ID Group St/Dyn Ports

-------- ------------ ------- -------

1 230.0.0.1 St Eth1/1

Total Num of Dynamic Group Addresses 0

Total Num of Static Group Addresses 1 switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 616

show ip igmp snooping vlan

show ip igmp snooping vlan {<vlan/vlan-range> | all}

Syntax Description

Displays IGMP configuration per VLAN or VLAN range.

vlan/vlan range Displays IGMP VLAN configuration per specific

VLAN or VLAN range.

Display IGMP VLAN configuration on all VLAN.

Default all

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show ip igmp vlan 1

Vlan 1 configuration parameters:

IGMP snooping is enabled

IGMP version is V2

Snooping switch is acting as Non-Querier

mrouter static port list: Eth1/1

mrouter dynamic port list: none switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 617

show ip igmp snooping mrouter

show ip igmp snooping mrouter

Syntax Description

Default

Displays IGMP snooping multicast router information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show ip igmp snooping mrouter

Vlan Ports

-------- ------------

1 Eth1/1(static) switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 618

show ip igmp snooping interfaces

show ip igmp snooping interfaces

Syntax Description

Default

Displays IGMP snooping interface information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show ip igmp snooping interfaces interface leave-mode

----------- ------------

1/1 Normal

1/2 Normal

1/3 Normal

1/4 Fast

...

switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 619

show ip igmp snooping statistics

show ip igmp snooping statistics

Syntax Description

Default

Displays IGMP snooping statistical counters.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show ip igmp snooping statistics

Snooping Statistics for VLAN 1

General queries received : 0

Group specific queries received : 0

V1/V2 reports received : 0

V1/V2 reports transmitted : 0

Leave messages received : 0

Group specific queries transmitted: 0

Leave messages transmitted: 0

Unsuccessful joins received count Per Vlan: 0

Active/Successful joins received count Per Vlan: 0

Active Groups count: 0

Packets dropped: 0 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 620

Rev 4.20

show ip igmp snooping querier

show ip igmp snooping querier [vlan <num>]

Syntax Description

Displays running IGMP snooping querier configuration on the VLANs.

vlan <num> Displays the IGMP snooping querier configuration running on the specified VLAN.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4200

admin switch (config) # show ip igmp snooping querier vlan 10

Vlan 1 IGMP Querier Present query-interval: 20 address: 1.1.1.2 version: 2 switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 621

5.10

Link Layer Discovery Protocol (LLDP)

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 LAN. The protocol is formally defined in IEEE 802.1AB.

5.10.1 Configuring LLDP

To configure the LLDP on the switch:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Step 5.

Enable LLDP globally on the switch. Run: switch (config) # lldp switch (config) #

Enable LLDP per interface. Run: switch (config interface ethernet 1/1) # lldp receive switch (config interface ethernet 1/1) # lldp transmit

Show LLDP local information. Run: switch (config) # show lldp local

LLDP is Enabled

Local global configuration

Chassis sub type: macAddress (4)

Chassis id: 00:11:22:33:44:55

System Name: "switch-111111"

System Description: my-system-description

Supported capabilities: B

Supported capabilities enabled: B

Step 6.

Show LLDP remote information. Run: switch (config)# show lldp interfaces ethernet 1/1 remote

Ethernet 1/1

Remote Index: 1

Remote chassis id: 00:11:22:33:44:55 ; chassis id subtype: mac

Remote port-id: ethenret 1/2; port id subtype: local

Remote port description: ethernet 1/2

Remote system name: remote-system

Remote system description: remote-system-description

Remote system capabilities supported: B ; B

5.10.2 DCBX

Data Center Bridging (DCB) is an enabler for running the Ethernet network with lossless connectivity using priority-based flow control and enhanced transmission selection. DCBx (exchange)

Rev 4.20

Mellanox Technologies Confidential 622

compliments the DCB implementation by offering a dynamic protocol that communicates DCB attributes between peering endpoint.

Rev 4.20

Mellanox Technologies Confidential 623

5.10.3 Commands

lldp

lldp no lldp

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables LLDP globally.

The no form of the command disables the LLDP.

N/A

Disabled

Config

3.2.0300

admin switch (config)# lldp switch (config)# show lldp local

Rev 4.20

Mellanox Technologies Confidential 624

lldp reinit

lldp reinit <seconds> no lldp reinit

Syntax Description

Default

Sets the delay in seconds from enabling the LLDP on the port until re-initialization will be attempted.

The no form of the command sets the parameter to default.

seconds

2

Configuration Mode Config

History 3.2.0300

1-10

Role

Example admin switch (config)# lldp reinit 10 switch (config)#

Related Commands show lldp timers

Note

Rev 4.20

Mellanox Technologies Confidential 625

Rev 4.20

lldp timer

lldp timer <seconds> no lldp timer

Syntax Description

Default

Sets the LLDP interval at which LLDP frames are transmitted. (lldpMessageTxInterval)

The no form of the command sets the parameter to default.

seconds

30

Configuration Mode Config

History 3.2.0300

5-32768

Role

Example admin switch (config)# lldp timer 10 switch (config)#

Related Commands show lldp timers

Note

Mellanox Technologies Confidential 626

lldp tx-delay

lldp tx-delay <seconds> no lldp tx-delay

Syntax Description

Default

Indicates the delay in seconds between successive LLDP frame transmissions

The no form of the command sets the parameter to default.

seconds

2

Configuration Mode Config

History 3.2.0300

1-8192

Role

Example admin switch (config)# lldp tx-delay 10 switch (config)#

Related Commands show lldp timers

Note The recommended value for the tx-delay is set by the following formula:

1 <= lldp tx-delay <= (0.25 * lldp timer)

Rev 4.20

Mellanox Technologies Confidential 627

lldp tx-hold-multiplier

lldp tx-hold-multiplier <seconds> no lldp tx-hold-multiplier

Syntax Description

Default

The time-to-live value expressed as a multiple of the lldpMessageTxInterval object.

The no form of the command sets the parameter to default.

seconds

2

Configuration Mode Config

History 3.2.0300

1-8192

Role

Example admin switch (config)# lldp tx-hold-multiplier 10 switch (config)#

Related Commands show lldp timers

Note The actual time-to-live value used in LLDP frames, can be expressed by the following formula: TTL = min(65535, (lldpMessageTxInterval * lldpMessageTxHoldMultiplier)) For example, if the value of lldpMessageTxInterval is '30', and the value of lldpMessageTxHoldMultiplier is '4', then the value '120' is encoded in the TTL field in the LLDP header.

Rev 4.20

Mellanox Technologies Confidential 628

Rev 4.20

lldp {receive | transmit}

lldp {receive | transmit} no lldp {receive | transmit}

Syntax Description

Default

Enables LLDP to be received or transmitted on this port.

The no form of the command disables the LLDP to be received or transmitted on this port.

N/A

Enabled for receive and Trasmit.

Configuration Mode Config Interface Ethernet

History 3.2.0300

Role

Example admin switch (config interface ethernet 1/1)# lldp receive switch (config interface ethernet 1/1)# lldp transmit switch (config interface ethernet 1/1)#

Related Commands show lldp interface

Note The LLDP is disabled by default (globally)

Mellanox Technologies Confidential 629

Rev 4.20

lldp tlv-select

lldp tlv-select {[dcbx] [dcbx-cee] [port-description] [sys-name] [sys-description]

[sys-capababilities] [management-address] [none] all}

Syntax Description

Sets the LLDP basic TLVs to be transmitted on this port.

dcbx Enables LLDP-DCBX TLVs.

dcbx-cee port-description

Enables LLDP-DCBX CEE TLVs.

LLDP port description TLV.

sys-name sys-description sys-capabilities management-address

LLDP system name TLV.

LLDP system description TLV.

LLDP system capabilities TLV.

LLDP management address TLV.

all none

Default all

Configuration Mode Config Interface Ethernet

History 3.2.0300

3.3.0000

Role

Example all above TLVs.

None of the above TLVs.

3.3.4302

3.3.4402

Initial revision

Added “none” parameter

Added “dcbx” parameter

Added “dcbx-cee” parameter admin switch (config interface ethernet 1/1)# lldp tlv-select port-description sys-name switch (config interface ethernet 1/1)#

Related Commands show lldp interface

Note

Mellanox Technologies Confidential 630

dcb application-priority

dcb application-priority <selector> <protocol> <priority>

Syntax Description

Adds an application to the application priority table.

selector Protocol type: ethertype protocol Protocol field in hexadecimal notation (e.g. ‘0x8906’ for FCoE, ‘0x8914’ for FIP).

priority

Default

Configuration Mode Config

Range: 0-7.

No applications are available. The table is empty.

History 3.3.4200

3.4.0008

Role

Example admin switch (config-if)# dcb application-priority ethertype 0x8906 switch (config-if)#

Related Commands show lldp interface

Note

Rev 4.20

Mellanox Technologies Confidential 631

show lldp local

show lldp local

Syntax Description

Default

Shows LLDP local information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0300

admin switch (config)# show lldp local

LLDP is Enabled

Local global configuration

Chassis sub type: macAddress (4)

Chassis id: 0002C9030046AF00

System Name: my-switch

System Description: SX1036

Supported capabilities: B,R

Supported capabilities enabled: B switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 632

Rev 4.20

show lldp interface

show lldp interface [ethernet <inf>]

Syntax Description

Default

Shows LLDP local interface table information.

inf

N/A

Configuration Mode Any Command Mode

Interface number (e.g. 1/1).

History 3.2.0300

3.3.4200

First version

Updated example

Role

Example

3.3.4402

admin

Updated example switch (config)# show lldp interface ethernet 1/1

TLV flags:

PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities, MA: management-address, ETS-C: ETS-Configuration, ETS-R: ETS-

Recommendation, AP: Application Priority, PFC: Priority Flow Control,

CEE: Converged Enhanced Ethernet DCBX version

Interface Receive Transmit Notification TLVs

--------------------------------------------------------------------------eth1/1 Enable Enable Enable PD,SN,SD,SC,MA,PFC,CEE eth1/2 Disable Disable Enable PD,SN,SD,MA,AP eth1/3 Enable Disable Disable PD,SD,SC,ETS-R,AP,PFC

...

switch (config)#

Related Commands

Note

Mellanox Technologies Confidential 633

show lldp interfaces ethernet <inf> remote

show lldp interfaces ethernet <inf> remote

Syntax Description

Default

Shows LLDP remote interface table information.

inf

N/A

Configuration Mode Any Command Mode

Local interface number (e.g. 1/1).

History 3.2.0300

3.3.4200

First version

Updated output

Role admin

Rev 4.20

Mellanox Technologies Confidential 634

Example

Related Commands

Note

Rev 4.20

switch (config)# show lldp interfaces ethernet <number> Ethernet <port-number> // example "Ethernet 1/1"

Latest LLDPDU received on <date> // e.g. date: "Thu Feb 14 12:08:29 2013" - new field

Remote Index:

Remote chassis id: <byte array> ; chassis id subtype: <sub-type>

Remote port-id: <byte array> ; port id subtype: <sub-type>

Remote port description: <byte array>

Remote system name: <byte array>

Remote system description: < byte array>

Remote system capabilities supported: <enum parced as defined in the MIB> ; enable <enum parced as defined in the

MIB>

Management Table //theoretially remote can send more then one management address (Future) RemoteIndex Subtype Address ifSubtype ifId OID

1 ipV4(1) 10.10.10.10 ifIndex(2) 1(mgmt0) <Oid>

1 ipV4(1) 10.10.10.11 ifIndex(3) 2(mgmt1) <Oid>

Unknown TLVs Table //(Future) Type Info

-------------------------------

<integer> <byte-array>

<integer> <byte-array>

Organizationally-Defined Information Table // (Future) OUI subtype Index DefInfo

-------------------------------------------------------------

<byte-array> <integer> <integer> <byte-array>

<byte-array> <integer> <integer> <byte-array>

Remote PFC configuration // new section Willing: {enabled, disabled}

MACsec: {enabled, disabled}

Number of supported traffic classes: 4 // range is 1-8

PFC enabled on priorities: 5 7 // it could be "0 1 2 3 4 5 6 7" or " 1 3 7" or "None"

WARNING: peer PFC configuration does not match the local PFC configuration // This warning should appear only if the local and remote PFC configuration don't match!

Remote ETS configuration // new section Willing: {enabled, disabled}

CBS: {enabled, disabled}

Number of supported traffic classes: 3 // range is 1-8

WARNING: peer ETS configuration does not match the local ETS configuration // This warning should appear only if the local and remote ETS configuration don't match!

Priority assignment table: Priority TC

1

3

0

2

0

1

---------------

0

3

7

2

6

2

5

1

4

3

Traffic class bandwidth table // (No need to have the recommended TC - ETS-Recommended TLV)

TC Bandwidth TSA

-----------------------------

Page 43 of 354

0 25% tsaStrictPriority(0) // we are expecting either 0 or 2 as answers.

Mellanox Technologies Confidential 635

show lldp timers

show lldp timers

Syntax Description

Default

Shows LLDP timers configuration

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0300

admin switch (config)# show lldp timers msg-tx-interval:30 tx-delay:2 tx-hold:4 tx-reinit-delay:2 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 636

show lldp statistics global

show lldp statistics global

Syntax Description

Default

Shows LLDP global statistics

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0300

admin switch (config)# show lldp timers

Remote Table Last Change Time : 10300

Remote Table Inserts : 5

Remote Table Deletes : 0

Remote Table Drops : 0

Remote Table Ageouts : 0 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 637

Rev 4.20

show lldp statistics [interface ethernet <inf>]

show lldp statistics [interface ethernet <inf>]

Syntax Description

Default

Shows LLDP interface statistics

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0300

admin switch (config)# show lldp statistics ethernet 1/1

Interface Frames In In TLVs TLVs Ageout Out

Discarded Errors Total Discarded Unrecognize Frames

-----------------------------------------------------------------------

Eth 1/1 0 0 10 0 0 0 0 switch (config)#

Related Commands

Note

Mellanox Technologies Confidential 638

show dcb application-priority

show dcb application-priority

Syntax Description

Default

Displays application priority admin table.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4200

admin switch (config)# show dcb application-priority

Application priority configuration

Selector Protocol Priority

------------------------------

Ethertype 0x8906 3

Ethertype 0x8914 3 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 639

5.11

Quality of Service (QoS)

5.11.1 Priority Flow Control and Link Level Flow Control

Priority Flow Control (PFC) provides an enhancement to the existing pause mechanism in Ethernet. The current Ethernet pause option stops all traffic on a link. PFC creates eight separate virtual links on the physical link and allows any of these links to be paused and restarted independently, enabling the network to create a no-drop class of service for an individual virtual link. PFC has 8 possible priorities (3 bits in VLAN header). Each priority can be mapped to one of 4 possible queues in the ingress.

The PFC software offers the following features:

• Provides per-priority enabling or disabling of flow control

• Transmits PFC-PAUSE frames when the receive threshold for a particular traffic class is reached

• Provides the management capability for an administrator to configure the flow control properties on each port of the switch

• Keeps flow control disabled for all priorities on all ports by default

• Allows an administrator to enable or disable flow control per port and per priority level

• Supports flow control only on physical ports, not on logical interfaces such as tunnels or interfaces defined by sharing a physical port in multiple virtual switch contexts

• Uses the configured threshold values to set up the queue buffer spaces accordingly in the datapath

• Provides hardware abstraction layer callouts for the following:

• Enabling or disabling of flow control on each port for each priority

• Configuring the queue depth for each priority on each port

• Provides trace logs for execution upon error conditions and for any event notifications from the hardware or datapath. These trace logs are a useful aid in troubleshooting.

• Allows the administrator to configure the minimum and maximum threshold values for flow control. These configurations are applied globally on all ports and priorities.

Priority Based Flow Control (PFC) provides an enhancement to the existing pause flow control mechanism as described in 802.1x.

To enable PFC globally:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Enable PFC globally on the switch. Run: switch (config) # dcb priority-flow-control enable

This action might cause traffic loss while shutting down a port with priority-flow-control mode on

Type 'yes' to confirm enable pfc globally: yes

Rev 4.20

Mellanox Technologies Confidential 640

Rev 4.20

To enable PFC per priority:

Step 1.

Log in as admin.

Step 2.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Enable PFC globally on the switch. Run: switch (config) # dcb priority-flow-control enable

# dcb priority-flow-control enable

This action might cause traffic loss while shutting down a port with priority-flow-control mode on

Type 'yes' to confirm enable pfc globally: yes switch (config) #

Step 4.

Choose the desirable priority you want to enable using the command dcb priority-flow-control priority <pri[0..7]> enable

.

switch (config) # dcb priority-flow-control priority 5 enable

To enable PFC per interface:

Step 1.

Step 2.

Log in as admin.

Change to config mode. Run: switch > enable switch # configure terminal

Step 3.

Enable PFC globally on the switch. Run: switch (config) # dcb priority-flow-control enable

Step 4.

Step 5.

Step 6.

Choose the desirable priority you want to enable using the command dcb priority-flow-control priority <pri[0..7]> enable switch (config) # dcb priority-flow-control 5 enable

Change to Interface mode. Run: switch (config) # switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) #

Enable PFC for the specific interface: switch (config interface ethernet 1/1) # dcb priority-flow-control mode on

5.11.2 Enhanced Transmission Selection (ETS)

Enhanced Transmission Selection (ETS) provides a common management framework for assignment of bandwidth to traffic classes, for weighted round robin (WRR) scheduling. If a traffic class does not use all the bandwidth allocated to it, other traffic classes can use that available bandwidth. This allows optimal utilization of the network capacity while prioritizing and providing the necessary resources.

The ETS feature has the following attributes:

• ETS global admin:

• Enable (default) – scheduling mode is WRR according to the configured bandwidth-pertraffic class

Mellanox Technologies Confidential 641

Rev 4.20

• Disable – scheduling mode is Strict Priority (SP)

• Bandwidth percentage for each traffic class: By default each traffic class gets an equal share

The default mapping of priority to traffic classes (per interface) is as follows:

• Priority 0,1 mapped to TC 0

• Priority 2,3 mapped to TC 1

• Priority 4,5 mapped to TC 2

• Priority 6,7 mapped to TC 3

TC0 and TC3 are lossy TCs, while TC1 and TC2 can be lossless as well as lossy. It is possible but not recommended to map PFC enabled priorities (lossless traffic) to those

TC0 or TC3.

ETS is enabled by default (scheduling is WRR).

To set the scheduling mode to Strict Priority:

Step 1.

Run the command dcb ets disable

.

switch (config) # no dcb ets enable

To configure the WRR bandwidth percentage:

Step 1.

Make sure ETS feature is enabled. Run: switch (config) # dcb ets enable

Step 2.

Choose the WRR bandwidth rate and distribution.

By default the WRR distribution function is equal 25% per TC. Changing the WRR bandwidth rate will cause a change in the distribution function, for example if you wish to schedule more traffic on TC-0, TC-1, TC-2 while reducing the amount of traffic sent on TC-3, run the command dcb ets tc bandwidth. switch (config) # dcb ets tc bandwidth 30 30 30 10

# show dcb ets

ETS enabled

TC Bandwidth

--------------------------

0 30%

1 30%

2 30%

3 10%

Number of Traffic Class: 4 switch (config) #

Traffic class priorities are <0-3>, where 0 is the lowest and 3 is the highest.

Mellanox Technologies Confidential 642

Rev 4.20

The sum of all traffic class bandwidth value (in percentage) should be 100, otherwise the command fails.

Step 3.

Run the command show dcb ets

to verify the configuration.

switch (config) # show dcb ets

ETS enabled

TC Bandwidth

--------------------------

0 30%

1 30%

2 10%

3 30%

Number of Traffic Class: 4 switch (config) #

Mellanox Technologies Confidential 643

5.11.3 Commands

5.11.3.1 Enhanced Transmission Selection (ETS)

dcb ets enable

dcb ets enable no dcb ets enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets the switch egress scheduling mode to be weighted round robin.

The no form of the command sets the switch egress scheduling mode to be strict priority.

N/A

ETS is enabled.

Config

3.1.0000

admin switch (config)# dcb ets enable switch (config)# show dcb ets

ETS enabled

TC Bandwidth

--------------------------

0 25%

1 25%

2 25%

3 25%

Number of Traffic Class: 4

Rev 4.20

Related Commands

Note switch (config) # show dcb ets

Mellanox Technologies Confidential 644

dcb ets tc bandwidth

dcb ets tc bandwidth <tc-0> <tc-1> <tc-2> <tc-3> no dcb ets tc bandwidth

Configures the bandwidth limit of the traffic class.

The no form of the command sets the bandwidths per traffic class back to its default.

0-100.

Syntax Description

Default tc-i

25% per traffic class.

Configuration Mode Config

History

Role

Example

3.1.0000

admin switch (config)# dcb ets tc bandwidth 20 20 30 30 switch (config) # show dcb ets

ETS enabled

TC Bandwidth

--------------------------

0 20%

1 20%

2 30%

3 30%

Number of Traffic Class: 4 switch (config) #

Related Commands show dcb ets

Note The sum of all traffic class bandwidth must be equal to 100.

Rev 4.20

Mellanox Technologies Confidential 645

vlan map-priority

vlan map priority <priority> traffic-class <tc> no vlan map priority <priority>

Maps an VLAN user priority to a traffic class.

The no form of the command sets the mapping back to default.

N/A Syntax Description

Default Priority 0,1 mapped to tc 0.

Priority 2,3 mapped to tc 1.

Priority 4,5 mapped to tc 2.

Priority 6,7 mapped to tc 3.

Configuration Mode Config Interface Ethernet

History 3.1.0000

Role

Example admin switch (config interface ethernet 1/1) # vlan map-priority 1 trafficclass 2 switch (config interface ethernet 1/1) #

Related Commands show dcb ets interface

Note

Rev 4.20

Mellanox Technologies Confidential 646

show dcb ets

show dcb ets

Displays ETS configuration and operational data.

Syntax Description

Default ETS is enabled.

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config)# show dcb ets

ETS enabled

TC Bandwidth

--------------------------

0 25%

1 25%

2 25%

3 25%

Number of Traffic Class: 4 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 647

show dcb ets interface

show dcb ets interface <type> <number>

Syntax Description

Displays ETS configuration and operational data, per interface.

type ethernet or port-channel interface number, i.e. 1/1

Default number

ETS is enabled.

Configuration Mode Any Command Mode

History

Role

3.1.0000

admin

Rev 4.20

Mellanox Technologies Confidential 648

Example

Related Commands

Note switch (config)# show dcb ets interface ethernet 1/1

ETS Port Mode :ON MODE

ETS Oper State :INIT STATE

ETS State Machine Type :Assymetric

-----------------------------------------------

ETS Local Port Info

-----------------------------------------------

TC bandwidth table

-----------------------------------------------

TC Bandwidth RecomBandwidth

-----------------------------------------------

0 25% 25%

1 25% 25%

2 25% 25%

3 25% 25% priority assignment table

--------------------------------------

Priority TC

--------------------------------------

0 0

1 0

2 1

3 1

4 2

5 2

6 3

7 3

Number of Traffic Class: 4

Willing Status: Disable

-----------------------------------------------

ETS Admin Port Info

-----------------------------------------------

TC Bandwidth RecomBandwidth

-----------------------------------------------

0 30% 30%

1 30% 30%

2 30% 30%

3 10% 10%

-----------------------------------------------

ETS Remote Port Info

-----------------------------------------------

No Remote Entry is Present

----------------------------------------------switch (config) #

Rev 4.20

Mellanox Technologies Confidential 649

5.11.3.2 Priority Flow Control (PFC)

dcb priority-flow-control enable

dcb priority-flow-control enable [force] no dcb priority-flow-control enable [force]

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables PFC globally on the switch.

The no form of the command globally disables PFC on the switch.

force

PFC is disabled.

Forces operation

Config

3.1.0000

3.3.0000

admin

Updated Example switch (config)# dcb priority-flow-control enable

This action might cause traffic loss while shutting down a port with priority-flow-control mode on

Type 'yes' to confirm enable pfc globally: yes switch (config)# show dcb priority-flow-control

PFC enabled

Priority Enabled List :

Priority Disabled List :0 1 2 3 4 5 6 7

TC Lossless

--- ----------

0 N

1 Y

2 Y

3 N

Rev 4.20

Related Commands

Note

Interface PFC admin PFC oper

------------ -------------- -------------

1/1 Disabled Disabled

1/2 Disabled Disabled

1/3 Disabled Disabled

1/4 Disabled Disabled

...

switch (config) # show dcb priority-flow-control

This command asks the user to approve traffic loss because some interfaces with

DCB mode activated might get shut down.

Mellanox Technologies Confidential 650

dcb priority-flow-control priority

dcb priority-flow-control priority <prio> enable no dcb priority-flow-control priority <prio> enable

Syntax Description

Default

Enables PFC per priority on the switch.

The no form of the command disables PFC per priority on the switch.

prio 0-7.

PFC is disabled for all priorities.

Configuration Mode Config

History 3.1.0000

Role

Example admin switch (config)# dcb priority-flow-control priority 0 enable switch (config)# show dcb priority-flow-control

PFC enabled

Priority Enabled List : 0

Priority Disabled List : 1 2 3 4 5 6 7

TC Lossless

--- ----------

0 N

1 Y

2 Y

3 N

Interface PFC admin PFC oper

------------ -------------- -------------

1/1 Disabled Disabled

1/2 Disabled Disabled

1/3 Disabled Disabled

1/4 Disabled Disabled

...

switch (config) #

Related Commands show dcb priority-flow-control

Note

Rev 4.20

Mellanox Technologies Confidential 651

Rev 4.20

dcb priority-flow-control mode on

dcb priority-flow-control mode on [force] no dcb priority-flow-control mode

Syntax Description

Default

Enables PFC per interface.

The no form of the command disables PFC per interface.

force Force command implementation.

PFC is disabled for all interfaces.

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History 3.1.0000

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # dcb priority-flow-control mode on switch (config interface ethernet 1/1) # show dcb priority-flow-control

PFC enabled

Priority Enabled List : 0

Priority Disabled List : 1 2 3 4 5 6 7

TC Lossless

--- ----------

0 N

1 Y

2 Y

3 N

Interface PFC admin PFC oper

------------ -------------- -------------

1/1 On Enabled

1/2 Disabled Disabled

1/3 Disabled Disabled

1/4 Disabled Disabled

...

switch (config) #

Related Commands show dcb priority-flow-control

Note

Mellanox Technologies Confidential 652

Rev 4.20

show dcb priority-flow-control

show dcb priority-flow-control [interface <type> <inf>] [detail]

Syntax Description

Displays DCB priority flow control configuration and status. type • ethernet

• port-channel inf detail

The interface number.

Adds details information to the show output.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.0000

admin switch (config interface ethernet 1/1) # show dcb priority-flow-control

PFC enabled

Priority Enabled List : 0

Priority Disabled List : 1 2 3 4 5 6 7

TC Lossless

--- ----------

0 N

1 Y

2 Y

3 N

Interface PFC admin PFC oper

------------ -------------- -------------

1/1 On Enabled

1/2 Disabled Disabled

1/3 Disabled Disabled

1/4 Disabled Disabled

...

switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 653

Rev 4.20

5.12

Access Control List

An Access Control List (ACL) is a list of permissions attached to an object, to filter or match switches packets. When the pattern is matched at the hardware lookup engine, a specified action

(e.g. permit/deny) is applied. The rule fields represent flow characteristics such as source and destination addresses, protocol and VLAN ID.

ACL support currently allows actions of permit or deny rules, and supports only ingress direction. ACL search pattern can be taken from either L2 or L3 fields, e.g L2/L3 source and destination addresses, protocol, VLAN ID and priority or TCP port.

5.12.1 Configuring Access Control List

Access Control List (ACL) is configured by the user and is applied to a port once the ACL search engine matches search criteria with a received packet.

To configure ACL:

Step 1.

Step 2.

Log in as admin.

Enter config mode. Run: switch > enable switch # configure terminal

Step 3.

Step 4.

Step 5.

Create a MAC / IPv4 ACL (access-list) entity. switch (config) mac access-list mac-acl switch (config mac access-list mac-acl) #

Add a MAC / IP rules to the appropriate access-list. switch (config mac access-list mac-acl)seq-number 10 deny 0a:0a:0a:0a:0a:0a mask ff:ff:ff:ff:ff:ff any vlan 6 cos 2 protocol 80 switch (config mac access-list mac-acl) #

Bind the created access-list to an interface (slot/port or port-channel). switch (config) switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) # mac port access-group mac-acl

5.12.2 ACL Actions

An ACL action is a set of actions can be activated in case the packet hits the ACL rule.

To modify the VLAN tag of the egress traffic as part of the ACL “permit” rule:

Step 1.

Create access-list action profile: a.Create an action access-list profile using the command access-list action <action-profilename>

Step 2.

b.Add rule to map a VLAN using the command vlan-map <vlan-id> within the action profile configuration mode

Create an access-list and bind the action rule: a.Create an access-list profile using the command ipv4/mac access-list b.Add access list rule using the command deny/permit (action <action profile name>)

Mellanox Technologies Confidential 654

Step 3.

Bind the access-list to an interface using the command ipv4/mac port access-group

Create an action profile and add vlan mapping action: switch (config)#access-list action my-action switch (config access-list action my-action) # vlan-map 20 switch (config access-list action my-action) #exit

Create an access list and bind rules: switch (config)# mac access-list my-list switch (config mac access-list my-list)# permit any any action my-action switch (config mac access-list my-list)# exit

Bind an access-list to a port:

Switch (config)# interface ethernet 1/1

Switch (config interface ethernet 1/1)# mac port access-group my-list

Rev 4.20

Mellanox Technologies Confidential 655

5.12.3 Commands

ipv4/mac access-list

{ipv4 | mac} access-list <acl-name> no {ipv4 | mac} access-list <acl-name>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Creates a MAC or IPv4 ACL and enter the ACL configuration mode.

The no form of the command deletes the ACL.

ipv4 | mac acl-name

IPv4 or MAC – access list.

User defined string for the ACL.

No ACL available by default.

Config

3.1.1400

admin switch (config)# mac access-list my-mac-list switch (config mac access-list my-mac-list)# ipv4/port access-group

Rev 4.20

Mellanox Technologies Confidential 656

ipv4/mac port access-group

{ipv4 | mac} port access-list <acl-name> no {ipv4 | mac} port access-list <acl-name>

Syntax Description

Binds an ACL to the interface.

The no form of the command unbinds the ACL from the interface.

ipv4 | mac acl-name

IPv4 or MAC – access list.

ACL name.

Default

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

History

No ACL is bind by default.

3.1.1400

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch (config interface ethernet 1/1) # mac port access-group my-list switch (config interface ethernet 1/1) #

Related Commands ipv4/mac access-list

Note The access control list should be defined prior to the binding action.

Rev 4.20

Mellanox Technologies Confidential 657

Rev 4.20

deny/permit (MAC ACL rule)

[seq-number <sequence-number>] {deny|permit} {any | <source-mac> [mask

<mac>]} {any |<destination-mac> [mask <mac>]} [protocol <protocol>] [cos

<cos-value>] [vlan <vlan-id> | vlan-mask <vlan-mask>] [action <action-id>] no <sequence-number>

Syntax Description

Default

Creates a rule for MAC ACL.

The no form of the command deletes a rule from the MAC ACL.

sequence-number Optional parameter to set a specific sequence number for the rule. The range is:1-500.

deny | permit

{any | <source-mac>

[mask <mac>]}

Determines the type of the rule, denies or permits action.

Sets source MAC and optionally sets a mask for that

MAC. The “any” option will cause the rule not to check the source MAC.

{any | <destination-mac>

[mask <mac>]} protocol

Sets destination MAC and optionally sets a mask for that MAC. The “any” option will cause the rule not to check the destination MAC.

Sets the Ethertype filed value from the MAC address.

Possible range is: 0x0000-0xffff.

cos-value vlan-id vlan-mask <vlan-mask> action

Sets the COS (priority bits) field, possible range is: 0-7.

Sets the VLAN ID field, possible range is 0-4095.

Sets VLAN group. Range: 0x0000-0x0FFF.

Action name (free string).

No rule is added by default to access control list.

Default sequence number is in multiple of 10.

Configuration Mode Config MAC ACL

History 3.1.1400

Role

Example

3.3.4500

admin

Added vlan-mask parameter switch (config mac access-list my-list) # seq-number 10 deny

0a:0a:0a:0a:0a:0a mask ff:ff:ff:ff:ff:ff any vlan 6 cos 2 protocol 80 switch (config mac access-list my-list) #

Related Commands ipv4/mac access-list ipv4/mac port access-group

Note

Mellanox Technologies Confidential 658

Rev 4.20

deny/permit (IPv4 ACL rule)

[seq-number <sequence-number>] {permit | deny} ip {<source-ip> [mask <ip>] |

[any]} {<dest-ip> [mask <ip>] | [any]} [action <action-id>] no <sequence-number>

Syntax Description

Creates a rule for IPv4 ACL.

The no form of the command deletes a rule from the IPv4 ACL.

sequence-number Optional parameter to set a specific sequence number for the rule. The range is:1-500.

deny | permit

{any | <source-ip> [mask

<ip>]}

Determines the type of the rule, deny or permit action.

Valid mask values fall in the range 0-255.

Sets source IP and optionally sets a mask for that IP address. The “any” option causes the rule to not check the source IP.

Valid mask values fall in the range 0-255.

Default

{any | <destination-ip>

[mask <ip>]}

Sets destination IP and optionally sets a mask for that

MAC. The “any” option causes the rule to not check the destination MAC.

No rule is added by default to access control list.

Default sequence number is in multiple of 10.

Configuration Mode Config IPv4 ACL

History 3.1.1400

Role

Example

3.3.4302

admin

First version

Updated syntax description of mask <ip> parameter switch (config ipv4 access-list my-list) # seq-number 51 deny ip 1.1.1.1 mask 123.12.13.53 45.45.45.0 mask 123.132.21.123

switch (config ipv4 access-list my-list) #

Related Commands ipv4/mac access-list ipv4/mac port access-group

Note

Mellanox Technologies Confidential 659

Rev 4.20

deny/permit (IPv4 TCP/UDP ACL rule)

[seq-number <sequence-number>] {permit | deny} {tcp | udp} {<source-ip>

[mask <ip>] | [any]} {<dest-ip> [mask <ip>]| [any]} [eq-source <port-number>]

[eq-destination <port-number>] [action <action-id>] no <sequence-number>

Syntax Description

Creates a rule for IPv4 UDP/TCP ACL.

The no form of the command deletes a rule from the ACL.

sequence-number Optional parameter to set a specific sequence number for the rule. The range is:1-500.

deny | permit tcp | udp

{any | <source-ip> [mask

<ip>]}

Determines the type of the rule, deny or permit action.

UDP or TCP rule transport type.

{any | <destination-ip>

[mask <ip>]}

Sets source IP and optionally sets a mask for that IP address. The “any” option will cause the rule not to check the source IP.

Sets destination IP and optionally sets a mask for that

MAC. The “any” option will cause the rule not to check the destination MAC.

TCP/UDP source port number. Range is 0-65535.

[eq-source <port-number>]

[eq-destination <portnumber>]

TCP/UDP destination port number. Range is 0-65535.

Default No rule is added by default to access control list.

Default sequence number is in multiple of 10.

Configuration Mode Config IPv4 ACL

History 3.1.1400

Role

Example admin switch (config ipv4 access-list my-list) # seq-number 10 deny tcp any any eq-source 1200 switch (config ipv4 access-list my-list) #

Related Commands ipv4/mac access-list ipv4/mac port access-group

Note

Mellanox Technologies Confidential 660

access-list action

access-list action <action-profile-name> no access-list action <action-profile-name>

Syntax Description

Default

Creates access-list action profile and entering the action profile configuration mode.

The no form of the command deletes the action profile.

action-profile-name

N/A

Configuration Mode Config

History 3.2.0230

given name for the profile.

Role

Example admin switch (config)# access-list action my-action switch (config access-list action my-action)# show access-list action my-action

Access-list Action my-action

Mapped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |

================================================================

N/A |N/A |N/A |N/A | switch (config access-list action my-action)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 661

vlan-map

vlan-map <vlan-id> no vlan-map

Syntax Description

Default

Adds action to map a new VLAN to the packet (in the ingress port or VLAN).

The no form of the command removes the action to map a new VLAN.

vlan-id

N/A

Configuration Mode Config ACL Action

History 3.2.0230

0-4095.

Role

Example admin switch (config access-list action my-action)# vlan-map 10 switch (config access-list action my-action)# show access-list action my-action

Access-list Action my-action

Mapped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |

================================================================

10 |N/A |N/A |N/A | switch (config access-list action my-action)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 662

vlan-pop

vlan-pop

Syntax Description

Default

Pops VLAN frames from traffic.

vlan-id

N/A

Configuration Mode Config ACL Action

VLAN ID: 0-4095.

History

Role

Example

3.4.3000

admin switch (config access-list action my-action)# vlan-pop switch (config access-list action my-action)# show access-list action my-action

Access-list Action my-action

Popped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |

=====================================================================

N/A |N/A |N/A |N/A | switch (config access-list action my-action) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 663

vlan-push

vlan-push <vlan-id>

Syntax Description

Default

Pushes (or adds) VLAN frames to traffic.

vlan-id

N/A

Configuration Mode Config ACL Action

VLAN ID: 0-4095

History

Role

Example

3.4.3000

admin switch (config access-list action my-action)# vlan-push 10 switch (config access-list action my-action)# show access-list action my-action

Access-list Action my-action

Mapped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |

=========================================================

10 |N/A |N/A |N/A | switch (config access-list action my-action)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 664

show access-list action

show access-list action {<action-profile-name> | summary}

Syntax Description

Displays the access-list action profiles summary.

action-profile-name Filter the table according to the action profile name.

Display summary of the action list.

Default summary

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0230

admin witch (config)# show access-list action my-action

Access-list Action my-action

Mapped_Vlan_ID |Mapped_port |Counter_set |Policer_ID |

================================================================

10 |N/A |N/A |N/A | switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 665

Rev 4.20

show mac/ipv4 access-lists

show [mac |ipv4 |] access-lists <access-list-name>

Syntax Description

Displays the list of rules for the MAC/IPv4 ACL.

ipv4 | mac IPv4 or MAC - access list.

ACL name.

Default access-list-name

N/A

Configuration Mode Any Command Mode

History

History

Role

Example

3.1.1400

3.3.4500

Updated output admin switch (config mac access-list my-list) # show mac access-lists my-list mac access-list my-list seq-number|p/d |smac |dmac |protocol|cos |vlan |vlan-mask|action|

====================================================================

10 |deny |any |any |0800 |3 |3 |0x0FFF |none |

20 |deny |any |any |80 |2 |6 |0x0000 |none |

30 |deny |any |any |any |any |any |0x0ACB |none |

40 |deny |any |any |any |any |any |N/A |none | switch (config mac access-list my-list) #

Related Commands deny/permit (MAC ACL rule) deny/permit (IPv4 ACL rule) deny/permit (IPv4 TCP/UDP ACL rule) ipv4/mac access-list ipv4/mac port access-group

Note

Mellanox Technologies Confidential 666

show mac/ipv4 access-lists summary

show [mac |ipv4 |] access-lists summary

Syntax Description

Displays the summary of number of rules per ACL, and the interfaces attached.

ipv4 | mac IPv4 or MAC - Access list

ACL name

Default access-list-name

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.1.1400

admin switch (config) # show mac access-lists summary mac access-list my-list

Total ACEs Configured: 2

Configured on interfaces:

Ethernet 1/1

Ethernet 1/2 switch (config) #

Related Commands deny/permit (MAC ACL rule) deny/permit (IPv4 ACL rule) deny/permit (IPv4 TCP/UDP ACL rule) ipv4/mac access-list ipv4/mac port access-group

Note

Rev 4.20

Mellanox Technologies Confidential 667

5.13

Port Mirroring

Port mirroring enables data plane monitoring functionality which allows the user to send an entire traffic stream for testing. Port mirroring sends a copy of packets of a port’s traffic stream, called “mirrored port”, into an analyzer port. Port mirroring is used for network monitoring. It can be used for intrusion detection, security breaches, latency analysis, capacity and performance matters, and protocol analysis.

Figure 20

provides an overview of the mirroring functionality.

Figure 20: Overview of Mirroring Functionality

Rev 4.20

There is no limitation on the number of mirroring sources and more than a single source can be mapped to a single analyzer destination.

5.13.1 Mirroring Sessions

Port mirroring is performed by configuring mirroring sessions. A session is an association of a mirror port (or more) and an analyzer port.

Figure 21: Mirror to Analyzer Mapping

Mirror Port Session Analyzer Port

S1 A1

M1

ACL

M2

Port

M3

M4

LAG

S2

S7

A2

A m

M n

Mellanox Technologies Confidential 668

Rev 4.20

A mirroring session is a monitoring configuration mode that has the following parameters:

Table 47 - Mirroring Parameters

Parameter Description

Source interface(s) List of source interfaces to be mirrored.

Destination interface A single analyzer port through which all mirrored traffic egress.

Header format

Truncation

The format and encapsulation of the mirrored traffic when sent to analyzer.

Enabling truncation segments each mirrored packet to 64 bytes.

Congestion control

Admin state

Controls the behavior of the source port when destination port is congested.

Administrative state of the monitoring session.

Access

RW

RW

RW

RW

RW

RW

5.13.1.1 Source Interface

The source interface (mirror port) refers to the interface from which the traffic is monitored. Port mirroring does not affect the switching of the original traffic. The traffic is simply duplicated and sent to the analyzer port. Traffic in any direction (either ingress, egress or both) can be mirrored.

There is no limitation on the number of the source interfaces mapped to a mirroring session.

Ingress and egress traffic flows of a specific source interface can be mapped to two different sessions.

LAG

The source interface can be a physical interface or a LAG.

Port mirroring can be configured on a LAG interface but not on a LAG member. When a port is added to a mirrored LAG it inherits the LAG’s mirror configuration. However, if port mirroring configuration is set on a port, that configuration must be removed prior to adding the port to a

LAG interface.

When a port is removed from a LAG, the mirror property is switched off for that port.

Control Protocols

All control protocols captured on the mirror port are forwarded to the analyzer port in addition to their normal treatment. For example LACP, STP, and LLDP are forwarded to the analyzer port in addition to their normal treatment by the CPU.

Exceptions to the behavior above are the packets that are being handled by the MAC layer, such as pause frames.

5.13.1.2 Destination Interface

The destination interface is an analyzer port is one to which mirrored traffic is sent. The mirrored packets, are duplicated, optionally modified and sent to the analyzer port. The SwitchX® platform supports up to 7 analyzer ports where any mirror port can be mapped to any analyzer port and more than a single mirror port can be mapped to a single analyzer port.

Mellanox Technologies Confidential 669

Packets can be forwarded to any destination using the command destination interface.

The analyzer port supports status and statistics as any other port.

LAG

The destination interface cannot be a member of LAG when the header format is local.

Control Protocols

The destination interface may also operate in part as a standard port, receiving and sending out non-mirrored traffic. When the header format is configured as a local port, ingress control protocol packets that are received by the local analyzer port get discarded.

Advanced MTU Considerations

The analyzer port, like its counterparts, is subject to MTU configuration. It does not send packets longer than configured.

When the analyzer port sends encapsulated traffic, the analyzer traffic has additional headers and therefore longer frame. The MTU must be configured to support the additional length, otherwise, the packet is truncated to the configured MTU.

The system on the receiving end of the analyzer port must be set to handle the egress traffic. If it is not, it might discard it and indicate this in its statistics (packet too long).

5.13.1.3 Header Format

Ingress traffic from the source interface can be manipulated in several ways depending on the network layout using the command header-format.

If the analyzer system is directly connected to the destination interface, then the only parameters that can be configured on the port are the MTU, speed and port based flow control. Priority flow control is not supported is this case. However, if the analyzer system is indirectly connected to the destination interface, there are two options for switching the mirrored data to the analyzer system:

• A VLAN tag may be added to the Ethernet header of the mirrored traffic

• An Ethernet header can be added with include a new destination address and VLAN tag

Rev 4.20

It must be taken into account that adding headers increases packet size.

Mellanox Technologies Confidential 670

Rev 4.20

DA

DA

DA

DA

SA

Source Frame

Type/ 

Len

Data

SA

Source Frame

Type/ 

Len

Data

SA

Source Frame

Type/ 

Len

Data

SA

Source Frame

Type/ 

Len

Data

Figure 22: Header Format Options

Mirror Frame local

DA SA

Type/ 

Len

Data add‐vlan

Mirror Frame

DA SA 0x8100 VLAN

Type/ 

Len

Data add‐ethernet‐header add‐ethernet‐header

(+vlan)

Mirror Frame

DA SA 0x8949 DA SA

Type/ 

Len

Data

Mirror Frame

DA SA 0x8100 VLAN 0x8949 DA SA

Type/ 

Len

Data

5.13.1.4 Congestion Control

The destination ports might receive pause frames that lead to congestion in the switch port. In addition, too much traffic directed to the analyzer port (for example 40GbE mirror port is directed into 10G analyzer port) might also lead to congestion.

In case of congestion:

• When best effort mode is enabled on the analyzer port, SwitchX drops excessive traffic headed to the analyzer port using tail drop mechanism, however, the regular data (mirrored data heading to its original port) does not suffer from a delay or drops due to the analyzer port congestion.

• When the best effort mode on the analyzer port is disabled, the SwitchX does not drop the excessive traffic. This might lead to buffer exhaustion and data path packet loss.

The default behavior in congestion situations is to drop any excessive frames that may clog the system.

ETS, PFC and FC configurations do not apply to the destination port.

5.13.1.5 Truncation

When enabled, the system can truncate the mirrored packets into smaller 64-byte packets

(default) which is enough to capture the packets’ L2 and L3 headers.

5.13.2 Configuring Mirroring Sessions

Figure 23

presents two network scenarios with direct and remote connectivity to the analyzer equipment. Direct connectivity is when the analyzer is connected to the analyzer port of the switch. In this case there is no need for adding an L2 header to the mirrored traffic. Remote connectivity is when the analyzer is indirectly connected to the analyzer port of the switch. In this situation, adding an L2 header may be necessary depending on the network’s setup.

Mellanox Technologies Confidential 671

Figure 23: Mirroring Session

Rev 4.20

To configure a mirroring session:

Step 1.

Create a session. Run: switch (config) # monitor session 1

This command enters a monitor session configuration mode. Upon first implementation the command also creates the session.

Step 2.

Step 3.

Step 4.

Add source interface(s). Run: switch (config monitor session 1) # add source interface ethernet 1/1 direction both

Add destination interface. Run: switch (config monitor session 1) # destination interface ethernet 1/2

(Optional) Set header format. Run: switch (config monitor session 1) # header-format add-ethernet-header destination-mac

00:0d:ec:f1:a9:c8 add-vlan 10 priority 5 traffic-class 2

For remote connectivity use the header formats add-vlan or add-ethernet-header . For local connectivity, use local .

Step 5.

Step 6.

(Optional) Truncate the mirrored traffic to 64-byte packets. Run: switch (config monitor session 1) # truncate

(Optional) Set congestion control. Run: switch (config monitor session 1) # congestion pause-excessive-frames

The default for this command is to drop excessive frames. The pause-excessiveframes option uses flow control to regulate the traffic from the source interfaces.

Mellanox Technologies Confidential 672

Rev 4.20

If the option pause-excessive-frame is selected, make sure that flow control is enabled on all source interfaces on the ingress direction of the monitoring session using the command flowcontrol in the interface configuration mode.

Step 7.

Enable the session. Run: switch (config monitor session 1) # no shutdown

5.13.3 Verifying Mirroring Sessions

To verify the attributes of a specific mirroring session: switch (config) # show monitor session 1

Admin: Enable

Status: Up

Truncate: Enable

Destination interface: eth1/2

Congestion type: pause-excessive-frames

Header format: add-ethernet-header

- traffic class 2

- vlan 10

- priority 5

- destination-mac 00:0d:ec:f1:a9:c8

Source interfaces

Interface direction

------------------------eth1/1 both

To verify the attributes of running mirroring sessions: switch (config) # show monitor session summary

Session Admin Status Mode Destination Source

1 Enable Up add-eth eth1/2 eth1/1(b)

2 Disable Down add-vlan eth1/2 eth1/8(i), po1(e)

3 Enable Up add-eth eth1/5 eth1/18(e)

7 Disable Down local

Mellanox Technologies Confidential 673

5.13.4 Commands

5.13.4.1 Config

monitor session

monitor session <session-id> no monitor session <session-id>

Syntax Description

Default

Configuration Mode

History

Role

Example

Creates session and enters monitor session configuration mode upon using this command for the first time.

The no form of the command deletes the session.

session-id

N/A

The monitor session ID. The range is 1-7.

Config

3.3.3500

admin switch (config)# monitor session 1 switch (config monitor session 1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 674

5.13.4.2 Config Monitor Session

destination interface

destination interface <type> <number> [force] no destination interface

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets the egress interface number.

The no form of the command deletes the destination interface.

interface <type> <number>

Sets the interface type and number (e.g. ethernet 1/2) force The user does not need to shutdown the port prior the operation.

no destination interface

Config Monitor Session

3.3.3500

3.3.4100

admin

First version

Added force argument switch (config monitor session 1) # destination interface ethernet 1/2 switch (config monitor session 1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 675

shutdown

shutdown no shutdown

Syntax Description

Default

Disables the session.

The no form of the command enables the session.

N/A

Disabled

Configuration Mode Config Monitor Session

History 3.3.3500

Role

Example admin switch (config monitor session 1) # no shutdown switch (config monitor session 1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 676

add source interface

add source interface <type> <number> direction <d-type> no source interface <type> <number>

Syntax Description

Adds a source interface to the mirrored session.

The no form of the command deletes the source interface.

interface <type> <number>

Configures interface as “ethernet” or “port-channel”.

direction <d-type> Configures the direction of the mirrored traffic. The options are as follows:

• egress – sets the egress traffic to be monitored

• ingress – sets the ingress traffic to be monitored

• both – sets egress and ingress traffic to be monitored

Default N/A

Configuration Mode Config Monitor Session

History

Role

Example

3.3.3500

admin switch (config monitor session 1) # add source interface ethernet 1/1 direction both switch (config monitor session 1)#

Related Commands

Note If mirroring is configured in one direction (e.g. ingress) on an interface and then is configured in the other direction (e.g. egress), then the ultimate setting is “both”.

Rev 4.20

Mellanox Technologies Confidential 677

Rev 4.20

header-format

header-format {local [traffic-class <tc>] | add-vlan <vlan-id> [priority <prio>]

[traffic-class <tc>] | add-ethernet-header destination-mac <mac-address> [addvlan <vlan-id> [priority <prio>]] [traffic-class <tc>]} no header-format

Syntax Description

Sets the header format of the mirrored traffic.

The no form of the command resets the parameter values back to default.

local traffic-class <tc>

The mirrored header of the frame is not changed.

Changes the egress traffic class of the frame. Range is

0-3.

add-vlan <vlan-id> priority <prio> add-ethernet-header destination-mac

An 802.1q VLAN tag is added to the frame.

The priority to be added to the Ethernet header. Range is 0-7.

Adds an Ethernet header to the mirrored frame.

The destination MAC address of the added Ethernet frame.

Default no-change vlan 1 priority 0 traffic-class 0

Configuration Mode Config Monitor Session

History 3.3.3500

Role

Example admin switch (config monitor session 1) # header-format add-ethernet-header destination-mac 00:0d:ec:f1:a9:c8 add-vlan 10 priority 5 traffic-class

2 switch (config monitor session 1)#

Related Commands

Note If add-ethernet-header is used, the source MAC address is the one attached to the switch.

Mellanox Technologies Confidential 678

truncate

truncate no truncate

Syntax Description

Default

Truncates the mirrored frames to 64-byte packets.

The no form of the command disables truncation.

N/A no truncate

Configuration Mode Config Monitor Session

History 3.3.3500

Role

Example admin switch (config monitor session 1) # truncate switch (config monitor session 1)#

Related Commands

Note This command applies for all sessions on the same analyzer port.

Rev 4.20

Mellanox Technologies Confidential 679

congestion

congestion [drop-excessive-frames | pause-excessive-frames] no congestion

Syntax Description

Sets the system’s behavior when congested

The no form of the command disables truncation.

drop-excessive-frames pause-excessive-frames

Drops excessive frames.

Pauses excessive frames.

Default drop-excessive-frames

Configuration Mode Config Monitor Session

History 3.3.3500

3.3.4000

Role

Example

Added Syntax Description.

admin switch (config monitor session 1) # congestion pause-excessive-frames switch (config monitor session 1)#

Related Commands

Note This command applies for all sessions on the same analyzer port.

Rev 4.20

Mellanox Technologies Confidential 680

5.13.4.3 Show

show monitor session

show monitor session <session-id>

Syntax Description

Default

Configuration Mode

History

Role

Example

Displays monitor session configuration and status.

session-id The monitor session ID. Range is 1-7.

N/A

Any Command Mode

3.3.3500

admin switch (config) # show monitor session 1

Admin: Enable

Status: Up

Truncate: Enable

Destination interface: eth1/2

Congestion type: pause-excessive-frames

Header format: add-ethernet-header

- traffic class 2

- vlan 10

- priority 5

- destination-mac 00:0d:ec:f1:a9:c8

Source interfaces

Interface direction

------------------------eth1/1 both switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 681

show monitor session summary

show monitor session summary

Syntax Description

Default

Displays monitor session configuration and status summary.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin switch (config) # show monitor session summary

Session Admin Status Mode Destination Source

1 Enable Up add-eth eth1/2 eth1/1(b)

2 Disable Down add-vlan eth1/2 eth1/8(i), po1(e)

3 Enable Up add-eth eth1/5 eth1/18(e)

7 Disable Down local switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 682

5.14

sFlow

sFlow (ver. 5) is a procedure for statistical monitoring of traffic in networks. MLNX-OS supports an sFlow sampling mechanism (agent), which includes collecting traffic samples and data from counters. The sFlow datagrams are then sent to a central collector.

The sampling mechanism must ensure that any packet going into the system has an equal chance of being sampled, irrespective of the flow to which it belongs. The sampling mechanism provides the collector with periodical information on the amount (and load) of traffic per interface by loading the counter samples into sFlow datagrams.

The sFlow packets are encapsulated and sent in UDP over IP. The UDP port number that is used is the standard 6343 by default.

Figure 24: sFlow Functionality Overview

Rev 4.20

5.14.1 Flow Samples

The sFlow agent samples the data path based on packets.

Truncation and sampling rate are the two parameters that influence the flow samples. In case of congestion the flow samples can be truncated to a predefined size before it is assigned to the

CPU. The truncation can be set to any value between 64 to 256 bytes with the default being 128 bytes.

The sampling rate can be adjusted by setting an average rate. The system assures that a random number of packets is sampled, however, the sample rate on average converges to the configured rate. Valid values range between 4000 to 16777215 packets.

5.14.2 Statistical Samples

The sFlow agent samples interface counters time based. Polling interval is configurable to any value between 5-3600 seconds with the default being 20 seconds.

The following statistics are gathered by the CPU:

Table 48 - List of Statistical Counters

Counter

Total packets

Description

The number of packets that pass through sFlow-enabled ports.

Mellanox Technologies Confidential 683

Table 48 - List of Statistical Counters

Counter

Number of flow samples

Number of statistic samples

Number of discarded samples

Number of datagrams

Description

The number of packets that are captured by the sampling mechanism.

The number of statistical samples.

The number of samples that were discarded.

The number of datagrams that were sent to the collector.

5.14.3 sFlow Datagrams

The sFlow datagrams contain flow samples and statistical samples.

The sFlow mechanism uses IP protocol, therefore if the packet length is more than the interface

MTU, it becomes fragmented by the IP stack. The MTU may also be set manually to anything in the range of 200-9216 bytes. The default is 1400 bytes.

5.14.4 Sampled Interfaces sFlow must be enabled on physical or LAG interfaces that require sampling. When adding a port to a LAG, sFlow must be disabled on the port. If a port with enabled sFlow is configured to be added to a LAG, the configuration is rejected. Removing a port from a LAG disables sFlow on the port regardless of the LAG’s sFlow status.

5.14.5 Configuring sFlow

To configure the sFlow agent:

Step 1.

Unlock the sFlow commands. Run: switch (config) # protocol sflow

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Enable sFlow on the system. Run: switch (config) # sflow enable

Enter sFlow configuration mode. Run: switch (config) # sflow switch (config sflow) #

Set the central collector’s IP. Run: switch (config sflow) # collector-ip 10.10.10.10

Set the agent-ip used in the sFlow header. Run: switch (config sflow) # agent-ip 20.20.20.20

(Optional) Set the sampling rate of the mechanism. Run: switch (config sflow) # sampling-rate 16000

Rev 4.20

This means that one every 16000 packet gets collected for sampling.

Mellanox Technologies Confidential 684

Step 7.

Step 8.

Step 9.

(Optional) Set the maximum size of the data path sample. Run: switch (config sflow) # max-sample-size 156

(Optional) Set the frequency in which counters are polled. Run: switch (config sflow) # counter-poll-interval 19

(Optional) Set the maximum size of the datagrams sent to the central collector. Run: switch (config sflow) # max-datagram-size 1500

Step 10.

Enable the sFlow agent on the desired interfaces. Run: switch (config interface ethernet 1/1)# sflow enable switch (config interface port-channel 1)# sflow enable

5.14.6 Verifying sFlow

To verify the attributes of the sFlow agent: switch (config)# show sflow sflow protocol enabled sflow enabled sampling-rate 16000 max-sampled-size 156 counter-poll-interval 19 max-datagram-size 1500 collector-ip 10.10.10.10

collector-port 6343 agent-ip 20.20.20.20

Interfaces

Ethernet: eth1/1

Port-channel: po1

Statistics:

Total Packets: 2000

Number of flow samples: 1200

Number of samples discarded: 0

Number of statistic samples: 800

Number of datagrams: 300

Rev 4.20

Mellanox Technologies Confidential 685

5.14.7 Commands

5.14.7.1 Config

protocol sflow

protocol sflow no protocol sflow

Syntax Description

Default

Configuration Mode

History

Role

Example

Unhides the sFlow commands.

The no form of the command deletes sFlow configuration and hides the sFlow commands.

N/A

Disabled

Config

3.3.3500

admin switch (config) # protocol sflow switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 686

sflow enable (global)

sflow enable no sflow enable

Syntax Description

Default

Enables sFlow in the system.

The no form of the command disables sFlow without deleting the configuration.

N/A

Disabled

Configuration Mode Config

History 3.3.3500

Role

Example admin switch (config) # sflow enable switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 687

sflow

sflow

Syntax Description

Default

Enters sFlow configuration mode.

N/A

N/A

Configuration Mode Config

History

Role

Example

3.3.3500

admin switch (config) # sflow switch (config sflow) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 688

Rev 4.20

5.14.7.2 Config sFlow

sampling-rate

sampling-rate <rate> no sampling-rate

Syntax Description

Default

Configuration Mode

History

Role

Example

Sets sFlow sampling ratio.

The no form of the command resets this parameter to its default value.

rate Sets the number of packets passed before selecting one for sampling. The range is 4000-16777215. Zero disables sampling.

16000

Config sFlow

3.3.3500

admin switch (config sflow) # sampling-rate 16111 switch (config sflow) #

Related Commands

Note

Mellanox Technologies Confidential 689

max-sample-size

max-sample-size <packet-size> no max-sample-size

Syntax Description

Default

Sets the maximum size of sampled packets by sFlow.

The no form of the command resets the parameter to its default value.

packet-size

128 bytes

Configuration Mode Config sFlow

History 3.3.3500

The sampled packet size. The range is 64-256 bytes.

Role

Example admin switch (config sflow) # max-sample-size 165 switch (config sflow) #

Related Commands

Note Sampled payload beyond the configured size is discarded.

Rev 4.20

Mellanox Technologies Confidential 690

Rev 4.20

counter-poll-interval

counter-poll-interval <seconds> no counter-poll-interval

Syntax Description

Sets the sFlow statistics polling interval.

The no form of the command resets the parameter to its default value.

seconds The sFlow statistics polling interval in seconds. Range is 5-3600 seconds. Zero disables the statistic polling.

Default 20 seconds

Configuration Mode Config sFlow

History

Role

Example

3.3.3500

admin switch (config sflow) # counter-poll-interval 30 switch (config sflow) #

Related Commands

Note

Mellanox Technologies Confidential 691

Rev 4.20

max-datagram-size

max-datagram-size <packet-size> no max-datagram-size

Syntax Description

Sets the maximum sFlow packet size to be sent to the collector.

The no form of the command resets the parameter to its default value.

packet-size The packet size of the packet being sent to the collector.

The range is 200-9216 bytes.

Default 1400 bytes

Configuration Mode Config sFlow

History

Role

Example

3.3.3500

admin switch (config sflow) # max-datagram-size 9216 switch (config sflow) #

Related Commands

Note This packet contains the data sample as well as the statistical counter data.

Mellanox Technologies Confidential 692

collector-ip

collector-ip <ip-address> [udp-port <udp-port-number>] no collector-ip [<ip-address> udp-port]

Syntax Description

Sets the collector’s IP.

The no form of the command resets the parameters to their default values.

ip-address udp-port <udp-port-number>

The collector IP address.

Sets the collector UDP port number.

Default

Configuration Mode Config sFlow

History 3.3.3500

Role

Example ip-address: 0.0.0.0

udf-port-number: 6343 admin switch (config sflow) # collector-ip 10.10.10.10

switch (config sflow) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 693

Rev 4.20

agent-ip

agent-ip {<ip-address> | interface [ethernet <slot/port> | port-channel <channelgroup>] | <if-name> | loopback <number> | vlan <id>} no agent-ip

Syntax Description

Sets the IP address associated with this agent.

The no form of the command resets the parameters to their default values.

interface Configures a specific ethernet/port-channel interface’s agent IP.

if-name ip-address

Interface name (e.g. mgmt0, mgmt1).

The sFlow agent’s IP address (i.e. the source IP of the packet).

loopback <number> vlan <id>

Default ip-address: 0.0.0.0

Configuration Mode Config sFlow

History 3.3.3500

3.3.5200

Role

Example

Loopback interface number. Range: 1-32.

Interface VLAN. Range: 1-4094.

Updated “interface” parameters admin switch (config sflow) # agent-ip 20.20.20.20

switch (config sflow) #

Related Commands

Note The IP address here is used in the sFlow header.

Mellanox Technologies Confidential 694

clear counters

clear counters

Syntax Description

Default

Clears sFlow counters.

N/A

N/A

Configuration Mode Config sFlow

History

Role

Example

3.3.3500

admin switch (config sflow) # clear counters switch (config sflow) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 695

sflow enable (interface)

sflow enable no sflow enable

Enables sFlow on this interface.

The no form of the command disables sFlow on the interface.

N/A Syntax Description

Default

History disable no view-port-channel member

Configuration Mode Config Interface Ethernet

Config Interface Port Channel

Config Interface MLAG Port Channel

3.3.3500

3.3.4500

Added MLAG port-channel configuration mode

Role

Example admin switch(config interface ethernet 1/1)# sflow enable

...

switch(config interface port-channel 1)# sflow enable

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 696

5.14.7.3 Show

show sflow

show sflow

Syntax Description

Default

Configuration Mode

History

Role

Example

Displays sFlow configuration and counters.

N/A

N/A

Any Command Mode

3.3.3500

admin switch (config)# show sflow sflow protocol enabled sflow enabled sampling-rate 16000 max-sampled-size 156 counter-poll-interval 19 max-datagram-size 1500 collector-ip 10.10.10.10

collector-port 6343 agent-ip 20.20.20.20

Interfaces

Ethernet: eth1/1

Port-channel: po1

Statistics:

Total Packets: 2000

Number of flow samples: 1200

Number of samples discarded: 0

Number of statistic samples: 800

Number of datagrams: 300

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 697

5.15

Transport Applications

5.15.1 RDMA over Converged Ethernet (RoCE)

5.15.1.1 RoCE Overview

Remote Direct Memory Access (RDMA) is the remote memory management capability that allows server to server data movement directly between application memory without any CPU involvement. RDMA over Converged Ethernet (RoCE) is a mechanism to provide this efficient data transfer with very low latencies on loss-less Ethernet networks. With advances in data center convergence over reliable Ethernet, ConnectX® EN with RoCE uses the proven and efficient

RDMA transport to provide the platform for deploying RDMA technology in mainstream data center application at 10GigE and 40GigE link-speed. ConnectX® EN with its hardware offload support takes advantage of this efficient RDMA transport (InfiniBand) services over Ethernet to deliver ultra-low latency for performance-critical and transaction intensive applications such as financial, database, storage, and content delivery networks. RoCE encapsulates IB transport and

GRH headers in Ethernet packets bearing a dedicated ether type. While the use of GRH is optional within InfiniBand subnets, it is mandatory when using RoCE. Applications written over

IB verbs should work seamlessly, but they require provisioning of GRH information when creating address vectors. The library and driver are modified to provide mapping from GID to MAC addresses required by the hardware.

5.15.1.1.1IP Routable (RoCEv2)

A straightforward extension of the RoCE protocol enables traffic to operate in layer 3 environments. This capability is obtained via a simple modification of the RoCE packet format. Instead of the GRH used in RoCE, routable RoCE packets carry an IP header which allows traversal of

IP L3 Routers and a UDP header that serves as a stateless encapsulation layer for the RDMA

Transport Protocol Packets over IP.

Figure 25: RoCEv2 and RoCE Frame Format Differences

Rev 4.20

The proposed RoCEv2 packets use a well-known UDP destination port value that unequivocally distinguishes the datagram. Similar to other protocols that use UDP encapsulation, the UDP source port field is used to carry an opaque flow-identifier that allows network devices to implement packet forwarding optimizations (e.g. ECMP) while staying agnostic to the specifics of the protocol header format.

Mellanox Technologies Confidential 698

Furthermore, since this change exclusively affects the packet format on the wire, and due to the fact that with RDMA semantics packets are generated and consumed below the AP applications can seamlessly operate over any form of RDMA service (including the routable version of RoCE as shown in Figure 2), in a completely transparent way

1

.

Figure 26: RoCEv2 Protocol Stack

Rev 4.20

5.15.1.2 RoCE Configuration

In order to function reliably, RoCE requires a form of flow control. While it is possible to use global flow control, this is normally undesirable, for performance reasons.

The normal and optimal way to use RoCE is to use Priority Flow Control (PFC). To use PFC, it must be enabled on all endpoints and switches in the flow path.

In the following section we present instructions to configure PFC on Mellanox ConnectX™ cards. There are multiple configuration steps required, all of which may be performed via Power-

Shell. Therefore, although we present each step individually, you may ultimately choose to write a PowerShell script to do them all in one step. Note that administrator privileges are required for these steps.

For further information, please refer to the following URL: http://blogs.technet.com/b/josebda/archive/2012/07/31/deploying-windows-server-2012-withsmb-direct-smb-over-rdma-and-the-mellanox-connectx-3-using-10gbe-40gbe-roce-step-bystep.aspx

5.15.1.2.1Prerequisites

The following are the driver’s prerequisites in order to set or configure RoCE:

• ConnectX®-3 and ConnectX®-3 Pro firmware version 2.30.3000 or higher

1. Standard RDMA APIs are IP based already for all existing RDMA technologies

Mellanox Technologies Confidential 699

• All InfiniBand verbs applications which run over InfiniBand verbs should work on RoCE links if they use GRH headers.

• Set HCA to use Ethernet protocol:

Display the Device Manager and expand “System Devices”.

5.15.1.2.2Configuring Windows Host

Since PFC is responsible for flow controlling at the granularity of traffic priority, it is necessary to assign different priorities to different types of network traffic.

As per RoCE configuration, all ND/NDK traffic is assigned to one or more chosen priorities, where PFC is enabled on those priorities.

Configuring Windows host requires configuring QoS.

5.15.1.2.2.1 Using Global Pause Flow Control (GFC)

To use Global Pause Flow Control (GFC) mode, disable QoS and Priority:

PS $ Disable-NetQosFlowControl

PS $ Disable-NetAdapterQos

5.15.1.3 Configuring SwitchX® Based Switch System

To enable RoCE, the SwitchX should be configured as follows:

• Ports facing the host should be configured as access ports, and either use global pause or Port

Control Protocol (PCP) for priority flow control

• Ports facing the network should be configured as trunk ports, and use Port Control Protocol

(PCP) for priority flow control

For further information on how to configure SwitchX, please refer to SwitchX User Manual.

5.15.1.4 Configuring Router (PFC only)

The router uses L3's DSCP value to mark the egress traffic of L2 PCP. The required mapping, maps the three most significant bits of the DSCP into the PCP. This is the default behavior, and no additional configuration is required.

5.15.1.4.1Copying Port Control Protocol (PCP) Between Subnets

The captured PCP option from the Ethernet header of the incoming packet can be used to set the

PCP bits on the outgoing Ethernet header.

5.15.1.5 Configuring the RoCE Mode

Configuring the RoCE mode requires the following:

• RoCE mode is configured per-driver and is enforced on all the devices in the system

The supported RoCE modes depend on the firmware installed. If the firmware does not support the needed mode, the fallback mode would be the maximum supported RoCE mode of the installed NIC.

RoCE mode can be enabled and disabled via PowerShell.

Rev 4.20

Mellanox Technologies Confidential 700

To enable RoCE using the PowerShell:

• Open the PowerShell and run:

Set-MlnxDriverCoreSetting –RoceMode 1

To enable RoCEv2 using the PowerShell:

• Open the PowerShell and run:

Set-MlnxDriverCoreSetting –RoceMode 2

To disable any version of RoCE using the PowerShell:

Open the PowerShell and run:

Set-MlnxDriverCoreSetting –RoceMode 0

To check current version of RoCE using the PowerShell:

Step 1.

Open the PowerShell and run:

Get-MlnxDriverCoreSetting

Step 2.

Example output:

Caption : DriverCoreSettingData 'mlx4_bus'

Description : Mellanox Driver Option Settings

.

.

.

RoceMode : 0

Rev 4.20

Mellanox Technologies Confidential 701

5.16 802.1x Protocol

The 802.1x standard describes a way to authenticate hosts (or supplicants) and to allow connection only to a list of allowed hosts pre-configured on an authentication server. The authentication is performed by the switch (authenticator) which negotiates the authentication with a RADIUS server (authentication server). This allows to block traffic from non-authenticated sources.

The 802.1x protocol defines the following roles:

• Supplicant – the host. It provides the authentication credentials to the authenticator and awaits approval.

• Authenticator – the device that connects the supplicant to the network, and checks the authentication with the authentication server. The authenticator is also in charge of blocking and isolating of new client till authenticated and allowing communication once the client has passed the authentication. Mellanox switch acts as an authenticator.

• Authentication server – a RADIUS server which can authenticate the user.

Rev 4.20

The 802.1x is available only on access physical ports. It is not available on LAG and

MLAG ports.

A local analyzer port cannot support 802.1x protocol.

802.1x cannot be activated on router ports.

802.1x cannot run on a port configured to switchport trunk or hybrid.

Management interfaces cannot be configured as 802.1x port access entity (PAE) authenticators.

5.16.1 802.1x Operating Modes

The following operating modes are supported in 802.1x:

• Single host – only one supplicant can communicate through the port.

Once authentication of the supplicant is accepted by the authentication server, the switch allows it access. If the supplicant logs off or the port state is changed, the port becomes unauthenticated. And if a different supplicant tries to access through this port, its bidirectional traffic is discarded (including authentication traffic).

Mellanox Technologies Confidential 702

Rev 4.20

An exception to this is multicast and broadcast traffic which do get transmitted over the interface once authenticated and are exposed to an unauthorized supplicant if it exists.

• Multi-host mode – allows connection of multiple hosts over a single port. Only the first supplicant is authenticated. Subsequent hosts have network access without the need to authenticate.

5.16.2 Configuring 802.1x

To configure 802.1x on the switch

Step 1.

Enable 802.1x protocol. Run: switch (config) # protocol dot1x

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Step 7.

Enable the system as authenticator. Run: switch (config) # dot1x system-auth-control

Configure RADIUS server parameters. Run: switch (config) # dot1x radius-server host 10.10.10.10 key my4uth3nt1c4t10nk3y retransmit 2 timeout 3

Enter the configuration mode of an Ethernet interface. Run: switch (config) # interface ethernet 1/1 switch (config interface ethernet 1/1) #

Configure the interface as a port access entity authenticator. Run: switch (config interface ethernet 1/1) # dot1x pae authenticator

Configure the interface to perform authentication on ingress traffic. Run: switch (config interface ethernet 1/1) # dot1x port-control auto

Verify 802.1x configuration. Run: switch (config interface ethernet 1/1) # show dot1x interfaces ethernet 1/1

Eth1/1

PAE Status: Enabled

Configured host mode: Multi-host

Configured port-control: Auto

Authentication status: Unauthorized

Re-Authentication: Disabled

Re-Authentication period (sec): -

Tx wait period (sec): 30

Quiet period (sec): 60

Max request retry: 2

Last EAPOL RX source MAC: 00:00:00:00:00:00 switch (config interface ethernet 1/1)#

Mellanox Technologies Confidential 703

5.16.3 Commands

protocol dot1x

protocol dot1x no protocol dot1x

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables 802.1x EAPOL protocol.

The no form of the command disables 802.1x EAPOL protocol.

N/A

Disabled

Config

3.4.2008

admin switch (config)# protocol dot1x

Rev 4.20

Mellanox Technologies Confidential 704

dot1x clear-statistics

dot1x clear-statistics

Syntax Description

Default

Resets the 802.1x counters on all or a specific port.

N/A

N/A

Configuration Mode Config

Config Interface Ethernet

History

Role

Example

Related Commands

Note

3.4.2008

admin switch (config)# dot1x clear-statistics

Rev 4.20

Mellanox Technologies Confidential 705

dot1x pae authenticator

dot1x pae authenticator no dot1x pae authenticator

Syntax Description

Default

Configures the port as a 802.1x port access entity (PAE) authenticator.

The no form of the command disables the port from being a 802.1x PAE authenticator.

N/A

Disabled

Configuration Mode Config Interface Ethernet

History 3.4.2008

Role

Example

Related Commands

Note admin switch (config interface ethernet 1/2)# dot1x system-auth-control

Rev 4.20

Mellanox Technologies Confidential 706

dot1x host-mode

dot1x host-mode [multi-host | single-host] no dot1x host-mode

Syntax Description

Default single-host

Configuration Mode Config Interface Ethernet

History 3.4.2008

3.4.2300

Role

Example

Added “single-host” option admin switch (config interface ethernet 1/2)# dot1x host-mode single-host

Related Commands

Note

Configures the authentication mode to either multi-host or single-host.

The no form of the command resets the parameter to its default.

multi-host single-host

Sets the interface to operate in a port-based mode

Sets the interface to operate in a MAC-based mode with support of a single supplicant per interface

Rev 4.20

Mellanox Technologies Confidential 707

dot1x port-control

dot1x port-control [auto | force-authorized | force-unauthorized] no dot1x port-control

Syntax Description

Configures 802.1x port access entity (PAE) port-control.

The no form of the command resets the parameter to its default.

auto The authenticator uses PAE authentication services to allow or block the port traffic force-authorized force-unauthorized

Allows traffic on this port regardless of supplicant authorization

Blocks traffic on this port regardless of supplicant authorization

Default Force-authorized

Configuration Mode Config Interface Ethernet

History

Role

3.4.2008

admin switch (config interface ethernet 1/2)# dot1x port-control auto Example

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 708

Rev 4.20

dot1x radius-server host

dot1x radius-server host <IP address> [enable | auth-port <port> | key <password> | prompt-key | retransmit <retries> | timeout <seconds>] no dot1x radius-server host <IP address> enable

Syntax Description

Default auth-port: 1812 key: empty string retransmit: 1 timeout: 3

Configuration Mode Config

History 3.4.2008

Role

Example admin switch (config)# dot1x radius-server host 10.10.10.10 auth-port 65535 prompt-key enable

Related Commands

Note

Configure 802.1x RADIUS server IP address.

The no form of the command disables 802.1x RADIUS server.

auth-port Sets 802.1x RADIUS port to use with this server.

Range: 1-65535.

enable key prompt-key retransmit

Sets 802.1x RADIUS as administratively enabled

Configures 802.1x global RADIUS shared secret for servers.

Prompts for key, rather than entering on command line timeout

Configure 802.1x global RADIUS retransmit count for servers. The time configured is in seconds. Range: 0-5.

Configures 802.1x global RADIUS timeout value for servers. The time configured is in seconds. Range: 1-

60.

• The no form of the various parameters resets them to their default values as indicated in the

Default section above

• It is possible to configure up to 5 RADIUS servers

• It is possible to configure only 1 authentication port per RADIUS server IP

Mellanox Technologies Confidential 709

dot1x reauthenticate

dot1x reauthenticate no dot1x reauthenticate

Syntax Description

Default

Enables supplicant re-authentication according to the configuration of command

“dot1x timeout reauthentication”

.

The no form of the command disables supplicant re-authentication.

N/A

No re-authentication

Configuration Mode Config Interface Ethernet

History 3.4.2008

Role

Example

Related Commands

Note admin switch (config interface ethernet 1/2)# dot1x reauthenticate

Rev 4.20

Mellanox Technologies Confidential 710

dot1x system-auth-control

dot1x system-auth-control no dot1x system-auth-control

Syntax Description

Default

Enables the system as authenticator.

The no form of the command disables the system as authenticator.

N/A

Disabled

Configuration Mode Config

History 3.4.2008

Role

Example

Related Commands

Note admin switch (config)# dot1x system-auth-control

Rev 4.20

Mellanox Technologies Confidential 711

Rev 4.20

dot1x timeout reauthentication

dot1x timeout reauthentication <period> no dot1x timeout reauthentication

Syntax Description

Default

Configures the number of seconds between re-authentication attempts.

The no form of the command resets the parameter to its default.

period

3600 seconds

Configuration Mode Config Interface Ethernet

History 3.4.2008

Time in second. Range: 1-65535 seconds.

Role

Example admin switch (config interface ethernet 1/2)# dot1x timeout reauthentication

3600

Related Commands

Note

Mellanox Technologies Confidential 712

dot1x timeout quiet-period

dot1x timeout quiet-period <period> no dot1x timeout quiet-period

Syntax Description

Default

Configures the number of seconds that the authenticator remains quiet following a failed authentication exchange with the supplicant.

The no form of the command resets the parameter to its default.

period

60 seconds

Configuration Mode Config Interface Ethernet

History 3.4.2008

Time in second. Range: 1-65535 seconds.

Role

Example

Related Commands

Note admin switch (config interface ethernet 1/2)# dot1x timeout quiet-period 60

Rev 4.20

Mellanox Technologies Confidential 713

dot1x timeout tx-period

dot1x timeout tx-period <period> no dot1x timeout tx-period

Syntax Description

Default

Configures the maximum number of seconds that the authenticator waits for supplicant response of EAP-request/identify frame before retransmitting the request.

The no form of the command resets the parameter to its default.

period

30 seconds

Configuration Mode Config Interface Ethernet

History 3.4.2008

Time in second. Range: 1-65535 seconds.

Role

Example

Related Commands

Note admin switch (config interface ethernet 1/2)# dot1x timeout quiet-period 30

Rev 4.20

Mellanox Technologies Confidential 714

Rev 4.20

dot1x max-req

dot1x max-req <retries> no dot1x max-req

Syntax Description

Default

Configures the maximum amount of retries for the authenticator to communicate with the supplicant over EAP.

The no form of the command resets the parameter to its default.

retries

2

Configuration Mode Config Interface Ethernet

History 3.4.2008

The number of request retries. Range: 1-10.

Role

Example

Related Commands

Note admin switch (config interface ethernet 1/2)# dot1x max-req 2

Mellanox Technologies Confidential 715

show dot1x

show dot1x

Syntax Description

Default

Displays 802.1x information on all interfaces.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2008

admin switch (config)# show dot1x

System authentication is enabled

---------------------------------------------------------------------

Port Pae Host-mode Port-control Status

---------------------------------------------------------------------

Eth1/1 Enabled multi-host auto unauthorized

Eth1/2 Disabled multi-host force-authorized down

Eth1/3 Disabled multi-host force-authorized down

Eth1/4 Disabled multi-host force-authorized down

Eth1/5 Disabled multi-host force-authorized down

Eth1/6 Disabled multi-host force-authorized down

Eth1/7 Disabled multi-host force-authorized down

Eth1/8 Disabled multi-host force-authorized down

Eth1/9 Disabled multi-host force-authorized down

...

switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 716

show dot1x interfaces ethernet

show dot1x interfaces ethernet <slot>/<port>

Syntax Description

Default

Displays 802.1x interface information.

<slot>/<port>

N/A

Configuration Mode Any Command Mode

Ethernet interface

History

Role

Example

3.4.2008

admin switch (config)# show dot1x interfaces ethernet 1/2

Eth1/2

PAE Status: Enabled

Configured host mode: Multi-host

Configured port-control: Auto

Authentication status: Unauthorized

Re-Authentication: Enabled

Re-Authentication period (sec): 3600

Tx wait period (sec): 30

Quiet period (sec): 60

Max request retry: 2

Last EAPOL RX source MAC: 00:00:00:00:00:00 switch (config interface ethernet 1/2)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 717

show dot1x interfaces ethernet statistics

show dot1x interfaces ethernet <slot>/<port> statistics

Syntax Description

Default

Displays 802.1x interface information.

<slot>/<port>

N/A

Configuration Mode Any Command Mode

Ethernet interface

History

Role

Example

3.4.2008

admin switch (config)# show dot1x interfaces ethernet 1/2 statistics

Eth1/2

EAPOL frames received: 3

EAPOL frames transmitted: 2

EAPOL Start frames received: 1

EAPOL Logoff frames received: 0

EAP Response-ID frames received: 2

EAP Response frames received: 0

EAP Request-ID frames transmitted: 2

EAP Request frames transmitted: 0

Invalid EAPOL frames received: 0

EAP length error frames received: 0

Last EAPOL frame version: 1

Last EAPOL frame source: 00:1A:A0:02:E9:8E switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 718

show dot1x radius

show dot1x radius

Syntax Description

Default

Displays 802.1x RADIUS settings.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2008

admin switch (config)# show dot1x radius

802.1x RADIUS defaults:

Key: ********

Timeout: 3

Retransmit: 1

No 802.1x RADIUS servers configured.

switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 719

6 IP Routing

6.1

General

6.1.1

IP Interfaces

MLNX-OS supports 3 types of IP interfaces.

• VLAN interface

• Loopback interface

• Router ports

Router ports are not supported on SX10xx-xxxR and SX60xx-xxxR systems.

VLAN interface is a logical IPv4 interface created per subnet over a specific 802.1Q VLAN ID.

If two hosts from two different subnets need to communicate (via the IP layer), the network administrator needs to configure two interface VLANs, one for each of the subnets. The user may configure up to 64 VLAN interfaces.

Each interface VLAN has the following attributes:

• Admin state

• Operational state

• MAC address

• IP address and mask

• MTU

• Description

• Set of counters

Loopback interface is a logical software entity where traffic transmitted to this interface is immediately received on the sending end.

Router port is a regular switch port configured to operate as an L3 interface. Router ports are assigned an IP address and all L3 commands become applicable to them.

Once configured, router ports no longer partake in the bridging activities of the switch and

VLANs configured on them are separate from the pool allocated for the switch ports.

6.1.1.1 Configuring a VLAN Interface

To configure a VLAN interface:

Step 1.

Create a VLAN. Run: switch (config)# vlan 10 switch (config vlan 10)# exit

Step 2.

Assign a physical interface to this VLAN. Run: switch (config)# interface ethernet 1/1 switch (config interface ethernet 1/1)# switchport mode access

Rev 4.20

Mellanox Technologies Confidential 720

Rev 4.20

Step 3.

Step 4.

Step 5.

Step 6.

switch (config interface ethernet 1/1)# exit

There must be at least one interface in the operational state “UP”.

switch (config)# show interface etherent 1/1 status

Port Operational state Speed Negotiation

---- ----------------- ----- -----------

Eth1/1 Up 40 Gbps No-Negotiation

Create a VLAN interface that matches the VLAN. Run: switch (config)# interface vlan 10 switch (config interface vlan 10)#

Configure an IP address and a network mask to the interface. Run: switch (config interface vlan 10)# ip address 10.10.10.10 /24

Verify VLAN interface configuration. Run: switch (config interface vlan 10)# show interface vlan 10

Vlan 10

Admin state: Enabled

Operational state: UP

Mac Address: 00:02:c9:5d:e0:f0

Internet Address: 10.10.10.10/24

Broadcast address: 10.10.10.255

MTU: 1500 bytes

Description: my-ip-interface

Counters: disabled

6.1.1.2 Configuring a Loopback Interface

To configure a loopback interface:

Step 1.

Create a loopback interface. Run: switch (config)# interface loopback 2 switch (config interface loopback 2)#

Step 2.

Step 3.

Configure an IP address on the loopback interface. Run: switch (config interface loopback 2)# ip address 20.20.20.20 /32

Verify loopback interface configuration. Run: switch (config interface loopback 2)# show interfaces loopback 2

Loopback 2

Internet Address: 20.20.20.20/32

Broadcast address: 20.20.20.20

MTU: 1500 bytes

Description: my-loopback switch (config) #

Mellanox Technologies Confidential 721

6.1.1.3 Configuring a Router Port

Step 1.

Enter an Ethernet interface’s configuration context. Run: switch (config)# interface ethernet 1/10 switch (config interface ethernet 1/10)#

Step 2.

Step 3.

Step 4.

Configure the Ethernet interface to become an L3 router port. Run: switch (config interface ethernet 1/10)# no switchport force

Configure an IP address on the router port. Run: switch (config interface ethernet 1/10)# ip address 100.100.100.100 /24

Verify router port configuration. Run: switch (config interface ethernet 1/10)# show interfaces ethernet 1/10

Eth1/10

Admin state: Enabled

Operational state: Down

Description: N\A

Mac address: 00:02:c9:96:c6:d8

MTU: 1500 bytes(Maximum packet size 1522 bytes)

Flow-control: receive off send off

Actual speed: 40 Gbps

Width reduction mode: Unknown

DHCP client: Disabled

IP Address: 100.100.100.100 /24

Broadcast address: 100.100.100.255

Arp timeout: 1500 seconds

VRF: default

MAC learning mode: Enabled

Last clearing of "show interface" counters : 00:00:01

60 seconds ingress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

60 seconds egress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec

Rx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 error packets

0 discard packets

Tx

0 packets

0 unicast packets

0 multicast packets

0 broadcast packets

0 bytes

0 discard packets

Rev 4.20

Mellanox Technologies Confidential 722

6.1.2

Equal Cost Multi-Path Routing (ECMP)

Equal-cost multi-path routing (ECMP) is a routing strategy where next-hop packet forwarding to a single destination can occur over multiple paths.

In Figure 27, routers R1 and R2 can both access each of their router peer networks. Router R1

routing table for 10.0.40/24 will contain the following routes:

• 10.0.10.2

• 10.0.20.2

• 10.0.30.2

Figure 27: ECMP

Rev 4.20

The load balancing function of the ECMP is configured globally on the system.

Hash algorithm can be symmetric or asymmetric. In symmetric hash functions bidirectional flows between routes will follow the same path, while in asymmetric hash functions, bidirectional traffic can follow different paths in both directions.

The following load balancing types are supported:

• Source IP & Port – source IP (SIP) and source UDP/TCP port: If the packet is not UDP/

TCP, only SIP is used for the hash calculation. This is an asymmetric hash function.

• Destination IP & Port – destination IP (DIP) and destination UDP/TCP port: If the packet is not UDP/TCP, only DIP is used for the hash calculation. This is an asymmetric hash function.

• Source and Destination IP & Port – destination and source IP, as well as destination and source UDP/TCP port: If the packet is not UDP/TCP, only SIP/DIP are used for the hash calculation. This is a symmetric hash function.

• Traffic Class: Load balance based on the traffic class assigned to the packet. This is an asymmetric hash function.

• All (default): all above fields are part of the hash calculations. This is a symmetric hash function.

6.1.2.1 Hash Functions

It is advised that LAG and ECMP hash function configuration over more than one hop is different. If the same hash function is used over two hops, all the traffic sorted from one hop to following one will arrive already having the same characteristics, which will render the next hash

Mellanox Technologies Confidential 723

function useless. For example, configure load-balancing on the first hop based on source IP while on the next hop based on destination IP.

Figure 28: Multiple Hash Functions

Spine Spine Spine

Rev 4.20

Leaf

Hash

Leaf Leaf

Hash

ToR

6.1.3

Virtual Routing and Forwarding

Only static IPv4 and ECMP are supported with VRF.

Virtual routing and forwarding (VRF) allows multiple routing table instances to coexist within the same router simultaneously. Since the routing instances are independent, IP addresses on each routing table may overlap without conflicting with each other.

VRF can be used for the following purposes:

• Ensure customer privacy and security

• Separate between management and user data

• Support customers with the same address space

• Support VPN

Multiple routing instances defined in the router can have different purposes and can be configured in different manners:

• Different IP interfaces can be attached to different VRFs (only one IP interface can be in a single VRF)

• Routing in VRF can be enabled or disabled

• Each VRF component can run its own routing protocol independently from other instances

• Differently configured IPv4 and IPv6 services

The first VRF in the system is created automatically and it is called “default” VRF. It cannot be deleted or configured.

Mellanox Technologies Confidential 724

6.1.4

IPv4 Routing Mode

The resources available for IPv4 routing are as follows:

• number of IPv4 neighbors – 2048

• number of IPv4 unicast routes – 4096

• number of IPv4 multicast routes – 672

Prior to upgrading to this software release the user must align the number of configured multicast routes to number defined above.

Rev 4.20

Mellanox Technologies Confidential 725

6.1.5

Commands

6.1.5.1 General

ip l3

ip l3 [force] no ip l3 [force]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables IP routing capabilities.

The no form of the command disables IP routing and removes its configuration.

N/A

If operating with Ethernet system profile: L3

Config

3.4.1802

admin switch (config) # ip l3 force switch (config) #

N/A

Rev 4.20

Mellanox Technologies Confidential 726

vrf definition

vrf definition <vrf-name>

Syntax Description

Default

Creates the VRF.

vrf-name

N/A

Configuration Mode Config

History

Role

Example

3.4.2008

admin

VRF session name switch (config) # vrf definition my-vrf switch (config vrf definition my-vrf) #

Related Commands N/A

Notes Only 1 VRF is supported aside from the default VRF

Rev 4.20

Mellanox Technologies Confidential 727

routing-context vrf

routing-context vrf <vrf-name>

Syntax Description

Default

Enters the active-context of the specified session.

vrf-name

N/A

Configuration Mode Config

VRF session name

History

Role

Example

3.4.2008

admin switch (config) # routing-context vrf my-vrf switch (config) #

Related Commands N/A

Notes • If a routing-context is configured, the user does not have to explicitly specify the VRF name parameter in this or any other VRF command

• If no routing-context is configured and the user does not specify the VRF name, default

VRF is used

Rev 4.20

Mellanox Technologies Confidential 728

ip routing

ip routing [vrf <vrf-name>]

Syntax Description

Default

Enables L3 forwarding between high speed interfaces.

vrf-name

N/A

Configuration Mode Config

VRF session name

History 3.4.1802

3.4.2008

Added VRF parameter

Role

Example admin switch (config) # ip routing vrf my-vrf switch (config) #

Related Commands N/A

Notes • RD must be configured to enable IP routing on the VRF

• If no routing-context is specified, the “routing-context” VRF is automatically configured.

Rev 4.20

Mellanox Technologies Confidential 729

description

description <description> no description force

Syntax Description

Creates the VRF.

description force

Text string

Forces deletion (no confirmation needed if configuration exists inside the VRF)

Default N/A

Configuration Mode Config VRF Definition

History

Role

Example

3.4.2008

admin switch (config vrf definition my-vrf) # description vrf-description switch (config vrf definition my-vrf) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 730

Rev 4.20

rd

rd [<ip addr>:<0-65,535> | <AS Number>:<0-4,294,967,295> | <AS Number>:<ip addr>]

Syntax Description

Adds a route distinguisher (RD) to the VRF configuration mode.

ip-addr IPv4 address

Asynchronous machine number

Default

AS Number

N/A

Configuration Mode Config VRF Definition

History

Role

Example

3.4.2008

admin switch (config vrf definition my-vrf) # rd 10.10.10.10:2 switch (config vrf definition my-vrf) #

Related Commands N/A

Notes • RDs internally identify routes belonging to a VRF to distinguish overlapping or duplicate

IP address ranges. This allows the creation of distinct routes to the same IP address for different VPNs. The RD is a 64-bit number made up of an AS number or IPv4 address followed by a user-selected ID number. Once an RD has been assigned to a VRF it cannot be changed. To change the RD, remove the VRF then create it again. VRF is not active until an RD is defined.

• An RD must be defined to enable IP routing on the VRF

Mellanox Technologies Confidential 731

vrf forwarding

vrf forwarding <vrf-name>

Syntax Description

Default

Maps an interface to VRF.

vrf-name

N/A

VRF session name

Configuration Mode Config Interface Ethernet set as router port

Config Interface VLAN

Config Interface Loopback

History

Role

Example

3.4.2008

admin switch (config interface ethernet 1/2) # vrf forwarding my-vrf switch (config interface ethernet 1/2) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 732

show ip routing

show ip routing [vrf <vrf-name> | all]

Syntax Description

Displays IP routing information per VRF.

vrf Displays information for specific VRF

Displays information on all VRFs

Default all

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0230

3.4.2008

Added VRF parameter admin switch (config) # show ip routing vrf all

VRF Name: my-vrf

-----------------------------

IP routing: disabled

VRF Name: default

-----------------------------

IP routing: enabled switch (config) #

Related Commands N/A

Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.

Rev 4.20

Mellanox Technologies Confidential 733

show routing-context vrf

show routing-context vrf

Syntax Description

Default

Displays VRF active context.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2008

admin switch (config) # show routing-context vrf

VRF active context: my-vrf switch (config) #

Related Commands N/A

Notes

Rev 4.20

Mellanox Technologies Confidential 734

show vrf

show vrf [<vrf-name> | all]

Syntax Description

Displays VRF information.

all Displays information for all VRF instances

Name of VRF instance

Default vrf-name

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2008

admin switch (config) # show vrf my-vrf

VRF Info

Name: my-vrf

RD: 10.10.10.10:2

Description: Test VRF

IP routing state: Enabled

Protocols: IPv4

Interfaces: Eth1/2 switch (config) #

Related Commands N/A

Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.

Rev 4.20

Mellanox Technologies Confidential 735

Rev 4.20

6.1.5.2 IP Interfaces

switchport

switchport [force] no switchport [force]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Configures the Ethernet interface as a regular switchport.

The no form of the command configures the Ethernet interface as a router port.

force Forces configuration even if the interface’s admin state is enabled.

N/A

Config Interface Ethernet

Config Interface Port Channel

3.3.5200

admin switch (config interface ethernet 1/10)# no switchport force

Mellanox Technologies Confidential 736

Rev 4.20

encapsulation dot1q vlan

encapsulation dot1q vlan <vlan-id> [force] no encapsulation dot1q vlan [force]

Syntax Description

Enables L2 802.1Q encapsulation of traffic on a specified router port in a VLAN.

The no form of the command disables L2 802.1Q encapsulation of traffic on a specified router port in a VLAN.

vlan-id Enables L2 802.1Q encapsulation of traffic on a router port in a VLAN.

Forces admin state down.

Default force

N/A

Configuration Mode Config Interface Ethernet

History

Role

Example

Related Commands

Note

3.3.5200

admin switch (config interface ethernet 1/10)# encapsulation dot1q vlan 10

Mellanox Technologies Confidential 737

Rev 4.20

6.1.5.3 Interface VLAN

interface vlan

interface vlan <vlan-id> no interface vlan <vlan-id>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Creates a VLAN interface and enters the interface VLAN configuration mode.

The no form of the command deletes the VLAN interface.

vlan-id

N/A

A numeric range of 1-4094

Config

3.2.0230

admin switch (config) # interface vlan 10 switch (config interface vlan 10) # ip routing vlan <vlan-id> switchport mode switchport access show interfaces vlan

• Make sure the VLAN was created, using the command “vlan <vlan-id>” in the global configuration mode

• The VLAN must be assigned to one of the L2 interfaces. To do so, run the command

“swichport ...”

• At least one interface belong to that VLAN must be in UP state

Mellanox Technologies Confidential 738

ip address

ip address <ip-address> <mask> no ip address <ip-address> <mask>

Syntax Description

Enters user-defined description for the interface.

ip-address IPv4 address mask There are two possible ways to the mask:

• /length (i.e. /24)

• Network address (i.e. 255.255.255.0)

Default 0.0.0.0/0

Configuration Mode Config Interface VLAN

History

Role

Example

3.2.0230

admin switch (config interface vlan 10) # ip address 10.10.10.10 /24 switch (config interface vlan 10) #

Related Commands interface vlan show interfaces vlan

Note

Rev 4.20

Mellanox Technologies Confidential 739

ip address dhcp

ip address dhcp no ip addres dhcp

Syntax Description

Default

Enables DHCP on this VLAN interface.

N/A

Disabled

Configuration Mode Config Interface VLAN

History

Role

Example

3.4.2008

admin switch (config interface vlan 10) # ip address dhcp switch (config interface vlan 10) #

Related Commands interface vlan show interfaces vlan

Note

Rev 4.20

Mellanox Technologies Confidential 740

counters

counters no counters

Enables counters on the IP interface.

The no form of the command disables counters gathering on the IP interface.

Syntax Description

Default

N/A counters are disabled.

Configuration Mode Config Interface VLAN

History 3.2.0230

Role

Example admin switch (config interface vlan 10) # counters switch (config interface vlan 10) #

Related Commands counters interface vlan show interfaces vlan

Note • Enabling counters for the router interface adds delay to the traffic stream

• There are maximum of 16 counter sets

Rev 4.20

Mellanox Technologies Confidential 741

description

description <string> no description

Syntax Description

Default

Enters a description for the interface.

The no form of the command sets the description to default.

string

“”

Configuration Mode Config Interface VLAN

History 3.2.0230

User defined string

Role

Example admin switch (config interface vlan 10) # description my-ip-interface switch (config interface vlan 10) #

Related Commands interface vlan show interfaces vlan

Note

Rev 4.20

Mellanox Technologies Confidential 742

mtu

mtu <size> [force] no mtu

Syntax Description

Sets the MTU for the interface.

The no form of the command sets the MTU to default.

size force

1500-9216.

Forces command implementation.

Default 1522

Configuration Mode Config Interface VLAN

History

Role

Example

3.2.0230

admin switch (config interface vlan 10)# mtu 9216 switch (config interface vlan 10 #

Related Commands interface vlan show interfaces vlan

Note

Rev 4.20

Mellanox Technologies Confidential 743

shutdown

shutdown no shutdown

Syntax Description

Default

Disables the interface.

The no form of the command enables the interface.

N/A

The interface is enabled.

Configuration Mode Config Interface VLAN

History 3.1.0000

Role

Example admin switch (config interface vlan 20) # shutdown switch (config interface vlan 20) #

Related Commands interface vlan

Note

Rev 4.20

Mellanox Technologies Confidential 744

clear counters

clear counters

Syntax Description

Default

Clears the interface counters.

N/A

N/A

Configuration Mode Config Interface VLAN

History

Role

Example

3.2.0230

admin switch (config interface vlan 10) # clear counters switch (config interface vlan 10) #

Related Commands interface vlan counters

Note

Rev 4.20

Mellanox Technologies Confidential 745

ip icmp redirect

ip icmp redirect no ip icmp redirect

Syntax Description

Default

Enables ICMP redirect.

The no form of the command disables ICMP redirect.

N/A

Enabled

Configuration Mode Config Interface VLAN

History 3.4.0010

Role

Example admin switch (config interface vlan 10) # no ip icmp redirect

Related Commands interface vlan counters

Note • ICMP redirect transmits messages to hosts alerting them about the existence of more efficient routes to a specific destination

Rev 4.20

Mellanox Technologies Confidential 746

show ip interface

show ip interface [vrf <vrf-name> | all] [brief]

Syntax Description

Displays IP interfaces information per VRF.

all Displays information on all VRFs

Displays IP interfaces information in a shortened form

Default brief

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.2008

admin switch (config) # show ip interface vrf all brief

Interface Address/Mask Admin-state Oper-state MTU VRF mgmt0 10.224.22.27/24 Enabled Up 1500 default mgmt1 0.0.0.0/0 Enabled Down 1500 default

Vlan 20 20.20.20.1/24 Enabled Down 1500 my-vrf

Eth1/1 1.1.1.1/24 Enabled Down 1500 my-vrf

Loopback 10 10.10.10.1/32 Enabled Up 1500 my-vrf

Vlan 30 30.30.30.1/24 Enabled Down 1500 default

Eth1/2 2.2.2.2/24 Enabled Down 1500 default

Loopback 11 11.11.11.1/32 Enabled Up 1500 default switch (config) # show ip interface vrf my-vrf brief

Interface Address/Mask Admin-state Oper-state MTU VRF

Vlan 20 20.20.20.1/24 Enabled Down 1500 my-vrf

Eth1/1 1.1.1.1/24 Enabled Down 1500 my-vrf

Loopback 10 10.10.10.1/32 Enabled Up 1500 my-vrf switch (config) # show ip interface vrf default brief

Interface Address/Mask Admin-state Oper-state MTU VRF mgmt0 10.224.22.27/24 Enabled Up 1500 default mgmt1 0.0.0.0/0 Enabled Down 1500 default

Vlan 30 30.30.30.1/24 Enabled Down 1500 default

Eth1/2 2.2.2.2/24 Enabled Down 1500 default

Loopback 11 11.11.11.1/32 Enabled Up 1500 default switch (config) #

Related Commands N/A

Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.

Rev 4.20

Mellanox Technologies Confidential 747

6.1.5.4 Loopback Interface

interface loopback

interface loopback <id> no interface loopback <id>

Syntax Description

Default

Configuration Mode

History

Role

Example

Creates a loopback interface and enters the interface configuration mode.

The no form of the command deletes the interface.

id

N/A

A numeric range of 0-31

Config

3.2.3000

admin switch (config) # interface loopback 10 switch (config interface loopback 10) #

Related Commands

Note • Up to 32 loopback interfaces can be configured

• Within the loopback configuration mode, you can configure description and ip-address

• MTU cannot be configured on the loopback interface

Rev 4.20

Mellanox Technologies Confidential 748

ip address

ip address <ip-address> <mask> no ip address <ip-address> <mask>

Syntax Description

Enters user-defined description for the interface.

ip-address IPv4 address.

mask There are two possible ways to the mask:

• /length – only /32 is possible

• Network address (i.e. 255.255.255.0)

Default 0.0.0.0/0

Configuration Mode Config Interface Loopback

History

Role

3.3.5006

admin

Example switch (config interface loopback 10) # ip address 10.10.10.10 /32

Related Commands interface loopback

Note

Rev 4.20

Mellanox Technologies Confidential 749

description

description <string> no description

Syntax Description

Default

Enters a description for the interface.

The no form of the command sets the description to default.

string

“”

Configuration Mode Config Interface Loopback

History 3.3.5006

User defined string.

Role

Example admin switch (config interface loopback 10) # description my-ip-interface

Related Commands interface loopback

Note

Rev 4.20

Mellanox Technologies Confidential 750

show interfaces loopback

show interface loopback <id>

Syntax Description

Default

Shows the attribute of the interface loopback.

id

N/A

Configuration Mode Config

A numeric range of 1-32

History

Role

Example

3.2.3000

admin switch (config) # show interfaces loopback 2

Loopback 2

Internet Address: 2.2.2.2/32

Broadcast address: 2.2.2.2

MTU: 1500 bytes

Description: my-loopback switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 751

Rev 4.20

6.1.5.5 Routing and ECMP

ip route

ip route [vrf <vrf-name>] <IP prefix> <netmask> <next hop IP address> no ip route [vrf <vrf-name>] <IP prefix> <netmask> <next hop IP address>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Configures a static route inside VRF.

The no form of the command removes the static route configured.

vrf-name ip prefix netmask

VRF session name

IP address next hop IP address

N/A

There are two possible ways to the mask:

• /length (i.e. /24)

• Network address (i.e. 255.255.255.0)

IP address of the next hop.

Config

3.1.0000

3.4.2008

admin

Added VRF parameter switch (config) # ip route vrf my-vrf 80.80.80.0 /24 20.20.20.2

N/A

If no routing-context is specified, the “routing-context” VRF is automatically configured.

Mellanox Technologies Confidential 752

ip load-sharing

ip load-sharing <type> no ip load-sharing

Syntax Description

This command sets the ECMP load sharing mode.

The no form of the command sets the load-sharing to default.

type • source-ip-port

• destination-ip-port

• source-destination-ip-port

• traffic-class

• all

Default all

Configuration Mode Config

History

Role

Example

3.2.0230

admin switch (config) # ip load-sharing all switch (config) # show ip load-sharing

Load sharing: all switch (config)

Related Commands ip route

Note

Rev 4.20

Mellanox Technologies Confidential 753

show ip route

show ip route [vrf [<vrf-name> | all]] [-a | static | summary]

Syntax Description

Role

Displays routing table of VRF instance.

all Displays routing tables for all VRF instances

-a Displays static routes currently inactive due to the interface being down

Displays static route

Displays route summary static summary

Default N/A

Configuration Mode Any Command Mode

History 3.1.0000

3.3.3500

3.4.0000

3.4.2008

3.4.3000

admin

First version

Added Distance/Metric column

Added -a parameter

Added VRF parameter

Updated Notes section

Rev 4.20

Mellanox Technologies Confidential 754

Rev 4.20

Example switch (config) # show ip route vrf my-vrf

VRF Name: my-vrf

-----------------------------

Destination Mask Gateway Interface Source Distance/Metric

10.10.10.1 255.255.255.255 0.0.0.0 loopback10 direct 0/0

20.20.20.0 255.255.255.0 0.0.0.0 vlan20 direct 0/0

80.80.80.0 255.255.255.0 20.20.20.2 vlan20 static 1/0 switch (config) # show ip route vrf my-vrf static

VRF Name: my-vrf

-----------------------------

Destination Mask Gateway Interface Source Distance/Metric

80.80.80.0 255.255.255.0 20.20.20.2 vlan20 static 1/0 switch (config) # show ip route vrf my-vrf summary

VRF Name: my-vrf

-----------------------------

Route Source Routes direct 2 static 1 ospf 0 bgp 0

DHCP 0

Total 3 switch (config) # show ip route vrf my-vrf -a

VRF Name: my-vrf

-----------------------------

Destination Mask Gateway Interface Source Distance/Metric

90.90.90.0 255.255.255.0 1.1.1.2 NA static 1/0 switch (config) #

Related Commands ip route

Notes • If no routing-context is specified, the “routing-context” VRF is automatically displayed

• If no default route exists, then the message “Route not found” is printed

Mellanox Technologies Confidential 755

show ip load-sharing

show ip load-sharing

Syntax Description

Default

Displays ECMP hash attribute.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.0230

admin switch (config) # show ip load-sharing

Load sharing: all switch (config) #

Related Commands ip load-sharing

Note

Rev 4.20

Mellanox Technologies Confidential 756

Rev 4.20

6.1.5.6 Network to Media Resolution (ARP)

ip arp

ip arp [vrf <vrf-name>] <ip-address> <mac-address> no ip arp <ip-address>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Notes

Configures IP ARP properties of VRF

The no form of the command deletes the static ARP configuration.

vrf-name

IP address

VRF session name

IPv4 address

MAC address (format XX:XX:XX:XX:XX:XX) mac-address

N/A

Config

3.4.2008

admin switch (config) # ip arp vrf my-vrf 20.20.20.2 aa:bb:cc:dd:ee:ff

N/A

If no routing-context is specified, the “routing-context” VRF is automatically configured.

Mellanox Technologies Confidential 757

ip arp timeout

ip arp timeout <timeout-value> no ip arp timeout

Syntax Description

Sets the dynamic ARP cache timeout.

The no form of the command sets the timeout to default.

timeout-value Time (in seconds) that an entry remains in the ARP cache. Range: 60-28800.

Default 1500 seconds

Configuration Mode Config Interface VLAN

History

Role

Example

3.2.0230

admin switch (config) # ip arp timeout 2000 switch (config) # show ip arp

ARP Timeout: 2000

Total number of entries: 55

IP Address MAC Address Interface

1.0.0.2 00:02:c9:5c:30:40 Vlan11

1.0.0.3 00:11:22:33:44:55 Vlan11

2.0.0.2 00:02:c9:5c:30:40 Vlan12

3.0.0.2 00:02:c9:5c:30:40 Vlan13

4.0.0.2 00:02:c9:5c:30:40 Vlan14 switch (config) #

Related Commands ip arp show ip arp

Note This value is used as the ARP timeout whenever a new IP interface is created.

Rev 4.20

Mellanox Technologies Confidential 758

Rev 4.20

clear ip arp

clear ip arp [vrf <vrf-name>] [interface <type> | <IP-address>]

Syntax Description

Clears the dynamic ARP cache for the specific VRF session.

vrf-name VRF session name interface ip-address

Clears dynamic ARP entries for a interface

Clears dynamic ARP entries for a specific IP address

Default N/A

Configuration Mode Config

History

History

3.2.0230

3.4.2008

Role

Example

Added VRF parameter admin switch (config) # clear ip arp vrf my-vrf switch (config) #

Related Commands ip arp show ip arp

Notes If no routing-context is specified, the “routing-context” VRF is automatically configured.

Mellanox Technologies Confidential 759

show ip arp

show ip arp [vrf [<vrf-name> | all]] [interface <type> | count]

Syntax Description

Displays all ARP information for VRF instance.

all Displays all ARP information for all VRF interface count

Displays all ARP information for specific interface

Displays number of ARPs for specific VRF

Default N/A

Configuration Mode Any Command Mode

History 3.3.3000

3.4.2008

Role

Example

Added VRF parameter admin switch (config) # show ip arp vrf my-vrf

VRF Name: my-vrf

-----------------------------

Total number of entries: 2

Address Type Hardware Address Interface

------------------------------------------------------------------------

20.20.20.2 Static ETH AA:AA:AA:BB:BB:BB vlan 20

1.1.1.2 Static ETH 00:11:22:33:44:55 eth 1/1 switch (config) # show ip arp vrf my-vrf interface ethernet 1/1

VRF Name: my-vrf

-----------------------------

Total number of entries: 1

Address Type Hardware Address Interface

------------------------------------------------------------------------

1.1.1.2 Static ETH 00:11:22:33:44:55 eth 1/1 switch (config) # show ip arp vrf my-vrf interface vlan 20

VRF Name: mmm

-----------------------------

Total number of entries: 1

Address Type Hardware Address Interface

------------------------------------------------------------------------

20.20.20.2 Static ETH AA:AA:AA:BB:BB:BB vlan 20 switch (config) #

Related Commands ip arp

Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.

Rev 4.20

Mellanox Technologies Confidential 760

Rev 4.20

6.1.5.7 IP Diagnostic Tools

ping

ping [vrf <vrf-name>] [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [p pattern] [-s packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint]

[-S sndbuf] [-T timestamp option ] [-Q tos ] [hop1 ...] destination

Syntax Description

Default

Configuration Mode

History

Role

Example

Sends ICMP echo requests to a specified host.

Linux Ping options vrf

N/A

Specifies VRF instance name

Config

3.1.0000

3.4.2008

admin

Added VRF parameter switch (config) # ping 172.30.2.2

PING 172.30.2.2 (172.30.2.2) 56(84) bytes of data.

64 bytes from 172.30.2.2: icmp_seq=1 ttl=64 time=0.703 ms

64 bytes from 172.30.2.2: icmp_seq=2 ttl=64 time=0.187 ms

64 bytes from 172.30.2.2: icmp_seq=3 ttl=64 time=0.166 ms

64 bytes from 172.30.2.2: icmp_seq=4 ttl=64 time=0.161 ms

64 bytes from 172.30.2.2: icmp_seq=5 ttl=64 time=0.153 ms

64 bytes from 172.30.2.2: icmp_seq=6 ttl=64 time=0.144 ms

^C

--- 172.30.2.2 ping statistics ---

6 packets transmitted, 6 received, 0% packet loss, time 5004ms rtt min/avg/max/mdev = 0.144/0.252/0.703/0.202 ms switch (config) #

Related Commands traceroute

Note When using -I option use the interface name + interface number, for example “ping -I vlan10”

Mellanox Technologies Confidential 761

Rev 4.20

traceroute

Syntax Description traceroute [vrf <vrf-name>] [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device]

[-m max_ttl] [-N squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s src_addr] [-z sendwait] host [packetlen]

-V

-f

-g

-U

-n

-r

-d

-F

-I

-T

-4

-6

Traces the route packets take to a destination.

vrf Specifies VRF instance name

Uses IPv4.

Uses IPv6

Enables socket level debugging.

Sets DF (“do not fragment” bit) on.

Uses ICMP ECHO for tracerouting.

Uses TCP SYN for tracerouting.

-A

-i

-m

-N

-p

-t

-l

Uses UDP datagram (default) for tracerouting.

Does not resolve IP addresses to their domain names.

Bypasses the normal routing and send directly to a host on an attached network.

Performs AS path lookups in routing registries and print results directly after the corresponding addresses.

Prints version info and exit.

Starts from the first_ttl hop (instead from 1).

Routes packets throw the specified gateway (maximum

8 for IPv4 and 127 for IPv6).

Specifies a network interface to operate with.

Sets the max number of hops (max TTL to be reached).

Default is 30.

Sets the number of probes to be tried simultaneously

(default is 16).

Uses destination port. It is an initial value for the UDP destination port (incremented by each probe, default is

33434), for the ICMP seq number (incremented as well, default from 1), and the constant destination port for

TCP tries (default is 80).

Sets the TOS (IPv4 type of service) or TC (IPv6 traffic class) value for outgoing packets.

Uses specified flow_label for IPv6 packets.

Mellanox Technologies Confidential 762

-w

-q

-s

-z

Rev 4.20

Sets the number of seconds to wait for response to a probe (default is 5.0). Non-integer (float point) values allowed too.

Sets the number of probes per each hop. Default is 3.

Uses source src_addr for outgoing packets.

Sets minimal time interval between probes (default is

0). If the value is more than 10, then it specifies a number in milliseconds, else it is a number of seconds (float point values allowed too).

Default N/A

Configuration Mode Config

History 3.1.0000

3.4.2008

Role

Example

Added VRF parameter admin switch (config) # traceroute 192.168.10.70

traceroute to 192.168.10.70 (192.168.10.70), 30 hops max, 40 byte packets

1 172.30.0.1 (172.30.0.1) 3.632 ms 2.849 ms 3.544 ms

2 10.222.128.46 (10.222.128.46) 3.176 ms 3.289 ms 3.656 ms

3 10.158.128.30 (10.158.128.30) 15.331 ms 15.819 ms 16.388 ms

4 10.158.128.65 (10.158.128.65) 20.468 ms 7.893 ms 12.27 ms

5 10.7.34.115 (10.7.34.115) 16.405 ms 11.985 ms 12.264 ms

6 192.168.10.70 (192.168.10.70) 16.377 ms 16.091 ms 20.475 ms switch (config) #

Related Commands

Note • The following flags are not supported: -6, -l, -A

• When using -i option use the interface name + interface number, for example “traceroute -i vlan10”

Mellanox Technologies Confidential 763

Rev 4.20

tcpdump

tcpdump [vrf <vrf-name>] [-aAdeflLnNOpqRStuUvxX] [-c count] [ -C file_size ]

[ -E algo:secret ] [ -F file ] [ -i interface ] [ -M secret ]

[ -r file ] [ -s snaplen ] [ -T type ] [ -w file ]

[ -W filecount ] [ -y datalinktype ] [ -Z user ]

[ expression ]

Syntax Description

Default

Invokes standard binary, passing command line parameters straight through. Runs in foreground, printing packets as they arrive, until the user hits Ctrl+C.

vrf

N/A

Configuration Mode Config

History 3.1.0000

Specifies VRF instance name

Role

Example

3.4.2008

admin

Added VRF parameter switch (config) # tcpdump

......

09:37:38.678812 IP 192.168.10.7.ssh > 192.168.10.1.54155: P

1494624:1494800(176) ack 625 win 90

<nop,nop,timestamp 5842763 858672398>

09:37:38.678860 IP 192.168.10.7.ssh > 192.168.10.1.54155: P

1494800:1495104(304) ack 625 win 90

<nop,nop,timestamp 5842763 858672398>

...

9141 packets captured

9142 packets received by filter

0 packets dropped by kernel switch (config) #

Related Commands N/A

Note •

• When using -i option use the interface name + interface number, for example “tcpdump -i vlan10”

• For all flag options of this command refer to the linux ‘man page’ of tcp dump.

Mellanox Technologies Confidential 764

Rev 4.20

6.1.5.8 QoS

qos map dscp-to-pcp preserve-pcp

qos map dscp-to-pcp preserve-pcp no qos map dscp-to-pcp preserve-pcp

Syntax Description

Default

Configuration Mode

History

Role

Example

Configures the router to copy PCP bits when transferring data from one subnet to another.

The no form of the command disables this ability.

N/A

Disabled.

Config

3.3.4000

admin switch (config) # qos map dscp-to-pcp preserve-pcp switch (config) #

Related Commands

Note • This commands applies the configuration for all router interfaces

• As part of its function, the router performs DSCP to PCP bits mapping (fixed mapping). By activating the command the router preserves the PCP bits from one subnet to another subnet (PCP bits are copied).

Mellanox Technologies Confidential 765

6.2

IPv6

To activate this feature please contact your Mellanox support representative.

IP version 6 (IPv6) is a routing protocol which succeeds IPv4. With the expansion of the Internet and data bases IPv6 addresses consist of 128 bits whose purpose is to allow networks to include a significantly higher number of nodes by increasing the pool of available unique IP addresses.

IPv6 packets alleviate overhead and allow for future customizability.

Textual representations of IPv6 addresses consist of 128 bits made up from eight 16-bit hexadecimal numbers separated by colons. IPv6 addresses may be abbreviated as follows:

• You may omit leading zeros in each 16-bit sequence

• You may replace an entire sequence with a double colon if it equals zero

For example, these addresses represent the same IPv6 address:

• af23:0000:0000:0000:1284:037d:35ce:2401

• af23:0:0:0:1284:37d:35ce:2401

• af23::1284:37d:35ce:2401

IPv6 addresses typically denote a 64-bit network prefix and a 64-bit host address.

Only static IPv6 and ECMP are supported.

Rev 4.20

The number of static IPv6 addresses supported is 64.

6.2.1

Neighbor Discovery Protocol

Neighbor Discovery (ND) decides relationships between neighbors and replaces ARP, ICMP, and

ICMP redirect in IPv4.

Five kinds of ICMPv6 packets are defined by ND:

• Neighbor advertisement

• Router advertisement

• Neighbor solicitation

• Router solicitation

• Redirect

ND checks whether a neighboring node’s address has changed, whether the neighbor is still reachable, and also resolves the address of the neighbor which a packet is being forwarded to.

ND is also useful for network nodes for discovering other nodes and performing basic link-layer configuration.

Mellanox Technologies Confidential 766

6.2.2

Configuring IPv6

Figure 29: IPv6 Network

To configure Router1:

Step 1.

Enable IP routing. Run: switch (config)# ip routing

Step 2.

Step 3.

Enable forwarding IPv6 unicast packets. Run: switch (config)# ipv6 routing

Configure the VLAN interfaces. Run: switch (config)# interface vlan 10 switch (config interface vlan 10) # exit switch (config)# interface vlan 30 switch (config interface vlan 30) # exit switch (config)# interface vlan 50 switch (config interface vlan 50) # exit

Step 4.

Step 5.

Enable IPv6 on the VLAN interfaces. Run: switch (config)# interface vlan 10 ipv6 enable switch (config)# interface vlan 30 ipv6 enable switch (config)# interface vlan 50 ipv6 enable

Configure IPv6 addresses for each one of the VLAN interfaces. Run: switch (config)# interface vlan 10 ipv6 address 2101:db01::1 /64 switch (config)# interface vlan 30 ipv6 address 2103:db01::2 /64 switch (config)# interface vlan 50 ipv6 address 2105:db01::1 /64

Step 6.

Configure IPv6 unicast. Run: switch (config)# ipv6 route 2002:db01:: /64 2101:db01::2

Step 7.

Configure IPv6 unicast. Run: switch (config)# ipv6 route 2002:db01:: /64 2105:db01::2

To configure Router2:

Step 1.

Disable prefix mode on the CLI. Run: switch (config)# no cli default prefix-mode enable

Mellanox Technologies Confidential 767

Rev 4.20

Step 2.

Step 3.

Step 4.

Step 5.

Step 6.

Step 7.

Step 8.

Step 9.

Enable the VLANs on the system. Run: switch (config)# vlan 10 switch (config vlan 10) # exit switch (config)# vlan 20 switch (config vlan 20) # exit switch (config)# vlan 50 switch (config vlan 50) # exit

Configure the switch ports to accept the VLANs of which they are part only. Run: switch (config)# interface ethernet 1/1 switchport access vlan 10 // port2 switch (config)# interface ethernet 1/2 switchport access vlan 50 // port8 switch (config)# interface ethernet 1/36 switchport access vlan 20 // port5

Disable spanning tree. Run: switch (config)# no spanning-tree

Enable IP routing. Run: switch (config)# ip routing

Enable forwarding IPv6 unicast packets. Run: switch (config)# ipv6 routing

Configure the VLAN interfaces. Run: switch (config)# interface vlan 10 switch (config interface vlan 10) # exit switch (config)# interface vlan 20 switch (config interface vlan 20) # exit switch (config)# interface vlan 50 switch (config interface vlan 50) # exit

Enable IPv6 on the VLAN interfaces. Run: switch (config)# interface vlan 10 ipv6 enable switch (config)# interface vlan 20 ipv6 enable switch (config)# interface vlan 50 ipv6 enable

Configure IPv6 addresses for each one of the VLAN interfaces. Run: switch (config)# interface vlan 10 ipv6 address 2101:db01::2 /64 switch (config)# interface vlan 20 ipv6 address 2102:db01::1 /64 switch (config)# interface vlan 50 ipv6 address 2105:db01::2 /64

Step 10.

Configure IPv6 unicast. Run: switch (config)# ipv6 route 2103:db01:: /64 2101:db01::1

Step 11.

Configure IPv6 unicast. Run: switch (config)# ipv6 route 2103:db01:: /64 2105:db01::1

Rev 4.20

Mellanox Technologies Confidential 768

Ping neighbor to verify IPv6 configuration: switch (config)# ping6 2101:db01::2

PING 2101:db01::2(2101:db01::2) 56 data bytes

64 bytes from 2101:db01::2: icmp_seq=1 ttl=64 time=0.371 ms

64 bytes from 2101:db01::2: icmp_seq=2 ttl=64 time=0.620 ms

64 bytes from 2101:db01::2: icmp_seq=3 ttl=64 time=0.192 ms

64 bytes from 2101:db01::2: icmp_seq=4 ttl=64 time=0.277 ms

64 bytes from 2101:db01::2: icmp_seq=5 ttl=64 time=0.231 ms

Rev 4.20

Mellanox Technologies Confidential 769

6.2.3

Commands

ipv6 enable

ipv6 enable no ipv6 enable

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Assigns automatic local IPv6 address to the interface.

The no form of the command deassigns that automatic local address and disables

IPv6 if no static IPv6 address has been assigned to the interface.

N/A

Unassigned

Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

3.4.1100

admin switch (config vlan 10) # ipv6 enable

• Assigning an IPv6 address to an interface enables IPv6 processing on the interface also

• IPv6 must be enabled globally before running this command per interface. The command

“ipv6 enable” on page 153 must be configured.

Rev 4.20

Mellanox Technologies Confidential 770

ipv6 address

ipv6 address <ipv6-address> /<length> no ipv6 address <ipv6-address> [/<length>]

Syntax Description

Enables IPv6 processing and assigns an IPv6 address to the interface.

The no form of the command removes the specified IPv6 address.

ipv6-address length

IPv6 address. Format: a:b:c:d:e:f:g:h.

Mask length for the associated address space.

Range: 1-128.

Default N/A

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.4.1100

admin switch (config vlan 10) # ipv6 address fe80:ac10::fa01:0202 /120 switch (config vlan 10) # ipv6 address fe80:ac10::fa01:0202/120

Related Commands

Note • An interface can have up to 16 IPv6 address assignments

• If the no command does not include a specific address, all address assignments are removed from the interface

• The mask length may be configured without a space (i.e. <ipv6-address>/<length>)

Rev 4.20

Mellanox Technologies Confidential 771

ipv6 nd managed-config-flag

ipv6 nd managed-config-flag no ipv6 nd managed-config-flag

Sets the managed address configuration flag in IPv6 router advertisements.

The no form of the command restores the default setting.

Syntax Description

Default

N/A

Managed address configuration flag is not set

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd managed-config-flag

Rev 4.20

Mellanox Technologies Confidential 772

ipv6 nd ns-interval

ipv6 nd ns-interval <period> no ipv6 nd ns-interval

Syntax Description

Default

Configures the interval between IPv6 neighbor solicitation (NS) transmissions.

The no form of the command restores the default value.

period

1000 milliseconds

In milliseconds. Range: 1000-4294967295.

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd ns-interval 1500

Rev 4.20

Mellanox Technologies Confidential 773

ipv6 nd other-config-flag

ipv6 nd other-config-flag no ipv6 nd other-config-flag

Indicates that other configuration information is available via DHCPv6.

The no form of the command removes the other configuration flag.

Syntax Description

Default

N/A

Not set

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd other-config-flag

Rev 4.20

Mellanox Technologies Confidential 774

ipv6 nd prefix

ipv6 nd prefix <ipv6-address> /<length> [no-advertise] [no-autoconfig] [noonlink] [valid-time {<time> | infinite}] [preferred-time {<time> | infinite}] no ipv6 nd prefix <prefix>

Syntax Description

Default

Configures inclusion for router advertisements (RAs) for neighbor.

The no form of the command removes the corresponding IPv6 nd prefix.

ipv6-address length

IPv6 address. Format: a:b:c:d:e:f:g:h.

Prefix length for the associated address space. Range:

1-128.

no-advertise valid-time

Prevents advertising of the specified prefix.

Time in seconds. Range: 0-4294967295. The value

“infinite” is the same as the maximum value possible.

preferred-time no-autoconfig

Time in seconds. Range: 0-4294967295. The value

“infinite” is the same as the maximum value possible.

Indicates that this prefix can be used for stateless address configuration no-onlink Indicates that this prefix can be used for on-link determination valid-time: 2592000 seconds preferred-time: 604800 seconds no-autoconfig: autoconfig enabled no-onlink: Set

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.4.1100

admin switch (config vlan 10) # ipv6 nd prefix fe80:ac10::fa01:0202 /120 Example

Related Commands

Note Valid time must be larger than preferred time

Rev 4.20

Mellanox Technologies Confidential 775

ipv6 nd ra dns-servers lifetime

ipv6 nd ra dns-servers lifetime {<time> | infinite} no ipv6 nd ra dns-servers lifetime

Syntax Description

Default

Sets the default value for the lifetime of any recursive DNS server (RDNSS) configured on the interface.

The no form of the command removes the lifetime value.

time Possible values:

• 0 – RDNSS configured on the command mode interface without a custom lifetime value must not be used

• 1-4294967295 – in seconds

Equivalent to 4294967295.

infinite

If no lifetime period is configured on the interface, the default value is 1.5 times the maximum RA interval set by the command “ipv6 nd ra interval”.

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.4.1100

admin

Example

Related Commands

Note switch (config vlan 10) # ipv6 nd ra dns-servers lifetime infinite

• A lifetime value set for an individual RDNSS overrides this value.

• The lifetime value is the maximum amount of time after a route advertisement packet is sent that the RDNSS referenced in the packet may be used for name resolution.

Rev 4.20

Mellanox Technologies Confidential 776

Rev 4.20

ipv6 nd ra dns-server

ipv6 nd ra dns-server <ip-address> [lifetime [<time> | infinite]] no ipv6 nd ra dns-server [<ip-address>]

Syntax Description

Default

Configures the IPv6 address of a preferred recursive DNS server (RDNSS) to include in the neighbor-discovery router advertisements (RAs).

The no form of the command removes the RDNSS from the configuration.

ip-address lifetime

IP address of RDNSS

Maximum lifetime value for the specified RDNSS entry. Possible values:

• 0 – RDNSS address must no longer be used

• 1-4294967295 in seconds infinite Equivalent to 4294967295 seconds.

If no lifetime period is configured on the interface, the default value is 1.5 times the maximum RA interval set by the command “ipv6 nd ra interval”.

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra dns-server fe80:ac10::fa01:0202 lifetime infinite

Related Commands

Note • Including RDNSS information in RAs provides DNS server configuration for connected

IPv6 hosts without requiring DHCPv6

• Multiple servers can be configured on the interface by using the command repeatedly

• A lifetime value for the RDNSS can optionally be specified with this command, and overrides any default value configured for the interface using the ipv6 nd ra dns-servers lifetime command

• Lifetime must be configured according to the following:

MaxRtrAdvInterval <= lifetime <= 2*MaxRtrAdvInterval; where MaxRtrAdvInterval is the maximum RA interval

Mellanox Technologies Confidential 777

Rev 4.20

ipv6 nd ra dns-suffix

ipv6 nd ra dns-suffix <domain-name> [lifetime {<time> | infinite}] no ipv6 nd ra dns-suffix [<domain-name>]

Syntax Description

Creates a DNS search list (DNSSL) to include in the neighbor-discovery router advertisements (RAs)

1

.

The no form of the command resets the value of this parameter to its default.

domain-name Domain suffix for IPv6 hosts to append to short unqualified domain names for DNS queries.

The suffix must contain only alphanumeric characters,

“.” (periods), “-” (hyphens), and must begin and end with an alphanumeric character.

lifetime time

Sets the maximum time, in seconds (relative to the time the packet is sent), over which this DNSSL domain name MAY be used for name resolution.

Lifetime must be bounded as follows:

MaxRtrAdvInterval <= Lifetime <= 2*MaxRtrAdvInterval

Possible values:

• 0 – DNSSL must not be used for name resolution

• 1-4294967295 – in seconds infinite A value of all one bits (0xffffffff) equivalent to

4294967295.

The value configured in the command “ipv6 nd ra dns-server”.

Default

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra dns-suffix example lifetime infinite

Related Commands

Note • The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to append to short, unqualified domain names for DNS queries

• Multiple DNS domain names can be added to the DNSSL by reusing the command

• A lifetime value for the DNSSL can optionally be specified with this command which overrides any default value configured for the interface using the command “ipv6 nd ra dns-suffixes lifetime”

1. As defined in RFC 6106.

Mellanox Technologies Confidential 778

Rev 4.20

ipv6 nd ra dns-suffixes lifetime

ipv6 nd ra dns-suffixes lifetime {<time> | infinite} no ipv6 nd ra dns-suffixes lifetime

Syntax Description time infinite

Possible values:

• 0 – DNSSL must not be used for name resolution if no custom value is configured

• 1-4294967295 – in seconds

Equivalent to 4294967295.

1.5 times the RA interval configured on the interface Default

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Creates a DNS search list (DNSSL) to include in the neighbor-discovery router advertisements (RAs)

1

.

The no form of the command resets the value of this parameter to its default.

domain-name Domain suffix for IPv6 hosts to append to short unqualified domain names for DNS queries.

The suffix must contain only alphanumeric characters,

“.” (periods), “-” (hyphens), and must begin and end with an alphanumeric character.

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra dns-suffix example lifetime infinite

Related Commands

Note • The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to append to short, unqualified domain names for DNS queries

• Multiple DNS domain names can be added to the DNSSL by reusing the command

1. As defined in RFC 6106.

Mellanox Technologies Confidential 779

Rev 4.20

ipv6 nd ra hop-limit

ipv6 nd ra hop-limit <limit> no ipv6 nd ra hop-limit

Syntax Description

Sets a suggested hop-limit value to be included in route advertisement (RA) packets.

The no form of the command resets the parameter to its default value.

limit The hop-limit value to be included by attached hosts in outgoing packets.

• 0 – unspecified (by this router)

• 1-255 – number of hops

Default Limit value is 64

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra hop-limit 70

Mellanox Technologies Confidential 780

Rev 4.20

ipv6 nd ra interval max-period

ipv6 nd ra interval max-period <time> [min-period <time>] no ipv6 nd ra interval

Syntax Description

Configures the interval between IPv6 router advertisement (RA) transmissions.

The no form of the command resets the parameter to its default value.

time Maximum interval between successive IPv6 router advertisement transmissions. Range: 4-1800 seconds.

min-period minimum interval between successive IPv6 router advertisement transmissions.

• No parameter: Default is used

• 4-1800: Valid range when scale is set seconds.

Default max-period: 600 seconds min-period: See Note

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra interval max-period 600

• The min-period must be 0.33 * <max-period> if <max-period> is >= 9 seconds; otherwise, the default is MaxRtrAdvInterval

• The parameter min-period must be no less than 3 seconds and no greater than 0.75*maxperiod

Mellanox Technologies Confidential 781

Rev 4.20

ipv6 nd ra lifetime

ipv6 nd ra lifetime <time> no ipv6 nd ra lifetime

Syntax Description

Default 3*<max router advertisement interval>

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

Configures the value that the switch places in the router lifetime field of IPv6 router advertisements (RAs).

The no form of the command resets the parameter to its default value.

time The router lifetime specifies the period that the router can be considered as a default router by RA recipients in seconds.

• 0 – the router should not be considered a default router on this interface

• 1-9000 – lifetime period advertised in RAs should not be less than the max router advertisement interval

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra lifetime 300

Mellanox Technologies Confidential 782

ipv6 nd ra mtu suppress

ipv6 nd ra mtu suppress no ipv6 nd ra mtu suppress

Suppresses the router advertisement (RA) MTU option to ensure that all nodes on a link use the same MTU value.

The no form of the command restores the MTU option to enabled.

Syntax Description

Default

N/A

Suppressed

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra mtu suppress

If not suppressed, MTU of the interface is advertised.

Rev 4.20

Mellanox Technologies Confidential 783

ipv6 nd ra suppress

ipv6 nd ra suppress [all] no ipv6 nd ra suppress

Syntax Description

Suppresses periodic IPv6 router advertisement (RA) transmissions.

The no form of the command restores the transmission of RAs.

all Configures the switch to suppress all RAs, including those responding to a router solicitation.

Default Only unsolicited RAs transmitted periodically are suppressed

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd ra suppress all

Rev 4.20

Mellanox Technologies Confidential 784

ipv6 nd reachable-time

ipv6 nd reachable-time <time> no ipv6 nd reachable-time

Syntax Description

Sets the time period the switch includes in the reachable time field of out-going advertisements (RAs).

The no form of the command resets the parameter to its default value.

time In milliseconds; the reachable time defines the period that a node assumes a neighbor is reachable after having received a reachability confirmation. Range: 0-

3600000 where “0” means unspecified by this router.

Default 0 (unspecified)

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd reachable-time 30000

• RAs that advertise zero seconds indicate that the router does not specify a reachable time

• The default value to use for calculating neighbor reachability time is 30 seconds

Rev 4.20

Mellanox Technologies Confidential 785

Rev 4.20

ipv6 nd router-preference

ipv6 nd router-preference {high | medium | low} no ipv6 nd router-preference

Sets the value the switch enters in the default router preference (DRP) field of router advertisements (RAs) it sends.

The no form of the command resets the parameter to its default value.

Syntax Description

Default

N/A

Medium

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd router-preference high

• IPv6 hosts maintain a default router list from which to select a router for traffic to offlink destinations. The router’s address is then saved in the destination cache. The neighbor discovery protocol (NDP) prefers routers that are reachable or probably reachable over routers whose reachability is unknown or suspect. For reachable or probably reachable routers,

NDP can either select the same router every time or cycle through the router list. DRP values specify a host’s preferred router.

• If router lifetime is zero, preference value must be medium

Mellanox Technologies Confidential 786

ipv6 nd retrans-timer

ipv6 nd retrans-timer <time> no ipv6 nd retrans-timer

Syntax Description

Advertises the time between neighbor solicitation (NS) messages in ICMPv6 router advertisement messages.

The no form of the command resets the parameter to its default value.

time In milliseconds; the time between retransmitted neighbor solicitation messages. Possible values:

• 0 – unspecified

• Range – 1000-4294967295

Default 0 (unspecified)

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd retrans-timer

Rev 4.20

Mellanox Technologies Confidential 787

ipv6 nd dad attempts

ipv6 nd dad attempts <number> no ipv6 nd dad attempts

Syntax Description

Sets the number of consecutive neighbor solicitation messages sent for duplicate address detection (DAD) validation.

The no form of the command resets the value to its default.

number Number of attempts:

• 0 – DAD is not performed

• Valid range: 1-1000

Default 1

Configuration Mode Config Interface VLAN

Config Interface Loopback

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.4.1100

admin switch (config vlan 10) # ipv6 nd dad attempts 10

Rev 4.20

Mellanox Technologies Confidential 788

Rev 4.20

ipv6 neighbor

ipv6 neighbor <ipv6-addr> {ethernet <port> | port-channel <port-channel> | vlan <vlan-id>} <mac_addr> no ipv6 neighbor <ipv6-addr> [{ethernet <port> | port-channel <port-channel> | vlan <vlan-id>}]

Syntax Description

Creates an IPv6 neighbor discovery cache static entry.

The no form of the command removes the specified static entry from the IPv6 neighbor discovery cache. ipv6-addr ethernet <port>

IPv6 address

Ethernet port. Format <slot>/<port>.

VLAN ID

Default vlan <vlan-id>

N/A

Configuration Mode Config

History

Role

3.4.1100

admin

Example

Related Commands

Note switch (config vlan 10) # ipv6 neighbor 2001:db01::1 vlan 10 4:4:4:4:4:4

This command do not affect any dynamic entries in the cache.

Mellanox Technologies Confidential 789

clear ipv6 neighbors

clear ipv6 neighbors [ethernet <port> | port-channel <port-channel> | vlan

<vlan-id>] [<ipv6-addr>]

Syntax Description

Removes the specified dynamic IPv6 neighbor discovery cache entries. ethernet Ethernet port. Format: <slot>/<port>.

vlan ipv6-addr

VLAN interface

IPv6 address

Default N/A

Configuration Mode Config

History

Role

3.4.1100

admin switch (config) # clear ipv6 neighbors ethernet 1/4 Example

Related Commands

Note • Commands that do not specify an IPv6 address remove all dynamic entries for the listed interface

• Commands that do not specify an interface remove all dynamic entries

See the command “clear ipv6 neighbors” on page 148

Rev 4.20

Mellanox Technologies Confidential 790

Rev 4.20

ipv6 route

ipv6 route <ipv6-address> /<length> <next-hop> [<distance>] no ipv6 route <ipv6-address> /<length> [next-hop]

Syntax Description next-hop IPv6 address of the next-hop distance

Default

Configuration Mode Config

Administrative distance assigned to route. Options include:

• No parameter – route is assigned a default administrative distance of 1

• 1-255 – the administrative distance assigned to route

No distance parameter indicated: Administrative distance of 1

History

Role

Example

Creates an IPv6 static route.

The no form of the command deletes static routes. ipv6-address length

IPv6 address. Format: a:b:c:d:e:f:g:h.

Prefix length for the associated address space. Range:

1-128.

3.4.1100

admin switch (config) # ipv6 route 3003:db01:: /64 2001:db01::1 switch (config) #

Related Commands

Note • Static routes have a default administrative distance of 1

• Assigning a higher administrative distance to a static route configures it to be overridden by dynamic routing data.

• Multiple routes which are configured to the same destination with the same administrative distance comprise an Equal Cost Multi-Path (ECMP) route

• A no command not including a source deletes all statements to the destination

Mellanox Technologies Confidential 791

ipv6 routing

ipv6 routing no ipv6 routing

Syntax Description

Default

Enables forwarding IPv6 unicast packets.

The no form of the command disables IPv6 unicast routing.

N/A

Disabled

Configuration Mode Config

History 3.4.1100

Role

Example

Related Commands

Note admin switch (config) # ipv6 routing

• When routing is enabled, the switch attempts to deliver inbound packets to destination addresses by forwarding them to interfaces or next hop addresses specified by the IPv6 routing table

Rev 4.20

Mellanox Technologies Confidential 792

show ipv6 interface

show ipv6 interface [{{ethernet <port> | port-channel <port-channel> | vlan

<vlan-id>}}| brief]

Syntax Description

Displays the status of specified routed interfaces that are configured for IPv6.

ethernet <port> Displays output pertaining to the specified Ethernet interface port-channel <port-channel> vlan <vlan-id>

Displays output pertaining to the specified LAG interface

Displays output pertaining to the specified VLAN interface brief Shows basic IPv6 information regarding all IPv6 interfaces

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.1100

admin switch (config) # show ipv6 interface

Vlan10 is Enabled , line protocol is UP

IPv6 : Enabled

Link-local address : fe80::f652:14ff:fe2d:9808

Global Unicast Addresses :

2001:db01::2 /64

Joined Group Addresses :

ff02::1

ff02::2

ff02::1:ff2d:9808

MTU : 1500 bytes

ICMP error messages limited to every milliseconds : 100

ICMP redirects : enabled

ND DAD : enabled

Number of DAD attempts : 1

ND reachable time (milliseconds) : 30000

ND advertised retransmit interval (milliseconds) : 0

ND router advertisements maximum interval (seconds) : 600

ND router advertisements minimum interval (seconds) : 198

ND router advertisements managed configuration flag : unset

ND router advertisements other configuration flag : unset

ND solicited router advertisement : suppressed

ND router advertisements lifetime (seconds) : 1800

ND advertised default router preference : medium

ND router advertisements hop-limit : 64 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 793

Rev 4.20

show ipv6 neighbors

show ipv6 neighbors [{ethernet <port> | port-channel <port-channel> | vlan

<vlan-id>} | <ipv6-addr> | summary]

Syntax Description

Displays IPv6 neighbor discovery (ND) cache information.

ethernet <port> Shows output pertaining to the specified Ethernet interface.

vlan <vlan-id> Shows output pertaining to the specified VLAN interface.

IPv6 address of individual neighbor

Default ipv6-addr

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.1100

admin switch (config) # show ipv6 route

IPv6 Address MAC Address State Interf

------------------------ ----------------- ---------- ------

2001:db01::1 f4:52:14:2d:98:88 Reachable vlan10 switch (config) #

Related Commands

Note

Mellanox Technologies Confidential 794

Rev 4.20

show ipv6 route

show ipv6 route [<ipv6-addr> <prefix>] [connected | static | summary]

Syntax Description

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.1100

admin switch (config) # show ipv6 route

Destination Mask Gateway Interface Source Distance/Metric fe80:: 64 :: mgmt0 Connected 256/1 fe80:: 64 :: mgmt1 Connected 256/1

2001:db01:: 64 :: vlan10 Connected 1/1

3003:db01:: 64 2001:db01::1 vlan10 Static 1/20 switch (config) #

Related Commands

Note

Displays IPv6 neighbor discovery (ND) cache information.

ipv6-addr Filters routes by IPv6 address or prefix longer-prefixes connected static summary

Displays output for longer prefix entries

Displays entries for routes to networks directly connected to the switch

Displays entries added through CLI commands

Displays the current contents of the IPv6 routing table in summary format

Mellanox Technologies Confidential 795

6.3

OSPF

Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS).

OSPF-speaking routers send Hello packets to all OSPF-enabled IP interfaces. If two routers sharing a common data link agree on certain parameters specified in their respective Hello packets, they become neighbors.

Adjacencies, which can be thought of as virtual point-to-point links, are formed between some neighbors. OSPF defines several network types and several router types. The establishment of an adjacency is determined by the types of routers exchanging Hellos and the type of network over which the Hello packets are exchanged.

Each router sends link-state advertisements (LSAs) over all adjacencies. The LSAs describe all of the router’s links, or interfaces, the router's neighbors, and the state of the links. These links might be to stub networks (those without another router attached), to other OSPF routers, to networks in other areas, or to external networks (those learned from another routing process).

Because of the varying types of link-state information, OSPF defines multiple LSA types.

Each router receiving an LSA from a neighbor records the LSA in its link-state database and sends a copy of the LSA to all of its other neighbors. By flooding LSAs throughout an area, all routers will build identical link-state databases.

When the databases are complete, each router uses the SPF algorithm to calculate a loop-free graph describing the shortest (lowest cost) path to every known destination, with itself as the root.

When all link-state information has been flooded to all routers in an area, and neighbors have verified that their databases are identical, it means the link-state databases have been synchronized and the route tables have been built. Hello packets are exchanged between neighbors as keepalives, and LSAs are retransmitted. If the network topology is stable, no other activity should occur.

For OSPF network design over Mellanox L2 VMS, please refer to Mellanox Virtual Modular

Switch Reference Guide .

6.3.1

Router ID

The router ID is a 32-bit number assigned to the router running the OSPF protocol. This number uniquely identifies the router within an Autonomous System.

Router ID can be configured statically, however, if it is not configured, then the default election is as follows:

• If a loopback interface already exists, the router ID takes the loopback IP address;

• Otherwise, the lowest IP address is elected as router ID

6.3.2

ECMP

Equal-cost multi-path (ECMP) routing is a routing strategy where next-hop packet forwarding to a single destination can occur over multiple paths. The OSPF link-state routing algorithm can find multiple routes to the same destination, all multiple routes are added to the routing table only if those routes are equal-cost routes.

Rev 4.20

Mellanox Technologies Confidential 796

In case there are several routes with different cost, only the route with the lowest cost is selected.

In case there are multiple routes with the same lowest cost, all of them are used (up to maximum of 64 ECMP routes).

ECMP is not configurable but is enabled by default for OSPF.

6.3.3

Configuring OSPF

Figure 30: OSPF Basic Topology

Rev 4.20

Precondition steps:

The following configuration example refers to Router 2 in Figure 30

. The remainder of the routers in the figure are configured similarly.

It is recommended to disable STP before enabling OSPF. Use the command no spanning-tree .

Step 1.

Step 2.

Step 3.

Step 4.

Make sure an L3 license is installed. For a list of the available licenses see

Section 2.4,

“Licenses,” on page 40

.

Enable IP routing functionality. Run: .

switch (config)# ip routing

Enable the desired VLAN. Run: .

switch (config)# vlan 10 switch (config)# vlan 20

Add this VLAN to the desired interface. Run: switch (config)# interface ethernet 1/1 switch (config ethernet 1/1)# switchport access vlan 10 switch (config ethernet 1/1)# exit switch (config)# interface ethernet 1/2 switch (config ethernet 1/2)# switchport access vlan 20

Mellanox Technologies Confidential 797

Step 5.

Step 6.

Step 7.

Step 8.

Create a VLAN interface. Run: switch (config)# interface vlan 10

Apply IP address to the VLAN interface. Run: switch (config interface vlan 10)# ip address 10.10.10.2 /16

Enable the interface. Run: switch (config interface vlan 10)# no shutdown

Create a second VLAN interface. Run: switch (config)# interface vlan 20

Step 9.

Step 2.

Apply IP address to the second VLAN interface. Run: switch (config interface vlan 20)# ip address 10.10.20.2 /16

Step 10.

Enable the second interface. Run: switch (config interface vlan 20)# no shutdown

Basic OSPF Configuration:

Step 1.

To enable OSPF configuration run: switch (config)# protocol ospf

To create a router OSPF instance run: switch (config)# router ospf

Only one instance of OSPF is supported.

Step 3.

Associate the VLAN interfaces to the OSPF area. Area 0 is the backbone area, run: switch (config interface vlan 10)# ip ospf area 0 switch (config interface vlan 10)# exit switch (config)# interface vlan 20 switch (config interface vlan 20)# ip ospf area 0

6.3.4

Verifying OSPF

To verify OSPF configuration and status:

Step 1.

Verify OSPF configuration and status. Run: switch (config) # show ip ospf

Routing Process 1 with ID 10.10.10.10 vrf-default

Stateful High Availability disabled

Graceful-restart is not supported

Supports only single TOS (TOS 0) route

Opaque LSA not supported

OSPF Admin State is enabled

Mellanox Technologies Confidential 798

Rev 4.20

Rev 4.20

Redistributing External Routes: Disabled

Administrative distance 110

Reference Bandwidth is 40Gb

Initial SPF schedule delay 1 msecs

SPF Hold time 10 msecs

Maximum paths to destination 64

Router is not originating router LSA with maximum metric

Condition: Always

Number of external LSAs 0, checksum sum 0

Number of opaque AS LSAs 0,checksum sum 0

Number of areas is 1, 1 normal, 0 stub, 0 nssa

Number of active areas is 1, 1 normal, 0 stub, 0 nssa

Area (0.0.0.0) (Active)

Interfaces in this area: 2 Active Interfaces: 2

Passive Interfaces: 0

SPF Calculation has run 5 times

This area is Normal area

Number of LSAs: 1, checksum sum 7700

Step 2.

switch (config) #

Verify the OSPF neighbors status. Make sure that each neighbor reaches FULL state with its peer to enable it take part in all dynamic routing changes in the network. Run: switch (config) # show ip ospf neighbors

Neighbor 10.10.10.1, interface address 10.10.10.2

In the area 0.0.0.0 via interface Vlan 10

Neighbor priority is 1, State is FULL

BDR is 10.10.10.1

Options 0

Dead timer due in 35

Neighbor 10.10.20.1, interface address 10.10.20.2

In the area 0.0.0.0 via interface Vlan 20

Neighbor priority is 1, State is FULL

BDR is 10.10.20.1

Options 0

Dead timer due in 35 switch (config) #

Mellanox Technologies Confidential 799

Step 3.

Verify the OSPF Interface configuration and status run: switch (config) # show ip ospf interface

Interface Vlan is 10 Enabled, line protocol is Down

IP address 10.10.10.2, Mask 255.255.0.0

Process ID 1 VRF Default, Area 0.0.0.0

OSPF Interface Admin State is enabled

State DOWN, Network Type BROADCAST, Cost 1

Transmit delay 1 sec, Router Priority 1

No designated router on this network

No backup designated router on this network

Timer intervals (sec's): Hello 10, Dead 40, Wait 40, Retransmit 5

No authentication

Number of opaque link LSAs: 0, checksum sum 0

Interface Vlan is 20 Enabled, line protocol is Up

IP address 10.10.20.2, Mask 255.255.0.0

Process ID 1 VRF Default, Area 0.0.0.0

OSPF Interface Admin State is enabled

State DESIGNATED ROUTER, Network Type BROADCAST, Cost 1

Transmit delay 1 sec, Router Priority 1

No designated router on this network

No backup designated router on this network

Timer intervals (sec's): Hello 10, Dead 40, Wait 40, Retransmit 5

No authentication

Number of opaque link LSAs: 0, checksum sum 0 switch (config) #

Rev 4.20

Mellanox Technologies Confidential 800

6.3.5

Commands

6.3.5.1 Config

protocol ospf

protocol ospf no protocol ospf

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note ip routing

Enables Open Shortest Path First Protocol (OSPF), and unhides the related OSPF commands.

The no form of the command deletes the OSPF configuration and hides the OSPF related commands.

N/A

OSPF feature is disabled.

Config

3.3.3500

admin switch (config)# protocol ospf

Rev 4.20

Mellanox Technologies Confidential 801

router ospf

router ospf no router ospf

Syntax Description

Default

Enters router OSPF configuration mode, and creates default OSPF instance if not exist.

The no form of the command deletes the OSPF instance.

N/A

No router OSPF is created.

Configuration Mode Config

History 3.3.3500

Role

Example admin switch (config)# router ospf switch (config router ospf)#

Related Commands N/A

Note Only one OSPF instance is supported.

Rev 4.20

Mellanox Technologies Confidential 802

6.3.5.2 Config Router

router-id

router-id <ip-address> no router-id

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

N/A

Sets Router ID for the OSPF instance.

The no form of the command causes automatic election of router ID by the router.

ip-address The Router id in IP address format.

The router ID is a 32-bit number assigned to the router running the OSPF protocol.

This number uniquely identifies the router within an Autonomous System.

Router ID can be configured statically, however, if it is not configured, then the default election is as follows:

• If a loopback interface already exists, the router ID takes the loopback IP address;

• Otherwise, the lowest IP address is elected as router ID.

Config OSPF Router

3.3.3500

admin switch (config router ospf)# router-id 10.10.10.10

Rev 4.20

Mellanox Technologies Confidential 803

shutdown

shutdown no shutdown

Syntax Description

Default

Disables the OSPF instance.

The no form of the command enables the OSPF instance.

N/A

Enable (no shutdown)

Configuration Mode Config OSPF Router

History 3.3.3500

Role

Example admin switch (config router ospf)# shutdown

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 804

auto-cost reference-bandwidth

auto-cost reference-bandwidth <ref-bw> no auto-cost reference-bandwidth

Syntax Description

Default

Configures reference-bandwidth in Gb/s (Default) or Mb/s.

The no form of the command resets this parameter to its default value.

value

Gb/s

Configuration Mode Config OSPF Router

History 3.3.3500

Range: 1-4294

Role

Example admin switch (config router ospf)# auto-cost reference-bandwidth

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 805

distance

distance <value> no distance

Syntax Description

Default

Configures the OSPF route administrative distance.

The no form of the command resets this parameter to default.

value

110

Configuration Mode Config OSPF Router

History 3.3.3500

OSPF administrative distance. Range is 1-255.

Role

Example admin switch (config router ospf)# distance 100

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 806

Rev 4.20

redistribute

redistribute {bgp | direct | static} no redistribute {bgp | direct | static}

Syntax Description

Import routes from other routing protocols as well as any statically configured routers into OSPF.

The no form of the command disables the importing of the routes.

direct bgp

Redistribute directly connected routes.

Redistribute routes from BGP protocol.

Redistribute static configured routes.

Default static

Disable (no redistribution)

Configuration Mode Config OSPF Router

History

Role

3.2.1000

admin

Example switch (config router ospf)# redistribute direct

Related Commands N/A

Note Routes from multiple protocols can be imported in parallel.

Mellanox Technologies Confidential 807

Rev 4.20

timers throttle spf

timers throttle spf <spf-delay> <spf-hold> no timers throttle spf

Syntax Description

Sets the OSPF throttle SPF timers.

The no form of the command resets the timers to default.

spf-delay The interval by which SPF calculations delayed after a topology change reception. Range is 0-100 milliseconds.

spf-hold The minimum delay between two consecutive delay calculations. Range is 0-1000 milliseconds.

Default

Configuration Mode Config OSPF Router

History 3.3.3500

Role

Example spf-delay: 1 millisecond spf-hold: 10 millisecond admin switch (config router ospf)# timers throttle spf 100 1000

Related Commands N/A

Note

Mellanox Technologies Confidential 808

Rev 4.20

area default-cost

area <area-id> default-cost <cost> no area <area-id> default-cost

Syntax Description

Specifies cost for the default summary route sent into an OSPF stub or not-so-stubby area (NSSA).

The no form of the command sets the cost to the default value.

area-id cost

OSPF area-id. Range is 0-4294967295.

The cost for the default summary route. Range is 1-

16777215.

Default

Configuration Mode Config OSPF Router

History 3.3.3500

Role

Example

The summary route cost is based on the area border router that generated the summary route.

admin switch (config router ospf)# area 0 default-cost 100

Related Commands N/A

Note Base cost for all calculation is 56GbE.

Mellanox Technologies Confidential 809

Rev 4.20

area range

area <area-id> range <ip-address> <prefix> [not-advertise] no area <area-id> range <ip-address> <prefix> [not-advertise]

Syntax Description

Consolidates and summarizes routes at an OSPF area boundary.

The no form of the command removes the ip-prefix range from summarization.

area-id ip-address

OSPF area-ID. Range is 0-4294967295.

IP Address.

not-advertise prefix

Suppresses routes that match the specified IP address.

Netowrk prefix (in the format of /24, or 255.255.255.0 for example).

Default Disabled

Configuration Mode Config OSPF Router

History

Role

3.3.3500

admin

Example switch (config router ospf)# area 0 range 10.10.10.10 /24

Related Commands N/A

Note

Mellanox Technologies Confidential 810

area stub

area <area-id> stub [no-summary] no area <area-id> [stub [no-summary]]

Syntax Description

Configures an area as an OSPF stub area (an area is created if non-existent).

The no form of the command removes the stub area configuration and changes the area to normal, or deletes the area (if stub is not used).

area-id no-summary

OSPF area-ID. Range is 0-4294967295.

Summary route will not be advertized into the stub area.

Default Summary route will be advertized.

Configuration Mode Config OSPF Router

History

Role

3.3.3500

admin

Example switch (config router ospf)# area 0 stub

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 811

Rev 4.20

area nssa

area <area-id> nssa [default-information-originate [metric <m-value>] [metrictype <m-type>]] [nosummary] [translate type7 always] no area <area-id> nssa [default-information-originate ] [no-summary] [translate type7 always]

Syntax Description

Configures an area as an OSPF not-so-stubby (NSSA) area.

The no form of the command removes the NSSA area configuration and changes the area to default.

area-id default-information-originate

OSPF area ID. Range is 0-4294967295.

A default type7 LSA (Link State Advertisements) is generated into the NSSA area.

m-type m-value no-summary translate type7 always

Metric type for OSPF. Range is 1-2.

Metric value for OSPF. Range is 1-65535.

Summary route will not be advertized into the NSSA area.

Type7 LSAs is translated to type5 LSAs (Link State

Advertisements).

Default Default m-type:2

Default m-value:10

Configuration Mode Config OSPF Router

History 3.3.3500

Role

Example admin switch (config router ospf)# area 0 nssa

Related Commands N/A

Note An area can be either stub, NSSA or normal.

Mellanox Technologies Confidential 812

Rev 4.20

summary-address

summary-address <ip-address> <prefix> [not-advertise] no summary-address <ip-address> <prefix> [not-advertise]

Syntax Description

Creates aggregate addresses for the OSPF protocol.

The no form of the command disables the aggregation of the ip-address.

ip-address not-advertise prefix

The summary IP address.

Suppresses routes that match the specified ip-address.

Network prefix (in the format of /24 or 255.255.255.0, for example).

Default N/A

Configuration Mode Config OSPF Router

History

Role

3.3.3500

admin

Example switch (config router ospf)# summary-address 10.10.10.10 /24

Related Commands N/A

Note Maximum of 1500 summarized IP addresses can be configured.

Mellanox Technologies Confidential 813

Rev 4.20

6.3.5.3 Interface

ip ospf cost

ip ospf cost <cost> no ip ospf cost <cost>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Sets OSPF cost of sending packet of this interface.

The no form of the command resets this parameter to default.

cost

1

The Interface cost used by the OSPF. Range is 1-65535.

Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

3.3.3500

admin switch (config interface vlan 10)# ip ospf cost 100

N/A

Mellanox Technologies Confidential 814

Rev 4.20

ip ospf dead-interval

ip ospf dead-interval <seconds> no ip ospf dead-interval

Syntax Description

Default

Configures the interval during which at least one Hello packet must be received from a neighbor before the router declares that neighbor as down.

The no form of the command resets this parameter to its default.

seconds

40

The dead-interval timer, in seconds. Range is 1-65535.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.3500

admin

Example switch (config interface vlan 10)# ip ospf dean-interval 10

Related Commands N/A

Note The value must be the same for all nodes on the network.

Mellanox Technologies Confidential 815

Rev 4.20

ip ospf hello-interval

ip ospf hello-interval <seconds> no ip ospf hello-interval

Syntax Description

Default

Configures the interval between Hello packets that OSPF sends on the interface.

The no form of the command resets this parameter to default.

seconds

10

The Hello interval timer, in seconds. Range is 1-65535.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.3500

admin

Example switch (config interface vlan 10)# ip ospf hello-interval 20

Related Commands N/A

Note The value must be the same for all nodes on the network.

Mellanox Technologies Confidential 816

Rev 4.20

ip ospf priority

ip ospf priority <number> no ip ospf priority

Syntax Description

Configures the priority for this OSPF interface.

The no form of the command resets this parameter to default.

number The Interface priority used by the OSPF protocol.

Range is 0-255

Default 1

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.3500

admin

Example switch (config interface vlan 10)# ip ospf priority 100

Related Commands N/A

Note • Use the “ip ospf priority” command to set the router priority, which determines the designated router for this network. When two routers are attached to a network, both attempt to become the designated router.

• The router with the higher router priority takes precedence. If there is a tie, the router with the higher router ID takes precedence. A router with a router priority set to zero cannot become the designated router or backup designated router.

Mellanox Technologies Confidential 817

Rev 4.20

ip ospf network

ip ospf network <type> no ip ospf network

Syntax Description

Sets the OSPF interface network type.

The no form of the command resets the interface network type to its default.

type The network type on this interface. The options are

‘broadcast’ or ‘point-to-point’.

Default broadcast

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.3500

admin

Example switch (config interface vlan 10)# ip ospf network point-to-point

Related Commands N/A

Note • The network type influences the behavior of the OSPF interface. An OSPF network type is usually broadcast, which uses OSPF multicasting capabilities. Under this network type, a designated router and backup designated router are elected. For point-to-point networks, there are only two neighbors and multicast is not required.

• All routers on the same network should have the same network type.

Mellanox Technologies Confidential 818

ip ospf retransmit-interval

ip ospf retransmit-interval <seconds> no ip ospf retransmit-interval

Syntax Description

Default

Configures the time between OSPF link-state advertisement (LSA) retransmissions for adjacencies that belongs to the interface.

The no form of the command resets this parameter to its default.

seconds

5

The retransmit interval in seconds. Range is 0-3600.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip ospf retransmit-interval 10

Related Commands N/A

Note

3.3.3500

admin

Rev 4.20

Mellanox Technologies Confidential 819

ip ospf passive-interface

ip ospf passive-interface no ip ospf passive-interface

Suppresses flooding of OSPF routing updates on an interface.

The no form of the command reverts the status to active OSPF interface.

Syntax Description

Default

N/A

Active interface (no ip ospf passive-interface)

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip ospf passive-interface

Related Commands N/A

Note

3.3.3500

admin

Rev 4.20

Mellanox Technologies Confidential 820

ip ospf transmit-delay

ip ospf transmit-delay <seconds> no ip ospf transmit-delay

Syntax Description

Sets the estimated time required to send an OSPF link-state update packet.

The no form of the command resets this parameter to its default.

seconds The transmit-delay interval in seconds. Range is 0-

3600.

Default 1

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip ospf transmit-delay 2

Related Commands N/A

Note

3.3.3500

admin

Rev 4.20

Mellanox Technologies Confidential 821

ip ospf shutdown

ip ospf shutdown no ip ospf shutdown

Disables the OSPF instance on the interface.

The no form of the command enables the OSPF on this interface.

Syntax Description

Default

N/A

Enabled (no shutdown)

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip ospf shutdown

Related Commands N/A

Note

3.3.3500

admin

Rev 4.20

Mellanox Technologies Confidential 822

ip ospf authentication

ip ospf authentication [message-digest] no ip ospf authentication

Syntax Description

Specifies the authentication type for OSPF.

The no form of the command disables the authentication.

message-digest Specifies that message-digest authentication (MD5) is used.

Default Disabled (no)

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.3500

admin

Example switch (config interface vlan 10)# ip ospf authentication

Related Commands N/A

Note • Without message-digest option, a simple password authentication will be used.

• Message-digest authentication can be enabled only if a key is configured.

Rev 4.20

Mellanox Technologies Confidential 823

Rev 4.20

ip ospf authentication-key

ip ospf authentication-key [<auth-type>] <password> no ip ospf authentication-key

Syntax Description

Default password

Unencrypted password

Authentication password, up to 8 alphanumeric string.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

To assign a password for simple password authentication for the OSPF.

The no form of the command deletes the simple password authentication key.

auth-type The authentication type:

0 – unencrypted password

7 – MD5 key

3.3.3500

admin switch (config interface vlan 10)# ip ospf authentication-key 0 mycleartextpassword

Related Commands N/A

Note • When selecting an encrypted password “7”, the user must input a password encrypted with an MD5 key.

• When selecting an unencrypted password “0”, the user must input a cleartext password.

Then when examining the running-config, it exhibits the encrypted password.

Mellanox Technologies Confidential 824

ip ospf message-digest-key

ip ospf message-digest-key <key-id> md5 [auth-type] <key> no ip ospf message-digest-key <key-id>

Syntax Description

Sets the message digest key for MD5 authentication.

The no form of the command deletes the key for MD5 authentication.

auth-type The authentication type:

0 - Unencrypted password

7 - MD5 key key key-id

Authentication password, up to 8 alphanumeric string.

Alphanumeric password of up to 16 bytes.

Default Unencrypted (no)

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.3.3500

admin switch (config interface vlan 10)# ip ospf message-digest-key mykeyid md5 7 mykey

Related Commands N/A

Note The user cannot delete the last key until authentication is disabled.

Rev 4.20

Mellanox Technologies Confidential 825

ip ospf area

ip ospf area <area-id> no ip ospf area

Syntax Description

Default

Sets OSPF area of this interface (and creates the area if non-existent).

The no form of the command removes the interface from the area.

area-id

N/A

OSPF area ID. Range is 0-4294967295.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

Config Interface Loopback

History

Role

Example switch (config interface vlan 10)# ip ospf area 0

Related Commands N/A

Note

3.3.3500

admin

Rev 4.20

Mellanox Technologies Confidential 826

6.3.5.4 Show

show ip ospf

show ip ospf

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Displays general OSPF configuration and status.

N/A

N/A

Any Command Mode

3.3.3500

admin switch (config)# show ip ospf

Routing Process 201 with ID 192.0.2.1 VRF default

Admin Status is Enabled

Stateful High Availability enabled

Graceful-restart is configured

N/A

Rev 4.20

Mellanox Technologies Confidential 827

show ip ospf border-routers

show ip ospf border-routers

Syntax Description

Default

Displays routing table entries to an Area Border Routers.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin switch# show ip ospf border-routers

OSPF Process ID p1, vrf default Internal Routing Table

Codes: i - Intra-area route, I - Inter-area route i 40.40.40.40 [10], ABR, Area 0.0.0.0, SPF 71 via

192.0.2.1, Ethernet2/1 i 60.60.60.60 [20], ABR, Area 0.0.0.0, SPF 71 via

192.0.2.1, Ethernet2/1 i 40.40.40.40 [10], ABR, Area 0.0.0.1, SPF 71 via

192.0.2.1, Ethernet2/2 i 60.60.60.60 [20], ABR, Area 0.0.0.1, SPF 71 via

192.0.2.1, Ethernet2/2

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 828

show ip ospf database

show ip ospf database [summary] [<area-id> [<link-state-id>]] [adv-router <ipaddress> | self-originated]

Syntax Description

Displays the OSPF database.

adv-router <ip-address> Filters per advertize router area-id Filters the command per OSPF area-id. Range is 0-

4294967295.

link-state-id self-originated

Default summary

N/A

Configuration Mode Any Command Mode

The link state ID

Self Originate

Summarizes the output of the OSPF database.

History

Role

Example

3.3.3500

admin

Router# show ip ospf database

OSPF Router with ID (50.50.50.50) (Process ID p1)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link Count

40.40.40.40 40.40.40.40 930 0x80000004 0x2ea1 3

50.50.50.50 50.50.50.50 935 0x80000002 0x8b52 1

60.60.60.60 60.60.60.60 943 0x800003c5 0x9854 2

Network Link States (Area 0)

Link ID ADV Router Age Seq# Checksum

209.165.201.3 60.60.60.60 944 0x80000001 0x7179

192.0.2.1 50.50.50.50 935 0x80000001 0x516a

Summary Network Link States (Area 0)

Link ID ADV Router Age Seq# Checksum

209.165.201.1 40.40.40.40 929 0x80000001 0x2498

209.165.201.1 50.50.50.50 928 0x80000001 0x5b2f

209.165.201.1 60.60.60.60 1265 0x800003c3 0xf49b

192.0.2.0 40.40.40.40 943 0x80000001 0x53f3

192.0.2.0 50.50.50.50 935 0x80000001 0x26f8

192.0.2.0 60.60.60.60 930 0x80000001 0x7b51

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 829

Rev 4.20

show ip ospf interface

show ip ospf interface [vlan <vlan-id>] [brief]

Syntax Description

Displays the OSPF related interface configuration.

brief Gives a brief summary of the output.

vlan <vlan-id> Displays OSPF interface configuration and status per

VLAN interface.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin switch# show ip ospf interface ethernet 1/5

Ethernet1/5 is up, line protocol is down

IP address 192.0.2.1, Process ID 201 VRF RemoteOfficeVRF, area 0.0.0.10

Enabled by interface configuration

State DOWN, Network type BROADCAST, cost 4

Index 1, Transmit delay 1 sec, Router Priority 1

No designated router on this network

No backup designated router on this network

0 Neighbors, flooding to 0, adjacent with 0

Timer intervals: Hello 10, Dead 40, Wait 40, Retransmit 5

No authentication

Number of opaque link LSAs: 0, checksum sum 0 switch#

This example shows how to display OSPF information in a brief format: switch# show ip ospf interface brief

OSPF Process ID 201 VRF default

Total number of interface: 1

Interface ID Area Cost State Neighbors Status

VL1 2 0.0.0.0 65535 DOWN 0 down switch#

Related Commands N/A

Note

Mellanox Technologies Confidential 830

Rev 4.20

show ip ospf neighbors

show ip ospf neighbors [vlan <vlan-id>] [<neighbor-id>]

Syntax Description

Displays the OSPF related interface neighbor configuration.

vlan <vlan-id> Displays OSPF interface configuration and status per

VLAN interface.

Filers the output per a specific OSPF neighbor.

Default neighbor-id

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin

Router# show ip ospf neighbors 10.199.199.137

Neighbor 10.199.199.137, interface address 192.0.2.37

In the area 0.0.0.0 via interface Ethernet2/1

Neighbor priority is 1, State is FULL

Options 2

Dead timer due in 0:00:32

Link State retransmission due in 0:00:04

Neighbor 10.199.199.137, interface address 209.165.201.189

In the area 0.0.0.0 via interface Ethernet4/3

Neighbor priority is 5, State is FULL

Options 2

Dead timer due in 0:00:32

Link State retransmission due in 0:00:03

This example shows how to display the neighbors that match the neighbor

ID on an interface:

Router# show ip ospf neighbors ethernet 2/1 10.199.199.137

Neighbor 10.199.199.137, interface address 192.0.2.37

In the area 0.0.0.0 via interface Ethernet2/1

Neighbor priority is 1, State is FULL

Options 2

Dead timer due in 0:00:37

Link State retransmission due in 0:00:04

This example shows how to display detailed information about OSPF neighbors:

Router# show ip ospf neighbors detail

Neighbor 192.168.5.2, interface address 10.225.200.28

In the area 0 via interface GigabitEthernet1/0/0

Neighbor priority is 1, State is FULL, 6 state changes

DR is 10.225.200.28 BDR is 10.225.200.30

Options is 0x42

LLS Options is 0x1 (LR), last OOB-Resync 00:03:08 ago

Dead timer due in 00:00:36

Neighbor is up for 00:09:46

Index 1/1, retransmission queue length 0, number of retransmission 1

First 0x0(0)/0x0(0) Next 0x0(0)/0x0(0)

Last retransmission scan length is 1, maximum is 1

Last retransmission scan time is 0 msec, maximum is 0 msec

Mellanox Technologies Confidential 831

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 832

show ip ospf request-list

show ip ospf request-list <neighbor-id> vlan <vlan-id>

Syntax Description

Displays the OSPF list of all link-state advertisements (LSAs) requested by a router.

neighbor-id Filers the output per a specific OSPF neighbor.

Filers the output per a specific VLAN ID.

Default vlan-id

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin

Router# show ip ospf request-list 40.40.40 ethernet 2/1

OSPF Process ID p1

Neighbor 40.40.40.40, interface Ethernet2/1, address 192.0.2.1

1 LSAs on request-list

Type LS ID ADV RTR Seq NO Age Checksum

1 192.0.2.12 192.0.2.12 0x8000020D 8 0x6572

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 833

Rev 4.20

show ip ospf retransmission-list

show ip ospf retransmission-list <neighbor-id> vlan <vlan-id>

Syntax Description

Displays the OSPF list of all link-state advertisements (LSAs) waiting to be resent to neighbors.

neighbor-id vlan-id

Filers the output per a specific OSPF neighbor.

Filers the output per a specific VLAN ID.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.3500

admin

Router# show ip ospf retransmission-list 192.0.2.11 ethernet 2/1

OSPF Router with ID (192.0.2.12) (Process ID 1)

Neighbor 192.0.2.11, interface Ethernet2/1 address 209.165.201.11

Link state retransmission due in 3764 msec, Queue length 2

Type LS ID ADV RTR Seq NO Age Checksum

1 192.0.2.12 192.0.2.12 0x80000210 0 0xB196

Related Commands N/A

Note

Mellanox Technologies Confidential 834

Rev 4.20

show ip ospf summary-address

show ip ospf summary-address

Syntax Description

Default

Displays a list of all summary address redistribution information configured on the

OSPF.

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.3500

Role

Example admin switch (config)# show ip ospf summary-address

Display of Summary addresses for External Routes and area ranges for the summary LSAs

OSPF Process default

OSPF External Summary Address and area-range Configuration Information

-------------------------------------------------------

Network Mask Area Advertise LSA type Metric Tag

--------------------------------------------------------------

1.1.1.1 255.255.255.0 NA Advertise Type5 10 0

2.2.2.0 255.255.255.0 10.10.10.10 Not Advertise Type3 10 0

Related Commands N/A

Note

Mellanox Technologies Confidential 835

6.4

BGP

Border Gateway Protocol (BGP) is an exterior gateway protocol which is designed to transfer routing information between routers. It maintains and propagates a table of routes which designates network reachability among autonomous systems (ASs).

BGP neighbors, or peers, are routers configured manually to converse using the BGP protocol on top of a TCP session on port 179. A BGP speaker periodically sends keep-alive messages to maintain the connection. Network reachability includes such information as forwarding destinations (IPv4 or IPv6) together with a list of ASs that this information traverses and other attributes, so it becomes possible to construct a graph of AS connectivity without routing loops. BGP makes possible to apply policy rules to enforce connectivity graph.

BGP routers communicate through TCP connection on port 179. Connection between BGP neighbors is configured manually or can be established dynamically by configuring dynamic listen groups. When BGP runs between two peers in the same AS, it is referred to as Internal BGP

(iBGP, or Interior Border Gateway Protocol). When it runs between separate ASs, it is called

External BGP (eBGP, or Exterior Border Gateway Protocol). Both sides can initiate a connection, after the initial connectivity is created, BGP state machine drives both sides to enter into ESTAB-

LISHED state where they can exchange UPDATE messages with reachability information.

6.4.1

State Machine

In order to make decisions in its operations with peers, a BGP peer uses a simple finite state machine (FSM) that consists of six states: Idle; Connect; Active; OpenSent; OpenConfirm; and

Established. For each peer-to-peer session, a BGP implementation maintains a state variable that tracks which of these six states the session is in. The BGP protocol defines the messages that each peer should exchange in order to change the session from one state to another.

The first state is the “Idle” state. In “Idle” state, BGP initializes all resources, refuses all inbound

BGP connection attempts and initiates a TCP connection to the peer. The second state is “Connect”. In the “Connect” state, the router awaits the TCP connection to complete and transitions to the “OpenSent” state if successful. If unsuccessful, it initializes the ConnectRetry timer and transitions to the “Active” state upon expiration. In the “Active” state, the router resets the ConnectRetry timer to zero and returns to the “Connect” state. In the “OpenSent” state, the router sends an Open message and waits for one in return in order to transition to the “OpenConfirm” state.

KeepAlive messages are exchanged and, upon successful receipt, the router is placed into the

“Established” state. In the “Established” state, the router can send/receive: KeepAlive; Update; and Notification messages to/from its peer.

6.4.2

Configuring BGP

Figure 31: Basic BGP Configuration

Rev 4.20

Mellanox Technologies Confidential 836

Rev 4.20

Follow these steps for basic BGP configuration on two switches (Router 1 and Router 2):

Preconditions:

Step 1.

Step 2.

Make sure the license installed supports L3.

Enable IP routing functionality. Run: switch (config)# ip routing

Step 3.

Enable the desired VLAN. Run: switch (config)# vlan 10

The same VLAN must be configured on both switches.

Step 4.

Step 5.

Step 6.

Add this VLAN to the desired interface. Run: switch (config)# interface ethernet 1/1 switch (config ethernet 1/1)# switchport access vlan 10

Create a VLAN interface. Run: switch (config)# interface vlan 10

Apply IP address to the VLAN interface on Router 1. Run: switch (config interface vlan 10)# ip address 10.10.10.1 /24

Step 7.

Step 2.

Apply IP address to the VLAN interface on Router 2. Run: switch (config interface vlan 10)# ip address 10.10.10.2 /24

Step 8.

Enable the interface. Run: switch (config interface vlan 10)# no shutdown

Configure BGP:

Step 1.

Enable BGP. Run: switch (config)# protocol bgp

Configure an AS number that identifies the BGP router. Run: switch (config)# router bgp 100

To run iBGP, the AS number of all remote neighbors should be similar to the local AS number of the configured router.

Step 3.

Step 4.

Configure BGP Router 1 neighbor. Run:.

switch (config router bgp 100)# neighbor 10.10.10.2 remote-as 100

Configure BGP Router 2 neighbor. Run:.

switch (config router bgp 100)# neighbor 10.10.10.1 remote-as 100

Mellanox Technologies Confidential 837

Rev 4.20

6.4.3

Verifying BGP

Step 1.

Check the general status of BGP. Run: switch (config)# show ip bgp summary

BGP router identifier 10.10.10.1, local AS number 100

BGP table version is 100, main routing table version 100

0 network entries using 0 bytes of memory

0 path entries using 0 bytes of memory

0 BGP AS-PATH entries using 0 bytes of memory

0 BGP community entries using 0 bytes of memory

0 BGP extended community entries using 0 bytes of memory

Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd

10.10.10.2 0 100 100 76 3 0 0 00:0:10:19 ESTABLISHED switch (config)#

BGP summary information for VRF default, address family IPv4

Step 2.

• Verify that the state of each BGP neighbor reached to ESTABLISHED state.

• In case the neighbor is disabled (shutdown). The state of the neighbor will be IDLE.

• BGP incoming and outgoing messages should be incremented.

• The AS number of each neighbor is the correct one.

Check the status of the neighbors. Run: switch (config)# show ip bgp neighbors

BGP neighbor is 10.10.10.2, remote AS 100, external link

BGP version 0, remote router ID 0.0.0.0

BGP State = ESTABLISHED

Last read 0:00:00:00, last write 0:00:00:00, hold time is 180, keepalive interval is 60 seconds

Configured hold time is 180, keepalive interval is 60 seconds

Minimum holdtime from neighbor is 0 seconds switch (config)#

You should be able to see running BGP counters and ESTABLISHED state per active neighbor.

Mellanox Technologies Confidential 838

6.4.4

Commands

6.4.4.1 Config

protocol bgp

protocol bgp no protocol bgp

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables BGP feature, and unhides BGP related commands.

The no form of the command deletes all BGP configuration and hides BGP related commands.

N/A

Disabled

Config

3.3.5006

admin switch (config)# protocol bgp switch (config)# ip routing

Rev 4.20

Mellanox Technologies Confidential 839

Rev 4.20

clear ip bgp

clear ip bgp [{<ip-address> | all} [soft] [in | out]]

Syntax Description

Clears BGP learned routes from the BGP table and resets the connection to the neighbor.

ip-address A BGP peer IP address. Only the specified neighbor is reset.

all soft

All BGP peers. All BGP neighbors are reset.

Clears BGP learned routes from the BGP table without resetting the connection to the neighbor.

in out

Default N/A

Configuration Mode Config

History 3.3.5006

3.3.5200

Inbound routes are reset.

Outbound routes are reset.

Role

Example

First release

Updated description admin switch (config)# clear ip bgp all switch (config)#

Related Commands N/A

Note This command removes BGP IPv4 learned routes from the routing table, reads all routes from designated peers, and sends routes to those peers as required.

Mellanox Technologies Confidential 840

router bgp

router bgp <as-number> no router bgp <as-number>

Syntax Description

Default N/A

Configuration Mode Config

History 3.3.5006

3.3.5200

Role

Example

Creates and enters a BGP instance with the specified AS number.

The no form of the command deletes all router BGP instance configuration.

as-number Autonomous system number: A unique number to be used to identify the AS. The AS is a number which identifies the BGP router to other routers and tags the routing information passed along. Range: 1-65535.

admin

First version

Updated syntax description switch (config)# router bgp 100 switch (config router bgp 100)#

Related Commands ip routing

Note

Rev 4.20

Mellanox Technologies Confidential 841

6.4.4.2 Config Router

shutdown

shutdown no shutdown

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Gracefully disables BGP protocol without removing existing configuration.

The no form of the command enables BGP.

N/A

Enabled

Config Router BGP

3.3.5006

admin switch (config router bgp 100)# no shutdown

Rev 4.20

Mellanox Technologies Confidential 842

Rev 4.20

aggregate-address

aggregate-address <prefix> [summary-only] [as-set] [attribute-map] no aggregate-address <prefix> [summary-only] [as-set] [attribute-map]

Syntax Description

Creates an aggregate route in the BGP database.

The no form of the command disables ECMP across AS paths.

prefix summary-only as-set

Destination to aggregate

Contributor routes are not advertised.

attribute-map

Includes AS_PATH information from contributor routes as AS_SET attributes

Assigns attribute values in set commands of the map’s permit clauses. Deny clauses and match commands in permit clauses are ignored.

Default Disabled

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin switch-e07c04 [standalone: master] (config router bgp 4) # aggregateaddress 3.5.3.7 /32

Related Commands

Note • Aggregate routes combine the characteristics of multiple routes into a single route that the switch advertises

• Aggregation can reduce the amount of information that a BGP speaker is required to store and transmit when advertising routes to other BGP speakers

• Aggregate routes are advertised only after they are redistributed

Mellanox Technologies Confidential 843

Rev 4.20

bestpath as-path multipath-relax

bestpath as-path multipath-relax no bestpath as-path multipath-relax

Syntax Description

Default

Enables ECMP across AS paths.

The no form of the command disables ECMP across AS paths.

N/A

Disabled

Configuration Mode Config Router BGP

History 3.3.5006

Role

Example

3.3.5200

admin

Updated description and notes switch (config router bgp 100)# bestpath as-path multipath-relax

Related Commands maximum-paths

Note • With this option disabled, only routes with exactly the same AS path as the best route to a destination are considered for ECMP.

• With this option enabled, all routes with similar length AS path as the best route are considered for ECMP.

Mellanox Technologies Confidential 844

Rev 4.20

bgp fast-external-fallover

bgp fast-external-fallover no bgp fast-external-fallover

Syntax Description

Default

Terminates eBGP sessions of any directly adjacent peer without waiting for the holddown timer to expire if the link used to reach the peer goes down.

The no form of the command waits for hold-down timer to expire before terminating eBGP sessions.

N/A no bgp fast-external-fallover

Configuration Mode Config Router BGP

History 3.4.0000

Role

Example admin switch (config router bgp 100)# bgp fast-external-fallover

Related Commands maximum-paths

Note Although this feature improves BGP conversion time, it may cause instability in your

BGP table due to a flapping interface.

Mellanox Technologies Confidential 845

bgp listen limit

bgp listen limit <maximum> no bgp listen limit

Syntax Description

Limits the number of dynamic BGP peers allowed on the switch.

The no form of the command resets to the default value.

maximum The maximum number of dynamic BGP peers to be allowed on the switch. Range: 1-128.

Default 100

Configuration Mode Config Router BGP

History

Role

3.4.0000

admin switch (config router bgp 100)# bgp listen limit 101 Example

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 846

Rev 4.20

bgp listen range

bgp listen range <ip-prefix> <length> peer-group <peer-group-name> remote-as

<as-number> no bgp listen range <ip-prefix> <length>

Syntax Description

Identifies a range of IP addresses from which the switch will accept incoming dynamic BGP peering requests.

After applying the no form of the command, the switch will no longer accept dynamic peering requests on the range.

ip-prefix length

IP address

Mask length (e.g. /24 or 255.255.255.254) peer-group-name remote-as <as-number>

Default 100

Configuration Mode Config Router BGP

Peer group name

Remote peer’s number.

History

Role

Example

3.4.0000

admin switch (config router bgp 100)# bgp listen range 10.10.10.10 /24 peergroup my-group remote-as 13

Related Commands

Note • To create a static peer group, use the command neighbor peer-group

• Neighbors in a dynamic peer group are configured as a group and cannot be configured individually.

Mellanox Technologies Confidential 847

bgp redistribute-internal

bgp redistribute-internal no bgp redistribute-internal

Syntax Description

Enables iBGP redistribution into an interior gateway protocol (IGP).

The no form of the command disables iBGP redistribution into an interior gateway protocol (IGP).

ip-prefix length

IP address

Mask length (e.g. /24 or 255.255.255.254) peer-group-name remote-as <as-number>

Default Disabled

Configuration Mode Config Router BGP

Peer group name

Remote peer’s number.

History

Role

Example

Related Commands

Note

3.4.0000

admin switch (config router bgp 100)# bgp redistribute-internal

Rev 4.20

Mellanox Technologies Confidential 848

Rev 4.20

cluster-id

cluster-id <ip-address> no cluster-id <ip-address>

History

Configures the cluster ID in a cluster with multiple route reflectors.

The no form of the command resets the cluster ID for route reflector.

Syntax Description ip-address

Default

Configuration Mode Config Router BGP

The route reflector cluster ID

• 0.0.0.1 to 255.255.255.255 Valid cluster ID number

• 0.0.0.0 removes the cluster-ID from the switch (similar to

“no cluster-id”)

Cluster ID is the same as Router ID

3.2.1000

3.4.0000

First version

Updated syntax description

Role

Example admin switch (config router bgp 100)# cluster-id 10.10.10.10

Related Commands N/A

Note

Mellanox Technologies Confidential 849

client-to-client reflection

client-to-client reflection no client-to-client reflection

Syntax Description

Default

The switch will be configured as a route reflector.

The no form of the command stops the switch from being a route reflector

N/A client-to-client reflection is enabled

Configuration Mode Config Router BGP

History 3.2.1000

Role

Example admin switch (config router bgp 100)# client-to-client reflection

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 850

Rev 4.20

distance

distance <external> <internal> <local> no distance

Syntax Description

Sets the administrative distance of the routes learned through BGP.

The no form of the command resets the administrative distance its default.

external Administrative distance for external BGP routes.

Range: 1-255.

internal local

Administrative distance for internal BGP routes.

Range: 1-255.

Administrative distance for local BGP routes.

Range: 1-255.

Default external: 200 internal: 200 local: 200

Configuration Mode Config Router BGP

History 3.3.5006

Role

Example admin switch (config router bgp 100)# distance 10 20 30

Related Commands N/A

Note • Routers use administrative distances to decide on a route when two protocols provide routing information to the same destination.

• Lower distance values correspond to higher reliability.

• Routes are external when learned from an external autonomous system.

• Routes are internal when learned from a peer in the local autonomous system.

• Local routes are those networks listed with a network router configuration command, often as back doors, for the router or for the networks being redistributed from another process.

• BGP routing tables do not include routes with a distance of 255.

Mellanox Technologies Confidential 851

graceful-restart stalepath-time

graceful-restart stalepath-time <interval> no graceful-restart stalepath-time

Syntax Description

Default

Configures the maximum time that stale routes from a restarting BGP neighbor are retained after a BGP session is reestablished with that peer.

The no form of the command resets to the default value.

interval

300 seconds

Configuration Mode Config Router BGP

History 3.4.0000

Time in seconds. Range: 1-3600.

Role

Example admin switch (config router bgp 100)# graceful-restart stalepath-time 350

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 852

graceful-restart helper

graceful-restart helper no graceful-restart helper

Syntax Description

Default

Enables BGP graceful restart helper mode on the switch for all BGP neighbors.

The no form of the command disables BGP graceful restart helper mode on the switch for all BGP neighbors.

N/A

Graceful restart is enabled

Configuration Mode Config Router BGP

History 3.4.0000

Role

Example admin switch (config router bgp 100)# graceful-restart helper

Related Commands N/A

Note • When graceful restart helper mode is enabled, the switch retains routes from neighbors capable of graceful restart while those neighbors are restarting BGP

• Individual neighbor configuration takes precedence over the global configuration

Rev 4.20

Mellanox Technologies Confidential 853

Rev 4.20

maximum-paths

maximum-paths [ibgp] <maximum-path>

Syntax Description

Configures the maximum number of parallel eBGP/iBGP routes that the switch installs in the routing table.

ibgp maximum-path

Sets the configuration on the internal BGP.

The number of routes to install to the routing table.

Default 1

Configuration Mode Config Router BGP

History 3.3.5006

3.3.5200

Role

Example

Updated description and notes admin switch (config router bgp 100)# maximum-paths ibgp 10 switch (config router bgp 100)#

Related Commands N/A

Note • This command provides an ECMP parameter that controls the number of equal-cost paths that the switch installs in the routing table for each destination.

• The action is effective after BGP restart.

• If the parameter “ibgp” is not used, the setting is applied on routes learned from peers from other ASs; if “ibgp” is used, the setting is applied to routes learned from peers of the same

AS.

Mellanox Technologies Confidential 854

Rev 4.20

neighbor advertisement-interval

neighbor {<ip-address> | <peer-group-name>} advertisement-interval <delay> no neighbor {<ip-address> | <peer-group-name>} advertisement-interval

Syntax Description

Default 30 seconds

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 advertisementinterval 90

Related Commands

Note

Sets the minimum route advertisement interval (MRAI) between the sending of BGP routing updates.

The no form of the command disables this function.

ip-address peer-group-name

A BGP peer IP address delay

Peer group name

Time (in seconds) is specified by an integer.

Range: 0-600.

Mellanox Technologies Confidential 855

neighbor allowas-in

neighbor {<ip-address> | <peer-group-name>} allowas-in [number] no neighbor {<ip-address> | <peer-group-name>} allowas-in

Syntax Description

Configures the switch to permit the advertisement of prefixes containing duplicate autonomous switch numbers (ASNs).

The no form of the command disables this function.

ip-address peer-group-name

A BGP peer IP address number

Peer group name

Number of switch’s (ASN) allowed in path.

Range: 1-10.

Default N/A

Configuration Mode Config Router BGP

History

Role

3.4.0000

admin

First version

Example

Note switch (config router bgp 100)# neighbor 10.10.10.10 allowas-in 2

Related Commands ip routing router bgp <as-number>

Neighbors from the same AS as the router are considered as iBGP peers, and neighbors from other ASs are considered eBGP peers.

Rev 4.20

Mellanox Technologies Confidential 856

neighbor description

neighbor {<ip-address> | <peer-group-name>} description <string> no neighbor {<ip-address> | <peer-group-name>} description

Syntax Description

Associates descriptive text with the specified peer or peer group.

The no form of the command removes the description from the peer.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default string

No description

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

Free string, up to 80 characters in length.

First version

Updated example admin switch (config router bgp 100)# neighbor 10.10.10.10 description The next door neighbor

Related Commands N/A

Note The peer description only appears in the show commands.

Rev 4.20

Mellanox Technologies Confidential 857

Rev 4.20

neighbor ebgp-multihop

neighbor {<ip-address> | <peer-group-name>} ebgp-multihop [<ttl>] no neighbor {<ip-address> | <peer-group-name>} ebgp-multihop

Syntax Description

Enables BGP to connect to external peers that are not directly connected to the switch.

The no form of the command applies the system disables connecting to external peers.

ip-address peer-group-name

IP address of the BGP-speaking neighbor

Peer group name

Default ttl ttl: 1

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

Time-to-live. Range: 1-255 hops.

First version

Updated default admin switch (config router bgp 100)# neighbor 10.10.10.10 ebgp-multihop 5

Related Commands ip routing neighbor <ip-address> remote-as <as-number>

Note The command does not establish the multi-hop if the only route to the peer is the default route (0.0.0.0).

Mellanox Technologies Confidential 858

neighbor export-localpref

neighbor {<ip-address> | <peer-group-name>} export-localpref <value> no neighbor {<ip-address> | <peer-group-name>} export-localpref

Syntax Description

Default value

100

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

Preference value. Range: 0-2147483647.

First version switch (config router bgp 100)# neighbor 10.10.10.10 export-localpref

100

Related Commands

Note

Configures the local preference value sent to the specified peer or peer group.

The no form of the command resets the local preference to its default value.

ip-address peer-group-name

IP address of the BGP-speaking neighbor

Peer group name

Rev 4.20

Mellanox Technologies Confidential 859

neighbor graceful-restart helper

neighbor {<ip-address> | <peer-group-name>} graceful-restart helper no neighbor {<ip-address> | <peer-group-name>} graceful-restart helper

Syntax Description

Enables BGP graceful restart helper mode for the specified BGP neighbor or peer group.

The no form of the command ip-address peer-group-name

IP address of the BGP-speaking neighbor

Peer group name

Default Graceful restart is enabled

Configuration Mode Config Router BGP

History

Role

3.4.0000

admin

First version

Example

Related Commands

Note switch (config router bgp 100)# neighbor graceful-restart helper

• When graceful restart helper mode is enabled, the switch retains routes from neighbors capable of graceful restart while those neighbors are restarting BGP

• Individual neighbor configuration takes precedence over the global configuration

Rev 4.20

Mellanox Technologies Confidential 860

neighbor import-localpref

neighbor {<ip-address> | <peer-group-name>} import-localpref <value> no neighbor {<ip-address> | <peer-group-name>} import-localpref

Syntax Description

Default value

100

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

Preference value. Range: 0-2147483647.

First version switch (config router bgp 100)# neighbor 10.10.10.10 import-localpref

100

Related Commands

Note

Configures the local preference value assigned to routes received from the specified peer or peer group.

The no form of the command resets the local preference to its default value.

ip-address peer-group-name

IP address of the BGP-speaking neighbor

Peer group name

Rev 4.20

Mellanox Technologies Confidential 861

Rev 4.20

neighbor local-as

Syntax Description neighbor {<ip-address> | <peer-group-name>} local-as <as-id> [no-prepend | replace-as] no neighbor {<ip-address> | <peer-group-name>} local-as

Enables the modification of the AS path attribute for routes received from an eBGP neighbor.

The no form of the command disables AS path modification for the specified peer or peer group.

ip-address peer-group-name no-prepend

IP address of the BGP-speaking neighbor

Peer group name replace-as local-as number is not prepended to the routes received from external neighbors

Prepends only the local autonomous system number (as configured with the IP address argument) to the AS path attribute.

Default 12000

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch-e07c04 [standalone: master] (config router bgp 4) # neighbor

100.100.100.100 local-as 123

Related Commands ip routing neighbor <ip-address> remote-as <as-number>

Note • This function allows the switch to appear as a member of a different autonomous system

(AS) to external peers.

• To disable peering with the neighbor run the command clear ip bgp

Mellanox Technologies Confidential 862

Rev 4.20

neighbor maximum-prefix

Syntax Description neighbor {<ip-address> | <peer-group-name>} maximum-prefix <maximum>

[warning-only] no neighbor {<ip-address> | <peer-group-name>} maximum-prefix

Configures the number of BGP routes the switch accepts from a specified neighbor and defines an action when the limit is exceeded.

The no form of the command removes the limitation ip-address peer-group-name maximum

IP address of the BGP-speaking neighbor

Peer group name warning-only

Number of BGP routes the switch accepts from a specified neighbor. Range: 1-2147483647.

Only generates a warning rather than disconnecting the neighbor

Default 12000

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 maximum-prefix

12000 warning-only

Related Commands ip routing neighbor <ip-address> remote-as <as-number>

Note

Mellanox Technologies Confidential 863

Rev 4.20

neighbor next-hop-peer

neighbor {<ip-address> | <peer-group-name>} next-hop-peer no neighbor {<ip-address> | <peer-group-name>} next-hop-peer

Syntax Description

Configures the switch to list the peer address as the next hop in routes that it receives from the specified peer BGP-speaking neighbor or members of the specified peer group.

The no form of the command disables this function.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default no next-hop-peer

Configuration Mode Config Router BGP

History

Role

3.3.5006

admin

Example

Related Commands

Note switch (config router bgp 100)# neighbor 10.10.10.10 next-hop-peer

This command overrides the next hop for all routes received from this neighbor or peer group

Mellanox Technologies Confidential 864

Rev 4.20

neighbor next-hop-self

neighbor {<ip-address> | <peer-group-name>} next-hop-self no neighbor {<ip-address> | <peer-group-name>} next-hop-self

Syntax Description

Configures the IP address of the router as the next hop address in routes advertises to the specific neighbor.

The no form of the command resets this parameter to its default.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default no next-hop-self

Configuration Mode Config Router BGP

History

Role

3.3.5006

admin

Example switch (config router bgp 100)# neighbor 10.10.10.10 next-hop-self

Related Commands neighbor <ip-address> remote-as <as-number>

Note • This function is used in networks where BGP neighbors do not directly access all other neighbors on the same subnet.

• In the default state, the next hop is generated based on the IP address and the present next hop in the route information.

Mellanox Technologies Confidential 865

neighbor password

neighbor {<ip-address> | <peer-group-name>} password [<encryption>]

<string> no neighbor {<ip-address> | <peer-group-name>} password

Syntax Description

Enables authentication on a TCP connection with a BGP peer.

The no form of the command resets the value to its default.

ip-address peer-group-name encryption

IP address of the neighbor

Peer group name

Possible values:

• no parameter – clear text

• 0 – clear text

• 7 – obfuscated

Up to 8 bytes in length

Default string

N/A

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 password 7 admin123

Related Commands

Note • Peers must use the same password to ensure communication.

• neighbor <ip-address> password 7 <password>' can only accept data that was created using 'show config'.

• 'show config' will never show the clear-test password, it will always be obfuscated (and thus displayed using the 'password 7' syntax).

• Router BGP neighbor password cannot be set when enabling secure mode

• Router BGP peer-group password cannot be set when enabling with secure mode

Rev 4.20

Mellanox Technologies Confidential 866

Rev 4.20

neighbor peer-group

1. neighbor {<ip-address>} peer-group <peer-group-name>

2. neighbor {<peer-group-name>} peer-group

3. no neighbor {<ip-address>} peer-group <peer-group-name>

4. no neighbor {<peer-group-name>} peer-group <peer-group-name>

Syntax Description

1. Assigns BGP neighbors to an existing peer group.

2. Creates a peer-group

3. Unassigns BGP neighbors to an existing peer group.

4. Removes a specified neighbor from the peer group ip-address peer-group-name

IP address of the neighbor

Peer group name

Default N/A

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor groupA peer-group switch (config router bgp 100)# neighbor 1.2.3.4 peer-group groupA

Related Commands

Note • Once a peer group is created, the group name can be used as a parameter in neighbor configuration commands, and the configuration will be applied to all members of the group.

• Settings applied to an individual neighbor in the peer group override group settings.

• A neighbor can only belong to one peer group, so issuing this command for a neighbor that is already a member of another group removes it from that group.

• When a neighbor is removed from a peer group, the neighbor retains the configuration inherited from the peer group.

• Router BGP peer-group password cannot be set when enabling with secure mode

Mellanox Technologies Confidential 867

Rev 4.20

neighbor remote-as

neighbor {<ip-address>} remote-as <as-number> no neighbor {<ip-address>} remote-as <as-number>

Syntax Description

Configures a neighbor.

The no form of the command removes the neighbor, dropping the connection and all routes if already connected.

ip-address peer-group-name

A BGP peer IP address

Peer group name

Default as-number

N/A

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

The BGP peer as-number. Range: 1-65535.

First version

Updated description and note admin switch (config router bgp 100)# neighbor 10.10.10.10 remote-as 200 switch (config router bgp 100)#

Related Commands ip routing router bgp <as-number>

Note Neighbors from the same AS as the router are considered as iBGP peers, and neighbors from other ASs are considered eBGP peers.

Mellanox Technologies Confidential 868

Rev 4.20

neighbor remove-private-as

neighbor {<ip-address> | <peer-group-name>} remove-private-as no neighbor {<ip-address> | <peer-group-name>} remove-private-as

Syntax Description

Removes private autonomous system numbers from outbound routing updates for external BGP (eBGP) neighbors.

The no form of the command preserves private AS numbers for the specified peer.

ip-address peer-group-name

A BGP peer IP address

Peer group name

Default N/A

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 remove-private-as switch (config router bgp 100)#

Related Commands ip routing router bgp <as-number>

Note • This can only be used with external BGP (eBGP) peers.

• If the update has only private AS numbers in the AS path, BGP removes these numbers.

• If the AS path includes both private and public AS numbers, BGP does not remove the private AS numbers. This situation is considered a configuration error.

• If the AS path contains the AS number of the eBGP neighbor, BGP does not remove the private AS number.

• If the AS path contains confederations, BGP removes the private AS numbers only if they come after the confederation portion of the AS path.

Mellanox Technologies Confidential 869

Rev 4.20

neighbor route-map

neighbor {<ip-address> | <peer-group-name>} route-map <route-map-name>

[in | out] no neighbor {<ip-address> | <peer-group-name>} route-map <route-map-name>

[in | out]

Syntax Description

Configures a route map to inbound BGP routes.

The no form of the command undoes the configuration.

ip-address peer-group-name

IP address of the neighbor

Peer group name route-map-name in

Default out

N/A

Configuration Mode Config Router BGP

History 3.3.5006

3.3.5200

Role

Example

String. The name of the route-map

Applies route map to inbound routes

Applies route map to out-bound routes

First version

Updated notes and default

Added “out” parameter 3.4.1100

admin switch (config router bgp 100)# neighbor 10.10.10.10 route-map MyRoute-

Map in

Related Commands neighbor <ip-address> remote-as <as-number> route-map <map-name> [deny | permit] [sequence-number] clear ip bgp {<ip-address> | all}

Note • Only one inbound route-map can be applied to a given neighbor.

• If a new route-map is applied to a neighbor, it replaces the previous route map.

• Changing a route-map only takes effect on routes received or sent after the change.

Mellanox Technologies Confidential 870

neighbor route-reflector-client

neighbor {<ip-address> | <peer-group-name>} route-reflector-client no neighbor {<ip-address> | <peer-group-name>} route-reflector-client

Syntax Description

Default N/A

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

First version

Updated notes and default admin switch (config router bgp 100)# neighbor 10.10.10.10 route-reflectorclient

Related Commands

Note

Sets the neighbor as a client but does not set up the reflection itself.

The no form of the command disables route reflection for the specific peer.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Rev 4.20

Mellanox Technologies Confidential 871

Rev 4.20

neighbor send-community

neighbor {<ip-address> | <peer-group-name>} send-community no neighbor {<ip-address> | <peer-group-name>} send-community

Syntax Description

Configures the switch to send community attributes to the specified BGP neighbor.

The no form of the command disables sending community attributes for the specified peer.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default Enabled

Configuration Mode Config Router BGP

History

Role

3.4.0000

admin

First version

Example switch (config router bgp 100)# neighbor 10.10.10.10 send-community

Related Commands N/A

Note

Mellanox Technologies Confidential 872

Rev 4.20

neighbor shutdown

neighbor {<ip-address> | <peer-group-name>} shutdown no neighbor {<ip-address> | <peer-group-name>} shutdown

Syntax Description

Disables BGP neighbor gracefully.

The no form of the command enables BGP neighbor.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default Enabled

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

First version

Updated note admin switch (config router bgp 100)# neighbor 10.10.10.10 shutdown

Related Commands N/A

Note Disabling a neighbor terminates all its active sessions and removes associated routing information.

Mellanox Technologies Confidential 873

neighbor soft-reconfiguration inbound

neighbor {<ip-address> | <peer-group-name>} soft-reconfiguration inbound no neighbor {<ip-address> | <peer-group-name>} soft-reconfiguration inbound

Syntax Description

Disables BGP neighbor gracefully.

The no form of the command restores the system default behavior (retaining all routes from the specified neighbor or group).

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default N/A

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 soft-reconfiguration inbound

Related Commands N/A

Note • This command also allows the switch to display all advertised routes when the command show ip bgp neighbor advertised-routes is issued.

• The no form of the command configures the switch to discard information about routes received from the specified neighbor or group that fail the import policy.

Rev 4.20

Mellanox Technologies Confidential 874

Rev 4.20

neighbor timers

neighbor {<ip-address> | <peer-group-name>} timers <keep-alive> <hold-time> no neighbor {<ip-address> | <peer-group-name>} timers

Syntax Description

Configures the keepalive and hold times for a specified peer.

The no form of the command resets the parameters to their default values.

ip-address peer-group-name keep-alive

IP address of the neighbor.

Peer group name hold-time

The period between the transmission of consecutive keep-alive messages. Range: 1-3600 seconds. “0” means that keepalive is not sent and the connection does not expire.

The period the switch waits for a keepalive or update message before it disables peering. Range: 3-7200 seconds. “0” means that keepalive is not sent and the connection does not expire.

Default keep-alive: 60 seconds hold-time: 180 seconds

Configuration Mode Config Router BGP

History 3.3.5006

Role

Example

3.3.5200

admin

First version

Updated description switch (config router bgp 100)# neighbor 10.10.10.10 timers 65 195

Related Commands neighbor <ip-address> remote-as <as-number>

Note Hold time must be at least 3 seconds and should be three times longer than the keepalive setting.

Mellanox Technologies Confidential 875

Rev 4.20

neighbor transport connection-mode passive

neighbor {<ip-address> | <peer-group-name>} transport connection-mode

 passive no neighbor {<ip-address> | <peer-group-name>} transport connection-mode passive

Syntax Description

Sets the TCP connection for the specified BGP neighbor or peer group to passive mode.

The no form of the command sets the specified BGP neighbor or peer group to active connection mode.

ip-address peer-group-name

IP address of the neighbor.

Peer group name

Default TCP sessions initiated

Configuration Mode Config Router BGP

History

Role

Example

3.4.0000

admin

First version switch (config router bgp 100)# neighbor 10.10.10.10 transport connection-mode passive

Related Commands

Note • When the peer’s transport connection mode is set to passive, it accepts TCP connections for BGP, but does not initiate them.

• BGP peers in active mode can both accept and initiate TCP connections for BGP.

Mellanox Technologies Confidential 876

Rev 4.20

neighbor update-source

neighbor <ip-address> update-source {ethernet <slot/port> | loopback <number> | port-channel <number> | vlan <vlan-id>} no neighbor <ip-address> update-source

Syntax Description

Configures the source-address for routing updates and to establish TCP connections with peers.

The no form of the command disables configured source-address for routing updates and for TCP connection establishment with a peer.

ip-address ethernet <slot/port>

IP address of the neighbor.

Ethernet interface.

History loopback <number> vlan <vlan-id>

Loopback interface number.

VLAN interface. Range: 1-4094.

Default port-channel <number>

BGP uses best local address

Configuration Mode Config Router BGP

LAG interface. Range is 1-4094.

3.3.5006

3.3.5200

First version

Updated example

Role

Example admin switch (config router bgp 100)# neighbor 10.10.10.2 update-source vlan

10

Related Commands N/A

Note

Mellanox Technologies Confidential 877

Rev 4.20

neighbor weight

neighbor {<ip-address> | <peer-group-name>} weight <value> no neighbor {<ip-address> | <peer-group-name>} weight

Syntax Description

Assigns a weight attribute to paths from the specified neighbor.

The no form of the command resets to default values.

ip-address peer-group-name

IP address of the neighbor

Peer group name value

Default

Configuration Mode Config Router BGP

Weight value. Range: 1-65535.

Value is 32768 for router-originated paths and 0 for routes received through BGP

History

Role

3.4.0000

admin

First version

Example switch (config router bgp 100)# neighbor 10.10.10.10 weight 100

Related Commands N/A

Note • Weight values set through route map commands have precedence over neighbor weight command values.

• Other attributes are used only when all paths to the prefix have the same weight.

• A path’s BGP weight is also configurable through route maps.

• When multiple paths to a destination prefix exist, the best-path selection algorithm prefers the path with the highest weight.

• Weight is the first parameter that the BGP best-path selection algorithm considers.

Mellanox Technologies Confidential 878

network

network <ip-prefix> <length> [<route-map-name>] no network <ip-prefix> <length> [<route-map-name>]

Syntax Description

Default N/A

Configuration Mode Config Router BGP

History

Role

Example

3.3.5006

3.3.5200

First version

Updated description, syntax description and notes admin switch (config router bgp 100)# network 10.10.10.0 /24 routemap

Related Commands

Note

Configures a route for advertisement to BGP peers.

The no form of the command removes the route from the BGP routes table, preventing its advertisement. The route is only advertised if the router has a gateway to the destination.

ip-prefix length route-map-name

A string that specific route map is assigned to the network.

/24 or 255.255.255.0 format.

The name of a route-map which is used to set the route’s attributes when it is advertised.

• The parameters “ip-prefix” and “length” specify the route destination.

• The configuration zeros the host portion of the specified network address. For example,

192.0.2.4/24 is stored as 192.0.2.0/24.

Rev 4.20

Mellanox Technologies Confidential 879

Rev 4.20

redistribute

redistribute {connected | static | ospf | ospf-internal | ospf-external} [<routemap>] no redistribute {connected | static | ospf}

Syntax Description

Enables redistribution of specified routes to the BGP domain.

The no form of the command disables route redistribution from the specified source.

connected static

Redistributes the direct routes

Redistributes the user-defined (static) route ospf ospf-internal ospf-external

Redistributes all routes learned by ospf protocol

Redistributes all osfp-learned routes which are marked as internal

Redistributes all osfp-learned routes which are marked as external

Default No redistribution

Configuration Mode Config Router BGP

History

Role

3.2.1000

admin

Example switch (config router bgp 100)# redistribute ospf

Related Commands N/A

Note Multiple redistribution options can be applied.

Mellanox Technologies Confidential 880

Rev 4.20

router-id

router-id <ip-address> no router-id

Syntax Description

Default

Configures a fixed router ID for BGP.

The no form of the command removes the fixed router ID and restores the system default.

ip-address IP Address identified the router ID

The Router ID is dynamically elected (no router-id).

• If a loopback interface is configured, the router ID is set to the IP address of the loopback interface.

• If multiple loopback interfaces are configured, the router ID is set to the IP address of the loopback interface with the highest IP address.

• If no loopback interface is configured, the router ID is set to the highest IP address on a physical interface.

Configuration Mode Config Router BGP

History 3.3.5006

Role

Example admin switch (config router bgp 100)# router-id 10.10.10.10

Related Commands

Note The IP address configured identifies the BGP speaker. The command triggers an automatic notification and session reset for the BGP neighbors.

Mellanox Technologies Confidential 881

Rev 4.20

timers bgp

timers bgp <keep-alive> <hold> no timers bgp

Syntax Description

Configures the BGP keepalive and hold times.

The no form of the command resets the parameters to their default settings.

keep-alive Frequency (in seconds) with which keepalive messages are sent to its peer. Range: 1-3600 seconds; 0 – no keep-alive messages are sent.

hold Interval (in seconds) after not receiving a keepalive message that a peer is declared dead. 3-7200 seconds;

0 – peer is held indefinitely regardless of keep-alive messages.

Default

History

Role

Example

Keepalive time: 60 secs

Hold time: 180 secs

Configuration Mode Config Router BGP

3.3.5006

3.3.5200

First version

Updated syntax description, related commands and notes admin switch (config router bgp 100)# timers bgp 61 181 switch (config router bgp 100)#

Related Commands ip routing neighbor timers router bgp <as-number> show ip bgp

Note • Timer settings apply to every peer connection.

• The command “neighbor timers” configures the times on a specified peer connection.

• Hold time should be three times longer than the keepalive setting.

Mellanox Technologies Confidential 882

Rev 4.20

6.4.4.3 Show

show ip bgp

show ip bgp [<ip-address> <mask> [detail | longer-prefixes [detail]]]

Syntax Description

Default

Configuration Mode

History

Role

Example

Displays information about the BGP routes table (RIB).

ip-address IP address (e.g. 172.3.12.4).

mask detail

Netmask (e.g. /24 or 255.255.255.0).

Displays detailed information about a subset of the bgp learned routes.

longer-prefixes Displays the routes to the specified destination and any routes to a more specific destination.

Example: If “10.20.30.0 /24 longer-prefixes” is run, all routes starting with 10.20.30 regardless of the prefix length (10.20.30.X /24, 10.20.30.X /25, etc.) are displayed – providing there are any such routes received/ sent from/to that neighbor.

N/A

Any Command Mode

3.3.5200

admin switch (config) # show ip bgp

BGP table version is 100, local router ID is 16.0.1.1

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal

r RIB-failure, S Stale, m multipath, b backup-path, x best-external

Origin codes: i - IGP, e - EGP, ? - incomplete

100.100.100.0/24 2.2.2.2 0 2 50 100 e

100.100.100.0/24 2.2.2.12 0 12 50 100 e

Network Next Hop Metric LocPrf Weight Path

20.20.20.0/24 2.2.2.2 0 2 20 e

40.40.40.0/24 4.4.4.4 0 4 40 i

100.100.90.32/28 2.2.2.2 0 2 100 i

100.100.100.0/24 4.4.4.4 0 4 50 i

Related Commands

Note switch (config) #

N/A

Mellanox Technologies Confidential 883

Rev 4.20

show ip bgp community

show ip bgp community <comm

1

> <comm

2

> … <comm n

> [exact] [detail]

Syntax Description

Default

Displays information about the BGP routes (RIB) filtered according to communities.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.4.0000

admin switch (config) # show ip bgp community 100:1

BGP table version is 8, local router ID is 3.5.7.4

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal

r RIB-failure, S Stale, m multipath, b backup-path, x bestexternal

Origin codes: i - IGP, e - EGP, ? - incomplete

Network Next Hop Metric LocPrf Weight

Path

*> 3.4.3.11/32 0.0.0.0 0 0 32768 i

*> 3.5.7.88/32 0.0.0.0 0 0 32768 i

*> 3.5.7.99/32 0.0.0.0 0 0 32768 i switch (config) # show ip bgp community 100:1 exact

BGP table version is 8, local router ID is 3.5.7.4

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal

r RIB-failure, S Stale, m multipath, b backup-path, x bestexternal

Origin codes: i - IGP, e - EGP, ? - incomplete

Network Next Hop Metric LocPrf Weight

Path

*> 3.4.3.11/32 0.0.0.0 0 0 32768 i

*> 3.5.7.99/32 0.0.0.0 0 0 32768 i

Related Commands N/A

Note

Mellanox Technologies Confidential 884

Rev 4.20

show ip bgp neighbors

show ip bgp neighbors

Syntax Description

Default

Displays summaries information about all BGP neighbors.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin switch (config) # show ip bgp neighbors <ip> received switch-e07c04 [standalone: master] (config) # show ip bgp neighbors

3.5.7.5 received

BGP table version is 66, local router ID is 3.5.7.4

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal

r RIB-failure, S Stale, m multipath, b backup-path, x bestexternal

Origin codes: i - IGP, e - EGP, ? - incomplete

Network Next Hop Metric LocPrf Weight

Path

*> 100.0.20.0/24 3.5.7.5 10 100 0 5 i

*> 3.5.7.128/32 3.5.7.5 7 100 0 5 i

*> 100.0.30.0/24 3.5.7.5 0 100 0 5 i

*> 10.20.30.0/24 3.5.7.5 0 100 0

5 12 i switch-e07c04 [standalone: master] (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 885

Rev 4.20

show ip bgp neighbors <ip>

show ip bgp neighbors <ip-address>

Syntax Description

Displays BGP summary information.

ip-address Neighbor IP address.

advertised received both longer-prefixes

Displays routes advertised to the specified neighbor.

Displays routes received and accepted from specified neighbor.

Displays routes received from specified neighbor.

Displays the routes to the specified destination and any routes to a more specific destination.

Example: If “10.20.30.0 /24 longer-prefixes” is run, all routes starting with 10.20.30 regardless of the prefix length (10.20.30.X /24, 10.20.30.X /25, etc.) are displayed – providing there are any such routes received/ sent from/to that neighbor.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin switch-e07c04 [standalone: master] (config) # show ip bgp neighbors

3.5.7.5 received

BGP table version is 66, local router ID is 3.5.7.4

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal

r RIB-failure, S Stale, m multipath, b backup-path, x bestexternal

Origin codes: i - IGP, e - EGP, ? - incomplete

Network Next Hop Metric LocPrf Weight

Path

*> 100.0.20.0/24 3.5.7.5 10 100 0 5 i

*> 3.5.7.128/32 3.5.7.5 7 100 0 5 i

*> 100.0.30.0/24 3.5.7.5 0 100 0 5 i

*> 10.20.30.0/24 3.5.7.5 0 100 0

5 12 i switch-e07c04 [standalone: master] (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 886

Rev 4.20

show ip bgp neighbors <ip> received

show ip bgp neighbors <ip-address> received [<ip-address> [<mask>] [longerprefixes]

Syntax Description

Displays BGP summary information.

ip-address Neighbor IP address.

received longer-prefixes

Displays routes received and accepted from specified neighbor.

Displays the routes to the specified destination and any routes to a more specific destination.

Example: If “10.20.30.0 /24 longer-prefixes” is run, all routes starting with 10.20.30 regardless of the prefix length (10.20.30.X /24, 10.20.30.X /25, etc.) are displayed – providing there are any such routes received/ sent from/to that neighbor.

Default N/A

Configuration Mode Any Command Mode

History

Role

3.3.5200

admin

Example

Related Commands N/A

Note

Mellanox Technologies Confidential 887

show ip bgp paths

show ip bgp paths

Syntax Description

Default

Displays summary of all AS paths.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin switch (config) # show ip bgp paths

Refcount Metric Path

1 0 4 50 100

1 0 2 50 100

1 0 4 40

1 0 12 50 100

1 0 2

1 0 2 20 switch (config) #

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 888

Rev 4.20

show ip bgp peer-group

show ip bgp peer-group [<peer-group-name>]

Syntax Description

Default

Displays information about peer groups.

peer-group-name

N/A

Configuration Mode Any Command Mode

Displays information about a specific peer-group.

History

Role

Example

3.4.0000

admin switch (config) # show ip bgp peer-group

BGP Peer-group [grpA]:

Hold time: 1, Keep-alive: 60

Allow as-in: 0

Weight: 32768

Max prefix: 12000

Export local preferences: 100, Import local preferences: 100

Soft reconfiguration: set

Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down

State/PfxRcd

3.5.7.5 0 5 0 0 0 0 0 0:00:00:42

CONNECT

100.100.100.100 0 100 0 0 0 0 0 Never

IDLE

BGP Peer-group [grpB]:

Hold time: 1, Keep-alive: 60

Allow as-in: 0

Weight: 32768

Max prefix: 12000

Export local preferences: 100, Import local preferences: 100

Soft reconfiguration: set

Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down

State/PfxRcd

3.4.3.7 0 7 0 0 0 0 0 0:00:00:17

ACTIVE

BGP Peer-group [tomer_group]:

Hold time: 1, Keep-alive: 60

Allow as-in: 0

Weight: 32768

Max prefix: 12000

Export local preferences: 100, Import local preferences: 100

Soft reconfiguration: set

Peer-groups count: 3 switch-e07c04 [standalone: master] (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 889

Rev 4.20

show ip bgp summary

show ip bgp summary

Syntax Description

Default

Displays BGP summary information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin switch (config) # show ip bgp summary

BGP router identifier 3.5.7.4, local AS number 4

BGP table version is 70, main routing table version 70

8 network entries using 2176 bytes of memory

4 path entries using 1088 bytes of memory

4 BGP path attribute entries using 256 bytes of memory

0 multipath network entries and 0 multipath paths

4 BGP community entries using 64 bytes of memory

0 received paths for inbound soft reconfiguration

BGP using 26308 total bytes of memory

Dampening disabled. 0 history paths, 0 dampened paths

BGP activity 37/8 prefixes, 37/4 paths

Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down

State/PfxRcd

3.4.3.7 4 7 3 9 70 0 0 0:00:00:48

ESTABLISHED

3.5.7.5 0 5 0 0 0 0 0 0:00:01:54

CONNECT

100.100.100.100 0 100 0 0 0 0 0 Never

IDLE switch-e07c04 [standalone: master] (config) #

Related Commands N/A

Note

Mellanox Technologies Confidential 890

6.4.5

IP AS-Path Access-List

6.4.5.1 Commands

ip as-path access-list

ip as-path access-list <list-name> {permit | deny} <reg-exp> [any | egp | igp | incomplete] no ip as-path access-list <list-name>

Syntax Description

Default

Configuration Mode

History

Role

Example

Creates an access list to filter BGP route updates.

The no ip as-path access-list command deletes the named access list.

list-name permit

The name for the access list

Permits access for a matching condition deny reg-exp

Denies access for a matching condition

Regular expression that is used to specify a pattern to match against an input string.

any egp igp incomplete

N/A

Config

3.4.0000

admin

Any route type

External BGP routes

Internal BGP routes

Routes marked as “Incomplete” switch (config)# ip as-path access-list mylist permit

Related Commands

Note switch (config)#

N/A

If access list_name does not exist, this command creates it. If it already exists, this command appends statements to the list.

Rev 4.20

Mellanox Technologies Confidential 891

show ip as-path access-list

show ip as-path access-list [list-name]

Syntax Description

Default

Presents defined as-path access lists list-name

N/A

Configuration Mode Config

Displays a specific prefix-list.

History

Role

3.4.0000

admin

Example switch (config)# show ip as-path access-list mylist

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 892

Rev 4.20

6.4.6

IP Community-List

6.4.6.1 Commands

ip community-list standard

ip community-list standard <list-name> {deny | permit} <list-of-communities> no ip community-list standard <list-name>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Adds a standard entry to a community-list.

The no form of the command deletes the specified community list.

list-name permit

The name for the community list

Permits access for a matching condition.

deny list-of-communities

Denies access for a matching condition.

List of standard communities:

• <aa:nn>

• <number>

• internet

• local-AS

• no-advertise

• no-export

N/A

Config

3.4.0000

admin switch (config)# ip community-list standard mycommunity permit 1:2 3:4

N/A

A BGP community access list filters route maps that are configured as BGP communities. The command uses regular expressions to name the communities specified by the list.

Mellanox Technologies Confidential 893

Rev 4.20

ip community-list expanded

ip community-list expanded <list-name> {deny | permit} <reg-exp> no ip community-list expanded <list-name>

Syntax Description

Adds a regular expression entry to a community-list

The no form of the command deletes the specified community list.

list-name permit

Configures a named standard community list.

Permits access for a matching condition.

deny reg-exp

Denies access for a matching condition.

Regular expression that is used to specify a pattern to match against an input string.

Default N/A

Configuration Mode Config

History

Role

Example

3.4.0000

admin switch (config)# ip community-list expanded mycommunity permit

1:[0-9]+

Related Commands N/A

Note A BGP community access list filters route maps that are configured as BGP communities. The command uses regular expressions to name the communities specified by the list.

Mellanox Technologies Confidential 894

Rev 4.20

show ip community-list

show ip community-list [community-list-name]

Syntax Description

Default

Displays the defined community lists community-list-name

N/A

Configuration Mode Config

An optional parameter to display only the specified list

History

Role

3.4.0000

admin

Example switch (config)# show ip community-list mycommunity

Related Commands N/A

Note A BGP community access list filters route maps that are configured as BGP communities. The command uses regular expressions to name the communities specified by the list.

Mellanox Technologies Confidential 895

6.5

Policy Rules

6.5.1

Route Map

Route maps define conditions for redistributing routes between routing protocols. A route map clause is identified by a name, filter type (permit or deny) and a sequence number. Clauses with the same name are components of a single route map; the sequence number determines the order in which the clauses are compared to a route.

Rev 4.20

Mellanox Technologies Confidential 896

6.5.1.1 Commands

route-map

route-map <map-name> [deny | permit] [sequence-number] no route-map <map-tag> {deny | permit} [<sequence-number>]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Creates a route map that can be used for importing, exporting routes and applying local policies.

name deny | permit

Name of the route-map.

Configures the rule to be used.

Sequence number for a route-map specific record.

sequence-number

N/A

Config

3.3.5006

3.3.5200

admin

Updated notes switch (config) # route-map mymap permit 1200 switch (config route-map mymap permit 1200)#

N/A

• All changes in a the route map configuration mode become pending until the end of the route-map session.

• If not configured, deny | permit is configured as permit.

• If not configured, sequence-number default value is 10.

Rev 4.20

Mellanox Technologies Confidential 897

Rev 4.20

continue <sequence-number>

continue <sequence-number> no continue

Syntax Description

Default

Role

Example

Enables additional route map evaluation of routes whose parameters meet the clause’s matching criteria.

The no form of the command removes this configuration from the route map clause.

prefix-list-name

N/A

Configuration Mode Config Route Map

History 3.3.5006

3.3.5200

admin

First version

Updated example switch (config route-map mymap permit 10)# match as-number 40 switch (config route-map mymap permit 10)# set weight 7 switch (config route-map mymap permit 10)# continue 1200 switch (config route-map mymap permit 10)# exit switch (config)# show route-map test route-map test, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7

continue 1200 switch (config route-map mymap permit 10)# route-map test permit 10 no continue switch (config route-map mymap permit 10)# show route-map test route-map test, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7 switch (config route-map mymap permit 10)#

Related Commands route-map <map-name> [deny | permit] [sequence-number]

Note • A clause typically contains a match (route-map) and a set (route-map) statement. The evaluation of routes whose settings are the same as match statement parameters normally end and the clause’s set statement are applied to the route. Routes that match a clause containing a continue statement are evaluated against the clause specified by the continue statement.

• When a route matches multiple route-map clauses, the filter action (deny or permit) is determined by the last clause that the route matches. The set statements in all clauses matching the route are applied to the route after the route map evaluation is complete. Multiple set statements are applied in the same order by which the route was evaluated against the clauses containing them.

• Continue cannot be set to go back to a previous clause; <sequence-number> of the continue must always be higher than the current clause’s sequence number.

Mellanox Technologies Confidential 898

abort

abort

Syntax Description

Default

Discards pending changes and returns to global configuration mode.

N/A

N/A

Configuration Mode Config Route Map

History 3.3.5006

3.3.5200

First version

Updated example

Role

Example admin switch (config)# route-map mymap permit 10 match as-number 40 switch (config)# route-map mymap permit 10 set weight 7 switch (config)# show route-map test route-map test, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7 switch (config)# route-map mymap permit 1200 switch (config route-map mymap permit 1200)# set weight 11 switch (config route-map mymap permit 1200)# abort switch (config)# show route-map mymap route-map mymap, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7 switch (config)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 899

Rev 4.20

exit

exit

Syntax Description

Default

Saves pending route map clause changes to running-config and returns to global configuration mode.

N/A

N/A

Configuration Mode Config Route Map

History 3.3.5006

Role

Example admin switch (config)# route-map mymap permit 10 match as-number 40 switch (config)# route-map mymap permit 10 set weight 7 switch (config)# show route-map test route-map test, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7 switch (config)# route-map mymap permit 1200 switch (config route-map mymap permit 1200)# set weight 11 switch (config route-map mymap permit 1200)# exit switch (config)# show route-map test route-map mymap, permit, sequence 10

Match clauses:

as-number 40

Set clauses:

weight 7 route-map mymap, permit, sequence 1200

Set clauses:

weight 11 switch (config)#

Related Commands N/A

Note

Mellanox Technologies Confidential 900

match as-number

match as-number <number> no match as-number

Syntax Description

Default

Filters according to one of the AS numbers in the AS path of the route.

The no form of the command removes this configuration from the route map clause.

number

N/A

Configuration Mode Config Route Map

History 3.3.5006

Autonomous system number to check.

Role

Example admin switch (config route-map mymap permit 10)# match as-number 40 switch (config route-map mymap permit 10)#

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 901

match as-path

match as-path <as-path-list name> no match as-path

Syntax Description

Default

Creates a route map clause entry that matches the route‘s AS path using an as-path access-list.

The no form of the command removes the match statement from the configuration mode route map clause.

number

N/A

Configuration Mode Config Route Map

History 3.3.5006

Autonomous system number to check.

Role

Example admin switch (config route-map mymap permit 10)# match as-path my-list

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 902

match community

match community <list-of-communities> [exact-match] no match community <list-of-communities>

Syntax Description

Creates a route map clause entry that matches a route if it contains at least the specified communities.

The no form of the command removes the match clause.

list of communities exact-match

List of standard communities:

• <aa:nn>

• <number>

• internet

• local-AS

• no-advertise

• no-export

Creates a route map clause entry that matches the route‘s communities exactly.

Default N/A

Configuration Mode Config Route Map

History

Role

3.3.5006

admin

Example switch (config route-map mymap permit 10)# match community 1:100 3:52

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 903

match community-list

match community <communities-list-name> exact-match no match community <communities-list-name> exact-match

Syntax Description

Default

Creates a route map clause entry that specifies one route filtering condition

The no form of the command removes the match clause.

communities-list-name

N/A

Configuration Mode Config Route Map

History 3.3.5006

A name of an IP community list

Role

Example admin switch (config route-map mymap permit 10)# match community-list

COM_LIST exact-match

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 904

Rev 4.20

match interface

match interface <interface-type> <number> no match interface

Syntax Description

Default

Matches the route’s interface

The no form of the command removes the match clause.

prefix-list-name

N/A

Configuration Mode Config Route Map

History 3.3.5006

Prefix-list name.

Role

Example admin switch (config route-map mymap permit 10)# match interface ethernet 1/1

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Mellanox Technologies Confidential 905

Rev 4.20

match ip address

match ip address <prefix-list-name> no match ip address

Syntax Description

Default

Filters according to IPv4 prefix list.

The no form of the command removes this configuration from the route map clause.

prefix-list-name

N/A

Configuration Mode Config Route Map

History 3.3.5006

Prefix-list name.

Role

Example admin switch (config route-map mymap permit 10)# match ip address listSmallRoutes

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

• The prefix-list-name should point to an existing IP prefix-list. If it is not found, no route is considered as a match for this clause.

Mellanox Technologies Confidential 906

match ip next-hop

match ip next-hop <value> no match ip next-hop

Syntax Description

Default

Configures a route’s entry next-hop match.

The no form of the command removes a route-map’s entry next-hop match.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Next hop IP address: A.B.C.D (e.g. 10.0.13.86).

Role

Example admin switch (config route-map mymap permit 10)# match ip next-hop

10.10.10.10

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 907

match local-preference

match local-preference <value> no match local-preference

Syntax Description

Default

Configuration Mode Config Route Map

History 3.3.5200

Role

Example

Configures a route’s entry local-preference match.

The no form of the command removes a route-map’s entry local-preference match.

value

N/A

3.4.0000

admin

Range: 1-2147483647.

First version

Updated value range switch (config route-map mymap permit 10)# match local-preference 10

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 908

match metric

match metric <value> no match metric

Syntax Description

Default

Configuration Mode Config Route Map

History 3.3.5200

Role

Example

Configures a route’s entry metric match.

The no form of the command removes a route-map’s entry metric match.

value

N/A

3.4.0000

admin

Range: 1-2147483647.

First version

Updated value range switch (config route-map mymap permit 10)# match metric 10

Related Commands N/A

Note • When a clause contains multiple match commands, the permit or deny filter applies to a route only if its properties are equal to corresponding parameters in each match statement.

• When a route’s properties do not equal the statement parameters, the route is evaluated against the next clause in the route map, as determined by sequence number.

• If all clauses fail to permit or deny the route, the route is denied.

Rev 4.20

Mellanox Technologies Confidential 909

set as-path prepend

set as-path prepend <value

1

> <value

2

> ... <value n

> no set as-path prepend

Syntax Description

Modifies as-path on affected routes

The no form of the command removes the set statement from the route map.

value BGP AS number that is prepended to as-path.

Range: 1-4294967295.

Default N/A

Configuration Mode Config Route Map

History

Role

Example switch (config route-map mymap permit 10)# set as-path prepend 5 10

Related Commands N/A

Note

3.4.0000

admin

Rev 4.20

Mellanox Technologies Confidential 910

set as-path tag

set as-path tag <value> no set as-path tag

Syntax Description

Default

Configures a route’s entry AS-path tag parameter.

The no form of the command removes a route-map’s entry AS path tag setting.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Range: 1-2147483648.

Role

Example admin switch (config route-map mymap permit 10)# set as-path tag 1

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 911

set community

set community {<list of communities> | none} no set community {<list of communities> | none}

Syntax Description

Sets the community attribute of a distributed route

The no form of the command removes the set statement from the clause.

list of communities List of standard communities:

• <aa:nn>

• <number>

• internet

• local-AS

• no-advertise

• no-export

Default N/A

Configuration Mode Config Route Map

History

Role

3.3.5200

admin

Example switch (config route-map mymap permit 10)# set community 1:2 3:4

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 912

set community additive

set community <list-of-communities> additive no set community <list-of-communities> additive

Syntax Description

Adds the matching communities

The no form of the command removes the set statement from the clause.

list-of-communities List of standard communities:

• <aa:nn>

• <number>

• internet

• local-AS

• no-advertise

• no-export

Default N/A

Configuration Mode Config Route Map

History

Role

3.3.5200

admin

Example switch (config route-map mymap permit 10)# set community none

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 913

set community none

set community none no set community none

Sets the community attribute of a distributed route to be empty

The no form of the command removes the set statement from the clause.

Default N/A

Configuration Mode Config Route Map

History

Role

Example switch (config route-map mymap permit 10)# set community none

Related Commands N/A

Note

3.3.5200

admin

Rev 4.20

Mellanox Technologies Confidential 914

set community delete

set community <list of communities> delete no set community <list of communities> delete

Syntax Description

Deletes matching communities.

The no form of the command removes the set statement from the clause.

list of communities List of standard communities:

• <aa:nn>

• <number>

• internet

• local-AS

• no-advertise

• no-export

Default N/A

Configuration Mode Config Route Map

History

Role

Example

3.3.5200

admin switch-e07c04 [standalone: master] (config) # route-map test_route_map switch-e07c04 [standalone: master] (config route-map test_route_map permit 10) # set community 400:1 delete

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 915

set community-list

set community-list <community-list-name> no set community <list of communities>

Syntax Description

Default

Configures a named standard community list.

The no form of the command removes the set statement from the clause.

<community-list-name>

N/A

Configuration Mode Config Route Map

History 3.3.5200

Name of community list

Role

Example admin switch (config route-map mymap permit 10)# set community internet 1:3 additive

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 916

set community-list additive

set community-list <community-list-name> additive no set community <list of communities> additive

Syntax Description

Default

Adds to existing communities using the communities found in the community list.

The no form of the command removes the set statement from the clause.

<community-list-name>

N/A

Configuration Mode Config Route Map

History 3.3.5200

Name of community list

Role

Example admin switch (config route-map mymap permit 10)# set community-list mycommunity additive

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 917

set community-list delete

set community-list <community-list-name> delete no set community-list

Syntax Description

Default

Deletes the matching community list permit entries from the route community list

The no form of the command removes the set statement from the clause.

community-list-name

N/A

Configuration Mode Config Route Map

History 3.3.5200

Name of community list

Role

Example admin switch (config route-map mymap permit 10)# set community-list mycommunity delete

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 918

set ip next-hop

set ip next-hop <value> no set ip next-hop

Syntax Description

Default

Configures a route’s entry next-hop parameter.

The no form of the command removes a route-map’s entry next-hop setting.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Route next-hop IP: A.B.C.D (e.g. 10.0.13.86).

Role

Example admin switch (config route-map mymap permit 10)# set ip next-hop 10.10.10.10

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 919

set local-preference

set local-preference <value> no set local-preference

Syntax Description

Default

Configures a route’s entry local-preference parameter.

The no form of the command removes a route-map’s entry local-pref setting.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Route local-pref: 1-2147483648.

Role

Example admin switch (config route-map mymap permit 10)# set local-preference 10

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 920

set metric

set metric <value> no set metric

Syntax Description

Default

Configures a route’s entry metric parameter.

The no form of the command removes a route-map’s entry metric setting.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Route metric: 1-2147483647.

Role

Example admin switch (config route-map mymap permit 10)# set metric 10

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 921

set origin

set origin {egp | igp | incomplete} no set origin

Syntax Description

Configures a route’s entry origin parameter.

The no form of the command removes a route-map’s entry origin setting.

egp igp

Set a route’s entry origin parameter to external.

Set a route’s entry origin parameter to internal.

Set a route’s entry origin parameter to incomplete.

Default incomplete

N/A

Configuration Mode Config Route Map

History

Role

3.3.5200

admin

Example switch (config route-map mymap permit 10)# set origin egp

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 922

set tag

set tag <value> no set tag

Syntax Description

Default

Configures a route’s entry tag parameter.

The no form of the command removes a route-map’s entry tag setting.

value

N/A

Configuration Mode Config Route Map

History 3.3.5200

Range: 1-2147483647.

Role

Example

3.4.0000

admin

Updated parameter range switch (config route-map mymap permit 10)# set tag 10

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 923

set weight

set weight <number> no set weight

Syntax Description

Default

Configuration Mode Config Route Map

History 3.3.5006

Role

Example

Configures modifications to redistributed routes.

The no form of the command removes this configuration from the route map clause.

number

N/A

3.4.0000

admin

Value of the weight to set. Range: 1-65535.

First version

Updated parameter range switch (config route-map mymap permit 10)# set weight 7

Related Commands route-map <map-name> [deny | permit] [sequence-number]

Note

Rev 4.20

Mellanox Technologies Confidential 924

show route-map

show route-map [<name>]

Syntax Description

Default

Displays route map configuration.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin switch (config)# show route-map mymap route-map mymap, permit, sequence 1200

Set clauses:

continue 1800 switch (config)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 925

6.5.2

IP Prefix-List

Prefix-list is a list of entries, each of which can match one or more IP prefixes. A prefix-list is usually used to match a specific IP prefix, mostly in relation to IP route destinations.

The prefix is considered to match the list if one of the entries match the prefix; the entry itself can be marked as a “permit” entry or a “deny” entry, which can be used by the matching code to decide if the route is to be accepted or not.

The prefix is matched to the prefix-list entries in the order of the sequence number of the entries in the list.

Rev 4.20

Mellanox Technologies Confidential 926

6.5.2.1 Commands

ip prefix-list

ip prefix-list <list-name> [seq <number>] {permit | deny} <ip> [eq <length> |

<prefix> [eq <length> | le <length> | ge <length> [le <length>]]] no ip prefix-list <list-name> [seq <number>]

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Creates or updates a prefix-list.

The no form of the command deletes a prefix-list or a prefix-list entry list-name seq <number>

String

Sequence number assigned to entry. Range: 0-65535.

permit deny ip eq | ge | le <mask>

Permits access for a matching condition.

Denies access for a matching condition.

IP address

• eq: Equal to a specified prefix length

• ge: Greater than or equal to a specified prefix length

• le: Less than or equal to a specified prefix length

Sequence value = 10

Config

3.3.5200

admin switch (config)# ip prefix-list a-list permit 10.20.0.0 /16 eq 24 switch (config)#

N/A

Rev 4.20

Mellanox Technologies Confidential 927

show ip prefix-list

show ip prefix-list [<name>]

Syntax Description

Default

Displays prefix-lists.

name

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin

Displays a specific prefix-list.

switch (config)# show ip prefix-list prefix-list: a-list

count: 1, range entries: 1, sequences: 10 - 10

seq 10 permit 10.20.0.0 /16 ge 24 (hit count: 0, refcount: 0) prefix-list: b-list

count: 2, range entries: 2, sequences: 10 - 20

seq 10 deny 10.10.0.0 /16 le 24 (hit count: 0, refcount: 0)

seq 20 deny 10.20.0.0 /16 le 24 (hit count: 0, refcount: 0) switch (config)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 928

6.6

Multicast (IGMP and PIM)

Protocol independent multicast (PIM) is a collection of protocols that deal with efficient delivery of IP multicast (MC) data. Those protocols are published in the series of RFCs and define different ways and aspects of multicast data distribution. PIM protocol family includes PIM dense mode (PIM-DM), PIM sparse mode (PIM-SM), Bidirectional PIM (PIM-BIDIR) and Bootstrap router (BSR) protocol.

PIM builds and maintains multicast routing tables based on the unicast routing information provided by unicast routing tables that can be maintained statically or dynamically by IP routing protocols like OSPF and BGP.

6.6.1

Basic PIM-SM

PIM relies on the underlying topology gathering protocols that collect unicast routing information and build multicast routing information base (MRIB). The primary role of MRIB is to determine the next hop for PIM messages. MC data flows along with the reverse path of the PIM control.

MC tree construction contains three phases:

1. Construction of a shared distribution tree. This tree is built around a special designated router

(DR) called the rendezvous point (RP).

2. Establishing a native forwarding path from MC sources to the RP

3. Building an optimized MC distribution tree from each MC source to all MC targets bypassing the RP

The first stage of the multicast tree establishment starts when the MC receiver expresses desire to start receiving MC data. It can happen as a result of using one of the L2 protocols like MLD or

IGMP, or by static configuration. When such request is received by the last hop router (a designated router) this router starts to build a distribution path from the RP. It starts to send periodic

“Join” messages to the nearest PIM neighbor router towards the RP. The next router continues to do the same. Eventually the process converges when Join messages reach RP or a router that has already created that distribution tree. Usually that tree is called a shared tree because it is created for any source for specific MC group G and is noted as (*,G).

At that stage, MC senders can start sending MC data. The DR next to the MC source extracts the packets from the data flow and tunnels them to the RP. The RP decapsulates the packets and distributes them to all MC receivers along with the share tree.

On the second stage the RP switches from tunneling of multicast packets from MC sources to forwarding native traffic. When the RP identifies that a new MC source started to send packets, it initiates an establishment of a native forwarding path from the DR of that source to itself. For this purpose it starts to send Join messages towards MC source to nearest neighbor to that source according the MRIB. This is a source specific Join and is noted as (S,G). When data path is established up to the DR, the DR switches from tunneling MC packets to their native forwarding, so the RP does not need to decapsulate MC packets anymore, but still continue to distribute the packets along with shared tree.

On the third phase multicast receivers will try to switch from shared tree to source specific tree by creating a direct distribution path from a multicast source. When last hop router of the multicast receiver identifies multicast traffic coming from any multicast source it will start to send

Join messages towards the source with purpose to create a direct source specific path to that source. Once such path will be established and Designated router that is attached to the source L2

Rev 4.20

Mellanox Technologies Confidential 929

network will start to distribute the multicast traffic directly bypassing shared tree, the last hop router will detach its receivers from shared tree for that data and will switch to the shortest path tree distribution.

6.6.2

Bidirectional PIM

Bidirectional PIM (PIM-BIDIR) is a variant of PIM-SM that builds bidirectional distribution trees that connect multicast senders and receivers. It differs from PIM-SM by eliminating a need to tunnel multicast packets to RP and to keep a state for each (S,G) pair. It also eliminates a need in data driven protocol events. PIM-BIDIR achieves it by defining a new role, Designated Forwarder (DF), and by defining new forwarding rules and keeping all other PIM-SM mechanisms intact.

DF is a PIM enabled router that is the closest router to RP among all PIM routers residing on specific L2 network. It is dynamically elected by all PIM routers on that network. DF is required on each L2 multicast capable network for each RP. DF serves all multicast groups that share the same RP and has following duties:

• It is an only router that is responsible to receive and forward upstream multicast packets on that L2 segment

• It is a router that should collect all Join requests from the routers on that L2 segment

• It is an only router that will distribute downstream multicast packets on that segment.

Once Designated forwarders are elected and forwarding rules are established, PIM routers can start to issue (*,G) Join messages and build shared distribution trees. When shared tree is created, multicast sources can start to exchange data with receivers and it doesn't require any additional maintenance of the multicast states.

Compared to PIM-SM, in bidirectional PIM:

• Each router will keep only (*,G) state and not (*,G) and (S,G) like in PIM-SM

• Multicast traffic from the beginning is forwarded naturally - no need to tunnel data to

RP

• Resulting multicast tree is not shortest path optimal and converges around selected Rendezvous point, but is shared among all participants in that multicast group

In BIDIR-PIM, the packet forwarding rules have been improved over PIM-SM, allowing traffic to be passed up the shared tree toward the RP. To avoid multicast packet looping, bidir-PIM introduces a new mechanism called designated forwarder (DF) election, which establishes a loop-free

SPT rooted at the RP.

6.6.3

PIM Load-Sharing

PIM load-sharing improves network efficiency in IP multicast applications especially in cases when we have multiple equal-cost paths to the same destination. There two methods which enhance IP multicast bandwidth capacity consumption: rendezvous point load sharing and nexthop load sharing.

Routers should be connected via router port and not VLAN interface. Connecting two routers via VLAN interface with PIM load-sharing causes loops in the network.

Rev 4.20

Mellanox Technologies Confidential 930

6.6.3.1 Rendezvous Point Load-Sharing

IP multicast routing is facilitated by use of rendezvous points (RPs) which are anchors in IP multicast distribution trees, and, in case of PIM-BIDIR, are central points that perform IP multicast packet forwarding. Therefore, they can get heavily loaded.

When multiple RPs serve the same multicast IP addresses and are located at an equal distance from a traffic source or receiver, data streams can be shared between those RPs. This enhances switching performance, improves network bandwidth consumption and increases reliability. Data packets based on the packet flow parameters are equally shared between all RPs located at an equal-distance.

6.6.3.2 Next Hop Load-Sharing

Another way to improve network capacity consumption and increase the amount of IP multicast data carried by the network, is to utilize multiple equal-cost paths from RPs to IP multicast receivers. A network usually selects a single path to carry specific multicast group data packets from a source to a specific multicast destination. But when enabling next hop load-sharing, multiple paths between RP and multicast group receivers may be utilized, and based on traffic flow parameters, the data stream may be split to multiple flows that go through several equal-cost paths to the same destination.

6.6.4

Bootstrap Router

For correct operation each PIM router requires a capability to map a multicast group that it needs to serve to a Rendezvous point for that group. This mapping can be done manually or the mapping can be distributed dynamically in the network. BSR protocol serves for this purpose.

This protocol introduces new role in the multicast network – Bootstrap router. That router is responsible to flood multicast group to RP mapping through the multicast routing domain. Bootstrap router is elected dynamically among bootstrap router candidates (C-BSR) and once elected will collect from Rendezvous point candidate (C-RP) mapping information and distribute it in the domain.

Bootstrap activity contains 4 steps. First each C-BSR configured in the network originates floods into the network bootstrap messages that express the router desire to become BSR and also its

BSR priority. Any C-BSR that receives that information and has lower priority will suspend itself, so eventually only one router will send BSR messages and become BSR.

When BSR is elected all RP candidates start to advertise to BSR a list of groups that this RP can serve. On the next step, after BSR learns the group mapping proposals, it forms a final group to

RP mapping in the domain and starts to distribute it among PIM routers in the multicast routing domain. When PIM router receives BSR message with the group to RP mapping, it installs that mapping in the router local cache and uses that information to create multicast distribution trees.

6.6.5

Configuring Multicast

Precondition steps:

Step 1.

Enable IP routing functionality. Run: switch (config)# ip routing

Step 2.

Enable the desired VLAN. Run: switch (config)# vlan 10

Rev 4.20

Mellanox Technologies Confidential 931

Step 3.

Step 4.

Step 5.

Step 6.

Add this VLAN to the desired interface. Run: switch (config)# interface ethernet 1/1 switch (config ethernet 1/1)#switchport access vlan 10

Create a VLAN interface. Run: switch (config)# interface vlan 10

Apply IP address to the VLAN interface. Run: switch (config interface vlan 10)# ip address 10.10.10.10 /24

Enable the interface. Run: switch (config interface vlan 10)# no shutdown

6.6.5.1 Configuring IGMP

IGMP is enabled when IP multicast is enabled and static multicast or PIM is enabled on the interface.

6.6.5.2 Verifying IGMP

Step 1.

Display a brief IGMP interface status. Run : switch (config)# show ip igmp interface brief

IGMP Interfaces for VRF "default", Count: 1

Interface IP Address IGMP Querier Membership Version

VLAN10 10.10.10.1 10.10.10.1 5 v2

Step 2.

Display detailed IGMP interface status. Run : switch (config)#show ip igmp interface vlan 10

IGMP Interfaces for VRF "default"

VLAN10

Interface status: protocol-up/admin-up/link-up

IP address: 10.10.10.1, IP Subnet: 10.10.10.0/24

Active Querier: 10.10.10.1

Membership count: 5

Route-queue depth: 0

IGMP Version: 2

IGMP query interval: 125 secs, configured value: 125 secs

IGMP max response time: 10 secs, configured value: 10 secs

IGMP startup query interval: 125 secs, configured value: 125 secs

IGMP startup query count: 2

IGMP group timeout: 260 secs, configured value: 260 secs

IGMP querier timeout: 260 secs configured value: 260 secs

IGMP last member mrt: 25 secs configured value: 25

IGMP robustness variable: 2

IGMP interface immediate leave: Disabled

IGMP interface statistics:

General (sent/received):

v1/v2-reports: 0/10

v2-queries: 271/0,v2-leaves: 0/0

Rev 4.20

Mellanox Technologies Confidential 932

Rev 4.20

Step 3.

v3-queries: 0/0,

v3-reports: 0/0 switch (config)#

Display the list of IGMP groups and their status. Run : switch (config)#show ip igmp groups

IGMP Connected Group Membership for VRF "default", - 2 total entries

Type: S - Static, D - Dynamic, L - Local, T - SSM Translated

Group Address Type Interface Uptime Expires Last

Reporter

226.0.1.0 D vlan10 [0d 00:00:07.46] [0d 00:04:05.08] 10.10.10.2

226.0.1.1 D vlan10 [0d 00:00:07.47] [0d 00:04:05.08] 10.10.10.2

switch (config)#

6.6.5.3 Configuring PIM

Prerequisites:

Step 1.

If not enabled, enable IP routing. Run: switch (config)# ip routing

Step 2.

Globally enable multicast routing. Run: switch (config)# ip multicast-routing

To configure PIM:

Step 1.

Enable PIM. Run: switch (config)# protocol pim

Step 2.

Globally enable Bidirectional PIM (BIDIR mode). Run: switch (config)# no ip pim bidir shutdown

Mellanox Technologies Confidential 933

Rev 4.20

6.6.6

Commands

6.6.6.1 PIM

protocol pim

protocol pim no protocol pim

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

N/A

Enables protocol independent multicast (PIM).

The no form of the command hides all PIM commands and deletes all PIM configurations.

N/A

Disabled

Config

3.3.5006

admin switch (config) # protocol pim

Mellanox Technologies Confidential 934

ip pim bidir shutdown

ip pim bidir shutdown no ip pim bidir shutdown

Syntax Description

Default

Disables PIM bidir.

The no form of the command enables PIM bidir.

N/A

Disabled

Configuration Mode Config

History 3.3.5006

Role

Example admin switch (config) # no ip pim bidir shutdown

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 935

Rev 4.20

ip pim rp-address

ip pim rp-address <rp-address> [group-list <ip-address> <prefix>] [override] bidir no ip pim rp-address <rp-address> [group-list <ip-address> <prefix>]

Syntax Description

Configures a static IP address of a rendezvous point for a multicast group range or adds new multicast range to existing RP.

The no form of the command removes the rendezvous point for a multicast group range or removes all configuration of the RP.

rp-address ip-address

The static IP address of rendezvous point.

IP address of the group-range (coupled with the prefix parameter).

prefix override

Network prefix (in the format of /24, or 255.255.255.0 for example) of group range.

Specifies that this configuration overrides dynamic configuration learned by BSR.

Specifies that the group range uses a bidirectional PIM.

Default bidir

N/A

Configuration Mode Config

History

Role

3.3.5006

admin

Example switch (config) # ip pim rp-address 10.10.10.10 bidir

Related Commands N/A

Note

Mellanox Technologies Confidential 936

Rev 4.20

ip pim bsr-candidate

ip pim bsr-candidate {vlan <vlan-id> | loopback <number> | ethernet <port>}

[hash-len <hash-length>] [priority <priority>] [interval <interval>] no ip pim bsr-candidate {vlan <vlan-id> | loopback <number> | ethernet <port>}

[hash-len <hash-length>] [priority <priority>] [interval <interval>]

Syntax Description

Configures the switch as a candidate BSR router (C-BSR).

The no form of the command removes BSR-candidate configuration or restores default parameters values.

vlan <vlan-id> loopback <number>

The VLAN ID. Range is 1-4094.

Loopback interface number. ethernet <port> hash-len priority interval

Ethernet interface.

Specifies the hash mask length used in BSR messages.

Range: 0-32.

BSR priority rating. Larger numbers denote higher priority. Range: 0-255.

Period between the transmission of BSMs (seconds).

Range:10-536870906.

Default The interface is not BSR candidate by default.

priority: 64 interval: 60 hash-len: 30

Configuration Mode Config

Config Interface Ethernet configured as a router port

Config Interface Loopback

Config Interface Port Channel configured as a router port

Config Interface VLAN

History

Role

Example

3.3.5006

admin switch (config) # ip pim bsr-candidate vlan 10 priority 100

Mellanox Technologies Confidential 937

Rev 4.20

Related Commands ip pim sparse-mode

Note • IP PIM sparse-mode must be enabled on the interface.

• A BSR is a PIM router within the PIM domain through which dynamic RP selection is implemented. The BSR selects RPs from a list of candidate RPs and exchanges bootstrap messages (BSM) with all routers in the domain. The BSR is elected from one of the C-

BSRs through an exchange of BSMs. A subset of PIM routers within the domain are configured as candidate Bootstrap routers (C-BSRs). Through the exchange of Bootstrap messages (BSMs), the C-BSRs elect the BSR, which then uses BSMs to inform all domain routers of its status.

• Command parameters specify the switch’s BSR address, the interval between BSM transmissions, hash length used for RP calculations and the priority assigned to the switch when electing a BSR.

• Entering an ip pim bsr-candidate command replaces any previously configured bsr-candidate command. If the new command does not specify a priority or interval, the previously configured values persist in running-config.

Mellanox Technologies Confidential 938

ip pim bsr-holdtime

ip pim bsr-holdtime <period> no ip pim bsr-holdtime

Syntax Description

Default

Configures the timeout period an elected BSR remains valid after receiving a BSM.

The no form of the command resets the parameters to their default.

period In seconds. Range: 12-1073741823 (1.073 billion).

period = 2*(BSR candidate interval) + 10

Configuration Mode Config

History 3.3.5006

Role

Example

Related Commands

Note admin switch (config) # ip pim bsr-holdtime 30

Rev 4.20

Mellanox Technologies Confidential 939

Rev 4.20

ip pim rp-candidate

ip pim rp-candidate {vlan <vlan-id> | loopback <number> | ethernet <slot/ port>} group-list <ip-address> <prefix> [bidir] [priority <priority>] [interval

<interval>] no ip pim rp-candidate {vlan <vlan-id> | loopback <number> | ethernet <slot/ port>} group-list <ip-address> <prefix> [bidir] [priority <priority>] [interval

<interval>]

Syntax Description

Configures the switch as a candidate rendezvous point (C-RP).

The no form of the command removes the ip pim rp-candidate from running-config command for the specified multicast group. ethernet <slot/port> port-channel <number>

Ethernet interface.

LAG interface.

VLAN ID. Range: 1-4094.

Loopback interface number.

The group IP address.

Network prefix (for example /24, or 255.255.255.0).

RP priority rating. Range: 0-255, where smaller numbers mean higher priority.

RP-advertisements message transmission interval.

Range: 0-16383.

Default The RP priority is 192.

The BSR message interval is 60 seconds.

Configuration Mode Config

Config Interface Ethernet configured as a router port

Config Interface Loopback

Config Interface Port Channel configured as a router port

Config Interface VLAN

History

Role

Example vlan <vlan-id> loopback <number> ip-address prefix priority interval

3.3.5006

admin switch (config) # ip pim rp-candidate vlan 19 group-list 225.6.5.0 /25 priority 20 interval 30 bidir

Mellanox Technologies Confidential 940

Rev 4.20

Related Commands N/A

Note • The BSR selects a multicast group’s dynamic RP set from the list of C-RPs in the PIM domain. The command specifies the interface (used to derive the RP address), C-RP advertisement interval, and priority rating. The BSR selects the RP set by comparing C-RP priority ratings. The C-RP advertisement interval specifies the period between successive C-RP advertisement message transmissions to the BSR.

• Running-config supports multiple multicast groups through multiple ip pim rp-candidate statements:

• All commands must specify the same interface. Issuing a command with an interface that differs from existing commands removes all existing commands from running-config.

• Running-config stores the interval and priority setting in a separate statement that applies to all rp-candidate statements. When a command specifies an interval that differs from the previously configured value, the new value replaces the old value and applies to all configured rp-candidate statements. The default interval value is 60 seconds.

• When the no commands do not specify a multicast group, all rp-candidate statements are removed from running-config. The no ip pim rp-candidate interval commands restore the interval setting to the default value of 60 seconds.

• When setting a priority, all previous rp-candidates within all interfaces and groups are configured to this priority.

Mellanox Technologies Confidential 941

Rev 4.20

ip pim sparse-mode

ip pim sparse-mode no ip pim sparse-mode

Sets PIM sparse mode on this interface.

The no form of the command disables the sparse-mode on the interface and deletes all interfaces configuration.

Syntax Description

Default

N/A

Disabled

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10) # ip pim sparse-mode

Related Commands N/A

Note

3.3.5006

admin

Mellanox Technologies Confidential 942

ip pim dr-priority

ip pim dr-priority <priority> no ip pim dr-priority

Syntax Description

Configures the designated router (DR) priority of PIM Hello messages.

The no form of the command resets this parameter to its default.

priority The designated router priority of the PIM Hello messages. Range is 1-4294967295.

Default 1

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.5006

admin

Example switch (config interface vlan 10) # ip pim dr-priority 5

Related Commands ip pim sparse-mode

Note The command “ip pim sparse-mode” must be run prior to using this command.

Rev 4.20

Mellanox Technologies Confidential 943

ip pim hello-interval

ip pim hello-interval <interval> no ip pim hello-interval

Syntax Description

Configures PIM Hello interval in milliseconds.

The no form of the command resets this parameter to its default.

interval PIM Hello interval in milliseconds.

Range:1000-65535000.

Default 30,000 milliseconds

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.5006

admin

Example switch (config interface vlan 10) # ip pim hello-interval 70000

Related Commands ip pim sparse-mode

Note The command “ip pim sparse-mode” must be run prior to using this command.

Rev 4.20

Mellanox Technologies Confidential 944

ip pim join-prune-interval

ip pim join-prune-interval <period> no ip pim join-prune-interval

Syntax Description

Default

Configures the period between Join/Prune messages that the configuration mode interface originates and sends to the upstream RPF neighbor.

The no form of the command resets this parameter to its default.

period

60 seconds

Range: 1-1000000 seconds.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.3.5200

admin switch (config interface vlan 10) # ip pim join-prune-interval 60

Rev 4.20

Mellanox Technologies Confidential 945

ip pim border

ip pim border no ip pim border

Configures an interface on an IPv4 PIM border.

The no form of the command removes the interface from being a PIM border.

Syntax Description

Default

N/A

Disabled

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.3.5006

admin switch (config interface vlan 10) # ip pim border

PIM border blocks PIM control traffic, but sends and receives all multicast traffic.

Rev 4.20

Mellanox Technologies Confidential 946

Rev 4.20

ip pim bsr-border

ip pim bsr-border no ip pim bsr-border

Prevents the switch from sending bootstrap router messages (BSMs) over the configuration mode interface.

The no form of the command resets the parameter to its default value.

Syntax Description

Default

N/A no pim bsr-border

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

Related Commands

Note

3.3.5200

admin switch (config interface vlan 10) # ip pim bsr-border

Mellanox Technologies Confidential 947

ip pim multipath rp

ip pim multipath rp no ip pim multipath rp

Syntax Description

Default

Enables PIM load-sharing for Rendezvous Points (RPs).

The no form of the command disables PIM load-sharing for RPs.

N/A

Disabled

Configuration Mode Config

History 3.4.2008

Role

Example admin switch (config) # ip pim multipath rp

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 948

debug ethernet ip pim

debug ethernet ip pim {all | control-plane | data-path | fail-all | init-shut |

 management | memory | packet-dump | resources} no debug ethernet ip pim {all | control-plane | data-path | fail-all | init-shut | management | memory | packet-dump | resources}

Configures the trace level for PIM.

The no form of the command removes the trace level for PIM.

Syntax Description control-plane data-path fail-all init-shut

Control plane traces.

IP packet dump trace.

All failures including Packet Validation Trace.

Init and shutdown messages.

memory packet-dump

Memory related messages.

Packet dump messages.

Default N/A

Configuration Mode Config

History

Role

3.3.5200

admin switch (config)# debug ethernet ip pim all Example

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 949

show ip pim protocol

show ip pim protocol

Syntax Description

Default

Displays PIM protocol information (counters).

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5200

admin switch (config) # show ip pim protocol

PIM Control Counters

Received Sent Invalid

Assert 0 0 0

Bootstrap Router 0 0 0

CRP Advertisement 0 0 0

Graft 0 0 0

Grapt Ack 0 0 0

Hello 0 0 0

J/P 0 0 0

Register 0 0 0

Register Stop 0 0 0

State Refresh 0 0 0 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 950

show ip pim bsr

show ip pim bsr

Syntax Description

Default

Displays PIM BSR information.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin arc-switch14 [standalone: master] (config) # show ip pim bsr

PIMv2 Bootstrap information

BSR address: 4.4.4.14

Uptime: 00:00:30, BSR Priority: 0, Hash mask length: 30

Expires: 00:00:57

This system is a candidate BSR

Candidate BSR address: 4.4.4.14, priority: 0, hash mask length: 30

interval: 60, holdtime: 130

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 951

show ip pim neighbor

show ip pim neighbor [vlan <vlan-id> | <other interfaces> | <ip-addr>]

Syntax Description

Displays information about IPv4 PIM neighbors.

vlan <vlan-id> Filters the output per specific VLAN ID.

Filters the output per specific neighbor IP address.

Default neighbor-addr

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin switch (config) # show ip pim neighbor

PIM Neighbor Status for VRF "default"

Neighbor Interface Uptime Expires Ver DR Prio Mode

5.5.5.1 VLAN5 10:36:45 00:01:43 1

9.9.9.1 VLAN9 10:36:42 00:01:43 1 switch (config) #

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 952

show ip pim rp

show ip pim rp <rp-address>

Syntax Description

Default

Displays information about the rendezvous points (RPs) for PIM.

rp-address

N/A

Configuration Mode Any Command Mode

A rendezvous points address.

History

Role

Example

3.3.5006

admin switch(config)# show ip pim rp

PIM RP Status Information for VRF "default"

BSR: 10.10.10.10, expires: 00:01:16,

priority: 255, hash-length: 0

RP: 11.11.11.11, expires: 00:01:36

priority: 0, RP-source: 10.10.10.10, group ranges:

225.10.0.0/24

RP: 8.8.8.2, expires: 00:01:36

priority: 0, RP-source: 10.10.10.10, group ranges:

225.12.0.0/24 switch(config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 953

show ip pim rp-hash

show ip pim rp-hash <group>

Syntax Description

Displays the hashed value of the group (RP address according the group address).

group Filters the output per a specific IP Multicast group address.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin switch (config) # show ip pim rp-hash 225.7.6.2

RP 20.20.20.49, v2

Info Source: 20.20.20.49, via bootstrap, priority 60, holdtime 57

Expires: 00:00:53

PIMv2 Hash Value (mask 255.255.255.252) switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 954

show ip pim rp-candidate

show ip pim rp-candidate

Syntax Description

Default

Displays information about RP candidate status.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin switch (config)# show ip pim rp-candidate

Next Candidate-RP-Advertisement in 00:11:22/00:60:00

RP: 10.10.10.10

group prefixes priority

224.0.0.0/4 190

225.0.0.0/4 191 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 955

Rev 4.20

show ip pim interface

show ip pim interface {[vlan <vlan id> | ethernet <port>] [df] | brief}

Syntax Description

Displays information about the enabled interfaces for PIM.

vlan <vlan-id> Filters the output for specific interface.

ethernet <port> df

Ethernet interface.

Displays information about elected designated forwarders.

Displays a summary of information for all interfaces.

Default brief

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.5006

admin

# arc-switch55 [standalone: master] (config) # show ip pim interface vlan 2919

Interface Vlan2919 address is 70.28.23.80

PIM: enabled

PIM version: 2, mode: sparse

PIM DR: 70.28.23.80 (this system)

PIM DR Priority: 1

PIM configured DR priority:

PIM neighbor count: 1

PIM neighbor holdtime: 105 secs

PIM Hello Interval: 30 seconds, next hello sent in: 00:00:28

PIM Hello Generation ID: 61345

PIM Join-Prune Interval: 60 seconds

PIM domain border: no

PIM Interface Statistics:

General (sent/received):

Hellos: 36/37, JPs: 0/0, Asserts: 0/0

Grafts: 0/0, Graft-Acks: 0/0

DF-Offers: 0/0, DF-Winners: 0/0, DF-Backoffs: 0/0, DF-

Passes: 0/0

Errors:

Checksum errors: 0, Invalid packet types/DF subtypes: 0/0

Authentication failed: 0

Packets from non-neighbors: 1

JPs received on RPF-interface: 0

(*,G) Joins received with no/wrong RP: 0/0

(*,G)/(S,G) JPs received for SSM/Bidir groups: 0/0

Related Commands

Note

Mellanox Technologies Confidential 956

Rev 4.20

show ip pim upstream joins

show ip pim upstream joins

Syntax Description

Default

Displays information about any PIM joins/prunes which are currently being sent to upstream PIM routers

N/A

N/A

Configuration Mode Any Command Mode

History 3.3.5006

Role

Example admin switch (config) # show ip pim upstream joins

Neighbor address: 159.135.45.26

via interface: 159.135.45.34

next message in 43 seconds

Group: 224.0.10.0

Joins:

22.74.49.25

Prunes:

No prunes included

switch (config) #

Related Commands

Note Should contain the following information: neighbor address, interface address, group range, Joins, Prunes.

Mellanox Technologies Confidential 957

6.6.6.2 Multicast

ip multicast-routing

ip multicast-routing no ip multicast-routing

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Allows the switch to forward multicast packets.

The no form of the command disables multicast routing.

N/A

Disabled

Config

3.3.5006

admin switch (config)# ip multicast-routing

N/A

Rev 4.20

Mellanox Technologies Confidential 958

ip mroute

ip mroute {<ip-addr> <ip-mask> <next-hop>} [pref] no ip mroute {<ip-addr> <ip-mask>}

Syntax Description

Configure multicast reverse path forwarding (RPF) static routes.

The no form of the command deletes the static multicast route.

ip-addr ip-mask

Unicast IP address.

Network mask in a dotted format (e.g. 255.255.255.0) or /24 format.

next-hop preference

Default Preference is 1

Configuration Mode Config

Next hop IP address.

Route preference. Range: 1-255.

History

Role

Example

3.3.5006

admin arc-switch14 [standalone: master] (config) # ip mroute 16.16.0.0 /16

3.3.3.1

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 959

ip multicast ttl-threshold

ip multicast ttl-threshold <ttl-value> no ip multicast ttl-threshold

Configures the time-to-live (TTL) threshold of packets being forwarded out of an interface.

The no form of the command removes RPF static routes.

Syntax Description

Default ttl-value

0 – all packets are forwarded

Range: 0-225.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip multicast ttl-threshold 10

Related Commands N/A

Note

3.3.5006

admin

Rev 4.20

Mellanox Technologies Confidential 960

Rev 4.20

show ip mroute

show ip mroute [summary | <group> [<prefix> [<source>]]]

Syntax Description

Displays information about IPv4 multicast routes.

source Source IP address.

group prefix

IP address of multicast group.

Network prefix of multicast group (in the format of /24, or 255.255.255.0 for example).

Displays a summary of the multicast routes.

Default summary

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.2.1000

admin arc-switch14 [standalone: master] (config) # show ip mroute

IP Multicast Routing Table

Flags: B - Bidir Group, L - Local, P - Pruned, R - RP-bit set, T - SPTbit set

J - Join SPT

Timers: Uptime/Expires

Interface state: Interface, State/Mode

(*, 225.0.0.0/24), 00D 00:14:49, RP 18.18.18.14, flags: BR

Bidir-Upstream: Lo7

Outgoing interface list:

Related Commands N/A

Note

Mellanox Technologies Confidential 961

Rev 4.20

6.6.6.3 IGMP

ip igmp immediate-leave

ip igmp immediate-leave no ip igmp immediate-leave

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables the device to remove the group entry from the multicast routing table immediately upon receiving a leave message for the group.

The no form of the command disables immediate-leave.

N/A

Disabled

Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

3.3.5006

admin switch (config interface vlan 10)# ip igmp immediate-leave

N/A

Mellanox Technologies Confidential 962

ip igmp last-member-query-count

ip igmp last-member-query-count <count> no ip igmp last-member-query-count

Syntax Description

Default

Configures the number of query messages the switch sends in response to a groupspecific or group-source-specific leave message.

The no form of the command resets this parameter to its default.

Count

2

Range:1-7.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.5006

admin

Example switch (config interface vlan 10)# ip igmp last-member-query-count 7

Related Commands N/A

Note This parameter reflects expected packet loss on a congested network.

Rev 4.20

Mellanox Technologies Confidential 963

ip igmp last-member-query-response-time

ip igmp last-member-query-response-time <interval> no ip igmp last-member-query-response-time

Syntax Description

Configures the IGMP last member query response time in seconds.

The no form of the command resets this parameter to its default.

interval IGMP last member query response time.

Range:1-25 seconds.

Default 1

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.3.5006

admin switch (config interface vlan 10)# ip igmp last-member-query-responsetime 10

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 964

ip igmp startup-query-count

ip igmp startup-query-count <count> no ip startup-query-count

Syntax Description

Default

Configures the number of query messages an interface sends during startup.

The no form of the command resets this parameter to its default.

count

2

Range: 1-65535.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip igmp startup-query-count 10

Related Commands N/A

Note

3.3.5006

admin

Rev 4.20

Mellanox Technologies Confidential 965

ip igmp startup-query-interval

ip igmp startup-query-interval <interval> no ip startup-query-interval

Syntax Description

Default

Configures the IGMP startup query interval in seconds.

The no form of the command resets this parameter to its default.

interval

30

Range: 1-1800 seconds.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example switch (config interface vlan 10)# ip igmp startup-query-interval 10

Related Commands N/A

Note

3.3.5006

admin

Rev 4.20

Mellanox Technologies Confidential 966

ip igmp query-interval

ip igmp query-interval <interval> no ip igmp query-interval

Syntax Description

Default

Configures the IGMP query interval in seconds.

The no form of the command resets this parameter to its default.

interval

125

Configuration Mode Config Interface VLAN

History 3.3.5006

The IGMP query interval. Range: 1-1800 seconds.

Role

Example admin switch (config interface vlan 10)# ip igmp query-interval 60

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 967

ip igmp query-max-response-time

ip igmp query-max-response-time <time> no ip igmp query-max-response-time

Syntax Description

Default

Configures the IGMP max response time in seconds.

The no form of the command resets this parameter to its default.

time

10

Configuration Mode Config Interface VLAN

History 3.3.5006

The IGMP max response time. Range: 1-25 seconds.

Role

Example admin switch (config interface vlan 10)# ip igmp query-max-response-time 20

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 968

ip igmp robustness-variable

ip igmp robustness-variable <count> no ip igmp robustness-variable

Syntax Description

Default

Configures the IGMP robustness variable.

The no form of the command resets this parameter to its default.

count

2

IGMP robustness variable. Range: 1-7.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.5006

admin

Example switch (config interface vlan 10)# ip igmp robustness-variable 4

Related Commands N/A

Note • The robustness variable can be increased to increase the number of times that packets are resent.

• This parameter reflects expected packet loss on a congested network.

Rev 4.20

Mellanox Technologies Confidential 969

ip igmp static-oif

ip igmp static-oif <group> no ip igmp static-oif

Syntax Description

Default

Statically binds an IP interface to a multicast group.

The no form of the command deletes the static multicast address from the interface.

group no ip igmp static-oif

Multicast IP address.

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

3.3.5006

admin

Example switch (config interface vlan 10)# ip igmp static-oif 10.10.10.5

Related Commands N/A

Note PIM must be enabled in order to configure the route in the hardware.

Rev 4.20

Mellanox Technologies Confidential 970

clear ip igmp groups

clear ip igmp groups {all | <group-address> <mask>}

Syntax Description

Clears IGMP group information.

all Clears all IGMP groups.

Clears a specific group.

Default group-address no ip igmp static-oif

Configuration Mode Config

History

Role

Example

3.3.5200

admin switch (config)# clear ip igmp groups all switch (config)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 971

Rev 4.20

debug ethernet ip igmp-l3

debug ethernet ip igmp-l3 {all | control-plane | data-path | fail-all | init-shut | management | memory | packet-dump | resources} no debug ethernet ip igmp-l3 {all | control-plane | data-path | fail-all | init-shut | management | memory | packet-dump | resources}

Configures the trace level for IGMP.

The no form of the command removes the trace level for IGMP.

Syntax Description control-plane data-path fail-all init-shut

Control plane traces.

IP packet dump trace.

All failures including Packet Validation Trace.

Init and shutdown messages.

memory packet-dump

Memory related messages.

Packet dump messages.

Default N/A

Configuration Mode Config

History

Role

3.3.5200

admin switch (config)# debug ethernet ip igmp-l3 all Example

Related Commands

Note

Mellanox Technologies Confidential 972

show ip igmp groups

show ip igmp groups [<group>] [vlan <vlan-id>]

Syntax Description

Displays information about IGMP-attached group membership.

group Filters the output to a specific IP multicast group address.

Filters the output to a specific VLAN ID.

Default vlan <vlan-id>

N/A

Configuration Mode Any Command Mode

History

Role

Example admin switch (config)# show ip igmp groups

IGMP Connected Group Membership for VRF "default"

Type: S - Static, D - Dynamic, L - Local, T - SSM Translated

Group Address Type Interface Uptime Expires Last Reporter

225.7.6.0 S vlan19 [0d 00:12:12.14] [0d 00:00:00.00] 0.0.0.0

225.7.10.1 D vlan19 [0d 00:00:01.18] [0d 00:04:08.81] 19.19.19.1

225.7.7.7 S vlan19 [0d 00:12:12.15] [0d 00:00:00.00] 0.0.0.0

225.7.7.7 S vlan21 [0d 00:12:12.15] [0d 00:00:00.00] 0.0.0.0

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 973

show ip igmp interface

show ip igmp interface [vlan <vlan-id> | brief]

Syntax Description

Displays IGMP brief configuration and status.

brief Displays brief output information.

Filters the output to a specific VLAN ID.

Default vlan <vlan-id>

N/A

Configuration Mode Any Command Mode

History

Role admin

Rev 4.20

Mellanox Technologies Confidential 974

Example switch(config)#show ip igmp interface

IGMP Interfaces for VRF "default"

VLAN5

Interface status: protocol-down/admin-up/link-down

IP address: 5.5.5.49, IP Subnet: 5.5.5.0/24

Active Querier: 5.5.5.48

Membership count: 0

Route-queue depth: 0

IGMP Version: 2

IGMP query interval: 125 secs, configured value: 125 secs

IGMP max response time: 100 secs, configured value: 100 secs

IGMP startup query interval: 125 secs, configured value: 125 secs

IGMP startup query count: 2

IGMP group timeout: 350 secs, configured value: 350 secs

IGMP querier timeout: 350 secs configured value: 350 secs

IGMP last member mrt: 10 secs configured value: 10

IGMP robustness variable: 2

IGMP interface immediate leave: Disabled

IGMP interface statistics:

General (sent/received): v1/v2-reports: 0/0 v2-queries: 3/1,v2-leaves: 0/0 v3-queries: 0/0, v3-reports: 0/0

VLAN19

Interface status: protocol-up/admin-up/link-up

IP address: 19.19.19.49, IP Subnet: 19.19.19.0/24

Active Querier: 19.19.19.49

Membership count: 3

Route-queue depth: 0

IGMP Version: 2

IGMP query interval: 125 secs, configured value: 125 secs

IGMP max response time: 10 secs, configured value: 10 secs

IGMP startup query interval: 125 secs, configured value: 125 secs

IGMP startup query count: 2

IGMP group timeout: 260 secs, configured value: 260 secs

IGMP querier timeout: 260 secs configured value: 260 secs

IGMP last member mrt: 1 secs configured value: 1

IGMP robustness variable: 2

IGMP interface immediate leave: Disabled

IGMP interface statistics:

General (sent/received): v1/v2-reports: 0/5 v2-queries: 14/0,v2-leaves: 0/1 v3-queries: 0/0, v3-reports: 0/0

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 975

6.7

VRRP

The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available IP routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.

The protocol achieves this by creating virtual routers, which are an abstract representation of multiple routers (that is, a master and backup routers, acting as a group). The default gateway of a participating host is assigned to the virtual router instead of a physical router. If the physical router that is routing packets on behalf of the virtual router fails, another physical router is selected to automatically replace it. The physical router that is forwarding packets at any given time is called the master router.

VRRP provides information on the state of a router, not the routes processed and exchanged by that router. Each VRRP instance is limited, in scope, to a single subnet. It does not advertise IP routes beyond that subnet or affect the routing table in any way.

Routers have a priority of between 1-255 and the router with the highest priority becomes the master. The configurable priority value ranges from 1-254, the router which owns the interface IP address as one of its associated IP addresses has the priority value 255. When a planned withdrawal of a master router is to take place, its priority can be lowered, which means a backup router will preempt the master router status rather than having to wait for the hold time to expire.

6.7.1

Load Balancing

To create load balancing between routers participating in the same VR, it is recommended to create 2 (or more) VRs. Each router will be a master in one of the VRs, and a backup to the other

VR(s). A group of hosts should be configured with Router 1’s virtual address as the default gateway, while the second group should be configured with Router 2’s virtual address.

Figure 32: Common VRRP Configuration with Load Balancing

Rev 4.20

Mellanox Technologies Confidential 976

Rev 4.20

6.7.2

Configuring VRRP

To configure VRRP:

Precondition steps:

Step 1.

Enable IP routing functionality. Run: switch (config)# ip routing

Step 2.

Enable the desired VLAN. Run: switch (config)# vlan 20

The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.

Step 3.

Step 4.

Step 5.

Add this VLAN to the desired interface. Run: switch (config)# interface ethernet 1/1 switch (config ethernet 1/1)# switchport access vlan 20

Create a VLAN interface. Run: switch (config)# interface vlan 20

Apply IP address to the VLAN interface.

On one of the switches, run: switch (config interface vlan 20)# ip address 20.20.20.20 /24

On the other switch, run: switch (config interface vlan 20)# ip address 20.20.20.30 /24

Step 6.

Enable the interface. Run: switch (config interface vlan 20)# no shutdown

Configure VRRP:

This is the same configuration on both switches

Step 1.

Enable VRRP protocol globally. Run: switch (config)# protocol vrrp

Step 2.

Step 3.

Step 4.

Create a virtual router group for an IP interface. Up to 255 VRRP IDs are supported. Run: switch (config interface vlan 20)# vrrp 100

Set the VIP address. Run: switch (config interface vlan 20 vrrp 100)# address 20.20.20.40

Influence the election of the master in the VR cluster make sure that the priority of the desired master is the highest. Note that the higher IP address is selected in case the priority of the routers in the VR are the same. Select the priority. Run: switch (config interface vlan 20 vrrp 100)# priority 200

Mellanox Technologies Confidential 977

Rev 4.20

Step 5.

Step 6.

Step 7.

Step 8.

The advertizement interval should be the same for all the routers within the VR. Modify the interval. Run: switch (config interface vlan 20 vrrp 100)# advertisement-interval 2

The authentication text should be the same for all the routers within the VR. Configure the authentication text. Run: switch (config interface vlan 20 vrrp 100)# authentication text my-password

Use the preempt command to enable a high-priority backup virtual router to preempt the lowpriority master virtual router. Run: switch (config interface vlan 20 vrrp 100)# preempt

Disable VRRP. Run: switch (config interface vlan 20 vrrp 100)# shutdown

The configuration will not be deleted, only the VRRP state machine will be stopped.

6.7.3

Verifying VRRP

Step 1.

Display VRRP brief status. Run: switch(config)# show vrrp

Interface VR Pri Time Pre State VR IP addr

------------------------------------------------------

Vlan20 1 200 2s Y Init 20.20.20.20

… switch(config)#

Step 2.

Display VRRP detailed status. Run: switch (config)# show vrrp detail

VRRP Admin State : Enabled

Vlan20 - Group 1 (IPV4)

Instance Admin State : Enabled

State : Backup

Virtual IP Address : 20.20.20.40

Priority : 200

Advertisement interval (sec) : 2

Preemption : Enabled

Virtual MAC address : AA:BB:CC:DD:EE:FF switch (config)#

Mellanox Technologies Confidential 978

Step 3.

Display VRRP statistic counters. Run: switch (config)# show vrrp statistics

Ethernet1/5 - Group 1 (IPV4)

Invalid packets: 0

Too short: 0

Transitions to Master 6

Total received: 155

Bad TTL: 0

Failed authentication: 0

Unknown authentication: 0

Conflicting authentication: 0

Conflicting Advertise time: 0

Conflicting Addresses: 0

Received with zero priority: 3

Sent with zero priority: 3 switch (config)#

Rev 4.20

Mellanox Technologies Confidential 979

6.7.4

Commands

protocol vrrp

protocol vrrp no protocol vrrp

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Enables VRRP globally and unhides VRRP related commands.

The no form of the command deletes all the VRRP configuration and hides VRRP related commands.

N/A no feature vrrp

Config

3.3.4500

admin switch (config)# protocol vrrp

Rev 4.20

Mellanox Technologies Confidential 980

vrrp

vrrp <number> no vrrp <number>

Syntax Description

Default

Creates a virtual router group on this interface and enters a new configuration mode.

The no form of the command deletes the VRRP instance and the related configuration.

number

N/A

Configuration Mode Config Interface VLAN

History 3.3.4500

A VRRP instance number. Range is 1-255.

Role

Example admin switch (config interface vlan 10)# switch (config interface vlan 10 vrrp 10)#

Related Commands

Note Maximum of 10 VRRP instances are supported.

Rev 4.20

Mellanox Technologies Confidential 981

Rev 4.20

address

address <ip-address> [secondary] no address [<ip-address> [secondary]]

Syntax Description

Sets virtual router IP address (primary and secondary).

The no form of the command deletes the IP address from the VRRP interface.

ip-address secondary

The virtual IP address.

A secondary IP address for the virtual router.

Default N/A

Configuration Mode Config VRRP Interface

History

Role

Example

3.3.4500

admin switch (config vrrp 100)# address 10.10.10.10

switch (config vrrp 100)# address 10.10.10.11 secondary switch (config vrrp 100)# address 10.10.10.12 secondary

Related Commands

Note • This command is the enabler of the protocol. Therefore, set all the protocol parameters initially and only then set the ip-address.

• There are up to 10 IP addresses associated with the VRRP instance. One primary and up to

10 secondary ip-addresses.

• If the configured IP address is the same as the interface IP address, this switch automatically owns the IP address (priority 255).

Mellanox Technologies Confidential 982

shutdown

shutdown no shutdown

Syntax Description

Default

Disables the virtual router.

The no form of the command enables the virtual router (stops the VRRP state machine).

N/A

Enabled (no shutdown)

Configuration Mode Config VRRP Interface

History 3.3.4500

Role

Example

Related Commands

Note admin switch (config vrrp 100)# shutdown

Rev 4.20

Mellanox Technologies Confidential 983

priority

priority <level> no priority

Syntax Description

Default

Sets the priority of the virtual router.

The no form of the command resets the priority to its default.

level

100

Configuration Mode Config VRRP Interface

History 3.3.4500

The virtual router priority level. Range is 1-254.

Role

Example

Related Commands

Note admin switch (config vrrp 100)# priority 200

• The higher IP address will be selected as master, in case the priority of the routers in the

VR are the same.

• To influence the election of the master in the VR cluster make sure that the priority of the desired master is the higher.

Rev 4.20

Mellanox Technologies Confidential 984

preempt

preempt no preempt

Syntax Description

Default

Sets virtual router preemption mode.

The no form of the command disables the virtual router preemption.

N/A

Enabled (preempt)

Configuration Mode Config VRRP Interface

History 3.3.4500

Role

Example

Related Commands

Note admin switch (config vrrp 100)# preempt

To set this router as backup for the current virtual router master, preempt must be enabled.

Rev 4.20

Mellanox Technologies Confidential 985

authentication text

authentication text <password> no authentication text

Syntax Description

Sets virtual router authentication password and enables authentication.

The no form of the command disables the authentication mechanism.

password The virtual router authentication password. The password string must be up to 8 alphanumeric characters.

Default Disabled

Configuration Mode Config VRRP Interface

History

Role

3.3.4500

admin switch (config vrrp 100)# authentication text mypassword Example

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 986

advertisement-interval

advertisement-interval <seconds> no advertisement-interval

Syntax Description

Sets the virtual router advertisement-interval.

The no form of the command resets the parameter to its default.

seconds The virtual router advertisement-interval in seconds.

Range: 1-255.

Default 1

Configuration Mode Config VRRP Interface

History

Role

3.3.4500

admin switch (config vrrp 100)# advertisement-interval 10 Example

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 987

show vrrp

show vrrp [interface <type> <number>] [vr <id>]

Syntax Description

Displays VRRP brief configuration and status.

interface <type> <number> vr <id>

Filters the output to a specific interface type and number.

Filters the output to a specific virtual router.

Range: 1-10.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4500

admin switch(config)# show vrrp

Interface VR Pri Time Pre State VR IP addr

------------------------------------------------------

Eth1/5 1 200 2s Y Init 192.0.1.10

… switch(config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 988

show vrrp detail

show vrrp detail [interface <type> <number>] [vr <id>]

Syntax Description

Displays detailed VRRP configuration and status.

interface <type> <number> vr <id>

Filters the output to a specific interface type and number.

Filters the output to a specific virtual router.

Range: 1-255.

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4500

admin switch (config)# show vrrp detail

VRRP Admin State : Enabled

Vlan20 - Group 1 (IPV4)

Instance Admin State : Enabled

State : Backup

Virtual IP Address : 20.20.20.40

Priority : 200

Advertisement interval (sec) : 2

Preemption : Enabled

Virtual MAC address : AA:BB:CC:DD:EE:FF switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 989

show vrrp statistics

show vrrp statistics [interface <type <number>] [vr <id>]

Syntax Description

Displays VRRP counters.

interface <type> <number> vr <id>

Default N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4500

admin switch (config)# show vrrp statistics

Ethernet1/5 - Group 1 (IPV4)

Invalid packets: 0

Too short: 0

Transitions to Master 6

Total received: 155

Bad TTL: 0

Failed authentication: 0

Unknown authentication: 0

Conflicting authentication: 0

Conflicting Advertise time: 0

Conflicting Addresses: 0

Received with zero priority: 3

Sent with zero priority: 3 switch (config)#

Related Commands

Note

Filters the output to a specific interface type and number.

Filters the output to a specific virtual router.

Range: 1-255.

Rev 4.20

Mellanox Technologies Confidential 990

6.8

MAGP

Multi-active gateway protocol (MAGP) is aimed to solve the default gateway problem when a host is connected to a set of switch routers (SRs) via MLAG.

The network functionality in that case requires that each SR is an active default gateway router to the host, thus reducing hops between the SRs and directly forwarding IP traffic to the L3 cloud regardless which SR traffic comes through.

Designated traffic, such as ping to the MAGP interface is not supported. One of the two switches will be able to ping, so a ping from one switch can be done.

Rev 4.20

6.8.1

MAGP Configuration

Prerequisite steps:

Step 1.

Enable IP routing functionality. Run: switch (config)# ip routing

Step 2.

Enable the desired VLAN. Run: switch (config)# vlan 20 switch (config vlan 20)#

The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.

Step 3.

Step 4.

Step 5.

Add this VLAN to the desired interface. Run: switch (config)# interface ethernet 1/1 switch (config interface ethernet 1/1)# switchport access vlan 20

Create a VLAN interface. Run: switch (config)# interface vlan 20 switch (config interface vlan 20)#

Set an IP address to the VLAN interface. Run: switch (config interface vlan 20)# ip address 11.11.11.11 /8

Step 6.

Enable the interface. Run: switch (config interface vlan 20)# no shutdown

To configure MAGP:

Step 1.

Enable MAGP protocol globally. Run: switch (config)# protocol magp

Step 2.

Create a virtual router group for an IP interface. Run: switch (config interface vlan 20)# magp 100

Mellanox Technologies Confidential 991

Rev 4.20

Up to 255 MAGP IDs are supported.

Step 3.

Set a virtual router primary IP address. Run: switch (config interface vlan 20 magp 100)# ip virtual-router address 11.11.11.254

The IP address must be in the same subnet of the VLAN interface. This IP address is the default gateway for this MAGP instance. This should become the default gateway configured on the hosts connected to the relevant MLAG.

Step 4.

Set a virtual router primary MAC address. Run: switch (config interface vlan 20 magp 100)# ip virtual-router mac-address

AA:BB:CC:DD:EE:FF

To verify the MAGP configuration, run: switch (config)# show magp 1

MAGP 1

Interface vlan:1

MAGP state:Master

MAGP virtual IP: 11.11.11.254

MAGP virtual MAC: AA:BB:CC:DD:EE:FF switch (config)#

This output is to be expected in both MAGP switches.

Mellanox Technologies Confidential 992

6.8.2

Commands

protocol magp

protocol magp no protocol magp

Syntax Description

Default

Configuration Mode

History

Role

Example

Enables MAGP globally and unhides MAGP commands.

The no form of the command deletes all the MAGP configuration and hides MAGP commands.

N/A

Disabled

Config

3.3.4500

admin switch (config)# protocol magp switch (config)#

Related Commands

Note IP routing must be enabled to enable MAGP.

Rev 4.20

Mellanox Technologies Confidential 993

magp

magp <instance> no magp <instance>

Syntax Description

Default

Creates an MAGP instance on this interface and enters a new configuration mode.

The no form of the command deletes the MAGP instance.

instance

Disabled

Configuration Mode Config Interface VLAN

History 3.3.4500

MAGP instance number. Range: 1-255.

Role

Example admin switch (config interface vlan 10)# magp 1 switch (config interface vlan 10 magp 1)#

Related Commands

Note • Only one MAGP instance can be created on an interface

• Different interfaces cannot share an MAGP instance

• MAGP and VRRP are mutually exclusive

Rev 4.20

Mellanox Technologies Confidential 994

shutdown

shutdown no shutdown

Syntax Description

Default

Enables MAGP instance.

The no form of the command disables the MAGP instance.

N/A

Disabled

Configuration Mode Config Interface VLAN MAGP

History 3.3.4500

Role

Example admin switch (config interface vlan 10 magp 1)# protocol magp switch (config interface vlan 10 magp 1)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 995

ip virtual-router address

ip virtual-router address <ip-address> no ip virtual-router address

Syntax Description

Default

Sets MAGP virtual IP address.

The no form of the command resets this parameter to its default.

ip-address

N/A

The virtual router IP address.

Configuration Mode Config Interface VLAN MAGP

History 3.3.4500

Role

Example admin switch (config interface vlan 10 magp 1)# ip virtual-router address

10.10.10.10

switch (config interface vlan 10 magp 1)#

Related Commands

Note The MAGP virtual IP address must be different from the interface IP address

Rev 4.20

Mellanox Technologies Confidential 996

Rev 4.20

ip virtual-router mac-address

ip virtual-router mac-address <mac-address> no ip virtual-router mac-address

Syntax Description

Default

Sets MAGP virtual MAC address.

The no form of the command resets the MAC address to its default.

mac-address MAC address. Format: AA:BB:CC:DD:EE:FF.

00:00:5E:00:01-<magp instance>

Configuration Mode Config Interface VLAN MAGP

History 3.3.4500

Role

Example admin switch (config interface vlan 10 magp 1)# ip virtual-router mac-address

AA:BB:CC:DD:EE:FF switch (config interface vlan 10 magp 1)#

Related Commands

Note

Mellanox Technologies Confidential 997

show magp

show magp [<instance> | interface vlan <id>]

Syntax Description

Default

Displays the configuration of a specific MAGP instance.

instance

N/A

Configuration Mode Any Command Mode

MAGP instance number. Range: 1-255.

History

Role

Example

3.3.4500

admin switch (config)# show magp 3

Magp instance id: 3

Interface : vlan 10

Magp state: Active

Magp virtual ip :192.168.1.1

Magp virtual MAC : 00:11:22:22:44:55 switch (config)#

Related Commands

Note

Rev 4.20

Mellanox Technologies Confidential 998

6.9

DHCP Relay

DHCP Relay is not supported on SX10xx-xxxR and SX60xx-xxxR systems.

Since Dynamic Host Configuration Protocol must work correctly even before DHCP clients have been configured, the DHCP server and DHCP client need to be connected to the same network.

In larger networks, this is not always practical because each network link contains one or more

DHCP relay agents. These DHCP relay agents receive messages from DHCP clients and forward them to DHCP servers thus extending the reach of the DHCP beyond the local network.

Rev 4.20

Mellanox Technologies Confidential 999

Rev 4.20

6.9.1

Commands

ip dhcp relay address

ip dhcp relay address <ip-address> no ip dhcp relay address <ip-address>

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Configures IP address of the DHCP server to forward DHCP requests.

The no form of the command deletes the DHCP server IP address.

ip-address

N/A

Valid IP unicast address of DHCP server.

Config

3.3.4150

admin switch (config)# ip dhcp relay address 10.10.10.10

switch (config)#

N/A

• Up to 16 IP addresses may be configured

• To enable DHCP relay, at least one IP address should be configured, or always-on parameter should be turned on using the command “ip dhcp relay always-on”

Mellanox Technologies Confidential 1000

ip dhcp relay information option

ip dhcp relay information option no ip dhcp relay information option

Syntax Description

Default

Enables the DHCP relay agent to insert option 82 info on the packets.

The no form of the command removes option 82 from the packets.

N/A

Disabled

Configuration Mode Config

History 3.3.4150

Role

Example admin switch (config)# ip dhcp relay information option switch (config)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 1001

Rev 4.20

ip dhcp relay always-on

ip dhcp relay always-on no ip dhcp relay always-on

Syntax Description

Default

Broadcasts DHCP requests to all interfaces with the DHCP relay agent.

The no form of the command disables the “always-on” mode.

N/A

Disabled

Configuration Mode Config

History 3.3.4150

Role

Example admin switch (config)# ip dhcp relay always-on switch (config)#

Related Commands N/A

Note • In order to enable DHCP relay, at least one IP address should be configured, or always-on parameter should be turned on using the command “ip dhcp relay always-on”

• When DHCP servers are configured. requests are forwarded only to configured servers

Mellanox Technologies Confidential 1002

Rev 4.20

clear ip dhcp relay counters

clear ip dhcp relay counters

Syntax Description

Default

Clears all DHCP relay counters (all interfaces).

N/A

Disabled

Configuration Mode Config

History

Role

Example

3.3.4150

admin switch (config)# clear ip dhcp relay counters switch (config)#

Related Commands N/A

Note • In order to enable DHCP relay, at least one IP address should be configured, or always-on parameter should be turned on using the command “ip dhcp relay always-on”

• When DHCP servers are configured. requests are forwarded only to configured servers

Mellanox Technologies Confidential 1003

Rev 4.20

6.9.1.1 Interface

ip dhcp relay information option circuit-id

ip dhcp relay information option circuit-id <label> no ip dhcp relay information option circuit-id

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Specifies the content of tags that the switch attaches to DHCP requests before they are forwarded.

The no form of the command removes the label assigned.

label Specifies the label attached to packets. The string may be up to 15 characters.

The label is taken from the IP interface name (e.g. “vlan1”)

Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

3.3.4150

admin switch (config interface vlan 10)# ip dhcp relay information options circuit-id my-label switch (config interface vlan 10)#

N/A

Mellanox Technologies Confidential 1004

clear ip dhcp relay counters

ip dhcp relay counters no ip dhcp relay counters

Syntax Description

Default

Clears all DHCP relay counters on the interface.

N/A

N/A

Configuration Mode Config Interface VLAN

Config Interface Ethernet configured as a router port

Config Interface Port Channel configured as a router port

History

Role

Example

3.3.4150

admin switch (config interface vlan 10)# clear ip dhcp relay counters switch (config interface vlan 10)#

Related Commands N/A

Note

Rev 4.20

Mellanox Technologies Confidential 1005

6.9.1.2 Show

show ip dhcp relay

show ip dhcp relay

Syntax Description

Default

Configuration Mode

History

Role

Example

Related Commands

Note

Displays DHCP relay configuration and status.

N/A

N/A

Any Command Mode

3.3.4150

admin switch (config)# show ip dhcp relay

DHCP servers: 172.22.22.11, 172.33.33.33, … (or N/A)

DHCP clients requests are processed on all interfaces

DHCP server responses are processed on all interfaces

DHCP relay agent information option is {enabled, disabled}

DHCP relay agent always-on is {enabled, disabled}

Interface Label

--------- --------

Vlan10 my-label switch (config)#

N/A

Rev 4.20

Mellanox Technologies Confidential 1006

Rev 4.20

show ip dhcp relay counters

show ip dhcp relay counters

Syntax Description

Default

Displays the DHCP relay counters.

N/A

N/A

Configuration Mode Any Command Mode

History

Role

Example

3.3.4150

admin switch (config)#show ip dhcp relay counters

Interface Received Forwarded Dropped

--------- -------- --------- --------

All Req 376 376 0

All Resp 277 277 0

Interface Received Forwarded Dropped Last cleared

--------- -------- --------- ------- ------------vlan1000 1000 1000 0 <Date> vlan1020 2000 2000 0 <Date>

// <Date> == <DD-MM-YY, Hour-Minutes-Seconds> - something like: “20-07-13, 22:34:36” switch (config)#

Related Commands N/A

Note

Mellanox Technologies Confidential 1007

Appendix A: Enhancing System Security According to

NIST SP 800-131A

A.1

Overview

This appendix describes how to enhance the security of a system in order to comply with the

NIST SP 800-131A standard. This standard is a document which defines cryptographically

“acceptable” technologies. This document explains how to protect against possible cryptographic vulnerabilities in the system by using secure methods. Because of compatibility issues, this security state is not the default of the system and it should be manually set.

Rev 4.20

Some protocols, however, cannot be operated in a manner that complies with the NIST

SP 800-131A standard.

A.2

Web Certificate

Mellanox supports signature generation of sha256WithRSAEncryption,

 sha1WithRSAEncryption self-signed certificates, and importing certificates as text in PEM format.

To configure a default certificate:

Step 1.

Create a new sha256 certificate. Run: switch (config) # crypto certificate name <cert name> generate self-signed hash-algorithm sha256

For more details and parameters refer to the command crypto certificate name in the

MLNX-OS User Manual.

Step 2.

Step 2.

Show crypto certificate detail. Run: switch (config) # show crypto certificate detail

Step 3.

Search for “signature algorithm” in the output.

Set this certificate as the default certificate. Run: switch (config) # crypto certificate default-cert name <cert name>

To configure default parameters and create a new certificate:

Step 1.

Define the default hash algorithm. Run: switch (config) # crypto certificate generation default hash-algorithm sha256

Generate a new certificate with default values. Run: switch (config) # crypto certificate name <cert name> generate self-signed

Mellanox Technologies Confidential 1008

Rev 4.20

When no options are selected, the generated certificate uses the default values for each field.

To test strict mode connect to the WebUI using HTTPS and get the certificate. Search for

“signature algorithm”.

There are other ways to configure the certificate to sha256. For example, it is possible to use certificate generation default hash-algorithm and then regenerate the certificate using these default values. Please refer to the MLNX-OS User Manual for further details.

It is recommended to delete browsing data and previous certificates before retrying to connect to the WebUI.

Make sure not to confuse “signature algorithm” with “Thumbprint algorithm”.

A.3

SNMP

SNMPv3 supports configuring username, authentication keys and privacy keys. For authentication keys it is possible to use MD5 or SHA. For privacy keys AES or DES are to be used.

To configure strict mode, create a new user with HMAC-SHA1-96 and AES-128. Run: switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128 <password2>

To verify the user in the CLI, run: switch (config) # show snmp user

To test strict mode, configure users and check them using the CLI, then run an SNMP request with the new users.

For more information please refer to the MLNX-OS User Manual.

SNMPv1 and SNMPv2 are not considered to be secure. To run in strict mode, only use

SNMPv3.

A.4

SSH

The SSH server on the switch by default uses secure and unsecure ciphers, message authentication code (MAC), key exchange methods, and public key algorithm. When configuring SSH

Mellanox Technologies Confidential 1009

server to strict mode, the aforementioned security methods only use approved algorithms as detailed in the NIST 800-181A specification and the user can connect to the switch via SSH in strict mode only.

To enable strict security mode, run: switch (config) # ssh server security strict

The no form of the command disables strict security mode.

Make sure to configure the SSH server to work with minimum version 2 since 1 is vulnerable to security breaches.

To configure min-version to strict mode, run: switch (config) # ssh server min-version 2

Rev 4.20

Once this is done, the user cannot revert back to minimum version 1.

A.5

HTTPS

By default, Mellanox switch supports HTTPS encryption using TLS1.0 up to TLS1.2. To work in strict mode you must configure the system to use TLS1.2. Working in TLS1.2 mode also bans

MD5 ciphers which are not allowed per NIST 800-131a. In strict mode, the switch supports encryption with TLS1.2 only with the following supported ciphers:

• RSA_WITH_AES_128_CBC_SHA256

• RSA_WITH_AES_256_CBC_SHA256

• DHE_RSA_WITH_AES_128_CBC_SHA256

• DHE_RSA_WITH_AES_256_CBC_SHA256

• TLS_RSA_WITH_AES_128_GCM_SHA256

• TLS_RSA_WITH_AES_256_GCM_SHA384

• TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

To enable all encryption methods, run: switch (config) # web https ssl ciphers all

To enable only TLS ciphers (enabled by default), run: switch (config) # web https ssl ciphers TLS

To enable HTTPS strict mode, run: switch (config) # web https ssl ciphers TLS1.2

Mellanox Technologies Confidential 1010

To verify which encryption methods are used, run: switch (config)# show web

Web User Interface:

Web interface enabled: yes

HTTP enabled: yes

HTTP port: 80

HTTP redirect to HTTPS: no

HTTPS enabled: yes

HTTPS port: 443

HTTPS ssl-ciphers: TLS1.2

HTTPS certificate name: default-cert

Listen enabled: yes

No Listen Interfaces.

Inactivity timeout: disabled

Session timeout: 2 hr 30 min

Session renewal: 30 min

Web file transfer proxy:

Proxy enabled: no

Web file transfer certificate authority:

HTTPS server cert verify: yes

HTTPS supplemental CA list: default-ca-list switch (config)#

On top of enabling HTTPS, to prevent security breaches HTTP must be disabled.

To disable HTTP, run: switch (config)# no web http enable

A.6

LDAP

By default, Mellanox switch supports LDAP encryption SSL version 3 or TLS1.0 up to TLS1.2.

The only banned algorithm is MD5 which is not allowed per NIST 800-131a. In strict mode, the switch supports encryption with TLS1.2 only with the following supported ciphers:

• DHE-DSS-AES128-SHA256

• DHE-RSA-AES128-SHA256

• DHE-DSS-AES128-GCM-SHA256

• DHE-RSA-AES128-GCM-SHA256

• DHE-DSS-AES256-SHA256

• DHE-RSA-AES256-SHA256

• DHE-DSS-AES256-GCM-SHA384

• DHE-RSA-AES256-GCM-SHA384

• ECDH-ECDSA-AES128-SHA256

• ECDH-RSA-AES128-SHA256

• ECDH-ECDSA-AES128-GCM-SHA256

Rev 4.20

Mellanox Technologies Confidential 1011

• ECDH-RSA-AES128-GCM-SHA256

• ECDH-ECDSA-AES256-SHA384

• ECDH-RSA-AES256-SHA384

• ECDH-ECDSA-AES256-GCM-SHA384

• ECDH-RSA-AES256-GCM-SHA384

• ECDHE-ECDSA-AES128-SHA256

• ECDHE-RSA-AES128-SHA256

• ECDHE-ECDSA-AES128-GCM-SHA256

• ECDHE-RSA-AES128-GCM-SHA256

• ECDHE-ECDSA-AES256-SHA384

• ECDHE-RSA-AES256-SHA384

• ECDHE-ECDSA-AES256-GCM-SHA384

• ECDHE-RSA-AES256-GCM-SHA384

• AES128-SHA256

• AES128-GCM-SHA256

• AES256-SHA256

• AES256-GCM-SHA384

To enable LDAP strict mode, run: switch (config) # ldap ssl mode {start-tls | ssl}

Both modes operate using SSL. The different lies in the connection initialization and the port used.

To enable all encryption methods (enabled by default), run: switch (config) # ldap ssl ciphers TLS1.2

To verify which encryption methods are used, run: switch (config)# show ldap

User base DN : ou=People,dc=test,dc=com

User search scope : subtree

Login attribute : uid

Bind DN : cn=manager,dc=test,dc=com

Bind password : ********

Group base DN :

Group attribute : member

LDAP version : 3

Referrals : yes

Server port : 389 (not active)

Search Timeout : 5

Rev 4.20

Mellanox Technologies Confidential 1012

Bind Timeout : 5

SSL mode : ssl

Server SSL port : 636

SSL ciphers : TLS1.2

SSL cert verify : yes

SSL ca-list : default-ca-list

LDAP servers:

1: 10.134.47.5

switch (config)#

Please make sure that “(not active)” does not appear adjacent to the line “SSL ciphers”.

A.7

Password Hashing

To compile with NIST 800-131a, Mellanox switches support password encryption with SHA512 algorithm.

To see the password encryption used, run: switch (config)# show usernames

USERNAME FULL NAME CAPABILITY ACCOUNT STATUS admin System Administrator admin No password required for login monitor System Monitor monitor Password set (SHA512) xmladmin XML Admin User admin No password required for login xmluser XML Monitor User monitor No password required for login

Using default usernames and passwords or using usernames without passwords is highly not recommended.

When moving to strict mode, the password of each user must be reconfigured to a non-default value using the CLI command username.

For example, if you have a user ID “myuser” whose password is hashed with MD5, this user must be recreated manually using the command “username myuser password mypassword”. The password then is automatically hashed using SHA512.

The following output demonstrates the example above: switch (config)# show usernames

USERNAME FULL NAME CAPABILITY ACCOUNT STATUS admin System Administrator admin No password required for login myuser System Monitor monitor Password set (MD5) switch (config)# username myuser password mypassword switch (config)# show usernames

USERNAME FULL NAME CAPABILITY ACCOUNT STATUS admin System Administrator admin No password required for login myuser System Monitor monitor Password set (SHA512)

Rev 4.20

Mellanox Technologies Confidential 1013

Rev 4.20

Appendix B: Security Vulnerabilities and Exposures

Table 49 presents the status of common vulnerabilities and security exposures that may affect

MLNX-OS.

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-1999-0517 Not vulnerable: Requires strict mode

An SNMP community name is the default (e.g. public), null, or missing.

CVE-2006-0175 Not vulnerable Directory traversal vulnerability in scp for OpenSSH before

3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-

0992.

CVE-2006-1653 N/A The default configuration for OpenSSH enables AllowTcp-

Forwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.

CVE-2006-2760 N/A sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.

CVE-2005-2797 N/A

CVE-2005-2798 Not vulnerable sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

CVE-2006-0225 N/A

OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

CVE-2006-4924 Not vulnerable sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

3.4.0000

3.3.3500

N/A

N/A

N/A

3.3.3500

N/A

3.4.0000

Mellanox Technologies Confidential 1014

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2006-4925

CVE-2006-5051

CVE-2006-5052

CVE-2006-5229

N/A

N/A

N/A

N/A packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before

NEWKEYS, which causes newkeys[mode] to be NULL.

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.

Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.

CVE-2006-5794 Not vulnerable Unspecified vulnerability in the sshd Privilege Separation

Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.

CVE-2007-0726 N/A The SSH key generation process in OpenSSH in Apple Mac

OS X 10.3.9 and 10.4 through 10.4.8 allows remote attackers to cause a denial of service by connecting to the server before SSH has finished creating keys, which causes the keys to be regenerated and can break trust relationships that were based on the original keys.

CVE-2007-2243 N/A OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-

1483.

N/A

N/A

N/A

N/A

3.4.0000

N/A

N/A

Mellanox Technologies Confidential 1015

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2007-2768

CVE-2007-3102

N/A

N/A

OpenSSH, when using OPIE (One-Time Passwords in

Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-

2007-2243.

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username.

NOTE: some of these details are obtained from third party information.

CVE-2007-4654 N/A Unspecified vulnerability in SSHield 1.6.1 with OpenSSH

3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via a series of large packets designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144), possibly a related issue to CVE-

2002-1024.

CVE-2007-4752 Not vulnerable ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted

X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.

CVE-2007-5715 N/A DenyHosts 2.6 processes OpenSSH sshd "not listed in

AllowUsers" log messages with an incorrect regular expression that does not match an IP address, which might allow remote attackers to avoid detection and blocking when making invalid login attempts with a username not present in AllowUsers, as demonstrated by the root username, a different vulnerability than CVE-2007-4323.

CVE-2007-6415 N/A

CVE-2008-1483 Not vulnerable OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.

CVE-2008-1657 N/A scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and

-o options.

OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.

N/A

N/A

N/A

3.4.0000

N/A

N/A

3.4.0000

N/A

Mellanox Technologies Confidential 1016

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2008-3234 Only affects

CVE-2008-3259

OpenSSH version 4.x.

MLNX-OS uses 3.8.1p1.

N/A sshd in OpenSSH 4 on Debian GNU/Linux, and the

20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

CVE-2008-3844 N/A Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red

Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.

CVE-2008-4109 Not vulnerable A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not asyncsignal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-

5051.

CVE-2008-5161 Not vulnerable Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through

5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in

Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

N/A

N/A

N/A

3.4.0000

3.4.0000

Mellanox Technologies Confidential 1017

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2009-2904

CVE-2010-4478

N/A

N/A

A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in

Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

CVE-2010-4755 N/A

CVE-2010-5298 Not vulnerable Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RE-

LEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (useafter-free and parsing error) via an SSL connection in a multithreaded environment.

CVE-2011-0539 N/A

The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FX-

P_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.

The key_certify function in usr.bin/ssh/key.c in OpenSSH

5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.

CVE-2011-3389 Not vulnerable The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla

Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosenboundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 Web-

Socket API, (2) the Java URLConnection API, or (3) the

Silverlight WebClient API, aka a "BEAST" attack.

N/A

N/A

N/A

3.4.0008

N/A

3.3.3500

Mellanox Technologies Confidential 1018

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2011-3607 Not vulnerable Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted

HTTP request header, leading to a heap-based buffer overflow.

CVE-2011-4317 Not vulnerable The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through

2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2)

ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

CVE-2011-4327 N/A ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.

CVE-2011-5000 N/A The ssh_gssapi_parse_ename function in gss-serv.c in

OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.

CVE-2012-0031 Not vulnerable scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.

CVE-2012-0053 Not vulnerable protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.

3.3.3500

3.3.3500

N/A

N/A

3.3.3500

3.3.3500

Mellanox Technologies Confidential 1019

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2012-0814 Not vulnerable The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.

CVE-2012-2687 N/A Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.

CVE-2012-4929 Not vulnerable The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a “CRIME” attack.

CVE-2012-4930 Not vulnerable The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows manin-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVE-2013-7423 Not vulnerable The send_dg function in resolv/res_send.c in GNU C

Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send

DNS queries to unintended locations via a large number of request that trigger a call to the getaddrinfo function.

CVE-2014-0195 Not vulnerable The dtls1_reassemble_fragment function in d1_both.c in

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in

DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service

(buffer overflow and application crash) via a long non-initial fragment.

3.3.3500

N/A

3.3.3500

3.3.3500

3.4.3000

3.4.0008

Mellanox Technologies Confidential 1020

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2014-0198 Not vulnerable The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

CVE-2014-0221 Not vulnerable The dtls1_get_message_fragment function in d1_both.c in

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.

CVE-2014-0224 Not vulnerable OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of

ChangeCipherSpec messages, which allows man-in-themiddle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVE-2014-0475 Not vulnerable Multiple directory traversal vulnerabilities in GNU C

Library (aka glibc or libc6) before 2.20 allow contextdependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-1692 N/A The hash_buffer function in schnorr.c in OpenSSH through

6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service

(memory corruption) or have unspecified other impact via vectors that trigger an error condition.

CVE-2014-2532 N/A sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.

CVE-2014-3470 Not vulnerable The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service

(NULL pointer dereference and client crash) by triggering a

NULL certificate value.

3.4.0008

3.4.0008

3.4.1000

3.4.3000

N/A

N/A

3.4.0008

Mellanox Technologies Confidential 1021

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2014-3505 Not vulnerable Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before

1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted

DTLS packets that trigger an error condition.

CVE-2014-3506 Not vulnerable d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.

CVE-2014-3507 Not vulnerable Memory leak in d1_both.c in the DTLS implementation in

OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and

1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.

CVE-2014-3508 Not vulnerable The OBJ_obj2txt function in crypto/objects/obj_dat.c in

OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and

1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows contextdependent attackers to obtain sensitive information from process stack memory by reading output from

X509_name_oneline, X509_name_print_ex, and unspecified other functions.

CVE-2014-3509 Not vulnerable Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before

1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service

(memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve

(EC) Supported Point Formats Extension data.

CVE-2014-3510 Not vulnerable The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and

1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous

ECDH ciphersuite.

CVE-2014-3511 Not vulnerable The ssl23_get_client_hello function in s23_srvr.c in

OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

3.4.1000

3.4.1000

3.4.1000

3.4.1000

3.4.1000

3.4.1000

3.4.1000

Mellanox Technologies Confidential 1022

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2014-3513 Not vulnerable Memory leak in d1_srtp.c in the DTLS SRTP extension in

OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.

CVE-2014-3566 Not vulnerable The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the

"POODLE" issue.

CVE-2014-3567 Not vulnerable Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.

CVE-2014-3569 N/A The ssl23_get_client_hello function in s23_srvr.c in

OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.

CVE-2014-3570 Not vulnerable The BN_sqr implementation in OpenSSL before 0.9.8zd,

1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.

CVE-2014-3571 Not vulnerable OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.

CVE-2014-3572 Not vulnerable The ssl3_get_key_exchange function in s3_clnt.c in

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct

ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.

3.4.1000

3.4.1000

3.4.1000

N/A

3.4.3000

3.4.3000

3.4.3000

Mellanox Technologies Confidential 1023

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2014-6040 Not vulnerable GNU C Library (aka glibc) before 2.20 allows contextdependent attackers to cause a denial of service (out-ofbounds read and crash) via a multibyte character value of

"0xffff" to the iconv function when converting (1) IBM933,

(2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.

CVE-2014-6271 Not vulnerable GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP

Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka

"ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVE-2014-7817 Not vulnerable The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

CVE-2014-8176 Not vulnerable The dtls1_clear_queues function in ssl/d1_lib.c in

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote

DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.

CVE-2014-8275 Not vulnerable OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/ dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/ x_all.c.

CVE-2014-9293 Not vulnerable The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

3.4.2300

3.4.0008

3.4.3000

3.4.3000

3.4.3000

3.4.1000

Mellanox Technologies Confidential 1024

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2014-9294 Not vulnerable util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

CVE-2014-9295 Not vulnerable Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used,

(2) the ctl_putdata function, and (3) the configure function.

CVE-2014-9296 Not vulnerable The receive function in ntp_proto.c in ntpd in NTP before

4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

CVE-2014-9297 N/A This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided

CVE-2015-0204 Not vulnerable The ssl3_get_key_exchange function in s3_clnt.c in

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSAto-EXPORT_RSA downgrade attacks and facilitate bruteforce decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on

OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

CVE-2015-0205 Not vulnerable The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL

1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.

CVE-2015-0206 Not vulnerable Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before

1.0.1k allows remote attackers to cause a denial of service

(memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.

3.4.1000

3.4.1000

3.4.1000

3.4.3000

3.4.3000

3.4.3000

3.4.3000

Mellanox Technologies Confidential 1025

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2015-0207 Not vulnerable The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted

DTLS traffic, as demonstrated by DTLS 1.0 traffic to a

DTLS 1.2 server.

CVE-2015-0208 Not vulnerable The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in

OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.

CVE-2015-0209 N/A Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf,

1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before

1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic

Curve (EC) private-key file that is improperly handled during import.

CVE-2015-0235 Not vulnerable Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before

2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or

(2) gethostbyname2 function, aka "GHOST."

CVE-2015-0285 N/A The ssl3_client_hello function in s3_clnt.c in OpenSSL

1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.

CVE-2015-0286 Not vulnerable The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in

OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before

1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.

CVE-2015-0287 Not vulnerable The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before

1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize

CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.

3.4.2008

3.4.2008

3.4.3000

3.4.2002

3.4.3000

3.4.3000

3.4.3000

Mellanox Technologies Confidential 1026

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2015-0288 Not vulnerable The X509_to_X509_REQ function in crypto/x509/ x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r,

1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.

CVE-2015-0289 Not vulnerable The PKCS#7 implementation in OpenSSL before 0.9.8zf,

1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before

1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.

CVE-2015-0290 Not vulnerable The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.

CVE-2015-0291 Not vulnerable The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.

CVE-2015-0292 Not vulnerable Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and

1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.

CVE-2015-0293 Not vulnerable The SSLv2 implementation in OpenSSL before 0.9.8zf,

1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before

1.0.2a allows remote attackers to cause a denial of service

(s2_lib.c assertion failure and daemon exit) via a crafted

CLIENT-MASTER-KEY message.

CVE-2015-1787 Not vulnerable The ssl3_get_client_key_exchange function in s3_srvr.c in

OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.

3.4.3000

3.4.3000

3.4.2008

3.4.2008

3.4.3000

3.4.3000

3.4.2008

Mellanox Technologies Confidential 1027

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2015-1789 Not vulnerable The X509_cmp_time function in crypto/x509/x509_vfy.c in

OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before

1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.

CVE-2015-1790 Not vulnerable The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.

CVE-2015-1791 Not vulnerable Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before

1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a

NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.

CVE-2015-1792 Not vulnerable The do_free_upto function in crypto/cms/cms_smime.c in

OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before

1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.

CVE-2015-1798 N/A The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.

CVE-2015-1799 N/A The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.

3.4.3000

3.4.3000

3.4.3000

3.4.3000

3.4.3000

3.4.3000

Mellanox Technologies Confidential 1028

Rev 4.20

Table 49 - Common Vulnerabilities and Exposures

CVE Vulnerability

1 Description

Fixed in

Version

CVE-2015-2808 Not vulnerable: Requires strict mode

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVE-2015-3456 Not vulnerable The Floppy Disk Controller (FDC) in QEMU, as used in

Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_C-

MD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICA-

TION_COMMAND, or other unspecified commands, aka

VENOM. Though the VENOM vulnerability is also agnostic of the guest operating system, an attacker (or an attacker’s malware) would need to have administrative or root privileges in the guest operating system in order to exploit VENOM.

CVE-2015-4000 Not vulnerable The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by

DHE_EXPORT and then rewriting a ServerHello with

DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

CVE-2015-5119 Not vulnerable This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

1. Vulnerability may take the following three values:

N/A – not relevant to MLNX-OS

Not vulnerable – Mellanox products are protected against this vulnerability

Not vulnerable: Requires strict mode – working in strict mode protects against this vulnerability

3.4.1120

3.4.3000

3.4.3000

3.4.3000

Mellanox Technologies Confidential 1029

Rev 4.20

Appendix C: UI Changes in Version 3.4.2008

Relevant changes in the CLI in this section are marked in boldface.

In order to improve user interface and unify look and feel across all Mellanox switch platforms,

MLNX-OS® versions 3.4.2008 and above introduce some changes in user interface.

C.1

Interface Addressing Change

Interface addressing in interface specific commands has changed in order to align the InfiniBand interface schema with that of Ethernet’s, and to support the EDR director switch system which has 2 ASICs per leaf.

C.1.1

CLI Change

Interface referencing for director switches has become <slot/module/port> and their show command output text displays IB<slot/module/port>.

Before: After: switch (config) # show interfaces ib L01/1

Slot L01 port 1 state

Logical port state : Initialize

Physical port state : LinkUp switch (config) # show interfaces ib 1/1/1

IB1/1/1 state:

Logical port state : Initialize

Physical port state : LinkUp

Current line rate : 40.0 Gbps

10.0(FDR10) or 14.0 Gbos rate

...

Current line rate : 40.0 Gbps

Supported speeds : 2.5, 5.0, 10.0(QDR), Supported speeds : sdr, ddr, qdr, fdr10

...

Internal interface referencing for director switch systems has become as follows:

Before: switch (config) # show interfaces ib internal S01/1

Slot S01 port 1 state

Connected to slot/chip : 1/1

Connected to port : 19

Connected device active: -

Error state : 0

Logical port state : Initialize

Physical port state : LinkUp

Current line rate : 40.0 Gbps

Supported speeds : .5, 5.0, 10.0(QDR),

10.0(FDR10) or 14.0 Gbos rate

...

After: switch (config) # show interfaces ib internal spine 1/

1/1

IB1/1/1 state:

Connected to slot/chip : 1/1

Connected to port : 19

Connected device active: -

Error state : 0

Logical port state : Initialize

Physical port state : LinkUp

Current line rate : 40.0 Gbps

Supported speeds : sdr, ddr, qdr, fdr10

...

Mellanox Technologies Confidential 1030

Rev 4.20

Interface show command output text on 1U switches has become IB<slot/port>.

Before: After: switch (config) # show interfaces ib 1/1

Slot 1 port 1 state

Logical port state : Down

Physical port state : Polling switch (config) # show interfaces ib 1/1

IB1/1 state:

Logical port state : Down

Physical port state : Polling

Current line rate : Current line rate : -

Supported speeds : 2.5, 5.0, 10.0(QDR), Supported speeds : sdr, ddr, qdr, fdr10,

10.0(FDR10) or 14.0 Gbos rate

...

fdr

...

C.1.2

MIB ifTable Change

The ifDescr column now displays interfaces in the syntax IB<slot/port>.

Figure 33: 1U MIB ifTable Before Screenshot

Figure 34: 1U MIB ifTable After Screenshot

For director switches the ifDescr column displays interfaces in the syntax IB<slot/module/port>.

Mellanox Technologies Confidential 1031

Figure 35: Director Switch MIB ifTable Before Screenshot

Rev 4.20

Figure 36: Director Switch MIB ifTable After Screenshot

C.1.3

WebUI Ports Page Change

In the “Ports” page of the MLNX-OS® WebUI, the “Port number” field has been modified to reflect the change in the CLI. “Port number” now displays interfaces in the following syntax for director switches: <slot>/<module>/<port>.

C.2

Interface Speed Configuration Change

Interface speed configuration has changed in order to improve user experience when configuring

InfiniBand speeds and to support additional permutations for setting allowed speeds.

C.2.1

CLI Change

Interface speed configuration commands accept any of the following speed name combinations:

SDR; DDR; QDR; FDR10; FDR; EDR.

Commands with the old syntax, however, are still supported.

Mellanox Technologies Confidential 1032

Rev 4.20

Before: After: switch (config interface ib 1/1) # speed ?

1 2.5 Gbps

3 2.5 or 5.0 Gbps

5 2.5 or 10.0(QDR) Gbps

7 2.5, 5.0 or 10.0(QDR) Gbps

8 10.0(FDR10) Gbps

13 2.5, 10.0(QDR) or 10(FDR10) Gbps

15 2.5, 5.0, 10.0(QDR) or 10.0(FDR10) Gbps switch (config interface ib 1/1) # speed ?

sdr 10.0 Gbps rate on 4 lane width ddr 20.0 Gbps rate on 4 lane width qdr 40.0 Gbps rate on 4 lane width fdr10 40.0 Gbps rate on 4 lane width fdr 56.0 Gbps rate on 4 lane width force Force a speed vector without the sdr bit

Before: switch (config interface ib 1/1) # speed ?

10 10.0 Gbps rate on 4 lane width

100 20.0 Gbps rate on 4 lane width

1000 40.0 Gbps rate on 4 lane width

10000 40.0 Gbps rate on 4 lane width auto 56.0 Gbps rate on 4 lane width

After: switch (config interface ib 1/1) # speed ?

sdr 10.0 Gbps rate on 4 lane width ddr 20.0 Gbps rate on 4 lane width qdr 40.0 Gbps rate on 4 lane width fdr10 40.0 Gbps rate on 4 lane width fdr 56.0 Gbps rate on 4 lane width force Force a speed vector without the sdr bit switch (config interface ib 1/1) # speed ddr fdr fdr10 force qdr sdr switch (config interface ib 1/1) # speed sdr fdr qdr switch (config interface ib 1/1) #

Show interface commands display speed names instead of the speed figures.

Before: After: switch (config) # show interfaces ib L01/1

Slot L01 port 1 state:

Logical port state : Down

Physical port state : Polling switch (config) # show interfaces ib 1/1

IB1/1 state:

Logical port state : Down

Physical port state : Polling

Current line rate : Current line rate : -

Supported speeds : 2.5, 5.0, 10.0(QDR), Supported speeds : sdr, ddr, qdr, fdr10,

10.0(FDR10) or 14.0 Gbps

...

fdr

...

C.2.2

WebUI Change

In the Ports page of the MLNX-OS WebUI, the “Supported speeds” and “Speed” fields have been modified to reflect the change in the CLI. “Supported speeds” and “Speed” now display speed names instead of the speed figures.

Mellanox Technologies Confidential 1033

Figure 37: Ports WebUI Page

Rev 4.20

C.3

IB SM Link Speed Change

IB SM link speed has changed to improve user experience when configuring InfiniBand interface speeds, to support additional permutations for setting allowed speeds, and to display clear default values and negotiation outputs.

IB SM link speed commands accept any of the following speed name combinations: SDR; DDR;

QDR; FDR10; FDR; EDR.

Commands with the old syntax, however, are still supported.

Before: After: switch (config) # ib sm force-link-speed ?

0 Do not modify switch assigned default value

1 Negotiate only 2.5 Gbps rate

3 Negotiate 2.5 or 5.0 Gbps rate

5 Negotiate 2.5 or 10.0 Gbps rate

7 Negotiate 2.5, 5.0, or 10.0 Gbps rate

13 Negotiate 2.5, 10.0(QDR) or 10.0(FDR19) Gbps

15 Negotiate 2.5, 5.0, 10.0(QDR) or 10.0(FDR10) Gbps

21 Negotiate 2.5, 10.0(QDR) or 14.0 Gbps

23 Negotiate 2.5, 5.0, 10.0(QDR) or 14.0 Gbps

29 Negotiate 2.5, 10.0(QDR), 10.0(FDR10) or 14.0 Gbps

31 Negotiate 2.5, 5.0, 10.0(QDR), 10.0(FDR10) or 14.0

Gbps switch (config) # ib sm force-link-speed ?

sdr 10.0 Gbps rate on 4 lane width ddr 20.0 Gbps rate on 4 lane width qdr 40.0 Gbps rate on 4 lane width fdr10 40.0 Gbps rate on 4 lane width fdr 56.0 Gbps rate on 4 lane width edr 100.0 Gbps rate on 4 lane width

Mellanox Technologies Confidential 1034

Rev 4.20

The command “no ib sm force-link-speed” configures default speed.

Before: After: switch (config) # no ib sm force-link-speed switch (config) # show ib sm force-link-speed switch (config) # no ib sm force-link-speed switch (config) # show ib sm force-link-speed

15 (Negotiate 2.5, 5.0, 10.0(QDR) or 10.0(FDR10) Gbps) Default: set to PortInfo:LinkSpeedSupported

Show IB SM speed command displays negotiation as well as speed names.

Before: switch (config) # show ib sm force-link-speed

5 (Negotiate 2.5 or 10.0 Gbps rate)

After: switch (config) # show ib sm force-link-speed

Negotiate: sdr, qdr

The output of the command “show ib sm force-link-speed-ext”:

Before: switch (config) # show ib sm force-link-speed-ext

1 (Allow extended negotiation speeds with 14.0 Gbps rate)

After: switch (config) # show ib sm force-link-speed-ext

Negotiate: fdr

C.4

Multi-ASIC Support

Multi-ASIC support has been added to MLNX-OS in order to support the new EDR director switch systems whose leafs feature two ASICs per leaf, to improve MIB module indexing and better represent module hierarchy, to add an additional hierarchy level with an ASIC device to support more than one ASIC per module, and to add support to all sensors.

C.4.1

CLI Change

Added a new “Device” column to the output of the command “show guids”.

Before: switch (config) # show guids

==============================================

SX module GUID

==============================================

SYSTEM 00:05:C9:03:00:42:D8:00

S01 00:02:C9:03:00:84:3B:60

L17 00:02:C9:03:00:84:3B:40

L18 00:02:C9:03:00:84:3A:F0

S05 00:02:C9:03:00:84:3B:70

L01 00:02:C9:03:00:84:3B:80

L03 00:02:C9:03:00:84:3B:90

L04 00:02:C9:03:00:61:ED:00

L06 00:02:C9:03:00:84:3B:A0

L09 00:02:C9:03:00:84:3B:50

L11 00:02:C9:03:00:84:3B:10

L13 00:02:C9:03:00:61:EC:B0

L15 00:02:C9:03:00:66:C9:B0

L16 00:02:C9:03:00:66:C9:60

...

After: switch (config) # show guids

==============================================

Module Device GUID

==============================================

SYSTEM - 00:05:C9:03:00:42:D8:00

S01 SX 00:02:C9:03:00:84:3B:60

S02 SX 00:02:C9:03:00:84:3B:40

S03 SX 00:02:C9:03:00:84:3A:F0

S04 SX 00:02:C9:03:00:84:3B:70

S05 SX 00:02:C9:03:00:84:3B:80

S06 SX 00:02:C9:03:00:84:3B:90

S07 SX 00:02:C9:03:00:61:ED:00

S08 SX 00:02:C9:03:00:84:3B:A0

S09 SX 00:02:C9:03:00:84:3B:50

S10 SX 00:02:C9:03:00:84:3B:10

S11 SX 00:02:C9:03:00:61:EC:B0

S12 SX 00:02:C9:03:00:66:C9:B0

S13 SX 00:02:C9:03:00:66:C9:60

...

Mellanox Technologies Confidential 1035

Rev 4.20

The output of the command “show guid” on EDR director switch: switch (config) # show guids

==============================================

Module Device GUID

==============================================

SYSTEM - 00:05:C9:03:00:42:D8:00

S01 SIB 00:02:C9:03:00:84:3B:60

S02 SIB 00:02:C9:03:00:84:3B:40

S03 SIB 00:02:C9:03:00:84:3A:F0

S04 SIB 00:02:C9:03:00:84:3B:70

S05 SIB 00:02:C9:03:00:84:3B:80

S06 SIB 00:02:C9:03:00:84:3B:90

S07 SIB 00:02:C9:03:00:61:ED:00

S08 SIB 00:02:C9:03:00:84:3B:A0

S09 SIB 00:02:C9:03:00:84:3B:50

S10 SIB 00:02:C9:03:00:84:3B:10

S11 SIB 00:02:C9:03:00:61:EC:B0

S12 SIB 00:02:C9:03:00:66:C9:B0

S13 SIB 00:02:C9:03:00:66:C9:60

S14 SIB 00:02:C9:03:00:66:C9:50

S15 SIB 00:02:C9:03:00:66:C9:50

S16 SIB 00:02:C9:03:00:66:C9:50 l01 SIB1 00:02:C9:03:00:31:81:80 l01 SIB2 00:02:C9:03:00:31:81:81

...

On 1U switches, the command “show guids” displays “MGMT” under the “Module” column instead of “1”.

Before: switch (config) # show guids

============================================

SX module GUID

============================================

SYSTEM 00:02:C9:03:00:A8:EA:10

1 00:02:C9:03:00:A8:EA:12

After: switch (config) # show guids

=============================================

Module Device GUID

=============================================

SYSTEM - F4:52:14:03:00:11:E4:F0

MGMT SX F4:52:14:03:00:11:E4:F2

Added a “Device” column to the command “show asic-version”.

Before: switch (config) # show asic-version

==============================

Module Version

==============================

MGMT 9.3.3150

After: switch (config) # show asic-version

================================================

Module Device Version

================================================

MGMT SX 9.3.3150

Mellanox Technologies Confidential 1036

The output of the command “show asic-version” on an EDR director switch system: switch (config) # show guids

================================================

Module Device Version

================================================ l01 SIB1 11.0.1296

l01 SIB2 11.0.1296

l02 SIB1 11.0.1296

l02 SIB2 11.0.1296

l03 SIB1 11.0.1296

l03 SIB2 11.0.1296

l04 SIB1 11.0.1296

l04 SIB2 11.0.1296

l05 SIB1 11.0.1296

l05 SIB2 11.0.1296

l06 SIB1 11.0.1296

l06 SIB2 11.0.1296

...

C.4.2

MIB entPhysicalTable Change

The entPhysicalIndex and entPhysicalDescr columns now display and convey module hierarchy.

• entPhysicalDescr in entPhysicalTable revamped now represents ASIC module hierarchy

• entPhysicalIndex in entPhysicalTable now represents a legend and not just a running number. For example (line 9 in

Figure 39

), “S01/BOARD_MONITOR/T1” has the index 301030011 which indicates the following: 3=Spine, 1=index, 3=BOARD_MON-

ITOR, 1=T, 1=T1.

Figure 38: MIB entPhysicalTable Before Screenshot

Rev 4.20

Mellanox Technologies Confidential 1037

Figure 39: MIB entPhysicalTable After Screenshot

Rev 4.20

C.5

MGMT Module Display Change

The MGMT module display is improved to better represent the actual structure of modules within the system. The commands “show power consumers” and “show temperature” now display information from the MGMT module.

The output of the command “show power consumers” on a 1U PPC switch system:

Before: After: switch (config) # show power consumers

==================================================================

Module Device Power Voltage Current Status

(Watts) (Amp)

==================================================================

CURR_MONITOR MONITOR 33.31 11.72 2.84 OK switch (config) # show power consumers

==================================================================

Module Device Power Voltage Current Status

(Watts) (Amp)

==================================================================

MGMT CURR 33.31 11.72 2.84 OK

Total power used : 33.31 W

Max power : 235.00 W

Total power used : 33.31 W

Max power : 235.00 W

The output of the command “show temperature” on a 1U PPC switch system:

Before: switch (config) # show temperature

========================================================

Module Component Reg CurTemp Status

(Celsius)

========================================================

MGMT BOARD_MONITOR T1 26.50 OK

MGMT CPU_MEZZ_TEMP T1 27.00 OK

CPU_X86 CPU Core Sensor T1 28.00 OK

CPU_X86 CPU Core Sensor T2 30.00 OK

CPU_X86 CPU Core Sensor T3 56.00 OK

CPU_X86 CPU Core Sensor T4 26.00 OK

CPU_X86 CPU package Sensor T4 38.00 OK

MGMT QSFP_TEMP1 T1 27.00 OK

...

After: switch (config) # show temperature

========================================================

Module Component Reg CurTemp Status

(Celsius)

========================================================

MGMT CPU Core Sensor T1 28.00 OK

MGMT CPU Core Sensor T2 30.00 OK

MGMT CPU Core Sensor T3 56.00 OK

MGMT CPU Core Sensor T4 26.00 OK

MGMT CPU package Sensor T4 40.00 OK

MGMT BOARD_MONITOR T1 26.50 OK

MGMT CPU_MEZZ_TEMP T1 27.00 OK

MGMT QSFP_TEMP1 T1 27.00 OK

...

Mellanox Technologies Confidential 1038

Rev 4.20

C.6

MLNX-OS Image Name Change

The “SX_” prefix has been removed from the name of the MLNX-OS image.

C.6.1

CLI Change

The output of the command “show version”:

Before: switch (config) # show version

Product name: SX_X86_64

Product release: SX_3.4.0008

Build ID: #1-dev

Build date: 2014-11-10 20:07:51

Target arch: x86_64

Target hw: x86_64

Built by: jenkins@fit74

Version summary: SX_X86_64 SX_3.4.0008 2014-11-10 20:07:51

X86_64

...

The output of the command “show version”: switch (config) # show images

Installed images:

After: switch (config) # show version

Product name: MLNX-OS

Product release: 3.4.2000

Build ID: #1-dev

Build date: 2015-05-06 02:16:39

Target arch: x86_64

Target hw: m460ex

Built by: jenkins@fit74

Version summary: X86_64 3.4.2000 2015-04-12 20:06:05 X86_64

...

Partition 1:

PPC_M460EX 3.4.2000 2015-05-06 02:16:39 ppc

Partition 2:

SX_PPC_M460EX SX_3.4.0000 2014-10-14 20:26:41 ppc //older version with “SX_” suffix

Last boot partition: 1

Next boot partition: 1

...

C.6.2

WebUI Status Page Change

In the “Status” page of the MLNX-OS WebUI, the “Software Version” field has been modified to reflect the change in the image file name so now it appears without the prefix “SX_” (

Figure 40

).

Mellanox Technologies Confidential 1039

Figure 40: Status WebUI Page

Rev 4.20

C.7

CPU Module Display Change

The CPU module has been removed from the outputs of the CLI commands “show inventory” and “show modules”.

C.7.1

CLI Change

The command “show inventory” does not list CPU under the “Module” column.

Before switch (config) # show inventory

=================================================================================================

Module Type Part number Serial Number Asic revision HW Revision

=================================================================================================

CHASSIS SX6036 MSX6036F-1SFS MT1343X02004 N/A A3

MGMT SX6036 MSX6036F-1SFS MT1343X02004 2 A3

FAN SXX0XX_FAN MSX60-FF MT1342X03954 N/A A1

PS1 SXX0XX_PS MSX60-PF MT1342X03824 N/A A1

CPU CPU SA000203-B MT1140X00201 N/A A1

After switch (config) # show inventory

=================================================================================================

Module Type Part number Serial Number Asic revision HW Revision

=================================================================================================

CHASSIS SX6036 MSX6036F-1SFS MT1343X02004 N/A A3

MGMT SX6036 MSX6036F-1SFS MT1343X02004 2 A3

FAN SXX0XX_FAN MSX60-FF MT1342X03954 N/A A1

PS1 SXX0XX_PS MSX60-PF MT1342X03824 N/A A1

Mellanox Technologies Confidential 1040

Rev 4.20

The command “show module” does not list CPU under the “Module” column.

Before: switch (config) # show module

====================================================

Module Type Present Power Is Fatal

====================================================

MGMT SX6036 1 1 Not Fatal

FAN SXX0XX_FAN 1 1 Not Fatal

PS1 SXX0XX_PS 1 1 Not Fatal

PS2 SXX0XX_PS 0 0 Not Fatal

CPU CPU 1 1 Not Fatal

After: switch (config) # show module

====================================================

Module Type Present Power Is Fatal

====================================================

MGMT SX6036 1 1 Not Fatal

FAN SXX0XX_FAN 1 1 Not Fatal

PS1 SXX0XX_PS 1 1 Not Fatal

PS2 SXX0XX_PS 0 0 Not Fatal

C.7.2

WebUI System Inventory Page Change

In the “System > Inventory” page of the MLNX-OS WebUI, the “Module” column does not dis-

play the CPU module anymore ( Figure 41

).

Figure 41: System Inventory WebUI Page

Mellanox Technologies Confidential 1041

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents