advertisement
▼
Scroll to page 2
of
578
M4100 Series ProSAFE Managed Switches CLI Command Reference Manual Sof tware Version 10.0.2 April 2015 202-11166-04 350 East Plumeria Drive San Jose, CA 95134 USA M4100 Series ProSAFE Managed Switches Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label of your product and use it to register your product at https://my.netgear.com. You must register your product before you can use NETGEAR telephone support. NETGEAR recommends registering your product through the NETGEAR website. For product updates and web support, visit http://support.netgear.com. Phone (US & Canada only): 1-888-NETGEAR. Phone (Other Countries): Check the list of phone numbers at http://support.netgear.com/general/contact/default.aspx. Compliance For regulatory compliance information, visit http://www.netgear.com/about/regulatory. See the regulatory compliance document before connecting the power supply. Trademarks © NETGEAR, Inc. NETGEAR and the NETGEAR Logo are trademarks of NETGEAR, Inc. Any non-NETGEAR trademarks are used for reference purposes only. Revision History Publication Part Number Publish Date Comments 202-11166-03 March 2015 First publication. 2 Contents Chapter 1 Using the Command-Line Interface Command Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Command Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Common Parameter Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Slot/Port Naming Convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Using a Command’s “No” Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Managed Switch Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Command Completion and Abbreviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 CLI Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 CLI Line-Editing Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Using CLI Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Accessing the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Chapter 2 Switching Commands Port Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Loopback Interface Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Spanning Tree Protocol (STP) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 VLAN Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Switch Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Double VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Voice VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Provisioning (IEEE 802.1p) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Protected Ports Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Private VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 GARP Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 GVRP Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 GMRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Port-Based Network Access Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . 80 802.1X Supplicant Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Storm-Control Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Flow Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Port-Channel/LAG (802.3ad) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Port Mirroring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Static MAC Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 DHCP L2 Relay Agent Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 DHCP Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 DHCP Snooping Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Dynamic ARP Inspection Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 3 M4100 Series ProSAFE Managed Switches IGMP Snooping Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 IGMP Snooping Querier Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 MLD Snooping Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 MLD Snooping Querier Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Port Security Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 LLDP (802.1AB) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 LLDP-MED Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Denial of Service Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 MAC Database Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 ISDP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Chapter 3 Multicast VLAN Registration Commands About MVR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 MVR Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Chapter 4 Routing Commands Address Resolution Protocol (ARP) Commands . . . . . . . . . . . . . . . . . . . . . . . . . 228 IP Routing Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Virtual LAN Routing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 DHCP and BOOTP Relay Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 IP Helper Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 ICMP Throttling Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Chapter 5 Quality of Service Commands Class of Service (CoS) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Differentiated Services (DiffServ) Commands . . . . . . . . . . . . . . . . . . . . . . . . . 270 DiffServ Class Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 DiffServ Policy Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 DiffServ Service Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 DiffServ Show Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 MAC Access Control List (ACL) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 IP Access Control List (ACL) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 IPv6 Access Control List (ACL) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Time Range Commands for Time-Based ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . 309 AutoVoIP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Chapter 6 Power over Ethernet Commands About PoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 PoE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Chapter 7 Utility Commands Auto Install Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Dual Image Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 System Information and Statistics Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 333 4 M4100 Series ProSAFE Managed Switches Logging Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Email Alerting and Mail Server Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 System Utility and Clear Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Simple Network Time Protocol (SNTP) Commands . . . . . . . . . . . . . . . . . . . . . . 375 DHCP Server Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 DNS Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Packet Capture Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Serviceability Packet Tracing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Cable Test Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 sFlow Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 IP Address Conflict Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 RMON Stats and History Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432 UniDirectional Link Detection Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 USB Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 Chapter 8 Management Commands Switch Management CPU Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Management Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Console Port Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449 Telnet Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Secure Shell (SSH) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Management Security Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Hypertext Transfer Protocol (HTTP) Commands . . . . . . . . . . . . . . . . . . . . . . . . 460 Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 User Account Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 TACACS+ Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Configuration Scripting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518 Pre-Login Banner and System Prompt Commands . . . . . . . . . . . . . . . . . . . . . . 520 Chapter 9 Green Ethernet Commands Green Feature Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 Energy-Detect Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 Energy Efficient Ethernet (EEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Green Ethernet Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Chapter 10 Log Messages Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537 Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Routing/IPv6 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 Stacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 5 M4100 Series ProSAFE Managed Switches Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 O/S Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Command List 6 1. Using the Command-Line Interface 1 The command-line interface (CLI) is a text-based way to manage and monitor the system. You can access the CLI by using a direct serial connection or by using a remote logical connection with telnet or SSH. This chapter describes the CLI syntax, conventions, and modes. It contains the following sections: • Command Syntax • Command Conventions • Common Parameter Values • Slot/Port Naming Convention • Using a Command’s “No” Form • Managed Switch Modules • Command Modes • Command Completion and Abbreviation • CLI Error Messages • CLI Line-Editing Conventions • Using CLI Help • Accessing the CLI Note: For more information about the topics covered in this manual, visit the support website at support.netgear.com. Note: Firmware updates with new features and bug fixes are made available from time to time at downloadcenter.netgear.com. Some products can regularly check the site and download new firmware, or you can check for and download new firmware manually. If the features or behavior of your product does not match what is described in this guide, you might need to update your firmware. 7 M4100 Series ProSAFE Managed Switches Command Syntax A command is one or more words that might be followed by one or more parameters. Parameters can be required or optional values. Some commands, such as show network and clear vlan, do not require parameters. Other commands, such as network parms, require that you supply a value after the command. You must type the parameter values in a specific order, and optional parameters follow required parameters. The following example describes the network parms command syntax: Format network parms <ipaddr> <netmask> [gateway] • network parms is the command name. • <ipaddr> and <netmask> are parameters and represent required values that you must enter after you type the command keywords. • [gateway] is an optional keyword, so you are not required to enter a value in place of the keyword. This command line reference manual lists each command by the command name and provides a brief description of the command. Each command reference also contains the following information: • Format shows the command keywords and the required and optional parameters. • Mode identifies the command mode you must be in to access the command. • Default shows the default value, if any, of a configurable setting on the device. The show commands also contain a description of the information that the command shows. Command Conventions In this document, the command name is in bold font. Parameters are in <italic font> between angle brackets. You must replace the parameter name with an appropriate value, which might be a name or number. Parameters are order-dependent. Keyword choices are in bold font. The parameters for a command might include mandatory values, optional values, or keyword choices. The following table describes the conventions this document uses to distinguish between value types. Table 1. Parameter Conventions Symbol Example Description italic font in angle brackets <value> or [<value>] Indicates a variable value. You must replace the italicized text within angle brackets with a name or number. [ ] square brackets [keyword] Indicates an optional parameter. Using the Command-Line Interface 8 M4100 Series ProSAFE Managed Switches Table 1. Parameter Conventions (continued) Symbol Example Description { } curly braces {choice1 | choice2} Indicates that you must select a parameter from the list of choices. | Vertical bars choice1 | choice2 Separates the mutually exclusive choices. [{ }] Braces within square brackets [{choice1 | choice2}] Indicates a choice within an optional element. This format is used mainly for complicated commands Common Parameter Values Parameter values might be names (strings) or numbers. To use spaces as part of a name parameter, enclose the name value in double quotes. For example, the expression “System Name with Spaces” forces the system to accept the spaces. Empty strings (““) are not valid user-defined strings. The following table describes common parameter values and value formatting. Table 2. Parameter Descriptions Parameter Description ipaddr This parameter is a valid IPv4 address. You can enter the IP address in the following formats: • a (32 bits) • a.b (8.24 bits) • a.b.c (8.8.16 bits) • a.b.c.d (8.8.8.8) In addition to these formats, the CLI accepts decimal, hexadecimal and octal formats through the following input formats (where n is any valid hexadecimal, octal or decimal number): • 0xn (CLI assumes hexadecimal format.) • 0n (CLI assumes octal format with leading zeros.) • n (CLI assumes decimal format.) ipv6-address This parameter is a valid IPv6 address. You can enter the IP address in the following formats: • FE80:0000:0000:0000:020F:24FF:FEBF:DBCB • FE80:0:0:0:20F:24FF:FEBF:DBCB • FE80::20F24FF:FEBF:DBCB • FE80:0:0:0:20F:24FF:128:141:49:32 For additional information, refer to RFC 3513. Interface or slot/port Valid slot and port number separated by forward slashes. For example, 0/1 represents slot number 0 and port number 1. Logical Interface Represents a logical slot and port number. This is applicable in the case of a port-channel (LAG). You can use the logical slot/port to configure the port-channel. Character strings Use double quotation marks to identify character strings, for example, “System Name with Spaces”. An empty string (“”) is not valid. Using the Command-Line Interface 9 M4100 Series ProSAFE Managed Switches Slot/Port Naming Convention Managed switch software references physical entities such as cards and ports by using a slot/port naming convention. The software also uses this convention to identify certain logical entities, such as port-channel interfaces. The slot number has two uses. In the case of physical ports, it identifies the card containing the ports. In the case of logical and CPU ports it also identifies the type of interface or port. Table 3. Type of slots Slot Type Description Physical slot numbers Physical slot numbers begin with zero, and are allocated up to the maximum number of physical slots. Logical slot numbers Logical slots immediately follow physical slots and identify port-channel (LAG) or router interfaces. CPU slot numbers The CPU slots immediately follow the logical slots. The port identifies the specific physical port or logical interface being managed on a slot. Table 4. Type of ports Port Type Description Physical Ports The physical ports for each slot are numbered sequentially starting from zero. Logical Interfaces Port-channel or link aggregation group (LAG) interfaces are logical interfaces that are only used for bridging functions. VLAN routing interfaces are only used for routing functions. Loopback interfaces are logical interfaces that are always up. Tunnel interfaces are logical point-to-point links that carry encapsulated packets. CPU ports CPU ports are handled by the driver as one or more physical entities located on physical slots. Note: In the CLI, loopback and tunnel interfaces do not use the slot/port format. To specify a loopback interface, you use the loopback ID. To specify a tunnel interface, you use the tunnel ID. Using a Command’s “No” Form The no keyword is a specific form of an existing command and does not represent a new or distinct command. Almost every configuration command has a no form. In general, use the no form to reverse the action of a command or reset a value back to the default. For example, the no shutdown configuration command reverses the shutdown of an interface. Use the Using the Command-Line Interface 10 M4100 Series ProSAFE Managed Switches command without the keyword no to reenable a disabled feature or to enable a feature that is disabled by default. Only the configuration commands are available in the no form. Managed Switch Modules Managed switch software consists of flexible modules that can be applied in various combinations to develop advanced Layer 2/3/4+ products. The commands and command modes available on your switch depend on the installed modules. Additionally, for some show commands, the output fields might change based on the modules included in the software. The software suite includes the following modules: • Switching (Layer 2) • Routing (Layer 3) • Quality of Service • Management (CLI, web UI, and SNMP) Command Modes The CLI groups commands into modes according to the command function. Each of the command modes supports specific software commands. The commands in one mode are not available until you switch to that particular mode, except for the User EXEC mode commands. You can execute the User EXEC mode commands in the Privileged EXEC mode. The command prompt changes in each command mode to help you identify the current mode. The following table describes the command modes and the prompts visible in that mode. Note: The command modes available on your switch depend on the software modules that are installed. For example, a switch that does not support BGPv4 does not provide the Router BGPv4 Command Mode. Table 5. CLI Command Modes Command Mode Prompt Mode Description User EXEC Switch> Contains a limited set of commands to view basic system information. Privileged EXEC Switch# Allows you to issue any EXEC command, enter the VLAN mode, or enter the Global Configuration mode. Using the Command-Line Interface 11 M4100 Series ProSAFE Managed Switches Table 5. CLI Command Modes (continued) Command Mode Prompt Mode Description Global Config Switch (Config)# Groups general setup commands and permits you to make modifications to the running configuration. VLAN Config Switch (Vlan)# Groups all the VLAN commands. Interface Config Switch (Interface <slot/port>)# Line Config Switch (line)# Contains commands to configure outbound telnet settings and console interface settings. Policy Map Config Switch (Config-policy-map)# Contains the QoS Policy-Map configuration commands. Policy Class Config Switch (Config-policy-class-map)# Consists of class creation, deletion, and matching commands. The class match commands specify Layer 2, Layer 3, and general match criteria. Class Map Config Switch (Config-class-map)# Contains the QoS class map configuration commands for IPv4. Ipv6_Class-Map Config Switch (Config-class-map)# Contains the QoS class map configuration commands for IPv6. MAC Access-list Config Switch (Config-mac-access-list)# Allows you to create a MAC Access-List and to enter the mode containing MAC Access-List configuration commands. TACACS Config Switch (Tacacs)# Contains commands to configure properties for the TACACS servers. DHCP Pool Config Switch (Config dhcp-pool)# Contains the DHCP server IP address pool configuration commands. ARP Access-List Config Mode Switch (Config-arp-access-list)# Contains commands to add ARP ACL rules in an ARP Access List. Manages the operation of an interface and provides access to the router interface Switch (Interface Loopback <id>)# configuration commands. Use this mode to set up a physical port for a specific logical connection operation. Switch (Interface Tunnel <id>)# The following table explains how to enter or exit each mode. Table 6. CLI Mode Access and Exit Command Mode Access Method Exit or Access Previous Mode User EXEC This is the first level of access. To exit, enter logout. Privileged EXEC From the User EXEC mode, enter enable. To exit to the User EXEC mode, enter exit or press Ctrl-Z. Using the Command-Line Interface 12 M4100 Series ProSAFE Managed Switches Table 6. CLI Mode Access and Exit (continued) Command Mode Access Method Exit or Access Previous Mode Global Config From the Privileged EXEC mode, enter configure. To exit to the Privileged EXEC mode, enter exit, or press Ctrl-Z. VLAN Config From the Privileged EXEC mode, enter vlan database. To exit to the Privileged EXEC mode, enter exit, or press Ctrl-Z. Interface Config From the Global Config mode, enter interface <slot/port> or interface loopback <id> or interface tunnel <id> To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. Line Config From the Global Config mode, enter lineconfig. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. Policy-Map Config From the Global Config mode, enter policy-map <name>. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. Policy-Class-Map Config From the Policy Map mode enter class. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. Class-Map Config From the Global Config mode, enter class-map, and specify the optional keyword ipv4 to specify the Layer 3 protocol for this class. See class-map on page 272 for more information. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. Ipv6-Class-Map Config From the Global Config mode, enter class-map and specify the optional keyword ipv6 to specify the Layer 3 protocol for this class. See class-map on page 272 for more information. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. MAC Access-list Config From the Global Config mode, enter mac access-list extended <name>. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. TACACS Config From the Global Config mode, enter tacacs-server host <ip-addr>, in which <ip-addr> is the IP address of the TACACS server on your network. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. DHCP Pool Config From the Global Config mode, enter ip dhcp pool <pool-name>. To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. ARP Access-List Config Mode To exit to the Global Config mode, enter exit. To return to the Privileged EXEC mode, enter Ctrl-Z. From the Global Config mode, enter arp access-list. Using the Command-Line Interface 13 M4100 Series ProSAFE Managed Switches Command Completion and Abbreviation Command completion finishes spelling the command when you type enough letters of a command to uniquely identify the command keyword. Once you have entered enough letters, press the SPACEBAR or TAB key to complete the word. Command abbreviation allows you to execute a command when you have entered there are enough letters to uniquely identify the command. You must enter all of the required keywords and parameters before you enter the command. CLI Error Messages If you enter a command and the system is unable to execute it, an error message appears. The following table describes the most common CLI error messages. Table 7. CLI Error Messages Message Text Description % Invalid input detected at '^' marker. Indicates that you entered an incorrect or unavailable command. The carat (^) shows where the invalid text is detected. This message also appears if any of the parameters or values are not recognized. Command not found / Incomplete command. Use a question mark (?) to list commands. Indicates that you did not enter the required keywords or values. Ambiguous command Indicates that you did not enter enough letters to uniquely identify the command. CLI Line-Editing Conventions The following table describes the key combinations you can use to edit commands or increase the speed of command entry. You can access this list from the CLI by entering help from the User or Privileged EXEC modes. Table 8. CLI Editing Conventions Key Sequence Description DEL or Backspace Delete previous character Ctrl-A Go to beginning of line Ctrl-E Go to end of line Ctrl-F Go forward one character Ctrl-B Go backward one character Using the Command-Line Interface 14 M4100 Series ProSAFE Managed Switches Table 8. CLI Editing Conventions (continued) Key Sequence Description Ctrl-D Delete current character Ctrl-U, X Delete to beginning of line Ctrl-K Delete to end of line Ctrl-W Delete previous word Ctrl-T Transpose previous character Ctrl-P Go to previous line in history buffer Ctrl-R Rewrites or pastes the line Ctrl-N Go to next line in history buffer Ctrl-Y Prints last deleted character Ctrl-Q Enables serial flow Ctrl-S Disables serial flow Ctrl-Z Return to root command prompt Tab, <SPACE> Command-line completion Exit Go to next lower command prompt ? List available commands, keywords, or parameters Using CLI Help Enter a question mark (?) at the command prompt to display the commands available in the current mode. (NETGEAR Switch) >? enable help logout ping quit show telnet Enter into user privilege mode. Display help for various special keys. Exit this session. Any unsaved changes are lost. Send ICMP echo packets to a specified IP address. Exit this session. Any unsaved changes are lost. Display Switch Options and Settings. Telnet to a remote host. Using the Command-Line Interface 15 M4100 Series ProSAFE Managed Switches Enter a question mark (?) after each word you enter to display available command keywords or parameters. (NETGEAR Switch) #network ? javamode mgmt_vlan parms protocol Enable/Disable. Configure the Management VLAN ID of the switch. Configure Network Parameters of the router. Select DHCP, BootP, or None as the network config protocol. If the help output shows a parameter in angle brackets, you must replace the parameter with a value. (NETGEAR Switch) #network parms ? <ipaddr> Enter the IP address. If there are no additional command keywords or parameters, or if more parameters are optional, the following message appears in the output: <cr> Press Enter to execute the command You can also enter a question mark (?) after typing one or more characters of a word to list the available command or parameters that begin with the letters, as shown in the following example: (NETGEAR Switch) #show m? mac-addr-table mac-address-table monitor Accessing the CLI You can access the CLI by using a direct console connection or by using a telnet or SSH connection from a remote management host. For the initial connection, you must use a direct connection to the console port. You cannot access the system remotely until the system has an IP address, subnet mask, and default gateway. You can set the network configuration information manually, or you can configure the system to accept these settings from a BOOTP or DHCP server on your network. For more information, see Management Interface Commands on page 446. Using the Command-Line Interface 16 2. Switching Commands This chapter describes the switching commands available in the managed switch CLI. The chapter contains the following sections: • Port Configuration Commands • Loopback Interface Commands • Spanning Tree Protocol (STP) Commands • VLAN Commands • Switch Port Commands • Double VLAN Commands • Voice VLAN Commands • Provisioning (IEEE 802.1p) Commands • Protected Ports Commands • Private VLAN Commands • GARP Commands • GVRP Commands • GMRP Commands • Port-Based Network Access Control Commands • 802.1X Supplicant Commands • Storm-Control Commands • Flow Control Commands • Port Mirroring Commands • Static MAC Filtering Commands • DHCP L2 Relay Agent Commands • DHCP Client Commands • DHCP Snooping Configuration Commands • Dynamic ARP Inspection Commands • IGMP Snooping Configuration Commands • IGMP Snooping Querier Commands • MLD Snooping Commands 17 2 M4100 Series ProSAFE Managed Switches • MLD Snooping Querier Commands • Port Security Commands • LLDP (802.1AB) Commands • LLDP-MED Commands • Denial of Service Commands • MAC Database Commands • ISDP Commands The commands in this chapter are in three functional groups: • Show commands display switch settings, statistics, and other information. • Configuration commands configure features and options of the switch. Every switch command has a show command that displays the configuration setting. • Clear commands clear some or all of the settings to factory defaults. Switching Commands 18 M4100 Series ProSAFE Managed Switches Port Configuration Commands This section describes the commands you use to view and configure port settings. interface This command gives you access to the Interface Config mode, which allows you to enable or modify the operation of an interface (port). Format interface <slot/port> Mode Global Config interface vlan This command gives you access to the vlan virtual interface mode, which allows certain port configurations (for example, the IP address) to be applied to the VLAN interface. Type a question mark (?) after entering the interface configuration mode to see the available options. Format interface vlan <vlan id> Mode Global Config interface lag This command gives you access to the LAG (link aggregation, or port channel) virtual interface, which allows certain port configurations to be applied to the LAG interface. Type a question mark (?) after entering the interface configuration mode to see the available options. Note: The IP address cannot be assigned to a LAG virtual interface. The interface must be put under a VLAN group and an IP address assigned to the VLAN group. Format interface lag <lag id> Mode Global Config auto-negotiate This command enables automatic negotiation on a port. Default enabled Format auto-negotiate Mode Interface Config Switching Commands 19 M4100 Series ProSAFE Managed Switches no auto-negotiate This command disables automatic negotiation on a port. Note: Automatic sensing is disabled when automatic negotiation is disabled. auto-negotiate all This command enables automatic negotiation on all ports. Default enabled Format auto-negotiate all Mode Global Config no auto-negotiate all This command disables automatic negotiation on all ports. Format no auto-negotiate all Mode Global Config description Use this command to create an alpha-numeric description of the port. Format description <description> Mode Interface Config mtu Use the mtu command to set the maximum transmission unit (MTU) size, in bytes, for frames that ingress or egress the interface. You can use the mtu command to configure jumbo frame support for physical and port-channel (LAG) interfaces. The MTU size is a valid integer between 1522–9216 for tagged packets and a valid integer between 1518–9216 for untagged packets. Note: To receive and process packets, the Ethernet MTU must include any extra bytes that Layer-2 headers might require. To configure the IP MTU size, which is the maximum size of the IP packet (IP Header + IP payload), see ip mtu on page 239. Switching Commands 20 M4100 Series ProSAFE Managed Switches Default 1518 (untagged) Format mtu <1518-9216> Mode Interface Config no mtu This command sets the default MTU size (in bytes) for the interface. Format no mtu Mode Interface Config shutdown This command disables a port. Note: You can use the shutdown command on physical and port-channel (LAG) interfaces, but not on VLAN routing interfaces. Format shutdown Mode Interface Config no shutdown This command enables a port. Format no shutdown Mode Interface Config shutdown all This command disables all ports. Note: You can use the shutdown all command on physical and port-channel (LAG) interfaces, but not on VLAN routing interfaces. Switching Commands 21 M4100 Series ProSAFE Managed Switches Format shutdown all Mode Global Config no shutdown all This command enables all ports. Format no shutdown all Mode Global Config speed This command sets the speed and duplex setting for the interface. Format speed [auto] [{<100 | 10 | 10G> {<half-duplex | full-duplex>}}] Mode Interface Config Acceptable Values Definition 100h 100BASE-T half duplex 100f 100BASE-T full duplex 10h 10BASE-T half duplex 10f 10BASE-T full duplex 10Gh 10GBase-T full duplex 10Gf 10Gbase-T half duplex speed all This command sets the speed and duplex setting for all interfaces. Format speed all [auto] [{<100 | 10> {<half-duplex | full-duplex>}}] Mode Global Config Acceptable Values Definition 100h 100BASE-T half duplex 100f 100BASE-T full duplex 10h 10BASE-T half duplex Switching Commands 22 M4100 Series ProSAFE Managed Switches Acceptable Values Definition 10f 10BASE-T full duplex 10Gh 10GBase-T full duplex 10Gf 10Gbase-T half duplex show port advertise Use this command to display the local administrative link advertisement configuration, local operational link advertisement, and the link partner advertisement for an interface. It also displays priority Resolution for speed and duplex as per 802.3 Annex 28B.3. It displays the autonegotiation state, Phy Master/Slave Clock configuration, and Link state of the port. If the link is down, the Clock is displayed as No Link, and a dash is displayed against the Oper Peer advertisement, and Priority Resolution. If autonegotiation is disabled, the admin Local Link advertisement, operational local link advertisement, operational peer advertisement, and Priority resolution fields are not displayed. If this command is executed without the optional slot/port parameter, it displays the autonegotiation state and operational Local link advertisement for all the ports. Operational link advertisement will display speed only if it is supported by both local as well as link partner. If autonegotiation is disabled, operational local link advertisement is not displayed. Format show port advertise [slot/port] Mode Privileged EXEC Command example: The following commands show the command output with and without the optional parameter: (NETGEAR Switch)#show port advertise 0/1 Port: 0/1 Type: Gigabit - Level Link State: Down Auto Negotiation: Enabled Clock: Auto 1000f ----Admin Local Link Advertisement no Oper Local Link Advertisement no Oper Peer Advertisement no Priority Resolution - 1000h ----no no no - 100f ---yes yes yes yes 100h ---no no yes - Switching Commands 23 10f --yes yes yes - 10h --no no yes - M4100 Series ProSAFE Managed Switches (NETGEAR Switch)#show port advertise Port Type Neg Operational Link Advertisement --------- ------------------------------ ----------- -----------------------------0/1 Gigabit - Level Enabled 1000f, 100f, 100h, 10f, 10h 0/2 Gigabit - Level Enabled 1000f, 100f, 100h, 10f, 10h 0/3 Gigabit - Level Enabled 1000f, 100f, 100h, 10f, 10h show port This command displays port information. Format show port {<slot/port> | all} Mode Privileged EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Type If not blank, this field indicates that this port is a special type of port. The possible values are: • Mirror. This port is a monitoring port. For more information, see Port Mirroring Commands on page 125. • PC Mbr. This port is a member of a port-channel (LAG). • Probe. This port is a probe port. Admin Mode The Port control administration state. The port must be enabled in order for it to be allowed into the network. - May be enabled or disabled. The factory default is enabled. Physical Mode The desired port speed and duplex mode. If autonegotiation support is selected, the duplex mode and speed is set from the auto-negotiation process. Note that the maximum capability of the port (full-duplex -100M) is advertised. Otherwise, this object determines the port's duplex mode and transmission rate. The factory default is Auto. Physical Status The port speed and duplex mode. Link Status The Link is up or down. Link Trap This object determines whether to send a trap when link status changes. The factory default is enabled. LACP Mode LACP is enabled or disabled on this port. show port protocol This command displays the Protocol-Based VLAN information for either the entire system, or for the indicated group. Format show port protocol {<groupid> | all} Mode Privileged EXEC Switching Commands 24 M4100 Series ProSAFE Managed Switches Term Definition Group Name The group name of an entry in the Protocol-based VLAN table. Group ID The group identifier of the protocol group. Protocol(s) The type of protocol(s) for this group. VLAN The VLAN associated with this Protocol Group. Interface(s) Lists the slot/port interface(s) that are associated with this Protocol Group. show port description This command displays the port description for every port. Format show port description <slot/port> Mode Privileged EXEC Term Definition Interface Valid slot and port number separated by forward slashes Description Shows the port description configured via the “description” command show port status This command displays the Protocol-Based VLAN information for either the entire system, or for the indicated group. Format show port status {<slot/port> | all} Mode Privileged EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Media Type “Copper” or “Fiber” for combo port. STP Mode Indicate the spanning tree mode of the port. Physical Mode Either “Auto” or fixed speed and duplex mode. Physical Status The actual speed and duplex mode. Link Status Whether the link is Up or Down. Loop Status Whether the port is in loop state or not. Partner Flow Control Whether the remote side is using flow control or not. Switching Commands 25 M4100 Series ProSAFE Managed Switches Loopback Interface Commands The commands in this section describe how to create, delete, and manage loopback interfaces. A loopback interface is always expected to be up. This interface can provide the source address for sent packets and can receive both local and remote packets. The loopback interface is typically used by routing protocols. To assign an IP address to the loopback interface, see ip address on page 234. interface loopback Use this command to enter the Interface Config mode for a loopback interface. The range of the loopback ID is 0–7. Format interface loopback <loopback-id> Mode Global Config no interface loopback This command removes the loopback interface and associated configuration parameters for the specified loopback interface. Format no interface loopback <loopback-id> Mode Global Config show interface loopback This command displays information about configured loopback interfaces. Format show interface loopback [<loopback-id>] Mode Privileged EXEC If you do not specify a loopback ID, the following information appears for each loopback interface on the system: Term Definition Loopback ID The loopback ID associated with the rest of the information in the row. Interface The interface name. IP Address The IPv4 address of the interface. Received Packets The number of packets received on this interface. Sent Packets The number of packets transmitted from this interface. IPv6 Address The IPv6 address of this interface. Switching Commands 26 M4100 Series ProSAFE Managed Switches If you specify a loopback ID, the following information appears: Term Definition Interface Link Status Shows whether the link is up or down. IP Address The IPv4 address of the interface. IPv6 is enabled (disabled) Shows whether IPv6 is enabled on the interface. IPv6 Prefix is The IPv6 address of the interface. MTU size The maximum transmission size for packets on this interface, in bytes. Spanning Tree Protocol (STP) Commands This section describes the commands you use to configure Spanning Tree Protocol (STP). STP helps prevent network loops, duplicate messages, and network instability. spanning-tree This command sets the spanning-tree operational mode to enabled. Default enabled Format spanning-tree Mode Global Config no spanning-tree This command sets the spanning-tree operational mode to disabled. While disabled, the spanning-tree configuration is retained and can be changed, but is not activated. Format no spanning-tree Mode Global Config spanning-tree auto-edge This command enables auto-edge on the interface or range of interfaces. When enabled, the interface becomes an edge port if it does not see BPDUs for edge delay time. Default enabled Format spanning-tree auto-edge Mode Interface Config Switching Commands 27 M4100 Series ProSAFE Managed Switches no spanning-tree auto-edge This command disables auto-edge on the interface or range of interfaces. Format no spanning-tree auto-edge Mode Interface Config spanning-tree bpdufilter Use this command to enable BPDU Filter on an interface or range of interfaces. Default disabled Format spanning-tree bpdufilter Mode Interface Config no spanning-tree bpdufilter Use this command to disable BPDU Filter on the interface or range of interfaces. Default disabled Format no spanning-tree bpdufilter Mode Interface Config spanning-tree bpdufilter default Use this command to enable BPDU Filter on all the edge port interfaces. Default disabled Format spanning-tree bpdufilter Mode Global Config no spanning-tree bpdufilter default Use this command to disable BPDU Filter on all the edge port interfaces. Default enabled Format no spanning-tree bpdufilter default Mode Global Config Switching Commands 28 M4100 Series ProSAFE Managed Switches spanning-tree bpduflood Use this command to enable BPDU Flood on the interface. Default disabled Format spanning-tree bpduflood Mode Interface Config no spanning-tree bpduflood Use this command to disable BPDU Flood on the interface. Format no spanning-tree bpduflood Mode Interface Config spanning-tree bpduguard Use this command to enable BPDU Guard on the switch. Default disabled Format spanning-tree bpduguard Mode Global Config no spanning-tree bpduguard Use this command to disable BPDU Guard on the switch. Format no spanning-tree bpduguard Mode Global Config spanning-tree bpdumigrationcheck Use this command to force a transmission of rapid spanning tree (RSTP) and multiple spanning tree (MSTP) BPDUs. Use the <slot/port> parameter to transmit a BPDU from a specified interface, or use the all keyword to transmit BPDUs from all interfaces. This command forces the BPDU transmission when you execute it, so the command does not change the system configuration or have a “no” version. Format spanning-tree bpdumigrationcheck {<slot/port> | all} Mode Global Config Switching Commands 29 M4100 Series ProSAFE Managed Switches spanning-tree configuration name This command sets the Configuration Identifier Name for use in identifying the configuration that this switch is currently using. The <name> is a string of up to 32 characters. Default base MAC address in hexadecimal notation Format spanning-tree configuration name <name> Mode Global Config no spanning-tree configuration name This command resets the Configuration Identifier Name to its default. Format no spanning-tree configuration name Mode Global Config spanning-tree configuration revision This command sets the Configuration Identifier Revision Level for use in identifying the configuration that this switch is currently using. The Configuration Identifier Revision Level is a number in the range of 0–65535. Default 0 Format spanning-tree configuration revision <0-65535> Mode Global Config no spanning-tree configuration revision This command sets the Configuration Identifier Revision Level for use in identifying the configuration that this switch is currently using to the default value. Format no spanning-tree configuration revision Mode Global Config spanning-tree edgeport This command specifies that this port is an Edge Port within the Common and Internal Spanning Tree. This allows this port to transition to Forwarding State without delay. Default Enabled Format spanning-tree edgeport Mode Interface Config Switching Commands 30 M4100 Series ProSAFE Managed Switches no spanning-tree edgeport This command specifies that this port is not an Edge Port within the Common and Internal Spanning Tree. Format no spanning-tree edgeport Mode Interface Config spanning-tree forceversion This command sets the Force Protocol Version parameter to a new value. Default 802.1s Format spanning-tree forceversion {802.1d | 802.1s | 802.1w} Mode Global Config • Use 802.1d to specify that the switch transmits ST BPDUs rather than MST BPDUs (IEEE 802.1d functionality supported). • Use 802.1s to specify that the switch transmits MST BPDUs (IEEE 802.1s functionality supported). • Use 802.1w to specify that the switch transmits RST BPDUs rather than MST BPDUs (IEEE 802.1w functionality supported). no spanning-tree forceversion This command sets the Force Protocol Version parameter to the default value. Format no spanning-tree forceversion Mode Global Config spanning-tree forward-time This command sets the Bridge Forward Delay parameter to a new value for the Common and Internal Spanning Tree. The forward-time value is in seconds within a range of 4–30, with the value being greater than or equal to “(Bridge Max Age / 2) + 1”. Default 15 Format spanning-tree forward-time <4-30> Mode Global Config Switching Commands 31 M4100 Series ProSAFE Managed Switches no spanning-tree forward-time This command sets the Bridge Forward Delay parameter for the Common and Internal Spanning Tree to the default value. Format no spanning-tree forward-time Mode Global Config spanning-tree guard This command selects whether loop guard or root guard is enabled on an interface. If neither is enabled, the port operates in accordance with the multiple spanning tree protocol. Default none Format spanning-tree guard {none | root | loop} Mode Interface Config no spanning-tree guard This command disables loop guard or root guard on the interface. Format no spanning-tree guard Mode Interface Config spanning-tree tcnguard This command enables the propagation of received topology change notifications and topology changes to other ports. Default disable Format spanning-tree tcnguard Mode Interface Config no spanning-tree tcnguard This command disables the propagation of received topology change notifications and topology changes to other ports. Format no spanning-tree tcnguard Mode Interface Config Switching Commands 32 M4100 Series ProSAFE Managed Switches spanning-tree max-age This command sets the Bridge Max Age parameter to a new value for the Common and Internal Spanning Tree. The max-age value is in seconds within a range of 6–40, with the value being less than or equal to 2 x (Bridge Forward Delay - 1). Default 20 Format spanning-tree max-age <6-40> Mode Global Config no spanning-tree max-age This command sets the Bridge Max Age parameter for the Common and Internal Spanning Tree to the default value. Format no spanning-tree max-age Mode Global Config spanning-tree max-hops This command sets the MSTP Max Hops parameter to a new value for the Common and Internal Spanning Tree. The max-hops value is a range from 6 to 40. Default 20 Format spanning-tree max-hops <1-127> Mode Global Config no spanning-tree max-hops This command sets the Bridge Max Hops parameter for the Common and Internal Spanning Tree to the default value. Format no spanning-tree max-hops Mode Global Config spanning-tree mst This command sets the Path Cost or Port Priority for this port within the multiple spanning tree instance or in the Common and Internal Spanning Tree. If you specify an <mstid> parameter that corresponds to an existing multiple spanning tree instance, the configurations are done for that multiple spanning tree instance. If you specify 0 (defined as the default CIST ID) as the <mstid>, the configurations are done for the Common and Internal Spanning Tree instance. If you specify the cost option, the command sets the path cost for this port within a multiple spanning tree instance or the Common and Internal Spanning Tree instance, depending on Switching Commands 33 M4100 Series ProSAFE Managed Switches the <mstid> parameter. You can set the path cost as a number in the range of 1–200000000 or auto. If you select auto the path cost value is set based on Link Speed. If you specify the external-cost option, this command sets the external-path cost for MST instance 0 that is, CIST instance. You can set the external cost as a number in the range of 1–200000000 or auto. If you specify auto, the external path cost value is set based on Link Speed. If you specify the port-priority option, this command sets the priority for this port within a specific multiple spanning tree instance or the Common and Internal Spanning Tree instance, depending on the <mstid> parameter. The port-priority value is a number in the range of 0–240 in increments of 16. Default • • • cost—auto external-cost—auto port-priority—128 Format spanning-tree mst <mstid> {{cost <1-200000000> | auto} | {external-cost <1-200000000> | auto} | port-priority <0-240>} Mode Interface Config no spanning-tree mst This command sets the Path Cost or Port Priority for this port within the multiple spanning tree instance, or in the Common and Internal Spanning Tree to the respective default values. If you specify an <mstid> parameter that corresponds to an existing multiple spanning tree instance, you are configuring that multiple spanning tree instance. If you specify 0 (defined as the default CIST ID) as the <mstid>, you are configuring the Common and Internal Spanning Tree instance. If you specify cost, this command sets the path cost for this port within a multiple spanning tree instance or the Common and Internal Spanning Tree instance, depending on the <mstid> parameter, to the default value, that is, a path cost value based on the Link Speed. If you specify external-cost, this command sets the external path cost for this port for mst ‘0’ instance, to the default value, that is, a path cost value based on the Link Speed. If you specify port-priority, this command sets the priority for this port within a specific multiple spanning tree instance or the Common and Internal Spanning Tree instance, depending on the <mstid> parameter, to the default value. Format no spanning-tree mst <mstid> [cost | external-cost | port-priority] Mode Interface Config Switching Commands 34 M4100 Series ProSAFE Managed Switches spanning-tree mst instance This command adds a multiple spanning tree instance to the switch. The parameter <mstid> is a number within a range of 1–4094, that corresponds to the new instance ID to be added. The maximum number of multiple instances supported by the switch is 4. Default none Format spanning-tree mst instance <mstid> Mode Global Config no spanning-tree mst instance This command removes a multiple spanning tree instance from the switch and reallocates all VLANs allocated to the deleted instance to the Common and Internal Spanning Tree. The parameter <mstid> is a number that corresponds to the desired existing multiple spanning tree instance to be removed. Format no spanning-tree mst instance <mstid> Mode Global Config spanning-tree mst priority This command sets the bridge priority for a specific multiple spanning tree instance. The parameter <mstid> is a number that corresponds to the desired existing multiple spanning tree instance. The priority value is a number within a range of 0–61440 in increments of 4096. If you specify 0 (defined as the default CIST ID) as the <mstid>, this command sets the Bridge Priority parameter to a new value for the Common and Internal Spanning Tree. The bridge priority value is a number within a range of 0–61440. The twelve least significant bits are masked according to the 802.1s specification. This causes the priority to be rounded down to the next lower valid priority. Default 32768 Format spanning-tree mst priority <mstid> <0-61440> Mode Global Config no spanning-tree mst priority This command sets the bridge priority for a specific multiple spanning tree instance to the default value. The parameter <mstid> is a number that corresponds to the desired existing multiple spanning tree instance. Switching Commands 35 M4100 Series ProSAFE Managed Switches If 0 (defined as the default CIST ID) is passed as the <mstid>, this command sets the Bridge Priority parameter for the Common and Internal Spanning Tree to the default value. Format no spanning-tree mst priority <mstid> Mode Global Config spanning-tree mst vlan This command adds an association between a multiple spanning tree instance and one or more VLANs so that the VLAN(s) are no longer associated with the Common and Internal Spanning Tree. The parameter <mstid> is a number that corresponds to the desired existing multiple spanning tree instance. The vlan range can be specified as a list or as a range of values. To specify a list of VLANs, enter a list of VLAN IDs, each separated by a comma with no spaces in between. To specify a range of VLANs, separate the beginning and ending VLAN ID with a dash ("-"). Format spanning-tree mst vlan <mstid> <vlanid> Mode Global Config no spanning-tree mst vlan This command removes an association between a multiple spanning tree instance and one or more VLANs so that the VLAN(s) are again associated with the Common and Internal Spanning Tree. Format no spanning-tree mst vlan <mstid> <vlanid> Mode Global Config spanning-tree port mode This command sets the Administrative Switch Port State for this port to enabled. Default enabled Format spanning-tree port mode Mode Interface Config no spanning-tree port mode This command sets the Administrative Switch Port State for this port to disabled. Format no spanning-tree port mode Mode Interface Config Switching Commands 36 M4100 Series ProSAFE Managed Switches spanning-tree port mode all This command sets the Administrative Switch Port State for all ports to enabled. Default enabled Format spanning-tree port mode all Mode Global Config no spanning-tree port mode all This command sets the Administrative Switch Port State for all ports to disabled. Format no spanning-tree port mode all Mode Global Config spanning-tree edgeport all This command specifies that every port is an Edge Port within the Common and Internal Spanning Tree. This allows all ports to transition to Forwarding State without delay. Format spanning-tree edgeport all Mode Global Config no spanning-tree edgeport all This command disables Edge Port mode for all ports within the Common and Internal Spanning Tree. Format no spanning-tree edgeport all Mode Global Config spanning-tree bpduforwarding Normally a switch will not forward Spanning Tree Protocol (STP) BPDU packets if STP is disabled. However, if in some network setup, the user wishes to forward BDPU packets received from other network devices, this command can be used to enable the forwarding. Default disabled Format spanning-tree bpduforwarding Mode Global Config Switching Commands 37 M4100 Series ProSAFE Managed Switches no spanning-tree bpduforwarding This command will cause the STP BPDU packets received from the network to be dropped if STP is disabled. Format no spanning-tree bpduforwarding Mode Global Config show spanning-tree This command displays spanning tree settings for the Common and Internal Spanning Tree. The following details are displayed. Format show spanning-tree Mode • • Privileged EXEC User EXEC Term Definition Bridge Priority Specifies the bridge priority for the Common and Internal Spanning Tree (CST). The value lies between 0 and 61440. It is displayed in multiples of 4096. Bridge Identifier The bridge identifier for the CST. It is made up using the bridge priority and the base MAC address of the bridge. Time Since Topology Change Time in seconds. Topology Change Count Number of times changed. Topology Change Boolean value of the Topology Change parameter for the switch indicating if a topology change is in progress on any port assigned to the Common and Internal Spanning Tree. Designated Root The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge. Root Path Cost Value of the Root Path Cost parameter for the Common and Internal Spanning Tree. Root Port Identifier Identifier of the port to access the Designated Root for the CST Root Port Max Age Derived value. Root Port Bridge Derived value. Forward Delay Hello Time Configured value of the parameter for the CST. Switching Commands 38 M4100 Series ProSAFE Managed Switches Term Definition Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs). Bridge Max Hops Bridge max-hops count for the device. CST Regional Root Bridge Identifier of the CST Regional Root. It is made up using the bridge priority and the base MAC address of the bridge. Regional Root Path Cost Path Cost to the CST Regional Root. Associated FIDs List of forwarding database identifiers currently associated with this instance. Associated VLANs List of VLAN IDs currently associated with this instance. show spanning-tree brief This command displays spanning tree settings for the bridge. The following information appears. Format show spanning-tree brief Mode • • Privileged EXEC User EXEC Term Definition Bridge Priority Configured value. Bridge Identifier The bridge identifier for the selected MST instance. It is made up using the bridge priority and the base MAC address of the bridge. Bridge Max Age Configured value. Bridge Max Hops Bridge max-hops count for the device. Bridge Hello Time Configured value. Bridge Forward Delay Configured value. Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs). Switching Commands 39 M4100 Series ProSAFE Managed Switches show spanning-tree interface This command displays the settings and parameters for a specific switch port within the Common and Internal Spanning Tree. The <slot/port> is the desired switch port. The following details are displayed on execution of the command. Format show spanning-tree interface <slot/port> Mode • • Privileged EXEC User EXEC Term Definition Hello Time Admin hello time for this port. Port Mode Enabled or disabled. BPDU Guard Effect Enabled or disabled. Root Guard Enabled or disabled. Loop Guard Enabled or disabled. TCN Guard Enable or disable the propagation of received topology change notifications and topology changes to other ports. BPDU Filter Mode Enabled or disabled. BPDU Flood Mode Enabled or disabled. Auto Edge To enable or disable the feature that causes a port that has not seen a BPDU for ‘edge delay’ time, to become an edge port and transition to forwarding faster. Port Up Time Since Counters Last Cleared Time since port was reset, displayed in days, hours, minutes, and seconds. STP BPDUs Transmitted Spanning Tree Protocol Bridge Protocol Data Units sent. STP BPDUs Received Spanning Tree Protocol Bridge Protocol Data Units received. RSTP BPDUs Transmitted Rapid Spanning Tree Protocol Bridge Protocol Data Units sent. RSTP BPDUs Received Rapid Spanning Tree Protocol Bridge Protocol Data Units received. MSTP BPDUs Transmitted Multiple Spanning Tree Protocol Bridge Protocol Data Units sent. MSTP BPDUs Received Multiple Spanning Tree Protocol Bridge Protocol Data Units received. Switching Commands 40 M4100 Series ProSAFE Managed Switches show spanning-tree mst port detailed This command displays the detailed settings and parameters for a specific switch port within a particular multiple spanning tree instance. The parameter <mstid> is a number that corresponds to the desired existing multiple spanning tree instance. The <slot/port> is the desired switch port. Format show spanning-tree mst port detailed <mstid> <slot/port> Mode • • Term Privileged EXEC User EXEC Definition MST Instance ID The ID of the existing MST instance. Port Identifier The port identifier for the specified port within the selected MST instance. It is made up from the port priority and the interface number of the port. Port Priority The priority for a particular port within the selected MST instance. The port priority is displayed in multiples of 16. Port Forwarding State Current spanning tree state of this port. Port Role Each enabled MST Bridge Port receives a Port Role for each spanning tree. The port role is one of the following values: Root Port, Designated Port, Alternate Port, Backup Port, Master Port, or Disabled Port Auto-Calculate Port Path Cost Indicates whether auto calculation for port path cost is enabled. Port Path Cost Configured value of the Internal Port Path Cost parameter. Designated Root The Identifier of the designated root for this port. Root Path Cost The path cost to get to the root bridge for this instance. The root path cost is zero if the bridge is the root bridge for that instance. Designated Bridge Bridge Identifier of the bridge with the Designated Port. Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN. Loop Inconsistent State The current loop inconsistent state of this port in this MST instance. When in loop inconsistent state, the port has failed to receive BPDUs while configured with loop guard enabled. Loop inconsistent state maintains the port in a "blocking" state until a subsequent BPDU is received. Switching Commands 41 M4100 Series ProSAFE Managed Switches Term Definition Transitions Into Loop Inconsistent State The number of times this interface has transitioned into loop inconsistent state. Transitions Out of Loop Inconsistent State The number of times this interface has transitioned out of loop inconsistent state. If you specify 0 (defined as the default CIST ID) as the <mstid>, this command displays the settings and parameters for a specific switch port within the Common and Internal Spanning Tree. The <slot/port> is the desired switch port. In this case, the following are displayed. Term Definition Port Identifier The port identifier for this port within the CST. Port Priority The priority of the port within the CST. Port Forwarding State The forwarding state of the port within the CST. Port Role The role of the specified interface within the CST. Auto-Calculate Port Path Cost Indicates whether auto calculation for port path cost is enabled or not (disabled). Port Path Cost The configured path cost for the specified interface. Auto-Calculate External Port Path Cost Indicates whether auto calculation for external port path cost is enabled. External Port Path Cost The cost to get to the root bridge of the CIST across the boundary of the region. This means that if the port is a boundary port for an MSTP region, the external path cost is used. Designated Root Identifier of the designated root for this port within the CST. Root Path Cost The root path cost to the LAN by the port. Designated Bridge The bridge containing the designated port. Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN. Topology Change Acknowledgeme nt Value of flag in next Configuration Bridge Protocol Data Unit (BPDU) transmission indicating if a topology change is in progress for this port. Hello Time The hello time in use for this port. Edge Port The configured value indicating if this port is an edge port. Switching Commands 42 M4100 Series ProSAFE Managed Switches Term Definition Edge Port Status The derived value of the edge port status. True if operating as an edge port; false otherwise. Point To Point MAC Status Derived value indicating if this port is part of a point to point link. CST Regional Root The regional root identifier in use for this port. CST Internal Root Path Cost The internal root path cost to the LAN by the designated external port. Loop Inconsistent State The current loop inconsistent state of this port in this MST instance. When in loop inconsistent state, the port has failed to receive BPDUs while configured with loop guard enabled. Loop inconsistent state maintains the port in a "blocking" state until a subsequent BPDU is received. Transitions Into Loop Inconsistent State The number of times this interface has transitioned into loop inconsistent state. Transitions Out of Loop Inconsistent State The number of times this interface has transitioned out of loop inconsistent state. show spanning-tree mst port summary This command displays the settings of one or all ports within the specified multiple spanning tree instance. The parameter <mstid> indicates a particular MST instance. The parameter {<slot/port> | all} indicates the desired switch port or all ports. If you specify 0 (defined as the default CIST ID) as the <mstid>, the status summary displays for one or all ports within the Common and Internal Spanning Tree. Format show spanning-tree mst port summary <mstid> {<slot/port> | all} Mode • • Term Privileged EXEC User EXEC Definition MST Instance ID The MST instance associated with this port. Interface Valid slot and port number separated by forward slashes. STP Mode Indicates whether spanning tree is enabled or disabled on the port. Type Currently not used. STP State The forwarding state of the port in the specified spanning tree instance. Switching Commands 43 M4100 Series ProSAFE Managed Switches Term Definition Port Role The role of the specified port within the spanning tree. Desc Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop guard feature is not available. show spanning-tree mst port summary active This command displays settings for the ports within the specified multiple spanning tree instance that are active links. Format show spanning-tree mst port summary <mstid> active Mode • • Privileged EXEC User EXEC Term Definition mstid The ID of the existing MST instance. Interface slot/port STP Mode Indicates whether spanning tree is enabled or disabled on the port. Type Currently not used. STP State The forwarding state of the port in the specified spanning tree instance. Port Role The role of the specified port within the spanning tree. Desc Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop guard feature is not available. show spanning-tree mst summary This command displays summary information about all multiple spanning tree instances in the switch. On execution, the following details are displayed. Format show spanning-tree mst summary Mode • • Privileged EXEC User EXEC Switching Commands 44 M4100 Series ProSAFE Managed Switches Term Definition MST Instance ID List of multiple spanning trees IDs currently configured. List For each MSTID: • Associated • FIDs • • Associated VLANs List of forwarding database identifiers associated with this instance. List of VLAN IDs associated with this instance. show spanning-tree summary This command displays spanning tree settings and parameters for the switch. The following details are displayed on execution of the command. Format show spanning-tree summary Mode • • Privileged EXEC User EXEC Term Definition Spanning Tree Adminmode Enabled or disabled. Spanning Tree Version Version of 802.1 currently supported (IEEE 802.1s, IEEE 802.1w, or IEEE 802.1d) based upon the Force Protocol Version parameter. BPDU Guard Mode Enabled or disabled. BPDU Filter Mode Enabled or disabled. Configuration Name Identifier used to identify the configuration currently being used. Configuration Revision Level Identifier used to identify the configuration currently being used. Configuration Digest Key A generated Key used in the exchange of the BPDUs. Configuration Format Selector Specifies the version of the configuration format being used in the exchange of BPDUs. The default value is zero. MST Instances List of all multiple spanning tree instances configured on the switch. Switching Commands 45 M4100 Series ProSAFE Managed Switches show spanning-tree vlan This command displays the association between a VLAN and a multiple spanning tree instance. The <vlanid> corresponds to an existing VLAN ID. Format show spanning-tree vlan <vlanid> Mode • • Privileged EXEC User EXEC Term Definition VLAN Identifier The VLANs associated with the selected MST instance. Associated Instance Identifier for the associated multiple spanning tree instance or “CST” if associated with the Common and Internal Spanning Tree. VLAN Commands This section describes the commands you use to configure VLAN settings. vlan database This command gives you access to the VLAN Config mode, which allows you to configure VLAN characteristics. Format vlan database Mode Privileged EXEC network mgmt_vlan This command configures the Management VLAN ID. Default 1 Format network mgmt_vlan <1-4093> Mode Privileged EXEC no network mgmt_vlan This command sets the Management VLAN ID to the default. Format no network mgmt_vlan Mode Privileged EXEC Switching Commands 46 M4100 Series ProSAFE Managed Switches vlan This command creates a new VLAN and assigns it an ID. The ID is a valid VLAN identification number (ID 1 is reserved for the default VLAN). The vlan-list contains VlanId's in range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use '-' for range. Format vlan <vlan-list> Mode VLAN Config no vlan This command deletes an existing VLAN. The ID is a valid VLAN identification number (ID 1 is reserved for the default VLAN). The vlan-list contains VlanId's in range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use '-' for range. Format no vlan <vlan-list> Mode VLAN Config vlan acceptframe This command sets the frame acceptance mode per interface. For VLAN Only mode, untagged frames or priority frames received on this interface are discarded. For Admit All mode, untagged frames or priority frames received on this interface are accepted and assigned the value of the interface VLAN ID for this port. With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification. Default all Format vlan acceptframe {untaggedonly | vlanonly | all} Mode Interface Config no vlan acceptframe This command resets the frame acceptance mode for the interface to the default value. Format no vlan acceptframe Mode Interface Config Switching Commands 47 M4100 Series ProSAFE Managed Switches vlan ingressfilter This command enables ingress filtering. If ingress filtering is disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN. Default disabled Format vlan ingressfilter Mode Interface Config no vlan ingressfilter This command disables ingress filtering. If ingress filtering is disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN. Format no vlan ingressfilter Mode Interface Config vlan makestatic This command changes a dynamically created VLAN (one that is created by GVRP registration) to a static VLAN (one that is permanently configured and defined). The ID is a valid VLAN identification number. VLAN range is 2-4093. Format vlan makestatic <2-4093> Mode VLAN Config vlan name This command changes the name of a VLAN. The name is an alphanumeric string of up to 32 characters, and the ID is a valid VLAN identification number. ID range is 1-4093. Default • • Format vlan name <1-4093> <name> Mode VLAN Config VLAN ID 1 - default other VLANS - blank string no vlan name This command sets the name of a VLAN to a blank string. Format no vlan name <1-4093> Mode VLAN Config Switching Commands 48 M4100 Series ProSAFE Managed Switches vlan participation This command configures the degree of participation for a specific interface in a VLAN. The ID is a valid VLAN identification number, and the interface is a valid interface number. Format vlan participation {exclude | include | auto} <1-4093> Mode Interface Config Participation options are: Participation Options Definition include The interface is always a member of this VLAN. This is equivalent to registration fixed. exclude The interface is never a member of this VLAN. This is equivalent to registration forbidden. auto The interface is dynamically registered in this VLAN by GVRP. The interface will not participate in this VLAN unless a join request is received on this interface. This is equivalent to registration normal. vlan participation all This command configures the degree of participation for all interfaces in a VLAN. The ID is a valid VLAN identification number. Format vlan participation all {exclude | include | auto} <1-4093> Mode Global Config You can use the following participation options: Participation Options Definition include The interface is always a member of this VLAN. This is equivalent to registration fixed. exclude The interface is never a member of this VLAN. This is equivalent to registration forbidden. auto The interface is dynamically registered in this VLAN by GVRP. The interface will not participate in this VLAN unless a join request is received on this interface. This is equivalent to registration normal. Switching Commands 49 M4100 Series ProSAFE Managed Switches vlan port acceptframe all This command sets the frame acceptance mode for all interfaces. Default all Format vlan port acceptframe all {vlanonly | all} Mode Global Config The modes defined as follows: Mode Definition VLAN Only mode Untagged frames or priority frames received on this interface are discarded. Admit All mode Untagged frames or priority frames received on this interface are accepted and assigned the value of the interface VLAN ID for this port. With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification. no vlan port acceptframe all This command sets the frame acceptance mode for all interfaces to Admit All. For Admit All mode, untagged frames or priority frames received on this interface are accepted and assigned the value of the interface VLAN ID for this port. With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification. Format no vlan port acceptframe all Mode Global Config vlan port ingressfilter all This command enables ingress filtering for all ports. If ingress filtering is disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN. Default disabled Format vlan port ingressfilter all Mode Global Config Switching Commands 50 M4100 Series ProSAFE Managed Switches no vlan port ingressfilter all This command disables ingress filtering for all ports. If ingress filtering is disabled, frames received with VLAN IDs that do not match the VLAN membership of the receiving interface are admitted and forwarded to ports that are members of that VLAN. Format no vlan port ingressfilter all Mode Global Config vlan port pvid all This command changes the VLAN ID for all interface. Default 1 Format vlan port pvid all <1-4093> Mode Global Config no vlan port pvid all This command sets the VLAN ID for all interfaces to 1. Format no vlan port pvid all Mode Global Config vlan port tagging all This command configures the tagging behavior for all interfaces in a VLAN to enabled. If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN identification number. Format vlan port tagging all <1-4093> Mode Global Config no vlan port tagging all This command configures the tagging behavior for all interfaces in a VLAN to disabled. If tagging is disabled, traffic is transmitted as untagged frames. The ID is a valid VLAN identification number. Format no vlan port tagging all Mode Global Config Switching Commands 51 M4100 Series ProSAFE Managed Switches vlan protocol group This command adds protocol-based VLAN groups to the system. When it is created, the protocol group will be assigned a unique number (1-128) that will be used to identify the group in subsequent commands. Format vlan protocol group <1-128> Mode Global Config no vlan protocol group This command removes a protocol group. Format no vlan protocol group <1-128> Mode Global Config vlan protocol group name This command assigns a name to a protocol-based VLAN group. The groupname variable can be a character string of 0–16 characters. Format vlan protocol group name <1-128> <groupname> Mode Global Config no vlan protocol group name This command removes the name from a protocol-based VLAN group. Format no vlan protocol group name <1-128> Mode Global Config vlan protocol group add protocol This command adds the protocol to the protocol-based VLAN identified by groupid. A group may have more than one protocol associated with it. Each interface and protocol combination can only be associated with one group. If adding a protocol to a group causes any conflicts with interfaces currently associated with the group, this command fails and the protocol is not added to the group. The possible values for protocol-list includes the keywords ip, arp, and ipx and hexadecimal or decimal values ranging from 0x0600 (1536) to 0xFFFF (65535). The protocol list can accept up to 16 protocols separated by a comma. Default none Format vlan protocol group add protocol <groupid> <ethertype> {<protocol-list> | arp | ip | ipx} Mode Global Config Switching Commands 52 M4100 Series ProSAFE Managed Switches no vlan protocol group add protocol This command removes the <protocol> from this protocol-based VLAN group that is identified by this <groupid>. The possible values for protocol are ip, arp, and ipx. Format no vlan protocol group add protocol <groupid> <ethertype> {<protocol-list> | arp | ip | ipx} Mode Global Config protocol group This command attaches a <vlanid> to the protocol-based VLAN identified by <groupid>. A group may only be associated with one VLAN at a time, however the VLAN association can be changed. Default none Format protocol group <groupid> <vlanid> Mode VLAN Config no protocol group This command removes the <vlanid> from this protocol-based VLAN group that is identified by this <groupid>. Format no protocol group <groupid> <vlanid> Mode VLAN Config protocol vlan group This command adds the physical interface to the protocol-based VLAN identified by <groupid>. You can associate multiple interfaces with a group, but you can only associate each interface and protocol combination with one group. If adding an interface to a group causes any conflicts with protocols currently associated with the group, this command fails and the interface(s) are not added to the group. Default none Format protocol vlan group <groupid> Mode Interface Config Switching Commands 53 M4100 Series ProSAFE Managed Switches no protocol vlan group This command removes the interface from this protocol-based VLAN group that is identified by this <groupid>. Format no protocol vlan group <groupid> Mode Interface Config protocol vlan group all This command adds all physical interfaces to the protocol-based VLAN identified by <groupid>. You can associate multiple interfaces with a group, but you can only associate each interface and protocol combination with one group. If adding an interface to a group causes any conflicts with protocols currently associated with the group, this command will fail and the interface(s) will not be added to the group. Default none Format protocol vlan group all <groupid> Mode Global Config no protocol vlan group all This command removes all interfaces from this protocol-based VLAN group that is identified by this <groupid>. Format no protocol vlan group all <groupid> Mode Global Config vlan pvid This command changes the VLAN ID per interface. Default 1 Format vlan pvid <1-4093> Mode Interface Config no vlan pvid This command sets the VLAN ID per interface to 1. Format no vlan pvid Mode Interface Config Switching Commands 54 M4100 Series ProSAFE Managed Switches vlan tagging This command configures the tagging behavior for a specific interface in a VLAN to enabled. If tagging is enabled, traffic is transmitted as tagged frames. If tagging is disabled, traffic is transmitted as untagged frames. The vlan-list contains VlanId's in range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use '-' for range. Format vlan tagging <vlan-list> Mode Interface Config no vlan tagging This command configures the tagging behavior for a specific interface in a VLAN to disabled. If tagging is disabled, traffic is transmitted as untagged frames. The vlan-list contains VlanId's in range <1-4093>. Separate non-consecutive IDs with ',' and no spaces and no zeros in between the range; Use '-' for range. Format no vlan tagging <vlan-list> Mode Interface Config vlan association subnet This command associates a VLAN to a specific IP-subnet. Format vlan association subnet <ipaddr> <netmask> <1-4093> Mode VLAN Config no vlan association subnet This command removes association of a specific IP-subnet to a VLAN. Format no vlan association subnet <ipaddr> <netmask> Mode VLAN Config vlan association mac This command associates a MAC address to a VLAN. Format vlan association mac <macaddr> <1-4093> Mode VLAN database Switching Commands 55 M4100 Series ProSAFE Managed Switches no vlan association mac This command removes the association of a MAC address to a VLAN. Format no vlan association mac <macaddr> Mode VLAN database remote-span This command identifies the VLAN as the RSPAN VLAN. Format remote span Mode VLAN configuration show vlan This command displays a list of all configured VLANs or detailed information for a specific VLAN. Format show vlan [<vlanid>] Mode • • Privileged EXEC User EXEC Term Definition VLAN ID A VLAN Identifier (VID) is associated with each VLAN. The range of the VLAN ID is 1–4093. VLAN Name A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric characters long, including blanks. The default is blank. VLAN ID 1 always has a name of “Default.” This field is optional. VLAN Type Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and permanently defined), or Dynamic (one that is created by GVRP registration). Switching Commands 56 M4100 Series ProSAFE Managed Switches If you enter the optional <vlanid> parameter, the command output also displays detailed information, including interface information, for a specific VLAN. The ID is a valid VLAN identification number. Term Definition Interface Valid slot and port number separated by forward slashes. It is possible to set the parameters for all ports by using the selectors on the top line. Current The degree of participation of this port in this VLAN. The permissible values are: • Include - This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE 802.1Q standard. • Exclude - This port is never a member of this VLAN. This is equivalent to registration forbidden in the IEEE 802.1Q standard. • Autodetect - To allow the port to be dynamically registered in this VLAN via GVRP. The port will not participate in this VLAN unless a join request is received on this port. This is equivalent to registration normal in the IEEE 802.1Q standard. Configured The configured degree of participation of this port in this VLAN. The permissible values are: • Include - This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE 802.1Q standard. • Exclude - This port is never a member of this VLAN. This is equivalent to registration forbidden in the IEEE 802.1Q standard. • Autodetect - To allow the port to be dynamically registered in this VLAN via GVRP. The port will not participate in this VLAN unless a join request is received on this port. This is equivalent to registration normal in the IEEE 802.1Q standard. Tagging The tagging behavior for this port in this VLAN. • Tagged - Transmit traffic for this VLAN as tagged frames. • Untagged - Transmit traffic for this VLAN as untagged frames. show vlan brief This command displays a list of all configured VLANs. Format show vlan brief Mode • • Privileged EXEC User EXEC show vlan port This command displays VLAN port information. Format show vlan port {<slot/port> | all} Mode • • Privileged EXEC User EXEC Switching Commands 57 M4100 Series ProSAFE Managed Switches Term Definition Interface Valid slot and port number separated by forward slashes. It is possible to set the parameters for all ports by using the selectors on the top line. Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port. The value must be for an existing VLAN. The factory default is 1. Acceptable Frame Types The types of frames that may be received on this port. The options are 'VLAN only' and 'Admit All'. When set to 'VLAN only', untagged frames or priority tagged frames received on this port are discarded. When set to 'Admit All', untagged frames or priority tagged frames received on this port are accepted and assigned the value of the Port VLAN ID for this port. With either option, VLAN tagged frames are forwarded in accordance to the 802.1Q VLAN specification. Ingress Filtering May be enabled or disabled. When enabled, the frame is discarded if this port is not a member of the VLAN with which this frame is associated. In a tagged frame, the VLAN is identified by the VLAN ID in the tag. In an untagged frame, the VLAN is the Port VLAN ID specified for the port that received this frame. When disabled, all frames are forwarded in accordance with the 802.1Q VLAN bridge specification. The factory default is disabled. GVRP May be enabled or disabled. Default Priority The 802.1p priority assigned to tagged packets arriving on the port. show vlan association subnet This command displays the VLAN associated with a specific configured IP-Address and net mask. If no IP address and net mask are specified, the VLAN associations of all the configured IP-subnets are displayed. Format show vlan association subnet [<ipaddr> <netmask>] Mode Privileged EXEC Term Definition IP Subnet The IP address assigned to each interface. IP Mask The subnet mask. VLAN ID A VLAN Identifier (VID) is associated with each VLAN. show vlan association mac This command displays the VLAN associated with a specific configured MAC address. If no MAC address is specified, the VLAN associations of all the configured MAC addresses are displayed. Format show vlan association mac [<macaddr>] Mode Privileged EXEC Switching Commands 58 M4100 Series ProSAFE Managed Switches Term Definition MAC Address A MAC address for which the switch has forwarding and or filtering information. The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as 8 bytes. VLAN ID A VLAN Identifier (VID) is associated with each VLAN. Switch Port Commands This section describes the commands used for switch port mode. switchport mode Use this command to configure the mode of a switch port as access, trunk, or general: • Trunk mode. In trunk mode, the port becomes a member of all VLANs on the switch unless specified in the allowed list in the switchport trunk allowed vlan command. The PVID of the port is set to the native VLAN as specified in the switchport trunk native vlan command. This means that trunk ports accept both tagged and untagged packets. Untagged packets are processed on the native VLAN and tagged packets are processed on the VLAN for which the ID is contained in the packet. MAC learning is performed on both tagged and untagged packets. Tagged packets that are received with a VLAN ID of which the port is not a member are discarded and MAC learning is not performed. The trunk ports always transmit packets untagged on a native VLAN. • Access mode. In access mode, the port becomes a member of only one VLAN. The port sends and receives untagged traffic. The port can also receive tagged traffic. Ingress filtering is enabled on the port. This means that when the VLAN ID of a received packet is not identical to the access VLAN ID, the packet is discarded. • General mode. In general mode, you can perform custom configuration of the VLAN membership, PVID, tagging, ingress filtering, and so on. The general mode is legacy behavior of the switch port configuration and you use legacy CLI commands to configure the port in general mode. Default General mode Format switchport mode {access | trunk | general} Mode Interface Config Switching Commands 59 M4100 Series ProSAFE Managed Switches no switchport mode This command resets the switch port mode to its default value. Format no switchport mode Mode Interface Config switchport trunk allowed vlan Use this command to configure the list of allowed VLANs that can receive and send traffic on this interface in tagged format when in trunking mode. The default is all. You can modify the VLAN list by using the add and remove options and replace the VLAN list with another list by using the all or except options. If you use the all option, all VLANs are added to the list of allowed VLANs. The except option provides an exclusion list. Default all Format switchport trunk allowed vlan {<vlan-list> | all | {add <vlan-list>} | {remove <vlan-list>} | {except <vlan-list>}} Mode Interface Config Parameter Description all Specifies all VLANs from 1 to 4093. This keyword is not allowed for commands that do not permit all VLANs in the list to be set at the same time. add Adds the defined list of VLANs to those currently set instead of replacing the list. remove Removes the defined list of VLANs from those currently set instead of replacing the list. Valid IDs are from 1 to 4093. Extended-range VLAN IDs of the form XY or X,Y,Z are valid in this command except Lists the VLANs that must be calculated by inverting the defined list of VLANs. (VLANs are added except the ones specified.) <vlan-list> Either a single VLAN number from 1 to 4093 or a continuous range of VLANs described by two VLAN numbers, the lesser one first, separated by a hyphen. no switchport trunk allowed vlan This command resets the list of allowed VLANs on the trunk port to its default value. Format no switchport trunk allowed vlan Mode Interface Config switchport trunk native vlan Use this command to configure the trunk port native VLAN (PVID) parameter of the switch port. Any ingress untagged packets on the port are tagged with the value of the native VLAN. Switching Commands 60 M4100 Series ProSAFE Managed Switches The native VLAN must be in the allowed VLAN list for tagging of received untagged packets. Otherwise, untagged packets are discarded. Packets marked with the native VLAN are transmitted untagged from the trunk port. The default ID is 1, the default VLAN. Default 1 (default VLAN) Format switchport trunk native vlan <vlan-id> Mode Interface Config no switchport trunk native vlan Use this command to reset the trunk mode native VLAN of the switch port to its default value. Format no switchport trunk native vlan Mode Interface Config switchport access vlan Use this command to configure the VLAN on the access port. You can assign one VLAN only to the access port. The access port is member of VLAN 1 by default. You can assign the access port to a VLAN other than VLAN 1. If you remove the access VLAN on the switch, the access port becomes a member of VLAN 1. If you configure the access port as a member of a VLAN that does not exist, an error occurs and the configuration does not change. Default 1 (default VLAN) Format switchport access vlan <vlan-id> Mode Interface Config no switchport access vlan This command resets the switch port access mode VLAN to its default value. Format no switchport access vlan Mode Interface Config show interfaces switchport Use this command to either display the switch port status for all interfaces, for a specific interface, or for a specific mode (access, trunk, or general). If you select a mode but do not specify the interface for the mode, the selected mode is displayed for all interfaces. Format show interfaces switchport {[<slot/port>] | {access | trunk | general} [<slot/port>]} Mode Privileged EXEC Switching Commands 61 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show interfaces switchport 1/0 Port: 1/0 VLAN Membership Mode: General Access Mode VLAN: 1 (default) General Mode PVID: 1 (default) General Mode Ingress Filtering: Disabled General Mode Acceptable Frame Type: Admit all General Mode Dynamically Added VLANs: General Mode Untagged VLANs: 1 General Mode Tagged VLANs: General Mode Forbidden VLANs: Trunking Mode Native VLAN: 1 (default) Trunking Mode Native VLAN tagging: Disable Trunking Mode VLANs Enabled: All Protected Port: False Command example: (NETGEAR Switch) #show interfaces switchport access 1/0 Intf PVID --------- ---1/0 1 Command example: (NETGEAR Switch) #show interfaces switchport trunk 1/6 Intf PVID Allowed Vlans List --------- ----- ------------------1/6 1 All Command example: (NETGEAR Switch) #show interfaces switchport general 1/5 Intf PVID Ingress Filtering --------- ----- ---------1/5 1 Enabled Acceptable Frame Type ----------Admit All Untagged Vlans --------7 Tagged Vlans --------10-50,55 Switching Commands 62 Forbidden Vlans --------9,100-200 Dynamic Vlans --------88,96 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show interfaces switchport general Intf PVID Ingress Filtering --------- ----- ---------1/0/1 1 Enabled 1/0/2 1 Disabled Acceptable Frame Type ----------Admit All Admit All Untagged Vlans --------1,4-7 1 Tagged Vlans --------30-40,55 30-40,55 Forbidden Vlans --------3,100-200 none Dynamic Vlans --------88,96 none Double VLAN Commands This section describes the commands you use to configure double VLAN (DVLAN). Double VLAN tagging is a way to pass VLAN traffic from one customer domain to another through a Metro Core in a simple and cost effective manner. The additional tag on the traffic helps differentiate between customers in the MAN while preserving the VLAN identification of the individual customers when they enter their own 802.1Q domain. dvlan-tunnel ethertype This command configures the ether-type for all interfaces. The ether-type may have the values of 802.1Q, vman, or custom. If the ether-type has a value of custom, the optional value of the custom ether type must be set to a value from 0 to 65535. Default vman Format dvlan-tunnel ethertype {802.1Q | vman | custom} [<0-65535>] Mode Global Config mode dot1q-tunnel This command is used to enable Double VLAN Tunneling on the specified interface. Default disabled Format mode dot1q-tunnel Mode Interface Config no mode dot1q-tunnel This command is used to disable Double VLAN Tunneling on the specified interface. By default, Double VLAN Tunneling is disabled. Format no mode dot1q-tunnel Mode Interface Config Switching Commands 63 M4100 Series ProSAFE Managed Switches mode dvlan-tunnel Use this command to enable Double VLAN Tunneling on the specified interface. Note: When you use the mode dvlan-tunnel command on an interface, it becomes a service provider port. Ports that do not have double VLAN tunneling enabled are customer ports. Default disabled Format mode dvlan-tunnel Mode Interface Config no mode dvlan-tunnel This command is used to disable Double VLAN Tunneling on the specified interface. By default, Double VLAN Tunneling is disabled. Format no mode dvlan-tunnel Mode Interface Config show dot1q-tunnel Use this command without the optional parameters to display all interfaces enabled for Double VLAN Tunneling. Use the optional parameters to display detailed information about Double VLAN Tunneling for the specified interface or all interfaces. Format show dot1q-tunnel [interface {<slot/port> | all}] Mode • • Privileged EXEC User EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Mode The administrative mode through which Double VLAN Tunneling can be enabled or disabled. The default value for this field is disabled. EtherType A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are three different EtherType tags. The first is 802.1Q, which represents the commonly used value of 0x8100. The second is vMAN, which represents the commonly used value of 0x88A8. If EtherType is not one of these two values, it is a custom tunnel value, representing any value in the range of 0–65535. Switching Commands 64 M4100 Series ProSAFE Managed Switches show dvlan-tunnel Use this command without the optional parameters to display all interfaces enabled for Double VLAN Tunneling. Use the optional parameters to display detailed information about Double VLAN Tunneling for the specified interface or all interfaces. Format show dvlan-tunnel [interface {<slot/port> | all}] Mode • • Privileged EXEC User EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Mode The administrative mode through which Double VLAN Tunneling can be enabled or disabled. The default value for this field is disabled. EtherType A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are three different EtherType tags. The first is 802.1Q, which represents the commonly used value of 0x8100. The second is vMAN, which represents the commonly used value of 0x88A8. If EtherType is not one of these two values, it is a custom tunnel value, representing any value in the range of 0–65535. Voice VLAN Commands This section describes the commands you use for Voice VLAN. Voice VLAN enables switch ports to carry voice traffic with defined priority to enable separation of voice and data traffic coming onto the port. The benefits of using Voice VLAN is to ensure that the sound quality of an IP phone could be safeguarded from deteriorating when the data traffic on the port is high. Also the inherent isolation provided by VLANs ensures that inter-VLAN traffic is under management control and that network- attached clients cannot initiate a direct attack on voice components. QoS-based on IEEE 802.1P Class of Service (CoS) uses classification and scheduling to sent network traffic from the switch in a predictable manner. The system uses the source MAC of the traffic traveling through the port to identify the IP phone data flow. voice vlan (Global Config) Use this command to enable the Voice VLAN capability on the switch. Default disabled Format voice vlan Mode Global Config Switching Commands 65 M4100 Series ProSAFE Managed Switches no voice vlan (Global Config) Use this command to disable the Voice VLAN capability on the switch. Format no voice vlan Mode Global Config voice vlan (Interface Config) Use this command to enable the Voice VLAN capability on the interface. Default disabled Format voice vlan {<id> | dot1p <priority> | none | untagged} Mode Interface Config You can configure Voice VLAN in any of the following ways: Parameter Description vlan-id Configure the IP phone to forward all voice traffic through the specified VLAN. Valid VLAN IDs are from 1 to 4093 (the maximum supported by the platform). dot1p Configure the IP phone to use 802.1p priority tagging for voice traffic and to use the default native VLAN (VLAN 0) to carry all traffic. Valid <priority> range is 0–7. none Allow the IP phone to use its own configuration to send untagged voice traffic. untagged Configure the phone to send untagged voice traffic. no voice vlan (Interface Config) Use this command to disable the Voice VLAN capability on the interface. Format no voice vlan Mode Interface Config voice vlan data priority Use this command to either trust or untrust the data traffic arriving on the Voice VLAN port. Default trust Format voice vlan data priority {untrust | trust} Mode Interface Config Switching Commands 66 M4100 Series ProSAFE Managed Switches show voice vlan Format show voice vlan [interface {<slot/port> | all}] Mode Privileged EXEC When the interface parameter is not specified, only the global mode of the Voice VLAN is displayed. Term Definition Administrative Mode The Global Voice VLAN mode. When the interface is specified: Term Definition Voice VLAN Interface Mode The admin mode of the Voice VLAN on the interface. Voice VLAN ID The Voice VLAN ID Voice VLAN Priority The do1p priority for the Voice VLAN on the port. Voice VLAN Untagged The tagging option for the Voice VLAN traffic. Voice VLAN CoS Override The Override option for the voice traffic arriving on the port. Voice VLAN Status The operational status of Voice VLAN on the port. Provisioning (IEEE 802.1p) Commands This section describes the commands you use to configure provisioning, which allows you to prioritize ports. vlan port priority all This command configures the port priority assigned for untagged packets for all ports presently plugged into the device. The range for the priority is 0-7. Any subsequent per port configuration will override this configuration setting. Format vlan port priority all <priority> Mode Global Config Switching Commands 67 M4100 Series ProSAFE Managed Switches vlan priority This command configures the default 802.1p port priority assigned for untagged packets for a specific interface. The range for the priority is 0–7. Default 0 Format vlan priority <priority> Mode Interface Config Protected Ports Commands This section describes commands you use to configure and view protected ports on a switch. Protected ports do not forward traffic to each other, even if they are on the same VLAN. However, protected ports can forward traffic to all unprotected ports in their group. Unprotected ports can forward traffic to both protected and unprotected ports. Ports are unprotected by default. If an interface is configured as a protected port, and you add that interface to a Port Channel or link aggregation group (LAG), the protected port status becomes operationally disabled on the interface, and the interface follows the configuration of the LAG port. However, the protected port configuration for the interface remains unchanged. Once the interface is no longer a member of a LAG, the current configuration for that interface automatically becomes effective. switchport protected (Global Config) Use this command to create a protected port group. The <groupid> parameter identifies the set of protected ports. Use the name <name> pair to assign a name to the protected port group. The name can be up to 32 alphanumeric characters long, including blanks. The default is blank. Note: Port protection occurs within a single switch. Protected port configuration does not affect traffic between ports on two different switches. No traffic forwarding is possible between two protected ports. Format switchport protected <groupid> name <name> Mode Global Config Switching Commands 68 M4100 Series ProSAFE Managed Switches no switchport protected (Global Config) Use this command to remove a protected port group. The <groupid> parameter identifies the set of protected ports. Use the name keyword to remove the name from the group. Format NO switchport protected <groupid> name Mode Global Config switchport protected (Interface Config) Use this command to add an interface to a protected port group. The <groupid> parameter identifies the set of protected ports to which this interface is assigned. You can only configure an interface as protected in one group. Note: Port protection occurs within a single switch. Protected port configuration does not affect traffic between ports on two different switches. No traffic forwarding is possible between two protected ports. Default unprotected Format switchport protected <groupid> Mode Interface Config no switchport protected (Interface Config) Use this command to configure a port as unprotected. The <groupid> parameter identifies the set of protected ports to which this interface is assigned. Format no switchport protected <groupid> Mode Interface Config show switchport protected This command displays the status of all the interfaces, including protected and unprotected interfaces. Format show switchport protected <groupid> Mode • • Privileged EXEC User EXEC Switching Commands 69 M4100 Series ProSAFE Managed Switches Term Definition Group ID The number that identifies the protected port group. Name An optional name of the protected port group. The name can be up to 32 alphanumeric characters long, including blanks. The default is blank. List of Physical Ports List of ports, which are configured as protected for the group identified with <groupid>. If no port is configured as protected for this group, this field is blank. show interfaces switchport (for a group ID) This command displays the status of the interface (protected/unprotected) under the groupid. Format show interfaces switchport <slot/port> <groupid> Mode • • Privileged EXEC User EXEC Term Definition Name A string associated with this group as a convenience. It can be up to 32 alphanumeric characters long, including blanks. The default is blank. This field is optional. Protected port Indicates whether the interface is protected or not. It shows TRUE or FALSE. If the group is a multiple groups then, it shows TRUE in Group <groupid>. Private VLAN Commands The Private VLANs feature separates a regular VLAN domain into two or more subdomains. Each subdomain is defined (represented) by a primary VLAN and a secondary VLAN. The primary VLAN ID is the same for all subdomains that belong to a private VLAN. The secondary VLAN ID differentiates subdomains from each other and provides Layer 2 isolation between ports of the same private VLAN. The types of VLANs within a private VLAN are as follows: • Primary VLAN—Forwards the traffic from the promiscuous ports to isolated ports, community ports, and other promiscuous ports in the same private VLAN. Only one primary VLAN can be configured per private VLAN. All ports within a private VLAN share primary VLAN. • Isolated VLAN—A secondary VLAN that carries traffic from isolated ports to promiscuous ports. Only one isolated VLAN can be configured per private VLAN. • Community VLAN—A secondary VLAN that forwards traffic between ports that belong to the same community and the promiscuous ports. There can be multiple community VLANs per private VLAN. Switching Commands 70 M4100 Series ProSAFE Managed Switches Three types of port designations exist within a private VLAN: • Promiscuous Ports—An endpoint connected to a promiscuous port is allowed to communicate with any endpoint within the private VLAN. Multiple promiscuous ports can be defined for a single private VLAN domain. • Isolated Ports—An endpoint connected to an isolated port is allowed to communicate with endpoints connected to promiscuous ports only. Endpoints connected to adjacent isolated ports cannot communicate with each other. • Community Ports—An endpoint connected to a community port is allowed to communicate with the endpoints within a community and with any configured promiscuous port. The endpoints that belong to one community cannot communicate with endpoints that belong to a different community or with endpoints connected to isolated ports. The Private VLANs can be extended across multiple switches through inter-switch/stack links that transport primary, community, and isolated VLANs between devices. switchport private-vlan This command is used to define a private-VLAN association for an isolated or community port or a mapping for a promiscuous port. Format switchport private-vlan {host-association <primary-vlan-id> <secondary-vlan-id> | mapping <primary-vlan-id> {add | remove} <secondary-vlan-list>} Mode Interface Config Parameter Definition host-association Defines VLAN association for community or host ports. <primary-vlan-id> Primary VLAN ID of a private VLAN. secondary-vlan-id Secondary (isolated or community) VLAN ID of a private VLAN. mapping Defines the private VLAN mapping for promiscuous ports. add Associates the secondary VLAN with the primary one. remove Deletes the secondary VLANs from the primary VLAN association. <secondary-vlan-list> A list of secondary VLANs to be mapped to a primary VLAN. no switchport private-vlan This command is used to remove the private-VLAN association or mapping from the port. Format no switchport private-vlan {host-association | mapping} Mode Interface Config Switching Commands 71 M4100 Series ProSAFE Managed Switches switchport mode private-vlan This command is used to configure a port as a promiscuous or host private VLAN port. Note that the properties of each mode can be configured even when the switch is not in that mode. However, they will only be applicable once the switch is in that particular mode. Format switchport mode private-vlan {host | promiscuous} Mode Interface Config Default General Parameter Definition host Configures an interface as a private VLAN host port. It can be either isolated or community port depending on the secondary VLAN it is associated with. promiscuous Configures an interface as a private VLAN promiscuous port. The promiscuous ports are members of the primary VLAN. no switchport mode This command is used to remove the private-VLAN association or mapping from the port. Format no switchport mode private-vlan Mode Interface Config private-vlan This command is used to configure the private VLANs and to configure the association between the primary private VLAN and secondary VLANs. Format private-vlan {association [add | remove] <secondary-vlan-list> | community | isolated | primary} Mode VLAN Config Parameter Definition association Associates the primary and secondary VLAN. <secondary-vlan-list> A list of secondary VLANs to be mapped to a primary VLAN. community Designates a VLAN as a community VLAN. isolated Designates a VLAN as the isolated VLAN. primary Designates a VLAN as the primary VLAN. Switching Commands 72 M4100 Series ProSAFE Managed Switches no private-vlan This command is used to restore normal VLAN configuration. Format no private-vlan {association} Mode VLAN Config vlan (Private VLAN) Use this command to enter the private vlan configuration. The VLAN range is 1-4094. Format vlan <vlan-list> Mode Global Config show vlan private-vlan This command displays information about the configured private VLANs including primary and secondary VLAN IDs, type (community, isolated, or primary) and the ports that belong to a private VLAN. Format show vlan private-vlan [type] Mode • • Privileged EXEC User EXEC Term Definition Private -vlan Displays information about the configured private VLANs type Displays only private VLAN ID and its type. Primary Displays primary VLAN ID Secondary Displays secondary VLAN ID Type Displays secondary VLAN type Ports Displays ports which are associated with a private VLAN show interface ethernet switchport This command displays the private VLAN mapping information for the switch interfaces. Format show interface ethernet <slot/port> switchport Mode • • Privileged EXEC User EXEC Switching Commands 73 M4100 Series ProSAFE Managed Switches Term Definition Private-vlan host-association Displays VLAN association for the private-VLAN host ports. Private-vlan mapping Displays VLAN mapping for the private-VLAN promiscuous ports GARP Commands This section describes the commands you use to configure Generic Attribute Registration Protocol (GARP) and view GARP status. The commands in this section affect both GARP VLAN Registration Protocol (GVRP) and Garp Multicast Registration Protocol (GMRP). GARP is a protocol that allows client stations to register with the switch for membership in VLANS (by using GVMP) or multicast groups (by using GVMP). set garp timer join This command sets the GVRP join time for one port (Interface Config mode) or all (Global Config mode) and per GARP. Join time is the interval between the transmission of GARP Protocol Data Units (PDUs) registering (or re-registering) membership for a VLAN or multicast group. This command has an effect only when GVRP is enabled. The time is from 10 to 100 (centiseconds). The value 20 centiseconds is 0.2 seconds. Default 20 Format set garp timer join <10-100> Mode • • Interface Config Global Config no set garp timer join This command sets the GVRP join time (for one or all ports and per GARP) to the default and only has an effect when GVRP is enabled. Format no set garp timer join Mode • • Interface Config Global Config set garp timer leave This command sets the GVRP leave time for one port (Interface Config mode) or all ports (Global Config mode) and only has an effect when GVRP is enabled. Leave time is the time to wait after receiving a unregister request for a VLAN or a multicast group before deleting the VLAN entry. This can be considered a buffer time for another station to assert registration for the same attribute in order to maintain uninterrupted service. The leave time is 20–600 (centiseconds). The value 60 centiseconds is 0.6 seconds. Switching Commands 74 M4100 Series ProSAFE Managed Switches Default 60 Format set garp timer leave <20-600> Mode • • Interface Config Global Config no set garp timer leave This command sets the GVRP leave time on all ports or a single port to the default and only has an effect when GVRP is enabled. Format no set garp timer leave Mode • • Interface Config Global Config set garp timer leaveall This command sets how frequently Leave All PDUs are generated. A Leave All PDU indicates that all registrations will be unregistered. Participants would need to rejoin in order to maintain registration. The value applies per port and per GARP participation. The time may range from 200 to 6000 (centiseconds). The value 1000 centiseconds is 10 seconds. You can use this command on all ports (Global Config mode) or a single port (Interface Config mode), and it only has an effect only when GVRP is enabled. Default 1000 Format set garp timer leaveall <200-6000> Mode • • Interface Config Global Config no set garp timer leaveall This command sets how frequently Leave All PDUs are generated the default and only has an effect when GVRP is enabled. Format no set garp timer leaveall Mode • • Interface Config Global Config Switching Commands 75 M4100 Series ProSAFE Managed Switches show garp This command displays GARP information. Format show garp Mode • • Privileged EXEC User EXEC Term Definition GMRP Admin Mode The administrative mode of GARP Multicast Registration Protocol (GMRP) for the system. GVRP Admin Mode The administrative mode of GARP VLAN Registration Protocol (GVRP) for the system. GVRP Commands This section describes the commands you use to configure and view GARP VLAN Registration Protocol (GVRP) information. GVRP-enabled switches exchange VLAN configuration information, which allows GVRP to provide dynamic VLAN creation on trunk ports and automatic VLAN pruning. Note: If GVRP is disabled, the system does not forward GVRP messages. set gvrp adminmode This command enables GVRP on the system. Default disabled Format set gvrp adminmode Mode Privileged EXEC no set gvrp adminmode This command disables GVRP. Format no set gvrp adminmode Mode Privileged EXEC Switching Commands 76 M4100 Series ProSAFE Managed Switches set gvrp interfacemode This command enables GVRP on a single port (Interface Config mode) or all ports (Global Config mode). Default disabled Format set gvrp interfacemode Mode • • Interface Config Global Config no set gvrp interfacemode This command disables GVRP on a single port (Interface Config mode) or all ports (Global Config mode). If GVRP is disabled, Join Time, Leave Time, and Leave All Time have no effect. Format no set gvrp interfacemode Mode • • Interface Config Global Config show gvrp configuration This command displays Generic Attributes Registration Protocol (GARP) information for one or all interfaces. Format show gvrp configuration {<slot/port> | all} Mode • • Privileged EXEC User EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Join Timer The interval between the transmission of GARP PDUs registering (or re-registering) membership for an attribute. Current attributes are a VLAN or multicast group. There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 10–100 centiseconds (0.1 to 1.0 seconds). The factory default is 20 centiseconds (0.2 seconds). The finest granularity of specification is one centisecond (0.01 seconds). Leave Timer The period of time to wait after receiving an unregister request for an attribute before deleting the attribute. Current attributes are a VLAN or multicast group. This may be considered a buffer time for another station to assert registration for the same attribute in order to maintain uninterrupted service. There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 20–600 centiseconds (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds). Switching Commands 77 M4100 Series ProSAFE Managed Switches Term Definition LeaveAll Timer This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll PDU indicates that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. There is an instance of this timer on a per-Port, per-GARP participant basis. The Leave All Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. Permissible values are 200–6000 centiseconds (2–60 seconds). The factory default is 1000 centiseconds (10 seconds). Port GVMRP Mode The GVRP administrative mode for the port, which is enabled or disabled (default). If this parameter is disabled, Join Time, Leave Time, and Leave All Time have no effect. GMRP Commands This section describes the commands you use to configure and view GARP Multicast Registration Protocol (GMRP) information. Like IGMP snooping, GMRP helps control the flooding of multicast packets. GMRP-enabled switches dynamically register and deregister group membership information with the MAC networking devices attached to the same segment. GMRP also allows group membership information to propagate across all networking devices in the bridged LAN that support Extended Filtering Services. Note: If GMRP is disabled, the system does not forward GMRP messages. set gmrp adminmode This command enables GARP Multicast Registration Protocol (GMRP) on the system. Default disabled Format set gmrp adminmode Mode Privileged EXEC no set gmrp adminmode This command disables GARP Multicast Registration Protocol (GMRP) on the system. Format no set gmrp adminmode Mode Privileged EXEC set gmrp interfacemode This command enables GARP Multicast Registration Protocol on a single interface (Interface Config mode) or all interfaces (Global Config mode). If an interface which has GARP enabled is enabled for routing or is enlisted as a member of a port-channel (LAG), GARP functionality is disabled on that interface. GARP functionality is subsequently re-enabled if routing is Switching Commands 78 M4100 Series ProSAFE Managed Switches disabled and port-channel (LAG) membership is removed from an interface that has GARP enabled. Default disabled Format set gmrp interfacemode Mode • • Interface Config Global Config no set gmrp interfacemode This command disables GARP Multicast Registration Protocol on a single interface or all interfaces. If an interface which has GARP enabled is enabled for routing or is enlisted as a member of a port-channel (LAG), GARP functionality is disabled. GARP functionality is subsequently re-enabled if routing is disabled and port-channel (LAG) membership is removed from an interface that has GARP enabled. Format no set gmrp interfacemode Mode • • Interface Config Global Config show gmrp configuration This command displays Generic Attributes Registration Protocol (GARP) information for one or all interfaces. Format show gmrp configuration {<slot/port> | all} Mode • • Privileged EXEC User EXEC Term Definition Interface The slot/port of the interface that this row in the table describes. Join Timer The interval between the transmission of GARP PDUs registering (or re-registering) membership for an attribute. Current attributes are a VLAN or multicast group. There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 10–100 centiseconds (0.1 to 1.0 seconds). The factory default is 20 centiseconds (0.2 seconds). The finest granularity of specification is 1 centisecond (0.01 seconds). Leave Timer The period of time to wait after receiving an unregister request for an attribute before deleting the attribute. Current attributes are a VLAN or multicast group. This may be considered a buffer time for another station to assert registration for the same attribute in order to maintain uninterrupted service. There is an instance of this timer on a per-Port, per-GARP participant basis. Permissible values are 20–600 centiseconds (0.2 to 6.0 seconds). The factory default is 60 centiseconds (0.6 seconds). Switching Commands 79 M4100 Series ProSAFE Managed Switches Term Definition LeaveAll Timer This Leave All Time controls how frequently LeaveAll PDUs are generated. A LeaveAll PDU indicates that all registrations will shortly be deregistered. Participants will need to rejoin in order to maintain registration. There is an instance of this timer on a per-Port, per-GARP participant basis. The Leave All Period Timer is set to a random value in the range of LeaveAllTime to 1.5*LeaveAllTime. Permissible values are 200–6000 centiseconds (2–60 seconds). The factory default is 1000 centiseconds (10 seconds). Port GMRP Mode The GMRP administrative mode for the port. It may be enabled or disabled. If this parameter is disabled, Join Time, Leave Time, and Leave All Time have no effect. show mac-address-table gmrp This command displays the GMRP entries in the Multicast Forwarding Database (MFDB) table. Format show mac-address-table gmrp Mode Privileged EXEC Term Definition Mac Address A unicast MAC address for which the switch has forwarding and or filtering information. The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB. In an IVL system the MAC address is displayed as 8 bytes. Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to the table as a result of a learning process or protocol. Description The text description of this multicast table entry. Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:). Port-Based Network Access Control Commands This section describes the commands you use to configure port-based network access control (802.1x). Port-based network access control allows you to permit access to network services only to and devices that are authorized and authenticated. clear dot1x statistics This command resets the 802.1x statistics for the specified port or for all ports. Format clear dot1x statistics {<slot/port> | all} Mode Privileged EXEC Switching Commands 80 M4100 Series ProSAFE Managed Switches clear radius statistics This command is used to clear all RADIUS statistics. Format clear radius statistics Mode Privileged EXEC dot1x eapolflood Use this command to enable EAPOL flood support on the switch. Default Disabled Format dot1x eapolflood Mode Global Config no dot1x eapolflood This command disables EAPOL flooding on the switch. Format no dot1x eapolflood Mode Global Config dot1x guest-vlan This command configures VLAN as guest vlan on a per port basis. The command specifies an active VLAN as an IEEE 802.1x guest VLAN. The range is 1 to the maximum VLAN ID supported by the platform. Default disabled Format dot1x guest-vlan <vlan-id> Mode Interface Config no dot1x guest-vlan This command disables Guest VLAN on the interface. Default disabled Format no dot1x guest-vlan Mode Interface Config Switching Commands 81 M4100 Series ProSAFE Managed Switches dot1x initialize This command begins the initialization sequence on the specified port. This command is only valid if the control mode for the specified port is “auto” or “mac-based”. If the control mode is not “auto” or “mac-based,” an error is returned. Format dot1x initialize <slot/port> Mode Privileged EXEC dot1x mac-auth-bypass This command enables MAC-Based Authentication Bypass (MAB) for 802.1x-unaware clients. MAB provides 802.1x-unaware clients controlled access to the network using the devices’ MAC address as an identifier. This requires that the known and allowable MAC address and corresponding access rights be pre-populated in the authentication server. MAB works only when the port control mode of the port is MAC-based. Format dot1x mac-auth-bypass Mode Interface Config no dot1x mac-auth-bypass This command disables MAB for 802.1x-unaware clients. Format no dot1x mac-auth-bypass Mode Interface Config dot1x max-req This command sets the maximum number of times the authenticator state machine on this port will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant. The <count> value must be in the range 1 - 10. Default 2 Format dot1x max-req <count> Mode Interface Config no dot1x max-req This command sets the maximum number of times the authenticator state machine on this port will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant. Format no dot1x max-req Mode Interface Config Switching Commands 82 M4100 Series ProSAFE Managed Switches dot1x max-users Use this command to set the maximum number of clients supported on the port when MAC-based dot1x authentication is enabled on the port. The maximum users supported per port is dependent on the product. The <count> value is in the range 1 - 48. Default 48 Format dot1x max-users <count> Mode Interface Config no dot1x max-users This command resets the maximum number of clients allowed per port to its default value. Format no dot1x max-req Mode Interface Config dot1x port-control This command sets the authentication mode to use on the specified port. Select force-unauthorized to specify that the authenticator PAE unconditionally sets the controlled port to unauthorized. Select force-authorized to specify that the authenticator PAE unconditionally sets the controlled port to authorized. Select auto to specify that the authenticator PAE sets the controlled port mode to reflect the outcome of the authentication exchanges between the supplicant, authenticator, and the authentication server. If the mac-based option is specified, MAC-based dot1x authentication is enabled on the port. Default auto Format dot1x port-control {force-unauthorized | force-authorized | auto | mac-based} Mode Interface Config no dot1x port-control This command sets the 802.1x port control mode on the specified port to the default value. Format no dot1x port-control Mode Interface Config dot1x port-control all This command sets the authentication mode to use on all ports. Select force-unauthorized to specify that the authenticator PAE unconditionally sets the controlled port to unauthorized. Select force-authorized to specify that the authenticator PAE unconditionally sets the controlled port to authorized. Select auto to specify that the Switching Commands 83 M4100 Series ProSAFE Managed Switches authenticator PAE sets the controlled port mode to reflect the outcome of the authentication exchanges between the supplicant, authenticator, and the authentication server. If the mac-based option is specified, MAC-based dot1x authentication is enabled on the port. Default auto Format dot1x port-control all {force-unauthorized | force-authorized | auto | mac-based} Mode Global Config no dot1x port-control all This command sets the authentication mode on all ports to the default value. Format no dot1x port-control all Mode Global Config dot1x re-authenticate This command begins the re-authentication sequence on the specified port. This command is only valid if the control mode for the specified port is “auto” or “mac-based”. If the control mode is not “auto” or “mac-based”, an error will be returned. Format dot1x re-authenticate <slot/port> Mode Privileged EXEC dot1x re-authentication This command enables re-authentication of the supplicant for the specified port. Default disabled Format dot1x re-authentication Mode Interface Config no dot1x re-authentication This command disables re-authentication of the supplicant for the specified port. Format no dot1x re-authentication Mode Interface Config Switching Commands 84 M4100 Series ProSAFE Managed Switches dot1x system-auth-control Use this command to enable the dot1x authentication support on the switch. While disabled, the dot1x configuration is retained and can be changed, but is not activated. Default disabled Format dot1x system-auth-control Mode Global Config no dot1x system-auth-control This command is used to disable the dot1x authentication support on the switch. Format no dot1x system-auth-control Mode Global Config dot1x timeout This command sets the value, in seconds, of the timer used by the authenticator state machine on this port. Depending on the token used and the value (in seconds) passed, various time-out configurable parameters are set. Default • • • • • • guest-vlan-period: 90 seconds reauth-period: 3600 seconds quiet-period: 60 seconds tx-period: 30 seconds supp-timeout: 30 seconds server-timeout: 30 seconds Format dot1x timeout {{guest-vlan-period <seconds>} | {reauth-period <seconds>} | {quiet-period <seconds>} | {tx-period <seconds>} | {supp-timeout <seconds>} | {server-timeout <seconds>}} Mode Interface Config The following table describes the tokens that are supported. Tokens Definition guest-vlan-period The time, in seconds, for which the authenticator waits to see if any EAPOL packets are received on a port before authorizing the port and placing the port in the guest vlan (if configured). The guest vlan timer is only relevant when guest vlan has been configured on that specific port. reauth-period The value, in seconds, of the timer used by the authenticator state machine on this port to determine when re-authentication of the supplicant takes place. The reauth-period must be a value in the range 1 - 65535. Switching Commands 85 M4100 Series ProSAFE Managed Switches Tokens Definition quiet-period The value, in seconds, of the timer used by the authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant. The quiet-period must be a value in the range 0 - 65535. tx-period The value, in seconds, of the timer used by the authenticator state machine on this port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant. The quiet-period must be a value in the range 1 - 65535. supp-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the supplicant. The supp-timeout must be a value in the range 1 - 65535. server-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the authentication server. The supp-timeout must be a value in the range 1 65535. no dot1x timeout This command sets the value, in seconds, of the timer used by the authenticator state machine on this port to the default values. Depending on the token used, the corresponding default values are set. Format no dot1x timeout {guest-vlan-period | reauth-period | quiet-period | tx-period | supp-timeout | server-timeout} Mode Interface Config dot1x unauthenticated-vlan Use this command to configure the unauthenticated VLAN associated with that port. The unauthenticated VLAN ID can be a valid VLAN ID from 0-Maximum supported VLAN ID. The unauthenticated VLAN must be statically configured in the VLAN database to be operational. By default, the unauthenticated VLAN is 0, that is, invalid and not operational. Default 0 Format dot1x unauthenticated-vlan <vlan id> Mode Interface Config no dot1x unauthenticated-vlan This command resets the unauthenticated-vlan associated with the port to its default value. Format no dot1x unauthenticated-vlan Mode Interface Config Switching Commands 86 M4100 Series ProSAFE Managed Switches dot1x user This command adds the specified user to the list of users with access to the specified port or all ports. The <user> parameter must be a configured user. Format dot1x user <user> {<slot/port> | all} Mode Global Config no dot1x user This command removes the user from the list of users with access to the specified port or all ports. Format no dot1x user <user> {<slot/port> | all} Mode Global Config clear dot1x authentication-history This command clears the authentication history table captured during successful and unsuccessful authentication on all interface or the specified interface. Format clear dot1x authentication-history [slot/port] Mode Global Config dot1x dynamic-vlan enable Use this command to enable the switch to create VLANs dynamically when a RADIUS assigned VLAN does not exist in the switch. Format dot1x dynamic-vlan enable Mode Global Config Default Disabled no dot1x dynamic-vlan enable Use this command to disable the switch from creating VLANs dynamically when a RADIUS assigned VLAN does not exist in the switch. Format no dot1x dynamic-vlan enable Mode Global Config Switching Commands 87 M4100 Series ProSAFE Managed Switches dot1x system-auth-control monitor Use this command to enable the 802.1X monitor mode on the switch. The purpose of Monitor mode is to help troubleshoot port-based authentication configuration issues without disrupting network access for hosts connected to the switch. In Monitor mode, a host is granted network access to an 802.1X-enabled port even if it fails the authentication process. The results of the process are logged for diagnostic purposes. Format dot1x system-auth-control monitor Mode Global Config Default Disabled no dot1x system-auth-control monitor Use this command to disable the 802.1X monitor on the switch. Format no dot1x system-auth-control monitor Mode Global Config show dot1x authentication-history This command displays 802.1X authentication events and information during successful and unsuccessful Dot1x authentication process for all interfaces or the specified interface. Use the optional keywords to display only failure authentication events in summary or in detail. Format show dot1x authentication-history {slot/port | all} [failedauth-only] [detail] Mode Privileged EXEC Term Definition Time Stamp The exact time at which the event occurs. Interface Physical Port on which the event occurs. Mac-Address The supplicant/client MAC address. VLAN assigned The VLAN assigned to the client/port on authentication. VLAN assigned Reason The type of VLAN ID assigned, which can be Guest VLAN, Unauth, Default, RADIUS Assigned, or Monitor Mode VLAN ID. Auth Status The authentication status. Reason The actual reason behind the successful or failed authentication. Switching Commands 88 M4100 Series ProSAFE Managed Switches show authentication methods This command displays information about the authentication methods. Format show authentication methods Mode Privileged EXEC Command example: Login Authentication Method Lists ________________________________ Console_Default: None Network_Default:Local Enable Authentication Lists _____________________ Console_Default: Enable None Network_Default:Enable Line Login Method List Enable Method Lists _____________________ Console Console_Default Console_Default Telnet Network_Default Network_Default SSH Network_Default Network_Default http : Local https : Local dot1x : show dot1x This command is used to show a summary of the global dot1x configuration, summary information of the dot1x configuration for a specified port or all ports, the detailed dot1x configuration for a specified port and the dot1x statistics for a specified port - depending on the tokens used. Format show dot1x [{summary {<slot/port> | all} | detail <slot/port> | statistics <slot/port>] Mode Privileged EXEC If you do not use the optional <slot/port> parameters, the command displays the global dot1x mode, the VLAN Assignment mode, and the Dynamic VLAN Creation mode. Term Definition Administrative Mode Indicates whether authentication control on the switch is enabled or disabled. VLAN Assignment Mode Indicates whether assignment of an authorized port to a RADIUS assigned VLAN is allowed (enabled) or not (disabled). Switching Commands 89 M4100 Series ProSAFE Managed Switches Term Definition Dynamic VLAN Creation Mode Indicates whether the switch can dynamically create a RADIUS-assigned VLAN if it does not currently exist on the switch. Monitor Mode Indicates whether the Dot1x Monitor mode on the switch is enabled or disabled. If you use the optional parameter summary {<slot/port> | all}, the dot1x configuration for the specified port or all ports are displayed. Term Definition Interface The interface whose configuration is displayed. Control Mode The configured control mode for this port. Possible values are force-unauthorized | force-authorized | auto | mac-based | authorized | unauthorized. Operating Control Mode The control mode under which this port is operating. Possible values are authorized | unauthorized. Reauthentication Indicates whether re-authentication is enabled on this port. Enabled Port Status Indicates whether the port is authorized or unauthorized. Possible values are authorized | unauthorized. If you use the optional parameter detail <slot/port>, the detailed dot1x configuration for the specified port is displayed. Term Definition Port The interface whose configuration is displayed. Protocol Version The protocol version associated with this port. The only possible value is 1, corresponding to the first version of the dot1x specification. PAE Capabilities The port access entity (PAE) functionality of this port. Possible values are Authenticator or Supplicant. Control Mode The configured control mode for this port. Possible values are force-unauthorized | force-authorized | auto | mac-based. Authenticator PAE Current state of the authenticator PAE state machine. Possible values are Initialize, State Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized. When MAC-based authentication is enabled on the port, this parameter is deprecated. Backend Authentication State Current state of the backend authentication state machine. Possible values are Request, Response, Success, Fail, Timeout, Idle, and Initialize. When MAC-based authentication is enabled on the port, this parameter is deprecated. Quiet Period The timer used by the authenticator state machine on this port to define periods of time in which it will not attempt to acquire a supplicant. The value is expressed in seconds and will be in the range 0 and 65535. Switching Commands 90 M4100 Series ProSAFE Managed Switches Term Definition Transmit Period The timer used by the authenticator state machine on the specified port to determine when to send an EAPOL EAP Request/Identity frame to the supplicant. The value is expressed in seconds and will be in the range of 1 and 65535. Guest-VLAN ID The guest VLAN identifier configured on the interface. Guest VLAN Period The time in seconds for which the authenticator waits before authorizing and placing the port in the Guest VLAN, if no EAPOL packets are detected on that port. Supplicant Timeout The timer used by the authenticator state machine on this port to timeout the supplicant. The value is expressed in seconds and will be in the range of 1 and 65535. Server Timeout The timer used by the authenticator on this port to timeout the authentication server. The value is expressed in seconds and will be in the range of 1 and 65535. Maximum Requests The maximum number of times the authenticator state machine on this port will retransmit an EAPOL EAP Request/Identity before timing out the supplicant. The value will be in the range of 1 and 10. VLAN Id The VLAN assigned to the port by the radius server. This is only valid when the port control mode is not Mac-based. VLAN Assigned Reason The reason the VLAN identified in the VLAN Idfield has been assigned to the port. Possible values are RADIUS, Unauthenticated VLAN, Guest VLAN, default, and Not Assigned. When the VLAN Assigned Reason is ‘Not Assigned’, it means that the port has not been assigned to any VLAN by dot1x. This only valid when the port control mode is not MAC-based. Reauthentication Period The timer used by the authenticator state machine on this port to determine when reauthentication of the supplicant takes place. The value is expressed in seconds and will be in the range of 1 and 65535. Reauthentication Enabled Indicates if reauthentication is enabled on this port. Possible values are ‘True” or “False”. Key Transmission Indicates if the key is transmitted to the supplicant for the specified port. Possible values Enabled are True or False. Control Direction The control direction for the specified port or ports. Possible values are both or in. Maximum Users The maximum number of clients that can get authenticated on the port in the MAC-based dot1x authentication mode. This value is used only when the port control mode is not MAC-based. Unauthenticated VLAN ID Indicates the unauthenticated VLAN configured for this port. This value is valid for the port only when the port control mode is not MAC-based. Session Timeout Indicates the time for which the session is valid. The time period in seconds is returned by the RADIUS server on authentication of the port. This value is valid for the port only when the port control mode is not MAC-based. Session Termination Action This value indicates the action to be taken once the session timeout expires. Possible values are Default, Radius-Request. If the value is Default, the session is terminated the port goes into unauthorized state. If the value is Radius-Request, a reauthentication of the client authenticated on the port is performed. This value is valid for the port only when the port control mode is not MAC-based. Switching Commands 91 M4100 Series ProSAFE Managed Switches The show dot1x detail <slot/port> command displays the following MAC-based dot1x fields if the port-control mode for that specific port is MAC-based. For each client authenticated on the port, the show dot1x detail <slot/port> command displays the following MAC-based dot1x parameters if the port-control mode for that specific port is MAC-based. Term Definition Supplicant MAC-Address The MAC-address of the supplicant. Authenticator PAE State Current state of the authenticator PAE state machine. Possible values are Initialize, Disconnected, Connecting, Authenticating, Authenticated, Aborting, Held, ForceAuthorized, and ForceUnauthorized. Backend Authentication State Current state of the backend authentication state machine. Possible values are Request, Response, Success, Fail, Timeout, Idle, and Initialize. VLAN-Assigned The VLAN assigned to the client by the radius server. Logical Port The logical port number associated with the client. If you use the optional parameter statistics <slot/port>, the following dot1x statistics for the specified port appear. Term Definition Port The interface whose statistics are displayed. EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this authenticator. EAPOL Frames Transmitted The number of EAPOL frames of any type that have been transmitted by this authenticator. EAPOL Start Frames Received The number of EAPOL start frames that have been received by this authenticator. EAPOL Logoff Frames Received The number of EAPOL logoff frames that have been received by this authenticator. Last EAPOL Frame Version The protocol version number carried in the most recently received EAPOL frame. Last EAPOL Frame Source The source MAC address carried in the most recently received EAPOL frame. EAP Response/Id Frames Received The number of EAP response/identity frames that have been received by this authenticator. Switching Commands 92 M4100 Series ProSAFE Managed Switches Term Definition EAP Response Frames Received The number of valid EAP response frames (other than resp/id frames) that have been received by this authenticator. EAP Request/Id Frames Transmitted The number of EAP request/identity frames that have been transmitted by this authenticator. EAP Request Frames Transmitted The number of EAP request frames (other than request/identity frames) that have been transmitted by this authenticator. Invalid EAPOL Frames Received The number of EAPOL frames that have been received by this authenticator in which the frame type is not recognized. EAP Length Error Frames Received The number of EAPOL frames that have been received by this authenticator in which the frame type is not recognized. show dot1x clients This command displays 802.1x client information. This command also displays information about the number of clients that are authenticated using Monitor mode and using 802.1x. Format show dot1x clients {<slot/port> | all} Mode Privileged EXEC Term Definition Clients Authenticated using Monitor Mode Indicates the number of the Dot1x clients authenticated using Monitor mode. Clients Authenticated using Dot1x Indicates the number of Dot1x clients authenticated using 802.1x authentication process. Logical Interface The logical port number associated with a client. Interface The physical port to which the supplicant is associated. User Name The user name used by the client to authenticate to the server. Supplicant MAC Address The supplicant device MAC address. Session Time The time since the supplicant is logged on. Filter ID Identifies the Filter ID returned by the RADIUS server when the client was authenticated. This is a configured DiffServ policy name on the switch. VLAN ID The VLAN assigned to the port. Switching Commands 93 M4100 Series ProSAFE Managed Switches Term Definition VLAN Assigned The reason the VLAN identified in the VLAN ID field has been assigned to the port. Possible values are RADIUS, Unauthenticated VLAN, or Default. When the VLAN Assigned reason is Default, it means that the VLAN was assigned to the port because the PVID of the port was that VLAN ID. Session Timeout This value indicates the time for which the session is valid. The time period in seconds is returned by the RADIUS server on authentication of the port. This value is valid for the port only when the port-control mode is not MAC-based. Session Termination Action This value indicates the action to be taken once the session timeout expires. Possible values are Default and Radius-Request. If the value is Default, the session is terminated and client details are cleared. If the value is Radius-Request, a reauthentication of the client is performed. show dot1x users This command displays 802.1x port security user information for locally configured users. Format show dot1x users <slot/port> Mode Privileged EXEC Term Definition Users Users configured locally to have access to the specified port. 802.1X Supplicant Commands 802.1X (“dot1x”) supplicant functionality is on point-to-point ports. The administrator can configure the user name and password used in authentication and capabilities of the supplicant port. dot1x pae Use this command to set the port’s dot1x role. The port can serve as either a supplicant or an authenticator. Format dot1x pae {supplicant | authenticator} Mode Interface Config dot1x supplicant port-control Use this command to set the ports authorization state (Authorized or Unauthorized) either manually or by setting the port to auto-authorize upon startup. By default all the ports are authenticators. If the port’s attribute must be moved from authenticator to supplicant or supplicant to authenticator, use this command. Switching Commands 94 M4100 Series ProSAFE Managed Switches Format dot1x supplicant port-control {auto | force-authorized | force_unauthorized} Mode Interface Config Parameter Description auto The port is in the Unauthorized state until it presents its user name and password credentials to an authenticator. If the authenticator authorizes the port, then it is placed in the Authorized state. force-authorized Sets the authorization state of the port to Authorized, bypassing the authentication process. force- unauthorized Sets the authorization state of the port to Unauthorized, bypassing the authentication process. no dot1x supplicant port-control Use this command to set the port-control mode to the default, auto. Default Auto Format no dot1x supplicant port-control Mode Interface Config dot1x supplicant max-start Use this command to configure the number of attempts that the supplicant makes to find the authenticator before the supplicant assumes that there is no authenticator. Default 3 Format dot1x supplicant max-start <1-10> Mode Interface Config no dot1x supplicant max-start Use this command to set the max-start value to the default. Format no dot1x supplicant max-start Mode Interface Config Switching Commands 95 M4100 Series ProSAFE Managed Switches dot1x supplicant timeout start-period Use this command to configure the start period timer interval in seconds to wait for the EAP identity request from the authenticator. Default 30 seconds Format dot1x supplicant timeout start-period <1-65535> Mode Interface Config no dot1x supplicant timeout start-period Use this command to set the start-period value to the default. Format no dot1x supplicant timeout start-period Mode Interface Config dot1x supplicant timeout held-period Use this command to configure the held period timer interval in seconds to wait for the next authentication on previous authentication fail. Default 30 seconds Format dot1x supplicant timeout held-period <1-65535> Mode Interface Config no dot1x supplicant timeout held-period Use this command to set the held-period value to the default value. Format no dot1x supplicant timeout held-period Mode Interface Config dot1x supplicant timeout auth-period Use this command to configure the authentication period timer interval in seconds to wait for the next EAP request challenge from the authenticator. Default 30 seconds Format dot1x supplicant timeout auth-period <1-65535> Mode Interface Config Switching Commands 96 M4100 Series ProSAFE Managed Switches no dot1x supplicant timeout auth-period Use this command to set the auth-period value to the default value. Format no dot1x supplicant timeout auth-period Mode Interface Config dot1x supplicant user Use this command to map the user to the port. Format dot1x supplicant user Mode Interface Config Storm-Control Commands This section describes commands you use to configure storm control and view storm control configuration information. A traffic storm is a condition that occurs when incoming packets flood the LAN, which creates performance degradation in the network. The storm control feature protects against this condition. The switch provides broadcast, multicast, and unicast story recovery for individual interfaces. Unicast storm control protects against traffic whose MAC addresses are not known by the system. For broadcast, multicast, and unicast storm control, if the rate of traffic ingressing on an interface increases beyond the configured threshold for that type, the traffic is dropped. To configure storm control, you can enable the feature for all interfaces or for individual interfaces, and you can set the threshold (storm-control level), beyond which the broadcast, multicast, or unicast traffic is dropped. The storm control feature allows you to limit the rate of specific types of packets through the switch on a per-port, per-type, basis. Configuring a storm-control level also enables that form of storm control. Disabling a storm-control level (using the no version of the command) sets the storm control level back to the default value and disables that form of storm control. Using the no version of the storm-control command (without stating a level) disables that form of storm control but maintains the configured level (to be active the next time that form of storm control is enabled.) Note: The actual rate of ingress traffic required to activate storm control is based on the size of incoming packets and the hard-coded average packet size of 512 bytes—used to calculate a packet-per-second (pps) rate—as the forwarding-plane requires pps versus an absolute rate kbps. For example, if the configured limit is 10 percent, this is converted to ~25000 pps, and this pps limit is set in forwarding plane (hardware). You get the approximate desired output when 512 bytes packets are used. Switching Commands 97 M4100 Series ProSAFE Managed Switches storm-control broadcast (Interface Config) Use this command to enable broadcast storm recovery mode for a specific interface. If the mode is enabled, broadcast storm recovery is active and, if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of broadcast traffic will be limited to the configured threshold. Default enabled Format storm-control broadcast Mode Interface Config no storm-control broadcast Use this command to disable broadcast storm recovery mode for a specific interface. Format no storm-control broadcast Mode Interface Config storm-control broadcast level (Interface Config) Use this command to configure the broadcast storm recovery threshold for an interface as a percentage of link speed and enable broadcast storm recovery. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of broadcast traffic is limited to the configured threshold. If the shutdown option is selected, and the broadcast traffic increases beyond the threshold, the interface shuts down instead of dropping packets. To recover the port, issue the no shutdown command under the port manually. Default 5 Format storm-control broadcast level <0-100> {action [ratelimit | shutdown]} Mode Interface Config no storm-control broadcast level This command sets the broadcast storm recovery threshold to the default value for an interface and disables broadcast storm recovery. Format no storm-control broadcast level Mode Interface Config Switching Commands 98 M4100 Series ProSAFE Managed Switches storm-control broadcast rate (Interface Config) Use this command to configure the broadcast storm recovery threshold for an interface in packets per second. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of broadcast traffic is limited to the configured threshold. Default 0 Format storm-control broadcast rate <0-14880000> Mode Interface Config no storm-control broadcast rate This command sets the broadcast storm recovery threshold to the default value for an interface and disables broadcast storm recovery. Format no storm-control broadcast rate Mode Interface Config storm-control broadcast (Global Config) This command enables broadcast storm recovery mode for all interfaces. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of broadcast traffic will be limited to the configured threshold. Default disabled Format storm-control broadcast Mode Global Config no storm-control broadcast This command disables broadcast storm recovery mode for all interfaces. Format no storm-control broadcast Mode Global Config storm-control broadcast level (Global Config) This command configures the broadcast storm recovery threshold for all interfaces as a percentage of link speed and enables broadcast storm recovery. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, Switching Commands 99 M4100 Series ProSAFE Managed Switches the rate of broadcast traffic will be limited to the configured threshold. This command also enables broadcast storm recovery mode for all interfaces. If the ‘shutdown’ option is selected, and the broadcast traffic increases beyond the threshold, the interface shuts down instead of dropping packets. To recover the port, issue ‘no shutdown’ under the port manually. Default 5 Format storm-control broadcast level <0-100> Mode Global Config no storm-control broadcast level This command sets the broadcast storm recovery threshold to the default value for all interfaces and disables broadcast storm recovery. Format no storm-control broadcast level Mode Global Config storm-control broadcast rate (Global Config) Use this command to configure the broadcast storm recovery threshold for all interfaces in packets per second. If the mode is enabled, broadcast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of broadcast traffic is limited to the configured threshold. Default 0 Format storm-control broadcast rate <0-14880000> Mode Global Config no storm-control broadcast rate This command sets the broadcast storm recovery threshold to the default value for all interfaces and disables broadcast storm recovery. Format no storm-control broadcast rate Mode Global Config Switching Commands 100 M4100 Series ProSAFE Managed Switches storm-control multicast (Interface Config) This command enables multicast storm recovery mode for an interface. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of multicast traffic will be limited to the configured threshold. Default disabled Format storm-control multicast Mode Interface Config no storm-control multicast This command disables multicast storm recovery mode for an interface. Format no storm-control multicast Mode Interface Config storm-control multicast level (Interface Config) This command configures the multicast storm recovery threshold for an interface as a percentage of link speed and enables multicast storm recovery mode. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of multicast traffic will be limited to the configured threshold. Default 5 Format storm-control multicast level <0-100> Mode Interface Config no storm-control multicast level This command sets the multicast storm recovery threshold to the default value for an interface and disables multicast storm recovery. Format no storm-control multicast level <0-100> Mode Interface Config storm-control multicast rate (Interface Config) Use this command to configure the multicast storm recovery threshold for an interface in packets per second. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of multicast traffic is limited to the configured threshold. Switching Commands 101 M4100 Series ProSAFE Managed Switches Default 0 Format storm-control multicast rate <0-14880000> Mode Interface Config no storm-control multicast rate This command sets the multicast storm recovery threshold to the default value for an interface and disables multicast storm recovery. Format no storm-control multicast rate Mode Interface Config storm-control multicast (Global Config) This command enables multicast storm recovery mode for all interfaces. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of multicast traffic will be limited to the configured threshold. Default disabled Format storm-control multicast Mode Global Config no storm-control multicast This command disables multicast storm recovery mode for all interfaces. Format no storm-control multicast Mode Global Config storm-control multicast level (Global Config) This command configures the multicast storm recovery threshold for all interfaces as a percentage of link speed and enables multicast storm recovery mode. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of multicast traffic will be limited to the configured threshold. Default 5 Format storm-control multicast level <0-100> Mode Global Config Switching Commands 102 M4100 Series ProSAFE Managed Switches no storm-control multicast level This command sets the multicast storm recovery threshold to the default value for all interfaces and disables multicast storm recovery. Format no storm-control multicast level Mode Global Config storm-control multicast rate (Global Config) Use this command to configure the multicast storm recovery threshold for all interfaces in packets per second. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of multicast traffic is limited to the configured threshold. Default 0 Format storm-control multicast rate <0-14880000> Mode Global Config no storm-control broadcast rate This command sets the broadcast storm recovery threshold to the default value for all interfaces and disables broadcast storm recovery. Format no storm-control broadcast rate Mode Global Config storm-control unicast (Interface Config) This command enables unicast storm recovery mode for an interface. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured threshold. Default disabled Format storm-control unicast Mode Interface Config Switching Commands 103 M4100 Series ProSAFE Managed Switches no storm-control unicast This command disables unicast storm recovery mode for an interface. Format no storm-control unicast Mode Interface Config storm-control unicast level (Interface Config) This command configures the unicast storm recovery threshold for an interface as a percentage of link speed, and enables unicast storm recovery. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured threshold. This command also enables unicast storm recovery mode for an interface. Default 5 Format storm-control unicast level <0-100> Mode Interface Config no storm-control unicast level This command sets the unicast storm recovery threshold to the default value for an interface and disables unicast storm recovery. Format no storm-control unicast level Mode Interface Config storm-control unicast rate (Interface Config) Use this command to configure the unicast storm recovery threshold for an interface in packets per second. If the mode is enabled, unicast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of unicast traffic is limited to the configured threshold. Default 0 Format storm-control unicast rate <0-14880000> Mode Interface Config Switching Commands 104 M4100 Series ProSAFE Managed Switches no storm-control unicast rate This command sets the unicast storm recovery threshold to the default value for an interface and disables unicast storm recovery. Format no storm-control unicast rate Mode Interface Config storm-control unicast (Global Config) This command enables unicast storm recovery mode for all interfaces. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured threshold. Default disabled Format storm-control unicast Mode Global Config no storm-control unicast This command disables unicast storm recovery mode for all interfaces. Format no storm-control unicast Mode Global Config storm-control unicast level (Global Config) This command configures the unicast storm recovery threshold for all interfaces as a percentage of link speed, and enables unicast storm recovery. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped. Therefore, the rate of unknown unicast traffic will be limited to the configured threshold. Default 5 Format storm-control unicast level <0-100> Mode Global Config Switching Commands 105 M4100 Series ProSAFE Managed Switches no storm-control unicast level This command sets the unicast storm recovery threshold to the default value and disables unicast storm recovery for all interfaces. Format no storm-control unicast level Mode Global Config storm-control unicast rate (Global Config) Use this command to configure the unicast storm recovery threshold for all interfaces in packets per second. If the mode is enabled, unicast storm recovery is active, and if the rate of L2 broadcast traffic ingressing on an interface increases beyond the configured threshold, the traffic is dropped. Therefore, the rate of unicast traffic is limited to the configured threshold. Default 0 Format storm-control unicast rate <0-14880000> Mode Global Config no storm-control unicast rate This command sets the multicast storm recovery threshold to the default value for an interface and disables multicast storm recovery. Format no storm-control unicast rate Mode Global Config show storm-control This command displays switch configuration information. If you do not use any of the optional parameters, this command displays global storm control configuration parameters: • Broadcast Storm Control Mode. Might be enabled or disabled. The factory default is disabled. • Broadcast Storm Control Level. The factory default is 5 percent. • Multicast Storm Control Mode. Might be enabled or disabled. The factory default is disabled. • Multicast Storm Control Level. The factory default is 5 percent. • Unicast Storm Control Mode. Might be enabled or disabled. The factory default is disabled. • Unicast Storm Control Level. The factory default is 5 percent. Switching Commands 106 M4100 Series ProSAFE Managed Switches Use the all keyword to display the per-port configuration parameters for all interfaces, or specify the slot/port to display information about a specific interface. Format show storm-control [all | <slot/port>] Mode Privileged EXEC Term Definition Bcast Mode Shows whether the broadcast storm control mode is enabled or disabled. The factory default is disabled. Bcast Level The broadcast storm control level. Mcast Mode Shows whether the multicast storm control mode is enabled or disabled. Mcast Level The multicast storm control level. Ucast Mode Shows whether the Unknown Unicast or DLF (Destination Lookup Failure) storm control mode is enabled or disabled. Ucast Level The Unknown Unicast or DLF (Destination Lookup Failure) storm control level. Flow Control Commands In 802.3x flow control, the MAC control PAUSE operation is specified in IEEE 802.3 Annex 31 B. It allows traffic from one device to be throttled for a specified period of time and is defined for devices that are directly connected. A device that needs to inhibit transmission of data frames from another device on the LAN transmits a PAUSE frame as defined in the IEEE specification. This feature allows the user to configure the switch to use symmetric, asymmetric, or no flow control. Asymmetric flow control allows the switch to respond to received PAUSE frames, but the port cannot generate PAUSE frames. Symmetric flow control allows the switch to both respond to and generate MAC control PAUSE frames. flowcontrol Use this command to enable or disable the symmetric or asymmetric flow control on the switch. Use the no form of command to disable the symmetric or asymmetric flow control. Asymmetric here means that Tx Pause can never be enabled. Only Rx Pause can be enabled. Default Disabled Format flowcontrol {symmetric | asymmetric} Mode • • Global Config Interface Config Switching Commands 107 M4100 Series ProSAFE Managed Switches no flowcontrol Format no flowcontrol Mode • • Global Config Interface Config show flowcontrol Use this command to display the IEEE 802.3 Annex 31B flow control settings and status for a specific interface or all interfaces. It also displays 802.3 Tx and Rx pause counts. Priority Flow Control frames counts are not displayed. If the port is enabled for priority flow control, operational flow control status is displayed as “Inactive”. Operational flow control status for stacking ports is always displayed as “N/A”. Format show flowcontrol [slot/port] Mode Privileged Exec Command example: (NETGEAR Switch)#show flowcontrol Admin Flow Control: Symmetric Port -----0/1 0/2 Flow Control Oper -----------Active Inactive RxPause TxPause -------310 0 --------611 0 Command example: (NETGEAR Switch)#show flowcontrol interface 0/1 Admin Flow Control: Symmetric Port --------0/1 Flow Control Oper ------Active RxPause TxPause -------310 ------611 Switching Commands 108 M4100 Series ProSAFE Managed Switches Port-Channel/LAG (802.3ad) Commands This section describes the commands you use to configure port-channels, which are also known as link aggregation groups (LAGs). Link aggregation allows you to combine multiple full-duplex Ethernet links into a single logical link. Network devices treat the aggregation as if it were a single link, which increases fault tolerance and provides load sharing. The LAG feature initially load shares traffic based upon the source and destination MAC address. Assign the port-channel (LAG) VLAN membership after you create a port-channel. If you do not assign VLAN membership, the port-channel might become a member of the management VLAN which can result in learning and switching issues. A port-channel (LAG) interface can be either static or dynamic, but not both. All members of a port channel must participate in the same protocols.) A static port-channel interface does not require a partner system to be able to aggregate its member ports. Note: If you configure the maximum number of dynamic port-channels (LAGs) that your platform supports, additional port-channels that you configure are automatically static. addport This command adds one port to the port-channel (LAG). The interface is a logical slot/port number or a group ID of a configured port-channel. Note: Before adding a port to a port-channel, set the physical mode of the port. For more information, see speed on page 22. Format addport {<logical slot/port> | lag <lag-group-id>} Mode Interface Config deleteport (Interface Config) This command deletes the port from the port-channel (LAG). The interface is a logical slot/port number or a group ID of a configured port-channel. Format deleteport {<logical slot/port> | lag <lag-group-id>} Mode Interface Config Switching Commands 109 M4100 Series ProSAFE Managed Switches deleteport (Global Config) This command deletes all configured ports from the port-channel (LAG). The interface is a logical slot/port number of a configured port-channel. To clear the port channels, see clear port-channel on page 368. Format deleteport <logical slot/port> Mode Global Config lacp admin key Use this command to configure the administrative value of the key for the port-channel. The value range of <key> is 0–65535. Default 0x8000 Format lacp admin key <key> Mode Interface Config Note: This command is only applicable to port-channel interfaces. no lacp admin key Use this command to configure the default administrative value of the key for the port-channel. Format no lacp admin key Mode Interface Config lacp collector max-delay Use this command to configure the port-channel collector max delay. The valid range of <delay> is 0-65535. Default 0x8000 Format lacp collector max-delay <delay> Mode Interface Config Note: This command is only applicable to port-channel interfaces. Switching Commands 110 M4100 Series ProSAFE Managed Switches no lacp collector max delay Use this command to configure the default port-channel collector max delay. Format no lacp collector max-delay Mode Interface Config lacp actor admin key Use this command to configure the administrative value of the LACP actor admin key. The valid range for <key> is 0-65535. Default Internal Interface Number of this Physical Port Format lacp actor admin key <key> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor admin key Use this command to configure the default administrative value of the key. Format no lacp actor admin key Mode Interface Config lacp actor admin state individual Use this command to set LACP actor admin state to individual. Format lacp actor admin state individual Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor admin state individual Use this command to set the LACP actor admin state to aggregation. Format no lacp actor admin state individual Mode Interface Config Switching Commands 111 M4100 Series ProSAFE Managed Switches lacp actor admin state longtimeout Use this command to set LACP actor admin state to longtimeout. Format lacp actor admin state longtimeout Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor admin state longtimeout Use this command to set the LACP actor admin state to short timeout. Format no lacp actor admin state longtimeout Mode Interface Config Note: This command is only applicable to physical interfaces. lacp actor admin state passive Use this command to set the LACP actor admin state to passive. Format lacp actor admin state passive Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor admin state passive Use this command to set the LACP actor admin state to active. Format no lacp actor admin state passive Mode Interface Config Switching Commands 112 M4100 Series ProSAFE Managed Switches lacp actor port priority Use this command to configure the priority value assigned to the Aggregation Port. The valid range for <priority> is 0–255. Default 0x80 Format lacp actor port priority <priority> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor port priority Use this command to configure the default priority value assigned to the Aggregation Port. Format no lacp actor port priority Mode Interface Config lacp actor system priority Use this command to configure the priority value associated with the LACP Actor’s SystemID. The range for <priority> is 0–65535. Default 32768 Format lacp actor system priority <priority> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp actor system priority Use this command to configure the priority value associated with the Actor’s SystemID. Format no lacp actor system priority Mode Interface Config Switching Commands 113 M4100 Series ProSAFE Managed Switches lacp partner admin key Use this command to configure the administrative value of the key for the protocol partner. The valid range for <key> is 0–65535. Default 0x0 Format lacp partner admin key <key> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner admin key Use this command to set the administrative value of the key for the protocol partner to the default. Format no lacp partner admin key Mode Interface Config lacp partner admin state individual Use this command to set LACP partner admin state to individual. Format lacp partner admin state individual Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner admin state individual Use this command to set the LACP partner admin state to aggregation. Format no lacp partner admin state individual Mode Interface Config Switching Commands 114 M4100 Series ProSAFE Managed Switches lacp partner admin state longtimeout Use this command to set LACP partner admin state to longtimeout. Format lacp partner admin state longtimeout Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner admin state longtimeout Use this command to set the LACP partner admin state to short timeout. Format no lacp partner admin state longtimeout Mode Interface Config Note: This command is only applicable to physical interfaces. lacp partner admin state passive Use this command to set the LACP partner admin state to passive. Format lacp partner admin state passive Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner admin state passive Use this command to set the LACP partner admin state to active. Format no lacp partner admin state passive Mode Interface Config Switching Commands 115 M4100 Series ProSAFE Managed Switches lacp partner port id Use this command to configure the LACP partner port id. The valid range for <port-id> is 0–65535. Default 0x80 Format lacp partner portid <port-id> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner port id Use this command to set the LACP partner port id to the default. Format no lacp partner portid Mode Interface Config lacp partner port priority Use this command to configure the LACP partner port priority. The valid range for <priority> is 0–255. Default 0x0 Format lacp partner port priority <priority> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner port priority Use this command to configure the default LACP partner port priority. Format no lacp partner port priority Mode Interface Config Switching Commands 116 M4100 Series ProSAFE Managed Switches lacp partner system id Use this command to configure the 6-octet MAC Address value representing the administrative value of the Aggregation Port’s protocol Partner’s System ID. The valid range of <system-id> is 00:00:00:00:00:00 - FF:FF:FF:FF:FF. Default 00:00:00:00:00:00 Format lacp partner system id <system-id> Mode Interface Config Note: This command is only applicable to physical interfaces. no lacp partner system id Use this command to configure the default value representing the administrative value of the Aggregation Port’s protocol Partner’s System ID. Format no lacp partner system id Mode Interface Config lacp partner system priority Use this command to configure the administrative value of the priority associated with the Partner’s System ID. The valid range for <priority> is 0–65535. Default 0x0 Format lacp partner system priority <priority> Mode Interface Config Note: This command is applicable only to physical interfaces. no lacp partner system priority Use this command to configure the default administrative value of priority associated with the Partner’s System ID. Format no lacp partner system priority Mode Interface Config Switching Commands 117 M4100 Series ProSAFE Managed Switches port-channel local-preference This command enables the local-preference mode on a port-channel (LAG) interface or range of interfaces. By default, the local-preference mode for a port-channel is disabled. This command can be used only on port-channel interfaces. Default disabled Format port-channel local-preference Mode Interface Config no port-channel local-preference This command disables the local-preference mode on a port-channel. Format no port-channel local-preference Mode Interface Config port-channel static This command enables the static mode on a port-channel (LAG) interface. By default the static mode for a new port-channel is disabled, which means the port-channel is dynamic. However if the maximum number of allowable dynamic port-channels are already present in the system, the static mode for a new port-channel enabled, which means the port-channel is static. You can only use this command on port-channel interfaces. Default disabled Format port-channel static Mode Interface Config no port-channel static This command sets the static mode on a particular port-channel (LAG) interface to the default value. This command will be executed only for interfaces of type port-channel (LAG). Format no port-channel static Mode Interface Config port lacpmode This command enables Link Aggregation Control Protocol (LACP) on a port. Default enabled Format port lacpmode Mode Interface Config Switching Commands 118 M4100 Series ProSAFE Managed Switches no port lacpmode This command disables Link Aggregation Control Protocol (LACP) on a port. Format no port lacpmode Mode Interface Config port lacpmode enable all This command enables Link Aggregation Control Protocol (LACP) on all ports. Format port lacpmode enable all Mode Global Config no port lacpmode enable all This command disables Link Aggregation Control Protocol (LACP) on all ports. Format no port lacpmode enable all Mode Global Config port lacptimeout (Interface Config) This command sets the timeout on a physical interface of a particular device type (actor or partner) to either long or short time-out. Default long Format port lacptimeout {actor | partner} {long | short} Mode Interface Config no port lacptimeout This command sets the timeout back to its default value on a physical interface of a particular device type (actor or partner). Format no port lacptimeout {actor | partner} Mode Interface Config Switching Commands 119 M4100 Series ProSAFE Managed Switches port lacptimeout (Global Config) This command sets the timeout for all interfaces of a particular device type (actor or partner) to either long or short time-out. Default long Format port lacptimeout {actor | partner} {long | short} Mode Global Config no port lacptimeout This command sets the timeout for all physical interfaces of a particular device type (actor or partner) back to their default values. Format no port lacptimeout {actor | partner} Mode Global Config port-channel adminmode This command enables a port-channel (LAG). This command sets every configured port-channel with the same administrative mode setting. Format port-channel adminmode all Mode Global Config no port-channel adminmode This command disables a port-channel (LAG). This command clears every configured port-channel with the same administrative mode setting. Format no port-channel adminmode [all] Mode Global Config port-channel linktrap This command enables link trap notifications for the port-channel (LAG). The interface is a logical slot/port for a configured port-channel. This command enables link trap notifications for the port-channel (LAG). The interface is a logical <slot/port> for a configured port-channel. The option all enables link trap notifications for all the configured port-channels. Instead of <slot/port>, you can use lag <lag-group-id> as an alternate way to specify the LAG interface, in which <lag-group-id> is the LAG port number. Switching Commands 120 M4100 Series ProSAFE Managed Switches Default enabled Format port-channel linktrap {<slot/port> | lag <lag-group-id> | all} Mode Global Config no port-channel linktrap This command disables link trap notifications for the port-channel (LAG). The interface is a logical slot and port for a configured port-channel. The option all disables link trap notifications for all the configured port-channels. Format no port-channel linktrap {<slot/port> | lag <lag-group-id> | all} Mode Global Config port-channel load-balance This command selects the load-balancing option used on a port-channel (LAG). Traffic is balanced on a port-channel (LAG) by selecting one of the links in the channel over which to transmit specific packets. The link is selected by creating a binary pattern from selected fields in a packet, and associating that pattern with a particular link. Load-balancing is not supported on every device. The range of options for load-balancing can vary per device. The switch also supports enhanced hashing mode, which has the following advantages: • MODULO-N (where N is the number of active link members in a LAG) operation based on the number of ports in the LAG. • Packet attributes selection based on the packet type: For L2 packets, source and destination MAC address are used for hash computation. For L3 packets, source IP, destination IP address, TCP/UDP ports are used. • Non-Unicast traffic and unicast traffic is hashed using a common hash algorithm • Excellent load balancing performance. The interface is a logical <slot/port> for a configured port-channel. The option all enables the configuration for all the configured port-channels. Instead of <slot/port>, you can use lag <lag-group-id> as an alternate way to specify the LAG interface, in which <lag-group-id> is the LAG port number. Default 3 Format port-channel load-balance {1 | 2 | 3 | 4 | 5 | 6 | 7} {<slot/port> | lag <lag-group-id> | all} Mode Interface Config Global Config Switching Commands 121 M4100 Series ProSAFE Managed Switches Parameter Definition 1 Source MAC, VLAN, EtherType, and incoming port associated with the packet 2 Destination MAC, VLAN, EtherType, and incoming port associated with the packet 3 Source/Destination MAC, VLAN, EtherType, and incoming port associated with the packet 4 Source IP and Source TCP/UDP fields of the packet 5 Destination IP and Destination TCP/UDP Port fields of the packet 6 Source/Destination IP and source/destination TCP/UDP Port fields of the packet 7 Enhanced Hashing Mode no port-channel load-balance This command reverts to the default load balancing configuration. Format no port-channel load-balance {<slot/port> | lag <lag-group-id> | all} Mode Interface Config Global Config port-channel name This command defines a name for the port-channel (LAG). Use <name> to specify an alphanumeric string up to 15 characters. The interface is a logical <slot/port> for a configured port-channel. Instead of <slot/port>, you can use lag <lag-group-id> as an alternate way to specify the LAG interface, in which <lag-group-id> is the LAG port number. Format port-channel name {<slot/port> | lag <lag-group-id> | <name>} Mode Global Config port-channel system priority Use this command to configure port-channel system priority. The valid range of <priority> is 0-65535. Default 0x8000 Format port-channel system priority <priority> Mode Global Config Switching Commands 122 M4100 Series ProSAFE Managed Switches no port-channel system priority Use this command to configure the default port-channel system priority value. Format no port-channel system priority Mode Global Config show lacp actor Use this command to display LACP actor attributes. The interface is a logical <slot/port> for a configured port-channel. The option all displays the configuration for all the configured port-channels. Instead of <slot/port>, you can use lag <lag-group-id> as an alternate way to specify the LAG interface, in which <lag-group-id> is the LAG port number. Format show lacp actor {<slot/port> | lag <lag-group-id> | all} Mode Global Config The following output parameters are displayed. Term Description System Priority The system priority assigned to the Aggregation Port. Admin Key The administrative value of the Key. Port Priority The priority value assigned to the Aggregation Port. Admin State The administrative values of the actor state as transmitted by the Actor in LACPDUs. show lacp partner Use this command to display LACP partner attributes. The interface is a logical <slot/port> for a configured port-channel. The option all displays the configuration for all the configured port-channels. Instead of <slot/port>, you can use lag <lag-group-id> as an alternate way to specify the LAG interface, in which <lag-group-id> is the LAG port number. Format show lacp partner {<slot/port> | lag <lag-group-id> | all} Mode Privileged EXEC Switching Commands 123 M4100 Series ProSAFE Managed Switches The following output parameters are displayed. Term Description System Priority The administrative value of priority associated with the Partner’s System ID. System ID The value representing the administrative value of the Aggregation Port’s protocol Partner’s System ID. Admin Key The administrative value of the Key for the protocol Partner. Port Priority The administrative value of the port priority for the protocol Partner. Port-ID The administrative value of the port number for the protocol Partner. Admin State The administrative values of the actor state for the protocol Partner. show port-channel brief This command displays the static capability of all port-channel (LAG) interfaces on the device as well as a summary of individual port-channel interfaces. Format show port-channel brief Mode • • Privileged EXEC User EXEC For each port-channel the following information is displayed: Term Definition Logical Interface The slot/port of the logical interface. Port-channel Name The name of port-channel (LAG) interface. Link-State Shows whether the link is up or down. Trap Flag Shows whether trap flags are enabled or disabled. Type Shows whether the port-channel is statically or dynamically maintained. Mbr Ports The members of this port-channel. Active Ports The ports that are actively participating in the port-channel. show port-channel This command displays an overview of all port-channels (LAGs) on the switch. Format show port-channel Mode • • Privileged EXEC User EXEC Switching Commands 124 M4100 Series ProSAFE Managed Switches Term Definition Logical Interface Valid slot and port number separated by forward slashes. Port-Channel Name The name of this port-channel (LAG). You may enter any string of up to 15 alphanumeric characters. Link State Indicates whether the Link is up or down. Admin Mode May be enabled or disabled. The factory default is enabled. Type The status designating whether a particular port-channel (LAG) is statically or dynamically maintained. • Static - The port-channel is statically maintained. • Dynamic - The port-channel is dynamically maintained. Mbr Ports A listing of the ports that are members of this port-channel (LAG), in slot/port notation. There can be a maximum of eight ports assigned to a port-channel (LAG). Device Timeout For each port, lists the timeout (long or short) for Device Type (actor or partner). Port Speed Speed of the port-channel port. Ports Active This field lists the ports that are actively participating in the port-channel (LAG). Load Balance Option The load balance option associated with this LAG. See port-channel load-balance on page 121. Local Preference Indicates whether the local preference mode is enabled or disabled. Mode show port-channel system priority Use this command to display the port-channel system priority. Format show port-channel system priority Mode Privileged EXEC Port Mirroring Commands Port mirroring, which is also known as port monitoring, selects network traffic that you can analyze with a network analyzer, such as a SwitchProbe device or other Remote Monitoring (RMON) probe. monitor session This command configures a probe port and a monitored port for monitor session (port monitoring). Use the source interface <slot/port> parameter to specify the interface to monitor. Use rx to monitor only ingress packets or use tx to monitor only egress packets. If you do not specify an rx or tx option, the destination port monitors both ingress and egress packets. Switching Commands 125 M4100 Series ProSAFE Managed Switches A VLAN can be configured as the source to a session (all member ports of that VLAN are monitored). Remote port mirroring is configured by adding the RSPAN VLAN ID. At the source switch, the destination is configured as the RSPAN VLAN and at the destination switch, the source is configured as the RSPAN VLAN. Note: The source and destination cannot be configured as remote on the same device. The reflector-port is configured at the source switch. The reflector-port forwards the mirrored traffic towards the destination switch. Note: This port must be configured with RSPAN VLAN membership. IP/MAC ACL can be attached to a session by giving the access list number/name. Use the destination interface <slot/port> to specify the interface to receive the monitored traffic. Use the mode parameter to enable the administrative mode of the session. If enabled, the probe port monitors all the traffic received and transmitted on the physical monitored port. Use the filter parameter to filter a specified access group either by IP address or MAC address. Format monitor session <session-id> {source {interface <slot/port> | cpu | vlan <vlan-id> | remote vlan <vlan-id>} [{rx | tx}] | destination {interface <slot/port> | remote vlan <vlan-id> reflector-port <slot/port>} | mode} Mode Global Config Command example: To configure the RSPAN VLAN source: monitor session <session-id> source {interface <slot/port> | vlan <vlan-id> | remote vlan <vlan-id>} [rx | tx] Command example: To the configure RSPAN VLAN destination: monitor session <session-id> destination {interface <slot/port> | remote vlan <vlan-id> reflector-port <slot/port>} Switching Commands 126 M4100 Series ProSAFE Managed Switches no monitor session Use this command without optional parameters to remove the monitor session (port monitoring) designation from the source probe port, the destination monitored port and all VLANs. Once the port is removed from the VLAN, you must manually add the port to any desired VLANs. Use the source interface <slot/port> parameter or destination interface to remove the specified interface from the port monitoring session. Use the mode parameter to disable the administrative mode of the session. Note: Because the current version of NETGEAR Managed Switch SMB software only supports one session, if you do not supply optional parameters, the behavior of this command is similar to the behavior of the no monitor command. Format no monitor session <session-id> [{source interface <slot/port> | destination interface | mode}] Mode Global Config no monitor This command removes all the source ports and a destination port for the and restores the default value for mirroring session mode for all the configured sessions. Note: This is a stand-alone no command. This command does not have a normal form. Default enabled Format no monitor Mode Global Config show monitor session This command displays the Port monitoring information for a particular mirroring session. Note: The <session-id> parameter is an integer value used to identify the session. In the current version of the software, the <session-id> parameter is always 1. Switching Commands 127 M4100 Series ProSAFE Managed Switches Format show monitor session <session-id> Mode Privileged EXEC Term Definition Session ID An integer value used to identify the session. Its value can be anything between 1 and the maximum number of mirroring sessions allowed on the platform. Monitor Session Mode Indicates whether the Port Mirroring feature is enabled or disabled for the session identified with <session-id>. The possible values are Enabled and Disabled. Probe Port Probe port (destination port) for the session identified with <session-id>. If probe port is not set then this field is blank. Source Port The port, which is configured as mirrored port (source port) for the session identified with <session-id>. If no source port is configured for the session then this field is blank. Type Direction in which source port configured for port mirroring.Types are tx for transmitted packets and rx for receiving packets. Src VLAN All member ports of this VLAN are mirrored. If the source VLAN is not configured, this field is blank. Ref. Port This port carries all the mirrored traffic at the source switch. Src Remote VLAN The source VLAN is configured at the destination switch. If the remote VLAN is not configured, this field is blank. Dst Remote VLAN The destination VLAN is configured at the source switch. If the remote VLAN is not configured, this field is blank. IP ACL The IP access-list id or name attached to the port mirroring session. MAC ACL The MAC access-list name attached to the port mirroring session. show vlan remote-span This command displays the configured RSPAN VLAN. Format show vlan remote-span Mode Privileged Exec Mode Command example: (NETGEAR Switch)# show vlan remote-span Remote SPAN VLAN -----------------------------------------------------------------------100 Switching Commands 128 M4100 Series ProSAFE Managed Switches Static MAC Filtering Commands The commands in this section describe how to configure static MAC filtering. Static MAC filtering allows you to configure destination ports for a static multicast MAC filter irrespective of the platform. macfilter This command adds a static MAC filter entry for the MAC address <macaddr> on the VLAN <vlanid>. A packet with a specific destination MAC address in a specific VLAN is admitted only if the ingress port is defined in the set of source ports, otherwise the packet is dropped. On the egress side, a packet that was admitted is sent through all ports that are defined in the set of destination ports. The value of the <macaddr> parameter is a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The following MAC addresses are restricted: 00:00:00:00:00:00, 01:80:C2:00:00:00 to 01:80:C2:00:00:0F, 01:80:C2:00:00:20 to 01:80:C2:00:00:21, and FF:FF:FF:FF:FF:FF. The <vlanid> parameter must identify a valid VLAN. The number of static mac filters supported on the system is different for MAC filters where source ports are configured and MAC filters where destination ports are configured. • For unicast MAC address filters and multicast MAC address filters with source port lists, the maximum number of static MAC filters supported is 20. • For multicast MAC address filters with destination ports configured, the maximum number of static filters supported is 256. For example, for current platforms you can configure the following combinations: • Unicast MAC and source port (max = 20) • Multicast MAC and source port (max=20) • Multicast MAC and destination port (only) (max=256) • Multicast MAC and source ports and destination ports (max=20) Format macfilter <macaddr> <vlanid> Mode Global Config no macfilter This command removes all filtering restrictions and the static MAC filter entry for the MAC address <macaddr> on the VLAN <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format no macfilter <macaddr> <vlanid> Mode Global Config Switching Commands 129 M4100 Series ProSAFE Managed Switches macfilter adddest Use this command to add the interface to the destination filter set for the MAC filter with the <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Note: Configuring a destination port list is only valid for multicast MAC addresses. Format macfilter adddest <macaddr> <vlanid> Mode Interface Config no macfilter adddest This command removes a port from the destination filter set for the MAC filter with the <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format no macfilter adddest <macaddr> <vlanid> Mode Interface Config macfilter adddest all This command adds all interfaces to the destination filter set for the MAC filter with the <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Note: Configuring a destination port list is only valid for multicast MAC addresses. Format macfilter adddest all <macaddr> <vlanid> Mode Global Config no macfilter adddest all This command removes all ports from the destination filter set for the MAC filter with the <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Switching Commands 130 M4100 Series ProSAFE Managed Switches Format no macfilter adddest all <macaddr> <vlanid> Mode Global Config macfilter addsrc This command adds the interface to the source filter set for the MAC filter with the MAC address of <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format macfilter addsrc <macaddr> <vlanid> Mode Interface Config no macfilter addsrc This command removes a port from the source filter set for the MAC filter with the MAC address of <macaddr> and VLAN of <vlanid>. The <macaddr> parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format no macfilter addsrc <macaddr> <vlanid> Mode Interface Config macfilter addsrc all This command adds all interfaces to the source filter set for the MAC filter with the MAC address of <macaddr> and <vlanid>. You must specify the <macaddr> parameter as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format macfilter addsrc all <macaddr> <vlanid> Mode Global Config no macfilter addsrc all This command removes all interfaces to the source filter set for the MAC filter with the MAC address of <macaddr> and VLAN of <vlanid>. You must specify the <macaddr> parameter as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The <vlanid> parameter must identify a valid VLAN. Format no macfilter addsrc all <macaddr> <vlanid> Mode Global Config Switching Commands 131 M4100 Series ProSAFE Managed Switches show mac-address-table static This command displays the static MAC filtering information for all static MAC filters. If you select all, all the static MAC filters in the system are displayed. If you supply a value for <macaddr>, you must also enter a value for <vlanid>, and the system displays static MAC filter information only for that MAC address and VLAN. Format show mac-address-table static {<macaddr> <vlanid> | all} Mode Privileged EXEC Term Definition MAC Address The MAC Address of the static MAC filter entry. VLAN ID The VLAN ID of the static MAC filter entry. Source Port(s) The source port filter set's slot and port(s). Note: Only multicast address filters will have destination port lists. show mac-address-table staticfiltering This command displays the static filtering entries in the Multicast Forwarding Database (MFDB) table. Format show mac-address-table staticfiltering Mode Privileged EXEC Term Definition Mac Address A unicast MAC address for which the switch has forwarding and or filtering information. As the data is gleaned from the MFDB, the address will be a multicast address. The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as 8 bytes. Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to the table as a result of a learning process or protocol. Description The text description of this multicast table entry. Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:). Switching Commands 132 M4100 Series ProSAFE Managed Switches DHCP L2 Relay Agent Commands You can enable the switch to operate as a DHCP Layer 2 relay agent to relay DHCP requests from clients to a Layer 3 relay agent or server. The Circuit ID and Remote ID can be added to DHCP requests relayed from clients to a DHCP server. This information is included in DHCP Option 82, as specified in sections 3.1 and 3.2 of RFC3046. dhcp l2relay Use this command to enable the DHCP Layer 2 Relay agent for an interface, a range of interfaces, or all interfaces. The subsequent commands mentioned in this section can be used only when the DHCP L2 relay is enabled. Format dhcp l2relay Modes • • Global Config Interface Config no dhcp l2relay Use this command to disable the DHCP Layer 2 relay agent for an interface or range of interfaces. Format no dhcp l2relay Modes • • Global Config Interface Config dhcp l2relay circuit-id vlan Use this parameter to set the DHCP Option-82 Circuit ID for a VLAN. When enabled, the interface number is added as the Circuit ID in DHCP option 82. Vlan-list range is 1–4093. Separate non-consecutive IDs with a comma (,), and do not insert spaces or zeros in between the range. Use a dash (–) for the range. Format dhcp l2relay circuit-id vlan <vlan-list> Mode Global Config no dhcp l2relay circuit-id vlan Use this parameter to clear the DHCP Option-82 Circuit ID for a VLAN. Format no dhcp l2relay circuit-id vlan <vlan-list> Mode Global Config Switching Commands 133 M4100 Series ProSAFE Managed Switches dhcp l2relay remote-id vlan Use this parameter to set the DHCP Option-82 Remote ID for a VLAN and subscribed service (based on subscription-name). The vlan–list range is 1–4093. Separate non-consecutive IDs with a comma (,), and do not insert spaces or zeros between the range. Use a dash (–) for the range. Format dhcp l2relay remote-id <remote-id-string> vlan <vlan-list> Mode Global Config no dhcp l2relay remote-id vlan Use this parameter to clear the DHCP Option-82 Remote ID for a VLAN and subscribed service (based on subscription-name). Format no dhcp l2relay remote-id vlan <vlan-list> Mode Global Config dhcp l2relay vlan Use this command to enable the DHCP L2 Relay agent for a set of VLANs. All DHCP packets which arrive on interfaces in the configured VLAN are subject to L2 Relay processing. vlan–list range is 1–4093. Separate non-consecutive IDs with a comma (,), and do not insert spaces or zeros between the range. Use a dash (–) for the range. Default disabled Format dhcp l2relay vlan <vlan-list> Mode Global Config no dhcp l2relay vlan Use this command to disable the DHCP L2 Relay agent for a set of VLANs. Format no dhcp l2relay vlan <vlan-list> Mode Global Config dhcp l2relay trust Use this command to configure an interface or range of interfaces as trusted for Option-82 reception. Default untrusted Format dhcp l2relay trust Mode Interface Config Switching Commands 134 M4100 Series ProSAFE Managed Switches no dhcp l2relay trust Use this command to configure an interface to the default untrusted for Option-82 reception. Format no dhcp l2relay trust Mode Interface Config show dhcp l2relay all Use this command to display the summary of DHCP L2 Relay configuration. Format show dhcp l2relay all Mode Privileged EXEC Command example: (NETGEAR Switch) #show dhcp l2relay all DHCP L2 Relay is Enabled. Interface L2RelayMode TrustMode --------------------------------0/2 Enabled untrusted 0/4 Disabled trusted VLAN Id L2 Relay CircuitId RemoteId --------------------------------------3 Disabled Enabled --NULL— 5 Enabled Enabled --NULL— 6 Enabled Enabled netgear 7 Enabled Disabled --NULL— 8 Enabled Disabled --NULL— 9 Enabled Disabled --NULL— 10 Enabled Disabled --NULL— show dhcp l2relay interface Use this command to display DHCP L2 relay configuration specific to interfaces. Format show dhcp l2relay interface {all | <slot/port>} Mode Privileged EXEC Command example: (NETGEAR Switch) #show dhcp l2relay interface all DHCP L2 Relay is Enabled. Interface L2RelayMode TrustMode --------------------------------0/2 Enabled untrusted 0/4 Disabled trusted Switching Commands 135 M4100 Series ProSAFE Managed Switches show dhcp l2relay stats interface Use this command to display statistics specific to DHCP L2 Relay configured interface. Format show dhcp l2relay stats interface {all | <slot/port>} Mode Privileged EXEC Command example: (NETGEAR Switch) #show dhcp l2relay stats interface all DHCP L2 Relay is Enabled. Interface UntrustedServer UntrustedClient TrustedServer TrustedClient MsgsWithOpt82 MsgsWithOpt82 MsgsWithoutOpt82 MsgsWithoutOpt82 --------- --------------- ----------------- ----------------- -------------0/1 0 0 0 0 0/2 0 0 3 7 0/3 0 0 0 0 0/4 0 12 0 0 0/5 0 0 0 0 0/6 3 0 0 0 0/7 0 0 0 0 0/8 0 0 0 0 0/9 0 0 0 0 show dhcp l2relay agent-option vlan Use this command to display the DHCP L2 Relay Option-82 configuration specific to VLAN. Format show dhcp l2relay agent-option vlan <vlan-range> Mode Privileged EXEC Command example: (NETGEAR Switch) #show dhcp l2relay agent-option vlan 5-10 DHCP L2 Relay is Enabled. VLAN Id L2 Relay CircuitId RemoteId --------------------------------------5 Enabled Enabled --NULL— 6 Enabled Enabled netgear 7 Enabled Disabled --NULL— 8 Enabled Disabled --NULL— 9 Enabled Disabled --NULL— 10 Enabled Disabled --NULL-- Switching Commands 136 M4100 Series ProSAFE Managed Switches DHCP Client Commands DHCP Client can include vendor and configuration information in DHCP client requests relayed to a DHCP server. This information is included in DHCP Option 60, Vendor Class Identifier. The information is a string of 128 octets. dhcp client vendor-id-option Use this command to enable the inclusion of DHCP Option-60, Vendor Class Identifier included in the requests transmitted to the DHCP server by the DHCP client operating in the switch. Format dhcp client vendor-id-option Mode Global Config no dhcp client vendor-id-option Use this command to disable the inclusion of DHCP Option-60, Vendor Class Identifier included in the requests transmitted to the DHCP server by the DHCP client operating in the switch. Format no dhcp client vendor-id-option Mode Global Config dhcp client vendor-id-option-string Use this command to set the DHCP Vendor Option-60 string to be included in requests transmitted to the DHCP server by the DHCP client operating in the switch. Format dhcp client vendor-id-option-string <string> Mode Global Config no dhcp client vendor-id-option-string Use this command to clear the DHCP Vendor Option-60 string. Format no dhcp client vendor-id-option-string Mode Global Config Switching Commands 137 M4100 Series ProSAFE Managed Switches show dhcp client vendor-id-option Use this command to display the configured administration mode of the vendor-id-option and the vendor-id string to be included in Option-43 in DHCP requests. Format show dhcp client vendor-id-option Mode Privileged EXEC Command example: (NETGEAR Switch) #show dhcp client vendor-id-option DHCP Client Vendor Identifier Option ........... Enabled DHCP Client Vendor Identifier Option string .... Client DHCP Snooping Configuration Commands This section describes commands you use to configure DHCP Snooping. ip dhcp snooping Use this command to enable DHCP Snooping globally. Default disabled Format ip dhcp snooping Mode Global Config no ip dhcp snooping Use this command to disable DHCP Snooping globally. Format no ip dhcp snooping Mode Global Config ip dhcp snooping vlan Use this command to enable DHCP Snooping on a list of comma-separated VLAN ranges. Default disabled Format ip dhcp snooping vlan <vlan-list> Mode Global Config Switching Commands 138 M4100 Series ProSAFE Managed Switches no ip dhcp snooping vlan Use this command to disable DHCP Snooping on VLANs. Format no ip dhcp snooping vlan <vlan-list> Mode Global Config ip dhcp snooping verify mac-address Use this command to enable verification of the source MAC address with the client hardware address in the received DCHP message. Default enabled Format ip dhcp snooping verify mac-address Mode Global Config no ip dhcp snooping verify mac-address Use this command to disable verification of the source MAC address with the client hardware address. Format no ip dhcp snooping verify mac-address Mode Global Config ip dhcp snooping database Use this command to configure the persistent location of the DHCP Snooping database. This can be local or a remote file on a specified computer. Default local Format ip dhcp snooping database {local | <tftp://hostIP> / <filename>} Mode Global Config ip dhcp snooping database write-delay Use this command to configure the interval in seconds at which the DHCP Snooping database will be persisted. The interval value ranges from 15 to 86,400 seconds. Default 300 seconds Format ip dhcp snooping database write-delay <seconds> Mode Global Config Switching Commands 139 M4100 Series ProSAFE Managed Switches no ip dhcp snooping database write-delay Use this command to set the write delay value to the default value. Format no ip dhcp snooping database write-delay Mode Global Config ip dhcp snooping binding Use this command to configure static DHCP Snooping binding. Format ip dhcp snooping binding <mac-address> vlan <vlan id> <ip address> interface <slot/port> Mode Global Config no ip dhcp snooping binding <mac-address> Use this command to remove the DHCP static entry from the DHCP Snooping database. Format no ip dhcp snooping binding <mac-address> Mode Global Config ip verify binding Use this command to configure static IP source guard (IPSG) entries. Format ip verify binding <mac-address> vlan <vlan id> <ip address> interface <slot/port> Mode Global Config no ip verify binding Use this command to remove the IPSG static entry from the IPSG database. Format no ip verify binding <mac-address> vlan <vlan id> <ip address> interface <slot/port> Mode Global Config Switching Commands 140 M4100 Series ProSAFE Managed Switches ip dhcp snooping limit Use this command to control the rate at which the DHCP Snooping messages come. The default rate is 15 pps with a range from 0 to 30 pps. The default burst level is 1 second with a range of 1–15 seconds. Default 15 pps for rate limiting and 1 sec for burst interval Format ip dhcp snooping limit {rate <pps> [burst interval <seconds>]} Mode Interface Config no ip dhcp snooping limit Use this command to set the rate at which the DHCP Snooping messages come, and the burst level, to the defaults. Format no ip dhcp snooping limit Mode Interface Config ip dhcp snooping log-invalid Use this command to control the logging DHCP messages filtration by the DHCP Snooping application. Default disabled Format ip dhcp snooping log-invalid Mode Interface Config no ip dhcp snooping log-invalid Use this command to disable the logging DHCP messages filtration by the DHCP Snooping application. Format no ip dhcp snooping log-invalid Mode Interface Config ip dhcp snooping trust Use this command to configure the port as trusted. Default disabled Format ip dhcp snooping trust Mode Interface Config Switching Commands 141 M4100 Series ProSAFE Managed Switches no ip dhcp snooping trust Use this command to configure the port as untrusted. Format no ip dhcp snooping trust Mode Interface Config ip verify source Use this command to configure the IPSG source ID attribute to filter the data traffic in the hardware. Source ID is the combination of IP address and MAC address. Normal command allows data traffic filtration based on the IP address. With the port-security option, the data traffic will be filtered based on the IP and MAC addresses. Default The source ID is the IP address Format ip verify source [port-security] Mode Interface Config no ip verify source Use this command to disable the IPSG configuration in the hardware. You cannot disable port-security alone if it is configured. Format no ip verify source Mode Interface Config show ip dhcp snooping Use this command to display the DHCP Snooping global configurations and per port configurations. Format show ip dhcp snooping Mode • • Privileged EXEC User EXEC Term Definition Interface The interface for which data is displayed. Trusted If it is enabled, DHCP snooping considers the port as trusted. The factory default is disabled. Log Invalid Pkts If it is enabled, DHCP snooping application logs invalid packets on the specified interface. Switching Commands 142 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show ip dhcp snooping DHCP DHCP DHCP 11 - snooping is Disabled snooping source MAC verification is enabled snooping is enabled on the following VLANs: 30, 40 Interface --------0/1 0/2 0/3 0/4 0/6 Trusted -------Yes No No No No Log Invalid Pkts ---------------No Yes Yes No No show ip dhcp snooping binding Use this command to display the DHCP Snooping binding entries. To restrict the output, use the following options: • Dynamic: Restrict the output based on DCHP snooping. • Interface: Restrict the output based on a specific interface. • Static: Restrict the output based on static entries. • VLAN: Restrict the output based on VLAN. Format show ip dhcp snooping binding [static | dynamic] [interface <slot/port>] [<vlan id>] Mode • • Privileged EXEC User EXEC Term Definition MAC Address Displays the MAC address for the binding that was added. The MAC address is the key to the binding database. IP Address Displays the valid IP address for the binding rule. VLAN The VLAN for the binding rule. Interface The interface to add a binding into the DHCP snooping interface. Type Binding type; statically configured from the CLI or dynamically learned. Lease (sec) The remaining lease time for the entry. Switching Commands 143 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show ip dhcp snooping binding Total number of bindings: 2 MAC Address -----------------00:02:B3:06:60:80 00:0F:FE:00:13:04 IP Address -----------210.1.1.3 210.1.1.4 VLAN ---10 10 Interface --------0/1 0/1 Type Lease (Secs) ---- ------------86400 86400 show ip dhcp snooping database Use this command to display the DHCP Snooping configuration related to the database persistency. Format show ip dhcp snooping database Mode • • Privileged EXEC User EXEC Term Definition Agent URL Bindings database agent URL. Write Delay The maximum write time to write the database into local or remote. Command example: (NETGEAR Switch) #show ip dhcp snooping database agent url: write-delay: /10.131.13.79:/sai1.txt 5000 show ip dhcp snooping interfaces Use this command to show the DHCP Snooping status of the interfaces. Format show ip dhcp snooping interfaces Mode Privileged EXEC Switching Commands 144 M4100 Series ProSAFE Managed Switches show ip dhcp snooping statistics Use this command to list statistics for DHCP Snooping security violations on untrusted ports. Format show ip dhcp snooping statistics Mode • • Privileged EXEC User EXEC Term Definition Interface The IP address of the interface in slot/port format. MAC Verify Failures Represents the number of DHCP messages that were filtered on an untrusted interface because of source MAC address and client HW address mismatch. Client Ifc Mismatch Represents the number of DHCP release and Deny messages received on the different ports than learned previously. DHCP Server Msgs Rec’d Represents the number of DHCP server messages received on Untrusted ports. Command example: (NETGEAR Switch) #show ip dhcp snooping statistics Interface ----------0/2 0/3 0/4 0/5 0/6 0/7 0/8 0/9 0/10 0/11 0/12 0/13 0/14 0/15 0/16 0/17 0/18 0/19 0/20 MAC Verify Failures ---------0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Client Ifc Mismatch ---------0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 DHCP Server Msgs Rec'd ----------0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Switching Commands 145 M4100 Series ProSAFE Managed Switches clear ip dhcp snooping binding Use this command to clear all DHCP Snooping bindings on all interfaces or on a specific interface. Format clear ip dhcp snooping binding [interface <slot/port>] Mode • • Privileged EXEC User EXEC clear ip dhcp snooping statistics Use this command to clear all DHCP Snooping statistics. Format clear ip dhcp snooping statistics Mode • • Privileged EXEC User EXEC show ip verify source Use this command to display the IPSG configurations on all ports. Format show ip verify source Mode • • Privileged EXEC User EXEC Term Definition Interface Interface address in slot/port format. Filter Type Is one of two values: • ip-mac: User has configured MAC address filtering on this interface. • ip: Only IP address filtering on this interface. IP Address IP address of the interface MAC Address If MAC address filtering is not configured on the interface, the MAC Address field is empty. If port security is disabled on the interface, then the MAC Address field displays “permit-all.” VLAN The VLAN for the binding rule. Command example: (NETGEAR Switch) #show ip verify source Interface --------0/1 0/1 Filter Type ----------ip-mac ip-mac IP Address --------------210.1.1.3 210.1.1.4 MAC Address ----------------00:02:B3:06:60:80 00:0F:FE:00:13:04 Switching Commands 146 Vlan ----10 10 M4100 Series ProSAFE Managed Switches show ip source binding This command displays the IPSG bindings. Format show ip source binding [static | dynamic] [interface <slot/port>] [<vlan id>] Mode • • Privileged EXEC User EXEC Term Definition MAC Address The MAC address for the entry that is added. IP Address The IP address of the entry that is added. Type Entry type; statically configured from CLI or dynamically learned from DHCP Snooping. VLAN VLAN for the entry. Interface IP address of the interface in slot/port format. Command example: (NETGEAR Switch) #show ip source binding MAC Address ----------------00:00:00:00:00:08 IP Address --------------1.2.3.4 Type ------------dhcp-snooping Vlan ----2 Interface ------------0/1 00:00:00:00:00:09 1.2.3.4 dhcp-snooping 3 0/1 00:00:00:00:00:0A 1.2.3.4 dhcp-snooping 4 0/1 Dynamic ARP Inspection Commands Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. DAI prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting neighbors. The miscreant sends ARP requests or responses mapping another station’s IP address to its own MAC address. DAI relies on DHCP snooping. DHCP snooping listens to DHCP message exchanges and builds a binding database of valid (MAC address, IP address, VLAN, and interface) tuples. When DAI is enabled, the switch drops ARP packets whose sender MAC address and sender IP address do not match an entry in the DHCP snooping bindings database. You can optionally configure additional ARP packet validation. Switching Commands 147 M4100 Series ProSAFE Managed Switches ip arp inspection vlan Use this command to enable Dynamic ARP Inspection on a list of comma-separated VLAN ranges. Default disabled Format ip arp inspection vlan <vlan-list> Mode Global Config no ip arp inspection vlan Use this command to disable Dynamic ARP Inspection on a list of comma-separated VLAN ranges. Format no ip arp inspection vlan <vlan-list> Mode Global Config ip arp inspection validate Use this command to enable additional validation checks like source-mac validation, destination-mac validation, and ip address validation on the received ARP packets. Each command overrides the configuration of the previous command. For example, if a command enables src-mac and dst-mac validations, and a second command enables IP validation only, the src-mac and dst-mac validations are disabled as a result of the second command. Default disabled Format ip arp inspection validate {[src-mac] [dst-mac] [ip]} Mode Global Config no ip arp inspection validate Use this command to disable the additional validation checks on the received ARP packets. Format no ip arp inspection validate {[src-mac] [dst-mac] [ip]} Mode Global Config ip arp inspection vlan logging Use this command to enable logging of invalid ARP packets on a list of comma-separated VLAN ranges. Default enabled Format ip arp inspection vlan <vlan-list> logging Mode Global Config Switching Commands 148 M4100 Series ProSAFE Managed Switches no ip arp inspection vlan logging Use this command to disable logging of invalid ARP packets on a list of comma-separated VLAN ranges. Format no ip arp inspection vlan <vlan-list> logging Mode Global Config ip arp inspection trust Use this command to configure an interface as trusted for Dynamic ARP Inspection. Default enabled Format ip arp inspection trust Mode Interface Config no ip arp inspection trust Use this command to configure an interface as untrusted for Dynamic ARP Inspection. Format no ip arp inspection trust Mode Interface Config ip arp inspection limit Use this command to configure the rate limit and burst interval values for an interface. Configuring none for the limit means that the interface is not rate limited for Dynamic ARP Inspections. Note: The user interface will accept a rate limit for a trusted interface, but the limit will not be enforced unless the interface is configured to be untrusted. Default 15 pps for rate and 1 second for burst-interval Format ip arp inspection limit {rate <pps> [burst interval <seconds>] | none} Mode Interface Config Switching Commands 149 M4100 Series ProSAFE Managed Switches no ip arp inspection limit Use this command to set the rate limit and burst interval values for an interface to the default values of 15 pps and 1 second, respectively. Format no ip arp inspection limit Mode Interface Config ip arp inspection filter Use this command to configure the ARP ACL used to filter invalid ARP packets on a list of comma-separated VLAN ranges. If you enter the static keyword, packets that do not match a permit statement are dropped without consulting the DHCP snooping bindings. Default No ARP ACL is configured on a VLAN Format ip arp inspection filter <acl-name> vlan <vlan-list> [static] Mode Global Config no ip arp inspection filter Use this command to unconfigure the ARP ACL used to filter invalid ARP packets on a list of comma-separated VLAN ranges. Format no ip arp inspection filter <acl-name> vlan <vlan-list> [static] Mode Global Config arp access-list Use this command to create an ARP ACL. Format arp access-list <acl-name> Mode Global Config no arp access-list Use this command to delete a configured ARP ACL. Format no arp access-list <acl-name> Mode Global Config Switching Commands 150 M4100 Series ProSAFE Managed Switches permit ip host mac host Use this command to configure a rule for a valid IP address and MAC address combination used in ARP packet validation. Format permit ip host <sender-ip> mac host <sender-mac> Mode ARP Access-list Config no permit ip host mac host Use this command to delete a rule for a valid IP and MAC combination. Format no permit ip host <sender-ip> mac host <sender-mac> Mode ARP Access-list Config show ip arp inspection Use this command to display the Dynamic ARP Inspection global configuration and configuration on all the VLANs. With the <vlan-list> argument (that is, comma-separated VLAN ranges), the command displays the global configuration and configuration on all the VLANs in the VLAN list. The global configuration includes the source mac validation, destination mac validation, and invalid IP validation information. Format show ip arp inspection [vlan <vlan-list>] Mode • • Privileged EXEC User EXEC Term Definition Source MAC Validation Displays whether Source MAC Validation of ARP frame is enabled or disabled. Destination MAC Displays whether Destination MAC Validation is enabled or disabled. Validation IP Address Validation Displays whether IP Address Validation is enabled or disabled. VLAN The VLAN ID for each displayed row. Configuration Displays whether DAI is enabled or disabled on the VLAN. Log Invalid Displays whether logging of invalid ARP packets is enabled on the VLAN. ACL Name The ARP ACL Name, if configured on the VLAN. Static Flag If the ARP ACL is configured static on the VLAN. Switching Commands 151 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show ip arp inspection vlan 10-12 Source Mac Validation : Disabled Destination Mac Validation : Disabled IP Address Validation : Disabled Vlan ---10 11 12 Configuration ------------Enabled Disabled Enabled Log Invalid ----------Enabled Enabled Disabled ACL Name --------H2 Static flag ---------Enabled show ip arp inspection statistics Use this command to display the statistics of the ARP packets processed by Dynamic ARP Inspection. Give the vlan-list argument and the command displays the statistics on all DAI-enabled VLANs in that list. Give the single vlan argument and the command displays the statistics on that VLAN. If no argument is included, the command lists a summary of the forwarded and dropped ARP packets. Format show ip arp inspection statistics [vlan <vlan-list>] Mode • • Privileged EXEC User EXEC Term Definition VLAN The VLAN ID for each displayed row. Forwarded The total number of valid ARP packets forwarded in this VLAN. Dropped The total number of not valid ARP packets dropped in this VLAN. DHCP Drops The number of packets dropped due to DHCP snooping binding database match failure. ACL Drops The number of packets dropped due to ARP ACL rule match failure. DHCP Permits The number of packets permitted due to DHCP snooping binding database match. ACL Permits The number of packets permitted due to ARP ACL rule match. Bad Src MAC The number of packets dropped due to Source MAC validation failure. Bad Dest MAC The number of packets dropped due to Destination MAC validation failure. Invalid IP The number of packets dropped due to invalid IP checks. Switching Commands 152 M4100 Series ProSAFE Managed Switches Command example: The following example shows CLI output for the show ip arp inspection statistics command, which lists the summary of forwarded and dropped ARP packets on all DAI-enabled VLANs. VLAN ---10 20 Forwarded --------90 10 Dropped ------14 3 Command example: (NETGEAR Switch) #show ip arp inspection statistics vlan <vlan-list> VLAN DHCP ACL DHCP ACL Bad Src Bad Dest Invalid Drops Drops Permits Permits MAC MAC IP ----- -------- --------- ----------- --------- ---------- ----------- --------10 11 1 65 25 1 1 0 20 1 0 8 2 0 1 1 clear ip arp inspection statistics Use this command to reset the statistics for Dynamic ARP Inspection on all VLANs. Default none Format clear ip arp inspection statistics Mode Privileged EXEC show ip arp inspection interfaces Use this command to display the Dynamic ARP Inspection configuration on all the DAI-enabled interfaces. An interface is said to be enabled for DAI if at least one VLAN, that the interface is a member of, is enabled for DAI. If you enter the <slot/port> interface argument, the command displays the values for that interface whether the interface is enabled for DAI or not. Format show ip arp inspection interfaces [<slot/port>] Mode • • Privileged EXEC User EXEC Term Definition Interface The interface ID for each displayed row. Trust State Whether the interface is trusted or untrusted for DAI. Switching Commands 153 M4100 Series ProSAFE Managed Switches Term Definition Rate Limit The configured rate limit value in packets per second. Burst Interval The configured burst interval value in seconds. Command example: (NETGEAR Switch) #show ip arp inspection interfaces Interface Trust State --------------0/1 0/2 Rate Limit Burst Interval (pps) (seconds) -------------------- --------------Untrusted 15 1 Untrusted 10 10 show arp access-list Use this command to display the configured ARP ACLs with the rules. Giving an ARP ACL name as the argument will display only the rules in that ARP ACL. Format show arp access-list [<acl-name>] Mode • • Privileged EXEC User EXEC Command example: (NETGEAR Switch) #show arp access-list ARP access permit permit ARP access ARP access permit list H2 ip host 1.1.1.1 mac host 00:01:02:03:04:05 ip host 1.1.1.2 mac host 00:03:04:05:06:07 list H3 list H4 ip host 2.1.1.2 mac host 00:03:04:05:06:08 IGMP Snooping Configuration Commands This section describes the commands you use to configure IGMP snooping. The software supports IGMP Versions 1, 2, and 3. The IGMP snooping feature can help conserve bandwidth because it allows the switch to forward IP multicast traffic only to connected hosts that request multicast traffic. IGMPv3 adds source filtering capabilities to IGMP versions 1 and 2. Switching Commands 154 M4100 Series ProSAFE Managed Switches set igmp This command enables IGMP Snooping on the system (Global Config Mode) or an interface (Interface Config Mode). This command also enables IGMP snooping on a particular VLAN (VLAN Config Mode) and can enable IGMP snooping on all interfaces participating in a VLAN. If an interface has IGMP Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel (LAG), IGMP Snooping functionality is disabled on that interface. IGMP Snooping functionality is re-enabled if you disable routing or remove port-channel (LAG) membership from an interface that has IGMP Snooping enabled. The IGMP application supports the following activities: • Validation of the IP header checksum (as well as the IGMP header checksum) and discarding of the frame upon checksum error. • Maintenance of the forwarding table entries based on the MAC address versus the IP address. • Flooding of unregistered multicast data packets to all ports in the VLAN. Default disabled Format set igmp Mode • • Format set igmp <vlanid> Mode VLAN Config Global Config Interface Config no set igmp This command disables IGMP Snooping on the system, an interface, or a VLAN. Format no set igmp Mode • • Format no set igmp <vlanid> Mode VLAN Config Global Config Interface Config set igmp interfacemode This command enables IGMP Snooping on all interfaces. If an interface has IGMP Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel (LAG), IGMP Snooping functionality is disabled on that interface. IGMP Snooping functionality is re-enabled if you disable routing or remove port-channel (LAG) membership from an interface that has IGMP Snooping enabled. Switching Commands 155 M4100 Series ProSAFE Managed Switches Default disabled Format set igmp interfacemode Mode Global Config no set igmp interfacemode This command disables IGMP Snooping on all interfaces. Format no set igmp interfacemode Mode Global Config set igmp fast-leave This command enables or disables IGMP Snooping fast-leave admin mode on a selected interface or VLAN. Enabling fast-leave allows the switch to immediately remove the layer 2 LAN interface from its forwarding table entry upon receiving an IGMP leave message for that multicast group without first sending out MAC-based general queries to the interface. You should enable fast-leave admin mode only on VLANs where only one host is connected to each layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN port but were still interested in receiving multicast traffic directed to that group. Also, fast-leave processing is supported only with IGMP version 2 hosts. Default disabled Format set igmp fast-leave Mode Interface Config Format set igmp fast-leave <vlan id> Mode VLAN Config no set igmp fast-leave This command disables IGMP Snooping fast-leave admin mode on a selected interface. Format no set igmp fast-leave Mode Interface Config Format no set igmp fast-leave <vlan id> Mode VLAN Config Switching Commands 156 M4100 Series ProSAFE Managed Switches set igmp groupmembership-interval This command sets the IGMP Group Membership Interval time on a VLAN, one interface, or all interfaces. The Group Membership Interval time is the amount of time in seconds that a switch waits for a report from a particular group on a particular interface before deleting the interface from the entry. This value must be greater than the IGMPv3 Maximum Response time value. The range is 2–3600 seconds. Default 260 seconds Format set igmp groupmembership-interval <2-3600> Mode • • Format set igmp groupmembership-interval <vlan id> <2-3600> Mode VLAN Config Interface Config Global Config no set igmp groupmembership-interval This command sets the IGMPv3 Group Membership Interval time to the default value. Format no set igmp groupmembership-interval Mode • • Format no set igmp groupmembership-interval <vlan id> Mode VLAN Config Interface Config Global Config set igmp maxresponse This command sets the IGMP Maximum Response time for the system, or on a particular interface or VLAN. The Maximum Response time is the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface. This value must be less than the IGMP Query Interval time value. The range is 1–25 seconds. Default 10 seconds Format set igmp maxresponse <1-25> Mode • • Format set igmp maxresponse <vlan id> <1-25> Mode VLAN Config Global Config Interface Config Switching Commands 157 M4100 Series ProSAFE Managed Switches no set igmp maxresponse This command sets the max response time (on the interface or VLAN) to the default value. Format no set igmp maxresponse Mode • • Format no set igmp maxresponse <vlan id> Mode VLAN Config Global Config Interface Config set igmp mcrtrexpiretime This command sets the Multicast Router Present Expiration time. The time is set for the system, on a particular interface or VLAN. This is the amount of time in seconds that a switch waits for a query to be received on an interface before the interface is removed from the list of interfaces with multicast routers attached. The range is 0–3600 seconds. A value of 0 indicates an infinite time-out, that is, no expiration. Default 0 Format set igmp mcrtrexpiretime <0-3600> Mode • • Format set igmp mcrtrexpiretime <vlan id> <0-3600> Mode VLAN Config Global Config Interface Config no set igmp mcrtrexpiretime This command sets the Multicast Router Present Expiration time to 0. The time is set for the system, on a particular interface or a VLAN. Format no set igmp mcrtrexpiretime Mode • • Format no set igmp mcrtrexpiretime <vlan id> Mode VLAN Config Global Config Interface Config Switching Commands 158 M4100 Series ProSAFE Managed Switches set igmp mrouter This command configures the VLAN ID (<vlan id>) for which the multicast router mode enabled. Format set igmp mrouter <vlan id> Mode Interface Config no set igmp mrouter This command disables multicast router mode for a particular VLAN ID (<vlan id>). Format no set igmp mrouter <vlan id> Mode Interface Config set igmp mrouter interface This command configures the interface as a multicast router interface. When configured as a multicast router interface, the interface is treated as a multicast router interface in all VLANs. Default disabled Format set igmp mrouter interface Mode Interface Config no set igmp mrouter interface This command disables the status of the interface as a statically configured multicast router interface. Format no set igmp mrouter interface Mode Interface Config set igmp report-suppression Use this command to suppress the IGMP reports on a VLAN. In order to optimize the number of reports traversing the network with no added benefits, a Report Suppression mechanism is implemented. When more than one client responds to an MGMD query for the same Multicast Group address within the max-response-time, only the first response is forwarded to the query and others are suppressed at the switch. Default Disabled Format set igmp report-suppression <1-4093> Mode VLAN Config Switching Commands 159 M4100 Series ProSAFE Managed Switches no set igmp report-suppression Use this command to restore the system default. Format no set igmp report-suppression Mode VLAN Config set igmp header-validation If IGMP IP header validation is enabled, then 3 fields TTL (Time To Live), ToS (Type of Service), and Router Alert options are checked. The fields checked depend on the IGMP version. The TTL field is validated in all the versions (IGMPv1, IGMPv2 and IGMPv3). The Router Alert field is validated in IGMPv2 and IGMPv3. The ToS field is validated only in IGMP version3. Default Enabled Format set igmp header-validation Mode Global Config no set igmp header-validation This command disabled the IGMP IP header validation. Format no set igmp header-validation Mode Global Config mac address-table multicast forbidden-unregistered vlan Use this command to forbid forwarding unregistered multicast addresses (in other words, unknown multicast traffic) on a VLAN. Default Disabled Format mac address-table multicast forbidden-unregistered vlan <1-4093> Mode Global Config no mac address-table multicast forbidden-unregistered vlan Use this command to restore the default. Format mac address-table multicast forbidden-unregistered vlan Mode Global Config Switching Commands 160 M4100 Series ProSAFE Managed Switches mac address-table multicast forward-unregistered vlan Use this command to enable forwarding unregistered multicast address (in other words, unknown multicast traffic) on a VLAN. Format mac address-table multicast forward-unregistered vlan <1-4093> Mode Global Config mac address-table multicast forward-all vlan Use this command to enable forwarding of all multicast packets on a VLAN. Format mac address-table multicast forward-all vlan <1-4093> Mode Global Config no mac address-table multicast forward-all vlan Use this command to restore the system default. Format no mac address-table multicast forward-all vlan Mode Global Config show igmpsnooping This command displays IGMP Snooping information. Configured information is displayed whether or not IGMP Snooping is enabled. Format show igmpsnooping [<slot/port> | <vlan id>] Mode Privileged EXEC If you do not use the optional <slot/port> or <vlan id> argument, the command displays the information that is described in the following table. Term Definition Admin Mode Indicates whether or not IGMP Snooping is active on the switch. Multicast Control The number of multicast control frames that are processed by the CPU. Frame Count Interface Enabled for IGMP Snooping The list of interfaces on which IGMP Snooping is enabled. VLANS Enabled for IGMP Snooping The list of VLANS on which IGMP Snooping is enabled. Switching Commands 161 M4100 Series ProSAFE Managed Switches If you specify the <slot/port> values, the command displays the information that is described in the following table. Term Definition IGMP Snooping Admin Mode Indicates whether IGMP Snooping is active on the interface. Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the interface. Group Membership Interval The amount of time in seconds that a switch will wait for a report from a particular group on a particular interface before deleting the interface from the entry. This value may be configured. Maximum Response Time The amount of time the switch waits after it sends a query on an interface because it did not receive a report for a particular group on that interface. This value may be configured. Multicast Router Expiry Time The amount of time to wait before removing an interface from the list of interfaces with multicast routers attached. The interface is removed if a query is not received. This value may be configured. If you specify the <vlan id> value, the command displays the information that is described in the following table. Term Definition VLAN ID The VLAN ID. IGMP Snooping Admin Mode Indicates whether IGMP Snooping is active on the VLAN. Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the VLAN. Group Membership Interval The amount of time in seconds that a switch will wait for a report from a particular group on a particular interface, which is participating in the VLAN, before deleting the interface from the entry. This value may be configured. Maximum Response Time The amount of time the switch waits after it sends a query on an interface, participating in the VLAN, because it did not receive a report for a particular group on that interface. This value may be configured. Multicast Router Expiry Time The amount of time to wait before removing an interface that is participating in the VLAN from the list of interfaces with multicast routers attached. The interface is removed if a query is not received. This value may be configured. show igmpsnooping mrouter interface This command displays information about statically configured ports. Format show igmpsnooping mrouter interface <slot/port> Mode Privileged EXEC Switching Commands 162 M4100 Series ProSAFE Managed Switches Term Definition Interface The port on which multicast router information is being displayed. Multicast Router Attached Indicates whether multicast router is statically enabled on the interface. VLAN ID The list of VLANs of which the interface is a member. show igmpsnooping mrouter vlan This command displays information about statically configured ports. Format show igmpsnooping mrouter vlan <slot/port> Mode Privileged EXEC Term Definition Interface The port on which multicast router information is being displayed. VLAN ID The list of VLANs of which the interface is a member. show mac-address-table igmpsnooping This command displays the IGMP Snooping entries in the MFDB table. Format show mac-address-table igmpsnooping Mode Privileged EXEC show mac address-table multicast filtering Use this command to display the multicast filtering details for a VLAN. Format show mac address-table multicast filtering <vlan-id> Mode Privileged EXEC Field Description <vlan id> A valid VLAN ID mode The filtering mode Command example: (NETGEAR Switch) #show mac address-table multicast filtering 1 VLAN-ID....... 1 Mode.......... Forward-Forbidden-Unregistered Switching Commands 163 M4100 Series ProSAFE Managed Switches IGMP Snooping Querier Commands IGMP Snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the “IGMP Querier”. The IGMP query responses, known as IGMP reports, keep the switch updated with the current multicast group membership on a port-by-port basis. If the switch does not receive updated membership information in a timely fashion, it will stop forwarding multicast to the port where the end device is located. This section describes commands used to configure and display information about IGMP Snooping Queriers on the network and, separately, on VLANs. set igmp querier Use this command to enable IGMP Snooping Querier on the system, using Global Config mode, or on a VLAN. Using this command, you can specify the IP Address that the Snooping Querier switch should use as the source address while generating periodic queries. If a VLAN has IGMP Snooping Querier enabled and IGMP Snooping is operationally disabled on it, IGMP Snooping Querier functionality is disabled on that VLAN. IGMP Snooping functionality is re-enabled if IGMP Snooping is operational on the VLAN. Note: The Querier IP Address assigned for a VLAN takes preference over global configuration. The IGMP Snooping Querier application supports sending periodic general queries on the VLAN to solicit membership reports. Default disabled Format set igmp querier [<vlan-id>] [address <ipv4-address>] Mode • • Global Config VLAN Mode no set igmp querier Use this command to disable IGMP Snooping Querier on the system. Use the optional address parameter to reset the querier address to 0.0.0.0. Format no set igmp querier [<vlan-id>] [address] Mode • • Global Config VLAN Mode Switching Commands 164 M4100 Series ProSAFE Managed Switches set igmp querier query-interval Use this command to set the IGMP Querier Query Interval time. It is the amount of time in seconds that the switch waits before sending another general query. Default disabled Format set igmp querier query-interval <1-18000> Mode Global Config no set igmp querier query-interval Use this command to set the IGMP Querier Query Interval time to its default value. Format no set igmp querier query-interval Mode Global Config set igmp querier timer expiry Use this command to set the IGMP Querier timer expiration period. It is the time period that the switch remains in Non-Querier mode once it has discovered that there is a Multicast Querier in the network. Default 60 seconds Format set igmp querier timer expiry <60-300> Mode Global Config no set igmp querier timer expiry Use this command to set the IGMP Querier timer expiration period to its default value. Format no set igmp querier timer expiry Mode Global Config set igmp querier version Use this command to set the IGMP version of the query that the snooping switch is going to send periodically. Default 1 Format set igmp querier version <1-2> Mode Global Config Switching Commands 165 M4100 Series ProSAFE Managed Switches no set igmp querier version Use this command to set the IGMP Querier version to its default value. Format no set igmp querier version Mode Global Config set igmp querier election participate Use this command to enable the Snooping Querier to participate in the Querier Election process when it discovers the presence of another Querier in the VLAN. When this mode is enabled, if the Snooping Querier finds that the other Querier’s source address is better (less) than the Snooping Querier’s address, it stops sending periodic queries. If the Snooping Querier wins the election, then it will continue sending periodic queries. Default disabled Format set igmp querier election participate Mode VLAN Config no set igmp querier election participate Use this command to set the Snooping Querier not to participate in querier election but go into non-querier mode as soon as it discovers the presence of another querier in the same VLAN. Format no set igmp querier election participate Mode VLAN Config show igmpsnooping querier Use this command to display IGMP Snooping Querier information. Configured information is displayed whether or not IGMP Snooping Querier is enabled. Format show igmpsnooping querier [detail | vlan <vlan-id>] Mode Privileged EXEC If you do not use the optional <vlan-id> argument, the command displays the information that is shown in the following table. Term Description Admin Mode Indicates whether or not IGMP Snooping Querier is active on the switch. Admin Version The version of IGMP that will be used while sending out the queries. Switching Commands 166 M4100 Series ProSAFE Managed Switches Term Description Querier Address The IP Address which will be used in the IPv4 header while sending out IGMP queries. It can be configured using the appropriate command. Query Interval The amount of time in seconds that a Snooping Querier waits before sending out the periodic general query. Querier Timeout The amount of time to wait in the Non-Querier operational state before moving to a Querier state. If you specify a value for the <vlan-id> argument, the command displays the information that is shown in the following table. Term Description VLAN Admin Mode Indicates whether iGMP Snooping Querier is active on the VLAN. VLAN Operational State Indicates whether IGMP Snooping Querier is in “Querier” or “Non-Querier” state. When the switch is in Querier state, it will send out periodic general queries. When in Non-Querier state, it will wait for moving to Querier state and does not send out any queries. VLAN Indicates the time to wait before removing a Leave from a host upon receiving a Leave Operational Max request. This value is calculated dynamically from the Queries received from the Response Time network. If the Snooping Switch is in Querier state, then it is equal to the configured value. Querier Election Participation Indicates whether the IGMP Snooping Querier participates in querier election if it discovers the presence of a querier in the VLAN. Querier VLAN Address The IP address will be used in the IPv4 header while sending out IGMP queries on this VLAN. It can be configured using the appropriate command. Operational Version The version of IPv4 will be used while sending out IGMP queries on this VLAN. Last Querier Address Indicates the IP address of the most recent Querier from which a Query was received. Last Querier Version Indicates the IGMP version of the most recent Querier from which a Query was received on this VLAN. If you use the optional detail argument, the command shows the global information and the information for all querier-enabled VLANs. Switching Commands 167 M4100 Series ProSAFE Managed Switches MLD Snooping Commands This section describes commands used for MLD Snooping. In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded only to those interfaces associated with IP multicast addresses. In IPv6, MLD Snooping performs a similar function. With MLD Snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping IPv6 multicast control packets. set mld Use this command to enable MLD Snooping on the system (Global Config Mode) or an interface (Interface Config Mode). This command also enables MLD Snooping on a particular VLAN and enables MLD Snooping on all interfaces participating in a VLAN. If an interface has MLD Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel (LAG), MLD Snooping functionality is disabled on that interface. MLD Snooping functionality is re-enabled if you disable routing or remove port channel (LAG) membership from an interface that has MLD Snooping enabled. MLD Snooping supports the following activities: • Validation of address version, payload length consistencies and discarding of the frame upon error. • Maintenance of the forwarding table entries based on the MAC address versus the IPv6 address. • Flooding of unregistered multicast data packets to all ports in the VLAN. Default disabled Format set mld <vlan-id> Mode • • • Global Config Interface Config VLAN Mode no set mld Use this command to disable MLD Snooping on the system. Format no set mld <vlan-id> Mode • • • Global Config Interface Config VLAN Mode Switching Commands 168 M4100 Series ProSAFE Managed Switches set mld interfacemode Use this command to enable MLD Snooping on all interfaces. If an interface has MLD Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel (LAG), MLD Snooping functionality is disabled on that interface. MLD Snooping functionality is re-enabled if you disable routing or remove port-channel (LAG) membership from an interface that has MLD Snooping enabled. Default disabled Format set mld interfacemode Mode Global Config no set mld interfacemode Use this command to disable MLD Snooping on all interfaces. Format no set mld interfacemode Mode Global Config set mld fast-leave Use this command to enable MLD Snooping fast-leave admin mode on a selected interface or VLAN. Enabling fast-leave allows the switch to immediately remove the Layer 2 LAN interface from its forwarding table entry upon receiving and MLD done message for that multicast group without first sending out MAC-based general queries to the interface. Note: You should enable fast-leave admin mode only on VLANs where only one host is connected to each Layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN port but were still interested in receiving multicast traffic directed to that group. Note: Fast-leave processing is supported only with MLD version 1 hosts. Default disabled Format set mld fast-leave <vlan-id> Mode • • Interface Config VLAN Mode Switching Commands 169 M4100 Series ProSAFE Managed Switches no set mld fast-leave Use this command to disable MLD Snooping fast-leave admin mode on a selected interface. Format no set mld fast-leave <vlan-id> Mode • • Interface Config VLAN Mode set mld groupmembership-interval Use this command to set the MLD Group Membership Interval time on a VLAN, one interface or all interfaces. The Group Membership Interval time is the amount of time in seconds that a switch waits for a report from a particular group on a particular interface before deleting the interface from the entry. This value must be greater than the MLDv2 Maximum Response time value. The range is 2 to 3600 seconds. Default 260 seconds Format set mld groupmembership-interval <vlan-id> <2-3600> Mode • • • Interface Config Global Config VLAN Mode no set groupmembership-interval Use this command to set the MLDv2 Group Membership Interval time to the default value. Format no set mld groupmembership-interval Mode • • • Interface Config Global Config VLAN Mode set mld maxresponse Use this command to set the MLD Maximum Response time for the system, on a particular interface or VLAN. The Maximum Response time is the amount of time in seconds that a switch will wait after sending a query on an interface because it did not receive a report for a particular group in that interface. This value must be less than the MLD Query Interval time value. The range is 1–65 seconds. Default 10 seconds Format set mld maxresponse <1-65> Mode • • • Global Config Interface Config VLAN Mode Switching Commands 170 M4100 Series ProSAFE Managed Switches no set mld maxresponse Use this command to set the max response time (on the interface or VLAN) to the default value. Format no set mld maxresponse Mode • • • Global Config Interface Config VLAN Mode set mld mcrtexpiretime Use this command to set the Multicast Router Present Expiration time. The time is set for the system, on a particular interface or VLAN. This is the amount of time in seconds that a switch waits for a query to be received on an interface before the interface is removed from the list of interfaces with multicast routers attached. The range is 0–3600 seconds. A value of 0 indicates an infinite timeout, that is, no expiration. Default 0 Format set mld mcrtexpiretime <vlan-id> <0-3600> Mode • • Global Config Interface Config no set mld mcrtexpiretime Use this command to set the Multicast Router Present Expiration time to 0. The time is set for the system, on a particular interface or a VLAN. Format no set mld mcrtexpiretime <vlan-id> Mode • • Global Config Interface Config set mld mrouter Use this command to configure the VLAN ID for the VLAN that has the multicast router attached mode enabled. Format set mld mrouter <vlan-id> Mode Interface Config Switching Commands 171 M4100 Series ProSAFE Managed Switches no set mld mrouter Use this command to disable multicast router attached mode for a VLAN with a particular VLAN ID. Format no set mld mrouter <vlan-id> Mode Interface Config set mld mrouter interface Use this command to configure the interface as a multicast router-attached interface. When configured as a multicast router interface, the interface is treated as a multicast router-attached interface in all VLANs. Default disabled Format set mld mrouter interface Mode Interface Config no set mld mrouter interface Use this command to disable the status of the interface as a statically configured multicast router-attached interface. Format no set mld mrouter interface Mode Interface Config show mldsnooping Use this command to display MLD Snooping information. Configured information is displayed whether or not MLD Snooping is enabled. Format show mldsnooping [<slot/port> | <vlan-id>] Mode Privileged EXEC When the optional arguments <slot/port> or <vlan-id> are not used, the command output displays the information that is shown in the following table. Term Definition Admin Mode Indicates whether or not MLD Snooping is active on the switch. Interfaces Interfaces on which MLD Snooping is enabled. Enabled for MLD Snooping Switching Commands 172 M4100 Series ProSAFE Managed Switches Term Definition MLD Control Frame Count Displays the number of MLD Control frames that are processed by the CPU. VLANs Enabled for MLD Snooping VLANs on which MLD Snooping is enabled. When you specify the <slot/port> values, the command output displays the information that is shown in the following table. Term Definition MLD Snooping Admin Mode Indicates whether MLD Snooping is active on the interface. Fast Leave Mode Indicates whether MLD Snooping Fast Leave is active on the VLAN. Group Membership Interval Shows the amount of time in seconds that a switch will wait for a report from a particular group on a particular interface, which is participating in the VLAN, before deleting the interface from the entry. This value may be configured. Max Response Time Displays the amount of time the switch waits after it sends a query on an interface, participating in the VLAN, because it did not receive a report for a particular group on that interface. This value may be configured. Multicast Router Present Expiration Time Displays the amount of time to wait before removing an interface that is participating in the VLAN from the list of interfaces with multicast routers attached. The interface is removed if a query is not received. This value may be configured. When you specify a value for <vlan-id>, the command output displays the information that is shown in the following table. Term Definition VLAN Admin Mode Indicates whether MLD Snooping is active on the VLAN. show mldsnooping mrouter interface Use this command to display information about statically configured multicast router attached interfaces. Format show mldsnooping mrouter interface <slot/port> Mode Privileged EXEC Switching Commands 173 M4100 Series ProSAFE Managed Switches Term Definition Interface Shows the interface on which multicast router information is being displayed. Multicast Router Attached Indicates whether multicast router is statically enabled on the interface. VLAN ID Displays the list of VLANs of which the interface is a member. show mldsnooping mrouter vlan Use this command to display information about statically configured multicast router-attached interfaces. Format show mldsnooping mrouter vlan <slot/port> Mode Privileged EXEC Term Definition Interface Shows the interface on which multicast router information is being displayed. VLAN ID Displays the list of VLANs of which the interface is a member. show mac-address-table mldsnooping Use this command to display the MLD Snooping entries in the Multicast Forwarding Database (MFDB) table. Format show mac-address-table mldsnooping Mode Privileged EXEC Term Definition VLAN ID The VLAN in which the MAC address is learned. MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is 6 two-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB. Type The type of entry, which is either static (added by the user) or dynamic (added to the table as a result of a learning process or protocol.) Description The text description of this multicast table entry. Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:). Switching Commands 174 M4100 Series ProSAFE Managed Switches MLD Snooping Querier Commands In an IPv6 environment, MLD Snooping requires that one central switch or router periodically query all end-devices on the network to announce their multicast memberships. This central device is the MLD Querier. The MLD query responses, known as MLD reports, keep the switch updated with the current multicast group membership on a port-by-port basis. If the switch does not receive updated membership information in a timely fashion, it will stop forwarding multicast frames to the port where the end device is located. This section describes the commands you use to configure and display information on MLD Snooping queries on the network and, separately, on VLANs. set mld querier Use this command to enable MLD Snooping Querier on the system (Global Config Mode) or on a VLAN. Using this command, you can specify the IP address that the snooping querier switch should use as a source address while generating periodic queries. If a VLAN has MLD Snooping Querier enabled and MLD Snooping is operationally disabled on it, MLD Snooping Querier functionality is disabled on that VLAN. MLD Snooping functionality is re-enabled if MLD Snooping is operational on the VLAN. The MLD Snooping Querier sends periodic general queries on the VLAN to solicit membership reports. Default disabled Format set mld querier [vlan-id] [address ipv6_address] Mode • • Global Config VLAN Mode no set mld querier Use this command to disable MLD Snooping Querier on the system. Use the optional parameter address to reset the querier address. Format no set mld querier [vlan-id] [address] Mode • • Global Config VLAN Mode Switching Commands 175 M4100 Series ProSAFE Managed Switches set mld querier query_interval Use this command to set the MLD Querier Query Interval time. This is the amount of time in seconds that the switch waits before sending another general query. Default disabled Format set mld querier query_interval <1-18000> Mode Global Config no set mld querier query_interval Use this command to set the MLD Querier Query Interval time to its default value. Format no set mld querier query_interval Mode Global Config set mld querier timer expiry Use this command to set the MLD Querier timer expiration period. This is the time period that the switch remains in Non-Querier mode once it discovers that there is a Multicast Querier in the network. Default 60 seconds Format set mld querier timer expiry <60-300> Mode Global Config no set mld querier timer expiry Use this command to set the MLD Querier timer expiration period to its default value. Format no set mld querier timer expiry Mode Global Config set mld querier election participate Use this command to enable the Snooping Querier to participate in the Querier Election process when it discovers the presence of another Querier in the VLAN. When this mode is enabled, if the Snooping Querier finds that the other Querier’s source address is better (less) than the Snooping Querier’s address, it stops sending periodic queries. If the Snooping Querier wins the election, then it will continue sending periodic queries. Default disabled Format set mld querier election participate Mode VLAN Config Switching Commands 176 M4100 Series ProSAFE Managed Switches no set mld querier election participate Use this command to set the snooping querier not to participate in querier election, but go into a non-querier mode as soon as it discovers the presence of another querier in the same VLAN. Format no set mld querier election participate Mode VLAN Config show mldsnooping querier Use this command to display MLD Snooping Querier information. Configured information is displayed whether or not MLD Snooping Querier is enabled. Format show mldsnooping querier [{detail | vlan <vlanid>}] Mode Privileged EXEC When the optional arguments vlandid are not used, the command displays the following information. Term Description Admin Mode Indicates whether or not MLD Snooping Querier is active on the switch. Admin Version Indicates the version of MLD that will be used while sending out the queries. This is defaulted to MLD v1 and it cannot be changed. Querier Address Shows the IP address which will be used in the IPv6 header while sending out MLD queries. It can be configured using the appropriate command. Query Interval Shows the amount of time in seconds that a Snooping Querier waits before sending out the periodic general query. Querier Timeout Displays the amount of time to wait in the Non-Querier operational state before moving to a Querier state. When you specify a value for vlanid, the following information appears. Term Description VLAN Admin Mode Indicates whether MLD Snooping Querier is active on the VLAN. VLAN Operational State Indicates whether MLD Snooping Querier is in “Querier” or “Non-Querier” state. When the switch is in Querier state, it will send out periodic general queries. When in Non-Querier state, it will wait for moving to Querier state and does not send out any queries. Operational Max Response Time Indicates the time to wait before removing a Leave from a host upon receiving a Leave request. This value is calculated dynamically from the Queries received from the network. If the Snooping Switch is in Querier state, then it is equal to the configured value. Switching Commands 177 M4100 Series ProSAFE Managed Switches Term Description Querier Election Participate Indicates whether the MLD Snooping Querier participates in querier election if it discovers the presence of a querier in the VLAN. Querier VLAN Address The IP address will be used in the IPv6 header while sending out MLD queries on this VLAN. It can be configured using the appropriate command. Operational Version This version of IPv6 will be used while sending out MLD queriers on this VLAN. Last Querier Address Indicates the IP address of the most recent Querier from which a Query was received. Last Querier Version Indicates the MLD version of the most recent Querier from which a Query was received on this VLAN. When the optional argument detail is used, the command shows the global information and the information for all Querier-enabled VLANs. Port Security Commands This section describes the commands you use to configure Port Security on the switch. Port security, which is also known as port MAC locking, allows you to secure the network by locking allowable MAC addresses on a port. Packets with a matching source MAC address are forwarded normally, and all other packets are discarded. Note: To enable the SNMP trap specific to port security, see snmp-server enable traps violation on page 494. port-security This command enables port locking at the system level (Global Config) or port level (Interface Config). Default disabled Format port-security Mode • • Global Config Interface Config Switching Commands 178 M4100 Series ProSAFE Managed Switches no port-security This command disables port locking for one (Interface Config) or all (Global Config) ports. Format no port-security Mode • • Global Config Interface Config port-security max-dynamic This command sets the maximum number of dynamically locked MAC addresses allowed on a specific port. Default 600 Format port-security max-dynamic <maxvalue> Mode Interface Config no port-security max-dynamic This command resets the maximum number of dynamically locked MAC addresses allowed on a specific port to its default value. Format no port-security max-dynamic Mode Interface Config port-security max-static This command sets the maximum number of statically locked MAC addresses allowed on a port. Default 20 Format port-security max-static <maxvalue> Mode Interface Config no port-security max-static This command sets maximum number of statically locked MAC addresses to the default value. Format no port-security max-static Mode Interface Config Switching Commands 179 M4100 Series ProSAFE Managed Switches port-security mac-address This command adds a MAC address to the list of statically locked MAC addresses. The <vid> is the VLAN ID. Format port-security mac-address <mac-address> <vid> Mode Interface Config no port-security mac-address This command removes a MAC address from the list of statically locked MAC addresses. Format no port-security mac-address <mac-address> <vid> Mode Interface Config port-security mac-address move This command converts dynamically locked MAC addresses to statically locked addresses. Format port-security mac-address move Mode Interface Config port-security mac-address sticky This command enables sticky mode Port MAC Locking on a port. If accompanied by a MAC address and a VLAN id (for interface config mode only), it adds a sticky MAC address to the list of statically locked MAC addresses. These sticky addresses are converted back to dynamically locked addresses if sticky mode is disabled on the port. The <vid> is the VLAN ID. The Global command applies the sticky mode to all valid interfaces (physical and LAG). There is no global sticky mode as such. Sticky addresses that are dynamically learned display in the output of the show running config command as port-security mac-address sticky <mac> <vid> entries. This distinguishes them from static entries. Format port-security mac-address sticky [<mac-address> <vid>] Modes • • Global Config Interface Config Switching Commands 180 M4100 Series ProSAFE Managed Switches no port-security mac-address sticky The no form removes the sticky mode. The sticky MAC address can be deleted by using the command no port-security mac-address <mac-address> <vid>. Format no port-security mac-address sticky [<mac-address> <vid>] Modes • • Global Config Interface Config show port-security This command displays the port-security settings. If you do not use a parameter, the command displays the settings for the entire system. Use the optional parameters to display the settings on a specific interface or on all interfaces. Format show port-security [<slot/port> | all] Mode Privileged EXEC Term Definition Admin Mode Port Locking mode for the entire system. This field displays if you do not supply any parameters. For each interface, or for the interface you specify, the following information appears: Term Definition Admin Mode Port Locking mode for the Interface. Dynamic Limit Maximum dynamically allocated MAC Addresses. Static Limit Maximum statically allocated MAC Addresses. Violation Trap Mode Whether violation traps are enabled. show port-security dynamic This command displays the dynamically locked MAC addresses for the port. Format show port-security dynamic [lag <lag-intf-num> | <slot/port>] Mode Privileged EXEC Term Definition MAC Address MAC Address of dynamically locked MAC. Switching Commands 181 M4100 Series ProSAFE Managed Switches show port-security static This command displays the statically locked MAC addresses for port. Format show port-security static [lag <lag-intf-num> | <slot/port>] Mode Privileged EXEC Term Definition MAC Address MAC Address of statically locked MAC. show port-security violation This command displays the source MAC address of the last packet discarded on a locked port. Format show port-security violation [lag <lag-intf-num> | <slot/port>] Mode Privileged EXEC Term Definition MAC Address MAC Address of discarded packet on locked port. LLDP (802.1AB) Commands This section describes the command you use to configure Link Layer Discovery Protocol (LLDP), which is defined in the IEEE 802.1AB specification. LLDP allows stations on an 802 LAN to advertise major capabilities and physical descriptions. The advertisements allow a network management system (NMS) to access and display this information. lldp transmit Use this command to enable the LLDP advertise capability. Default enabled Format lldp transmit Mode Interface Config no lldp transmit Use this command to return the local data transmission capability to the default. Format no lldp transmit Mode Interface Config Switching Commands 182 M4100 Series ProSAFE Managed Switches lldp receive Use this command to enable the LLDP receive capability. Default enabled Format lldp receive Mode Interface Config no lldp receive Use this command to return the reception of LLDPDUs to the default value. Format no lldp receive Mode Interface Config lldp timers Use this command to set the timing parameters for local data transmission on ports enabled for LLDP. The <interval-seconds> determines the number of seconds to wait between transmitting local data LLDPDUs. The range is 1-32768 seconds. The <hold-value> is the multiplier on the transmit interval that sets the TTL in local data LLDPDUs. The multiplier range is 2-10. The <reinit-seconds> is the delay before re-initialization, and the range is 1-0 seconds. Default • • • Format lldp timers [interval <interval-seconds>] [hold <hold-value>] [reinit <reinit-seconds>] Mode Global Config interval—30 seconds hold—4 reinit—2 seconds no lldp timers Use this command to return any or all timing parameters for local data transmission on ports enabled for LLDP to the default values. Format no lldp timers [interval] [hold] [reinit] Mode Global Config lldp transmit-tlv Use this command to specify which optional type length values (TLVs) in the 802.1AB basic management set are transmitted in the LLDPDUs. Use sys-name to transmit the system name TLV. To configure the system name, see snmp-server on page 491. Use sys-desc to transmit the system description TLV. Use sys-cap to transmit the system capabilities TLV. Switching Commands 183 M4100 Series ProSAFE Managed Switches Use port-desc to transmit the port description TLV. To configure the port description, see description on page 20 Default all optional TLVs are included Format lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc] Mode Interface Config no lldp transmit-tlv Use this command to remove an optional TLV from the LLDPDUs. Use the command without parameters to remove all optional TLVs from the LLDPDU. Format no lldp transmit-tlv [sys-desc] [sys-name] [sys-cap] [port-desc] Mode Interface Config lldp transmit-mgmt Use this command to include transmission of the local system management address information in the LLDPDUs. Default enabled Format lldp transmit-mgmt Mode Interface Config no lldp transmit-mgmt Use this command to include transmission of the local system management address information in the LLDPDUs. Use this command to cancel inclusion of the management information in LLDPDUs. Format no lldp transmit-mgmt Mode Interface Config lldp notification Use this command to enable remote data change notifications. Default disabled Format lldp notification Mode Interface Config Switching Commands 184 M4100 Series ProSAFE Managed Switches no lldp notification Use this command to disable notifications. Default disabled Format no lldp notification Mode Interface Config lldp notification-interval Use this command to configure how frequently the system sends remote data change notifications. The <interval> parameter is the number of seconds to wait between sending notifications. The valid interval range is 5-3600 seconds. Default 5 Format lldp notification-interval <interval> Mode Global Config no lldp notification-interval Use this command to return the notification interval to the default value. Format no lldp notification-interval Mode Global Config clear lldp statistics Use this command to reset all LLDP statistics, including MED-related information. Format clear lldp statistics Mode Privileged Exec clear lldp remote-data Use this command to delete all information from the LLDP remote data table, including MED-related information. Format clear lldp remote-data Mode Global Config Switching Commands 185 M4100 Series ProSAFE Managed Switches show lldp Use this command to display a summary of the current LLDP configuration. Format show lldp Mode Privileged Exec Term Definition Transmit Interval How frequently the system transmits local data LLDPDUs, in seconds. Transmit Hold Multiplier The multiplier on the transmit interval that sets the TTL in local data LLDPDUs. Re-initialization Delay The delay before re-initialization, in seconds. Notification Interval How frequently the system sends remote data change notifications, in seconds. show lldp interface Use this command to display a summary of the current LLDP configuration for a specific interface or for all interfaces. Format show lldp interface {<slot/port> | all} Mode Privileged Exec Term Definition Interface The interface in a slot/port format. Link Shows whether the link is up or down. Transmit Shows whether the interface transmits LLDPDUs. Receive Shows whether the interface receives LLDPDUs. Notify Shows whether the interface sends remote data change notifications. TLVs Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes can be 0 (Port Description), 1 (System Name), 2 (System Description), or 3 (System Capability). Mgmt Shows whether the interface transmits system management address information in the LLDPDUs. Switching Commands 186 M4100 Series ProSAFE Managed Switches show lldp statistics Use this command to display the current LLDP traffic and remote table statistics for a specific interface or for all interfaces. Format show lldp statistics {<slot/port> | all} Mode Privileged Exec Term Definition Last Update The amount of time since the last update to the remote table in days, hours, minutes, and seconds. Total Inserts Total number of inserts to the remote data table. Total Deletes Total number of deletes from the remote data table. Total Drops Total number of times the complete remote data received was not inserted due to insufficient resources. Total Ageouts Total number of times a complete remote data entry was deleted because the Time to Live interval expired. The table contains the following column headings: Term Definition Interface The interface in slot/port format. Transmit Total Total number of LLDP packets transmitted on the port. Receive Total Total number of LLDP packets received on the port. Discards Total number of LLDP frames discarded on the port for any reason. Errors The number of invalid LLDP frames received on the port. Ageouts Total number of times a complete remote data entry was deleted for the port because the Time to Live interval expired. TLV Discards The number of TLVs discarded. TLV Unknowns Total number of LLDP TLVs received on the port where the type value is in the reserved range, and not recognized. TLV MED Total number of LLDP MED TLVs received on the local ports. TVL802.1 Total number of 802.1 LLDP TLVs received on the local ports. TVL802.3 Total number of 802.3 LLDP TLVs received on the local ports. Switching Commands 187 M4100 Series ProSAFE Managed Switches show lldp remote-device Use this command to display summary information about remote devices that transmit current LLDP data to the system. You can show information about LLDP remote data received on all ports or on a specific port. Format show lldp remote-device {<slot/port> | all} Mode Privileged EXEC Term Definition Local Interface The interface that received the LLDPDU from the remote device. RemID An internal identifier to the switch to mark each remote device to the system. Chassis ID The ID that is sent by a remote device as part of the LLDP message, it is usually a MAC address of the device. Port ID The port number that transmitted the LLDPDU. System Name The system name of the remote device. Command example: (NETGEAR Switch) #show lldp remote-device all LLDP Remote Device Summary Local Interface RemID ------- ------0/1 0/2 0/3 0/4 0/5 0/6 0/7 2 0/7 3 0/7 4 0/7 5 0/7 1 0/7 6 0/8 0/9 0/10 0/11 0/12 Chassis ID -------------------- Port ID ------------------ 00:FC:E3:90:01:0F 00:FC:E3:90:01:0F 00:FC:E3:90:01:0F 00:FC:E3:90:01:0F 00:FC:E3:90:01:0F 00:FC:E3:90:01:0F 00:FC:E3:90:01:11 00:FC:E3:90:01:12 00:FC:E3:90:01:13 00:FC:E3:90:01:14 00:FC:E3:90:03:11 00:FC:E3:90:04:11 Switching Commands 188 System Name ------------------ M4100 Series ProSAFE Managed Switches show lldp remote-device detail Use this command to display detailed information about remote devices that transmit current LLDP data to an interface on the system. Format show lldp remote-device detail <slot/port> Mode Privileged EXEC Term Definition Local Interface The interface that received the LLDPDU from the remote device. Remote Identifier An internal identifier to the switch to mark each remote device to the system. Chassis ID Subtype The type of identification used in the Chassis ID field. Chassis ID The chassis of the remote device. Port ID Subtype The type of port on the remote device. Port ID The port number that transmitted the LLDPDU. System Name The system name of the remote device. System Description Describes the remote system by identifying the system name and versions of hardware, operating system, and networking software supported in the device. Port Description Describes the port in an alpha-numeric format. The port description is configurable. System Capabilities Supported Indicates the primary function(s) of the device. System Capabilities Enabled Shows which of the supported system capabilities are enabled. Management Address For each interface on the remote device with an LLDP agent, lists the type of address the remote LLDP agent uses and specifies the address used to obtain information related to the device. Time To Live The amount of time (in seconds) the remote device's information received in the LLDPDU should be treated as valid information. Command example: (NETGEAR Switch) #show lldp remote-device detail 0/7 LLDP Remote Device Detail Local Interface: 0/7 Remote Identifier: 2 Chassis ID Subtype: MAC Address Switching Commands 189 M4100 Series ProSAFE Managed Switches Chassis ID: 00:FC:E3:90:01:0F Port ID Subtype: MAC Address Port ID: 00:FC:E3:90:01:11 System Name: System Description: Port Description: System Capabilities Supported: System Capabilities Enabled: Time to Live: 24 seconds show lldp local-device Use this command to display summary information about the advertised LLDP local data. This command can display summary information or detail for each interface. Format show lldp local-device {<slot/port> | all} Mode Privileged EXEC Term Definition Interface The interface in a slot/port format. Port ID The port ID associated with this interface. Port Description The port description associated with the interface. show lldp local-device detail Use this command to display detailed information about the LLDP data a specific interface transmits. Format show lldp local-device detail <slot/port> Mode Privileged EXEC Term Definition Interface The interface that sends the LLDPDU. Chassis ID Subtype The type of identification used in the Chassis ID field. Chassis ID The chassis of the local device. Port ID Subtype The type of port on the local device. Port ID The port number that transmitted the LLDPDU. System Name The system name of the local device. Switching Commands 190 M4100 Series ProSAFE Managed Switches Term Definition System Description Describes the local system by identifying the system name and versions of hardware, operating system, and networking software supported in the device. Port Description Describes the port in an alpha-numeric format. System Capabilities Supported Indicates the primary function(s) of the device. System Capabilities Enabled Shows which of the supported system capabilities are enabled. Management Address The type of address and the specific address the local LLDP agent uses to send and receive information. LLDP-MED Commands Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED) (ANSI-TIA-1057) provides an extension to the LLDP standard. Specifically, LLDP-MED provides extensions for network configuration and policy, device location, Power over Ethernet (PoE) management and inventory management. lldp med Use this command to enable MED. By enabling MED, you will be effectively enabling the transmit and receive function of LLDP. Default enabled Format lldp med Mode Interface Config no lldp med Use this command to disable MED. Format no lldp med Mode Interface Config Switching Commands 191 M4100 Series ProSAFE Managed Switches lldp med confignotification Use this command to configure all the ports to send the topology change notification. Default enabled Format lldp med confignotification Mode Interface Config no ldp med confignotification Use this command to disable notifications. Format no lldp med confignotification Mode Interface Config lldp med transmit-tlv Use this command to specify which optional Type Length Values (TLVs) in the LLDP MED set will be transmitted in the Link Layer Discovery Protocol Data Units (LLDPDUs). Default By default, the capabilities and network policy TLVs are included. Format lldp med transmit-tlv [capabilities] [ex-pd] [ex-pse] [inventory] [location] [network-policy] Mode Interface Config Parameter Definition capabilities Transmit the LLDP capabilities TLV. ex-pd Transmit the LLDP extended PD TLV. ex-pse Transmit the LLDP extended PSE TLV. inventory Transmit the LLDP inventory TLV. location Transmit the LLDP location TLV. network-policy Transmit the LLDP network policy TLV. Note: The current implementation supports one network policy: the voice VLAN as defined by the voice vlan commands. Switching Commands 192 M4100 Series ProSAFE Managed Switches no lldp med transmit-tlv Use this command to remove a TLV. Format no lldp med transmit-tlv [capabilities] [network-policy] [ex-pse] [ex-pd] [location] [inventory] Mode Interface Config lldp med all Use this command to configure LLDP-MED on all the ports. Format lldp med all Mode Global Config no lldp med all Use this command to remove LLDP-MD on all ports. Format no lldp med all Mode Global Config lldp med confignotification all Use this command to configure all the ports to send the topology change notification. Format lldp med confignotification all Mode Global Config no lldp med confignotification all Use this command to disable all the ports to send the topology change notification. Format no lldp med confignotification all Mode Global Config lldp med faststartrepeatcount Use this command to set the value of the fast start repeat count. <count> is the number of LLDP PDUs that will be transmitted when the product is enabled. The range is 1 to 10. Default 3 Format lldp med faststartrepeatcount [<count>] Mode Global Config Switching Commands 193 M4100 Series ProSAFE Managed Switches no lldp med faststartrepeatcount Use this command to return to the factory default value. Format no lldp med faststartrepeatcount Mode Global Config lldp med transmit-tlv all Use this command to specify which optional Type Length Values (TLVs) in the LLDP MED set will be transmitted in the Link Layer Discovery Protocol Data Units (LLDPDUs). Default By default, the capabilities and network policy TLVs are included. Format lldp med transmit-tlv all [capabilities] [ex-pd] [ex-pse] [inventory] [location] [network-policy] Mode Global Config Parameter Definition capabilities Transmit the LLDP capabilities TLV. ex-pd Transmit the LLDP extended PD TLV. ex-pse Transmit the LLDP extended PSE TLV. inventory Transmit the LLDP inventory TLV. location Transmit the LLDP location TLV. network-policy Transmit the LLDP network policy TLV. no lldp med transmit-tlv Use this command to remove a TLV. Format no lldp med transmit-tlv all [capabilities] [network-policy] [ex-pse] [ex-pd] [location] [inventory] Mode Global Config show lldp med Use this command to display a summary of the current LLDP MED configuration. Format show lldp med Mode Privileged Exec Switching Commands 194 M4100 Series ProSAFE Managed Switches Term Definition Fast Start Repeat Count The number of LLDP PDUs that will be transmitted when the protocol is enabled. Device Class The local device’s MED Classification. There are four different kinds of devices, three of them represent the actual end points (classified as Class I Generic[IP Communication Controller etc.], Class II Media Conference Bridge etc.], Class III Communication [IP Telephone etc.]. Class IV Network Connectivity Device, which is typically a LAN Switch, Router, IEEE 802.11 Wireless Access Point, etc. Command example: (NETGEAR Switch) #show lldp med LLDP MED Global Configuration Fast Start Repeat Count: 3 Device Class: Network Connectivity show lldp med interface Use this command to display a summary of the current LLDP MED configuration for a specific interface. <slot/port> indicates a specific physical interface. all indicates all valid LLDP interfaces. Format show lldp med interface {<slot/port> | all} Mode Privileged Exec Term Definition Interface The interface in a slot/port format. Link Shows whether the link is up or down. ConfigMED Shows if the LLPD-MED mode is enabled or disabled on this interface OperMED Shows if the LLPD-MED TLVs are transmitted or not on this interface. ConfigNotify Shows if the LLPD-MED topology notification mode of this interface. TLVsTx Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes can be 0 (Capabilities), 1 (Network Policy), 2 (Location), 3 (Extended PSE), 4 (Extended Pd), or 5 (Inventory). Command example: (NETGEAR Switch) #show lldp med interface all Interface --------0/1 0/2 Link -----Down Up configMED --------Disabled Disabled operMED -------Disabled Disabled ConfigNotify -----------Disabled Disabled Switching Commands 195 TLVsTx ----------0,1 0,1 M4100 Series ProSAFE Managed Switches 0/3 0/4 0/5 0/6 0/7 0/8 0/9 0/10 0/11 0/12 0/13 0/14 Down Down Down Down Down Down Down Down Down Down Down Down Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled TLV Codes: 0- Capabilities, 2- Location, 4- Extended Pd, Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled 0,1 0,1 0,1 0,1 0,1 0,1 0,1 0,1 0,1 0,1 0,1 0,1 1- Network Policy 3- Extended PSE 5- Inventory Command example: (NETGEAR Switch) #show lldp med interface 0/2 Interface --------0/2 Link -----Up configMED operMED --------- -------Disabled Disabled TLV Codes: 0- Capabilities, 2- Location, 4- Extended Pd, ConfigNotify TLVsTx ------------ ----------Disabled 0,1 1- Network Policy 3- Extended PSE 5- Inventory show lldp med local-device detail This command displays detailed information about the LLDP data a specific interface transmits. Format show lldp med local-device detail <slot/port> Mode Privileged EXEC Term Definition Media Application Type Shows the application type. Types are unknown, voice, voicesignaling, guestvoice, guestvoicesignaling, sfotphonevoice, videoconferencing, streamingvideo, videosignaling. Vlan ID Shows the VLAN id associated with a particular policy type Priority Shows the priority associated with a particular policy type. DSCP Shows the DSCP associated with a particular policy type. Switching Commands 196 M4100 Series ProSAFE Managed Switches Term Definition Unknown Indicates if the policy type is unknown. In this case, the VLAN ID, Priority and DSCP are ignored. Tagged Indicates if the policy type is using tagged or untagged VLAN. Hardware Rev Shows the local hardware version. Firmware Rev Shows the local firmware version. Software Rev Shows the local software version. Serial Num Shows the local serial number. Mfg Name Shows the manufacture name. Model Name Shows the model name. Command example: (NETGEAR Switch) #show lldp med local-device detail 0/8 LLDP MED Local Device Detail Interface: 0/8 Network Policies Media Policy Application Type : voice Vlan ID: 10 Priority: 5 DSCP: 1 Unknown: False Tagged: True Media Policy Application Type : streamingvideo Vlan ID: 20 Priority: 1 DSCP: 2 Unknown: False Tagged: True Inventory Hardware Rev: xxx xxx xxx Firmware Rev: xxx xxx xxx Software Rev: xxx xxx xxx Serial Num: xxx xxx xxx Mfg Name: xxx xxx xxx Model Name: xxx xxx xxx Asset ID: xxx xxx xxx Switching Commands 197 M4100 Series ProSAFE Managed Switches Location Subtype: elin Info: xxx xxx xxx Extended POE Device Type: pseDevice Extended POE PSE Available: 0.3 Watts Source: primary Priority: critical Extended POE PD Required: 0.2 Watts Source: local Priority: low show lldp med remote-device This command displays summary information about remote devices that transmit current LLDP MED data to the system. You can show information about LLDP remote data received on all ports or on a specific port. Format show lldp med remote-device {<slot/port> | all} Mode Privileged EXEC Term Definition Interface The interface in a slot/port format. Device Class The Remote device’s MED Classification. There are four different kinds of devices, three of them represent the actual end points (classified as Class I Generic [IP Communication Controller etc.], Class II Media [Conference Bridge etc.], Class III Communication [IP Telephone etc]). The fourth device is Network Connectivity Device, which is typically a LAN Switch/Router, IEEE 802.1 Bridge, IEEE 802.11 Wireless Access Point etc. Command example: (NETGEAR Switch) #show lldp med remote-device all LLDP MED Remote Device Summary Local Interface --------0/8 Remote ID --------1 Device Class -----------Class I Switching Commands 198 M4100 Series ProSAFE Managed Switches 0/9 0/10 0/11 0/12 2 3 4 5 Not Defined Class II Class III Network Con show lldp med remote-device detail Use this command to display detailed information about remote devices that transmit current LLDP MED data to an interface on the system. Format show lldp med remote-device detail <slot/port> Mode Privileged EXEC Term Definition Supported Capabilities Shows the supported capabilities that were received in MED TLV on this port. Enabled capabilities Shows the enabled capabilities that were enabled in MED TLV on this port. Device Class Shows the device class as advertized by the device remotely connected to the port. Network Policy Information Shows if network policy TLV is received in the LLDP frames on this port. Media Application Type Shows the application type. Types of applications are unknown, voice, voicesignaling, guestvoice, guestvoicesignaling, sfotphonevoice, videoconferencing, streamingvideo, videosignaling. VLAN Id Shows the VLAN id associated with a particular policy type. Priority Shows the priority associated with a particular policy type. DSCP Shows the DSCP associated with a particular policy type. Unknown Indicates if the policy type is unknown. In this case, the VLAN id, Priority and DSCP are ignored. Tagged Indicates if the policy type is using tagged or untagged VLAN. Hardware Revision Shows the hardware version of the remote device. Firmware Revision Shows the firmware version of the remote device. Software Revision Shows the software version of the remote device. Serial Number Shows the serial number of the remote device. Manufacturer Name Shows the manufacture name of the remote device. Switching Commands 199 M4100 Series ProSAFE Managed Switches Term Definition Model Name Shows the model name of the remote device. Asset ID Shows the asset id of the remote device. Sub Type Shows the type of location information. Location Information Shows the location information as a string for a type of location ID. Device Type Shows the remote device’s PoE device type connected to this port. Available Shows the remote port’s PSE power value in tenths of a watt. Source Shows the remote port’s PSE power source. Priority Shows the remote port’s PSE priority. Required Shows the remote port’s PD power requirement. Source Shows the remote port’s PD power source. Priority Shows the remote port’s PD power priority. Command example: (NETGEAR Switch) #show lldp med remote-device detail 0/8 LLDP MED Remote Device Detail Local Interface: 0/8 Remote Identifier: 18 Capabilities MED Capabilities Supported: capabilities, networkpolicy, location, extendedpse MED Capabilities Enabled: capabilities, networkpolicy Device Class: Endpoint Class I Network Policies Media Policy Application Type : voice Vlan ID: 10 Priority: 5 DSCP: 1 Unknown: False Tagged: True Media Policy Application Type : streamingvideo Vlan ID: 20 Priority: 1 DSCP: 2 Unknown: False Tagged: True Switching Commands 200 M4100 Series ProSAFE Managed Switches Inventory Hardware Rev: xxx xxx xxx Firmware Rev: xxx xxx xxx Software Rev: xxx xxx xxx Serial Num: xxx xxx xxx Mfg Name: xxx xxx xxx Model Name: xxx xxx xxx Asset ID: xxx xxx xxx Location Subtype: elin Info: xxx xxx xxx Extended POE Device Type: pseDevice Extended POE PSE Available: 0.3 Watts Source: primary Priority: critical Extended POE PD Required: 0.2 Watts Source: local Priority: low Denial of Service Commands This section describes the commands you use to configure Denial of Service (DoS) Control. The software provides support for classifying and blocking specific types of Denial of Service attacks. You can configure your system to monitor and block these types of attacks: • SIP=DIP: Source IP address = Destination IP address. • First Fragment: TCP Header size smaller then configured value. • TCP Fragment: IP Fragment Offset = 1. • TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. • L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port. • ICMP: Limiting the size of ICMP Ping packets. • SMAC = DMAC: Source MAC address = Destination MAC address. • TCP Port: Source TCP Port = Destination TCP Port. Switching Commands 201 M4100 Series ProSAFE Managed Switches • UDP Port: Source UDP Port = Destination UDP Port. • TCP Flag & Sequence: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. • TCP Offset: TCP Header Offset = 1. • TCP SYN: TCP Flag SYN set. • TCP SYN & FIN: TCP Flags SYN and FIN set. • TCP FIN & URG & PSH: TCP Flags FIN and URG and PSH set and TCP Sequence Number = 0. • ICMP V6: Limiting the size of ICMPv6 Ping packets. • ICMP Fragment: Checks for fragmented ICMP packets. dos-control all This command enables Denial of Service protection checks globally. Default disabled Format dos-control all Mode Global Config no dos-control all This command disables Denial of Service prevention checks globally. Format no dos-control all Mode Global Config dos-control sipdip This command enables Source IP address = Destination IP address (SIP=DIP) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with SIP=DIP, the packets will be dropped if the mode is enabled. Default disabled Format dos-control sipdip Mode Global Config Switching Commands 202 M4100 Series ProSAFE Managed Switches no dos-control sipdip This command disables Source IP address = Destination IP address (SIP=DIP) Denial of Service prevention. Format no dos-control sipdip Mode Global Config dos-control firstfrag This command enables Minimum TCP Header Size Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having a TCP Header Size smaller then the configured value, the packets will be dropped if the mode is enabled.The default is disabled. If you enable dos-control firstfrag, but do not provide a Minimum TCP Header Size, the system sets that value to 20. Default disabled <20> Format dos-control firstfrag [<0-255>] Mode Global Config no dos-control firstfrag This command sets Minimum TCP Header Size Denial of Service protection to the default value of disabled. Format no dos-control firstfrag Mode Global Config dos-control tcpfrag This command enables TCP Fragment Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having IP Fragment Offset equal to one (1), the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpfrag Mode Global Config no dos-control tcpfrag This command disabled TCP Fragment Denial of Service protection. Format no dos-control tcpfrag Mode Global Config Switching Commands 203 M4100 Series ProSAFE Managed Switches dos-control tcpflag This command enables TCP Flag Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attacks. If packets ingress having TCP Flag SYN set and a source port less than 1024 or having TCP Control Flags set to 0 and TCP Sequence Number set to 0 or having TCP Flags FIN, URG, and PSH set and TCP Sequence Number set to 0 or having TCP Flags SYN and FIN both set, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpflag Mode Global Config no dos-control tcpflag This command sets disables TCP Flag Denial of Service protections. Format no dos-control tcpflag Mode Global Config dos-control l4port This command enables L4 Port Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having Source TCP/UDP Port Number equal to Destination TCP/UDP Port Number, the packets will be dropped if the mode is enabled. Note: Some applications mirror source and destination L4 ports - RIP for example uses 520 for both. If you enable dos-control l4port, applications such as RIP may experience packet loss which would render the application inoperable. Default disabled Format dos-control l4port Mode Global Config Switching Commands 204 M4100 Series ProSAFE Managed Switches no dos-control l4port This command disables L4 Port Denial of Service protections. Format no dos-control l4port Mode Global Config dos-control icmp This command enables Maximum ICMP Packet Size Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If ICMP Echo Request (PING) packets ingress having a size greater than the configured value, the packets will be dropped if the mode is enabled. Default disabled <512> Format dos-control icmp [<0-1023>] Mode Global Config no dos-control icmp This command disables Maximum ICMP Packet Size Denial of Service protections. Format no dos-control icmp Mode Global Config dos-control smacdmac This command enables Source MAC address = Destination MAC address (SMAC=DMAC) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with SMAC=DMAC, the packets will be dropped if the mode is enabled. Default disabled Format dos-control smacdmac Mode Global Config no dos-control smacdmac This command disables Source MAC address = Destination MAC address (SMAC=DMAC) Denial of Service protection. Format no dos-control smacdmac Mode Global Config Switching Commands 205 M4100 Series ProSAFE Managed Switches dos-control tcpport This command enables TCP L4 source = destination port number (Source TCP Port = Destination TCP Port) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with Source TCP Port = Destination TCP Port, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpport Mode Global Config no dos-control tcpport This command disables TCP L4 source = destination port number (Source TCP Port = Destination TCP Port) Denial of Service protection. Format no dos-control smacdmac Mode Global Config dos-control udpport This command enables UDP L4 source = destination port number (Source UDP Port = Destination UDP Port) Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with Source UDP Port = Destination UDP Port, the packets will be dropped if the mode is enabled. Default disabled Format dos-control udppport Mode Global Config no dos-control udpport This command disables UDP L4 source = destination port number (Source UDP Port = Destination UDP Port) Denial of Service protection. Format no dos-control udppport Mode Global Config dos-control tcpflagseq This command enables TCP Flag and Sequence Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP Flag SYN set and a source port less than 1024 or having TCP Control Flags set to 0 and TCP Sequence Number set to 0 or having TCP Flags FIN, URG, and PSH set and Switching Commands 206 M4100 Series ProSAFE Managed Switches TCP Sequence Number set to 0 or having TCP Flags SYN and FIN both set, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpflagseq Mode Global Config no dos-control tcpflagseq This command sets disables TCP Flag and Sequence Denial of Service protection. Format no dos-control tcpflagseq Mode Global Config dos-control tcpoffset This command enables TCP Offset Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP Header Offset equal to one (1), the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpoffset Mode Global Config no dos-control tcpoffset This command disabled TCP Offset Denial of Service protection. Format no dos-control tcpoffset Mode Global Config dos-control tcpsyn This command enables TCP SYN and L4 source = 0-1023 Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP flag SYN set and an L4 source port from 0 to 1023, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpsyn Mode Global Config Switching Commands 207 M4100 Series ProSAFE Managed Switches no dos-control tcpsyn This command sets disables TCP SYN and L4 source = 0-1023 Denial of Service protection. Format no dos-control tcpsyn Mode Global Config dos-control tcpsynfin This command enables TCP SYN and FIN Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP flags SYN and FIN set, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpsynfin Mode Global Config no dos-control tcpsynfin This command sets disables TCP SYN & FIN Denial of Service protection. Format no dos-control tcpsynfin Mode Global Config dos-control tcpfinurgpsh This command enables TCP FIN and URG and PSH and SEQ=0 checking Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP FIN, URG, and PSH all set and TCP Sequence Number set to 0, the packets will be dropped if the mode is enabled. Default disabled Format dos-control tcpfinurgpsh Mode Global Config no dos-control tcpfinurgpsh This command sets disables TCP FIN and URG and PSH and SEQ=0 checking Denial of Service protections. Format no dos-control tcpfinurgpsh Mode Global Config Switching Commands 208 M4100 Series ProSAFE Managed Switches dos-control icmpv4 This command enables Maximum ICMPv4 Packet Size Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If ICMPv4 Echo Request (PING) packets ingress having a size greater than the configured value, the packets will be dropped if the mode is enabled. Default disabled <512> Format dos-control icmpv4 <0-16384> Mode Global Config no dos-control icmpv4 This command disables Maximum ICMP Packet Size Denial of Service protections. Format no dos-control icmpv4 Mode Global Config dos-control icmpv6 This command enables Maximum ICMPv6 Packet Size Denial of Service protections. If the mode is enabled, Denial of Service prevention is active for this type of attack. If ICMPv6 Echo Request (PING) packets ingress having a size greater than the configured value, the packets will be dropped if the mode is enabled. Default disabled <512> Format dos-control icmpv6 <0-16384> Mode Global Config no dos-control icmpv6 This command disables Maximum ICMP Packet Size Denial of Service protections. Format no dos-control icmpv6 Mode Global Config dos-control icmpfrag This command enables ICMP Fragment Denial of Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress having fragmented ICMP packets, the packets will be dropped if the mode is enabled. Switching Commands 209 M4100 Series ProSAFE Managed Switches Default disabled Format dos-control icmpfrag Mode Global Config no dos-control icmpfrag This command disabled ICMP Fragment Denial of Service protection. Format no dos-control icmpfrag Mode Global Config show dos-control This command displays Denial of Service configuration information. Format show dos-control Mode Privileged EXEC Note: Not all messages below might be displayed for the M4100 series switches. Term Definition First Fragment Mode May be enabled or disabled. The factory default is disabled. Min TCP Hdr Size <0-255> The factory default is 20. ICMP Mode May be enabled or disabled. The factory default is disabled. Max ICMPv4 Pkt The range is 0-1023. The factory default is 512. Size Max ICMPv6 Pkt The range is 0-16384. The factory default is 512. Size ICMP Fragment Mode May be enabled or disabled. The factory default is disabled. L4 Port Mode May be enabled or disabled. The factory default is disabled. TCP Port Mode May be enabled or disabled. The factory default is disabled. UDP Port Mode May be enabled or disabled. The factory default is disabled. SIPDIP Mode May be enabled or disabled. The factory default is disabled. Switching Commands 210 M4100 Series ProSAFE Managed Switches Term Definition SMACDMAC Mode May be enabled or disabled. The factory default is disabled. TCP Flag Mode May be enabled or disabled. The factory default is disabled. TCP FIN&URG& May be enabled or disabled. The factory default is disabled. PSH Mode TCP Flag & Sequence Mode May be enabled or disabled. The factory default is disabled. TCP SYN Mode May be enabled or disabled. The factory default is disabled. TCP SYN & FIN Mode May be enabled or disabled. The factory default is disabled. TCP Fragment Mode May be enabled or disabled. The factory default is disabled. TCP Offset Mode May be enabled or disabled. The factory default is disabled. MAC Database Commands This section describes the commands you use to configure and view information about the MAC databases. bridge aging-time This command configures the forwarding database address aging timeout in seconds. The <seconds> parameter must be within the range of 10 to 1,000,000 seconds. Default 300 Format bridge aging-time <seconds> Mode Global Config no bridge aging-time This command sets the forwarding database address aging timeout to the default value. Format no bridge aging-time Mode Global Config Switching Commands 211 M4100 Series ProSAFE Managed Switches show forwardingdb agetime This command displays the timeout for address aging. Default 300s Format show forwardingdb agetime Mode Privileged EXEC Term Definition Address Aging Timeout This parameter displays the address aging timeout for the associated forwarding database. show mac-address-table multicast This command displays the Multicast Forwarding Database (MFDB) information. If you enter the command with no parameter, the entire table is displayed. You can display the table entry for one MAC Address by specifying the MAC address as an optional parameter. Format show mac-address-table multicast <macaddr> Mode Privileged EXEC Term Definition MAC Address A multicast MAC address for which the switch has forwarding and or filtering information. The format is two-digit hexadecimal numbers separated by colons, for example 01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as a MAC address and VLAN ID combination of 8 bytes. Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to the table as a result of a learning process or protocol. Component The component that is responsible for this entry in the Multicast Forwarding Database. Possible values are IGMP Snooping, GMRP, and Static Filtering. Description The text description of this multicast table entry. Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:). Forwarding Interfaces The resultant forwarding list is derived from combining all the component’s forwarding interfaces and removing the interfaces that are listed as the static filtering interfaces. show mac-address-table stats This command displays the Multicast Forwarding Database (MFDB) statistics. Format show mac-address-table stats Mode Privileged EXEC Switching Commands 212 M4100 Series ProSAFE Managed Switches Term Definition Max MFDB Table Entries The total number of entries that can possibly be in the Multicast Forwarding Database table. Most MFDB Entries Since Last Reset The largest number of entries that have been present in the Multicast Forwarding Database table. This value is also known as the MFDB high-water mark. Current Entries The current number of entries in the MFDB. ISDP Commands This section describes the commands you use to configure the industry standard Discovery Protocol (ISDP). isdp run This command enables ISDP on the switch. Default Enabled Format isdp run Mode Global Config no isdp run This command disables ISDP on the switch. Format no isdp run Mode Global Config isdp holdtime This command configures the hold time for ISDP packets that the switch transmits. The hold time specifies how long a receiving device should store information sent in the ISDP packet before discarding it. You must enter the range in seconds. Default 180 seconds Format isdp holdtime <10-255> Mode Global Config Switching Commands 213 M4100 Series ProSAFE Managed Switches isdp timer This command sets the period of time between sending new ISDP packets. You must enter the range in seconds. Default 30 seconds Format isdp timer <5-254> Mode Global Config isdp advertise-v2 This command enables the sending of ISDP version 2 packets from the device. Default Enabled Format isdp advertise-v2 Mode Global Config no isdp advertise-v2 This command disables the sending of ISDP version 2 packets from the device. Format no isdp advertise-v2 Mode Global Config isdp enable This command enables ISDP on the interface. Default Enabled Format isdp enable Mode Interface Config no isdp enable This command disables ISDP on the interface. Format no isdp enable Mode Interface Config Switching Commands 214 M4100 Series ProSAFE Managed Switches clear isdp counters This command clears ISDP counters. Format clear isdp counters Mode Privileged EXEC clear isdp table This command clears entries in the ISDP table. Format clear isdp table Mode Privileged EXEC show isdp This command displays global ISDP settings. Format show isdp Mode Privileged EXEC Term Definition Timer The frequency with which this device sends ISDP packets. This value is shown in seconds. Hold Time The length of time the receiving device should save information sent by this device. This value is shown in seconds. Version 2 Advertisements The setting for sending ISDPv2 packets. If disabled, version 1 packets are transmitted. Device ID The Device ID advertised by this device. The format of this Device ID is characterized by the value of the Device ID Format object. Device ID Format Capability Indicates the Device ID format capability of the device. • serialNumber indicates that the device uses a serial number as the format for its Device ID. • macAddress indicates that the device uses a Layer 2 MAC address as the format for its Device ID. • other indicates that the device uses its platform-specific format as the format for its Device ID. Device ID Format Indicates the Device ID format of the device. • serialNumber indicates that the value is in the form of an ASCII string containing the device serial number. • macAddress indicates that the value is in the form of a Layer 2 MAC address. • other indicates that the value is in the form of a platform specific ASCII string containing info that identifies the device. For example, ASCII string contains serialNumber appended/prepended with system name. Switching Commands 215 M4100 Series ProSAFE Managed Switches show isdp interface This command displays ISDP settings for the specified interface. Format show isdp interface {all | <slot/port>} Mode Privileged EXEC Term Definition Mode ISDP mode enabled/disabled status for the interface(s). show isdp entry This command displays ISDP entries. If the device id is specified, then only entries for that device are shown. Format show isdp entry {all | deviceid} Mode Privileged EXEC Term Definition Device ID The device ID associated with the neighbor which advertised the information. IP Addresses The IP address(es) associated with the neighbor. Platform The hardware platform advertised by the neighbor. Interface The interface (slot/port) on which the neighbor's advertisement was received. Port ID The port ID of the interface from which the neighbor sent the advertisement. Hold Time The hold time advertised by the neighbor. Version The software version that the neighbor is running. Advertisement Version The version of the advertisement packet received from the neighbor. Capability ISDP Functional Capabilities advertised by the neighbor. show isdp neighbors This command displays the list of neighboring devices. Format show isdp neighbors [<slot/port> | detail] Mode Privileged EXEC Switching Commands 216 M4100 Series ProSAFE Managed Switches Term Definition Device ID The device ID associated with the neighbor which advertised the information. IP Addresses The IP addresses associated with the neighbor. Capability ISDP functional capabilities advertised by the neighbor. Platform The hardware platform advertised by the neighbor. Interface The interface (slot/port) on which the neighbor's advertisement was received. Port ID The port ID of the interface from which the neighbor sent the advertisement. Hold Time The hold time advertised by the neighbor. Advertisement Version The version of the advertisement packet received from the neighbor. Entry Last Changed Time Displays when the entry was last modified. Version The software version that the neighbor is running. Command example: (NETGEAR Switch) #show isdp neighbors detail Device ID Address(es): IP Address: Capability Platform Interface Port ID Holdtime Advertisement Version Entry last changed time Version: 0001f45f1bc0 10.27.7.57 Router Trans Bridge Switch IGMP SecureStack C2 0/48 ge.3.14 131 2 0 days 00:01:59 05.00.56 show isdp traffic This command displays ISDP statistics. Format show isdp traffic Mode Privileged EXEC Term Definition ISDP Packets Received Total number of ISDP packets received ISDP Packets Transmitted Total number of ISDP packets transmitted Switching Commands 217 M4100 Series ProSAFE Managed Switches Term Definition ISDPv1 Packets Received Total number of ISDPv1 packets received ISDPv1 Packets Transmitted Total number of ISDPv1 packets transmitted ISDPv2 Packets Received Total number of ISDPv2 packets received ISDPv2 Packets Transmitted Total number of ISDPv2 packets transmitted ISDP Bad Header Number of packets received with a bad header ISDP Checksum Error Number of packets received with a checksum error ISDP Transmission Failure Number of packets which failed to transmit ISDP Invalid Format Number of invalid packets received ISDP Table Full Number of times a neighbor entry was not added to the table due to a full database ISDP IP Address Table Full Displays the number of times a neighbor entry was added to the table without an IP address. debug isdp packet This command enables tracing of ISDP packets processed by the switch. ISDP must be enabled on both the device and the interface in order to monitor packets for a particular interface. Format debug isdp packet [receive | transmit] Mode Privileged EXEC no debug isdp packet This command disables tracing of ISDP packets on the receive or the transmit sides or on both sides. Format no debug isdp packet [receive | transmit] Mode Privileged EXEC Switching Commands 218 3. Multicast VLAN Registration Commands This chapter contains the following sections: • About MVR • MVR Commands 219 3 M4100 Series ProSAFE Managed Switches About MVR Internet Group Management Protocol (IGMP) Layer 3 is widely used for IPv4 network multicasting. In Layer 2 networks, IGMP uses resources inefficiently. For example, a Layer 2 switch sends multicast frames to all ports, even if there are receivers connected to only a few ports. To address this problem, the IGMP Snooping protocol was developed. The problem still appears, though, when receivers are in different VLANs. Multicast VLAN registration (MVR) is intended to solve the problem of receivers in different VLANs. It uses a dedicated manually configured VLAN, called the multicast VLAN, to forward multicast traffic over a Layer 2 network with IGMP snooping. MVR Commands mvr This command enables MVR. Default Disabled Format mvr Mode Global Config Interface Config no mvr This command disables MVR. Format no mvr Mode Global Config Interface Config mvr group This command adds an MVR membership group. <A.B.C.D> is the IP multicast group being added. The count is the number of incremental multicast groups being added (the first multicast group is A.B.C.D). If a count is not specified, only one multicast group is added. Format mvr group <A.B.C.D> [count] Mode Global Config Multicast VLAN Registration Commands 220 M4100 Series ProSAFE Managed Switches no mvr group This command removes the MVR membership group. Format no mvr group <A.B.C.D> [count] Mode Global Config mvr mode This command changes the MVR mode type. If the mode is set to compatible, the switch does not learn multicast groups; they need to be configured by the operator as the protocol does not forward joins from the hosts to the router. To operate in this mode, the IGMP router needs to be statically configured to transmit all required multicast streams to the MVR switch. If the mode is set to dynamic, the switch learns existing multicast groups by snooping the IGMP queries from router on source ports and forwarding the IGMP joins from the hosts to the IGMP router on the multicast VLAN (with appropriate translation of the VLAN ID). Default compatible Format mvr mode {compatible | dynamic} Mode Global Config no mvr mode This command sets the mode type to the default value. Format no mvr mode Mode Global Config mvr querytime This command sets the MVR query response time. Default 5 Format mvr querytime <1-100> Mode Global Config no mvr querytime This command sets the MVR query response time to the default value. Format no mvr querytime Mode Global Config Multicast VLAN Registration Commands 221 M4100 Series ProSAFE Managed Switches mvr vlan This command sets the MVR multicast VLAN. Default 1 Format mvr vlan <1-4094> Mode Global Config no mvr vlan This command sets the MVR multicast VLAN to the default value. Format no mvr vlan Mode Global Config mvr immediate This command enables MVR immediate leave mode. MVR has two modes of operating with the IGMP Leave messages: normal leave and immediate leave: • In normal leave mode, when a leave is received, the general IGMP query is sent from a Layer 2 switch to the receiver port, where the leave was received. Then reports are received from other interested hosts that are also connected to that port, for example, using hub. • In immediate leave mode, when a leave is received, the switch is immediately reconfigured not to forward a specific multicast stream to the port where a message is received. This mode is used only for ports where only one client might be connected. Default Disabled Format mvr immediate Mode Interface Config no mvr immediate This command sets the MVR multicast VLAN to the default value. Format no mvr immediate Mode Interface Config Multicast VLAN Registration Commands 222 M4100 Series ProSAFE Managed Switches mvr type This command sets the MVR port type. When a port is set as source, it is the port to which the multicast traffic flows using the multicast VLAN. When a port is set to receiver, it is the port where a listening host is connected to the switch. Default none Format mvr type {receiver | source} Mode Interface Config no mvr type Use this command to set the MVR port type to none. Format no mvr type Mode Interface Config mvr vlan group Use this command to include the port in the specific MVR group. <mVLAN> is the multicast VLAN, and <A.B.C.D> is the IP multicast group Format mvr vlan <mVLAN> group <A.B.C.D> Mode Interface Config no mvr vlan Use this command to exclude the port from the specific MVR group. Format no mvr vlan <mVLAN> group <A.B.C.D> Mode Interface Config show mvr This command displays global MVR settings. Format show mvr Mode Privileged EXEC Multicast VLAN Registration Commands 223 M4100 Series ProSAFE Managed Switches The following table explains the output parameters. Term Definition MVR Running MVR running state. It can be enabled or disabled. MVR multicast VLAN Current MVR multicast VLAN. It can be in the range from 1 to 4094. MVR Max Multicast Groups The maximum number of multicast groups supported by MVR. MVR Current multicast groups The current number of MVR groups allocated. MVR Query response time The current MVR query response time. MVR Mode The current MVR mode. It can be compatible or dynamic. Command example: (NETGEAR Switch)#show mvr MVR Running…........................... MVR multicast VLAN….................... MVR Max Multicast Groups….............. MVR Current multicast groups….......... MVR Global query response time…........ MVR Mode….............................. TRUE 1200 256 1 10 (tenths of sec) compatible show mvr members This command displays the MVR membership groups allocated. <A.B.C.D> is a valid multicast address in IPv4 dotted notation. Format show mvr members [<A.B.C.D>] Mode Privileged EXEC The following table describes the output parameters. Term Definition MVR Group IP MVR group multicast IP address. Status The status of the specific MVR group. It can be active or inactive. Members The list of ports that participates in the specified MVR group. Command example: (NETGEAR Switch)#show MVR Group IP -----------------224.1.1.1 mvr members Status --------------INACTIVE Members --------------------0/1, 0/2, 0/3 Multicast VLAN Registration Commands 224 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch)#show MVR Group IP -----------------224.1.1.1 mvr members 224.1.1.1 Status Members ----------------------------------INACTIVE 0/1, 0/2, 0/3 show mvr interface This command displays the MVR-enabled interfaces configuration. Format show mvr interface [<interface-id> [members [vlan <vid>]]] Mode Privileged EXEC The following table explains the output fields. Field Description Port Interface number Type The MVR port type. It can be none, receiver, or source type. Status The interface status. It consists of two characteristics: • active or inactive indicates whether the port is forwarding. • inVLAN or notInVLAN indicates whether the port is part of any VLAN. Immediate Leave The state of immediate mode. It can be enabled or disabled. Command example: (NETGEAR Switch)#show mvr interface Port Type Status ------------------------------------------0/9 RECEIVER ACTIVE/inVLAN Immediate Leave -------------------DISABLED Command example: (NETGEAR Switch)#show mvr interface 0/9 Type: RECEIVER Status: ACTIVE Immediate Leave: DISABLED Command example: (NETGEAR Switch)#show mvr interface 0/23 members 235.0.0.1 STATIC ACTIVE Command example: (NETGEAR Switch)#show mvr interface 0/23 members vlan 12 235.0.0.1 STATIC ACTIVE 235.1.1.1 STATIC ACTIVE Multicast VLAN Registration Commands 225 M4100 Series ProSAFE Managed Switches show mvr traffic This command displays global MVR statistics. Format show mvr traffic Mode Privileged EXEC The following table explains the output parameters. Term Definition IGMP Query Received Number of received IGMP queries IGMP Report V1 Received Number of received IGMP reports V1 IGMP Report V2 Received Number of received IGMP reports V2 IGMP Leave Received Number of received IGMP leaves IGMP Query Transmitted Number of transmitted IGMP queries IGMP Report V1 Transmitted Number of transmitted IGMP reports V1 IGMP Report V2 Transmitted Number of transmitted IGMP reports V2 IGMP Leave Transmitted Number of transmitted IGMP leaves IGMP Packet Receive Failures Number of failures on receiving the IGMP packets IGMP Packet Transmit Failures Number of failures on transmitting the IGMP packets Command example: (NETGEAR Switch)#show mvr traffic IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP IGMP Query Received…........................................ Report V1 Received….................................... Report V2 Received….................................... Leave Received…........................................ Query Transmitted…..................................... Report V1 Transmitted…................................. Report V2 Transmitted…................................. Leave Transmitted…..................................... Packet Receive Failures…............................... Packet Transmit Failures….............................. Multicast VLAN Registration Commands 226 2 0 3 0 2 0 3 1 0 0 4. 4 Routing Commands This chapter describes the routing commands. The chapter contains the following sections: • Address Resolution Protocol (ARP) Commands • IP Routing Commands • Virtual LAN Routing Commands • DHCP and BOOTP Relay Commands • IP Helper Commands • ICMP Throttling Commands The commands in this chapter are in three functional groups: • Show commands display switch settings, statistics, and other information. • Configuration commands configure features and options of the switch. Every switch command has a show command that displays the configuration setting. • Clear commands clear some or all of the settings to factory defaults. 227 M4100 Series ProSAFE Managed Switches Address Resolution Protocol (ARP) Commands This section describes the commands you use to configure ARP and to view ARP information about the switch. ARP associates IP addresses with MAC addresses and stores the information as ARP entries in the ARP cache. arp This command creates an ARP entry. The value for <ipaddress> is the IP address of a device on a subnet attached to an existing routing interface. <macaddr> is a unicast MAC address for that device. The format of the MAC address is 6 two-digit hexadecimal numbers that are separated by colons, for example 00:06:29:32:81:40. Format arp <ipaddress> <macaddr> Mode Global Config no arp This command deletes an ARP entry. The value for <arpentry> is the IP address of the interface. The value for <ipaddress> is the IP address of a device on a subnet attached to an existing routing interface. <macaddr> is a unicast MAC address for that device. Format no arp <ipaddress> <macaddr> Mode Global Config ip local-proxy-arp This command enables local-proxy-arp on interface or range of interfaces. The switch only responds if all next hops in its route to the destination are through interfaces other than the interface that received the ARP request. Enabling local proxy ARP removes this restriction. Default disabled Format ip local-proxy-arp Mode Interface Config no ip local-proxy-arp This command disables local-proxy-arp on the interface or a range of interfaces. Format no ip local-proxy-arp Mode Interface Config Routing Commands 228 M4100 Series ProSAFE Managed Switches ip proxy-arp This command enables proxy ARP on a router interface. Without proxy ARP, a device only responds to an ARP request if the target IP address is an address configured on the interface where the ARP request arrived. With proxy ARP, the device might also respond if the target IP address is reachable. The device responds only if all next hops in its route to the destination are through interfaces other than the interface that received the ARP request. Default enabled Format ip proxy-arp Mode Interface Config no ip proxy-arp This command disables proxy ARP on a router interface. Format no ip proxy-arp Mode Interface Config arp cachesize This command configures the ARP cache size. The ARP cache size value is a platform-specific integer value. The default size also varies depending on the platform. Format arp cachesize <platform specific integer value> Mode Global Config no arp cachesize This command configures the default ARP cache size. Format no arp cachesize Mode Global Config arp dynamicrenew This command enables the ARP component to automatically renew dynamic ARP entries when they age out. Default enabled Format arp dynamicrenew Mode Privileged EXEC Routing Commands 229 M4100 Series ProSAFE Managed Switches no arp dynamicrenew This command prevents dynamic ARP entries from renewing when they age out. Format no arp dynamicrenew Mode Privileged EXEC arp purge This command causes the specified IP address to be removed from the ARP cache. Only entries of type dynamic or gateway are affected by this command. Format arp purge <ipaddr> Mode Privileged EXEC arp resptime This command configures the ARP request response time-out. The value for <seconds> is a valid positive integer, which represents the IP ARP entry response time-out time in seconds. The range for <seconds> is between 1-10 seconds. Default 1 Format arp resptime <seconds> Mode Global Config no arp resptime This command configures the default ARP request response time-out. Format no arp resptime Mode Global Config arp retries This command configures the ARP count of maximum request for retries. The value for <retries> is an integer, which represents the maximum number of requests for retries. The range for <retries> is an integer between 0-10 retries. Default 4 Format arp retries <retries> Mode Global Config Routing Commands 230 M4100 Series ProSAFE Managed Switches no arp retries This command configures the default ARP count of maximum request for retries. Format no arp retries Mode Global Config arp timeout This command configures the ARP entry ageout time. The value for <seconds> is a valid positive integer, which represents the IP ARP entry ageout time in seconds. The range for <seconds> is between 15-21600 seconds. Default 1200 Format arp timeout <seconds> Mode Global Config no arp timeout This command configures the default ARP entry ageout time. Format no arp timeout Mode Global Config clear arp-cache This command causes all ARP entries of type dynamic to be removed from the ARP cache. If the gateway keyword is specified, the dynamic entries of type gateway are purged as well. Format clear arp-cache [gateway] Mode Privileged EXEC clear arp-switch Use this command to clear the contents of the switch’s Address Resolution Protocol (ARP) table that contains entries learned through the Management port. To observe whether this command is successful, ping from the remote system to the DUT. Issue the show arp switch command to see the ARP entries. Then issue the clear arp-switch command and check the show arp switch entries. There will be no more arp entries. Format clear arp-switch Mode Privileged EXEC Routing Commands 231 M4100 Series ProSAFE Managed Switches show arp This command displays the Address Resolution Protocol (ARP) cache. The displayed results are not the total ARP entries. To view the total ARP entries, the operator should view the show arp results with the show arp switch results. Format show arp Mode Privileged EXEC Term Definition Age Time (seconds) The time it takes for an ARP entry to age out. This is configurable. Age time is measured in seconds. Response Time (seconds) The time it takes for an ARP request timeout. This value is configurable. Response time is measured in seconds. Retries The maximum number of times an ARP request is retried. This value is configurable. Cache Size The maximum number of entries in the ARP table. This value is configurable. Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when they age out. Total Entry Count Current / Peak The total entries in the ARP table and the peak entry count in the ARP table. Static Entry Count Configured/Active / Max The static entry count in the ARP table, the active entry count in the ARP table, the active entry count in the ARP table, and maximum static entry count in the ARP table. The following are displayed for each ARP entry: Term Definition IP Address The IP address of a device on a subnet attached to an existing routing interface. MAC Address The hardware MAC address of that device. Interface The routing slot/port associated with the device ARP entry. Type The type that is configurable. The possible values are Local, Gateway, Dynamic and Static. Age The current age of the ARP entry since last refresh (in hh:mm:ss format) show arp brief This command displays the brief Address Resolution Protocol (ARP) table information. Format show arp brief Mode Privileged EXEC Routing Commands 232 M4100 Series ProSAFE Managed Switches Term Definition Age Time (seconds) The time it takes for an ARP entry to age out. This value is configurable. Age time is measured in seconds. Response Time (seconds) The time it takes for an ARP request timeout. This value is configurable. Response time is measured in seconds. Retries The maximum number of times an ARP request is retried. This value is configurable. Cache Size The maximum number of entries in the ARP table. This value is configurable. Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when they age out. Total Entry Count Current / Peak The total entries in the ARP table and the peak entry count in the ARP table. Static Entry Count Current / Max The static entry count in the ARP table and maximum static entry count in the ARP table. show arp switch (Address Resolution Protocol commands) This command displays the contents of the switch’s Address Resolution Protocol (ARP) table. Format show arp switch Mode Privileged EXEC Term Definition IP Address The IP address of a device on a subnet attached to the switch. MAC Address The hardware MAC address of that device. Interface The routing slot/port associated with the device’s ARP entry. Routing Commands 233 M4100 Series ProSAFE Managed Switches IP Routing Commands This section describes the commands you use to enable and configure IP routing on the switch. routing This command enables IPv4 and IPv6 routing for an interface. You can view the current value for this function with the show ip brief command. The value is labeled as “Routing Mode.” Default disabled Format routing Mode Interface Config no routing This command disables routing for an interface. You can view the current value for this function with the show ip brief command. The value is labeled as “Routing Mode.” Format no routing Mode Interface Config ip routing This command enables the IP Router Admin Mode for the master switch. Format ip routing Mode Global Config no ip routing This command disables the IP Router Admin Mode for the master switch. Format no ip routing Mode Global Config ip address This command configures an IP address on an interface. You can also use this command to configure one or more secondary IP addresses on the interface. The command supports RFC 3021 and accepts using 31-bit prefixes on IPv4 point-to-point links. This command adds the label IP address in show ip interface. Routing Commands 234 M4100 Series ProSAFE Managed Switches Note: The 31-bit subnet mask is only supported on routing interface. This feature is not supported on a network port because it acts as a host, not a router, on the management interface. Format ip address <ipaddr> {<subnetmask> | /<prefix-length>} [secondary] Mode Interface Config Parameter Description <ipaddr> The IP address of the interface. <subnetmask> A four-digit dotted-decimal number that represents the subnet mask of the interface <prefix-length> Implements RFC 3021. Using the / notation of the subnet mask, this is an integer that indicates the length of the subnet mask. Range is 5–32 bits. no ip address This command deletes an IP address from an interface. The value for <ipaddr> is the IP address of the interface in a.b.c.d format where the range for a, b, c, and d is 1-255. The value for <subnetmask> is a 4-digit dotted-decimal number which represents the subnet mask of the interface. To remove all of the IP addresses (primary and secondary) configured on the interface, enter the command no ip address. Format no ip address [<ipaddr> {<subnetmask> | /<prefix-length>} [secondary]] Mode Interface Config ip address dhcp Use this command to enable the DHCPv4 client on an in-band interface so that it can acquire network information, such as the IP address, subnet mask, and default gateway from a network DHCP server. When DHCP is enabled on the interface, the system automatically deletes all manually configured IPv4 addresses on the interface. Default disabled Format ip address dhcp Mode Interface Config Routing Commands 235 M4100 Series ProSAFE Managed Switches no ip address dhcp Use this command to release a leased address and disable DHCPv4 on an interface. Format no ip address dhcp Mode Interface Config ip default-gateway Use this command to manually configure a default gateway for the switch. Only one default gateway can be configured. If you use this command multiple times, each command replaces the previous value. Format ip default-gateway <ipaddr> Mode Global Config no ip default-gateway Use this command to remove the default gateway address from the configuration. Format no ip default-gateway <ipaddr> Mode Interface Config release dhcp Use this command to force the DHCPv4 client to release the leased address from the specified interface. Format release dhcp <slot/port> Mode Privileged EXEC renew dhcp Use this command to force the DHCPv4 client to immediately renew an IPv4 address lease on the specified interface. Format renew dhcp {<slot/port> | network-port} Mode Privileged EXEC Note: This command can be used on in-band ports as well as network (out-of-band) port. Routing Commands 236 M4100 Series ProSAFE Managed Switches show dhcp lease Use this command to display a list of IPv4 addresses currently leased from a DHCP server on a specific in-band interface or all in-band interfaces. This command does not apply to service or network ports. Format show dhcp lease [interface <slot/port>] Mode Privileged EXEC Term Definition IP address, Subnet The IP address and network mask leased from the DHCP server. mask DHCP Lease server The IPv4 address of the DHCP server that leased the address. State State of the DHCPv4 Client on this interface. DHCP transaction ID The transaction ID of the DHCPv4 Client. Lease The time (in seconds) that the IP address was leased by the server. Renewal The time (in seconds) when the next DHCP renew Request is sent by DHCPv4 Client to renew the leased IP address. Rebind The time (in seconds) when the DHCP Rebind process starts. Retry count Number of times the DHCPv4 client sends a DHCP REQUEST message before the server responds. ip route This command configures a static route. The <ipaddr> parameter is a valid IP address, and <subnetmask> is a valid subnet mask. The <nexthopip> parameter is a valid IP address of the next hop router. Specifying Null0 as nexthop parameter adds a static reject route. The optional <preference> parameter is an integer (value from 1 to 255) that allows you to specify the preference value (sometimes called “administrative distance”) of an individual static route. Among routes to the same destination, the route with the lowest preference value is the route entered into the forwarding database. By specifying the preference of a static route, you control whether a static route is more or less preferred than routes from dynamic routing protocols. The preference also controls whether a static route is more or less preferred than other static routes to the same destination. A route with a preference of 255 cannot be used to forward traffic. For the static routes to be visible, you must perform the following steps: • Enable IP routing globally. • Enable IP routing for the interface. • Confirm that the associated link is also up Routing Commands 237 M4100 Series ProSAFE Managed Switches Default preference—1 Format ip route <ipaddr> <subnetmask> [<nexthopip> | Null0] [<preference>] Mode Global Config no ip route This command deletes a single next hop to a destination static route. If you use the <nexthopip> parameter, the next hop is deleted. If you use the <preference> value, the preference value of the static route is reset to its default. Format no ip route <ipaddr> <subnetmask> [<nexthopip> | Null0] [<preference>] Mode Global Config ip route default This command configures the default route. The value for <nexthopip> is a valid IP address of the next hop router. The <preference> is an integer value from 1 to 255. A route with a preference of 255 cannot be used to forward traffic. Default preference—1 Format ip route default <nexthopip> [<preference>] Mode Global Config no ip route default This command deletes all configured default routes. If the optional <nexthopip> parameter is designated, the specific next hop is deleted from the configured default route and if the optional preference value is designated, the preference of the configured default route is reset to its default. Format no ip route default [<nexthopip> | <preference>] Mode Global Config ip route distance This command sets the default distance (preference) for static routes. Lower route distance values are preferred when determining the best route. The ip route and ip route default commands allow you to optionally set the distance (preference) of an individual static route. The default distance is used when no distance is specified in these commands. Changing the default distance does not update the distance of existing static routes, even if they were assigned the original default distance. The new default distance will only be applied to static routes created after invoking the ip route distance command. Routing Commands 238 M4100 Series ProSAFE Managed Switches Default 1 Format ip route distance <1-255> Mode Global Config no ip route distance This command sets the default static route preference value in the router. Lower route preference values are preferred when determining the best route. Format no ip route distance Mode Global Config ip netdirbcast This command enables the forwarding of network-directed broadcasts. When enabled, network directed broadcasts are forwarded. When disabled they are dropped. Default disabled Format ip netdirbcast Mode Interface Config no ip netdirbcast This command disables the forwarding of network-directed broadcasts. When disabled, network directed broadcasts are dropped. Format no ip netdirbcast Mode Interface Config ip mtu This command sets the IP maximum transmission unit (MTU) on a routing interface. The IP MTU is the size of the largest IP packet that can be transmitted on the interface without fragmentation. The software currently does not fragment IP packets. • Packets forwarded in hardware ignore the IP MTU. • Packets forwarded in software are dropped if they exceed the IP MTU of the outgoing interface. Packets originated on the router, such as OSPF packets, might be fragmented by the IP stack. The IP stack uses its default IP MTU and ignores the value set using the ip mtu command. Routing Commands 239 M4100 Series ProSAFE Managed Switches OSPF advertises the IP MTU in the Database Description packets it sends to its neighbors during database exchange. If two OSPF neighbors advertise different IP MTUs, they will not form an adjacency. (unless OSPF has been instructed to ignore differences in IP MTU with the ip ospf mtu-ignore command.) Note: The IP MTU size refers to the maximum size of the IP packet (IP Header + IP payload). It does not include any extra bytes that might be required for Layer-2 headers. To receive and process packets, the Ethernet MTU must take into account the size of the Ethernet header. Default 1500 bytes Format ip mtu <68-9198> Mode Interface Config no ip mtu This command resets the IP MTU to the default value. Format no ip mtu Mode Interface Config encapsulation This command configures the link layer encapsulation type for the packet. The encapsulation type can be ethernet or snap. Default ethernet Format encapsulation {ethernet | snap} Mode Interface Config Note: Routed frames are always Ethernet encapsulated when a frame is routed to a VLAN. clear ip route all This command removes all the route entries learned over the network. Format clear ip route all Mode Privileged EXEC Routing Commands 240 M4100 Series ProSAFE Managed Switches Protocol Tells which protocol added the specified route. The possibilities are: local, static, OSPF, or RIP. Total Number The total number of routes. of Routes clear ip route counters This command resets to zero the IPv4 routing table counters reported in the output of the show ip route summary command. The command resets only the event counters. Counters that report the current state of the routing table, such as the number of routes of each type, are not reset. Format clear ip route counters Mode Privileged EXEC show ip brief This command displays all the summary information of the IP, including the ICMP rate limit configuration and the global ICMP Redirect configuration. Format show ip brief Modes • • Privileged EXEC User EXEC Term Definition Default Time to Live The computed TTL (Time to Live) of forwarding a packet from the local router to the final destination. Routing Mode Shows whether the routing mode is enabled or disabled. Maximum Next Hops The maximum number of next hops the packet can travel. Maximum Routes The maximum number of routes the packet can travel. ICMP Rate Limit Interval Shows how often the token bucket is initialized with burst-size tokens. Burst-interval is from 0 to 2,147,483,647 milliseconds. The default burst-interval is 1000 msec. ICMP Rate Limit Burst Shows the number of ICMPv4 error messages that can be sent during one Size burst-interval. The range is from 1 to 200 messages. The default value is 100 messages. ICMP Echo Replies Shows whether ICMP Echo Replies are enabled or disabled. ICMP Redirects Shows whether ICMP Redirects are enabled or disabled. Routing Commands 241 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show ip brief Default Time to Live........................... Routing Mode................................... Maximum Next Hops.............................. Maximum Routes................................. ICMP Rate Limit Interval....................... ICMP Rate Limit Burst Size..................... ICMP Echo Replies.............................. ICMP Redirects................................. 64 Disabled 4 6000 1000 msec 100 messages Enabled Enabled show ip interface This command displays all pertinent information about the IP interface. Format show ip interface {<slot/port> | vlan <1-4093> | loopback <0-7>} Modes • • Term Privileged EXEC User EXEC Definition Routing Interface Determine the operational status of IPv4 routing Interface. The possible values are Up or Status Down. Primary IP Address The primary IP address and subnet masks for the interface. This value appears only if you configure it. Secondary IP Address One or more secondary IP addresses and subnet masks for the interface. This value appears only if you configure it. Method Shows whether the IP address was configured manually or acquired from a DHCP server. Routing Mode The administrative mode of router interface participation. The possible values are enable or disable. This value is configurable. Administrative Mode The administrative mode of the specified interface. The possible values of this field are enable or disable. This value is configurable. Forward Net Directed Broadcasts Displays whether forwarding of network-directed broadcasts is enabled or disabled. This value is configurable. Proxy ARP Displays whether Proxy ARP is enabled or disabled on the system. Local Proxy ARP Displays whether Local Proxy ARP is enabled or disabled on the interface. Active State Displays whether the interface is active or inactive. An interface is considered active if its link is up and it is in forwarding state. Routing Commands 242 M4100 Series ProSAFE Managed Switches Term Definition Link Speed Data An integer representing the physical link data rate of the specified interface. This is Rate measured in Megabits per second (Mbps). MAC Address The burned in physical address of the specified interface. The format is 6 two-digit hexadecimal numbers that are separated by colons. Encapsulation Type The encapsulation type for the specified interface. The types are: Ethernet or SNAP. IP MTU The maximum transmission unit (MTU) size of a frame, in bytes. Bandwidth Shows the bandwidth of the interface. Destination Unreachables Displays whether ICMP Destination Unreachables might be sent (enabled or disabled). ICMP Redirects Displays whether ICMP Redirects might be sent (enabled or disabled). Command example: (NETGEAR Switch) >show ip interface 0/2 Routing Interface Status....................... Method......................................... Routing Mode................................... Administrative Mode............................ Forward Net Directed Broadcasts................ Proxy ARP...................................... Local Proxy ARP................................ Active State................................... Link Speed Data Rate........................... MAC address.................................... Encapsulation Type............................. IP MTU......................................... Bandwidth...................................... Destination Unreachables....................... ICMP Redirects................................. Down None Disable Enable Disable Enable Disable Inactive Inactive 02:14:6C:FF:00:DE Ethernet 1500 100000 kbps Enabled Disabled show ip interface brief This command displays summary information about IP configuration settings for all ports in the router. Format show ip interface brief Modes • • Privileged EXEC User EXEC Routing Commands 243 M4100 Series ProSAFE Managed Switches Term Definition Interface Valid slot and port number separated by forward slashes. State Routing operational state of the interface. IP Address The IP address of the routing interface in 32-bit dotted decimal format. IP Mask The IP mask of the routing interface in 32-bit dotted decimal format. Netdir Bcast Indicates if IP forwards net-directed broadcasts on this interface. Possible values are Enable or Disable. MultiCast Fwd The multicast forwarding administrative mode on the interface. Possible values are Enable or Disable. Method Shows whether the IP address was configured manually or acquired from a DHCP server. show ip protocols This command lists a summary of the configuration and status for each unicast routing protocol. The command lists routing protocols that are configured and enabled. If a protocol is selected on the command line, the display is limited to that protocol. Format show ip protocols [ospf | rip] Mode Privileged EXEC Parameter Description OSPFv2 Router ID The router ID configured for OSPFv2 OSPF Admin Mode Whether OSPF is enabled or disabled globally Maximum Paths The maximum number of next hops in an OSPF route Routing for Networks The address ranges configured with an OSPF network command Distance The administrative distance (or route preference) for intra-area, inter-area, and external routes Default Route Advertise Whether OSPF is configured to originate a default route Always Whether default advertisement depends on having a default route in the common routing table Metric The metric configured to be advertised with the default route Metric Type The metric type for the default route Redist Source A type of routes that OSPF is redistributing Metric The metric to advertise for redistributed routes of this type Routing Commands 244 M4100 Series ProSAFE Managed Switches Parameter Description Metric Type The metric type to advertise for redistributed routes of this type Subnets Whether OSPF redistributes subnets of classful addresses, or only classful prefixes Dist List A distribute list used to filter routes of this type. Only routes that pass the distribute list are redistributed Number of Active Areas The number of OSPF areas with at least one interface running on this router. Also broken down by area type ABR Status Whether the router is an area border router. A router is an area border router if it has interfaces that are up in more than one area ASBR Status Whether the router is an autonomous system boundary router. The router is an ASBR if it is redistributing any routes or originating a default route RIP Split Horizon Mode Whether RIP advertises routes on the interface where they were received Default Metric The metric assigned to redistributed routes Default Route Advertise Whether this router is originating a default route Distance The administrative distance for RIP routes Redistribution A table showing information for each source protocol (connected, static, BGP, and OSPF). For each of these sources the distribution list and metric are shown. Fields which are not configured are left blank. For ospf, configured ospf match parameters are also shown Interface The interfaces where RIP is enabled and the version sent and accepted on each interface show ip route This command displays the routing table. The <ip-address> specifies the network for which the route is to be displayed and displays the best matching best-route for the address. The <mask> specifies the subnet mask for the <ip-address>. When you use the longer-prefixes keyword, the <ip-address> and <mask> pair becomes the prefix, and the command displays the routes to the addresses that match that prefix. Use the <protocol> parameter to specify the protocol that installed the routes. The value for <protocol> can be connected, ospf, rip, or static. Use the all parameter to display all routes including best and non-best routes. If you do not use the all parameter, the command only displays the best route. A “T” flag appended to a route indicates that it is an ECMP route, but only one of its next hops has been installed in the forwarding table. The forwarding table might limit the number of ECMP routes or the number of ECMP groups. When an ECMP route cannot be installed because such a limit is reached, the route is installed with a single next hop. Such truncated routes can be identified by a “T” after the interface name. Routing Commands 245 M4100 Series ProSAFE Managed Switches Note: If you use the connected keyword for <protocol>, the all option is not available because there are no best or non-best connected routes. Format show ip route [{<ip-address> [<protocol>] | {<ip-address> <mask> [longer-prefixes] [<protocol>] | <protocol>} [all] | all}] Modes • • Privileged EXEC User EXEC Term Definition Route Codes The key for the routing protocol codes that might appear in the routing table output. The show ip route command displays the routing tables in the following format: Code IP-Address/Mask [Preference/Metric] via Next-Hop, Route-Timestamp, Interface The columns for the routing table display the following information: Term Definition Code The codes for the routing protocols that created the routes. IP-Address/Mask The IP-Address and mask of the destination network corresponding to this route. Preference The administrative distance associated with this route. Routes with low values are preferred over routes with higher values. Metric The cost associated with this route. via Next-Hop The outgoing router IP address to use when forwarding traffic to the next router (if any) in the path toward the destination. Route-Timestamp The last updated time for dynamic routes. The format of Route-Timestamp will be • Days:Hours:Minutes if days > = 1 • Hours:Minutes:Seconds if days < 1 Interface The outgoing router interface to use when forwarding traffic to the next destination. For reject routes, the next hop interface would be Null0 interface. To administratively control the traffic destined to a particular network and prevent it from being forwarded through the router, you can configure a static reject route on the router. Such traffic would be discarded and the ICMP destination unreachable message is sent back to the source. This is typically used for preventing routing loops. The reject route added in the RTO is of the type OSPF Inter-Area. Reject routes (routes of REJECT type installed by any protocol) are not redistributed by OSPF/RIP. Reject routes are supported in both OSPFv2 and OSPFv3. Routing Commands 246 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show ip route Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, S - Static B - BGP Derived, IA - OSPF Inter Area E1 - OSPF External Type 1, E2 - OSPF External Type 2 N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2 C 1.1.1.0/24 [0/1] directly connected, 0/11 C 2.2.2.0/24 [0/1] directly connected, 0/1 C 5.5.5.0/24 [0/1] directly connected, 0/5 S 7.0.0.0/8 [1/0] directly connected, Null0 OIA 10.10.10.0/24 [110/6] via 5.5.5.2, 00h:00m:01s, C 11.11.11.0/24 [0/1] directly connected, 0/11 S 12.0.0.0/8 [5/0] directly connected, Null0 S 23.0.0.0/8 [3/0] directly connected, Null0 0/5 show ip route ecmp-groups This command reports all current ECMP groups in the IPv4 routing table. An ECMP group is a set of two or more next hops used in one or more routes. The groups are numbered arbitrarily from 1 to n. The output indicates the number of next hops in the group and the number of routes that use the set of next hops. The output lists the IPv4 address and outgoing interface of each next hop in each group. Format show ip route ecmp-groups Mode Privileged EXEC Command example: (NETGEAR Switch) #show ip route ecmp-groups ECMP Group 1 with 2 next hops (used by 1 route) 172.20.33.100 on interface 2/33 172.20.34.100 on interface 2/34 ECMP Group 2 with 3 next hops (used by 1 route) 172.20.32.100 on interface 2/32 172.20.33.100 on interface 2/33 172.20.34.100 on interface 2/34 ECMP Group 3 with 4 next hops (used by 1 route) 172.20.31.100 on interface 2/31 172.20.32.100 on interface 2/32 172.20.33.100 on interface 2/33 172.20.34.100 on interface 2/34 Routing Commands 247 M4100 Series ProSAFE Managed Switches show ip route summary Use this command to display the routing table summary. Use the optional all parameter to show the number of all routes, including best and non-best routes. To include only the number of best routes, do not use the optional parameter. If you enter the optional all keyword, some statistics, such as the number of routes from each source, include counts for alternate routes. An alternate route is a route that is not the most preferred route to its destination and therefore is not installed in the forwarding table. If you do not enter the optional all keyword, the output reports only the best routes. Format show ip route summary [all] Modes • • Privileged EXEC User EXEC Term Definition Connected Routes The total number of connected routes in the routing table. Static Routes Total number of static routes in the routing table. RIP Routes Total number of routes installed by RIP protocol. OSPF Routes Total number of routes installed by OSPF protocol. Reject Routes Total number of reject routes installed by all protocols. Total Routes Total number of routes in the routing table. Best Routes The number of best routes currently in the routing table. This number counts only the best route to each destination. Alternate Routes The number of alternate routes currently in the routing table. An alternate route is one that was not selected as the best route to its destination. Route Adds The number of routes added to the routing table. Route Modifies The number of routes that changed after they were initially added to the routing table. Route Deletes The number of routes that deleted from the routing table. Unresolved Route Adds The number of route adds that failed because none of the route’s next hops were on a local subnet. Note that static routes can fail to be added to the routing table at startup because the routing interfaces are not up yet. This counter gets incremented in this case. The static routes are added to the routing table when the routing interfaces come up. Invalid Route Adds The number of routes that failed to be added to the routing table because the route was invalid. A log message is written for each of these failures. Failed Route Adds The number of routes that failed to be added to the routing table because of a resource limitation in the routing table. Reserved Locals The number of routing table entries reserved for a local subnet on a routing interface that is down. Space for local routes is always reserved so that local routes can be installed when a routing interface bounces. Routing Commands 248 M4100 Series ProSAFE Managed Switches Term Definition Unique Next Hops The number of distinct next hops used among all routes currently in the routing table. These include local interfaces for local routes and neighbors for indirect routes. Unique Next The highest count of unique next hops since the counters were last cleared. Hops High Water Next Hop Groups The current number of next hop groups in use by one or more routes. Each next hop group includes one or more next hops. Next Hop Groups High Water The highest count of next hop groups since the counters were last cleared. ECMP Groups The number of next hop groups with multiple next hops. ECMP Routes The number of routes with multiple next hops currently in the routing table. Truncated ECMP The number of ECMP routes that are currently installed in the forwarding table with just Routes one next hop. The forwarding table might limit the number of ECMP routes or the number of ECMP groups. When an ECMP route cannot be installed because the limit is reached, the route is installed with a single next hop. ECMP Retries The number of ECMP routes that have been installed in the forwarding table after initially being installed with a single next hop. Routes with n Next Hops The current number of routes with each number of next hops. Command example: (NETGEAR Switch) #show ip route summary Connected Routes............................... Static Routes.................................. RIP Routes..................................... OSPF Routes.................................... Intra Area Routes............................ Inter Area Routes............................ External Type-1 Routes....................... External Type-2 Routes....................... Reject Routes.................................. Total routes................................... Best Routes (High)............................. Alternate Routes............................... Route Adds..................................... Route Modifies................................. Route Deletes.................................. Unresolved Route Adds.......................... Invalid Route Adds............................. Failed Route Adds.............................. Reserved Locals................................ Unique Next Hops (High)........................ Next Hop Groups (High)......................... 7 1 20 1004 4 1000 0 0 0 1032 1032 (1032) 0 1010 1 10 0 0 0 0 13 (13) 13 (14) Routing Commands 249 M4100 Series ProSAFE Managed Switches ECMP Groups (High)............................. ECMP Routes.................................... Truncated ECMP Routes.......................... ECMP Retries................................... Routes with 1 Next Hop......................... Routes with 2 Next Hops........................ Routes with 4 Next Hops........................ 2 (3) 1001 0 0 31 1 1000 show ip route preferences This command displays detailed information about the route preferences. Route preferences are used in determining the best route. Lower router preference values are preferred over higher router preference values. A route with a preference of 255 cannot be used to forward traffic. Format show ip route preferences Modes • • Privileged EXEC User EXEC Term Definition Local The local route preference value. Static The static route preference value. OSPF Intra The OSPF Intra route preference value. OSPF Inter The OSPF Inter route preference value. OSPF External The OSPF External route preference value. RIP The RIP route preference value. show ip stats This command displays IP statistical information. Refer to RFC 1213 for more information about the fields that are displayed. Format show ip stats Modes • • Privileged EXEC User EXEC Routing Commands 250 M4100 Series ProSAFE Managed Switches show routing heap summary This command displays a summary of the memory allocation from the routing heap. The routing heap is a chunk of memory set aside when the system boots for use by the routing applications. Format show routing heap summary Mode Privileged EXEC Term Description Heap Size The amount of memory, in bytes, allocated at startup for the routing heap. Memory In Use The number of bytes currently allocated. Memory on Free List The number of bytes currently on the free list. When a chunk of memory from the routing heap is freed, it is placed on a free list for future reuse. Memory Available in Heap The number of bytes in the original heap that have never been allocated. In Use High Water Mark The maximum memory in use since the system last rebooted. Command example: (NETGEAR Switch) #show routing heap summary Heap Size....................... 92594000 bytes Memory In Use................... 149598 bytes (0%) Memory on Free List............. 78721 bytes (0%) Memory Available in Heap........ 92365249 bytes (99%) In Use High Water Mark.......... 210788 bytes (0%) Virtual LAN Routing Commands This section describes the commands you use to view and configure VLAN routing and to view VLAN routing status information. vlan routing This command enables routing on a VLAN. The vlanid value has a range from 1 to 4093. The [interface ID] value has a range from 1 to 128. Typically, you will not supply the interface ID argument, and the system automatically selects the interface ID. However, if you specify an interface ID that is already in use, the CLI displays an error message and does not create the VLAN interface. Format vlan routing <vlan-id> [interface id] Mode VLAN Config Routing Commands 251 M4100 Series ProSAFE Managed Switches no vlan routing This command deletes routing on a VLAN. The <vlanid> value has a range from 1 to 4093. Format no vlan routing <vlan-id> Mode VLAN Config show ip vlan This command displays the VLAN routing information for all VLANs with routing enabled. Format show ip vlan Modes • • Privileged EXEC User EXEC Term Definition MAC Address used by Routing VLANs The MAC Address associated with the internal bridge-router interface (IBRI). The same MAC Address is used by all VLAN routing interfaces. It will be displayed above the per-VLAN information. VLAN ID The identifier of the VLAN. Logical Interface The logical slot/port associated with the VLAN routing interface. IP Address The IP address associated with this VLAN. Subnet Mask The subnet mask that is associated with this VLAN. DHCP and BOOTP Relay Commands This section describes the commands you use to configure BootP/DHCP Relay on the switch. A DHCP relay agent operates at Layer 3 and forwards DHCP requests and replies between clients and servers when they are not on the same physical subnet. bootpdhcprelay cidoptmode This command enables the circuit ID option mode for BootP/DHCP Relay on the system. Default disabled Format bootpdhcprelay cidoptmode Mode Global Config Routing Commands 252 M4100 Series ProSAFE Managed Switches no bootpdhcprelay cidoptmode This command disables the circuit ID option mode for BootP/DHCP Relay on the system. Format no bootpdhcprelay cidoptmode Mode Global Config bootpdhcprelay maxhopcount This command configures the maximum allowable relay agent hops for BootP/DHCP Relay on the system. The <hops> parameter has a range of 1–16. Default 4 Format bootpdhcprelay maxhopcount <hops> Mode Global Config no bootpdhcprelay maxhopcount This command configures the default maximum allowable relay agent hops for BootP/DHCP Relay on the system. Format no bootpdhcprelay maxhopcount Mode Global Config bootpdhcprelay minwaittime This command configures the minimum wait time in seconds for BootP/DHCP Relay on the system. When the BOOTP relay agent receives a BOOTREQUEST message, it MAY use the seconds-since-client-began-booting field of the request as a factor in deciding whether to relay the request or not. The parameter has a range of 0–100 seconds. Default 0 Format bootpdhcprelay minwaittime <0-100> Mode Global Config no bootpdhcprelay minwaittime This command configures the default minimum wait time in seconds for BootP/DHCP Relay on the system. Format no bootpdhcprelay minwaittime Mode Global Config Routing Commands 253 M4100 Series ProSAFE Managed Switches show bootpdhcprelay This command displays the BootP/DHCP Relay information. Format show bootpdhcprelay Modes • • Privileged EXEC User EXEC Term Definition Maximum Hop Count The maximum allowable relay agent hops. Minimum Wait Time (Seconds) The minimum wait time. Admin Mode Indicates whether relaying of requests is enabled or disabled. Server IP Address The IP address for the BootP/DHCP Relay server. Circuit Id Option Mode The DHCP circuit Id option which might be enabled or disabled. Requests Received The number or requests received. Requests Relayed The number of requests relayed. Packets Discarded The number of packets discarded. IP Helper Commands This section describes the commands to configure a DHCP relay agent with multiple DHCP server addresses per routing interface, and to use different server addresses for client packets arriving on different interfaces on the relay agent. clear ip helper statistics Use this command to reset the statistics displayed in the show ip helper statistics command to zero. Format clear ip helper statistics Mode Privileged EXEC Routing Commands 254 M4100 Series ProSAFE Managed Switches ip helper-address (Global Config) Use the Global Configuration ip helper-address command to have the switch forward User Datagram Protocol (UDP) broadcasts received on an interface. To disable the forwarding of broadcast packets to specific addresses, use the no form of this command. The ip helper-address command forwards specific UDP broadcast from one interface to another. You can define many helper addresses but the total number of address-port pairs is limited to 128 for the whole device. The setting of a helper address for a specific interface has precedence over a setting of a helper address for all interfaces. • <ip-address> is the destination broadcast or host address to be used when forwarding UDP broadcasts. You can specify 0.0.0.0 to indicate not to forward the UDP packet to any host and enter 255.255.255.255 to broadcast the UDP packets to all hosts on the target subnet. • <dest-udp-port> is the broadcast packet destination UDP port number to forward. If not specified, packets for the default services are forwarded to the helper address. The valid range is 0-65535. Default No helper addresses are configured. Format ip helper-address <ip-address> [<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time] Mode Global Config Parameter Description <ip-address> The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The IP address cannot be an IP address configured on any interface of the local router. <dest-udp-port> A destination UDP port number from 0 to 65535. port name options The destination UDP port may be optionally specified by its name. Whether a port is specified by its number or its name has no effect on behavior. The names recognized are as follows: • dhcp (port 67) • domain (port 53) • isakmp (port 500) • mobile-ip (port 434) • nameserver (port 42) • netbios-dgm (port 138) • netbios-ns (port 137) • ntp (port 123) • pim-auto-rp (port 496) • rip (port 520) • tacacs (port 49) • tftp (port 69) • time (port 37) Other ports must be specified by number. Routing Commands 255 M4100 Series ProSAFE Managed Switches no ip helper-address (Global Config) Use this command to remove the IP address from the previously configured list. The no command without an <ip-address> argument removes the entire list of helper addresses on that interface. Format no ip helper-address <ip-address> {<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time} Mode GlobalConfig ip helper enable Use this command to enable relay of UDP packets. This command can be used to temporarily disable IP helper without deleting all IP helper addresses. This command replaces the bootpdhcprelay enable command, but affects not only relay of DHCP packets, but also relay of any other protocols for which an IP helper address has been configured. Default disabled Format ip helper enable Mode Global Config no ip helper enable Use this command to disable relay of all UDP packets. Format no ip helper enable Mode Global Config ip helper-address (Interface Config) Use this command to add a unicast helper address to the list of helper addresses on an interface. This is the address of a DHCP server. This command can be applied multiple times on the routing interface to form the helper addresses list until the list reaches the maximum supported helper addresses. Default No helper addresses are configured. Format ip helper-address <ip-address> [<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time] Mode Interface Config Routing Commands 256 M4100 Series ProSAFE Managed Switches Parameter Description <ip-address> The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The IP address cannot be in a subnet on the interface where the relay entry is configured, and cannot be an IP address configured on any interface of the local router. <dest-udp-port> A destination UDP port number from 0 to 65535. port name options The destination UDP port may be optionally specified by its name. Whether a port is specified by its number or its name has no effect on behavior. The names recognized are as follows: • dhcp (port 67) • domain (port 53) • isakmp (port 500) • mobile-ip (port 434) • nameserver (port 42) • netbios-dgm (port 138) • netbios-ns (port 137) • ntp (port 123) • pim-auto-rp (port 496) • rip (port 520) • tacacs (port 49) • tftp (port 69) • time (port 37) Other ports must be specified by number. no ip helper-address Use this command to remove the IP address from the previously configured list. The no command without an <ip-address> argument removes the entire list of helper addresses on that interface. Format no ip helper-address <ip-address> [<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time] Mode Interface Config ip helper-address discard Use this command to drop matching packets. Matching packets are discarded rather than relayed, even if a global ip helper-address configuration matches the packet. Format ip helper-address discard [<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time] Mode Interface Config Routing Commands 257 M4100 Series ProSAFE Managed Switches Parameter Description <dest-udp-port> A destination UDP port number from 0 to 65535. port name options The destination UDP port may be optionally specified by its name. Whether a port is specified by its number or its name has no effect on behavior. The names recognized are as follows: • dhcp (port 67) • domain (port 53) • isakmp (port 500) • mobile-ip (port 434) • nameserver (port 42) • netbios-dgm (port 138) • netbios-ns (port 137) • ntp (port 123) • pim-auto-rp (port 496) • rip (port 520) • tacacs (port 49) • tftp (port 69) • time (port 37) Other ports must be specified by number. no ip helper-address discard Use this command to permit the matching packets. Format no ip helper-address discard [<dest-udp-port> | dhcp | domain | isakmp | mobile-ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-auto-rip | rip | tacacs | tftp | time] Mode Interface Config show ip helper-address Use this command to display the configured helper addresses on the interface. Format show ip helper-address <interface> Mode • • Privileged EXEC User EXEC Command example: (NETGEAR Switch) #show ip helper-address 0/1 Helper IP Address.............................. 1.2.3.4 ............................................... 1.2.3.5 Routing Commands 258 M4100 Series ProSAFE Managed Switches show ip helper statistics Use this command to display the number of DHCP and other UDP packets processed and relayed by the UDP relay agent. Format show ip helper statistics Mode Privileged EXEC Term Definition DHCP client messages received The number of valid messages received from a DHCP client. The count is incremented only if IP helper is enabled globally, the ingress routing interface is up, and the packet passes a number of validity checks, such as having a TTL>1 and having valid source and destination IP addresses. DHCP client messages relayed The number of DHCP client messages relayed to a server. If a message is relayed to multiple servers, the count is incremented once for each server. DHCP server messages received The number of DHCP responses received from the DHCP server. This count includes only messages that the DHCP server unicasts to the relay agent for relay to the client. DHCP server messages relayed The number of DHCP server messages relayed to a client. UDP clients messages received The number of valid UDP packets received. This count includes DHCP messages and all other protocols relayed. Conditions are similar to those for the first statistic in this table. UDP clients messages relayed The number of UDP packets relayed. This count includes DHCP messages relayed as well as all other protocols. The count is incremented for each server to which a packet is sent. DHCP message hop count exceeded max The number of DHCP client messages received whose hop count is larger than the maximum allowed. The maximum hop count is a configurable value listed in show bootpdhcprelay. A log message is written for each such failure. The DHCP relay agent does not relay these packets. DHCP message with secs field below min The number of DHCP client messages received whose secs field is less than the minimum value. The minimum secs value is a configurable value and is displayed in show bootpdhcprelay. A log message is written for each such failure. The DHCP relay agent does not relay these packets. DHCP message with giaddr set to local address The number of DHCP client messages received whose gateway address, giaddr, is already set to an IP address configured on one of the relay agent’s own IP addresses. In this case, another device is attempting to spoof the relay agent’s address. The relay agent does not relay such packets. A log message gives details for each occurrence. Packets with expired TTL The number of packets received with TTL of 0 or 1 that might otherwise have been relayed. Packets that matched The number of packets ignored by the relay agent because they match a discard a discard entry relay entry. Routing Commands 259 M4100 Series ProSAFE Managed Switches ICMP Throttling Commands This section describes the commands you use to configure options for the transmission of various types of ICMP messages. ip unreachables Use this command to enable the generation of ICMP Destination Unreachable messages. By default, the generation of ICMP Destination Unreachable messages is enabled. Default enable Format ip unreachables Mode Interface Config no ip unreachables Use this command to prevent the generation of ICMP Destination Unreachable messages. Format no ip unreachables Mode Interface Config ip redirects Use this command to enable the generation of ICMP Redirect messages by the router. By default, the generation of ICMP Redirect messages is disabled. Default disabled Format ip redirects Mode • • Global Config Interface Config no ip redirects Use this command to prevent the generation of ICMP Redirect messages by the router. Format no ip redirects Mode • • Global Config Interface Config Routing Commands 260 M4100 Series ProSAFE Managed Switches ip icmp echo-reply Use this command to enable the generation of ICMP Echo Reply messages by the router. By default, the generation of ICMP Echo Reply messages is enabled. Default enabled Format ip icmp echo-reply Mode Global Config no ip icmp echo-reply Use this command to prevent the generation of ICMP Echo Reply messages by the router. Format no ip icmp echo-reply Mode Global Config ip icmp error-interval Use this command to limit the rate at which IPv4 ICMP error messages are sent. The rate limit is configured as a token bucket, with two configurable parameters, burst-size and burst-interval. • <burst-interval> specifies how often the token bucket is initialized with burst-size tokens. burst-interval is from 0 to 2147483647 milliseconds (msec). • <burst-size> is the number of ICMP error messages that can be sent during one burst-interval. The range is from 1 to 200 messages. To disable ICMP rate limiting, set the burst interval to zero (0). Default • • Format ip icmp error-interval <burst-interval> [<burst-size>] Mode Global Config burst-interval of 1000 msec. burst-size of 100 messages no ip icmp error-interval Use this command to return the burst interval and burst size to their default values. Format no ip icmp error-interval Mode Global Config Routing Commands 261 5. Quality of Service Commands 5 This chapter describes the Quality of Service (QoS) commands available in the managed switch CLI. The chapter contains the following sections: • Class of Service (CoS) Commands • Differentiated Services (DiffServ) Commands • DiffServ Class Commands • DiffServ Policy Commands • DiffServ Service Commands • DiffServ Show Commands • MAC Access Control List (ACL) Commands • IP Access Control List (ACL) Commands • IPv6 Access Control List (ACL) Commands • Time Range Commands for Time-Based ACLs • AutoVoIP Commands The commands in this chapter are in two functional groups: • Show commands display switch settings, statistics, and other information. • Configuration commands configure features and options of the switch. Every switch command has a show command that displays the configuration setting. 262 M4100 Series ProSAFE Managed Switches Class of Service (CoS) Commands This section describes the commands you use to configure and view Class of Service (CoS) settings for the switch. The commands in this section allow you to control the priority and transmission rate of traffic. Note: Commands you issue in the Interface Config mode only affect a single interface. Commands you issue in the Global Config mode affect all interfaces. classofservice dot1p-mapping This command maps an 802.1p priority to an internal traffic class. The <userpriority> values can range from 0-7. The <trafficclass> values range from 0-6, although the actual number of available traffic classes depends on the platform. For more information about 802.1p priority, see Voice VLAN Commands on page 65. Format classofservice dot1p-mapping <userpriority> <trafficclass> Modes • • Global Config Interface Config no classofservice dot1p-mapping This command maps each 802.1p priority to its default internal traffic class value. Format no classofservice dot1p-mapping Modes • • Global Config Interface Config classofservice ip-dscp-mapping This command maps an IP DSCP value to an internal traffic class. The <ipdscp> value is specified as either an integer from 0 to 63, or symbolically through one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef. The <trafficclass> values can range from 0-6, although the actual number of available traffic classes depends on the platform. Format classofservice ip-dscp-mapping <ipdscp> <trafficclass> Modes Global Config Quality of Service Commands 263 M4100 Series ProSAFE Managed Switches no classofservice ip-dscp-mapping This command maps each IP DSCP value to its default internal traffic class value. Format no classofservice ip-dscp-mapping Modes Global Config classofservice trust This command sets the Class of Service trust mode of an interface. You can set the mode to trust one of the Dot1p (802.1p), IP DSCP, or IP Precedence packet markings. You can also set the interface mode to untrusted. If you configure an interface to use Dot1p, the mode does not appear in the output of the show running config command because Dot1p is the default. Default dot1p Format classofservice trust {dot1p | ip-dscp | ip-precedence | untrusted} Modes • • Global Config Interface Config no classofservice trust This command sets the interface mode to the default value. Format no classofservice trust Modes • • Global Config Interface Config cos-queue min-bandwidth This command specifies the minimum transmission bandwidth guarantee for each interface queue. The total number of queues supported per interface is platform-specific. A value from 0–100 (percentage of link rate) must be specified for each supported queue, with 0 indicating no guaranteed minimum bandwidth. The sum of all values entered must not exceed 100. Format cos-queue min-bandwidth <bw-0> <bw-1> … <bw-n> Modes • • Global Config Interface Config Quality of Service Commands 264 M4100 Series ProSAFE Managed Switches no cos-queue min-bandwidth This command restores the default for each queue's minimum bandwidth value. Format no cos-queue min-bandwidth Modes • • Global Config Interface Config cos-queue strict This command activates the strict priority scheduler mode for each specified queue. Format cos-queue strict <queue-id-1> [<queue-id-2> … <queue-id-n>] Modes • • Global Config Interface Config no cos-queue strict This command restores the default weighted scheduler mode for each specified queue. Format no cos-queue strict <queue-id-1> [<queue-id-2> … <queue-id-n>] Modes • • Global Config Interface Config cos-queue random-detect This command activates weighted random early discard (WRED) for each specified queue on the interface. Specific WRED parameters are configured using the random-detect queue-parms and the random-detect exponential-weighting-constant commands. When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config mode, it applies to all interfaces. At least one, but no more than n, queue-id values are specified with this command. Duplicate queue-id values are ignored. Each queue-id value ranges from 0 to (n-1), where n is the total number of queues supported per interface. The number n is platform dependant and corresponds to the number of supported queues (traffic classes). Format cos-queue random-detect <queue-id-1> [<queue-id-2> … <queue-id-n>] Modes • • Global Config Interface Config Quality of Service Commands 265 M4100 Series ProSAFE Managed Switches no cos-queue random-detect Use this command to disable WRED and restore the default tail drop operation for the specified queues on all interfaces or one interface. Format no cos-queue random-detect <queue-id-1> [<queue-id-2> … <queue-id-n>] Modes • • Global Config Interface Config random-detect exponential weighting-constant Use this command to configure the WRED decay exponent for a CoS queue interface. Format random-detect exponential-weighting-constant <0-15> Modes • • Default 9 Global Config Interface Config no random-detect exponential weighting-constant Use this command to reset the WRED decay exponent to the default value on all interfaces or one interface. Format no random-detect exponential-weighting-constant Modes • • Global Config Interface Config random-detect queue-parms Use this command to configure WRED parameters for each drop precedence level supported by a queue. Use it only when per-COS queue configuration is enabled (using the cos-queue random-detect command). • <min-thresh> is the minimum threshold the queue depth (as a percentage) where WRED starts marking and dropping traffic. • <max-thresh> is the maximum threshold is the queue depth (as a percentage) above which WRED marks or drops all traffic. • <drop-probability> is the percentage probability that WRED marks or drops a packet, when the queue depth is at the maximum threshold. (The drop probability increases linearly from 0 just before the minimum threshold, to this value at the maximum threshold, then goes to 100 percent for larger queue depths). Each parameter is specified for each possible drop precedence (color of TCP traffic). The last precedence applies to all non-TCP traffic. For example, in a 3-color system, four of each parameter specified: green TCP, yellow TCP, red TCP, and non-TCP, respectively. Quality of Service Commands 266 M4100 Series ProSAFE Managed Switches Format random-detect queue-parms <queue-id-1> [<queue-id-2> … <queue-id-n>] minthresh <thresh-prec-1> … <thresh-prec-n> max-thresh <thresh-prec-1> … <threshprec-n> drop-probability <prob-prec-1> … <prob-prec-n> Modes • • Global Config Interface Config no random-detect queue-parms Use this command to set the WRED configuration back to the default. Format no random-detect queue-parms <queue-id-1> [<queue-id-2> … <queue-id-n>] Modes • • Global Config Interface Config traffic-shape This command specifies the maximum transmission bandwidth limit for the interface as a whole. Also known as rate shaping, traffic shaping has the effect of smoothing temporary traffic bursts over time so that the transmitted traffic rate is bounded. Format traffic-shape <bw> Modes • • Global Config Interface Config no traffic-shape This command restores the interface shaping rate to the default value. Format no traffic-shape Modes • • Global Config Interface Config show classofservice dot1p-mapping This command displays the current Dot1p (802.1p) priority mapping to internal traffic classes for a specific interface. The <slot/port> parameter is optional and is only valid on platforms that support independent per-port Class of Service mappings. If specified, the 802.1p mapping table of the interface is displayed. If omitted, the most recent global configuration settings are displayed. For more information, see Voice VLAN Commands on page 65. Quality of Service Commands 267 M4100 Series ProSAFE Managed Switches Format show classofservice dot1p-mapping [<slot/port>] Mode Privileged EXEC The following information is repeated for each user priority. Term Definition User Priority The 802.1p user priority value. Traffic Class The traffic class internal queue identifier to which the user priority value is mapped. show classofservice ip-precedence-mapping This command displays the current IP Precedence mapping to internal traffic classes for a specific interface. The <slot/port> parameter is optional and is only valid on platforms that support independent per-port Class of Service mappings. If specified, the IP Precedence mapping table of the interface is displayed. If omitted, the most recent global configuration settings are displayed. Format show classofservice ip-precedence-mapping [<slot/port>] Mode Privileged EXEC The following information is repeated for each user priority. Term Definition IP Precedence The IP Precedence value. Traffic Class The traffic class internal queue identifier to which the IP Precedence value is mapped. show classofservice ip-dscp-mapping This command displays the current IP DSCP mapping to internal traffic classes for the global configuration settings. Format show classofservice ip-dscp-mapping Mode Privileged EXEC The following information is repeated for each user priority. Term Definition IP DSCP The IP DSCP value. Traffic Class The traffic class internal queue identifier to which the IP DSCP value is mapped. Quality of Service Commands 268 M4100 Series ProSAFE Managed Switches show classofservice trust This command displays the current trust mode setting for a specific interface. The <slot/port> parameter is optional and is only valid on platforms that support independent per-port Class of Service mappings. If you specify an interface, the command displays the port trust mode of the interface. If you do not specify an interface, the command displays the most recent global configuration settings. Format show classofservice trust [<slot/port>] Mode Privileged EXEC Term Definition Non-IP Traffic Class The traffic class used for non-IP traffic. This is only displayed when the COS trust mode is set to trust IP Precedence or IP DSCP (on platforms that support IP DSCP). Untrusted Traffic The traffic class used for all untrusted traffic. This is only displayed when the COS trust Class mode is set to 'untrusted'. show interfaces cos-queue This command displays the class-of-service queue configuration for the specified interface. The slot/port parameter is optional and is only valid on platforms that support independent per-port Class of Service mappings. If specified, the class-of-service queue configuration of the interface is displayed. If omitted, the most recent global configuration settings are displayed. Format show interfaces cos-queue [<slot/port>] Mode Privileged EXEC Term Definition Queue Id An interface supports n queues numbered 0 to (n-1). The specific n value is platform-dependent. Minimum Bandwidth The minimum transmission bandwidth guarantee for the queue, expressed as a percentage. A value of 0 means bandwidth is not guaranteed and the queue operates using best-effort. This is a configured value. Scheduler Type Indicates whether this queue is scheduled for transmission using a strict priority or a weighted scheme. This is a configured value. Queue Management Type The queue depth management technique used for this queue (tail drop). Quality of Service Commands 269 M4100 Series ProSAFE Managed Switches If you specify the interface, the command also displays the following information. Term Definition Interface The slot/port of the interface. If displaying the global configuration, this output line is replaced with a Global Config indication. Interface Shaping Rate The maximum transmission bandwidth limit for the interface as a whole. It is independent of any per-queue maximum bandwidth value(s) in effect for the interface. This is a configured value. show interfaces random-detect This command displays the global WRED settings for each CoS queue. If you specify the slot/port, the command displays the WRED settings for each CoS queue on the specified interface. Format show interfaces random-detect [<slot/port>] Mode Privileged EXEC Term Definition Queue ID An interface supports n queues numbered 0 to (n-1). The specific n value is platform-dependent. WRED Minimum The configured minimum threshold the queue depth (as a percentage) where WRED Threshold starts marking and dropping traffic. WRED Maximum The configured maximum threshold is the queue depth (as a percentage) above which Threshold WRED marks / drops all traffic. WRED Drop Probability The configured percentage probability that WRED will mark/drop a packet, when the queue depth is at the maximum threshold. (The drop probability increases linearly from 0 just before the minimum threshold, to this value at the maximum threshold, then goes to 100% for larger queue depths). Differentiated Services (DiffServ) Commands This section describes the commands you use to configure QOS Differentiated Services (DiffServ). You configure DiffServ in several stages by specifying three DiffServ components: 1. Class a. Creating and deleting classes. b. Defining match criteria for a class. Quality of Service Commands 270 M4100 Series ProSAFE Managed Switches 2. Policy a. Creating and deleting policies b. Associating classes with a policy c. Defining policy statements for a policy/class combination 3. Service a. Adding and removing a policy to/from an inbound or outbound interface The DiffServ class defines the packet filtering criteria. The attributes of a DiffServ policy define the way the switch processes packets. You can define policy attributes on a per-class instance basis. The switch applies these attributes when a match occurs. Packet processing begins when the switch tests the match criteria for a packet. The switch applies a policy to a packet when it finds a class match within that policy. The following rules apply when you create a DiffServ class: • Each class can contain a maximum of one referenced (nested) class • Class definitions do not support hierarchical service policies A class definition can contain a maximum of one reference to another class. You can combine the reference with other match criteria. The referenced class is truly a reference and not a copy, because additions to a referenced class affect all classes that reference it. Changes to any class definition currently referenced by any other class must result in valid class definitions for all derived classes, otherwise the switch rejects the change. You can remove a class reference from a class definition. The only way to remove an individual match criterion from an existing class definition is to delete the class and re-create it. Note: The mark possibilities for policing include CoS, IP DSCP, and IP Precedence. While the latter two are only meaningful for IP packet types, CoS marking is allowed for both IP and non-IP packets, since it updates the 802.1p user priority field contained in the VLAN tag of the layer 2 packet header. diffserv This command sets the DiffServ operational mode to active. While disabled, the DiffServ configuration is retained and can be changed, but it is not activated. When enabled, DiffServ services are activated. Format diffserv Mode Global Config Quality of Service Commands 271 M4100 Series ProSAFE Managed Switches no diffserv This command sets the DiffServ operational mode to inactive. While disabled, the DiffServ configuration is retained and can be changed, but it is not activated. When enabled, DiffServ services are activated. Format no diffserv Mode Global Config DiffServ Class Commands Use the DiffServ class commands to define traffic classification. To classify traffic, you specify Behavior Aggregate (BA), based on DSCP and Multi-Field (MF) classes of traffic (name, match criteria) This set of commands consists of class creation/deletion and matching, with the class match commands specifying Layer 3, Layer 2, and general match criteria. The class match criteria are also known as class rules, with a class definition consisting of one or more rules to identify the traffic that belongs to the class. Note: Once you create a class match criterion for a class, you cannot change or delete the criterion. To change or delete a class match criterion, you must delete and re-create the entire class. The CLI command root is class-map. class-map This command defines a DiffServ class of type match-all. When used without any match condition, this command enters the class-map mode. The <class-map-name> is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying an existing DiffServ class. Note: The class-map-name “default” is reserved and you must not use it. The class type of match-all indicates all of the individual match conditions must be true for a packet to be considered a member of the class. This command might be used without specifying a class type to enter the Class-Map Config mode for an existing DiffServ class. Quality of Service Commands 272 M4100 Series ProSAFE Managed Switches Note: The optional keywords [ipv4 | ipv6] specify the Layer 3 protocol for this class. If not specified, this parameter defaults to ipv4. This maintains backward compatibility for configurations defined on systems before IPv6 match items were supported. Note: The CLI mode is changed to Class-Map Config or Ipv6-Class-Map Config when this command is successfully executed depending on the [ipv4 | ipv6] keyword specified. Format class-map match-all <class-map-name> [ipv4 | ipv6] Mode Global Config no class-map This command eliminates an existing DiffServ class. The <class-map-name> is the name of an existing DiffServ class. (The class name “default” is reserved and is not allowed here.) This command might be issued at any time; if the class is currently referenced by one or more policies or by any other class, the delete action fails. Format no class-map <class-map-name> Mode Global Config class-map rename This command changes the name of a DiffServ class. The <class-map-name> is the name of an existing DiffServ class. The <new-class-map-name> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the class. Default none Format class-map rename <class-map-name> <new-class-map-name> Mode Global Config match ethertype This command adds to the specified class definition a match condition based on the value of the ethertype. The ethertype value is specified as a <keyword> argument that can be one of the following types: appletalk, arp, ibmsna, ipv4, ipv6, ipx, mplsmcast, mplsucast, netbios, novell, pppoe, or rarp or as a <range> argument that represents an EtherType value in the range of 0x0600-0xFFFF. Quality of Service Commands 273 M4100 Series ProSAFE Managed Switches Format match ethertype {<keyword> | custom <range>} Mode • • Class-Map Config Ipv6-Class-Map Config match any This command adds to the specified class definition a match condition whereby all packets are considered to belong to the class. Default none Format match any Mode • • Class-Map Config Ipv6-Class-Map Config match class-map This command adds to the specified class definition the set of match conditions defined for another class. The <refclassname> is the name of an existing DiffServ class whose match conditions are being referenced by the specified class definition. Default none Format match class-map <refclassname> Mode • • Class-Map Config Ipv6-Class-Map Config Note the following: • The parameters <refclassname> and <class-map-name> cannot be the same. • Only one other class might be referenced by a class. • Any attempts to delete the <refclassname> class while the class is still referenced by any <class-map-name> fails. • The combined match criteria of <class-map-name> and <refclassname> must be an allowed combination based on the class type. • Any subsequent changes to the <refclassname> class match criteria must maintain this validity, or the change attempt fails. • The total number of class rules formed by the complete reference class chain (including both predecessor and successor classes) must not exceed a platform-specific maximum. In some cases, each removal of a refclass rule reduces the maximum number of available rules in the class definition by one. Quality of Service Commands 274 M4100 Series ProSAFE Managed Switches no match class-map This command removes from the specified class definition the set of match conditions defined for another class. The <refclassname> is the name of an existing DiffServ class whose match conditions are being referenced by the specified class definition. Format no match class-map <refclassname> Mode • • Class-Map Config Ipv6-Class-Map Config match cos This command adds to the specified class definition a match condition for the Class of Service value (the only tag in a single tagged packet or the first or outer 802.1Q tag of a double VLAN tagged packet). The value might be from 0 to 7. Default none Format match cos <0-7> Mode • • Class-Map Config Ipv6-Class-Map Config match secondary cos This command adds to the specified class definition a match condition for the secondary Class of Service value (the only tag in a single tagged packet or the first or outer 802.1Q tag of a double VLAN tagged packet). The value might be from 0 to 7. Default none Format match secondary-cos <0-7> Mode Class-Map Config match ip6flowlbl This command adds to the specified class definition a match condition based on the IP6flowlbl of a packet. The <label> is the value to match in the Flow Label field of the IPv6 header (range 0-1048575). Format match ip6flowlbl <label> Mode Ipv6-Class-Map Configuration mode match destination-address mac This command adds to the specified class definition a match condition based on the destination MAC address of a packet. The <macaddr> parameter is any layer 2 MAC address formatted as six, two-digit hexadecimal numbers separated by colons (for example, Quality of Service Commands 275 M4100 Series ProSAFE Managed Switches 00:11:22:dd:ee:ff). The <macmask> parameter is a layer 2 MAC address bit mask, which need not to be contiguous, and is formatted as six, two-digit hexadecimal numbers separated by colons (for example, ff:07:23:ff:fe:dc). Default none Format match destination-address mac <macaddr> <macmask> Mode • • Class-Map Config Ipv6-Class-Map Config match dstip This command adds to the specified class definition a match condition based on the destination IP address of a packet. The <ipaddr> parameter specifies an IP address. The <ipmask> parameter specifies an IP address bit mask and must consist of a contiguous set of leading 1 bits. Default none Format match dstip <ipaddr> <ipmask> Mode Class-Map Config match dstip6 This command adds to the specified class definition a match condition based on the destination IPv6 address of a packet. Default none Format match dstip6 <destination-ipv6-prefix/prefix-length> Mode Ipv6-Class-Map Config match dstl4port This command adds to the specified class definition a match condition based on the destination layer 4 port of a packet using a single keyword or numeric notation. To specify the match condition as a single keyword, the value for <portkey> is one of the supported port name keywords. The currently supported <portkey> values are: domain, echo, ftp, ftpdata, http, smtp, snmp, telnet, tftp, or www. Each of these translates into its equivalent port number. To specify the match condition using a numeric notation, one layer 4-port number is required. The port number is an integer from 0 to 65535. Default none Format match dstl4port {<portkey> | <0-65535>} Mode • • Class-Map Config Ipv6-Class-Map Config Quality of Service Commands 276 M4100 Series ProSAFE Managed Switches match ip dscp This command adds to the specified class definition a match condition based on the value of the IP DiffServ Code Point (DSCP) field in a packet, which is defined as the high-order six bits of the Service Type octet in the IP header (the low-order two bits are not checked). The <dscpval> value is specified as either an integer from 0 to 63, or symbolically through one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef. Note: The match ip dscp, match ip precedence, and match ip tos commands provide alternative ways to specify a match criterion for the same Service Type field in the IP header, but each command requires a slightly different user notation. Default none Format match ip dscp <dscpval> Mode • • Class-Map Config Ipv6-Class-Map Config match ip precedence This command adds to the specified class definition a match condition based on the value of the IP Precedence field in a packet, which is defined as the high-order three bits of the Service Type octet in the IP header (the low-order five bits are not checked). The precedence value is an integer from 0 to 7. Note: The match ip dscp, match ip precedence, and match ip tos commands provide alternative ways to specify a match criterion for the same Service Type field in the IP header, but each command requires a slightly different user notation. Default none Format match ip precedence <0-7> Mode Class-Map Config match ip tos This command adds to the specified class definition a match condition based on the value of the IP ToS field in a packet, which is defined as all eight bits of the Service Type octet in the IP header. The value of <tosbits> is a two-digit hexadecimal number from 00 to ff. The value of <tosmask> is a two-digit hexadecimal number from 00 to ff. The <tosmask> Quality of Service Commands 277 M4100 Series ProSAFE Managed Switches denotes the bit positions in <tosbits> that are used for comparison against the IP TOS field in a packet. For example, to check for an IP TOS value having bits 7 and 5 set and bit 1 clear, where bit 7 is most significant, use a <tosbits> value of a0 (hex) and a <tosmask> of a2 (hex). Note: The match ip dscp, match ip precedence, and match ip tos commands provide alternative ways to specify a match criterion for the same Service Type field in the IP header, but each command requires a slightly different user notation. Note: This “free form” version of the IP DSCP, IP precedence, and IP ToS match specification gives you complete control when specifying which bits of the IP Service Type field must be checked. Default none Format match ip tos <tosbits> <tosmask> Mode Class-Map Config match protocol This command adds to the specified class definition a match condition based on the value of the IP Protocol field in a packet using a single keyword notation or a numeric value notation. To specify the match condition using a single keyword notation, the value for <protocol-name> is one of the supported protocol name keywords. The currently supported values are: icmp, igmp, ip, tcp, udp. A value of ip matches all protocol number values. To specify the match condition using a numeric value notation, the protocol number is a standard value assigned by IANA and is interpreted as an integer from 0 to 255. Note: This command does not validate the protocol number value against the current list defined by IANA. Default none Format match protocol {<protocol-name> | <0-255>} Mode • • Class-Map Config Ipv6-Class-Map Config Quality of Service Commands 278 M4100 Series ProSAFE Managed Switches match source-address mac This command adds to the specified class definition a match condition based on the source MAC address of a packet. The <address> parameter is any layer 2 MAC address formatted as six, two-digit hexadecimal numbers separated by colons (for example, 00:11:22:dd:ee:ff). The <macmask> parameter is a layer 2 MAC address bit mask, which might not be contiguous, and is formatted as six, two-digit hexadecimal numbers separated by colons (for example, ff:07:23:ff:fe:dc). Default none Format match source-address mac <address> <macmask> Mode • • Class-Map Config Ipv6-Class-Map Config match srcip This command adds to the specified class definition a match condition based on the source IP address of a packet. The <ipaddr> parameter specifies an IP address. The <ipmask> parameter specifies an IP address bit mask and must consist of a contiguous set of leading 1 bits. Default none Format match srcip <ipaddr> <ipmask> Mode Class-Map Config match srcip6 This command adds to the specified class definition a match condition based on the source IP address of a packet. Default none Format match srcip6 <source-ipv6-prefix/prefix-length> Mode Ipv6-Class-Map Config match srcl4port This command adds to the specified class definition a match condition based on the source layer 4 port of a packet using a single keyword or numeric notation. To specify the match condition as a single keyword notation, the value for <portkey> is one of the supported port name keywords (listed below). The currently supported <portkey> values are: domain, echo, ftp, ftpdata, http, smtp, snmp, telnet, tftp, www. Each of these translates into its equivalent port number, which is used as both the start and end of a port range. To specify the match condition as a numeric value, one layer 4-port number is required. The port number is an integer from 0 to 65535. Quality of Service Commands 279 M4100 Series ProSAFE Managed Switches Default none Format match srcl4port {<portkey> | <0-65535>} Mode • • Class-Map Config Ipv6-Class-Map Config match vlan This command adds to the specified class definition a match condition based on the value of the layer 2 VLAN Identifier field (the 802.1Q tag of a VLAN tagged packet). The VLAN is an integer from 0 to 4095. Default none Format match vlan <0-4095> Mode • • Class-Map Config Ipv6-Class-Map Config match secondary-vlan This command adds to the specified class definition a match condition based on the value of the layer 2 secondary VLAN Identifier field (the 802.1Q tag of a double VLAN tagged packet). The VLAN is an integer from 0 to 4095. Default none Format match secondary-vlan <0-4095> Mode • • Class-Map Config Ipv6-Class-Map Config DiffServ Policy Commands Use the DiffServ policy commands to specify traffic conditioning actions, such as policing and marking, to apply to traffic classes Use the policy commands to associate a traffic class that you define by using the class command set with one or more QoS policy attributes. Assign the class/policy association to an interface to form a service. Specify the policy name when you create the policy. Each traffic class defines a particular treatment for packets that match the class definition. You can associate multiple traffic classes with a single policy. When a packet satisfies the conditions of more than one class, preference is based on the order in which you add the classes to the policy. The first class you add has the highest precedence. This set of commands consists of policy creation/deletion, class addition/removal, and individual policy attributes. Quality of Service Commands 280 M4100 Series ProSAFE Managed Switches Note: The only way to remove an individual policy attribute from a class instance within a policy is to remove the class instance and re-add it to the policy. The values associated with an existing policy attribute can be changed without removing the class instance. The CLI command root is policy-map. assign-queue This command modifies the queue id to which the associated traffic stream is assigned. The <queueid> is an integer from 0 to n-1, where n is the number of egress queues supported by the device. Format assign-queue <queueid> Mode Policy-Class-Map Config Incompatibilities Drop drop This command specifies that all packets for the associated traffic stream are to be dropped at ingress. Format drop Mode Policy-Class-Map Config Incompatibilities Assign Queue, Mark (all forms), Mirror, Police, Redirect mirror This command specifies that all incoming packets for the associated traffic stream are copied to a specific egress interface (physical port or LAG). Format mirror <slot/port> Mode Policy-Class-Map Config Incompatibilities Drop, Redirect Quality of Service Commands 281 M4100 Series ProSAFE Managed Switches redirect This command specifies that all incoming packets for the associated traffic stream are redirected to a specific egress interface (physical port or port-channel). Format redirect <slot/port> Mode Policy-Class-Map Config Incompatibilities Drop, Mirror conform-color Use this command to enable color-aware traffic policing and define the conform-color class map. Used with the police command where the fields for the conform level are specified. The <class-map-name> parameter is the name of an existing DiffServ class map. Note: This command might only be used after specifying a police command for the policy-class instance. Format conform-color <class-map-name> Mode Policy-Class-Map Config class This command creates an instance of a class definition within the specified policy for defining treatment of the traffic class through subsequent policy attribute statements. The <classname> is the name of an existing DiffServ class. Note: This command causes the specified policy to create a reference to the class definition. Note: The CLI mode is changed to Policy-Class-Map Config when this command is successfully executed. Format class <classname> Mode Policy-Map Config Quality of Service Commands 282 M4100 Series ProSAFE Managed Switches no class This command deletes the instance of a particular class and its defined treatment from the specified policy. <classname> is the names of an existing DiffServ class. Note: This command removes the reference to the class definition for the specified policy. Format no class <classname> Mode Policy-Map Config mark cos This command marks all packets for the associated traffic stream with the specified Class of Service value in the priority field of the 802.1p header (the only tag in a single tagged packet or the first or outer 802.1Q tag of a double VLAN tagged packet). If the packet does not already contain this header, one is inserted. The CoS value is an integer from 0 to 7. Default 1 Format mark-cos <0-7> Mode Policy-Class-Map Config Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police mark cos-as-sec-cos This command marks outer VLAN tag priority bits of all packets as the inner VLAN tag priority, marking CoS as Secondary CoS. This essentially means that the inner VLAN tag CoS is copied to the outer VLAN tag CoS. Format mark-cos-as-sec-cos Mode Policy-Class-Map Config Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police mark ip-dscp This command marks all packets for the associated traffic stream with the specified IP DSCP value. The <dscpval> value is specified as either an integer from 0 to 63, or symbolically through one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, or ef. Quality of Service Commands 283 M4100 Series ProSAFE Managed Switches Format mark ip-dscp <dscpval> Mode Policy-Class-Map Config Incompatibilities Drop, Mark CoS, Mark IP Precedence, Police mark ip-precedence This command marks all packets for the associated traffic stream with the specified IP Precedence value. The IP Precedence value is an integer from 0 to 7. Note: This command might not be used on IPv6 classes. IPv6 does not have a precedence field. Format mark ip-precedence <0-7> Mode Policy-Class-Map Config Incompatibilities Drop, Mark CoS, Mark IP Precedence, Police Policy Type In police-simple This command is used to establish the traffic policing style for the specified class. The simple form of the police command uses a single data rate and burst size, resulting in two outcomes: conform and violate. The conforming data rate is specified in kilobits-per-second (Kbps) and is an integer from 1 to 4294967295. The conforming burst size is specified in kilobytes (KB) and is an integer from 1 to 128. For each outcome, the only possible actions are drop, set-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this simple form of the police command, the conform action defaults to transmit and the violate action defaults to drop. For set-cos-transmit, an 802.1p priority value is required and is specified as an integer from 0-7. For set-dscp-transmit, a <dscpval> value is required and is specified as either an integer from 0 to 63, or symbolically through one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7, or ef. For set-prec-transmit, an IP Precedence value is required and is specified as an integer from 0-7. For set-cos-transmit, an 802.1p priority value is required and is specified as an integer from 0-7. Quality of Service Commands 284 M4100 Series ProSAFE Managed Switches Format police-simple {<1-4294967295> <1-128> conform-action {drop | set-prec-transmit <0-7> | set-dscp-transmit <0-63> | set-cos-transmit <0-7> | transmit} [violate-action {drop | set-prec-transmit <0-7> | set-dscp-transmit <0-63> | set-cos-transmit <0-7> | transmit}]} Mode Policy-Class-Map Config Incompatibilities Drop, Mark (all forms) police-two-rate This command is the two-rate form of the police command and is used to establish the traffic policing style for the specified class. For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit, set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this two-rate form of the police command, the conform action defaults to send, the exceed action defaults to drop, and the violate action defaults to drop. These actions can be set with this command after the style is configured. Format police-two-rate {<1-4294967295> <1-128> <1-4294967295> <1-128> conform-action {drop | set-cos-as-sec-cos | set-cos-transmit <0-7> | set-sec-cos-transmit <0-7> | set-prec-transmit <0-7> | set-dscp-transmit <0-63> | transmit} exceed-action {drop | set-cos-as-sec-cos | set-cos-transmit <0-7> | set-sec-cos-transmit <0-7> | set-prec-transmit <0-7> | set-dscp-transmit <0-63> | transmit} violate-action {drop | set-cos-as-sec-cos | set-cos-transmit <0-7> | set-sec-cos-transmit <0-7> | set-prec-transmit <0-7> | set-dscp-transmit <0-63> | transmit}} Mode Policy-Class-Map Config policy-map This command establishes a new DiffServ policy. The <policyname> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the policy. The type of policy is specific to the inbound traffic direction as indicated by the parameter Note: The CLI mode is changed to Policy-Map Config when this command is successfully executed. Format policy-map <policyname> [in | out] Mode Global Config Quality of Service Commands 285 M4100 Series ProSAFE Managed Switches no policy-map This command eliminates an existing DiffServ policy. The <policyname> parameter is the name of an existing DiffServ policy. This command might be issued at any time. If the policy is referenced by one or more interface service attachments, this delete attempt fails. Format no policy-map <policyname> Mode Global Config policy-map rename This command changes the name of a DiffServ policy. The <policyname> is the name of an existing DiffServ class. The <newpolicyname> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the policy. Format policy-map rename <policyname> <newpolicyname> Mode Global Config DiffServ Service Commands Use the DiffServ service commands to assign a DiffServ traffic conditioning policy, which you specified by using the policy commands, to an interface in the incoming direction The service commands attach a defined policy to a directional interface. You can assign only one policy at any one time to an interface in the inbound direction. DiffServ is not used in the outbound direction. This set of commands consists of service addition/removal. The CLI command root is service-policy. service-policy This command attaches a policy to an interface in the inbound direction. The <policyname> parameter is the name of an existing DiffServ policy. This command causes a service to create a reference to the policy. Note: This command effectively enables DiffServ on an interface in the inbound direction. There is no separate interface administrative 'mode' command for DiffServ. Quality of Service Commands 286 M4100 Series ProSAFE Managed Switches Note: This command fails if any attributes within the policy definition exceed the capabilities of the interface. Once a policy is successfully attached to an interface, any attempt to change the policy definition, that would result in a violation of the interface capabilities, causes the policy change attempt to fail. Format service-policy {in | out} <policymapname> Modes • • Global Config Interface Config Note: Each interface can have one policy attached. no service-policy This command detaches a policy from an interface in the inbound direction. The <policyname> parameter is the name of an existing DiffServ policy. Note: This command causes a service to remove its reference to the policy. This command effectively disables DiffServ on an interface in the inbound direction. There is no separate interface administrative 'mode' command for DiffServ. Format no service-policy in <policymapname> Modes • • Global Config Interface Config DiffServ Show Commands Use the DiffServ show commands to display configuration and status information for classes, policies, and services. You can display DiffServ information in summary or detailed formats. The status information is only shown when the DiffServ administrative mode is enabled. Quality of Service Commands 287 M4100 Series ProSAFE Managed Switches show class-map This command displays all configuration information for the specified class. The <class-name> is the name of an existing DiffServ class. Format show class-map <class-name> Modes • • Privileged EXEC User EXEC If the class-name is specified, the fields that are shown in the following table are displayed. Term Definition Class Name The name of this class. Class Type A class type of ‘all’ means every match criterion defined for the class is evaluated simultaneously and must all be true to indicate a class match. Class Layer3 Protocol The Layer 3 protocol for this class. Possible values are IPv4 and IPv6. Match Criteria The Match Criteria fields are only displayed if they have been configured. Not all platforms support all match criteria values. They are displayed in the order entered by the user. The fields are evaluated in accordance with the class type. The possible Match Criteria fields are: Destination IP Address, Destination Layer 4 Port, Destination MAC Address, Ethertype, Source MAC Address, VLAN, Class of Service, Every, IP DSCP, IP Precedence, IP TOS, Protocol Keyword, Reference Class, Source IP Address, and Source Layer 4 Port. Values The values of the Match Criteria. If you do not specify the class name, this command displays a list of all defined DiffServ classes. The fields that are shown in the following table are displayed. Term Definition Class Name The name of this class. (Note that the order in which classes are displayed is not necessarily the same order in which they were created.) Class Type A class type of ‘all’ means every match criterion defined for the class is evaluated simultaneously and must all be true to indicate a class match. Reference Class The name of an existing DiffServ class whose match conditions are being referenced by Name the specified class definition. Quality of Service Commands 288 M4100 Series ProSAFE Managed Switches show diffserv This command displays the DiffServ General Status Group information, which includes the current administrative mode setting as well as the current and maximum number of rows in each of the main DiffServ private MIB tables. This command provides no options. Format show diffserv Mode Privileged EXEC Term Definition DiffServ Admin mode The current value of the DiffServ administrative mode. Class Table Size Current /Max The current number of entries (rows) and the maximum allowed entries (rows) in the Class Table. Class Rule Table Size Current /Max The current number of entries (rows) and the maximum allowed entries (rows) in the Class Rule Table. Policy Table Size Current /Max The current number of entries (rows) and the maximum allowed entries (rows) in the Policy Table. Policy Instance Table Size Current /Max Current number of entries (rows) and the maximum allowed entries (rows) in the Policy Instance Table. Policy Attribute Table Size Current /Max Current number of entries (rows) and the maximum allowed entries (rows) in the Policy Attribute Table. Service Table Size Current /Max The current number of entries (rows) i and the maximum allowed entries (rows) in the Service Table. show policy-map This command displays all configuration information for the specified policy. The <policyname> is the name of an existing DiffServ policy. Format show policy-map [<policyname>] Mode Privileged EXEC If the policy name is specified, the fields that are shown in the following table are displayed. Term Definition Policy Name The name of this policy. Policy Type The policy type (Only inbound policy definitions are supported for this platform.) Quality of Service Commands 289 M4100 Series ProSAFE Managed Switches The information that is shown in the following table is repeated for each class that is associated with this policy (only the policy attributes that are configured are displayed). Term Definition Assign Queue Directs traffic stream to the specified QoS queue. This allows a traffic classifier to specify which one of the supported hardware queues are used for handling packets belonging to the class. Class Name The name of this class. Committed Burst The committed burst size, used in simple policing. Size (KB) Committed Rate (Kbps) The committed rate, used in simple policing, Conform Action The current setting for the action taken on a packet considered to conform to the policing parameters. This is not displayed if policing is not in use for the class under this policy. Conform COS The CoS mark value if the conform action is set-cos-transmit. Conform DSCP Value The DSCP mark value if the conform action is set-dscp-transmit. Conform IP Precedence Value The IP Precedence mark value if the conform action is set-prec-transmit. Drop Drop a packet upon arrival. This is useful for emulating access control list operation using DiffServ, especially when DiffServ and ACL cannot co-exist on the same interface. Mark CoS The Class of Service value that is set in the 802.1p header of inbound packets. This is not displayed if the mark cos was not specified. Mark IP DSCP The mark/re-mark value used as the DSCP for traffic matching this class. This is not displayed if mark ip description is not specified. Mark IP Precedence The mark/re-mark value used as the IP Precedence for traffic matching this class. This is not displayed if mark ip precedence is not specified. Mirror Copies a classified traffic stream to a specified egress port (physical port or LAG). This can occur in addition to any marking or policing action. It might also be specified along with a QoS queue assignment. Non-Conform Action The current setting for the action taken on a packet considered to not conform to the policing parameters. This is not displayed if policing not in use for the class under this policy. Non-Conform COS The CoS mark value if the non-conform action is set-cos-transmit. Non-Conform DSCP Value The DSCP mark value if the non-conform action is set-dscp-transmit. Non-Conform IP Precedence Value The IP Precedence mark value if the non-conform action is set-prec-transmit. Quality of Service Commands 290 M4100 Series ProSAFE Managed Switches Term Definition Policing Style The style of policing, if any, used (simple). Redirect Forces a classified traffic stream to a specified egress port (physical or LAG). This can occur in addition to any marking or policing action. It might also be specified along with a QoS queue assignment. If the policy name is not specified, this command displays a list of all defined DiffServ policies. The fields that are shown in the following table are displayed. Term Definition Policy Name The name of this policy. (The order in which the policies are displayed is not necessarily the same order in which they were created.) Policy Type The policy type (Only inbound is supported). Class Members List of all class names associated with this policy. show diffserv service This command displays policy service information for the specified interface and direction. The <slot/port> parameter specifies a valid slot/port number for the system. Format show diffserv service <slot/port> [in | out] Mode Privileged EXEC Term Definition DiffServ Admin Mode The current setting of the DiffServ administrative mode. An attached policy is only in effect on an interface while DiffServ is in an enabled mode. Interface Valid slot and port number separated by forward slashes. Direction The traffic direction of this interface service. Operational Status The current operational status of this DiffServ service interface. Policy Name The name of the policy attached to the interface in the indicated direction. Policy Details Attached policy details, whose content is identical to that described for the show policy-map <policymapname> command (content not repeated here for brevity). show diffserv service brief This command displays all interfaces in the system to which a DiffServ policy has been attached. The inbound direction parameter is optional. Format show diffserv service brief [in | out] Mode Privileged EXEC Quality of Service Commands 291 M4100 Series ProSAFE Managed Switches Term Definition DiffServ Admin Mode The current setting of the DiffServ administrative mode. An attached policy is only active on an interface while DiffServ is in an enabled mode. The information that is shown in the following table is repeated for each interface and direction (only those interfaces configured with an attached policy are shown). Term Definition Interface Valid slot and port number separated by forward slashes. Direction The traffic direction of this interface service. OperStatus The current operational status of this DiffServ service interface. Policy Name The name of the policy attached to the interface in the indicated direction. show policy-map interface This command displays policy-oriented statistics information for the specified interface and direction. The <slot/port> parameter specifies a valid interface for the system. Note: This command is only allowed while the DiffServ administrative mode is enabled. Format show policy-map interface <slot/port> [in | out] Mode Privileged EXEC Term Definition Interface Valid slot and port number separated by forward slashes. Direction The traffic direction of this interface service. Operational Status The current operational status of this DiffServ service interface. Policy Name The name of the policy attached to the interface in the indicated direction. The information that is shown in the following table is repeated for each class instance within this policy. Term Definition Class Name The name of this class instance. In Discarded Packets A count of the packets discarded for this class instance for any reason due to DiffServ treatment of the traffic class. Quality of Service Commands 292 M4100 Series ProSAFE Managed Switches show service-policy This command displays a summary of policy-oriented statistics information for all interfaces in the specified direction. Format show service-policy {in | out} Mode Privileged EXEC The information that is shown in the following table is repeated for each interface and direction (only those interfaces configured with an attached policy are shown). Term Definition Interface Valid slot and port number separated by forward slashes. Operational Status The current operational status of this DiffServ service interface. Policy Name The name of the policy attached to the interface. MAC Access Control List (ACL) Commands This section describes the commands you use to configure MAC ACL settings. MAC ACLs ensure that only authorized users have access to specific resources and block any unwarranted attempts to reach network resources. The following rules apply to MAC ACLs: • The maximum number of ACLs you can create is hardware-dependent. The limit applies to all ACLs, regardless of type. • The system supports only Ethernet II frame types. • The maximum number of rules per MAC ACL is hardware-dependent. mac access-list extended This command creates a MAC access control list (ACL) identified by <name>, consisting of classification fields defined for the Layer 2 header of an Ethernet frame. The <name> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the MAC access list. If a MAC ACL by this name exists, this command enters Mac-Access-List config mode to allow updating the existing MAC ACL. Note: The CLI mode changes to Mac-Access-List Config mode when you successfully execute this command. Quality of Service Commands 293 M4100 Series ProSAFE Managed Switches Format mac access-list extended <name> Mode Global Config no mac access-list extended This command deletes a MAC ACL identified by <name> from the system. Format no mac access-list extended <name> Mode Global Config mac access-list extended rename This command changes the name of a MAC access control list (ACL). The <name> parameter is the name of an existing MAC ACL. The <newname> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the MAC access list. This command fails if a MAC ACL by the name <newname> exists. Format mac access-list extended rename <name> <newname> Mode Global Config {deny | permit} (MAC ACL) This command creates a new rule for the current MAC access list. Each rule is appended to the list of configured rules for the list. Note: The no form of this command is not supported, since the rules within a MAC ACL cannot be deleted individually. Rather, the entire MAC ACL must be deleted and respecified. Note: An implicit deny all MAC rule always terminates the access list. A rule might either deny or permit traffic according to the specified classification fields. At a minimum, the source and destination MAC value must be specified, each of which might be substituted using the keyword any to indicate a match on any value in that field. The remaining command parameters are all optional, but the most frequently used parameters appear in the same relative order as shown in the command format. The Ethertype might be specified as either a keyword or a four-digit hexadecimal value from 0x0600-0xFFFF. The currently supported <ethertypekey> values are: appletalk, arp, Quality of Service Commands 294 M4100 Series ProSAFE Managed Switches ibmsna, ipv4, ipv6, ipx, mplsmcast, mplsucast, netbios, novell, pppoe, and rarp. Each of these translates into its equivalent Ethertype value or values. The time-range parameter allows imposing time limitation on the MAC ACL rule as defined by the parameter <time-range-name>. If a time range with the specified name does not exist and the MAC ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately. If a time range with a specified name exists and the MAC ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied when the time range with a specified name becomes active. The ACL rule is removed when the time range with a specified name becomes inactive. Ethertype Keyword Corresponding Value appletalk 0x809B arp 0x0806 ibmsna 0x80D5 ipv4 0x0800 ipv6 0x86DD ipx 0x8037 mplsmcast 0x8848 mplsucast 0x8847 netbios 0x8191 novell 0x8137, 0x8138 pppoe 0x8863, 0x8864 rarp 0x8035 The vlan and cos parameters refer to the VLAN identifier and 802.1p user priority fields, respectively, of the VLAN tag. For packets containing a double VLAN tag, this is the first (or outer) tag. The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule. The allowed <queue-id> value is 0-(n-1), where n is the number of user configurable queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule. Note: The special command form {deny | permit} any any is used to match all Ethernet layer 2 packets, and is the equivalent of the IP access list match every rule. Quality of Service Commands 295 M4100 Series ProSAFE Managed Switches Format {deny | permit} {<srcmac> | any} {<dstmac> | any} [<ethertypekey> | <0x0600-0xFFFF>] [vlan {eq <0-4095>}] [cos <0-7>] [[log] [time-range <time-range-name>] [assign-queue <queue-id>]] [{mirror | redirect} <slot/port>] Mode Mac-Access-List Config mac access-group This command either attaches a specific MAC access control list (ACL) identified by <name> to an interface, or associates it with a VLAN ID in a specific direction. The <name> parameter must be the name of an existing MAC ACL. An optional sequence number might be specified to indicate the order of this mac access list relative to other mac access lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number is already in use for this interface and direction, the specified mac access list replaces the currently attached mac access list using that sequence number. If the sequence number is not specified for this command, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction is used. This command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is applied to all interfaces. The VLAN keyword is only valid in the Global Config mode. The Interface Config mode command is available only on platforms that support independent per-port Class of Service queue configuration. Format mac access-group <name> {in | {vlan <vlan-id> in}} [sequence <1-4294967295>] Modes • • Global Config Interface Config no mac access-group This command removes a MAC ACL identified by <name> from the interface in a specific direction. Format no mac access-group <name> {in | {vlan <vlan-id> in}} Modes • • Global Config Interface Config Quality of Service Commands 296 M4100 Series ProSAFE Managed Switches show mac access-lists This command displays a MAC access list and all of the rules that are defined for the MAC ACL. Use the [<name>] parameter to identify a specific MAC ACL to display. Format show mac access-lists [<name>] Mode Privileged EXEC Term Definition Rule Number The ordered rule number identifier defined within the MAC ACL. Action The action associated with each rule. The possible values are Permit or Deny. Source MAC Address The source MAC address for this rule. Destination MAC The destination MAC address for this rule. Address Ethertype The Ethertype keyword or custom value for this rule. VLAN ID The VLAN identifier value or range for this rule. COS The COS (802.1p) value for this rule. Log Displays when you enable logging for the rule. Assign Queue The queue identifier to which packets matching this rule are assigned. Mirror Interface The slot/port to which packets matching this rule are copied. Redirect Interface The slot/port to which packets matching this rule are forwarded. Time Range name Displays the name of the time-range if the MAC ACL rule has referenced a time range. Rule Status Status (Active/Inactive) of the MAC ACL rule IP Access Control List (ACL) Commands This section describes the commands you use to configure IP ACL settings. IP ACLs ensure that only authorized users have access to specific resources and block any unwarranted attempts to reach network resources. The following rules apply to IP ACLs: • Managed switch software does not support IP ACL configuration for IP packet fragments. • The maximum number of ACLs you can create is hardware-dependent. The limit applies to all ACLs, regardless of type. • The maximum number of rules per IP ACL is hardware-dependent. Quality of Service Commands 297 M4100 Series ProSAFE Managed Switches • Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. access-list This command creates an IP access control list (ACL) that is identified by the access list number, which is 1-99 for standard ACLs or 100-199 for extended ACLs. IP Standard ACL: Format access-list <1-99> {deny | permit} {every | <srcip> <srcmask>} [log] [rate-limit <1-4294967295> <1-128>][assign-queue <queue-id>] [{mirror | redirect} <slot/port>] Mode Global Config IP Extended ACL: Format access-list <100-199> {deny | permit} {every | {{icmp | igmp | ip | tcp | udp | <number>} {<srcip> <srcmask>} [eq {<portkey> | <0-65535>}] {<dstip> <dstmask>} [eq {<portkey>| <0-65535>}] [precedence <precedence> | tos <tos> <tosmask> | dscp <dscp>]}} [log] [rate-limit <1-4294967295> <1-128>] [assign-queue <queue-id>] [{mirror | redirect} <slot/port>] Mode Global Config Parameter Description <1-99> or <100-199> Range 1–99 is the access list number for an IP standard ACL. Range 100–199 is the access list number for an IP extended ACL. {deny | permit} Specifies whether the IP ACL rule permits or denies an action. every Match every packet {icmp | igmp | ip | tcp | udp | <number>} Specifies the protocol to filter for an extended IP ACL rule. <number> can be a value from 0-255. <srcip> <srcmask> Specifies a source IP address and source netmask for match condition of the IP ACL rule. Quality of Service Commands 298 M4100 Series ProSAFE Managed Switches Parameter Description eq {<portkey> | <0-65535>} Note: This option is available only if the protocol is tcp or udp. When eq is specified, an IP ACL rule matches only if the Layer 4 port number is equal to the specified port number or port key. You can enter the port number, which ranges from 0-65535, or the port key, which can be one of the following keywords: For tcp protocol: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2, or pop3. For udp protocol: domain, echo, ntp, rip, snmp, tftp, time, or who. Each of these keywords translates into its equivalent port number. Note: Port number matches-only apply to unfragmented or first fragments. Note: You can specify a port key or port number for the source and a port key or port number for the destination. <dstip> <dstmask> Specifies a destination IP address and netmask for match condition of the IP ACL rule. [precedence <precedence> | tos <tos> [<tosmask>] | dscp <dscp>] Specifies the ToS for an IP ACL rule depending on a match of precedence or DSCP values using the parameters precedence <precedence>, tos <tos>, or dscp <dscp>. <tosmask> is an optional parameter. [log] Specifies that this rule is to be logged. [rate-limit <1-4294967295> <1-128>] You can specify a simple rate limiter for packets matching an ACL permit rule. You must specify the allowed rate of traffic in kbps (from 1-429496729) and burst size in kbytes (from 1-128). The conforming traffic is allowed to transmit and nonconforming traffic is dropped. This action is ignored for any deny rule, because, by definition, matching packets are dropped. [assign-queue <queue-id>] Specifies the assign-queue, which is the queue identifier to which packets matching this rule are assigned. [{mirror | redirect} <slot/port>] Specifies the mirror or redirect interface, which is the <slot/port> to which packets matching this rule are copied or forwarded, respectively. no access-list This command deletes an IP ACL that is identified by the parameter <accesslistnumber> from the system. The range for <accesslistnumber> 1-99 for standard access lists and 100-199 for extended access lists. Format no access-list <accesslistnumber> Mode Global Config Quality of Service Commands 299 M4100 Series ProSAFE Managed Switches ip access-list This command creates an extended IP access control list (ACL) identified by <name>, consisting of classification fields defined for the IP header of an IPv4 frame. The <name> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IP access list. If an IP ACL by this name exists, this command enters IPv4-Access List config mode to allow updating the existing IP ACL. Note: The CLI mode changes to IPv4-Access-List Config mode when you successfully execute this command. Format ip access-list <name> Mode Global Config no ip access-list This command deletes the IP ACL identified by <name> from the system. Format no ip access-list <name> Mode Global Config ip access-list rename This command changes the name of an IP access control list (ACL). The <name> parameter is the names of an existing IP ACL. The <newname> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IP access list. This command fails is an IP ACL by the name <newname> exists. Format ip access-list rename <name> <newname> Mode Global Config {deny | permit} (IP ACL) This command creates a new rule for the current IP access list. Each rule is appended to the list of configured rules for the list. Note: The no form of this command is not supported, since the rules within an IP ACL cannot be deleted individually. Rather, the entire IP ACL must be deleted and respecified. Quality of Service Commands 300 M4100 Series ProSAFE Managed Switches Note: An implicit deny all IP rule always terminates the access list. Note: The mirror parameter allows traffic matching this rule to be copied to the specified <slot/port>, while the redirect parameter allows traffic matching this rule to be forwarded to the specified <slot/port>. The assign-queue and redirect parameters are valid only for a permit rule. A rule might either deny or permit traffic according to the specified classification fields. At a minimum, either every keyword or the protocol, source address, and destination address values must be specified. The source and destination IP address fields might be specified using the keyword any to indicate a match on any value in that field. The remaining command parameters are all optional, but the most frequently used parameters appear in the same relative order as shown in the command format. The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule. The allowed <queue-id> value is 0-(n-1), where n is the number of user configurable queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule. The time-range parameter allows imposing time limitation on the IP ACL rule as defined by the parameter <time-range-name>. If a time range with the specified name does not exist and the IP ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately. If a time range with specified name exists and the IP ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied when the time range with specified name becomes active. The ACL rule is removed when the time range with specified name becomes inactive. You can specify a simple rate limiter for packets matching an ACL permit rule. You must specify the burst size in kbytes and allowed rate of traffic in kbps. The conforming traffic is allowed to transmit, and non-conforming traffic is dropped. This action is ignored for any deny rule, since by definition matching packets are dropped. Format {deny | permit} {every | {{icmp | igmp | ip | tcp | udp | <number>} {<srcip> <srcmask>} [eq {<portkey> | <0-65535>}] {<dstip> <dstmask>} [eq {<portkey>| <0-65535>}] [precedence <precedence> | tos <tos> <tosmask> | dscp <dscp>]}} [log] [rate-limit <1-4294967295> <1-128>] [timerange <time-range-name>] [assign-queue <queue-id>] [{mirror | redirect} [lag <lag-group-id> | <slot/port>]] Mode Ipv4-Access-List Config Quality of Service Commands 301 M4100 Series ProSAFE Managed Switches Parameter Description {deny | permit} Specifies whether the IP ACL rule permits or denies the matching traffic. every Match every packet. {icmp | igmp | ip | tcp | udp | <number>} Specifies the protocol to match for the IP ACL rule. <number> can be a value from 0-255. <srcip> <srcmask> Specifies a source IP address and source netmask to match for the IP ACL rule. Note: This option is available only if the protocol is tcp or udp. eq {<portkey> | <0-65535>} When eq is specified, an IP ACL rule matches only if the Layer 4 port number is equal to the specified port number or port key. You can enter the port number, which ranges from 0-65535, or the port key, which can be one of the following keywords: For tcp protocol: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2, or pop3. For udp protocol: domain, echo, ntp, rip, snmp, tftp, time, or who. Each of these keywords translates into its equivalent port number. Note: Port number matches-only apply to unfragmented or first fragments. Note: You can specify a port key or port number for the source and a port key or port number for the destination. Specifies a destination IP address and netmask for match condition of the IP ACL rule. <dstip> <dstmask> [precedence <precedence> | tos Specifies the ToS for an IP ACL rule depending on a match of <tos> [<tosmask>] | dscp <dscp>] precedence or DSCP values using the parameters precedence <precedence>, tos <tos>, or dscp <dscp>. <tosmask> is an optional parameter. log Specifies that this rule is to be logged. [rate-limit <1-4294967295> <1-128>] Specifies the allowed rate of traffic as per the configured rate in kbps (from 1-4294967295) and burst-size in kbytes (from 1-128). time-range <time-range-name> Allows imposing a time limitation on the ACL rule as defined by the parameter <time-range-name.> If a time range with the specified name does not exist and the ACL containing this ACL rule is applied to an interface or bound to a VLAN, the ACL rule is applied immediately. If a time range with specified name exists and the ACL containing this ACL rule is applied to an interface or bound to a VLAN, the ACL rule is applied when the time-range with specified name becomes active. The ACL rule is removed when the time-range with specified name becomes inactive. Quality of Service Commands 302 M4100 Series ProSAFE Managed Switches Parameter Description assign-queue <queue-id> Specifies the assign-queue, which is the queue identifier to which packets matching this rule are assigned. [{mirror | redirect} [lag <lag-group-id> | <slot/port>] Specifies the mirror or redirect interface which is the <lag-group-id> or <slot/port> to which packets matching this rule are copied or forwarded, respectively. ip access-group This command either attaches a specific IP ACL identified by <accesslistnumber> to an interface or associates with a VLAN ID in a specific direction. The parameter <name> is the name of the access control list. An optional sequence number might be specified to indicate the order of this IP access list relative to other IP access lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number is already in use for this interface and direction, the specified access list replaces the currently attached IP access list using that sequence number. If the sequence number is not specified for this command, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction is used. Default none Format ip access-group {<accesslistnumber> | <name>} {in | {vlan <vlan-id> in}} [sequence <1-4294967295>] Modes • • Interface Config Global Config no ip access-group This command removes a specified IP ACL from an interface. Default none Format no ip access-group {<accesslistnumber> | <name>} {in | {vlan <vlan-id> in}} Mode • • Interface Config Global Config acl-trapflags This command enables the ACL trap mode. Default disabled Format acl-trapflags Mode Global Config Quality of Service Commands 303 M4100 Series ProSAFE Managed Switches no acl-trapflags This command disables the ACL trap mode. Format no acl-trapflags Mode Global Config show ip access-lists This command displays an IP ACL <accesslistnumber> is the number used to identify the IP ACL. Format show ip access-lists <accesslistnumber> Mode Privileged EXEC Note: Only the access list fields that you configure are displayed. Term Definition Rule Number The number identifier for each rule that is defined for the IP ACL. Action The action associated with each rule. The possible values are Permit or Deny. Match All Indicates whether this access list applies to every packet. Possible values are True or False. Protocol The protocol to filter for this rule. Source IP Address The source IP address for this rule. Source IP Mask The source IP Mask for this rule. Source L4 Port Keyword The source port for this rule. Destination IP Address The destination IP address for this rule. Destination IP Mask The destination IP Mask for this rule. Destination L4 Port Keyword The destination port for this rule. IP DSCP The value specified for IP DSCP. IP Precedence The value specified IP Precedence. IP TOS The value specified for IP TOS. Quality of Service Commands 304 M4100 Series ProSAFE Managed Switches Term Definition Log Displays when you enable logging for the rule. Assign Queue The queue identifier to which packets matching this rule are assigned. Mirror Interface The slot/port to which packets matching this rule are copied. Redirect Interface The slot/port to which packets matching this rule are forwarded. Time Range Name Displays the name of the time-range if the ACL rule has referenced a time range. Rule Status Status (Active/Inactive) of the ACL rule. show access-lists This command displays IP ACLs, IPv6 ACLs, and MAC access control lists information for a designated interface and direction. Format show access-lists interface <slot/port> [in | out] Mode Privileged EXEC Term Definition ACL Type Type of access list (IP, IPv6, or MAC). ACL ID Access List name for a MAC or IPv6 access list or the numeric identifier for an IP access list. Sequence Number An optional sequence number might be specified to indicate the order of this access list relative to other access lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number is already in use for this interface and direction, the specified access list replaces the currently attached access list using that sequence number. If the sequence number is not specified by the user, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction is used. Valid range is (1–4,294,967,295). IPv6 Access Control List (ACL) Commands This section describes the commands you use to configure IPv6 ACL settings. IPv6 ACLs ensure that only authorized users have access to specific resources and block any unwarranted attempts to reach network resources. The following rules apply to IPv6 ACLs: • The maximum number of ACLs you create is 100, regardless of type. • The system supports only Ethernet II frame types. • The maximum number of rules per IPv6 ACL is hardware-dependent. Quality of Service Commands 305 M4100 Series ProSAFE Managed Switches ipv6 access-list This command creates an IPv6 access control list (ACL) identified by <name>, consisting of classification fields defined for the IP header of an IPv6 frame. The <name> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IPv6 access list. If an IPv6 ACL by this name exists, this command enters IPv6-Access-List config mode to allow updating the existing IPv6 ACL. Note: The CLI mode changes to IPv6-Access-List Config mode when you successfully execute this command. Format ipv6 access-list <name> Mode Global Config no ipv6 access-list This command deletes the IPv6 ACL identified by <name> from the system. Format no ipv6 access-list <name> Mode Global Config ipv6 access-list rename This command changes the name of an IPv6 ACL. The <name> parameter is the name of an existing IPv6 ACL. The <newname> parameter is a case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying the IPv6 access list. This command fails is an IPv6 ACL by the name <newname> already exists. Format ipv6 access-list rename <name> <newname> Mode Global Config {deny | permit} (IPv6) This command creates a new rule for the current IPv6 access list. Each rule is appended to the list of configured rules for the list. Note: The no form of this command is not supported because the rules within an IPv6 ACL cannot be deleted individually. Rather, the entire IPv6 ACL must be deleted and respecified. Quality of Service Commands 306 M4100 Series ProSAFE Managed Switches Note: An implicit deny all IPv6 rule always terminates the access list. A rule might either deny or permit traffic according to the specified classification fields. At a minimum, either the every keyword or the protocol, source address, and destination address values must be specified. The source and destination IPv6 address fields might be specified using the any keyword to indicate a match on any value in that field. The remaining command parameters are all optional, but the most frequently used parameters appear in the same relative order as shown in the command format. The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule. The allowed <queue-id> value is 0-(n-1), where n is the number of user configurable queues available for the hardware platform. The assign-queue parameter is valid only for a permit rule. The mirror parameter allows the traffic matching this rule to be copied to the specified <slot/port>, while the redirect parameter allows the traffic matching this rule to be forwarded to the specified <slot/port>. The assign-queue and redirect parameters are only valid for a permit rule. The time-range parameter allows imposing time limitation on the IPv6 ACL rule as defined by the parameter <time-range-name>. If a time range with the specified name does not exist and the IPv6 ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied immediately. If a time range with specified name exists and the IPv6 ACL containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied when the time-range with specified name becomes active. The ACL rule is removed when the time-range with specified name becomes inactive. Format {deny | permit} {every | {icmp | igmp | ipv6 | tcp | udp | <number>}} [log] [timerange <time-range-name>] [assign-queue <queue-id>] [{mirror | redirect} <slot/port>] Mode IPv6-Access-List Config ipv6 traffic-filter This command either attaches a specific IPv6 ACL identified by <name> to an interface or associates with a VLAN ID in a specific direction. The <name> parameter must be the name of an existing IPv6 ACL. An optional sequence number might be specified to indicate the order of this mac access list relative to other IPv6 access lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number is already in use for this interface and direction, the specifiedIPv6 access list replaces the currently attached IPv6 access list using that sequence number. If the sequence number is not specified for this command, a sequence number that is one greater than the highest sequence number currently in use for this interface and direction is used. This command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is applied to all interfaces. The vlan keyword is valid only in the Quality of Service Commands 307 M4100 Series ProSAFE Managed Switches Global Config mode. The Interface Config mode command is only available on platforms that support independent per-port Class of Service queue configuration. Format ipv6 traffic-filter <name> {in | {vlan <vlan-id> in}} [sequence <1-4294967295>] Modes • • Global Config Interface Config no ipv6 traffic-filter This command removes an IPv6 ACL identified by <name> from the interface or interfaces in a specific direction. Format no ipv6 traffic-filter <name> {in | {vlan <vlan-id> in}} Modes • • Global Config Interface Config show ipv6 access-lists This command displays an IPv6 access list and all of the rules that are defined for the IPv6 ACL. Use the [<name>] parameter to identify a specific IPv6 ACL to display. Format show ipv6 access-lists [<name>] Mode Privileged EXEC Term Definition Rule Number The ordered rule number identifier defined within the IPv6 ACL. Action The action associated with each rule. The possible values are Permit or Deny. Match All Indicates whether this access list applies to every packet. Possible values are True or False. Protocol The protocol to filter for this rule. Source IP Address The source IP address for this rule. Source L4 Port Keyword The source port for this rule. Destination IP Address The destination IP address for this rule. Destination L4 Port Keyword The destination port for this rule. IP DSCP The value specified for IP DSCP. Flow Label The value specified for IPv6 Flow Label. Quality of Service Commands 308 M4100 Series ProSAFE Managed Switches Term Definition Log Displays when you enable logging for the rule. Assign Queue The queue identifier to which packets matching this rule are assigned. Mirror Interface The slot/port to which packets matching this rule are copied. Redirect Interface The slot/port to which packets matching this rule are forwarded. Time Range Name Displays the name of the time-range if the IPv6 ACL rule has referenced a time range. Rule Status Status (Active/Inactive) of the IPv6 ACL rule. Time Range Commands for Time-Based ACLs Time-based ACLs allow one or more rules within an ACL to be based on time. Each ACL rule within an ACL, except for the implicit deny all rule, can be configured to be active and operational only during a specific time period. The time range commands allow you to define specific times of the day and week to implement time-based ACLs. The time range is identified by a name and can then be referenced by an ACL rule defined with in an ACL. time-range Use this command to create a time range identified by <name>, consisting of one absolute time entry and/or one or more periodic time entries. The <name> parameter is a case-sensitive, alphanumeric string from 1 to 31 characters that uniquely identifies the time range. An alpha-numeric string is defined as consisting of only alphabetic, numeric, dash, underscore, or space characters. If a time range by this name exists, this command enters Time-Range config mode to allow updating the time range entries Note: When you successfully execute this command, the CLI mode changes to Time-Range Config mode. Format time-range <name> Mode Global Config no time-range Use this command to delete a time-range identified by <name>. Format no time-range <name> Mode Global Config Quality of Service Commands 309 M4100 Series ProSAFE Managed Switches absolute Use this command to add an absolute time entry to a time range. Only one absolute time entry is allowed per time-range. The <time> parameters are based on the currently configured time zone. The [start <time> <date>] parameters indicate the time and date at which the configuration that referenced the time range starts going into effect. The time is expressed in a 24-hour clock, in the form of hours:minutes. For example, 8:00 is 8:00 am and 20:00 is 8:00 pm. The date is expressed in the format day month year. If no start time and date are specified, the configuration statement is in effect immediately. The [end <time> <date>] parameters indicate the time and date at which the configuration that referenced the time range is no longer in effect. The end time and date must be after the start time and date. If no end time and date are specified, the configuration statement is in effect indefinitely. Format absolute {[start <time> <date>] [end <time> <date>]} Mode Time-Range Config no absolute Use this command to delete the absolute time entry in the time range. Format no absolute Mode Time-Range Config periodic Use this command to add a periodic time entry to a time range. The <time> parameters are based off the currently configured time zone. The first occurrence of the <days-of-the-week> argument is the starting day(s) from which the configuration that referenced the time range starts going into effect. The second occurrence is the ending day or days from which the configuration that referenced the time range is no longer in effect. If the end days-of-the-week are the same as the start, they can be omitted This argument can be any single day or combinations of days: Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday. Other possible values are: • daily—Monday through Sunday • weekdays—Monday through Friday • weekend—Saturday and Sunday If the ending days of the week are the same as the starting days of the week, they can be omitted. The first occurrence of the <time> argument is the starting hours:minutes which the configuration that referenced the time range starts going into effect. The second occurrence is the ending hours:minutes at which the configuration that referenced the time range is no longer in effect. The hours:minutes are expressed in a 24-hour clock. For example, 8:00 is 8:00 am and 20:00 is 8:00 pm The frequency is how often this periodic entry will become active. If the value is set to 0, the timer schedule will be treated as absolute. Quality of Service Commands 310 M4100 Series ProSAFE Managed Switches Format periodic <frequency> {<days-of-the-week> <time>} to {[<days-of-the-week>] <time>} Mode Time-Range Config no periodic Use this command to delete a periodic time entry from a time range. Format no periodic <frequency> {<days-of-the-week> <time>} to {[<days-of-the-week>] <time>} Mode Time-Range Config periodic time Use this command to configure the start or end time for the time range. Format periodic {start | end} time Mode Time-Range Config show time-range Use this command to display a time range and all the absolute/periodic time entries that are defined for the time range. Use the [<name>] parameter to identify a specific time range to display. When [<name>] is not specified, all the time ranges defined in the system are displayed. Format show time-range [<name>] Mode Privileged EXEC Term Definition Number of Time Ranges Number of time ranges configured in the system. Time Range Name Name of the time range. Time Range Status Status of the time range (active/inactive). Absolute start Start time and day for absolute time entry. Absolute end End time and day for absolute time entry. Periodic Entries Number of periodic entries in a time-range. Periodic start Start time and day for periodic entry. Periodic end End time and day for periodic entry. Quality of Service Commands 311 M4100 Series ProSAFE Managed Switches AutoVoIP Commands AutoVoIP detects the VoIP streams and put the VoIP streams in the specific VLAN (auto-voip VLAN) and provides higher Class of Service to the VoIP streams automatically (both data and signaling). It detects the VoIP streams in two modes. • Protocol-based Auto VoIP. In a VoIP system, various signaling protocols are used to establish the connection between two VoIP devices. The supported signaling protocols are SIP, H.323, and SCCP. • OUI-based Auto VoIP. The OUI-based Auto VoIP feature prioritizes VoIP packets based on the OUI bytes in the source MAC address. A default list of OUIs is maintained. User is also allowed to configure OUIs that need prioritization apart from the default OUI list. Up to 128 OUIs are allowed on the device or system, including the default OUIs. Note: If voice VLAN and Auto-VoIP are enabled at the same time, one of them is operational. If the connected phone is LLDP-MED capable, voice VLAN has precedence over the Auto VoIP and Auto VoIP is operational if the phone does not support LLDP-MED. auto-voip This command is used to configure auto VoIP mode. The supported modes are protocol-based and OUI-based. Protocol-based auto VoIP prioritizes the voice data based on the layer 4 port used for the voice session. OUI-based auto VOIP prioritizes the phone traffic based on the known OUI of the phone. Default oui-based Format auto-voip {protocol-based | oui-based} Mode • • Global Config Interface Config no auto-voip {protocol-based | oui-based} This command is used to set default mode. Format no auto-voip {protocol-based | oui-based} Mode • • Global Config Interface Config Quality of Service Commands 312 M4100 Series ProSAFE Managed Switches auto-voip oui This command is used to configure an OUI for Auto VoIP. The traffic from the configured OUI will get the highest priority over the other traffic. Default A list of known OUIs is present Format auto-voip oui <oui-prefix> oui-desc <string> Mode Global Config no auto-voip oui This command is to delete already configured OUI. Format no auto-voip oui <oui-prefix> Mode Global Config auto-voip vlan This command is used to configure the global auto VoIP VLAN ID. The VLAN behavior depends on the configured auto VoIP mode. Default None Format auto-voip vlan <vlan-id> Mode Global Config no auto-voip vlan This command is used to remove the configured auto VoIP mode. Format no auto-voip vlan Mode Global Config auto-voip oui-based priority This command is used to configure the global OUI based auto VoIP priority. If the phone OUI is matches one of the configured OUI, the priority of traffic from the phone is changed to OUI priority configured through this command. Default Highest available priority Format auto-voip oui-based priority <priority-value> Mode Global Config Quality of Service Commands 313 M4100 Series ProSAFE Managed Switches no auto-voip oui-based priority This command is used to set the priority to the default value. Format no auto-voip oui-based priority <priority-value> Mode Global Config auto-voip protocol-based This command is used to configure the global protocol based auto-VoIP remarking priority/traffic-class. If the remark priority is configured, the voice data of the session is remarked with the priority configured through this command. Note: You must enable tagging on auto-VoIP-enabled ports to remark the voice data when it is egressed. Default Traffic-class 7 Format auto-voip protocol-based {remark <remark-priority> | traffic-class <tc>} Mode • • Global Config Interface Config no auto-voip protocol-based {remark | traffic-class} This command is used to set the traffic-class to the default value. Format no auto-voip protocol-based {remark <remark-priority> | traffic-class <tc>} Mode • • Global Config Interface Config show auto-voip Use this command to display the auto VoIP settings on the interface or interfaces of the switch. Format show auto-voip {protocol-based | oui-based} interface {<slot/port> | all} Mode Privileged EXEC Field Description VoIP The global VoIP VLAN ID. Prioritize Type The type of prioritization used on voice traffic. Quality of Service Commands 314 M4100 Series ProSAFE Managed Switches Field Description Class Value • • Priority The 802.1p priority. This field is valid for OUI auto VoIP. AutoVoIPMode The Auto VoIP mode on the interface. If the Prioritization Type is configured as traffic-class, this value is the queue value. If the Prioritization Type is configured as remark, this value is 802.1p priority used to remark the voice traffic. Command example: (NETGEAR Switch)# show auto-voip protocol-based interface all VoIP VLAN Id................................... 2 Prioritization Type............................ traffic-class Class Value.................................... 7 Interface Auto VoIP Operational Status Mode --------- ------------------------------0/1 Disabled Down 0/2 Disabled Down 0/3 Disabled Down 0/4 Disabled Down Command example: (Netgear Switch)# show auto-voip oui-based interface all VoIP VLAN Id................................... 2 Priority....................................... 7 Interface Auto VoIP Operational Status Mode --------- ------------------------------0/1 Disabled Down 0/2 Disabled Down 0/3 Disabled Down 0/4 Disabled Down 0/5 Disabled Down Quality of Service Commands 315 M4100 Series ProSAFE Managed Switches show auto-voip oui-table This command lists all of the configured OUIs. Format show auto-voip oui-table Mode • • Privileged EXEC User EXEC Term Definition OUI OUI of the source MAC address Status Default or Configured entry. OUI Description Description of the OUI Command example: (Netgear Switch)# show auto-voip oui-table OUI Status Description -------------------------00:01:E3 Default SIEMENS 00:03:6B Default CISCO1 00:01:01 Configured VoIP phone Quality of Service Commands 316 6. Power over Ethernet Commands This chapter contains the following sections: • About PoE • PoE Commands 317 6 M4100 Series ProSAFE Managed Switches About PoE Power over Ethernet (PoE) describes a technology to pass electrical power safely along with data on existing Ethernet cabling. The PSE or power supply equipment is the device or switch that delivers electrical power, and the PD or powered device is the end device that powers up through the power delivered along the Ethernet cable. This technology is governed by two standards: • IEEE 802.3af-2003. This is the original standard, also known as the low-power standard, which mandates delivery of up to 15.4 watts by the PSE. Because of power dissipation, only 12.95 watts are assured to be available at the powered device (PD). The PD needs to be designed so that it can accept power over Ethernet cabling. Category 3 cables can be used to deliver power to the PD. However, with the advent of 802.11n, the newer wireless APs required more power. To account for this, a newer standard was developed in 2009, known as 802.3at. • IEEE 802.3at-2009. This is the newer standard, also known as PoE+. This is also known as the high-power standard, which mandates delivery of up to 34.2 watts by the PSE. Because of power dissipation, PoE+ provides only a maximum of 25.5 watts at the powered device. Some PSEs can provide up to 51 watts. Before this standard became available in 2009, the industry started using different implementations to allow for more power. All these needed to be brought under the purview of the newer 802.3at standard. PoE Commands poe Use this command to enable the Power over Ethernet (PoE) functionality on a global basis or per interface. Default enabled Format poe Mode • • Global Config Interface Config no poe Use this command to disable the Power over Ethernet (PoE) functionality on a global basis or per interface. Format no poe Mode • • Global Config Interface Config Power over Ethernet Commands 318 M4100 Series ProSAFE Managed Switches poe detection Use this command to configure the detection type on a global basis or per interface. It is used to configure which types of PDs will be detected and powered by the switch. There are three options: • ieee. Detect resistive-type devices (IEEE standard) • pre-ieee. Legacy capacitive detection only (nonstandard) • auto. Perform resistive detection first (IEEE standard) and capacitive detection (pre-IEEE standard) Default auto Format poe detection {ieee | pre-ieee | auto} Mode • • Global Config Interface Config no poe detection Use this command to set the detection mode to the default on a global basis or per interface. Format no poe detection Mode • • Global Config Interface Config poe high-power Use this command to switch a port from 802.3af mode to high-power mode. This mode is used to power up devices that require more power than the current IEEE 802.3af power (more than 12.95 watts at the PD). There are three options: • legacy. Use this mode if the device can power up (more than 12.95 watts) with higher current and it cannot identify itself as a Class 4 device. • pre-dot3at. Use this mode if the device cannot identify itself as a Class 4 device and it does not have LLDP support. • dot3at. Use this mode if the device is a Class 4 device capable of figuring out power requirements through 2-event classification or LLDP. Default dot3at Format poe high-power {legacy | pre-dot3at | dot3at} Mode Interface Config Power over Ethernet Commands 319 M4100 Series ProSAFE Managed Switches no poe high-power Use this command to disable the high-power mode. The port will support only IEEE 902.3af devices. This command works on a global basis or per interface. Format no poe high-power Mode Interface Config poe power limit Use this command to configure the type of power limit for a port. If the power limit type is user-defined, the command also allows you to configure a maximum power limit. There are three options: • class-based. Allows the port to draw up to the maximum power based on the classification of the device connected. • none. Allows the port to draw up to Class 0 maximum power if it is in low-power mode and up to Class 4 maximum power if it is in high-power mode. • user-defined. Allows you to define the maximum power to the port. This can be a value from 3 through 32 watts. Default User-defined, with a maximum of 30 watts Format poe power limit {class-based | none | user-defined [<3000-32000>]} Mode • • Global Config Interface Config no poe power limit Use this command to set the power limit type to the default. It also sets the maximum power limit to the default if the power limit type is user-defined. Format no poe power limit [user-defined] Mode • • Global Config Interface Config poe power management Use this command to configure the power management mode based on each individual PoE unit or on all PoE units. Both the power management modes mentioned here will power up a device based on first come, first served. When the available power is less than the power limit defined on a port, no more power will be delivered. Power over Ethernet Commands 320 M4100 Series ProSAFE Managed Switches Static and dynamic modes differ in how the available power is calculated, as follows: • Static Power Management Available power = power limit of the source - total allocated power where total allocated power is calculated as the power limit configured on the port. • Dynamic Power Management Available power = power limit of the source - total allocated power, where total allocated power is calculated as the amount of power consumed by the port. For example, assume that the power limit of the source is 300 watts. One port is powered up and is drawing 3 watts of power. The power limit defined on the port is user-defined as 15 watts. In this case, the available power for static and dynamic would be as follows: • Static Power Management Available power = 300 watts - 15 watts = 285 watts • Dynamic Power Management Available power = 300 watts - 3 watts = 297 watts Default dynamic Format poe power management {<unit> | all} {dynamic | static} Mode Global Config no poe power management Use this command to set the power management mode to the default. Format no poe power management {<unit> | all} Mode Global Config poe priority Use this command to configure the priority on a specific port. This is used for power management purposes. The switch might not be able to supply power to all connected devices, so the port priority is used to determine which ports will supply power if adequate power capacity is not available for all enabled ports. For ports that have the same priority level, the lower numbered port will have higher priority. There are three options: • crit. Critical priority • high. High priority • low. Low priority Power over Ethernet Commands 321 M4100 Series ProSAFE Managed Switches Default low Format poe priority {crit | high | low} Mode • • Global Config Interface Config no poe priority Use this command to set the priority to the default. Format no poe priority Mode • • Global Config Interface Config poe reset Use this command to reset the PoE state of every port (in global mode) or a specific port (in interface mode). When the PoE port status is shown to be in an error state, this command can be used to reset the PoE port. The command can also reset the power-delivering ports. Note that this command takes effect only once after it is executed and cannot be saved across power cycles. Format poe reset Mode • • Global Config Interface Config poe timer schedule name Use this command to allow you to attach a timer schedule to a PoE port. You can define a time schedule using the existing time range commands. This schedule has start and stop times. When this timer schedule is applied to a PoE-enabled port, the capability of the port to deliver power is affected. At the scheduled start time, the PoE port is disabled such that it cannot deliver any power. At the scheduled stop time, the PoE port is reenabled so that it can deliver power. Note: For information about creating a timer schedule, see Time Range Commands for Time-Based ACLs on page 309. Format poe timer schedule <name> Mode Interface Config Power over Ethernet Commands 322 M4100 Series ProSAFE Managed Switches no poe timer schedule name Use this command to detach the schedule from the port. Format no poe timer schedule Mode Interface Config poe usagethreshold Use this command to set a threshold (as a percentage) for the total amount of power that can be delivered by the switch. For example, if the switch can deliver up to a maximum of 300 watts, a usage threshold of 90 percent ensures that only 270 watts are used for delivering power to devices. This ensures that more power is not drawn than the switch can provide. When the usage threshold is set, all the PDs are brought down and then brought back up. If the consumed power is less than the threshold power (in the preceding case, 270 watts), then the devices continue to power up. If the consumed power is 269 watts or less, the next device is powered up. The moment consumed power exceeds the threshold power (270 watts), no other devices can power up. This command allows you to set the usage threshold based on each individual PoE unit or all PoE units. Default 90 Format poe usagethreshold {<unit> | all} <1-99> Mode Global Config no poe usagethreshold Use this command to set the usage threshold to a default value. Format no poe usagethreshold {<unit> | all} Mode Global Config poe traps Use this command to enable logging of specific PoE-related events, such as a PoE port powering a device, the threshold being exceeded, and so on. Default Enable Format poe traps Mode Global Config Power over Ethernet Commands 323 M4100 Series ProSAFE Managed Switches no poe traps Use this command to disable logging the PoE traps. Format no poe traps Mode Global Config show poe Use this command to get global information regarding the PoE status. Format show poe Mode • • Privileged EXEC User EXEC Term Definition Firmware Version The firmware version of the PoE controller on the switch. PSE Main Operational Status Indicates the status of the PoE controller: • ON—Indicates that the PoE controller is actively delivering power. • OFF—Indicates that the PoE controller is not delivering power. • FAULTY—Indicates that the PoE controller is not functioning. Total Power (Main AC) Indicates the maximum amount of power that can be delivered by this PoE unit when on system power. Total Power (RPS) Indicates the maximum amount of power that can be delivered by this PoE unit when on RPS. Total Power (PD) Indicates the maximum amount of power that can be delivered by this PoE unit when on the PD source. This field is applicable only for the GSM5212P. Power Source Indicates the power source being used: main AC, RPS, or PD. If PD is used as a source, “PD <portNo>” is displayed. Threshold Power System can power up one port, if consumed power is less than this power. That is, the consumed power can be between the total power and threshold power values. The threshold power value is effected by changing the system usage threshold. Total Power Consumed Indicates the total amount of power being delivered to all the devices plugged into the switch. Usage Threshold Indicates the usage threshold level. Power Indicates the management mode used by the PoE controller. Management Mode Auto Reset Mode Indicates whether the PoE ports will be automatically reset in case of an error on a port. Traps Configures the traps. Power over Ethernet Commands 324 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show poe Firmware Version............................... PSE Main Operational Status.................... Total Power (Main AC).......................... Total Power (RPS).............................. Total Power (PD) .............................. Power Source................................... Threshold Power................................ Total Power Consumed........................... Usage Threshold................................ Power Management Mode.......................... Configure port Auto Reset Mode................. Traps.......................................... 1.0.0.2 ON 380 300 25 Main AC 342 7 90 Dynamic Disable Enable show poe port configuration Use this command to see how the PoE ports are configured. You can display information based on each individual port or all the ports collectively. Format show poe port configuration [<port> | all] Mode • • Privileged EXEC User EXEC Command example: (NETGEAR Switch) #show poe port configuration all Admin Mode Power Intf Priority Limit (W) ------ ------- -------- -----0/1 Enable Low 15.400 0/2 Enable Low 15.400 Power Limit Type High Power Mode Detection Type -------------- ------------- --------------------User Defined Disable Auto User Defined Disable Auto Command example: (NETGEAR Switch) #show poe port configuration 0/2 Power Limit (W) ------ ------- -------- -----0/2 Enable Low 15.400 Intf Admin Mode Priority Power Limit Type High Power Mode Detection Type -------------- ------------- --------------------User Defined Disable Auto Power over Ethernet Commands 325 M4100 Series ProSAFE Managed Switches show poe port info Use this command to get information about the status of the PoE ports. You can display information based on each individual port or all the ports collectively. The command displays only PSE-capable ports. Format show poe port info [<port> | all] Mode • • Term Definition Intf Interface on which PoE is configured. Class Class of the powered device according to the IEEE802.3af and IEEE802.3at definition. • Class Usage Max Power (watts) • 0 Default 0.44-12.95 • 1 Optional 0.44-3.84 • 2 Optional 3.84-6.49 • 3 Optional 6.49-12.95 • 4 Optional 12.95-25.5 Power The power supplied to the powered device (in watts). Privileged EXEC User EXEC Output Current The current supplied to the powered device (in mA). (mA) Output Voltage The voltage supplied to the powered device (in volts). (volts) Status The Status field reports the state of power supplied to the port. The possible values are: • Disabled—The PoE function is disabled on this port. • Searching—The port is detecting the PoE device. • Delivering Power—The port is providing power to the PoE device. • Fault—The POE device is not IEEE compliant; no power is provided. • Test—The port is in testing state. • Other Fault—The port has experienced problems other than compliance issues. When a port begins to deliver power, there is a trap indicating so. When a port stops delivering power, there is a trap indicating so. Command example: (NETGEAR Switch) #show poe port info all Intf High Power ------ ------0/1 Yes Max Output Power Class Power Current (W) (W) (mA) ----- ------- ------ ------32.0 Unknown 00.000 0 Output Voltage (volt) ------00.00 Power over Ethernet Commands 326 Status Fault Status ------------------ ---------Searching No Error M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show poe port info 0/33 High Power Intf Max Power (W) ----18.0 ------ ------0/33 No Output Power Current (W) (mA) ------- ------ ------2 04.400 84 Class Output Voltage (volt) ------53.3 Status -----------------Delivering Power Fault Status -------No Error show poe pd Note: This command is supported on the M4100-D12G-POE+ (GSM5212P) only. Use this command to get information about the PD ports. You can display information based on each individual port or all the PD ports collectively. Format show poe pd [<port> | all] Mode • • Privileged EXEC User EXEC Term Definition Intf Show the PD device interface number, only 0/1 or 0/2 on the GSM5212P. In other devices, the table is empty. If <port-id> is not specified, all PD ports are displayed. Mode Displays the port POE role and is always PD. Class Displays the POE class. Detection Mode PD detection mode when getting power from the PSE: • 1-event—PSE detects the PD in 1-event mode (802.1f) • 2-event—PSE detects the PD in 2-event mode (802.1at) • LLDP—PSE detects the PD in LLDP mode (802.1at) Status Shows whether the port 0/1 or 0/2 is providing power: • Powered—Receiving power from PSE • Off—No power from the PSE (when main AC is in used) Command example: (NETGEAR Switch) #show poe pd all Intf ---0/1 0/2 Mode ----PD PD Class --------class 4 class 4 Detection Mode ---------------2-event LLDP Power over Ethernet Commands 327 Status ---------powered powered 7. 7 Utility Commands This chapter describes the utility commands available in the CLI. The chapter contains the following sections: • Auto Install Commands • Dual Image Commands • System Information and Statistics Commands • Logging Commands • Email Alerting and Mail Server Commands • System Utility and Clear Commands • Simple Network Time Protocol (SNTP) Commands • DHCP Server Commands • DNS Client Commands • Packet Capture Commands • Serviceability Packet Tracing Commands • Cable Test Command • sFlow Commands • IP Address Conflict Commands • RMON Stats and History Commands • UniDirectional Link Detection Commands • USB Commands The commands in this chapter are in four functional groups: • Show commands display switch settings, statistics, and other information. • Configuration commands configure features and options of the switch. Every switch command has a show command that displays the configuration setting. • Copy commands transfer or save configuration and informational files to and from the switch. • Clear commands clear some or all of the settings to factory defaults. 328 M4100 Series ProSAFE Managed Switches Auto Install Commands This section describes the Auto Install Commands. Auto Install is a software feature which provides for the configuration of a switch automatically when the device is initialized and no configuration file is found on the switch. The Auto Install process requires DHCP to be enabled by default in order for it to be completed. The downloaded config file is not automatically saved to the startup-config. An administrator must explicitly issue a save request in order to save the configuration. The Auto Install process depends upon the configuration of other devices in the network, including a DHCP or BOOTP server, a TFTP server and, if necessary, a DNS server. There are three steps to Auto Install: 1. Configuration or assignment of an IP address for the device. 2. Assignment of a TFTP server. 3. Obtain a configuration file for the device from the TFTP server. show autoinstall This command displays the status of the Auto Config process. Format show autoinstall Mode Privileged EXEC Term Definition AutoInstall Mode The administrator mode is enabled or disabled. AutoSave Modet If this option is enabled, the downloaded config file will be saved. Otherwise, you must explicitly issue a copy running-config startup-config command in order to save the configuration. AutoInstall Retry Count the number of attempts to download a configuration. AutoInstall State The status of the AutoInstall. Command example: Example (NETGEAR Switch) #show autoinstall AutoInstall Mode............................... AutoSave Mode.................................. AutoInstall Persistant Mode.................... AutoInstall Retry Count........................ AutoInstall State.............................. Stopped Disabled Enabled 3 Waiting for boot options Utility Commands 329 M4100 Series ProSAFE Managed Switches boot host auto-save This command is used to enable automatically saving the downloaded configuration on the switch. Default Disabled Format boot host auto-save Mode Privileged EXEC no boot host auto-save This command is used to disable automatically saving the downloaded configuration on the switch. Format no boot host auto-save Mode Privileged EXEC boot autoinstall start The command is used to start Auto Install on the switch. Auto Install tries to download a config file from a TFTP server. Format boot autoinstall start Mode Privileged EXEC boot autoinstall stop The command is used to A user might terminate the Auto Install process at any time prior to the downloading of the config file. This is most optimally done when the switch is disconnected from the network, or if the requisite configuration files have not been configured on TFTP servers. Termination of the Auto Install process ends further periodic requests for a host-specific file. Format boot autoinstall stop Mode Privileged EXEC boot host retry-count This command is used to set the number of attempts to download a configuration. The valid range is from 1 to 6. Default 3 Format boot host retry-count <count> Mode Privileged EXEC Utility Commands 330 M4100 Series ProSAFE Managed Switches no boot host retry-count This command is used to reset the number to the default. The default number is 3. Format no boot host retry-count Mode Privileged EXEC boot host dhcp This command is used to enable AutoInstall on the switch for the next reboot cycle. The command does not change the current behavior of AutoInstall and saves the command to NVRAM. Default Enabled Format boot host dhcp Mode Privileged EXEC no boot host dhcp This command is used to disable AutoInstall on the switch for the next reboot cycle. The command does not change the current behavior of AutoInstall and saves the command to NVRAM Format no boot host dhcp Mode Privileged EXEC erase startup-config Use this command to erase the text-based configuration file stored in non-volatile memory. If the switch boots and no startup-config file is found, the AutoInstall process automatically begins. Format erase startup-config Mode Privileged EXEC Dual Image Commands The software supports a dual image feature that allows the switch to have two software images in the permanent storage. You can specify which image is the active image to be loaded in subsequent reboots. This feature allows reduced down-time when you upgrade or downgrade the software. Utility Commands 331 M4100 Series ProSAFE Managed Switches delete This command deletes the supplied image file from the permanent storage. The image to be deleted must be a backup image. If this image is the active image, or if this image is activated, an error message displays. The optional <unit> parameter is valid only on Stacks. Error will be returned, if this parameter is provided, on Standalone systems. In a stack, the <unit> parameter identifies the node on which this command must be executed. When this parameter is not supplied, the command is executed on all nodes in a Stack. Format delete [<unit>] {image1 | image2} Mode Privileged EXEC boot system This command activates the specified image. It will be the active-image for subsequent reboots and will be loaded by the boot loader. The current active-image is marked as the backup-image for subsequent reboots. The optional <unit> parameter is valid only in Stacking, where the <unit> parameter identifies the node on which this command must be executed. When this parameter is not supplied, the command is executed on all nodes in a Stack. Format boot system [<unit>] <image-file-name> Mode Privileged EXEC show bootvar This command displays the version information and the activation status for the current active and backup images on the supplied unit (node) of the Stack. If you do not specify a unit number, the command displays image details for all nodes on the Stack. The command also displays any text description associated with an image. This command, when used on a Standalone system, displays the switch activation status. For a standalone system, the unit parameter is not valid. Format show bootvar [<unit>] Mode Privileged EXEC filedescr This command associates a text description with an image. Any existing description will be replaced. For stacking, the [<unit>] parameter identifies the node on which this command must be executed. When this parameter is not supplied, the command is executed on all nodes in a Stack. Format filedescr [<unit>] {image1 | image2} <text-description> Mode Privileged EXEC Utility Commands 332 M4100 Series ProSAFE Managed Switches update bootcode This command updates the bootcode (boot loader) on the switch. The bootcode is read from the active-image for subsequent reboots. The optional <unit> parameter is valid only on Stacks. Error will be returned, if this parameter is provided, on Standalone systems. For Stacking, the <unit> parameter identifies the node on which this command must be executed. When this parameter is not supplied, the command is executed on all nodes in a Stack. Format update bootcode [<unit>] Mode Privileged EXEC System Information and Statistics Commands This section describes the commands you use to view information about system features, components, and configurations. show arp switch (system information and statistics commands) This command displays the contents of the IP stack’s Address Resolution Protocol (ARP) table. The IP stack only learns ARP entries associated with the management interfaces (network or service ports). ARP entries associated with routing interfaces are not listed. Format show arp switch Mode Privileged EXEC Term Definition IP Address IP address of the management interface or another device on the management network. MAC Address Hardware MAC address of that device. Interface For a service port the output is Management. For a network port, the output is the slot/port of the physical interface. show eventlog This command displays the event log, which contains error messages from the system. The event log is not cleared on a system reset. The <unit> is the switch identifier. Format show eventlog [<unit>] Mode Privileged EXEC Utility Commands 333 M4100 Series ProSAFE Managed Switches Term Definition File The file in which the event originated. Line The line number of the event. Task Id The task ID of the event. Code The event code. Time The time this event occurred. Unit The unit for the event. Note: Event log information is retained across a switch reset. show hardware This command displays inventory information for the switch. Note: The show version command and the show hardware command display the same information. In future releases of the software, the show hardware command will not be available. For a description of the command output, see the command show version on page 334. Format show hardware Mode Privileged EXEC show version This command displays inventory information for the switch. Note: The show version command will replace the show hardware command in future releases of the software. Format show version Mode Privileged EXEC Utility Commands 334 M4100 Series ProSAFE Managed Switches Term Definition Switch Description Text used to identify the product name of this switch. Machine Type The machine model as defined by the Vital Product Data. Machine Model The machine model as defined by the Vital Product Data Serial Number The unique box serial number for this switch. FRU Number The field replaceable unit number. Manufacturer Manufacturer descriptor field. Burned in MAC Address Universally assigned network address. Software Version The release.version.revision number of the code currently running on the switch. Additional Packages The additional packages incorporated into this system. show interface This command displays a summary of statistics for a specific interface or a count of all CPU traffic based upon the argument. Format show interface {<slot/port> | switchport | lag <lag-intf-num>} Mode Privileged EXEC If the argument is <slot/port> or lag, the display parameters are as shown in the following table. Parameters Definition Packets Received Without Error The total number of packets (including broadcast packets and multicast packets) received by the processor. Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. Broadcast Packets Received The total number of packets received that were directed to the broadcast address. Note that this does not include multicast packets. Packets Transmitted Without Error The total number of packets transmitted out of the interface. Transmit Packets Errors The number of outbound packets that could not be transmitted because of errors. Utility Commands 335 M4100 Series ProSAFE Managed Switches Parameters Definition Collisions Frames The best estimate of the total number of collisions on this Ethernet segment. Time Since Counters Last Cleared The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last cleared. If the argument is switchport, the display parameters are as shown in the following table. Term Definition Packets Received Without Error The total number of packets (including broadcast packets and multicast packets) received by the processor. Broadcast Packets Received The total number of packets received that were directed to the broadcast address. Note that this does not include multicast packets. Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. Packets Transmitted Without Error The total number of packets transmitted out of the interface. Broadcast Packets Transmitted The total number of packets that higher-level protocols requested to be transmitted to the Broadcast address, including those that were discarded or not sent. Transmit Packet Errors The number of outbound packets that could not be transmitted because of errors. Address Entries Currently In Use The total number of Forwarding Database Address table entries now active on the switch, including learned and static entries. VLAN Entries Currently In Use The number of VLAN entries presently occupying the VLAN table. Time Since Counters Last Cleared The elapsed time, in days, hours, minutes, and seconds since the statistics for this switch were last cleared. show interface counters This command reports key summary statistics for all ports (physical, CPU, and port-channel). Format show interface counters Mode Privileged EXEC Utility Commands 336 M4100 Series ProSAFE Managed Switches Command example: (Routing) Port --------0/1 0/2 0/3 0/4 0/5 0/6 0/7 0/8 0/9 0/10 0/11 #show interface counters InOctets InUcastPkts ---------------- ---------------0 0 0 0 15098 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 InMcastPkts ---------------0 0 31 0 0 0 0 0 0 0 0 InBcastPkts ---------------0 0 39 0 0 0 0 0 0 0 0 show interface ethernet This command displays detailed statistics for a specific interface or for all CPU traffic based upon the argument. Format show interface ethernet {<slot/port> | switchport} Mode Privileged EXEC When you specify a value for <slot/port>, the command output displays the information that is shown in the following table. Term Definition Packets Received • • • • • Total Packets Received (Octets) - The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including Frame Check Sequence (FCS) octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval. The result of this equation is the value Utilization which is the percent utilization of the Ethernet segment on a scale of 0–100 percent. Packets Received 64 Octets - The total number of packets (including bad packets) received that were 64 octets in length (excluding framing bits but including FCS octets). Packets Received 65–127 Octets - The total number of packets (including bad packets) received that were from 65 through 127 octets in length inclusive (excluding framing bits but including FCS octets). Packets Received 128–255 Octets - The total number of packets (including bad packets) received that were from 128 through 255 octets in length inclusive (excluding framing bits but including FCS octets). Packets Received 256–511 Octets - The total number of packets (including bad packets) received that were from 256 through 511 octets in length inclusive (excluding framing bits but including FCS octets). Utility Commands 337 M4100 Series ProSAFE Managed Switches Term Definition (continued) • • • • • • • • • • • • • Packets Received Successfully • • • • Packets Received 512–1023 Octets - The total number of packets (including bad packets) received that were from 512 through 1023 octets in length inclusive (excluding framing bits but including FCS octets). Packets Received 1024–1518 Octets - The total number of packets (including bad packets) received that were from 1024 through 1518 octets in length inclusive (excluding framing bits but including FCS octets). Packets Received > 1518 Octets - The total number of packets received that were longer than 1522 octets (excluding framing bits, but including FCS octets) and were otherwise well formed. Packets RX and TX 64 Octets - The total number of packets (including bad packets) received and transmitted that were 64 octets in length (excluding framing bits but including FCS octets). Packets RX and TX 65–127 Octets - The total number of packets (including bad packets) received and transmitted that were from 65 through 127 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 128–255 Octets - The total number of packets (including bad packets) received and transmitted that were from 128 through 255 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 256–511 Octets - The total number of packets (including bad packets) received and transmitted that were from 256 through 511 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 512–1023 Octets - The total number of packets (including bad packets) received and transmitted that were from 512 through 1023 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 1024–1518 Octets - The total number of packets (including bad packets) received and transmitted that were from 1024 through 1518 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 1519–1522 Octets - The total number of packets (including bad packets) received and transmitted that were from 1519 through 1522 octets in length inclusive (excluding framing bits but including FCS octets). Packets RX and TX 1523–2047 Octets - The total number of packets received and transmitted that were from 1523 through 2047 octets in length inclusive (excluding framing bits, but including FCS octets) and were otherwise well formed. Packets RX and TX 2048–4095 Octets - The total number of packets received that were from 2048 through 4095 octets in length inclusive (excluding framing bits, but including FCS octets) and were otherwise well formed. Packets RX and TX 4096–9216 Octets - The total number of packets received that were from 4096 through 9216 octets in length inclusive (excluding framing bits, but including FCS octets) and were otherwise well formed. Total Packets Received Without Error - The total number of packets received that were without errors. Unicast Packets Received - The number of subnetwork-unicast packets delivered to a higher-layer protocol. Multicast Packets Received - The total number of good packets received that were directed to a multicast address. Note that this number does not include packets directed to the broadcast address. Broadcast Packets Received - The total number of good packets received that were directed to the broadcast address. Note that this does not include multicast packets. Utility Commands 338 M4100 Series ProSAFE Managed Switches Term Definition Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space. Packets Received with MAC Errors • • • • • • Received Packets Not Forwarded • • • • • • • • • Total Packets Received with MAC Errors - The total number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. Jabbers Received - The total number of packets received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Note that this definition of jabber is different than the definition in IEEE-802.3 section 8.2.1.5 (10BASE5) and section 10.3.1.4 (10BASE2). These documents define jabber as the condition where any packet exceeds 20 ms. The allowed range to detect jabber is 20–150 ms. Fragments/Undersize Received - The total number of packets received that were less than 64 octets in length (excluding framing bits but including FCS octets). Alignment Errors - The total number of packets received that had a length (excluding framing bits, but including FCS octets) of from 64 through 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with a non-integral number of octets. Rx FCS Errors - The total number of packets received that had a length (excluding framing bits, but including FCS octets) of from 64 through 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with an integral number of octets. Overruns - The total number of frames discarded as this port was overloaded with incoming packets, and could not keep up with the inflow. Total Received Packets Not Forwarded - A count of valid frames received which were discarded (in other words, filtered) by the forwarding process Local Traffic Frames - The total number of frames dropped in the forwarding process because the destination address was located off of this port. 802.3x Pause Frames Received - A count of MAC Control frames received on this interface with an opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode. Unacceptable Frame Type - The number of frames discarded from this port due to being an unacceptable frame type. Multicast Tree Viable Discards - The number of frames discarded when a lookup in the multicast tree for a VLAN occurs while that tree is being modified. Reserved Address Discards - The number of frames discarded that are destined to an IEEE 802.1 reserved address and are not supported by the system. Broadcast Storm Recovery - The number of frames discarded that are destined for FF:FF:FF:FF:FF:FF when Broadcast Storm Recovery is enabled. CFI Discards - The number of frames discarded that have CFI bit set and the addresses in RIF are in non-canonical format. Upstream Threshold - The number of frames discarded due to lack of cell descriptors available for that packet's priority level. Utility Commands 339 M4100 Series ProSAFE Managed Switches Term Definition Packets • Transmitted Octets • • • • • • • • Packets Transmitted Successfully • • • • Total Packets Transmitted (Octets) - The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). This object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval. ----Packets Transmitted 64 Octets - The total number of packets (including bad packets) received that were 64 octets in length (excluding framing bits but including FCS octets). Packets Transmitted 65-127 Octets - The total number of packets (including bad packets) received that were from 65 through 127 octets in length inclusive (excluding framing bits but including FCS octets). Packets Transmitted 128-255 Octets - The total number of packets (including bad packets) received that were from 128 through 255 octets in length inclusive (excluding framing bits but including FCS octets). Packets Transmitted 256-511 Octets - The total number of packets (including bad packets) received that were from 256 through 511 octets in length inclusive (excluding framing bits but including FCS octets). Packets Transmitted 512-1023 Octets - The total number of packets (including bad packets) received that were from 512 through 1023 octets in length inclusive (excluding framing bits but including FCS octets). Packets Transmitted 1024-1518 Octets - The total number of packets (including bad packets) received that were from 1024 through 1518 octets in length inclusive (excluding framing bits but including FCS octets). Packets Transmitted > 1518 Octets - The total number of packets transmitted that were longer than 1518 octets (excluding framing bits, but including FCS octets) and were otherwise well formed. Max Frame Size - The maximum size of the Info (non-MAC) field that this port will receive or transmit. Total Packets Transmitted Successfully- The number of frames that have been transmitted by this port to its segment. Unicast Packets Transmitted - The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent. Multicast Packets Transmitted - The total number of packets that higher-level protocols requested be transmitted to a Multicast address, including those that were discarded or not sent. Broadcast Packets Transmitted - The total number of packets that higher-level protocols requested be transmitted to the Broadcast address, including those that were discarded or not sent. Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. A possible reason for discarding a packet could be to free up buffer space. Transmit Errors • • • • Total Transmit Errors - The sum of Single, Multiple, and Excessive Collisions. Tx FCS Errors - The total number of packets transmitted that had a length (excluding framing bits, but including FCS octets) of from 64 through 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with an integral number of octets. Oversized - The total number of frames that exceeded the max permitted frame size. This counter has a max increment rate of 815 counts per sec. at 10 Mb/s. Underrun Errors - The total number of frames discarded because the transmit FIFO buffer became empty during frame transmission. Utility Commands 340 M4100 Series ProSAFE Managed Switches Term Definition Transmit Discards • • • • • Protocol Statistics • • • • • • • • • • • • • Dot1x Statistics • • Time Since Counters Last Cleared Total Transmit Packets Discards - The sum of single collision frames discarded, multiple collision frames discarded, and excessive frames discarded. Single Collision Frames - A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision. Multiple Collision Frames - A count of the number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision. Excessive Collisions - A count of frames for which transmission on a particular interface fails due to excessive collisions. Port Membership Discards - The number of frames discarded on egress for this port due to egress filtering being enabled. 802.3x Pause Frames Transmitted - A count of MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in half-duplex mode. GVRP PDUs Received - The count of GVRP PDUs received in the GARP layer. GVRP PDUs Transmitted - The count of GVRP PDUs transmitted from the GARP layer. GVRP Failed Registrations - The number of times attempted GVRP registrations could not be completed. GMRP PDUs Received - The count of GMRP PDUs received in the GARP layer. GMRP PDUs Transmitted - The count of GMRP PDUs transmitted from the GARP layer. GMRP Failed Registrations - The number of times attempted GMRP registrations could not be completed. STP BPDUs Transmitted - Spanning Tree Protocol Bridge Protocol Data Units sent. STP BPDUs Received - Spanning Tree Protocol Bridge Protocol Data Units received. RST BPDUs Transmitted - Rapid Spanning Tree Protocol Bridge Protocol Data Units sent. RSTP BPDUs Received - Rapid Spanning Tree Protocol Bridge Protocol Data Units received. MSTP BPDUs Transmitted - Multiple Spanning Tree Protocol Bridge Protocol Data Units sent. MSTP BPDUs Received - Multiple Spanning Tree Protocol Bridge Protocol Data Units received. EAPOL Frames Transmitted - The number of EAPOL frames of any type that have been transmitted by this authenticator. EAPOL Frames Received - The number of valid EAPOL frames of any type that have been received by this authenticator. The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last cleared. Utility Commands 341 M4100 Series ProSAFE Managed Switches When you specify switchport, the command output displays the information that is shown in the following table. Term Definition Octets Received The total number of octets of data received by the processor (excluding framing bits but including FCS octets). Total Packets Received Without Error The total number of packets (including broadcast packets and multicast packets) received by the processor. Unicast Packets Received The number of subnetwork-unicast packets delivered to a higher-layer protocol. Multicast Packets Received The total number of packets received that were directed to a multicast address. Note that this number does not include packets directed to the broadcast address. Broadcast Packets Received The total number of packets received that were directed to the broadcast address. Note that this does not include multicast packets. Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. A possible reason for discarding a packet could be to free up buffer space. Octets Transmitted The total number of octets transmitted out of the interface, including framing characters. Packets The total number of packets transmitted out of the interface. Transmitted without Errors Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent. Multicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a Multicast address, including those that were discarded or not sent. Broadcast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to the Broadcast address, including those that were discarded or not sent. Most Address Entries Ever Used The highest number of Forwarding Database Address Table entries that have been learned by this switch since the most recent reboot. Address Entries in Use The number of Learned and static entries in the Forwarding Database Address Table for this switch. Maximum VLAN Entries The maximum number of Virtual LANs (VLANs) allowed on this switch. Most VLAN Entries The largest number of VLANs that have been active on this switch since the last reboot. Ever Used Static VLAN Entries The number of presently active VLAN entries on this switch that have been created statically. Dynamic VLAN Entries The number of presently active VLAN entries on this switch that have been created by GVRP registration. Utility Commands 342 M4100 Series ProSAFE Managed Switches Term Definition VLAN Deletes The number of VLANs on this switch that have been created and then deleted since the last reboot. Time Since Counters Last Cleared The elapsed time, in days, hours, minutes, and seconds since the statistics for this switch were last cleared. show fiber-ports optics This command displays the diagnostics information of the SFP such as temperature, voltage, current, input power, output power, Tx fault, and LOS. The values are derived from the SFP’s A2 (Diagnostics) table using the I2C interface. Format show fiber-ports optics {all | <slot/port>} Mode Privileged EXEC Field Description Temp Internally measured transceiver temperature. Voltage Internally measured supply voltage. Current Measured TX bias current. Output Power Measured optical output power relative to 1mW. Input Power Measured optical power received relative to 1mW. TX Fault Transmitter fault. LOS Loss of signal. Command example: (NETGEAR Switch) #show fiber-ports optics all Port -------0/49 0/50 0/51 Temp [C] ---39.3 33.9 32.2 Voltage [Volt] ------3.256 3.260 3.256 Current [mA] ------5.0 5.3 5.6 Output Power [dBm] -------2.234 -2.374 -2.300 Input Power [dBm] -------2.465 -40.000 -2.897 Utility Commands 343 TX Fault ----No No No LOS --No Yes No M4100 Series ProSAFE Managed Switches show fiber-ports optics-info This command displays the SFP vendor related information such as vendor name, serial number of the SFP, part number of the SFP. The values are derived from the SFP’s A0 table using the I2C interface. Format show fiber-ports optics-info {all | <slot/port>} Mode Privileged EXEC Field Description Vendor Name The vendor name is a 16 character field that contains ASCII characters, left-aligned and padded on the right with ASCII spaces (20h). The vendor name shall be the full name of the corporation, a commonly accepted abbreviation of the name of the corporation, the SCSI company code for the corporation, or the stock exchange code for the corporation. Length (50um, OM2) This value specifies link length that is supported by the transceiver while operating in compliance with applicable standards using 50 micron multimode OM2 [500MHz*km at 850nm] fiber. A value of zero means that the transceiver does not support 50 micron multimode fiber or that the length information must be determined from the transceiver technology. Length (62.5um, OM1) This value specifies link length that is supported by the transceiver while operating in compliance with applicable standards using 62.5 micron multimode OM1 [200 MHz*km at 850nm, 500 MHz*km at 1310nm] fiber. A value of zero means that the transceiver does not support 62.5 micron multimode fiber or that the length information must determined from the transceiver technology Vendor SN The vendor serial number (vendor SN) is a 16 character field that contains ASCII characters, left-aligned and padded on the right with ASCII spaces (20h), defining the vendor's serial number for the transceiver. A value of all zero in the 16-byte field indicates that the vendor SN is unspecified. Vendor PN The vendor part number (vendor PN) is a 16-byte field that contains ASCII characters, left aligned and added on the right with ASCII spaces (20h), defining the vendor part number or product name. A value of all zero in the 16-byte field indicates that the vendor PN is unspecified. Utility Commands 344 M4100 Series ProSAFE Managed Switches Field Description BR, nominal The nominal bit (signaling) rate (BR, nominal) is specified in units of 100 MBd, rounded off to the nearest 100 MBd. The bit rate includes those bits necessary to encode and delimit the signal as well as those bits carrying data information. A value of 0 indicates that the bit rate is not specified and must be determined from the transceiver technology. The actual information transfer rate will depend on the encoding of the data, as defined by the encoding value. Vendor Rev The vendor revision number (vendor rev) contains ASCII characters, left aligned and padded on the right with ASCII spaces (20h), defining the vendor's product revision number. A value of all zero in this field indicates that the vendor revision is unspecified. Command example: (NETGEAR Switch) #show fiber-ports optics-info all Link Length 50um Port Vendor Name [m] -------- ---------------- --0/49 NETGEAR 8 0/51 NETGEAR 8 0/52 NETGEAR 8 Link Length 62.5um [m] Serial Number ---- ---------------3 A7N2018414 3 A7N2018472 3 A7N2018501 Nominal Bit Rate Part Number [Mbps] ---------------- ----AXM761 10300 AXM761 10300 AXM761 10300 Rev ---10 10 10 show mac-addr-table This command displays the forwarding database entries. These entries are used by the transparent bridging function to determine how to forward a received frame. Enter all or no parameter to display the entire table. Enter a MAC Address and VLAN ID to display the table entry for the requested MAC address on the specified VLAN. Enter the count parameter to view summary information about the forwarding database table. Use the interface <slot/port> parameter to view MAC addresses on a specific interface. Use the vlan <vlan-id> parameter to display information about MAC addresses on a specified VLAN. Format show mac-addr-table [{<macaddr> <vlan-id> | all | count | interface <slot/port> | vlan <vlan-id>}] Mode Privileged EXEC Utility Commands 345 M4100 Series ProSAFE Managed Switches The information that is shown in the following table displays if you do not enter a parameter, the keyword all, or the MAC address and VLAN ID. If you enter vlan <vlan-id>, only the Mac Address, Interface, and Status fields display. Term Definition Mac Address A unicast MAC address for which the switch has forwarding and or filtering information. The format is 6 or 8 two-digit hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB. In an IVL system the MAC address will be displayed as 8 bytes. Interface The port through which this address was learned. Interface Index This object indicates the ifIndex of the interface table entry associated with this port. Status The status of this entry. The meanings of the values are: • Static. The value of the corresponding instance was added by the system or a user when a static MAC filter was defined. It cannot be relearned. • Learned. The value of the corresponding instance was learned by observing the source MAC addresses of incoming traffic, and is currently in use. • Management. The value of the corresponding instance (system MAC address) is also the value of an existing instance of dot1dStaticAddress. It is identified with interface 0/1. and is currently used when enabling VLANs for routing. • Self. The value of the corresponding instance is the address of one of the switch’s physical interfaces (the system’s own MAC address). • GMRP Learned. The value of the corresponding was learned via GMRP and applies to Multicast. • Other. The value of the corresponding instance does not fall into one of the other categories. If you enter the interface <slot/port> parameter, in addition to the MAC Address and Status fields, the VLAN ID field displays. Term Definition VLAN ID The VLAN on which the MAC address was learned. The information that is shown in the following table displays if you enter the count parameter. Term Definition Dynamic Address count Number of MAC addresses in the forwarding database that were automatically learned. Static Address (User-defined) count Number of MAC addresses in the forwarding database that were manually entered by a user. Utility Commands 346 M4100 Series ProSAFE Managed Switches Term Definition Total MAC Number of MAC addresses currently in the forwarding database. Addresses in use Total MAC Addresses available Number of MAC addresses the forwarding database can handle. process cpu threshold Use this command to configure the CPU utilization thresholds. The Rising and Falling thresholds are specified as a percentage of CPU resources. The utilization monitoring time period can be configured from 5 seconds to 86,400 seconds in multiples of 5 seconds. The CPU utilization threshold configuration is saved across a switch reboot. Configuring the falling utilization threshold is optional. If the falling CPU utilization parameters are not configured, they take the same value as the rising CPU utilization parameters. Format process cpu threshold type total rising <1-100> interval <5-86400> {falling <1-100> interval <5-86400>} Mode Global Config Parameter Description rising threshold The percentage of CPU resources that, when exceeded for the configured rising interval, triggers a notification. The range is 1–100. The default is 0 (disabled). rising interval The duration of the CPU rising threshold violation, in seconds, that must be met to trigger a notification. The range is 5–86,400. The default is 0 (disabled). falling threshold The percentage of CPU resources that, when usage falls below this level for the configured interval, triggers a notification. The range is 1–100. The default is 0 (disabled). A notification is triggered when the total CPU utilization falls below this level for a configured period of time. The falling utilization threshold notification is made only if a rising threshold notification was previously done. The falling utilization threshold must always be equal or less than the rising threshold value. The CLI does not allow setting the falling threshold to be greater than the rising threshold. falling interval The duration of the CPU falling threshold, in seconds, that must be met to trigger a notification. The range is 5–86,400. The default is 0 (disabled). show process cpu This command provides the percentage utilization of the CPU by different tasks. Utility Commands 347 M4100 Series ProSAFE Managed Switches Note: It is not necessarily the traffic to the CPU, but different tasks that keep the CPU busy. Format show process cpu Mode Privileged EXEC Command example: (NETGEAR Switch) #show process cpu Memory Utilization Report status bytes ------ ---------free 192980480 alloc 53409968 Task Utilization Report Task Utilization ----------------------- ----------bcmL2X.0 0.75% bcmCNTR.0 0.20% bcmLINK.0 0.35% DHCP snoop 0.10% Dynamic ARP Inspection 0.10% dot1s_timer_task 0.10% dhcpsPingTask 0.20% show mbuf total This command shows the total system buffer pools status. Format show mbuf total Mode Privileged EXEC Command example: (NETGEAR Switch) #show mbuf total mbufSize 9284 (0x2444) Current Time 0x1897fa MbufsFree 150 MbufsRxUsed 0 Total Rx Norm Alloc Attempts 26212 Total Rx Mid2 Alloc Attempts 4087 Total Rx Mid1 Alloc Attempts 188943 Utility Commands 348 M4100 Series ProSAFE Managed Switches Total Total Total Total Total Total Total Rx Tx Rx Rx Rx Rx Tx High Alloc Attempts Alloc Attempts Norm Alloc Failures Mid2 Alloc Failures Mid1 Alloc Failures High Alloc Failures Alloc Failures 384555 2478536 0 0 0 0 0 show running-config Use this command to display or capture the current setting of different protocol packages supported on the switch. This command displays or captures commands with settings and configurations that differ from the default value. To display or capture the commands with settings and configurations that are equal to the default value, include the [all] option. Note: The output of the show running-config command does not display the user password, even if you set one different from the default. The output is displayed in the script format, which can be used to configure another switch with same configuration. If the optional <scriptname> is provided with a file name extension of .scr, the output is redirected to a script file. Note: If you issue the show running-config command from a serial connection, access to the switch through remote connections (such as Telnet) is suspended while the output is being generated and displayed. Note: If you use a text-based configuration file, the show running-config command displays only configured physical interfaces, that is, if any interface only contains the default configuration, that interface will be skipped from the show running-config command output. This is true for any configuration mode that contains nothing but default configuration. That is, the command to enter a particular config mode, followed immediately by its exit command, are both omitted from the output of the show running-config command (and hence from the startup-config file when the system configuration is saved.) This command captures the current settings of the trapflag status: • If all the flags are enabled, then the comma\nd displays trapflags all. • If all the flags in a particular group are enabled, then the command displays trapflags group name all. Utility Commands 349 M4100 Series ProSAFE Managed Switches • If some, but not all, of the flags in that group are enabled, the command displays trapflags groupname flag-name. Format show running-config [all | <scriptname>] Mode Privileged EXEC show running-config interface This command shows the current configuration on a particular interface. The interface could be a physical port or a virtual port—like a LAG or VLAN. The output captures how the configuration differs from the factory default value. Format show running-config interface {<slot/port>} | vlan <vlan-id> | lag <lag-id>} Mode Interface Config show sysinfo This command displays switch information. Format show sysinfo Mode Privileged EXEC Term Definition Switch Description Text used to identify this switch. System Name Name used to identify the switch. The factory default is blank. To configure the system name, see snmp-server on page 491. System Location Text used to identify the location of the switch. The factory default is blank. To configure the system location, see snmp-server on page 491. System Contact Text used to identify a contact person for this switch. The factory default is blank. To configure the system location, see snmp-server on page 491. System Object ID The base object ID for the switch’s enterprise MIB. System Up Time The time in days, hours, and minutes since the last switch reboot. MIBs Supported A list of MIBs supported by this agent. show tech-support Use this command to display system and configuration information when you contact technical support. The output of this command combines the output of the following commands: Utility Commands 350 M4100 Series ProSAFE Managed Switches • show version • show sysinfo • show port all • show isdp neighbors • show logging • show event log • show logging buffered • show trap log Format show tech-support Mode Privileged EXEC length Use this command to set the pagination length to value number of lines for the sessions specified by configuring on different Line Config modes (telnet, ssh, and console) and is persistent. The <number> argument is a number in the range of 5–48 lines. Enter 0 to specify no pagination. Default 24 Format length <number> Mode Line Config no length value Use this command to set the pagination length to the default value of 24 number of lines. Format no length Mode Line Config terminal length Use this command to set the number of lines of output to be displayed on the screen, i.e. pagination, for the show running-config and show running-config all commands. The terminal length size is either zero or a number in the range of 5–48. After the user-configured number of lines is displayed in one page, the system prompts the user “--More-- or (q)uit.” Press q or Q to quit, or press any key to display the next set of 5–48 lines. The command terminal length 0 disables pagination and, as a result, the output of the show running-config command is displayed immediately. Default 24 lines per page Utility Commands 351 M4100 Series ProSAFE Managed Switches Format terminal length <number> Mode Privileged EXEC no terminal length Use this command to set the terminal length to the default value of 24 lines. Format no terminal length Mode Privileged EXEC show terminal length Use this command to display the value of the user-configured terminal length size. Format show terminal length Mode Privileged EXEC memory free low-watermark processor Use this command to get notifications when the CPU free memory falls below the configured threshold. A notification is generated when the free memory falls below the threshold. Another notification is generated once the available free memory rises to 10 percent above the specified threshold. To prevent generation of excessive notifications when the CPU free memory fluctuates around the configured threshold, only one Rising or Falling memory notification is generated over a period of 60 seconds. The threshold is specified in kilobytes. The CPU free memory threshold configuration is saved across a switch reboot. Format memory free low-watermark processor <1-1034956> Mode Global Config Parameter Description low-watermark When CPU free memory falls below this threshold, a notification message is triggered. The range is 1 to the maximum available memory on the switch. The default is 0 (disabled). Utility Commands 352 M4100 Series ProSAFE Managed Switches Logging Commands This section describes the commands you use to configure system logging, and to view logs and the logging settings. logging buffered This command enables logging to an in-memory log that keeps up to 128 logs. Default disabled; critical when enabled Format logging buffered Mode Global Config no logging buffered This command disables logging to in-memory log. Format no logging buffered Mode Global Config logging buffered wrap This command enables wrapping of in-memory logging when the log file reaches full capacity. Otherwise when the log file reaches full capacity, logging stops. Default enabled Format logging buffered wrap Mode Privileged EXEC no logging buffered wrap This command disables wrapping of in-memory logging and configures logging to stop when the log file capacity is full. Format no logging buffered wrap Mode Privileged EXEC Utility Commands 353 M4100 Series ProSAFE Managed Switches logging cli-command This command enables the CLI command logging feature, which enables logging of all CLI commands issued on the system. Default enabled Format logging cli-command Mode Global Config no logging cli-command This command disables the CLI command Logging feature. Format no logging cli-command Mode Global Config logging console This command enables logging to the console. You can specify the <severitylevel> value as either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Default disabled; critical when enabled Format logging console [<severitylevel>] Mode Global Config no logging console This command disables logging to the console. Format no logging console Mode Global Config logging host This command enables logging to a host. You can configure up to eight hosts. Default • • Format logging host {<ipaddress> | <hostname>} <addresstype> {<port-number> <severitylevel>} Mode Global Config port—514 level—critical (2) Utility Commands 354 M4100 Series ProSAFE Managed Switches Parameter Description <ipaddress> | <hostname> The IP address or name of the logging host. <addresstype> Indicates the type of address (IPv4, IPv6, or DNS). You can configure either an IPv4 or IPv6 address or a host name for a syslog collector among the list of servers. <port-number> A port number from 1 to 65535. <severitylevel> Specify this value as either an integer from 0 to 7, or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). logging host remove This command disables logging to host. See show logging hosts on page 357 for a list of host indexes. Format logging host remove <hostindex> Mode Global Config logging syslog This command enables syslog logging. The <portid> parameter is an integer with a range of 1-65535. Default disabled Format logging syslog [port <portid>] Mode Global Config no logging syslog This command disables syslog logging. Format no logging syslog Mode Global Config logging syslog source-interface This command configures the syslog source interface (source IP address) for the syslog server configuration. The IP address of the selected source interface is used for filling the IP header of management protocol packets. This allows security devices (firewalls) to identify the source packets coming from the specific switch. If a source interface is not specified, the primary IP address of the originating (outbound) interface is used as the source address. Utility Commands 355 M4100 Series ProSAFE Managed Switches Format logging syslog source-interface {<slot/port> | {loopback <loopback-id>} | {vlan <vlan-id>}} Mode Global Config Parameter Description <slot/port> VLAN or port-based routing interface. loopback <loopback-id> Configures the loopback interface to use as the source IP address. The range of the loopback ID is 0 to 7. vlan <vlan-id> Configures the VLAN interface to use as the source IP address. The range of the VLAN ID is 1 to 4093. show logging This command displays logging configuration information. Format show logging Mode Privileged EXEC Term Definition Logging Client Local Port The port on the collector/relay to which syslog messages are sent. CLI Command Logging Shows whether CLI Command logging is enabled. Console Logging Shows whether console logging is enabled. Console Logging The minimum severity to log to the console log. Messages with an equal or lower Severity Filter numerical severity are logged. Buffered Logging Shows whether buffered logging is enabled. Syslog Logging Shows whether syslog logging is enabled. Log Messages Received Number of messages received by the log process. This includes messages that are dropped or ignored. Log Messages Dropped Number of messages that could not be processed due to error or lack of resources. Log Messages Relayed Number of messages sent to the collector/relay. Utility Commands 356 M4100 Series ProSAFE Managed Switches show logging buffered This command displays buffered logging (system startup and system operation logs). Format show logging buffered Mode Privileged EXEC Term Definition Buffered (In-Memory) Logging Shows whether the In-Memory log is enabled or disabled. Buffered Logging The behavior of the In Memory log when faced with a log full situation. Wrapping Behavior Buffered Log Count The count of valid entries in the buffered log. show logging hosts This command displays all configured logging hosts. Format show logging hosts Mode Privileged EXEC Term Definition Host Index (Used for deleting hosts.) IP Address / Hostname IP address or hostname of the logging host. Severity Level The minimum severity to log to the specified address. The possible values are emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Port The server port number, which is the port on the local host from which syslog messages are sent. Host Status The state of logging to configured syslog hosts. If the status is disable, no logging occurs. show logging traplogs This command displays SNMP trap events and statistics. Format show logging traplogs Mode Privileged EXEC Utility Commands 357 M4100 Series ProSAFE Managed Switches Term Definition Number of Traps The number of traps since the last boot. Since Last Reset Trap Log Capacity The number of traps the system can retain. Number of Traps The number of new traps since the command was last executed. Since Log Last Viewed Log The log number. System Time Up How long the system had been running at the time the trap was sent. Trap The text of the trap message. logging persistent Use this command to configure the persistent logging for the switch. You can specify the <severitylevel> value as either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Default Disable Format logging persistent <severitylevel> Mode Global Config no logging persistent Use this command to disable the persistent logging in the switch. Format no logging persistent Mode Global Config Email Alerting and Mail Server Commands logging email This command enables email alerting and sets the lowest severity level for which log messages are emailed. If you specify a severity level, log messages at or above this severity level, but below the urgent severity level, are emailed in a non-urgent manner by collecting them together until the log time expires. You can specify the <severitylevel> value as either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Utility Commands 358 M4100 Series ProSAFE Managed Switches Default Disabled; when enabled, log messages at or above severity warning (4) are emailed Format logging email [<severitylevel>] Mode Global Config no logging email This command disables email alerting. Format no logging email Mode Global Config logging email urgent This command sets the lowest severity level at which log messages are emailed immediately in a single email message. You can specify the <severitylevel> value as either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Specify none to indicate that log messages are collected and sent in a batch email at a specified interval. Default Alert (1) and emergency (0) messages are sent immediately Format logging email urgent {<severitylevel> | none} Mode Global Config no logging email urgent This command resets the urgent severity level to the default value. Format no logging email urgent Mode Global Config logging email message-type to-addr This command configures the email address to which messages are sent. The message types supported are urgent, non-urgent, or both. For each supported severity level, multiple email addresses can be configured. The <to-email-addr> variable is a standard email address, for example [email protected]. Format logging email message-type {urgent |non-urgent |both} to-addr <to-email-addr> Mode Global Config Utility Commands 359 M4100 Series ProSAFE Managed Switches no logging email message-type to-addr This command removes the configured to-addr field of email. Format no logging email message-type {urgent |non-urgent |both} to-addr <to-email-addr> Mode Global Config logging email from-addr This command configures the email address of the sender (that is, the switch). Default [email protected] Format logging email from-addr <from-email-addr> Mode Global Config no logging email from-addr This command removes the configured email source address. Format no logging email from-addr <from-email-addr> Mode Global Config logging email message-type subject This command configures the subject line of the email for the specified type. Default • • Format logging email message-type {urgent |non-urgent |both} subject <subject> Mode Global Config For urgent messages: Urgent Log Messages For non-urgent messages: Non-Urgent Log Messages no logging email message-type subject This command removes the configured email subject for the specified message type and restores it to the default email subject. Format no logging email message-type {urgent |non-urgent |both} subject Mode Global Config Utility Commands 360 M4100 Series ProSAFE Managed Switches logging email logtime This command configures how frequently non-urgent email messages are sent. Non-urgent messages are collected and sent in a batch email at the specified interval. The valid range is every 30- 440 minutes. Default 30 minutes Format logging email logtime <minutes> Mode Global Config no logging email logtime This command resets the non-urgent log time to the default value. Format no logging email logtime Mode Global Config logging traps This command sets the severity at which SNMP traps are logged and sent in an email. You can specify the <severitylevel> value as either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), info (6), or debug (7). Default Info (6) messages and higher are logged. Format logging traps <severitylevel> Mode Global Config no logging traps This command resets the SNMP trap logging severity level to the default value. Format no logging traps Mode Global Config logging email test message-type This command sends an email to the SMTP server to test the email alerting function. Format logging email test message-type {urgent |non-urgent |both} message-body <message-body> Mode Global Config Utility Commands 361 M4100 Series ProSAFE Managed Switches show logging email config This command displays information about the email alert configuration. Format show logging email config Mode Privileged EXEC Term Definition Email Alert Logging The administrative status of the feature: enabled or disabled Email Alert From Address The email address of the sender (the switch). Email Alert Urgent Severity Level The lowest severity level that is considered urgent. Messages of this type are sent immediately. Email Alert Non Urgent Severity Level The lowest severity level that is considered non-urgent. Messages of this type, up to the urgent level, are collected and sent in a batch email. Log messages that are less severe are not sent in an email message at all. Email Alert Trap Severity Level The lowest severity level at which traps are logged. Email Alert Notification Period The amount of time to wait between non-urgent messages. Email Alert To Address Table The configured email recipients. Email Alert Subject Table The subject lines included in urgent (Type 1) and non-urgent (Type 2) messages. For Msg Type urgent, subject is The configured email subject for sending urgent messages. For Msg Type non-urgent, The configured email subject for sending non-urgent messages. subject is show logging email statistics This command displays email alerting statistics. Format show logging email statistics Mode Privileged EXEC Term Definition Email Alert Operation Status The operational status of the email alerting feature. No of Email Failures The number of email messages that have attempted to be sent but were unsuccessful. Utility Commands 362 M4100 Series ProSAFE Managed Switches Term Definition No of Email Sent The number of email messages that were sent from the switch since the counter was cleared. Time Since Last Email Sent The amount of time that has passed since the last email was sent from the switch. clear logging email statistics This command resets the email alerting statistics. Format clear logging email statistics Mode Privileged EXEC mail-server Use this command to configure the SMTP server to which the switch sends email alert messages and change the mode to Mail Server Configuration mode. The server address can be in the IPv4, IPv6, or DNS name format. Format mail-server {<ip-address> | <ipv6-address> | <hostname>} Mode Global Config no mail-server Use this command to remove the specified SMTP server from the configuration. Format no mail-server {<ip-address> | <ipv6-address> | <hostname>} Mode Global Config security (Mail Server Config) Use this command to set the email alerting security protocol by enabling the switch to use TLS authentication with the SMTP Server. If the TLS mode is enabled on the switch but the SMTP server does not support TLS mode, no email is sent to the SMTP server. Default none Format security {tlsv1 | none} Mode Mail Server Config Utility Commands 363 M4100 Series ProSAFE Managed Switches port (Mail Server Config) Use this command to configure the TCP port to use for communication with the SMTP server. For <portid>, you enter any nonstandard port in the range 1–65535. For TLSv1, the recommended port is number 465. If you do not use security, the recommended port is number 25. Default 25 Format port <portid> Mode Mail Server Config username (Mail Server Config) Use this command to configure the login ID that the switch uses to authenticate with the SMTP server. Default admin Format username <name> Mode Mail Server Config password (Mail Server Config) Use this command to configure the password that the switch uses to authenticate with the SMTP server. Format password <password> Mode Mail Server Config show mail-server config Use this command to display information about the email alert configuration. Format show mail-server {<ip-address> | <hostname> | all} config Mode Privileged EXEC Term Definition No of mail servers configured The number of SMTP servers configured on the switch. Email Alert Mail Server Address The IPv4/IPv6 address or DNS host name of the configured SMTP server. Email Alert Mail Server Port The TCP port the switch uses to send email to the SMTP server. Utility Commands 364 M4100 Series ProSAFE Managed Switches Term Definition Email Alert The security protocol (TLS or none) the switch uses to authenticate with the SMTP Security Protocol server. Email Alert Username The username the switch uses to authenticate with the SMTP server. Email Alert Password The password the switch uses to authenticate with the SMTP server. System Utility and Clear Commands This section describes the commands you use to help troubleshoot connectivity issues and to restore various configurations to their factory defaults. traceroute Use the this command to discover the routes that packets actually take when traveling to their destination through the network on a hop-by-hop basis. Traceroute continues to provide a synchronous response when initiated from the CLI. Default • • • • • • • Format traceroute {<ip-address> | <hostname>} [initTtl <initTtl>] [maxTtl <maxTtl>] [maxFail <maxFail>] [interval <interval>] [count <count>] [port <port>] [size <size>] [source {<ip-address> | <slot/port> | loopback <0-7>}] Mode Privileged EXEC count: 3 probes interval: 3 seconds size: 0 bytes port: 33434 maxTtl: 30 hops maxFail: 5 probes initTtl: 1 hop Using the options described below, you can specify the initial and maximum time-to-live (TTL) in probe packets, the maximum number of failures before termination, the number of probes sent for each TTL, and the size of each probe. Parameter Description {<ip-address> | <hostname>} The <ip-address> value must be a valid IP address. The <hostname> value must be a a valid host name. [initTtl <initTtl>] As an option, specify the initial time-to-live (TTL), the maximum number of router hops between the local and remote system. Range is 0–255. [maxTtl <maxTtl>] As an option, specify the maximum TTL. Range is 1–255. Utility Commands 365 M4100 Series ProSAFE Managed Switches Parameter Description [maxFail <maxFail> As an option, specify when the traceroute is terminated after failing to receive a response for the number of consecutive probes. Range is 0–255. [interval <interval>] As an option, specify the time between probes, in seconds. Range is 1–60 seconds. [count <count>] As an option, specify the number of probes to send for each TTL value. Range is 1–10 probes. [port <port>] As an option, specify destination UDP port of the probe. This should be an unused port on the remote destination system. Range is 1–65,535. [size <size>] As an option, specify the size, in bytes, of the payload of the Echo Requests sent. Range is 0–65507 bytes. [source {<ip-address> | As an option, specify the source IP address or interface for the <slot/port> | loopback <0-7>}] traceroute. Command example: The traceroute succeeds: (NETGEAR Switch) # traceroute 10.240.10.115 initTtl 1 maxTtl 4 maxFail 0 interval 1 count 3 port 33434 size 43 Traceroute to 10.240.10.115 ,4 hops max 43 byte packets: 1 10.240.4.1 708 msec 41 msec 11 msec 2 10.240.10.115 0 msec 0 msec 0 msec Hop Count = 1 Last TTL = 2 Test attempt = 6 Test Success = 6 Command example: The traceroute fails: (NETGEAR Switch) # traceroute 10.40.1.1 initTtl 1 maxFail 0 interval 1 count 3 port 33434 size 43 Traceroute to 10.40.1.1 ,30 hops max 43 byte packets: 1 10.240.4.1 19 msec 18 msec 9 msec 2 10.240.1.252 0 msec 0 msec 1 msec 3 172.31.0.9 277 msec 276 msec 277 msec 4 10.254.1.1 289 msec 327 msec 282 msec 5 10.254.21.2 287 msec 293 msec 296 msec 6 192.168.76.2 290 msec 291 msec 289 msec 7 0.0.0.0 0 msec * Hop Count = 6 Last TTL = 7 Test attempt = 19 Test Success = 18 Utility Commands 366 M4100 Series ProSAFE Managed Switches traceroute ipv6 Use the traceroute command to discover the routes that packets actually take when traveling to their destination through the network on a hop-by-hop basis. The IPv6 address or host name must be a valid. The optional <port> parameter is the UDP port used as the destination of packets sent as part of the traceroute. This port should be an unused port on the destination system. The range for <port> is zero (0) to 65535. The default value is 33434. Default port: 33434 Format traceroute ipv6 {<ipv6-address> | <hostname>} [port <port>] Mode Privileged EXEC clear config This command resets the configuration to the factory defaults without powering off the switch. When you issue this command, a prompt appears to confirm that the reset should proceed. When you enter y, you automatically reset the current configuration on the switch to the default values. It does not reset the switch. Format clear config Mode Privileged EXEC clear eventlog This command clears all event messages maintained in the switch. Format clear eventlog Mode Privileged EXEC clear mac-addr-table This command clears the dynamically learned MAC addresses of the switch. Format clear mac-addr-table Mode Privileged EXEC clear logging buffered This command clears the messages maintained in the system log. Format clear logging buffered Mode Privileged EXEC Utility Commands 367 M4100 Series ProSAFE Managed Switches clear counters This command clears the statistics for a specified <slot/port>, for all the ports, or for the entire switch based upon the argument. Format clear counters {<slot/port> | all} Mode Privileged EXEC clear igmpsnooping This command clears the tables managed by the IGMP Snooping function and attempts to delete these entries from the Multicast Forwarding Database. Format clear igmpsnooping Mode Privileged EXEC clear pass This command resets all user passwords to the factory defaults without powering off the switch. You are prompted to confirm that the password reset should proceed. Format clear pass Mode Privileged EXEC clear port-channel This command clears all port-channels (LAGs). Format clear port-channel Mode Privileged EXEC clear traplog This command clears the trap log. Format clear traplog Mode Privileged EXEC clear vlan This command resets VLAN configuration parameters to the factory defaults. Format clear vlan Mode Privileged EXEC Utility Commands 368 M4100 Series ProSAFE Managed Switches enable password This command prompts you to change the Privileged EXEC password. Passwords are a maximum of 64 alphanumeric characters. The password is case-sensitive. The encrypted option allows you to transfer the enable password between devices without needing to know the password. In this case, the <password> parameter must be exactly 128 hexadecimal characters. Format enable password <password> [encrypted] Mode Privileged EXEC logout This command closes the current telnet connection or resets the current serial connection. Note: Save configuration changes before logging out. Format logout Modes • • Privileged EXEC User EXEC ping Use this command to determine whether another computer is on the network. Ping provides a synchronous response when initiated from the CLI and web interfaces. Default • • • The default count is 1. The default interval is 3 seconds. The default size is 0 bytes. Format ping {<ipaddress> | <hostname>} [count <count>] [interval <interval>] [size <size>] Modes • • Privileged EXEC User EXEC Using the options described below, you can specify the number and size of Echo Requests and the interval between Echo Requests. Parameter Description [count <count>] As an option, specify the number of ping packets (ICMP Echo requests) that are sent to the destination address. The range is 1–15 requests. Utility Commands 369 M4100 Series ProSAFE Managed Switches Parameter Description [interval <interval>] As an option, specify the time between Echo Requests, in seconds. The range is 1–60 seconds. [size <size>] As an option, specify the size, in bytes, of the payload of the Echo Requests sent. The range is 0–65507 bytes. Command example: The ping succeeds: (NETGEAR Switch) #ping 10.254.2.160 count 3 interval 1 size 255 Pinging 10.254.2.160 with 255 bytes of data: Received response for icmp_seq = 0. time= 275268 usec Received response for icmp_seq = 1. time= 274009 usec Received response for icmp_seq = 2. time= 279459 usec ----10.254.2.160 PING statistics---3 packets transmitted, 3 packets received, 0% packet loss round-trip (msec) min/avg/max = 274/279/276 Command example: The ping fails because the destination is unreachable: (NETGEAR Switch) # ping 192.168.254.222 count 3 interval 1 size 255 Pinging 192.168.254.222 with 255 bytes of data: Received Response: Unreachable Destination Received Response :Unreachable Destination Received Response :Unreachable Destination ----192.168.254.222 PING statistics---3 packets transmitted,3 packets received, 0% packet loss round-trip (msec) min/avg/max = 0/0/0 Command example: The ping fails because the request times out: (NETGEAR Switch) # ping 1.1.1.1 count 1 interval 3 Pinging 1.1.1.1 with 0 bytes of data: ----1.1.1.1 PING statistics---1 packets transmitted,0 packets received, 100% packet loss round-trip (msec) min/avg/max = 0/0/0 Utility Commands 370 M4100 Series ProSAFE Managed Switches quit This command closes the current telnet connection or resets the current serial connection. The system asks you whether to save configuration changes before quitting. Format quit Modes • • Privileged EXEC User EXEC reload This command resets the switch without powering it off. Reset means that all network connections are terminated and the boot code executes. The switch uses the stored configuration to initialize the switch. You are prompted to confirm that the reset should proceed. The LEDs on the switch indicate a successful reset. Format reload Mode Privileged EXEC save This command makes the current configuration changes permanent by writing the configuration changes to system NVRAM. Format save Mode Privileged EXEC copy The copy command uploads and downloads files to and from the switch. You can also use the copy command to manage the dual images (image1 and image2) on the file system. Upload and download files from a server by using TFTP or Xmodem. SFTP and SCP are available as additional transfer methods if the software package supports secure management. Format copy <source> <destination> Mode Privileged EXEC Replace the <source> and <destination> parameters with the options in Table 1 on page 373. Utility Commands 371 M4100 Series ProSAFE Managed Switches You can use the copy command with the following options: copy {<url> | image1 | image2 | nvram:backup-config | nvram:clibanner | nvram:cpu-pkt-capture.pcap | nvram:errorlog | nvram:factory-defaults | nvram:log | nvram:script | nvram:startup-config | nvram:tech-support | nvram:traplog | system:running-config} {<url> | isa-users | image1 | image2 | nvram:startup-config | nvram:backup-config | nvram:startup-config | nvram:clibanner | nvram:script <destfilename> | nvram:script <destfilename> noval | nvram:sshkey-dsa | nvram:sshkey-rsa1 | nvram:sshkey-rsa2 | nvram:sslpem-dhweak | nvram:sslpem-dhstrong | nvram:sslpem-root | nvram:sslpem-server:nvram:startup-config} Use the ias-users keyword to download the IAS user database file. When the IAS user’s file is downloaded, the switch IAS user's database is replaced with the users and their attributes in the downloaded file. In the copy <url> ias-users command, for <url>, use one of the following values for the IAS user's file: {{tftp://<ipaddr> | <ipv6address> | <hostname>/<filepath>/<filename>} | {sftp | scp://<username>@<ipaddress>/<filepath>/<filename>}} Note: The maximum length for the file path is 160 characters, and the maximum length for the file name is 31 characters. For TFTP, SFTP, and SCP, the <ipaddr> or <hostname> parameter is the IP address or host name of the server, <filepath> is the path to the file, and <filename> is the name of the file that you want to upload or download. For SFTP and SCP, the <username> parameter is the user name for logging into the remote server via SSH. Note: <ip6address> is also a valid parameter for routing packages that support IPv6. For switches that support a USB device, the copy command can be used to transfer files from and to the USB device. The syntax for the USB file is: usb://<filename>. The USB device can be either a source or destination in the copy command. It cannot be used as both source and destination in a copy command. CAUTION: Before you load a new release image to make a backup, upload the existing startup-config.cfg file to the server. Utility Commands 372 M4100 Series ProSAFE Managed Switches Parameters for the copy command are listed in the following table. Table 1. Parameters for the copy command Source Destination Description nvram:techsupport <url> Uploads the Technical Support file. nvram:backup-config nvram:startup-config Copies the backup configuration to the startup configuration. nvram:clibanner <url> Copies the CLI banner to a server. nvram:cpupktcapture.pcap <url> Uploads the CPU packets capture file. nvram:errorlog <url> Copies the error log file to a server nvram:log <url> Copies the log file to a server. nvram:script <scriptname> <url> Copies a specified configuration script file to a server. nvram:startup-config nvram:backup-config Copies the startup configuration to the backup configuration. nvram:startup-config <url> Copies the startup configuration to a server. nvram:traplog <url> Copies the trap log file to a server. system:running-config nvram:startup-config Saves the running configuration to nvram. <url> nvram:clibanner Downloads the CLI banner to the system. <url> nvram:script <destfilename> Downloads a configuration script file to the system. During the download of a configuration script, the copy command validates the script. In case of any error, the command lists all the lines at the end of the validation process and prompts you to confirm before copying the script file. <url> nvram:script <destfilename> noval When you use this option, the copy command does not validate the downloaded script file. An example of the CLI command follows: (NETGEAR Switch) #copy tftp://1.1.1.1/file.scr nvram:script file.scr <url> nvram:sshkey-dsa Downloads an SSH key file. For more information, see Secure Shell (SSH) Commands on page 457. <url> nvram:sshkey-rsa1 Downloads an SSH key file. <url> nvram:sshkey-rsa2 Downloads an SSH key file. Utility Commands 373 M4100 Series ProSAFE Managed Switches Table 1. Parameters for the copy command (continued) Source Destination Description <url> nvram:sslpem-dhweak Downloads an HTTP secure-server certificate. <url> nvram:sslpem-dhstrong Downloads an HTTP secure-server certificate. <url> nvram:sslpem-root Downloads an HTTP secure-server certificate. For more information, see Hypertext Transfer Protocol (HTTP) Commands on page 460. <url> nvram:sslpem-server Downloads an HTTP secure-server certificate. <url> nvram:startup-config Downloads the startup configuration file to the system. <url> nvram:license-key Download the license date to the system. <url> ias-users Downloads IAS users file by SFTP, SCP, or TFTP. <url> {image1 | image2} Download an image from the remote server to either image. In a stacking environment, the downloaded image is distributed to the stack nodes. {image1 | image2} <url> Upload either image to the remote server. image1 image2 Copy image1 to image2. image2 image1 Copy image2 to image1. write memory Use this command to save running configuration changes to NVRAM so that the changes you make will persist across a reboot. This command is the same as the copy system:running config nvram:startup-config command. Format write memory Mode Privileged EXEC Utility Commands 374 M4100 Series ProSAFE Managed Switches Simple Network Time Protocol (SNTP) Commands This section describes the commands you use to automatically configure the system time and date by using SNTP. sntp broadcast client poll-interval This command sets the poll interval for SNTP broadcast clients in seconds as a power of two where <poll-interval> can be a value from 6 to 10. Default 6 Format sntp broadcast client poll-interval <poll-interval> Mode Global Config no sntp broadcast client poll-interval This command resets the poll interval for SNTP broadcast client back to the default value. Format no sntp broadcast client poll-interval Mode Global Config sntp client mode This command enables Simple Network Time Protocol (SNTP) client mode and might set the mode to either broadcast or unicast. Default disabled Format sntp client mode [broadcast | unicast] Mode Global Config no sntp client mode This command disables Simple Network Time Protocol (SNTP) client mode. Format no sntp client mode Mode Global Config Utility Commands 375 M4100 Series ProSAFE Managed Switches sntp client port This command sets the SNTP client port id to a value from 1-65,535. Default 123 Format sntp client port <portid> Mode Global Config no sntp client port This command resets the SNTP client port back to its default value. Format no sntp client port Mode Global Config sntp unicast client poll-interval This command sets the poll interval for SNTP unicast clients in seconds as a power of two where <poll-interval> can be a value from 6 to 10. Default 6 Format sntp unicast client poll-interval <poll-interval> Mode Global Config no sntp unicast client poll-interval This command resets the poll interval for SNTP unicast clients to its default value. Format no sntp unicast client poll-interval Mode Global Config sntp unicast client poll-timeout This command will set the poll timeout for SNTP unicast clients in seconds to a value from 1-30. Default 5 Format sntp unicast client poll-timeout <poll-timeout> Mode Global Config Utility Commands 376 M4100 Series ProSAFE Managed Switches no sntp unicast client poll-timeout This command will reset the poll timeout for SNTP unicast clients to its default value. Format no sntp unicast client poll-timeout Mode Global Config sntp unicast client poll-retry This command will set the poll retry for SNTP unicast clients to a value from 0 to 10. Default 1 Format sntp unicast client poll-retry <poll-retry> Mode Global Config no sntp unicast client poll-retry This command will reset the poll retry for SNTP unicast clients to its default value. Format no sntp unicast client poll-retry Mode Global Config sntp server This command configures an SNTP server (a maximum of three). The optional priority can be a value of 1-3, the version a value of 1-4, and the port id a value of 1-65535. Format sntp server {<ipaddress> | <ipv6address> | <hostname>} [<priority> [<version> [<portid>]]] Mode Global Config no sntp server This command deletes a server from the configured SNTP servers. Format no sntp server remove {<ipaddress> | <ipv6address> | <hostname>} Mode Global Config Utility Commands 377 M4100 Series ProSAFE Managed Switches clock timezone When using SNTP/NTP time servers to update the switch’s clock, the time data received from the server is based on Coordinated Universal Time (UTC) which is the same as Greenwich Mean Time (GMT). This might not be the time zone in which the switch is located. Use the clock timezone command to configure a time zone specifying the number of hours and optionally the number of minutes difference from UTC. To set the switch clock to UTC, use the no form of the command. Default no clock timezone Format clock timezone <zone-name> <+/-hours-offset> [<+/-minutes-offset>] Mode Global Config Term Definition <zone-name> A name to associate with the time zone <hours-offset> Number of hours difference with UTC <minutes-offset> Number of minutes difference with UTC no clock timezone This command sets the switch to UTC time. Format no clock timezone Mode Global Config clock set This command sets the system time and date. Format clock set <hh:mm:ss> clock set <mm/dd/yyyy> Mode Global Config clock summer-time recurring Use this command to set the summertime offset to UTC recursively every year. If the optional parameters are not specified, they are read as either 0 or \0, as appropriate. Use the following parameters to configure the summer-time. • USA—the US Daylight saving time setting is used (Start --- March, 2nd sunday 02:00 AM, End --- Nov, 1st sunday, 2:00 AM) • EU—the European Union Daylight savings time is used (Start --- March, 5th Sunday 02:00 AM, End --- October, 5th Sunday, 3:00 AM) Utility Commands 378 M4100 Series ProSAFE Managed Switches • week—Week of the month. (Range: 1-5, first, last) • day—Day of the week. (Range: The first three letters by name; sun, for example.) • month—Month. (Range: The first three letters by name; jan, for example.) • hh:mm—Time in 24-hour format in hours and minutes. (Range: hh:0-23, mm: 0-59) • offset—Number of minutes to add during the summertime. (Range:1-1440) • acronym—The acronym for the time zone to be displayed when summertime is in effect. (Range: Up to four characters) Format clock summer-time recurring {USA | EU | {<week> <day> <month> <hh:mm> <week> <day> <month> <hh:mm>}} [offset <offset>] [zone <acronym>] Mode Global Config Command example: (NETGEAR Switch)(Config)# clock summer-time recurring 1 sun jan 00:10 2 mon mar 10:00 offset 1 zone ABC clock summer-time date Use this command to set the summertime offset to UTC. If the optional parameters are not specified, they are read as either 0 or \0, as appropriate. • date—Day of the month. (Range: 1-31) • month—Month. (Range: The first three letters by name; jan, for example.) • year—Year. (Range: 2000-2097) • hh:mm—Time in 24-hour format in hours and minutes. (Range: hh: 0-23, mm: 0-59) • offset—Number of minutes to add during the summertime. (Range:1-1440) • acronym—The acronym for the time zone to be displayed when summertime is in effect. (Range: Up to four characters) Format clock summer-time date {<day> <month> <year> <hh:mm> <day> <month> <year> <hh:mm>} [offset <offset>] [zone <acronym>] Mode Global Config Command example: (NETGEAR Switch)(config)# clock summer-time date 1 Apr 2007 02:00 28 Oct 2007 offset 90 zone EST Utility Commands 379 M4100 Series ProSAFE Managed Switches no clock summer-time Use this command to reset the summertime offset. Format no clock summer-time Mode Global Config Command example: (NETGEAR Switch)(config)#no clock summer-time show sntp This command is used to display SNTP settings and status. Format show sntp Mode Privileged EXEC Term Definition Last Update Time Time of last clock update. Last Unicast Attempt Time Time of last transmit query (in unicast mode). Last Attempt Status Status of the last SNTP request (in unicast mode) or unsolicited message (in broadcast mode). Broadcast Count Current number of unsolicited broadcast messages that have been received and processed by the SNTP client since last reboot. Multicast Count Current number of unsolicited multicast messages that have been received and processed by the SNTP client since last reboot. show sntp client This command is used to display SNTP client settings. Format show sntp client Mode Privileged EXEC Term Definition Client Supported Supported SNTP Modes (Broadcast, Unicast, or Multicast). Modes SNTP Version The highest SNTP version the client supports. Utility Commands 380 M4100 Series ProSAFE Managed Switches Term Definition Port SNTP Client Port. Client Mode Configured SNTP Client Mode. show sntp server This command is used to display SNTP server settings and configured servers. Format show sntp server Mode Privileged EXEC Term Definition Server Host Address IP address or hostname of configured SNTP Server. Server Type Address Type of Server. Server Stratum Claimed stratum of the server for the last received valid packet. Server Reference ID Reference clock identifier of the server for the last received valid packet. Server Mode SNTP Server mode. Server Maximum Total number of SNTP Servers allowed. Entries Server Current Entries Total number of SNTP configured. For each configured server, the information that is shown in the following table is displayed. Term Definition Host Address IP address or hostname of configured SNTP Server. Address Type Address Type of configured SNTP server. Priority IP priority type of the configured server. Version SNTP Version number of the server. The protocol version used to query the server in unicast mode. Port Server Port Number. Last Attempt Time Last server attempt time for the specified server. Last Update Status Last server attempt status for the server. Utility Commands 381 M4100 Series ProSAFE Managed Switches Term Definition Total Unicast Requests Number of requests to the server. Failed Unicast Requests Number of failed requests from server. show clock Use the show clock command in Privileged EXEC or User EXEC mode to display the time and date from the system clock. Use the show clock detail command to show the time zone and summertime configuration. Format show clock [detail] Mode • • User EXEC Privileged EXEC Term Definition Time The time provided by the time source. Time Source The time source type. If you specify the detail keyword, the following information is also displayed. Time Zone The time zone configured. Summer Time Indicate if the summer time is enabled. DHCP Server Commands This section describes the commands you to configure the DHCP server settings for the switch. DHCP uses UDP as its transport protocol and supports a number of features that facilitate in administration address allocations. ip dhcp pool This command configures a DHCP address pool name on a DHCP server and enters DHCP pool configuration mode. Default none Format ip dhcp pool <name> Mode Global Config Utility Commands 382 M4100 Series ProSAFE Managed Switches no ip dhcp pool This command removes the DHCP address pool. The name should be previously configured pool name. Format no ip dhcp pool <name> Mode Global Config client-identifier This command specifies the unique identifier for a DHCP client. Unique-identifier is a valid notation in hexadecimal format. In some systems, such as Microsoft DHCP clients, the client identifier is required instead of hardware addresses. The unique-identifier is a concatenation of the media type and the MAC address. For example, the Microsoft client identifier for Ethernet address c819.2488.f177 is 01c8.1924.88f1.77 where 01 represents the Ethernet media type. For more information, refer to the “Address Resolution Protocol Parameters” section of RFC 1700, Assigned Numbers for a list of media type codes. Default none Format client-identifier <uniqueidentifier> Mode DHCP Pool Config no client-identifier This command deletes the client identifier. Format no client-identifier Mode DHCP Pool Config client-name This command specifies the name for a DHCP client. Name is a string consisting of standard ASCII characters. Default none Format client-name <name> Mode DHCP Pool Config Utility Commands 383 M4100 Series ProSAFE Managed Switches no client-name This command removes the client name. Format no client-name Mode DHCP Pool Config default-router This command specifies the default router list for a DHCP client. <address1> and <address2>…<address8> must be valid IP addresses, each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Default none Format default-router <address1> [<address2>...<address8>] Mode DHCP Pool Config no default-router This command removes the default router list. Format no default-router Mode DHCP Pool Config dns-server This command specifies the IP servers available to a DHCP client. Address parameters are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Default none Format dns-server <address1> [<address2>...<address8>] Mode DHCP Pool Config no dns-server This command removes the DNS Server list. Format no dns-server Mode DHCP Pool Config Utility Commands 384 M4100 Series ProSAFE Managed Switches hardware-address This command specifies the hardware address of a DHCP client. Hardware-address is the MAC address of the hardware platform of the client consisting of 6 bytes in dotted hexadecimal format. Type indicates the protocol of the hardware platform. It is 1 for 10 MB Ethernet and 6 for IEEE 802. Default ethernet Format hardware-address <hardwareaddress> <type> Mode DHCP Pool Config no hardware-address This command removes the hardware address of the DHCP client. Format no hardware-address Mode DHCP Pool Config host This command specifies the IP address and network mask for a manual binding to a DHCP client. Address and Mask are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. The prefix length is an integer from 0 to 32. Default none Format host <address> [<mask> | <prefix-length>] Mode DHCP Pool Config no host This command removes the IP address of the DHCP client. Format no host Mode DHCP Pool Config lease This command configures the duration of the lease for an IP address that is assigned from a DHCP server to a DHCP client. The overall lease time should be between 1-86400 minutes. If you specify infinite, the lease is set for 60 days. You can also specify a lease duration. <days> is an integer from 0 to 59. <hours> is an integer from 0 to 23. <minutes> is an integer from 0 to 59. Utility Commands 385 M4100 Series ProSAFE Managed Switches Default 1 (day) Format lease [{<days> [<hours>] [<minutes>] | infinite}] Mode DHCP Pool Config no lease This command restores the default value of the lease time for DHCP Server. Format no lease Mode DHCP Pool Config network (DHCP Pool Config) Use this command to configure the subnet number and mask for a DHCP address pool on the server. Network-number is a valid IP address, made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Mask is the IP subnet mask for the specified address pool. The prefix-length is an integer from 0 to 32. Default none Format network <networknumber> [<mask> | <prefixlength>] Mode DHCP Pool Config no network This command removes the subnet number and mask. Format no network Mode DHCP Pool Config bootfile The command specifies the name of the default boot image for a DHCP client. The <filename> specifies the boot image file. Format bootfile <filename> Mode DHCP Pool Config Utility Commands 386 M4100 Series ProSAFE Managed Switches no bootfile This command deletes the boot image name. Format no bootfile Mode DHCP Pool Config domain-name (DHCP Pool Config) This command specifies the domain name for a DHCP client. The <domain> argument specifies the domain name string of the client. Default none Format domain-name <domain> Mode DHCP Pool Config no domain-name This command removes the domain name. Format no domain-name Mode DHCP Pool Config netbios-name-server This command configures NetBIOS Windows Internet Naming Service (WINS) name servers that are available to DHCP clients. One IP address is required, although one can specify up to eight addresses in one command line. Servers are listed in order of preference (address1 is the most preferred server, address2 is the next most preferred server, and so on). Default none Format netbios-name-server <address> [<address2>...<address8>] Mode DHCP Pool Config no netbios-name-server This command removes the NetBIOS name server list. Format no netbios-name-server Mode DHCP Pool Config Utility Commands 387 M4100 Series ProSAFE Managed Switches netbios-node-type The command configures the NetBIOS node type for Microsoft Dynamic Host Configuration Protocol (DHCP) clients. The <type> parameter specifies the NetBIOS node type. Valid types are: • b-node—Broadcast • p-node—Peer-to-peer • m-node—Mixed • h-node—Hybrid (recommended) Default none Format netbios-node-type <type> Mode DHCP Pool Config no netbios-node-type This command removes the NetBIOS node Type. Format no netbios-node-type Mode DHCP Pool Config next-server This command configures the next server in the boot process of a DHCP client. The <address> parameter is the IP address of the next server in the boot process, which is typically a TFTP server. Default inbound interface helper addresses Format next-server <address> Mode DHCP Pool Config no next-server This command removes the boot server list. Format no next-server Mode DHCP Pool Config Utility Commands 388 M4100 Series ProSAFE Managed Switches option The option command configures DHCP server options. The <code> parameter specifies the DHCP option code and ranges from 1-254. The <ascii string> parameter specifies an NVT ASCII character string. ASCII character strings that contain white space must be delimited by quotation marks. The hex <string> parameter specifies hexadecimal data. In hexadecimal, character strings are two hexadecimal digits. You can separate each byte by a period (for example, a3.4f.22.0c), colon (for example, a3:4f:22:0c), or white space (for example, a3 4f 22 0c). Default none Format option <code> {<ascii string> | hex <string1> [<string2>...<string8>] | ip <address1> [<address2>...<address8>]} Mode DHCP Pool Config no option This command removes the DHCP Server options. The <code> parameter specifies the DHCP option code. Format no option <code> Mode DHCP Pool Config ip dhcp excluded-address This command specifies the IP addresses that a DHCP server should not assign to DHCP clients. Low-address and high-address are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Default none Format ip dhcp excluded-address <lowaddress> [<highaddress>] Mode Global Config no ip dhcp excluded-address This command removes the excluded IP addresses for a DHCP client. Low-address and high-address are valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Format no ip dhcp excluded-address <lowaddress> [<highaddress>] Mode Global Config Utility Commands 389 M4100 Series ProSAFE Managed Switches ip dhcp ping packets Use this command to specify the number of packets, in a range from 2-10, that a DHCP server sends to a pool address as part of a ping operation. By default, the number of packets sent to a pool address is 2, which is the smallest allowed number when sending packets. Setting the number of packets to 0 disables this command. Default 2 Format ip dhcp ping packets <range> Mode Global Config no ip dhcp ping packets This command prevents the server from pinging pool addresses and sets the number of packets to 0. Default 0 Format no ip dhcp ping packets Mode Global Config service dhcp This command enables the DHCP server. Default disabled Format service dhcp Mode Global Config no service dhcp This command disables the DHCP server. Format no service dhcp Mode Global Config ip dhcp bootp automatic This command enables the allocation of the addresses to the bootp client. The addresses are from the automatic address pool. Default disabled Format ip dhcp bootp automatic Mode Global Config Utility Commands 390 M4100 Series ProSAFE Managed Switches no ip dhcp bootp automatic This command disables the allocation of the addresses to the bootp client. The address are from the automatic address pool. Format no ip dhcp bootp automatic Mode Global Config ip dhcp conflict logging This command enables conflict logging on DHCP server. Default enabled Format ip dhcp conflict logging Mode Global Config no ip dhcp conflict logging This command disables conflict logging on DHCP server. Format no ip dhcp conflict logging Mode Global Config clear ip dhcp binding This command deletes an automatic address binding from the DHCP server database. If you specify *, the bindings corresponding to all the addresses are deleted. <address> is a valid IP address made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. Format clear ip dhcp binding {<address> | *} Mode Privileged EXEC clear ip dhcp server statistics This command clears DHCP server statistics counters. Format clear ip dhcp server statistics Mode Privileged EXEC Utility Commands 391 M4100 Series ProSAFE Managed Switches clear ip dhcp conflict The command is used to clear an address conflict from the DHCP Server database. The server detects conflicts using a ping. DHCP server clears all conflicts If the asterisk (*) character is used as the address parameter. Default none Format clear ip dhcp conflict {<address> | *} Mode Privileged EXEC show ip dhcp binding This command displays address bindings for the specific IP address on the DHCP server. If no IP address is specified, the bindings corresponding to all the addresses are displayed. Format show ip dhcp binding [<address>] Modes • • Privileged EXEC User EXEC Term Definition IP address The IP address of the client. Hardware Address The MAC Address or the client identifier. Lease expiration The lease expiration time of the IP address assigned to the client. Type The manner in which IP address was assigned to the client. show ip dhcp global configuration This command displays address bindings for the specific IP address on the DHCP server. If no IP address is specified, the bindings corresponding to all the addresses are displayed. Format show ip dhcp global configuration Modes • • Privileged EXEC User EXEC Term Definition Service DHCP The field to display the status of dhcp protocol. Number of Ping Packets The maximum number of Ping Packets that will be sent to verify that an ip address id not already assigned. Conflict Logging Shows whether conflict logging is enabled or disabled. BootP Automatic Shows whether BootP for dynamic pools is enabled or disabled. Utility Commands 392 M4100 Series ProSAFE Managed Switches show ip dhcp pool configuration This command displays pool configuration. If all is specified, configuration for all the pools is displayed. Format show ip dhcp pool configuration {<name> | all} Modes • • Privileged EXEC User EXEC Field Definition Pool Name The name of the configured pool. Pool Type The pool type. Lease Time The lease expiration time of the IP address assigned to the client. DNS Servers The list of DNS servers available to the DHCP client. Default Routers The list of the default routers available to the DHCP client. For the dynamic pool type, the fields that are shown in the following table are displayed. Field Definition Network The network number and the mask for the DHCP address pool. For the manual pool type, the fields that are shown in the following table are displayed. Field Definition Client Name The name of a DHCP client. Client Identifier The unique identifier of a DHCP client. Hardware Address The hardware address of a DHCP client. Hardware Address Type The protocol of the hardware platform. Host The IP address and the mask for a manual binding to a DHCP client. show ip dhcp server statistics This command displays DHCP server statistics. Format show ip dhcp server statistics Modes • • Privileged EXEC User EXEC Utility Commands 393 M4100 Series ProSAFE Managed Switches Field Definition Automatic Bindings The number of IP addresses that have been automatically mapped to the MAC addresses of hosts that are found in the DHCP database. Expired Bindings The number of expired leases. Malformed Bindings The number of truncated or corrupted messages that were received by the DHCP server. For Message Received, the fields that are shown in the following table are displayed. Message Definition DHCP DISCOVER The number of DHCPDISCOVER messages the server has received. DHCP REQUEST The number of DHCPREQUEST messages the server has received. DHCP DECLINE The number of DHCPDECLINE messages the server has received. DHCP RELEASE The number of DHCPRELEASE messages the server has received. DHCP INFORM The number of DHCPINFORM messages the server has received. For Message Sent, the fields that are shown in the following table are displayed. Message Definition DHCP OFFER The number of DHCPOFFER messages the server sent. DHCP ACK The number of DHCPACK messages the server sent. DHCP NACK The number of DHCPNACK messages the server sent. show ip dhcp conflict This command displays address conflicts logged by the DHCP Server. If no IP address is specified, all the conflicting addresses are displayed. Format show ip dhcp conflict [<ip-address>] Modes • • Privileged EXEC User EXEC Term Definition IP address The IP address of the host as recorded on the DHCP server. Reporting Host Hardware Address The hardware address of the host that reported the conflict. Utility Commands 394 M4100 Series ProSAFE Managed Switches Term Definition Detection Method The manner in which the IP address of the hosts were found on the DHCP Server. Detection time The time when the conflict was found. DNS Client Commands These commands are used in the Domain Name System (DNS), an Internet directory service. DNS is how domain names are translated into IP addresses. When enabled, the DNS client provides a hostname lookup service to other components. ip domain lookup Use this command to enable the DNS client. Default enabled Format ip domain lookup Mode Global Config no ip domain lookup Use this command to disable the DNS client. Format no ip domain lookup Mode Global Config ip domain name Use this command to define a default domain name that the software uses to complete unqualified host names (names with a domain name). By default, no default domain name is configured in the system. <name> may not be longer than 255 characters and should not include an initial period. This <name> should be used only when the default domain name list, configured using the ip domain list command, is empty. Default none Format ip domain name <name> Mode Global Config Command example: The CLI command ip domain name yahoo.com configures yahoo.com as a default domain name. For an unqualified hostname xxx, a DNS query is made to find the IP address corresponding to xxx.yahoo.com. Utility Commands 395 M4100 Series ProSAFE Managed Switches no ip domain name Use this command to remove the default domain name configured using the ip domain name command. Format no ip domain name Mode Global Config ip domain list Use this command to define a list of default domain names to complete unqualified names. By default, the list is empty. Each name must be no more than 256 characters, and should not include an initial period. The default domain name, configured using the ip domain name command, is used only when the default domain name list is empty. A maximum of 32 names can be entered in to this list. Default none Format ip domain list <name> Mode Global Config no ip domain list Use this command to delete a name from a list. Format no ip domain list <name> Mode Global Config ip name server Use this command to configure the available name servers. Up to eight servers can be defined in one command or by using multiple commands. The parameter <server-address> is a valid IPv4 or IPv6 address of the server. The preference of the servers is determined by the order they were entered. Format ip name-server <server-address1> [<server-address2>...<server-address8>] Mode Global Config no ip name server Use this command to remove a name server. Format no ip name-server [<server-address1>...<server-address8>] Mode Global Config Utility Commands 396 M4100 Series ProSAFE Managed Switches ip host Use this command to define static host name-to-address mapping in the host cache. The <name> parameter is the host name. The <ip address> parameter is the IP address of the host. Default none Format ip host <name> <ipaddress> Mode Global Config no ip host Use this command to remove the name-to-address mapping. Format no ip host <name> Mode Global Config ipv6 host Use this command to define static host name-to-IPv6 address mapping in the host cache. The <name> parameter is the host name. The <ipv6-address> parameter is the IPv6 address of the host. Default none Format ipv6 host <name> <ipv6-address> Mode Global Config no ipv6 host Use this command to remove the static host name-to-IPv6 address mapping in the host cache. Format no ipv6 host <name> Mode Global Config ip domain retry Use this command to specify the number of times to retry sending Domain Name System (DNS) queries. The parameter <number> indicates the number of times to retry sending a DNS query to the DNS server. This number ranges from 0 to 100. Default 2 Format ip domain retry <number> Mode Global Config Utility Commands 397 M4100 Series ProSAFE Managed Switches no ip domain retry Use this command to return to the default. Format no ip domain retry <number> Mode Global Config ip domain timeout Use this command to specify the amount of time to wait for a response to a DNS query. The <seconds> parameter specifies the time in seconds to wait for a response to a DNS query and ranges from 0 to 3600. Default 3 Format ip domain timeout <seconds> Mode Global Config no ip domain timeout Use this command to return to the default setting. Format no ip domain timeout Mode Global Config clear host Use this command to delete entries from the host name-to-address cache. This command clears the entries from the DNS cache maintained by the software. This command clears both IPv4 and IPv6 entries. Format clear host {<name> | all} Mode Privileged EXEC Field Description name A particular host entry to remove. <name> ranges from 1-255 characters. all Removes all entries. Utility Commands 398 M4100 Series ProSAFE Managed Switches show hosts Use this command to display the default domain name, a list of name server hosts, the static and the cached list of host names and addresses <name> ranges from 1-255 characters. This command displays both IPv4 and IPv6 entries. Format show hosts [<name>] Mode User EXEC Field Description Host Name Domain host name. Default Domain Default domain name. Default Domain List Default domain list. Domain Name Lookup DNS client enabled/disabled. Number of Retries Number of time to retry sending Domain Name System (DNS) queries. Retry Timeout Period Amount of time to wait for a response to a DNS query. Name Servers Configured name servers. Command example: <NETGEAR Switching> show hosts Host name......................... Default domain.................... Default domain list............... Domain Name lookup................ Number of retries................. Retry timeout period.............. Name servers (Preference order)... DNS Client Source Interface....... Device gm.com yahoo.com, Stanford.edu, rediff.com Enabled 5 1500 176.16.1.18 176.16.1.19 (not configured) Configured host name-to-address mapping: Host Addresses ------------------------------ -----------------------------accounting.gm.com 176.16.8.8 Host --------------www.stanford.edu Total -------72 Elapsed -----3 Type -------IP Utility Commands 399 Addresses --------------171.64.14.203 M4100 Series ProSAFE Managed Switches Packet Capture Commands Packet capture commands assist in troubleshooting protocol-related problems with the management CPU. The packets to and from the management CPU can be captured in an internally allocated buffer area for export to a PC host for protocol analysis. Public domain packet analysis tools like Ethereal can be used to decode and review the packets in detail. Capturing can be performed in a variety of modes, either transmit-side only, receive-side only, or both. The number of packets captured will depend on the size of the captured packets. capture {start | stop} Use the capture start command to manually start capturing CPU packets for packet trace. Capturing packets is stopped automatically when 128 packets are captured and have not yet been displayed during a capture session. It is guaranteed that packets not displayed and not saved will not be lost when capturing is in progress. Use the capture stop command to manually stop capturing CPU packets for packet trace before the moment when 128 packets are captured and capturing packets is stopped automatically.The packet capture operates in three modes: • Capture file • Remote capture • Capture line The command is not persistent across a reboot cycle. Format capture {start | stop} {transmit | receive | all} Mode Privileged EXEC capture {file | remote | line} Use this command to configure file capture options. The command is persistent across a reboot cycle. Default Remote Format capture {file | remote | line} Mode Global Config Parameter Description file In capture file mode, the captured packets are stored in a file on NVRAM. The maximum file size defaults to 524,288 bytes. The switch can transfer the file to a TFTP server via TFTP, SFTP, SCP via CLI, web and SNMP. The file is formatted in pcap format, is named cpuPktCapture.pcap, and can be examined using network analyzer tools such as Wireshark® by Ethereal®. Starting a file capture automatically terminates any remote capture sessions and line capturing. After the packet capture is activated, the capture proceeds until the capture file reaches its maximum size, or until the capture is stopped manually using the CLI command capture stop. Utility Commands 400 M4100 Series ProSAFE Managed Switches Parameter Description remote In remote capture mode, the captured packets are redirected in real time to an external computer running the Wireshark tool for Microsoft® Windows®. A packet capture server runs on the switch side and sends the captured packets via a TCP connection to the Wireshark tool. The remote capture can be enabled or disabled using the CLI. There should be a Windows computer with the Wireshark tool to display the captured file. When using the remote capture mode, the switch does not store any captured data locally on its file system. You can configure the IP port number for connecting Wireshark to the switch. The default port number is 2002. If a firewall is installed between the Wireshark PC and the switch, these ports must be allowed to pass through the firewall. You must configure the firewall to allow the Wireshark computer to initiate TCP connections to the switch. If the socket connection to Wireshark has been established, the captured CPU packets are written to the data socket. Wireshark receives the packets and processes it to display. This continues until the session is terminated by either end. Starting a remote capture session automatically terminates the file capture and line capturing. line In capture line mode, the captured packets are saved in real-time mode into the RAM and can be displayed on the CLI. Starting a line capture automatically terminates any remote capture session and capturing into a file. no capture Use this command to reset the capture mode to remote mode. Format no capture Mode Global Config capture remote port Use this command to configure file capture options. The command is persistent across a reboot cycle. Default 2002 Format capture remote port <port-id> Mode Global Config no capture remote port Use this command to reset the remote port to the default (2002). Format no capture report port Mode Global Config Utility Commands 401 M4100 Series ProSAFE Managed Switches capture file size Use this command to configure file capture options. The command is persistent across a reboot cycle. The range is from 2 to 512 Kbytes. Default 512 Kbytes Format capture file size <file-size> Mode Global Config no capture file size Use this command to reset the file size to the default (512 Kbytes). Format no capture file size Mode Global Config capture line wrap This command enables wrapping of captured packets in line mode when the captured packets reaches full capacity. Default Disabled Format capture line wrap Mode Global Config no capture line wrap This command disables wrapping of captured packets and configures capture packet to stop when the captured packet capacity is full. Format no capture line wrap Mode Global Config show capture packets Use this command to display packets captured and saved to RAM. It is possible to capture and save into RAM, packets that are received or transmitted through the CPU. A maximum 128 packets can be saved into RAM per capturing session. A maximum 128 bytes per packet can be saved into the RAM. If a packet holds more than 128 bytes, only the first 128 bytes are saved; data more than 128 bytes is skipped and cannot be displayed in the CLI. Capturing packets is stopped automatically when 128 packets are captured and have not yet been displayed during a capture session. Captured packets are not retained after a reload cycle. Utility Commands 402 M4100 Series ProSAFE Managed Switches Format show capture packets Mode Privileged EXEC Serviceability Packet Tracing Commands These commands improve the capability of network engineers to diagnose conditions affecting their managed switch product. CAUTION: The output of the debug commands can be long and might adversely affect system performance. debug arp Use this command to enable ARP debug protocol messages. Default disabled Format debug arp Mode Privileged EXEC no debug arp Use this command to disable ARP debug protocol messages. Format no debug arp Mode Privileged EXEC debug auto-voip Use this command to enable Auto VoIP debug messages. Use the optional parameters to trace H323, SCCP, or SIP packets respectively. Default disabled Format debug auto-voip [H323 | SCCP | SIP] Mode Privileged EXEC Utility Commands 403 M4100 Series ProSAFE Managed Switches no debug auto-voip Use this command to disable Auto VoIP debug messages. Format no debug auto-voip Mode Privileged EXEC debug clear This command disables all previously enabled debug traces. Default disabled Format debug clear Mode Privileged EXEC debug console This command enables the display of debug trace output on the login session in which it is executed. Debug console display must be enabled in order to view any trace output. The output of debug trace commands will appear on all login sessions for which debug console has been enabled. The configuration of this command remains in effect for the life of the login session. The effect of this command is not persistent across resets. Default disabled Format debug console Mode Privileged EXEC no debug console This command disables the display of “debug” trace output on the login session in which it is executed. Format no debug console Mode Privileged EXEC debug crashlog Use this command to view information contained in the crash log file that the system maintains when it experiences an unexpected reset. The crash log file contains the following information: • Call stack information in both primitive and verbose forms • Log Status • Buffered logging Utility Commands 404 M4100 Series ProSAFE Managed Switches • Event logging • Persistent logging • System Information (output of sysapiMbufDump) • Message Queue Debug Information • Memory Debug Information • Memory Debug Status • OS Information (output of osapiShowTasks) • /proc information (meminfo, cpuinfo, interrupts, version and net/sockstat) Format debug crashlog {[kernel] <crashlog-number> [upload <url>] | proc | verbose | deleteall} Mode Privileged EXEC Default Disabled Parameter Definition kernel View the crash log file for the kernel. <crashlog-number> Specifies the file number to view. The system maintains up to four copies, and the valid range is 1–4. upload <url> To upload the crash log to a TFTP server, use the upload keyword and specify the required TFTP server information. proc View the application process crashlog. verbose Enable the verbose crashlog deleteall Delete all crash log files on the system. debug dhcp packet Use this command to display debug information about DHCPv4 client activities and trace DHCPv4 packets to and from the local DHCPv4 client. Default disabled Format debug dhcp packet [transmit | receive] Mode Privileged EXEC no debug dhcp Use this command to disable the display of debug trace output for DHCPv4 client activity. Format no debug dhcp packet [transmit | receive] Mode Privileged EXEC Utility Commands 405 M4100 Series ProSAFE Managed Switches debug dot1x packet Use this command to enable dot1x packet debug trace. Default disabled Format debug dot1x Mode Privileged EXEC no debug dot1x packet Use this command to disable dot1x packet debug trace. Format no debug dot1x Mode Privileged EXEC debug igmpsnooping packet This command enables tracing of IGMP Snooping packets received and transmitted by the switch. Default disabled Format debug igmpsnooping packet Mode Privileged EXEC no debug igmpsnooping packet This command disables tracing of IGMP Snooping packets. Format no debug igmpsnooping packet Mode Privileged EXEC debug igmpsnooping packet transmit This command enables tracing of IGMP Snooping packets transmitted by the switch. Snooping should be enabled on the device and the interface in order to monitor packets for a particular interface. Default disabled Format debug igmpsnooping packet transmit Mode Privileged EXEC Utility Commands 406 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #debug igmpsnooping packet transmit <15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116) 908 % Pkt TX - Intf: 0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:00 Dest_Mac: 01:00:5e:00:00:01 Src_IP: 9.1.1.1 Dest_IP: 225.0.0.1 Type: V2_Membership_Report Group: 225.0.0.1 The parameters that are shown in the following table are displayed in the trace message. Parameter Definition TX A packet transmitted by the device. Intf The interface that the packet went out on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. Src_Mac Source MAC address of the packet. Dest_Mac Destination multicast MAC address of the packet. Src_IP The source IP address in the IP header in the packet. Dest_IP The destination multicast IP address in the packet. Type The type of IGMP packet. Type can be one of the following: • Membership Query. IGMP Membership Query • V1_Membership_Report. IGMP Version 1 Membership Report • V2_Membership_Report. IGMP Version 2 Membership Report • V3_Membership_Report. IGMP Version 3 Membership Report • V2_Leave_Group. IGMP Version 2 Leave Group Group Multicast group address in the IGMP header. no debug igmpsnooping transmit This command disables tracing of transmitted IGMP snooping packets. Format no debug igmpsnooping transmit Mode Privileged EXEC debug igmpsnooping packet receive This command enables tracing of IGMP Snooping packets received by the switch. Snooping should be enabled on the device and the interface in order to monitor packets for a particular interface. Default disabled Format debug igmpsnooping packet receive Mode Privileged EXEC Utility Commands 407 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #debug igmpsnooping packet receive <15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116) 908 % Pkt RX - Intf: 0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:10 Dest_Mac: 01:00:5e:00:00:05 Src_IP: 11.1.1.1 Dest_IP: 225.0.0.5 Type: Membership_Query Group: 225.0.0.5 The parameters that are shown in the following table are displayed in the trace message. Parameter Definition RX A packet received by the device. Intf The interface that the packet went out on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. Src_Mac Source MAC address of the packet. Dest_Mac Destination multicast MAC address of the packet. Src_IP The source IP address in the ip header in the packet. Dest_IP The destination multicast ip address in the packet. Type The type of IGMP packet. Type can be one of the following: • Membership Query. IGMP Membership Query • V1_Membership_Report. IGMP Version 1 Membership Report • V2_Membership_Report. IGMP Version 2 Membership Report • V3_Membership_Report. IGMP Version 3 Membership Report • V2_Leave_Group. IGMP Version 2 Leave Group Group Multicast group address in the IGMP header. no debug igmpsnooping receive This command disables tracing of received IGMP Snooping packets. Format no debug igmpsnooping receive Mode Privileged EXEC debug ip acl Use this command to enable debug of IP Protocol packets matching the ACL criteria. Default disabled Format debug ip acl <acl-number> Mode Privileged EXEC Utility Commands 408 M4100 Series ProSAFE Managed Switches no debug ip acl Use this command to disable debug of IP Protocol packets matching the ACL criteria. Format no debug ip acl <acl-number> Mode Privileged EXEC debug ip dvmrp packet Use this command to trace DVMRP packet reception and transmission. If you use the receive option, only received DVMRP packets are traced. If you use the transmit option, only transmitted DVMRP packets are traced. When neither keyword is used in the command, then all DVMRP packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ip dvmrp packet [receive | transmit] Mode Privileged EXEC no debug ip dvmrp packet Use this command to disable debug tracing of DVMRP packet reception and transmission. Format no debug ip dvmrp packet [receive | transmit] Mode Privileged EXEC debug ip igmp packet Use this command to trace IGMP packet reception and transmission. If you use the receive option, only received IGMP packets are traced. If you use the transmit option, only transmitted IGMP packets are traced. When neither keyword is used in the command, then all IGMP packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ip igmp packet [receive | transmit] Mode Privileged EXEC Utility Commands 409 M4100 Series ProSAFE Managed Switches no debug ip igmp packet Use this command to disable debug tracing of IGMP packet reception and transmission. Format no debug ip igmp packet [receive | transmit] Mode Privileged EXEC debug ip mcache packet Use this command for tracing MDATA packet reception and transmission. If you use the receive option, only received MDATA packets are traced. If you use the transmit option, only transmitted MDATA packets are traced. When neither keyword is used in the command, then all data packet traces are dumped. Vital information such as source address, destination address, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ip mcache packet [receive | transmit] Mode Privileged EXEC no debug ip mcache packet Use this command to disable debug tracing of MDATA packet reception and transmission. Format no debug ip mcache packet [receive | transmit] Mode Privileged EXEC debug ip pimdm packet Use this command to trace PIMDM packet reception and transmission. If you use the receive option, only received PIMDM packets are traced. If you use the transmit option, only transmitted PIMDM packets are traced. When neither keyword is used in the command, then all PIMDM packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ip pimdm packet [receive | transmit] Mode Privileged EXEC Utility Commands 410 M4100 Series ProSAFE Managed Switches no debug ip pimdm packet Use this command to disable debug tracing of PIMDM packet reception and transmission. Format no debug ip pimdm packet [receive | transmit] Mode Privileged EXEC debug ip pimsm packet Use this command to trace PIMSM packet reception and transmission. Use this command to trace PIMSM packet reception and transmission. If you use the receive option, only received PIMSM packets are traced. If you use the transmit option, only transmitted PIMDM packets are traced. When neither keyword is used in the command, then all PIMSM packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ip pimsm packet [receive | transmit] Mode Privileged EXEC no debug ip pimsm packet Use this command to disable debug tracing of PIMSM packet reception and transmission. Format no debug ip pimsm packet [receive | transmit] Mode Privileged EXEC debug ip vrrp Use this command to enable VRRP debug protocol messages. Default disabled Format debug ip vrrp Mode Privileged EXEC no debug ip vrrp Use this command to disable VRRP debug protocol messages. Format no debug ip vrrp Mode Privileged EXEC Utility Commands 411 M4100 Series ProSAFE Managed Switches debug ipv6 dhcp Use this command to display debug information about DHCPv6 client activities and trace DHCPv6 packets to and from the local DHCPv6 client. Default disabled Format debug ipv6 dhcp Mode Privileged EXEC no ipv6 debug dhcp Use this command to disable the display of debug trace output for DHCPv6 client activity. Format no debug ipv6 dhcp Mode Privileged EXEC debug ipv6 mcache packet Use this command to trace MDATAv6 packet reception and transmission. If you use the receive option, only received MDATAv6 packets are traced. If you use the transmit option, only transmitted MDATAv6 packets are traced. When neither keyword is used in the command, then all data packet traces are dumped. Vital information such as source address, destination address, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ipv6 mcache packet [receive | transmit] Mode Privileged EXEC no debug ipv6 mcache packet Use this command to disable debug tracing of MDATAv6 packet reception and transmission. Format no debug ipv6 mcache packet [receive | transmit] Mode Privileged EXEC debug ipv6 mld packet Use this command to trace MLDv6 packet reception and transmission. If you use the receive option, only received MLDv66 packets are traced. If you use the transmit option, only transmitted MLDv6 packets are traced. When neither keyword is used in the command, then all MLDv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Utility Commands 412 M4100 Series ProSAFE Managed Switches Default disabled Format debug ipv6 mld packet [receive | transmit] Mode Privileged EXEC no debug ipv6 mld packet Use this command to disable debug tracing of MLDv6 packet reception and transmission. Format no debug ipv6 mld packet [receive | transmit] Mode Privileged EXEC debug ipv6 pimdm packet Use this command to trace PIMDMv6 packet reception and transmission. If you use the receive option, only received PIMDMv6 packets are traced. If you use the transmit option, only transmitted PIMDMv6 packets are traced. When neither keyword is used in the command, then all PIMDMv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Default disabled Format debug ipv6 pimdm packet [receive | transmit] Mode Privileged EXEC no debug ipv6 pimdm packet Use this command to disable debug tracing of PIMDMv6 packet reception and transmission. Format no debug ipv6 pimdm packet [receive | transmit] Mode Privileged EXEC debug ipv6 pimsm packet Use this command to trace PIMSMv6 packet reception and transmission. If you use the receive option, only received PIMSMv6 packets are traced. If you use the transmit option, only transmitted PIMSMv6 packets are traced.When neither keyword is used in the command, then all PIMSMv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Utility Commands 413 M4100 Series ProSAFE Managed Switches Default disabled Format debug ipv6 pimsm packet [receive | transmit] Mode Privileged EXEC no debug ipv6 pimsm packet Use this command to disable debug tracing of PIMSMv6 packet reception and transmission. Format no debug ipv6 pimsm packet [receive | transmit] Mode Privileged EXEC debug lacp packet This command enables tracing of LACP packets received and transmitted by the switch. Default disabled Format debug lacp packet Mode Privileged EXEC Command example: (NETGEAR Switch) #debug lacp packet <15> JAN 01 14:04:51 10.254.24.31-1 DOT3AD[183697744]: dot3ad_debug.c(385) 58 %% Pkt TX - Intf: 0/1(1), Type: LACP, Sys: 00:11:88:14:62:e1, State: 0x47, Key: 0x36 no debug lacp packet This command disables tracing of LACP packets. Format no debug lacp packet Mode Privileged EXEC debug mldsnooping packet Use this command to trace MLD snooping packet reception and transmission. f you use the receive option, only received MLD packets are traced. If you use the transmit option, only transmitted MLD packets are traced. When neither keyword is used in the command, then all MLD snooping packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console. Utility Commands 414 M4100 Series ProSAFE Managed Switches Default disabled Format debug mldsnooping packet [receive | transmit] Mode Privileged EXEC no debug mldsnooping packet Use this command to disable debug tracing of MLD snooping packet reception and transmission. Format no debug mldsnooping packet [receive | transmit] Mode Privileged EXEC debug ospf packet This command enables tracing of OSPF packets received and transmitted by the switch. Default disabled Format debug ospf packet Mode Privileged EXEC Command example: (NETGEAR Switch) #debug ospf packet <15> JAN 02 11:03:31 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25430 % Pkt RX Intf:2/0/48 Src Ip:192.168.50.2 DestIp:224.0.0.5 AreaId:0.0.0.0 Type:HELLO NetMask:255.255.255.0 DesigRouter:0.0.0.0 Backup:0.0.0.0 <15> JAN 02 11:03:35 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25431 % Pkt TX Intf:2/0/48 Src Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:DB_DSCR Mtu:1500 Options:E Flags: I/M/MS Seq:126166 <15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25434 % Pkt RX Intf:2/0/48 Src Ip:192.168.50.2 DestIp:192.168.50.1 AreaId:0.0.0.0 Type:LS_REQ Length: 1500 <15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25435 % Pkt TX Intf:2/0/48 Src Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:LS_UPD Length: 1500 Utility Commands 415 M4100 Series ProSAFE Managed Switches The parameters that are shown in the following table are displayed in the trace message. Parameter Definition TX/RX TX refers to a packet transmitted by the device. RX refers to packets received by the device. Intf The interface that the packet came in or went out on. Format used is slot/port (internal interface number). SrcIp The source IP address in the IP header of the packet. DestIp The destination IP address in the IP header of the packet. AreaId The area ID in the OSPF header of the packet. Type Could be one of the following: • HELLO. Hello packet • DB_DSCR. Database descriptor • LS_REQ. LS Request • LS_UPD. LS Update • LS_ACK. LS Acknowledge The remaining fields in the trace message are specific to the OSPF packets. For HELLO packet field definitions, the parameters that are shown in the following table are displayed in the trace message. Parameter Definition Netmask The netmask in the hello packet. DesignRouter Designated Router IP address. Backup Backup router IP address. For DB_DSCR packet field definitions, the parameters that are shown in the following table are displayed in the trace message. Field Definition MTU MTU Options Options in the OSPF packet. Flags Could be one or more of the following: • I. Init • M. More • MS. Master/Slave Seq Sequence Number of the DD packet. Utility Commands 416 M4100 Series ProSAFE Managed Switches For LS_REQ packet field definitions, the parameter that is shown in the following table is displayed in the trace message. Field Definition Length Length of packet For LS_UPD packet field definitions, the parameter that is shown in the following table is displayed in the trace message. Field Definition Length Length of packet For LS_ACK packet field definitions, the parameter that is shown in the following table is displayed in the trace message. Field Definition Length Length of packet no debug ospf packet This command disables tracing of OSPF packets. Format no debug ospf packet Mode Privileged EXEC debug ipv6 ospfv3 packet Use this command to enable OSPFv3 packet debug trace. Default disabled Format debug ipv6 ospfv3 packet Mode Privileged EXEC no debug ipv6 ospfv3 packet Use this command to disable tracing of OSPFv3 packets. Format no debug ipv6 ospfv3 packet Mode Privileged EXEC Utility Commands 417 M4100 Series ProSAFE Managed Switches debug ping packet This command enables tracing of ICMP echo requests and responses. The command traces pings on the network port or service port for switching packages. For routing packages, pings are traced on the routing ports as well. Default disabled Format debug ping packet Mode Privileged EXEC Command example: (NETGEAR Switch) #debug ping packet <15> JAN 01 00:21:22 192.168.17.29-1 SIM[181040176]: sim_debug.c(128) 20 % Pkt TX - Intf: 0/1(1), SRC_IP:10.50.50.2, DEST_IP:10.50.50.1, Type:ECHO_REQUEST <15> JAN 01 00:21:22 192.168.17.29-1 SIM[182813968]: sim_debug.c(82) 21 % Pkt RX - Intf: 0/1(1), S RC_IP:10.50.50.1, DEST_IP:10.50.50.2, Type:ECHO_REPLY The parameters that are shown in the following table are displayed in the trace message. Parameter Definition TX/RX TX refers to a packet transmitted by the device. RX refers to packets received by the device. Intf The interface that the packet came in or went out on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. SRC_IP The source IP address in the IP header in the packet. DEST_IP The destination IP address in the IP header in the packet. Type Type determines whether or not the ICMP message is a REQUEST or a RESPONSE. no debug ping packet This command disables tracing of ICMP echo requests and responses. Format no debug ping packet Mode Privileged EXEC Utility Commands 418 M4100 Series ProSAFE Managed Switches debug rip packet This command turns on tracing of RIP requests and responses. This command takes no options. The output is directed to the log file. Default disabled Format debug rip packet Mode Privileged EXEC Command example: (NETGEAR Switch) #debug rip packet <15> JAN 01 00:35:15 192.168.17.29-1 RIP[181783160]: rip_map_debug.c(96) 775 % Pkt RX on Intf: 0/1(1), Src_IP:43.1.1.1 Dest_IP:43.1.1.2 Rip_Version: RIPv2 Packet_Type:RIP_RESPONSE ROUTE 1): Network: 10.1.1.0 Mask: 255.255.255.0 Metric: 1 ROUTE 2): Network: 40.1.0.0 Mask: 255.255.0.0 Metric: 1 ROUTE 3): Network: 10.50.50.0 Mask: 255.255.255.0 Metric: 1 ROUTE 4): Network: 41.1.0.0 Mask: 255.255.0.0 Metric: 1 ROUTE 5): Network:42.0.0.0 Mask:255.0.0.0 Metric:1 Another 6 routes present in packet not displayed. The parameters that are shown in the following table are displayed in the trace message. Parameter Definition TX/RX TX refers to a packet transmitted by the device. RX refers to packets received by the device. Intf The interface that the packet came in or went out on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. Src_IP The source IP address in the IP header of the packet. Dest_IP The destination IP address in the IP header of the packet. Rip_Version RIP version used <RIPv1 or RIPv2>. Packet_Type Type of RIP packet. <RIP_REQUEST or RIP_RESPONSE>. Routes Up to 5 routes in the packet are displayed in the following format: Network: <a.b.c.d> Mask <a.b.c.d> Next_Hop <a.b.c.d> Metric <a> The next hop is only displayed if it is different from 0.0.0.0. For RIPv1 packets, Mask is always 0.0.0.0. Number of routes not printed Only the first five routes present in the packet are included in the trace. There is another notification of the number of additional routes present in the packet that were not included in the trace. Utility Commands 419 M4100 Series ProSAFE Managed Switches no debug rip packet This command disables tracing of RIP requests and responses. Format no debug rip packet Mode Privileged EXEC debug sflow packet Use this command to enable sFlow debug packet trace. Default disabled Format debug sflow packet Mode Privileged EXEC no debug sflow packet Use this command to disable sFlow debug packet trace. Format no debug sflow packet Mode Privileged EXEC debug spanning-tree bpdu This command enables tracing of spanning tree BPDUs received and transmitted by the switch. Default disabled Format debug spanning-tree bpdu Mode Privileged EXEC no debug spanning-tree bpdu This command disables tracing of spanning tree BPDUs. Format no debug spanning-tree bpdu Mode Privileged EXEC Utility Commands 420 M4100 Series ProSAFE Managed Switches debug spanning-tree bpdu receive This command enables tracing of spanning tree BPDUs received by the switch. Spanning tree should be enabled on the device and on the interface in order to monitor packets for a particular interface. Default disabled Format debug spanning-tree bpdu receive Mode Privileged EXEC Command example: (NETGEAR Switch) #debug spanning-tree bpdu receive <15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt RX - Intf: 0/9(9), Source_Mac: 00:11:88:4e:c2:10 Version: 3, Root Mac: 00:11:88:4e:c2:00, Root Priority: 0x8000 Path Cost: 0 The parameters that are shown in the following table are displayed in the trace message. Parameter Definition RX A packet received by the device. Intf The interface that the packet came in on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. Source_Mac Source MAC address of the packet. Version Spanning tree protocol version (0-3). 0 refers to STP, 2 RSTP and 3 MSTP. Root_Mac MAC address of the CIST root bridge. Root_Priority Priority of the CIST root bridge. The value is between 0 and 61440. It is displayed in hex in multiples of 4096. Path_Cost External root path cost component of the BPDU. no debug spanning-tree bpdu receive This command disables tracing of received spanning tree BPDUs. Format no debug spanning-tree bpdu receive Mode Privileged EXEC Utility Commands 421 M4100 Series ProSAFE Managed Switches debug spanning-tree bpdu transmit This command enables tracing of spanning tree BPDUs transmitted by the switch. Spanning tree should be enabled on the device and on the interface in order to monitor packets on a particular interface. Default disabled Format debug spanning-tree bpdu transmit Mode Privileged EXEC Command example: (NETGEAR Switch) #debug spanning-tree bpdu transmit <15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt TX - Intf: 0/7(7), Source_Mac: 00:11:88:4e:c2:00 Version: 3, Root_Mac: 00:11:88:4e:c2:00, Root_Priority: 0x8000 Path_Cost: 0 The parameters that are shown in the following table are displayed in the trace message. Parameter Definition TX A packet transmitted by the device. Intf The interface that the packet went out on. Format used is slot/port (internal interface number). Unit is always shown as 1 for interfaces on a non-stacking device. Source_Mac Source MAC address of the packet. Version Spanning tree protocol version (0-3). 0 refers to STP, 2 RSTP and 3 MSTP. Root_Mac MAC address of the CIST root bridge. Root_Priority Priority of the CIST root bridge. The value is from 0 through 61,440. It is displayed in hex in multiples of 4096. Path_Cost External root path cost component of the BPDU. no debug spanning-tree bpdu transmit This command disables tracing of transmitted spanning tree BPDUs. Format no debug spanning-tree bpdu transmit Mode Privileged EXEC Utility Commands 422 M4100 Series ProSAFE Managed Switches debug udld packet This command enables debugging on the received and transmitted UDLD PDUs. Default Disabled Format default udld packet receive Mode Privileged EXEC no debug udld packet This command disables debugging on the received and transmitted UDLD PDUs. Format debug udld packet receive Mode Privileged EXEC debug udld packet receive This command enables debugging on the received UDLD PDUs. Default Disabled Format default udld packet receive Mode Privileged EXEC no debug udld packet receive This command disables debugging on the received UDLD PDUs. Format debug udld packet receive Mode Privileged EXEC debug udld packet transmit This command enables debugging on the transmitted UDLD PDUs. Default Disabled Format default udld packet transmit Mode Privileged EXEC Utility Commands 423 M4100 Series ProSAFE Managed Switches no debug udld packet transmit This command enables debugging on the transmitted UDLD PDUs. Format debug udld packet transmit Mode Privileged EXEC debug aaa accounting This command is useful for debugging accounting configuration and functionality in User Manager. Format debug aaa accounting Mode Privileged EXEC no debug aaa accounting Use this command to turn off debugging of User Manager accounting functionality. Format no debug aaa accounting Mode Privileged EXEC debug aaa authorization This command is useful for debugging authorization configuration and functionality in User Manager. Format debug aaa authorization [commands | exec] Mode Privileged EXEC no debug aaa authorization Use this command to turn off debugging of User Manager authorization functionality. Format no debug aaa authorization Mode Privileged EXEC Utility Commands 424 M4100 Series ProSAFE Managed Switches Cable Test Command The cable test feature enables you to determine the cable connection status on a selected port. Note: The cable test feature is supported only for copper cable. It is not supported for optical fiber cable. If the port has an active link while the cable test is run, the link can go down for the duration of the test. cablestatus This command returns the status of the specified port. Format cablestatus <slot/port> Mode Privileged EXEC Field Description Cable Status One of the following statuses is returned: • Normal. The cable is working correctly. • Open. The cable is disconnected or there is a faulty connector. • Short. There is an electrical short in the cable. • Cable Test Failed. The cable status could not be determined. The cable may in fact be working. Cable Length If this feature is supported by the PHY for the current link speed, the cable length is displayed as a range between the shortest estimated length and the longest estimated length. Note that if the link is down and a cable is attached to a 10/100 Ethernet adapter, then the cable status may display as Open or Short because some Ethernet adapters leave unused wire pairs unterminated or grounded. Unknown is displayed if the cable length could not be determined. sFlow Commands sFlow is the standard for monitoring high-speed switched and routed networks. sFlow technology is built into network equipment and gives complete visibility into network activity, enabling effective management and control of network resources. Utility Commands 425 M4100 Series ProSAFE Managed Switches sflow receiver Use this command to configure the sFlow collector parameters (owner string, receiver time-out, maximum datagram size, IP address, and port) for a poller. Format sflow receiver <rcvr_idx> {owner <owner-string> {timeout <rcvr_timeout> | notimeout} | maxdatagram <size> | ip <ip> | port <port>} Mode Global Config Field Description Receiver Index The sFlow Receiver for this sFlow sampler to which flow samples are to be sent. A value of zero (0) means that no receiver is configured, no packets will be sampled. Only active receivers can be set. If a receiver expires, then all samplers associated with the receiver will also expire. Possible values are 1-8. The default is 0. Receiver Owner The identity string for the receiver, the entity making use of this sFlowRcvrTable entry. The range is 127 characters. The default is a null string. The empty string indicates that the entry is currently unclaimed and the receiver configuration is reset to the default values. An entity wishing to claim an sFlowRcvrTable entry must ensure that the entry is unclaimed before trying to claim it. The entry is claimed by setting the owner string to a non-null value. The entry must be claimed before assigning a receiver to a sampler or poller. Receiver Timeout The time, in seconds, remaining before the sampler or poller is released and stops sending samples to receiver. A management entity wanting to maintain control of the sampler is responsible for setting a new value before the old one expires. The allowed range is 0-4294967295 seconds. The default is zero (0). Receiver Max Datagram Size The maximum number of data bytes that can be sent in a single sample datagram. The management entity should set this value to avoid fragmentation of the sFlow datagrams. The allowed range is 200 –9,116). The default is 1400. Receiver IP The sFlow receiver IP address. If set to 0.0.0.0, no sFlow datagrams will be sent. The default is 0.0.0.0. Receiver Port The destination Layer4 UDP port for sFlow datagrams. The range is 1-65535. The default is 6343. no sflow receiver Use this command to set the sFlow collector parameters back to the defaults. Format no sflow receiver <rcvr_idx> [owner | maxdatagram | ip | port] Mode Global Config Utility Commands 426 M4100 Series ProSAFE Managed Switches sflow sampler A data source configured to collect flow samples is called a poller. Use this command to configure a new sFlow sampler instance for this data source if <rcvr-idx> is valid. Format sflow sampler {<rcvr-indx> | rate <sampling-rate> | maxheadersize <size>} Mode Interface Config Field Description Receiver Index The sFlow Receiver for this sFlow sampler to which flow samples are to be sent. A value of zero (0) means that no receiver is configured, no packets will be sampled. Only active receivers can be set. If a receiver expires, then all samplers associated with the receiver will also expire. Possible values are 1-8. The default is 0. Sampling Rate The statistical sampling rate for packet sampling from this source. A value of zero (0) disables sampling. A value of N means that out of N incoming packets, 1 packet will be sampled. The range is 1024-65536 and 0. The default is 0. When you issue a show command for the sampling rate, the configured sampling rate on an interface changes. Each time that you configure a sampling rate, a threshold value is calculated. This threshold value is configured in the hardware register. When you issue a show command for the sampling rate, the threshold value is queried from the hardware and the sampling rate is calculated in the following way: threshold value = 2^24/ (sampling rate) Because only an integer operation is supported, the sampling rate is not the same as the configured value. The following is an example: configured sampling rate is 60000 threshold value = 2^24/ (60000) = 279 (from integer division) recalculated sampling rate = 2^24/ (279) = 60133 Maxheadersize The maximum number of bytes that should be copied from the sampler packet. The range is 20-256. The default is 128. When set to zero (0), all the sampler parameters are set to their corresponding default value. no sflow sampler Use this command to reset the sFlow sampler instance to the default settings. Format no sflow sampler {<rcvr-indx> | rate <sampling-rate> | maxheadersize <size>} Mode Interface Config Utility Commands 427 M4100 Series ProSAFE Managed Switches sflow poller A data source configured to collect counter samples is called a poller. Use this command to enable a new sFlow poller instance for this data source if <rcvr-idx> is valid. Format sflow poller {<rcvr-indx> | interval <poll-interval>} Mode Interface Config Field Description Receiver Index Enter the sFlow Receiver associated with the sampler/poller. A value of zero (0) means that no receiver is configured. The range is 1-8. The default is 0. Poll Interval Enter the sFlow instance polling interval. A poll interval of zero (0) disables counter sampling. When set to zero (0), all the poller parameters are set to their corresponding default value. The range is 0-86400. The default is 0. A value of N means once in N seconds a counter sample is generated. no sflow poller Use this command to reset the sFlow poller instance to the default settings. Format no sflow poller {<rcvr-indx> | interval <poll-interval>} Mode Interface Config show sflow agent The sFlow agent collects time-based sampling of network interface statistics and flow-based samples. These are sent to the configured sFlow receivers. Use this command to display the sFlow agent information. Format show sflow agent Mode Privileged EXEC Field Description sFlow Version Uniquely identifies the version and implementation of this MIB. The version string must have the following structure: MIB Version; Organization; Software Revision where: • MIB Version: ‘1.3’, the version of this MIB. • Organization: Netgear. • Revision: 1.0 IP Address The IP address associated with this agent. Utility Commands 428 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show sflow agent sFlow Version.................................. 1.3;Netgear;1.0 IP Address..................................... 10.131.12.66 show sflow pollers Use this command to display the sFlow polling instances created on the switch. Use “-” for range. Format show sflow pollers Mode Privileged EXEC Field Description Poller Data Source The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical ports only. Receiver Index The sFlowReceiver associated with this sFlow counter poller. Poller Interval The number of seconds between successive samples of the counters associated with this data source. show sflow receivers Use this command to display configuration information related to the sFlow receivers. Format show sflow receivers [<index>] Mode Privileged EXEC Field Description Receiver Index The sFlow Receiver associated with the sampler/poller. Owner String The identity string for receiver, the entity making use of this sFlowRcvrTable entry. Time Out The time (in seconds) remaining before the receiver is released and stops sending samples to sFlow receiver. Max Datagram Size The maximum number of bytes that can be sent in a single sFlow datagram. Port The destination Layer4 UDP port for sFlow datagrams. IP Address The sFlow receiver IP address. Utility Commands 429 M4100 Series ProSAFE Managed Switches Field Description Address Type The sFlow receiver IP address type. For an IPv4 address, the value is 1 and for an IPv6 address, the value is 2. Datagram Version The sFlow protocol version to be used while sending samples to sFlow receiver. Command example: (NETGEAR Switch) #show sflow receivers 1 Receiver Index................................. Owner String................................... Time out....................................... IP Address:.................................... Address Type................................... Port........................................... Datagram Version............................... Maximum Datagram Size.......................... 1 0 0.0.0.0 1 6343 5 1400 show sflow samplers Use this command to display the sFlow sampling instances created on the switch. Format show sflow samplers Mode Privileged EXEC Field Description Sampler Data Source The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical ports only. Receiver Index The sFlowReceiver configured for this sFlow sampler. Packet Sampling The statistical sampling rate for packet sampling from this source. Rate Max Header Size The maximum number of bytes that should be copied from a sampled packet to form a flow sample. Utility Commands 430 M4100 Series ProSAFE Managed Switches IP Address Conflict Commands ip address-conflict-detect run This command triggers the switch to run active address conflict detection by sending gratuitous ARP packets for IPv4 addresses on the switch. Note: This command takes effect only once after it is executed and cannot be saved across power cycles. Format ip address-conflict-detect run Mode Global Config show ip address-conflict This command displays the status information corresponding to the last detected address conflict. Format show ip address-conflict Modes Privileged EXEC Term Definition Address Conflict Identifies whether the switch has detected an address conflict on any IP address. Detection Status Last Conflicting IP Address The IP Address that was last detected as conflicting on any interface. Last Conflicting MAC Address The MAC Address of the conflicting host that was last detected on any interface. Time Since The time in days, hours, minutes and seconds since the last address conflict was Conflict Detected detected. clear ip address-conflict-detect This command clears the detected address conflict status information. Format clear ip address-conflict-detect Mode Privileged EXEC Utility Commands 431 M4100 Series ProSAFE Managed Switches RMON Stats and History Commands The various MIBs within RFC 2819, 3273, and 3434 are arranged into groups. The managed switch supports some of the groups in these RFCs but not all. The managed switch complies with MODULE-COMPLIANCE and OBJECT-GROUP definitions within these RFCs for supporting individual groups. The managed switch supports the following groups: • RFC 2819 - Group 1 - Statistics Contains cumulative traffic and error statistics. - Group 2 - History Generates reports from periodic traffic sampling that are useful for analyzing trends. This group includes History Control Group and Ethernet History Group. - Group 3 - Alarm Enables the definition and setting of thresholds for various counters. Thresholds can be passed in either a rising or falling direction on existing MIB objects, primarily those in the Statistics group. An alarm is triggered when a threshold is crossed and the alarm is passed to the Event group. The Alarm requires the Event Group. - Group 9 - Event Controls the actions that are taken when an event occurs. RMON events occur when: • • A threshold (alarm) is exceeded • There is a match on certain filters. RFC 3273 - Group 1 - Media Independent Group Contains media-independent statistics that provide information for full and/or half-duplex links as well as high capacity links. - Group 2 - Ether Stats High Capacity Group Contains the High Capacity RMON extensions to RMON-1 etherStatsTable (RFC 2819 Group 1). - Group 3 - Ether History High Capacity Group Contains the High Capacity RMON extensions to RMON-1 etherHistoryTable (RFC 2819 Group 2). • RFC 3434 - Group 1 - High Capacity Alarm Control Group Controls the configuration of alarms for high capacity MIB object instances. Utility Commands 432 M4100 Series ProSAFE Managed Switches - Group 2 - High Capacity Alarm Capabilities Group Describes the high capacity alarm capabilities provided by the agent. - Group 3 - High Capacity Alarm Notifications Group Provides new rising and falling threshold notifications for high capacity objects. rmon alarm This command sets the RMON alarm entry in the RMON alarm MIB group. Format rmon alarm <alarm-number> <variable> <sample-interval> <sampling-type> {rising-threshold <value>} {falling-threshold <value>} [startup {rising | falling | rising-falling}] [owner <string>] Mode Global Config Parameter Description <alarm-number> The alarm number that identifies the alarm. <variable> The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive type of integer. <sample-interval> The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. The range is 0 to 2147483647. The default is 0. <sampling-type> The alarm sample type. The method of sampling the selected variable and calculating the value to be compared against thresholds. Possible types are Absolute or Delta. rising-threshold <value> The alarm rising threshold for the sample statistics. falling-threshold <value> The alarm falling threshold for the sample statistics. [startup {rising | falling | rising-falling}] The alarm that may be sent. Possible values are Rising Alarm, Falling Alarm, or both. owner <string> The alarm owner. The owner string associated with the alarm entry. no rmon alarm This command deletes the RMON alarm entry. Format no rmon alarm <alarm number> Mode Global Config Utility Commands 433 M4100 Series ProSAFE Managed Switches rmon hcalarm This command sets the RMON hcalarm entry in the High Capacity RMON alarm MIN group. Format rmon hcalarm <alarm-number> <variable> <sample-interval> <sampling-type> {rising-threshold high <value>} {rising-threshold low <value>} {falling-threshold high <value>} {falling-threshold low <value>} [startup {rising | falling | rising-falling}] [owner <string>] Mode Global Config Parameter Description <alarm-number> The identifier of the hcalarm instance. <variable> The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive type of integer. <sample-interval> The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. The range is 1to 2147483647. <sampling-type>larm Sample Type The method of sampling the selected variable and calculating the value to be compared against thresholds. Possible types are Absolute or Delta. rising-threshold high <value> High capacity alarm rising threshold absolute value high. The upper 32 bits of the absolute value for threshold for the sampled statistics. rising-threshold low <value> High capacity alarm rising threshold absolute value low. The lower 32 bits of the absolute value for threshold for the sampled statistics. falling-threshold high <value> High capacity alarm falling threshold absolute value high. The upper 32 bits of the absolute value for threshold for the sampled statistic. falling-threshold low <value> High capacity alarm falling threshold absolute value high. The upper 32 bits of the absolute value for threshold for the sampled statistic. [startup {rising | falling | rising-falling}] High capacity alarm startup alarm that may be sent. Possible values are Rising Alarm, Falling Alarm or both. [owner <string>] High capacity alarm owner. The owner string associated with the entry. no rmon hcalarm This command deletes the RMON hcalarm entry. Format no rmon hcalarm <alarm number> Mode Global Config Utility Commands 434 M4100 Series ProSAFE Managed Switches rmon event This command sets the RMON event entry in the RMON event MIB group. Format rmon event <event-number> [description <string> | log | owner <string> | trap <community>] Mode Global Config Parameter Description <event number> An index number that uniquely identifies an entry in the event table. Each such entry defines one event that is to be generated when the appropriate conditions occur. The range is 1 to 65535. description <string> A comment describing the event entry. The default is alarmEvent. log Creates a log entry owner <string> The owner string that is associated with the entry. The default is monitorEvent. The SNMP community, which is specified by an octet string that is used to send an SNMP trap. The default is public. trap <community> no rmon event This command deletes the RMON event entry. Format no rmon event <event number> Mode Global Config rmon collection history This command sets the history control parameters of the RMON historyControl MIB group. Format rmon collection history <index number> buckets <1-65535> | interval <1-3600> | owner <owner> Mode Interface Config no rmon collection history This command deletes the history control group entry with the specified index number. Format no rmon collection history <index number> Mode Interface Config Utility Commands 435 M4100 Series ProSAFE Managed Switches show rmon This command displays the entries in the RMON alarm table. Format show rmon {alarms | alarm <alarm-index>} Mode Privileged Exec show rmon collection history This command displays the entries in the RMON history control table. Format show rmon collection history Mode Privileged Exec show rmon events This command displays the entries in the RMON event table. Format show rmon events Mode Privileged Exec Command example: (NETGEAR Switch) # show rmon events Index Description Type Community Owner Last time sent ------------------------------------------------------------------------------1 test log public MIB 0 days 0 h:0 m:0 s show rmon history This command displays the specified entry in the RMON history table. Format show rmon history <index> {errors | other | throughput} Mode Privileged Exec Command example: (NETGEAR Switch) # show rmon history 1 throughput Sample set: 1 Maximum table size: 270 Time Octets Packets Broadcast Multicast Util -------------------- ---------- --------- --------- ---------- -------- Utility Commands 436 M4100 Series ProSAFE Managed Switches show rmon log This command displays the entries in the RMON log table. Format show rmon log Mode Privileged Exec Command example: (NETGEAR Switch) # show rmon log Maximum table size: 100 Event Description Time ------------------------------------------------ show rmon statistics interface This command displays the RMON statistics for the interface. Format show rmon statistics interface <slot/port> Mode Privileged Exec Command example: (NETGEAR Switch) # show rmon statistics interface 0/1 Interface: 0/1 Dropped: 0 Octets: 0 Packets: 0 Broadcast: 0 Multicast: 0 CRC Align Errors: 0 Collisions: 0 Undersize Pkts: 0 Oversize Pkts: 0 Fragments: 0 Jabbers: 0 64 Octets: 0 65 - 127 Octets: 0 128 - 255 Octets: 0 256 - 511 Octets: 0 512 - 1023 Octets: 0 1024 - 1518 Octets: 0 show rmon hcalarms This command displays the entries in the RMON hcAlarmTable. Format show rmon hcalarms [<alarm index>] Mode Privileged Exec Utility Commands 437 M4100 Series ProSAFE Managed Switches UniDirectional Link Detection Commands The UDLD feature detects unidirectional links physical ports. A unidirectional link is a forwarding anomaly in a Layer 2 communication channel in which a bidirectional link stops passing traffic in one direction. UDLD must be enabled on both sides of the link in order to detect a unidirectional link. The UDLD protocol operates by exchanging packets containing information about neighboring devices. udld enable (Global Config) This command enables UDLD globally on the switch. Default disabled Format udld enable Mode Global Config no udld enable (Global Config) This command disables UDLD globally on the switch. Format no udld enable Mode Global Config udld message time This command configures the interval between UDLD probe messages on ports that are in the advertisement phase. The range is from 7 to 90 seconds. Default 15 Format udld message time <interval> Mode Global Config udld timeout interval This command configures the time interval after which UDLD link is considered to be unidirectional. The range is from 5 to 60 seconds. Default 5 Format udld timeout interval <interval> Mode Global Config Utility Commands 438 M4100 Series ProSAFE Managed Switches udld enable (Interface Config) This command enables UDLD on the specified interface. Default disabled Format udld enable Mode Interface Config no udld enable (Interface Config) This command disables UDLD on the specified interface. Format no udld enable Mode Interface Config udld port This command selects the UDLD mode operating on this interface. If you do not enter the aggressive keyword, the port operates in normal mode. Default normal Format udld port [aggressive] Mode Interface Config udld reset This command resets all interfaces that have been shutdown by UDLD. Format udld reset Mode Privileged EXEC show udld This command displays either the global UDLD settings or the UDLD settings for a specified <slot/port>. If the all keyword is entered, the command displays information for all ports. Format show udld [<slot/port> | all] Mode • • Privileged EXEC User EXEC Utility Commands 439 M4100 Series ProSAFE Managed Switches If you do not enter a value for the <slot/port> parameter, the command output displays the fields that are shown in the following table. Term Definition Admin Mode The global administrative mode of UDLD. Message Interval The time period (in seconds) between the transmission of UDLD probe packets. Timeout Interval The time period (in seconds) before making decision that link is unidirectional. If you enter a value for the <slot/port> parameter or you use the all keyword, the command output displays the fields that are shown in the following table. Term Definition Slot/Port The identifying slot and port of the interface. Admin Mode The administrative mode of UDLD configured on this interface. This is either Enabled or Disabled. UDLD Mode The UDLD mode configured on this interface. This is either Normal or Aggressive. UDLD Status The status of the link as determined by UDLD. The options are: • Undetermined. UDLD has not collected enough information to determine the state of the port. • Not applicable. UDLD is disabled, either globally or on the port • Shutdown. UDLD has detected a unidirectional link and shutdown the port, That is, the port is in an errDisabled state. • Bidirectional. UDLD has detected a bidirectional link. • Undetermined(Link Down). The port would transition into this state when the port link physically goes down due to any reasons other than the port been put into D-Disable mode by UDLD protocol on the switch. USB Commands If there is an USB flash device in the USB slot, the commands display the device status and content. show usb device This command displays USB flash device details. Format show USB device Mode Privileged EXEC Utility Commands 440 M4100 Series ProSAFE Managed Switches Parameter Description Device Status This field specifies the current status of device. Following are possible device status states: • Active. Device is plugged in and the device is recognized if device is not mounted. • Inactive. Device is not mounted. • Invalid. Device is not present or invalid device is plugged in. Manufacturer Manufacturer details. Serial Number Serial number of the device. USB Version Compliance Version of the USB device. Class Code Device Class Subclass Code Device SubClass Protocol Device Protocol Vendor ID Vendor specifies details of device-Vendor ID Product ID Vendor specifies details of device-Product ID Command example: The following is the output if the device is plugged into the USB slot. (NETGEAR Switch) #show USB device Device Status………………………………………………… Manufacturer…………………………………………………… Serial Number………………………………………………… USB Version Compliance………………………… Class Code………………………………………………………… Subclass Code………………………………………………… Protocol……………………………………………………………… Vendor ID…………………………………………………………… Product ID………………………………………………………… Active xxxx yyyyy 2.0 abc acb 0x0 zzzzz aaaaa dir usb This command displays USB device contents and memory statistics. Format dir usb Mode Privileged EXEC Utility Commands 441 M4100 Series ProSAFE Managed Switches Parameter Description Filename File name Filesize File size Total Size USB flash device storage size Bytes Used Indicates size of memory used on the device. Bytes Free Indicates size of memory free on the device Command example: (NETGEAR Switch) #dir USB: Filename Filesize Modification Time F1.cfg 256 4/22/2009 8:00:12 Total Size: xxxx Bytes Used: yyyy Bytes Free: zzzz Utility Commands 442 8. Management Commands 8 This chapter describes the management commands available in the managed switch CLI. The chapter contains the following sections: • Switch Management CPU Commands • Management Interface Commands • Console Port Access Commands • Telnet Commands • Secure Shell (SSH) Commands • Management Security Commands • Hypertext Transfer Protocol (HTTP) Commands • Access Commands • User Account Commands • SNMP Commands • RADIUS Commands • TACACS+ Commands • Configuration Scripting Commands • Pre-Login Banner and System Prompt Commands The commands in this chapter are in three functional groups: • Show commands display switch settings, statistics, and other information. • Configuration commands configure features and options of the switch. Every switch command has a show command that displays the configuration setting. • Clear commands clear some or all of the settings to factory defaults. 443 M4100 Series ProSAFE Managed Switches Switch Management CPU Commands To manage the switch via the web GUI or telnet, an IP address needs to be assigned to the switch management CPU. Whereas there are CLI commands that can be used to do this, ezconfig simplifies the task. The tool allows you to configure the following parameters: 1. The administrator’s user password and administrator-enable password 2. Management CPU IP address and network mask 3. System name and location information The tool is interactive and uses questions to guide you through the steps required to perform its task. At the end of the session, it will ask you if you want to save the changed information. To see exactly what has been changed by ezconfig at the end of the session, use the show running-config command. To perform any switch configuration other than the items listed above, use other CLI commands or the web GUI. ezconfig This command sets the IP address, subnet mask, and gateway of the device. The IP address and the gateway must be on the same subnet. Format ezconfig Mode Privileged EXEC Management Commands 444 M4100 Series ProSAFE Managed Switches The following is an example of an ezconfig session. NETGEAR EZ Configuration Utility -------------------------------Hello and Welcome! This utility will walk you thru assigning the IP address for the switch management CPU. It will allow you to save the changes at the end. After the session, simply use the newly assigned IP address to access the Web GUI using any public domain Web browser. Admin password not defined. Do you want to change the password? (Y/N/Q) y Enter new password:******** Confirm new password:******** Password Changed! The 'enable' password required for switch configuration via the command line interface is currently not configured. Do you wish to change it (Y/N/Q)? y Enter new password:******** Confirm new password:******** Password Changed! Assigning an IP address to your switch management Current IP Address Configuration -------------------------------IP address: 0.0.0.0 Subnet mask: 0.0.0.0 Gateway address: 0.0.0.0 Would you like to assign an IP address now (Y/N/Q)? y IP Address: 10.10.10.1 Subnet mask: 255.255.255.0 Gateway address: 10.10.10.10 Do you want to assign switch name and location information (Y/N/Q)? y System Name: testunit1 System Location: testlab System Contact: Bud Lightyear There are changes detected, do you wish to save the changes permanently (Y/N)? y The configuration changes have been saved successfully. 'show running-config' to see the final configuration. Thanks for using EzConfig! Management Commands 445 Please enter M4100 Series ProSAFE Managed Switches Management Interface Commands This section describes the commands you use to configure a logical interface for management access. enable (Privileged EXEC access) Use this command to access the Privileged EXEC mode. From the Privileged EXEC mode, you can configure the network interface. Format enable Mode User EXEC ip management Use this command to specify the source IP address for all applications (syslog, SNMP client, and so on). Default vlan 1 Format ip management [serviceport | vlan <number> | port <slot/port> | loopback <number>] Mode User EXEC no ip management Use this command to specify the IP address of the management VLAN (VLAN 1) as the source IP address for all applications (syslog, SNMP client, and so on). Format no ip management [serviceport | vlan <number> | port <slot/port> | loopback <number>] Mode User EXEC network mac-address Use this command to set locally administered MAC addresses. The following rules apply: • Bit 6 of byte 0 (called the U/L bit) indicates whether the address is universally administered (b'0') or locally administered (b'1'). • Bit 7 of byte 0 (called the I/G bit) indicates whether the destination address is an individual address (b'0') or a group address (b'1'). • The second character, of the twelve character macaddr, must be 2, 6, A or E. Management Commands 446 M4100 Series ProSAFE Managed Switches A locally administered address must have bit 6 On (b'1') and bit 7 Off (b'0'). Format network mac-address <macaddr> Mode Privileged EXEC network mac-type Use this command to specify whether the switch uses the burned in MAC address or the locally administered MAC address. Default burnedin Format network mac-type {local | burnedin} Mode Privileged EXEC no network mac-type Use this command to reset the value of MAC address to its default. Format no network mac-type Mode Privileged EXEC network javamode Use this command to specify whether the switch should allow access to the Java applet in the header frame of the Web interface. When access is enabled, the Java applet can be viewed from the Web interface. When access is disabled, the user cannot view the Java applet. Default enabled Format network javamode Mode Privileged EXEC no network javamode Use this command to disallow access to the Java applet in the header frame of the Web interface. When access is disabled, the user cannot view the Java applet. Format no network javamode Mode Privileged EXEC Management Commands 447 M4100 Series ProSAFE Managed Switches show network Use this command to display configuration settings associated with the switch’s network interface. The network interface is the logical interface used for in-band connectivity with the switch via any of the switch's front panel ports. The configuration parameters associated with the switch's network interface do not affect the configuration of the front panel ports through which traffic is switched or routed. The network interface is always considered to be up, whether any member ports are up; therefore, the show network command will always show “Interface Status” as “up”. Format show network Modes • • Privileged EXEC User EXEC Term Definition Interface Status The network interface status; it is always considered to be “up”. IP Address The IP address of the interface. The factory default value is 0.0.0.0. Subnet Mask The IP subnet mask for this interface. The factory default value is 0.0.0.0. Default Gateway The default gateway for this IP interface. The factory default value is 0.0.0.0. IPv6 Administrative Mode Whether enabled or disabled. IPv6 Address/Length The IPv6 address and length. IPv6 Default Router The IPv6 default router address. Burned In MAC Address The burned in MAC address used for in-band connectivity. Locally Administered MAC Address If desired, a locally administered MAC address can be configured for in-band connectivity. To take effect, 'MAC Address Type' must be set to 'Locally Administered'. Enter the address as twelve hexadecimal digits (6 bytes) with a colon between each byte. Bit 1 of byte 0 must be set to a 1 and bit 0 to a 0, that is, byte 0 should have the following mask “xxxx xx10”. The MAC address used by this bridge when it must be referred to in a unique fashion. It is recommended that this be the numerically smallest MAC address of all ports that belong to this bridge. However it is only required to be unique. When concatenated with dot1dStpPriority a unique BridgeIdentifier is formed which is used in the Spanning Tree Protocol. MAC Address Type The MAC address which should be used for in-band connectivity. The choices are the burned in or the Locally Administered address. The factory default is to use the burned in MAC address. Management Commands 448 M4100 Series ProSAFE Managed Switches Command example: This output is for the network port: (NETGEAR Switch) #show network Interface Status............................... IP Address..................................... Subnet Mask.................................... Default Gateway................................ IPv6 Administrative Mode....................... IPv6 Address/Length is ........................ IPv6 Address/Length is ........................ IPv6 Address/Length is ........................ IPv6 Default Router is ........................ Burned In MAC Address.......................... Locally Administered MAC Address............... MAC Address Type............................... Network Configuration Protocol Current......... Management VLAN ID............................. Web Mode....................................... Java Mode...................................... Always Up 10.250.3.1 255.255.255.0 10.250.3.3 Enabled FE80::210:18FF:FE82:337/64 3099::1/64 3099::210:18FF:FE82:337/64 FE80::204:76FF:FE73:423A 00:10:18:82:03:37 00:00:00:00:00:00 Burned In None 1 Enable Enable Console Port Access Commands This section describes the commands you use to configure the console port. You can use a serial cable to connect a management host directly to the console port of the switch. configuration Use this command to access Global Config mode. From Global Config mode, you can configure various system settings, including user accounts. You can also enter other command modes, including Line Config mode. Format configuration Mode Privileged EXEC line Use this command to access Line Config mode, which allows you to configure various Telnet settings, ssh settings, and the console port. Format line {console | telnet | ssh} Mode Global Config Management Commands 449 M4100 Series ProSAFE Managed Switches serial baudrate Use this command to specify the communication rate of the terminal interface. The supported rates are 1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200. Default 115200 Format serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200} Mode Line Config no serial baudrate Use this command to set the communication rate of the terminal interface. Format no serial baudrate Mode Line Config serial timeout Use this command to specify the maximum connect time (in minutes) without console activity. A value of 0 indicates that a console can be connected indefinitely. The time range is 0–160. Default 5 Format serial timeout <0-160> Mode Line Config no serial timeout Use this command to set the maximum connect time (in minutes) without console activity. Format no serial timeout Mode Line Config login authentication Use this command in line configuration mode to specify a login authentication method list for remote telnet or console. Format login authentication {default | <list-name>} Mode Line Config Management Commands 450 M4100 Series ProSAFE Managed Switches no login authentication Use this command to return to the default specified by the login authentication command. Format no login authentication {default | <list-name>} Mode Line Config enable authentication Use this command in line configuration mode to specify an authentication method list when the user accesses a higher privilege level in remote telnet or console. Format enable authentication {default | <list-name>} Mode Line Config no enable authentication Use this command to return to the default specified by the enable authentication command. Format no enable authentication {default | <list-name>} Mode Line Config show serial Use this command to display serial communication settings for the switch. Format show serial Modes • • Term Privileged EXEC User EXEC Definition Serial Port Login The time, in minutes, of inactivity on a Serial port connection, after which the Switch will Timeout close the connection. Any numeric value from 0 through 160 is allowed, the factory (minutes) default is 5. A value of 0 disables the timeout. Baud Rate (bps) The default baud rate at which the serial port will try to connect. The available values are 1200, 2400, 4800, 9600, 19200, 38400,57600, and 115,200 baud. The factory default is 9600 baud. Character Size (bits) The number of bits in a character. The number of bits is always 8. Flow Control Whether Hardware Flow-Control is enabled or disabled. Hardware Flow Control is always disabled. Management Commands 451 M4100 Series ProSAFE Managed Switches Term Definition Stop Bits The number of Stop bits per character. The number of Stop bits is always 1. Parity Type The parity method used on the serial port. The parity method is always None. Telnet Commands This section describes the commands you use to configure and view Telnet settings. You can use Telnet to manage the device from a remote management host. ip telnet server enable Use this command to enable Telnet connections to the system and to enable the Telnet Server Admin Mode. This command opens the Telnet listening port. Default enabled Format ip telnet server enable Mode Privileged EXEC no ip telnet server enable Use this command to disable Telnet access to the system and to disable the Telnet Server Admin Mode. This command closes the Telnet listening port and disconnects all open Telnet sessions. Format no ip telnet server enable Mode Privileged EXEC telnet Use this command to establish a new outbound Telnet connection to a remote host. The host must be a valid IP address or host name. The value for <port> is a valid decimal integer in the range of 0–65,535, where the default value is 23. If the optional debug parameter is used, the current Telnet options enabled is displayed. The optional line parameter sets the outbound Telnet operational mode as linemode (by default, the operational mode is character mode). The optional noecho parameter disables local echo. Format telnet {<ip-address> | <hostname>} <port> [debug] [line] [noecho] Modes • • Privileged EXEC User EXEC Management Commands 452 M4100 Series ProSAFE Managed Switches transport input telnet Use this command to regulate new Telnet sessions. If enabled, new Telnet sessions can be established until there are no more sessions available. An established session remains active until the session is ended or an abnormal network error ends the session. Note: If the Telnet Server Admin Mode is disabled, Telnet sessions cannot be established. Use the ip telnet server enable command to enable Telnet Server Admin Mode. Default enabled Format transport input telnet Mode Line Config no transport input telnet Use this command to prevent new Telnet sessions from being established. Format no transport input telnet Mode Line Config transport output telnet Use this command to regulate new outbound Telnet connections. If enabled, new outbound Telnet sessions can be established until the system reaches the maximum number of simultaneous outbound Telnet sessions allowed. An established session remains active until the session is ended or an abnormal network error ends it. Default enabled Format transport output telnet Mode Line Config no transport output telnet Use this command to prevent new outbound Telnet connection from being established. Format no transport output telnet Mode Line Config Management Commands 453 M4100 Series ProSAFE Managed Switches session-limit Use this command to specify the maximum number of simultaneous outbound Telnet sessions. A value of 0 indicates that no outbound Telnet session can be established. Default 5 Format session-limit <0-5> Mode Line Config no session-limit Use this command to set the maximum number of simultaneous outbound Telnet sessions to the default value. Format no session-limit Mode Line Config session-timeout Use this command to set the Telnet session timeout value. The timeout value unit of time is minutes. Default 5 Format session-timeout <1-160> Mode Line Config no session-timeout Use this command to set the Telnet session timeout value to the default. The timeout value unit of time is minutes. Format no session-timeout Mode Line Config telnetcon maxsessions Use this command to specify the maximum number of Telnet connection sessions that can be established. A value of 0 indicates that no Telnet connection can be established. The range is 0-5. Default 4 Format telnetcon maxsessions <0-4> Mode Privileged EXEC Management Commands 454 M4100 Series ProSAFE Managed Switches no telnetcon maxsessions Use this command to set the maximum number of Telnet connection sessions that can be established to the default value. Format no telnetcon maxsessions Mode Privileged EXEC telnetcon timeout Use this command to set the Telnet connection session time-out value, in minutes. A session is active as long as the session has not been idle for the value set. The time is a decimal value from 1 to 160. Note: When you change the time-out value, the new value is applied to all active and inactive sessions immediately. Any sessions that have been idle longer than the new time-out value are disconnected immediately. Default 5 Format telnetcon timeout <1-160> Mode Privileged EXEC no telnetcon timeout Use this command to set the Telnet connection session timeout value to the default. Note: Changing the time-out value for active sessions does not become effective until the session is reaccessed. Also, any keystroke activates the new time-out duration. Format no telnetcon timeout Mode Privileged EXEC Management Commands 455 M4100 Series ProSAFE Managed Switches show telnet Use this command to display the current outbound Telnet settings. In other words, these settings apply to Telnet connections initiated from the switch to a remote system. Format show telnet Modes • • Term Privileged EXEC User EXEC Definition Outbound Telnet The number of minutes an outbound Telnet session is allowed to remain inactive before Login Timeout being logged off. The number of simultaneous outbound Telnet connections allowed. Maximum Number of Outbound Telnet Sessions Allow New Outbound Telnet Sessions Indicates whether outbound Telnet sessions will be allowed. show telnetcon Use this command to display the current inbound Telnet settings. In other words, these settings apply to Telnet connections initiated from a remote system to the switch. Format show telnetcon Modes • • Privileged EXEC User EXEC Term Definition Remote Connection Login Timeout (minutes) This object indicates the number of minutes a remote connection session is allowed to remain inactive before being logged off. Might be specified as a number from 1 to 160. The factory default is 5. Maximum Number of Remote Connection Sessions This object indicates the number of simultaneous remote connection sessions allowed. The factory default is 5. Allow New Telnet New Telnet sessions will not be allowed when this field is set to no. The factory default Sessions value is yes. Management Commands 456 M4100 Series ProSAFE Managed Switches Secure Shell (SSH) Commands This section describes the commands you use to configure SSH access to the switch. Use SSH to access the switch from a remote management host. Note: The system allows a maximum of five SSH sessions. ip ssh Use this command to enable SSH access to the system. (This command is the short form of the ip ssh server enable command.) Default disabled Format ip ssh Mode Privileged EXEC ip ssh protocol Use this command to set or remove protocol levels (or versions) for SSH. Either SSH1 (1), SSH2 (2), or both SSH 1 and SSH 2 (1 and 2) can be set. Default 1 and 2 Format ip ssh protocol [1] [2] Mode Privileged EXEC ip ssh server enable Use this command to enable the IP secure shell server. Default disabled Format ip ssh server enable Mode Privileged EXEC no ip ssh server enable Use this command to disable the IP secure shell server. Format no ip ssh server enable Mode Privileged EXEC Management Commands 457 M4100 Series ProSAFE Managed Switches sshcon maxsessions Use this command to specify the maximum number of SSH connection sessions that can be established. A value of 0 indicates that no ssh connection can be established. The range is 0–5. Default 5 Format sshcon maxsessions <0-5> Mode Privileged EXEC no sshcon maxsessions Use this command to set the maximum number of allowed SSH connection sessions to the default value. Format no sshcon maxsessions Mode Privileged EXEC sshcon timeout Use this command to set the SSH connection session time-out value, in minutes. A session is active as long as the session has been idle for the value set. The time is a decimal value from 1 to 160. Changing the time-out value for active sessions does not become effective until the session is re accessed. Also, any keystroke activates the new time-out duration. Default 5 Format sshcon timeout <1-160> Mode Privileged EXEC no sshcon timeout Use this command to set the SSH connection session timeout value, in minutes, to the default. Changing the timeout value for active sessions does not become effective until the session is re accessed. Also, any keystroke activates the new timeout duration. Format no sshcon timeout Mode Privileged EXEC Management Commands 458 M4100 Series ProSAFE Managed Switches show ip ssh Use this command to display the ssh settings. Format show ip ssh Mode Privileged EXEC Term Definition Administrative Mode This field indicates whether the administrative mode of SSH is enabled or disabled. Protocol Level The protocol level might have the values of version 1, version 2 or both versions 1 and version 2. SSH Sessions Currently Active The number of SSH sessions currently active. Max SSH Sessions Allowed The maximum number of SSH sessions allowed. SSH Timeout The SSH time-out value in minutes. Keys Present Indicates whether the SSH RSA and DSA key files are present on the device. Key Generation in Progress Indicates whether RSA or DSA key files generation is currently in progress. Management Security Commands This section describes commands you use to generate keys and certificates, which you can do in addition to loading them as before. crypto certificate generate Use this command to generate self-signed certificate for HTTPS. The generate RSA key for SSL has a length of 1024 bits. The resulting certificate is generated with a common name equal to the lowest IP address of the device and a duration of 365 days. Format crypto certificate generate Mode Global Config Management Commands 459 M4100 Series ProSAFE Managed Switches no crypto certificate generate Use this command to delete the HTTPS certificate files from the device, regardless of whether they are self-signed or downloaded from an outside source. Format no crypto certificate generate Mode Global Config crypto key generate rsa Use this command to generate an RSA key pair for SSH. The new key files will overwrite any existing generated or downloaded RSA key files. Format crypto key generate rsa Mode Global Config no crypto key generate rsa Use this command to delete the RSA key files from the device. Format no crypto key generate rsa Mode Global Config crypto key generate dsa Use this command to generate a DSA key pair for SSH. The new key files will overwrite any existing generated or downloaded DSA key files. Format crypto key generate dsa Mode Global Config no crypto key generate dsa Use this command to delete the DSA key files from the device. Format no crypto key generate dsa Mode Global Config Hypertext Transfer Protocol (HTTP) Commands This section describes the commands you use to configure HTTP and secure HTTP access to the switch. Access to the switch by using a Web browser is enabled by default. Everything you can view and configure by using the CLI is also available by using the Web. Management Commands 460 M4100 Series ProSAFE Managed Switches ip http server Use this command to enable access to the switch through the Web interface. When access is enabled, the user can login to the switch from the Web interface. When access is disabled, the user cannot login to the switch’s web server. Disabling the Web interface takes effect immediately. All interfaces are affected. Default enabled Format ip http server Mode Privileged EXEC no ip http server Use this command to disable access to the switch through the Web interface. When access is disabled, the user cannot login to the switch's Web server. Format no ip http server Mode Privileged EXEC ip http secure-server Use this command to enable the secure socket layer for secure HTTP. Default disabled Format ip http secure-server Mode Privileged EXEC no ip http secure-server Use this command to disable the secure socket layer for secure HTTP. Format no ip http secure-server Mode Privileged EXEC ip http java Use this command to enable the Web Java mode. The Java mode applies to both secure and unsecure web connections. Default Enabled Format ip http java Mode Privileged EXEC Management Commands 461 M4100 Series ProSAFE Managed Switches no ip http java Use this command to disable the Web Java mode. The Java mode applies to both secure and unsecure web connections. Format no ip http java Mode Privileged EXEC ip http session hard-timeout Use this command to configure the hard time-out for unsecure HTTP sessions in hours. Configuring this value to zero sets an infinite hard time-out. When this time-out expires, the user must reauthenticate. This timer begins on initiation of the web session and is unaffected by the activity level of the connection. Default 24 Format ip http session hard-timeout <0-168> Mode Privileged EXEC no ip http session hard-timeout Use this command to restore the hard timeout for unsecure HTTP sessions to the default value. Format no ip http session hard-timeout Mode Privileged EXEC ip http authentication Use this command to specify the authentication methods for http server users. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. For example If none specified as an authentication method after RADIUS, no authentication is used if the RADIUS server is down. Format ip http authentication <method1> [<method2> ...] Mode Global ConfigC Term Definition Local Uses the local user name database for authentication. Radius Uses the list of all RADIUS servers for authentication. Management Commands 462 M4100 Series ProSAFE Managed Switches Term Definition Tacacs Uses the list of all TACACS servers for authentication. None Uses no authentication. no ip http authentication Use this command to restore the authentication methods to the default. Format no ip http authentication <method1> [<method2> ...] Mode Global Config ip http session maxsessions Use this command to limit the number of allowable unsecure HTTP sessions. Zero is the configurable minimum. Default 16 Format ip http session maxsessions <0-16> Mode Privileged EXEC no ip http session maxsessions Use this command to restore the number of allowable unsecure HTTP sessions to the default value. Format no ip http session maxsessions Mode Privileged EXEC ip http session soft-timeout Use this command to configure the soft time-out for unsecure HTTP sessions in minutes. Configuring this value to zero sets an infinite soft time-out. When this time-out expires the user must reauthenticate. This timer begins on initiation of the web session and is restarted with each access to the switch. Default 5 Format ip http session soft-timeout <0-60> Mode Privileged EXEC Management Commands 463 M4100 Series ProSAFE Managed Switches no ip http session soft-timeout Use this command to reset the soft time-out for unsecure HTTP sessions to the default value. Format no ip http session soft-timeout Mode Privileged EXEC ip http secure-session maxsessions Use this command to limit the number of secure HTTP sessions. Zero is the configurable minimum. Default 16 Format ip http secure-session maxsessions <0-16> Mode Privileged EXEC no ip http secure-session maxsessions Use this command to restore the number of allowable secure HTTP sessions to the default value. Format no ip http secure-session maxsessions Mode Privileged EXEC ip http secure-session soft-timeout Use this command to configure the soft time-out for secure HTTP sessions in minutes. When this time-out expires, you must reauthenticate. This timer begins on initiation of the web session and is restarted with each access to the switch. The secure session soft time-out cannot be set to zero (infinite). Default 5 Format ip http secure-session soft-timeout <1-60> Mode Privileged EXEC no ip http secure-session soft-timeout Use this command to restore the soft time-out for secure HTTP sessions to the default value. Format no ip http secure-session soft-timeout Mode Privileged EXEC Management Commands 464 M4100 Series ProSAFE Managed Switches ip http secure-session hard-timeout Use this command to configure the hard time-out for secure HTTP sessions in hours. When the time-out expires, the user must reauthenticate. This timer begins on initiation of the web session and is unaffected by the activity level of the connection. The secure session hard time-out cannot be set to zero (infinite). Default 24 Format ip http secure-session hard-timeout <1-168> Mode Privileged EXEC no ip http secure-session hard-timeout Use this command to reset the hard time-out for secure HTTP sessions to the default value. Format no ip http secure-session hard-timeout Mode Privileged EXEC ip https authentication Use this command to specify the authentication methods for http server users. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. If none is specified as an authentication method after radius, no authentication is used if the RADIUS server is down. Format ip https authentication <method1> [<method2> ...] Mode Global Config Term Definition Local Uses the local user name database for authentication. Radius Uses the list of all RADIUS servers for authentication. Tacacs Uses the list of all TACACS servers for authentication. None Uses no authentication. no ip https authentication Use this command to restore the authentication methods to the default for http server users. Format no ip https authentication <method1> [<method2> ...] Mode Global Config Management Commands 465 M4100 Series ProSAFE Managed Switches ip http secure-port Use this command to set the SSL port where port can be 1-65535 and the default is port 443. Default 443 Format ip http secure-port <portid> Mode Privileged EXEC no ip http secure-port Use this command to reset the SSL port to the default value. Format no ip http secure-port Mode Privileged EXEC ip http secure-protocol Use this command to set protocol levels (versions). The protocol level can be set to TLS1, SSL3 or to both TLS1 and SSL3. Default SSL3 and TLS1 Format ip http secure-protocol [SSL3] [TLS1] Mode Privileged EXEC show ip http Use this command to display the http settings for the switch. Format show ip http Mode Privileged EXEC Term Definition HTTP Mode (Unsecure) The unsecure HTTP server administrative mode. Java Mode The java applet administrative mode which applies to both secure and unsecure web connections. Maximum Allowable HTTP Sessions The number of allowable unsecure http sessions. HTTP Session Hard Timeout The hard time-out for unsecure http sessions in hours. HTTP Session Soft Timeout The soft time-out for unsecure http sessions in minutes. HTTP Mode (Secure) The secure HTTP server administrative mode. Management Commands 466 M4100 Series ProSAFE Managed Switches Term Definition Secure Port The secure HTTP server port number. Secure Protocol Level(s) The protocol level might have the values of SSL3, TSL1, or both SSL3 and TSL1. Maximum Allowable HTTPS The number of allowable secure http sessions. Sessions HTTPS Session Hard Timeout The hard time-out for secure http sessions in hours. HTTPS Session Soft Timeout The soft time-out for secure http sessions in minutes. Certificate Present Indicates whether the secure-server certificate files are present on the device. Certificate Generation in Progress Indicates whether certificate generation is currently in progress. Access Commands Use the commands in this section to close remote connections or to view information about connections to the system. disconnect Use the disconnect command to close HTTP, HTTPS, Telnet, or SSH sessions. Use all to close all active sessions, or use <session-id> to specify the session ID to close. To view the possible values for <session-id>, use the show loginsession command. Format disconnect {<session_id> | all} Mode Privileged EXEC show loginsession Use this command to display current Telnet and serial port connections to the switch. Format show loginsession Mode Privileged EXEC Field Definition ID Login Session ID. User Name The name the user entered to log on to the system. Connection From IP address of the remote client machine or EIA-232 for the serial port connection. Idle Time Time this session has been idle. Management Commands 467 M4100 Series ProSAFE Managed Switches Field Definition Session Time Total time this session has been connected. Session Type Shows the type of session, which can be HTTP, HTTPS, telnet, serial, or SSH. User Account Commands This section describes the commands you use to add, manage, and delete system users. The software has two default users: admin and guest. The admin user can view and configure system settings, and the guest user can view settings. Note: You cannot delete the admin user. There is only one user allowed with read/write privileges. You can configure up to five read-only users on the system. username (Global Config) Use this command to add a new user to the local user database. The default privilege level is 1. Using the encrypted keyword allows the administrator to transfer local user passwords between devices without having to know the passwords. When the password parameter is used along with encrypted parameter, the password must be exactly 128 hexadecimal characters in length. If the password strength feature is enabled, this command checks for password strength and returns an appropriate error if it fails to meet the password strength criteria. The optional override-complexity-check parameter disables the validation of the password strength. Format username <name> {password <password> [encrypted [override-complexity-check] | level <level> [encrypted [override-complexity-check]] | override-complexity-check]} | {level <level> [override-complexity-check] password} Mode Global Config Term Definition Name The name of the user, up to 32 characters. Password The password for the users 8-64 characters. This value can be zero if the no passwords min-length command has been executed. The special characters allowed in the password include: ! # $ % & ' ( ) * + , - . / : ; < = > @ [ \ ] ^ _ ` { | } ~. level Specifies the user level. If not specified, the privilege level is 1. Level 0 can be assigned by a level 15 user to another user to suspend that user’s access. Range 0-15. Enter access level 1 for Read Access or 15 for Read/Write Access. Management Commands 468 M4100 Series ProSAFE Managed Switches Term Definition encrypted Encrypted password you enter, copied from another device configuration. override-complexity Disables the validation of the password strength. -check no username Use this command to remove a user account. Format no username <username> Mode Global Config Note: You cannot delete the “admin” user account. username name nopassword Use this command to remove an existing user’s password (NULL password). Format username name nopassword [level level] Mode Global Config Parameter Description name The name of the user. Range: 1-32 characters. password The authentication password for the user. Range 8-64 characters. level The user level. Level 0 can be assigned by a level 15 user to another user to suspend that user's access. Range 0-15. username unlock Use this command to unlock a user’s account. Only a user with read/write access can reactivate a locked user account. Format username <username> unlock Mode Global Config Management Commands 469 M4100 Series ProSAFE Managed Switches username snmpv3 accessmode Use this command to specify the SNMPv3 access privileges for the specified login user. The valid accessmode values are readonly and readwrite. The <username> is the login user name for which the specified access mode applies. The default is readwrite for the “admin” user and readonly for all other users. You must enter the <username> in the same case you used when you added the user. To see the case of the <username>, enter the show users command. Defaults • • admin - readwrite other - readonly Format username snmpv3 accessmode <username> {readonly | readwrite} Mode Global Config no username snmpv3 accessmode Use this command to set the SNMPv3 access privileges for the specified user as readwrite for the “admin” user and readonly for all other users. The <username> value is the user name to which the specified access mode applies. Format no username snmpv3 accessmode <username> Mode Global Config username snmpv3 authentication Use this command to specify the authentication protocol to be used for the specified user. The valid authentication protocols are none, md5, and sha. If you specify md5 or sha, the login password is also used as the SNMPv3 authentication password and therefore must be at least eight characters in length. The <username> is the user name associated with the authentication protocol. You must enter the <username> in the same case you used when you added the user. To see the case of the <username>, enter the show users command. Default no authentication Format username snmpv3 authentication <username> {none | md5 | sha} Mode Global Config no username snmpv3 authentication Use this command to set the authentication protocol to be used for the specified user to none. The <username> is the user name for which the specified authentication protocol is used. Format no username snmpv3 authentication <username> Mode Global Config Management Commands 470 M4100 Series ProSAFE Managed Switches username snmpv3 encryption Use this command to specify the encryption protocol used for the specified user. The valid encryption protocols are des and none. If you select des, you can specify the required key on the command line. The encryption key must be 8–64 characters long. If you select the des protocol but do not provide a key, the user is prompted for the key. When you use the des protocol, the login password is also used as the SNMPv3 encryption password, so it must be a minimum of eight characters. If you select none, you do not need to provide a key. The <username> value is the login user name associated with the specified encryption. You must enter the <username> in the same case you used when you added the user. To see the case of the <username>, enter the show users command. Default no encryption Format username snmpv3 encryption <username> {none | des [<key>]} Mode Global Config no username snmpv3 encryption Use this command to set the encryption protocol to none. The <username> is the login user name for which the specified encryption protocol will be used. Format no username snmpv3 encryption <username> Mode Global Config show users Use this command to display the configured user names and their settings. This command is available only for users with read/write privileges. The SNMPv3 fields is displayed only if SNMP is available on the system. Format show users Mode Privileged EXEC Term Definition User Name The name the user enters to login using the serial port, Telnet, or web. Access Mode Shows whether the user is able to change parameters on the switch (Read/Write) or is only able to view them (Read Only). As a factory default, the “admin” user has Read/Write access and the “guest” has Read Only access. There can only be one Read/Write user and up to five Read Only users. SNMPv3 Access The SNMPv3 Access Mode. If the value is set to ReadWrite, the SNMPv3 user is able to Mode set and retrieve parameters on the system. If the value is set to ReadOnly, the SNMPv3 user is only able to retrieve parameter information. The SNMPv3 access mode might be different than the CLI and Web access mode. Management Commands 471 M4100 Series ProSAFE Managed Switches Term Definition SNMPv3 Authentication The authentication protocol to be used for the specified login user. SNMPv3 Encryption The encryption protocol to be used for the specified login user. show users accounts Use this command to display the local user status about user account lockout and password aging. Format show users accounts Mode Privileged EXEC Term Definition User Name The local user account’s user name. Privilege The user’s privilege level (1-15). Password aging The password aging time for the local users. Lockout Status Indicates whether the user account is locked out (true or false). Password Expiration Date The current password expiration date in date format. show users accounts detail This command displays the local user status about user account lockout and password aging. It also includes information about Password strength and complexity. Format show users accounts detail Mode Privileged EXEC Command example: (NETGEAR Switch) #show users accounts detail UserName....................................... Privilege...................................... Password Aging................................. Password Expiry................................ Lockout........................................ Override Complexity Check...................... Password Strength.............................. UserName....................................... Privilege...................................... Password Aging................................. admin 15 ----False Disable --guest 1 --- Management Commands 472 M4100 Series ProSAFE Managed Switches Password Expiry................................ Lockout........................................ Override Complexity Check...................... Password Strength.............................. --False Disable --- show users long Use this command to display the user’s full name. Format show users long Mode Privileged EXEC Term Definition User Name The full name of the user. show users login-history Use this command to display the users who have logged in previously. Format show users login-history [<username>] Mode Privileged EXEC Term Definition Login Time The time at which the user logged in. Username The user name used to login. Protocol The protocol that the user used to login. Location The location of the user. passwords min-length Use this command to enforce a minimum password length for local users. The value also applies to the enable password. The valid range is 0–64. Default 8 Format passwords min-length <0-64> Mode Global Config Management Commands 473 M4100 Series ProSAFE Managed Switches no passwords min-length Use this command to set the minimum password length to the default value. Format no passwords min-length Mode Global Config passwords history Use this command to set the number of previous passwords that shall be stored for each user account. When a local user changes his or her password, the user will not be able to reuse any password stored in password history. This ensures that users do not reuse their passwords often. The valid range is 0-10. Default 0 Format passwords history <0-10> Mode Global Config no passwords history Use this command to set the password history to the default value. Format no passwords history Mode Global Config passwords aging Use this command to implement aging on passwords for local users. When a user’s password expires, the user will be prompted to change it before logging in again. The valid range is 1-365. The default is 0, or no aging. Default 0 Format passwords aging <1-365> Mode Global Config no passwords aging Use this command to set the password aging to the default value. Format no passwords aging Mode Global Config Management Commands 474 M4100 Series ProSAFE Managed Switches passwords lock-out Use this command to strengthen the security of the switch by locking user accounts that have failed login due to wrong passwords. When a lockout count is configured, a user that is logged in must enter the correct password within that count. Otherwise the user will be locked out from further switch access. Only a user with read/write access can reactivate a locked user account. Password lockout does not apply to logins from the serial console. The valid range is 1-5. The default is 0, or no lockout count enforced. Default 0 Format passwords lock-out <1-5> Mode Global Config no passwords lock-out Use this command to set the password lock-out count to the default value. Format no passwords lock-out Mode Global Config passwords strength-check Use this command to enable the password strength feature. It is used to verify the strength of a password during configuration. Default Disable Format passwords strength-check Mode Global Config no passwords strength-check Use this command to disable the password strength-check. Format no passwords strength-check Mode Global Config passwords strength minimum uppercase-letters Use this command to enforce a minimum number of uppercase letters that a password should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction on that set of characters. Management Commands 475 M4100 Series ProSAFE Managed Switches Default 2 Format passwords strength minimum uppercase-letters <number> Mode Global Config no passwords strength minimum uppercase-letters Use this command to reset the minimum number of uppercase letters to the default value. Format no passwords strength minimum uppercase-characters Mode Global Config passwords strength minimum lowercase-letters Use this command to enforce a minimum number of lowercase letters that a password should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction on that set of characters. Default 2 Format passwords strength minimum lowercase-letters <number> Mode Global Config no passwords strength minimum lowercase-letters Use this command to reset the minimum number of lowercase letters to the default value. Format no passwords strength minimum lowercase-characters Mode Global Config passwords strength minimum numeric-characters Use this command to enforce a minimum number of numeric characters that a password should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction on that set of characters. Default 2 Format passwords strength minimum numeric-letters <number> Mode Global Config Management Commands 476 M4100 Series ProSAFE Managed Switches no passwords strength minimum numeric-characters Use this command to reset the minimum number of numeric characters to the default value. Format no passwords strength minimum numeric-characters Mode Global Config passwords strength minimum special-characters Use this command to enforce a minimum number of special characters that a password should contain. The valid range is 0-16. The default is 2. Minimum of 0 means no restriction on that set of characters. Default 2 Format passwords strength minimum special-letters <number> Mode Global Config no passwords strength minimum special-letters Use this command to reset the minimum number of special letters to the default value. Format no passwords strength minimum special-letters Mode Global Config passwords strength maximum consecutive-characters Use this command to enforce a maximum number of consecutive characters that a password should contain. An example of consecutive characters is abcd. The valid range is 0-16. If a password has consecutive characters more than the configured limit, it fails to configure. The default is 0. A maximum of 0 means no restriction on that set of characters. Default 0 Format passwords strength maximum consecutive-characters <number> Mode Global Config no passwords strength maximum consecutive-characters Use this command to reset the maximum number of consecutive characters to the default value. Format no passwords strength maximum consecutive-characters Mode Global Config Management Commands 477 M4100 Series ProSAFE Managed Switches passwords strength maximum repeated-characters Use this command to enforce a maximum number of repeated characters that a password should contain. An example of repeated characters is aaaa. The valid range is 0-16. If a password has a repetition of characters more than the configured limit, it fails to configure. The default is 0. A maximum of 0 means no restriction on that set of characters. Default 0 Format passwords strength maximum repeated-characters <number> Mode Global Config no passwords strength maximum repeated-characters Use this command to reset the maximum number of repeated-characters to the default value. Format no passwords strength maximum repeated-characters Mode Global Config passwords strength minimum character-classes Use this command to enforce a minimum number of characters classes that a password should contain. Character classes are uppercase letters, lowercase letters, numeric characters, and special characters. The valid range is 0-4. The default is 4. Default 4 Format passwords strength minimum character-classes <number> Mode Global Config no passwords strength minimum character-classes Use this command to reset the minimum number of character classes to the default value. Format no passwords strength minimum character-classes Mode Global Config passwords strength exclude-keyword Use this command to exclude the specified keyword while configuring the password. The password does not accept the keyword in any form (in between the string, case insensitive and reverse) as a substring. User can configure up to a maximum of three keywords. Format passwords strength exclude-keyword <keyword> Mode Global Config Management Commands 478 M4100 Series ProSAFE Managed Switches no passwords strength exclude-keyword Use this command to reset the restriction for the specified keyword or all the keywords configured. Format no passwords strength exclude-keyword [<keyword>] Mode Global Config show passwords configuration Use this command to display the configured password management settings. Format show passwords configuration Mode Privileged EXEC Term Definition Minimum Password Length Minimum number of characters required when changing passwords. Password History Number of passwords to store for reuse prevention. Password Aging Length in days that a password is valid. Lockout Attempts Number of failed password login attempts before lockout. Minimum Password Uppercase Letters Minimum number of uppercase characters required when configuring passwords. Minimum Password Lowercase Letters Minimum number of lowercase characters required when configuring passwords. Minimum Password Numeric Characters Minimum number of numeric characters required when configuring passwords. Maximum Password Consecutive Characters Maximum number of consecutive characters required that the password should contain when configuring passwords. Maximum Password Repeated Characters Maximum number of repetitions of characters that the password should contain when configuring passwords. Minimum Password Character Classes Minimum number of character classes (uppercase, lowercase, numeric, and special) required when configuring passwords. Password ExcludeKeywords The set of keywords to be excluded from the configured password when strength checking is enabled. Management Commands 479 M4100 Series ProSAFE Managed Switches show passwords result Use this command to display the last password set result information. Format show passwords result Mode Privileged EXEC Term Definition Last User Whose Password Is Set Shows the name of the user with the most recently set password. Password Strength Check Shows whether password strength checking is enabled. Last Password Set Result Shows whether the attempt to set a password was successful. If the attempt failed, the reason for the failure is included. aaa authentication login Use this command to set authentication at login. The default and optional list names created with the command are used with the aaa authentication login command. Create a list by entering the aaa authentication login list-name method command, where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries in the sequence. The additional methods of authentication are used only if the previous method returns an error, not if an authentication failure occurs. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. For example, if none is specified as an authentication method after radius, no authentication is used if the RADIUS server is down. If you configure local as the first method in the list, the switch tries no other methods. Default • • Format aaa authentication login {default | <list-name>} <method1> [<method2>...] Mode Global Config defaultList. Used by the console and only contains the method none. networkList. Used by telnet and SSH and only contains the method local. Parameter Definition default Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in. <list-name> Character string of up to 12 characters used to name the list of authentication methods activated when a user logs in. Management Commands 480 M4100 Series ProSAFE Managed Switches Parameter Definition <method1> At least one from the following: [<method2>...] • enable. Uses the enable password for authentication. • line. Uses the line password for authentication. • local. Uses the local username database for authentication. • none. Uses no authentication. • radius. Uses the list of all RADIUS servers for authentication. • tacacs. Uses the list of all TACACS servers for authentication. Command example: (NETGEAR Switch)(config)# aaa authentication login default radius local enable none no aaa authentication login Use this command to remove authentication at login. Format no aaa authentication login {default | <list-name>} Mode Global Config aaa authentication enable Use this command to set authentication for accessing higher privilege levels. The default and optional list names that you can create with this command are used with the enable authentication command. Create a list by specifying the <list-name> argument, using any character string to name this list. The <method> arguments identify the list of methods that the authentication algorithm tries in the sequence. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. For example, if none is specified as an authentication method after radius, no authentication is used if the RADIUS server is down. \ Note: Requests sent by the switch to a RADIUS or TACACS server include the username $enabx$, in which x is the requested privilege level. Format aaa authentication enable {default | <list-name>} <method1> [<method2>...] Mode Global Config Management Commands 481 M4100 Series ProSAFE Managed Switches Parameter Description default Uses the listed authentication methods that follow this argument as the default list of methods, when using higher privilege levels. <list-name> Character string used to name the list of authentication methods activated, when using access higher privilege levels. Range: 1-12 characters. <method1> Specify at least one from the following: [<method2>...] • deny. Used to deny access. • enable. Uses the enable password for authentication. • line. Uses the line password for authentication. • none. Uses no authentication. • radius. Uses the list of all RADIUS servers for authentication. Uses the user name $enabx$, in which x is the requested privilege level. • tacacs. Uses the list of all TACACS+ servers for authentication. Uses the user name $enabx$, in which x is the requested privilege level. no aaa authentication enable Use this command to remove the authentication method. Format no aaa authentication enable {default | <list-name>} <method1> [<method2>...] Mode Global Config aaa authentication dot1x Use this command to set authentication for dot1x users. The method argument identifies the list of methods that the authentication algorithm tries in the sequence. The additional methods of authentication are used only if the previous method returns an error, not if there is an authentication failure. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. For example if none is specified as an authentication method after radius, no authentication is used if the RADIUS server is down. The possible methods are as follows: • ias. Uses the internal authentication server users database for authentication. This method can be used in conjunction with any one of the existing methods such as local or radius. • local. Uses the local user name database for authentication. • none. Uses no authentication. • radius. Uses the list of all RADIUS servers for authentication. Format aaa authentication dot1x default <method1> [<method2>...] Mode Global Config Management Commands 482 M4100 Series ProSAFE Managed Switches no aaa authentication dot1x Use this command to remove the authentication at login. Format no aaa authentication dot1x default Mode Global Config aaa accounting The command creates an accounting method list. This list is identified by the default keyword or by a user-specified <list-name>. Accounting records, when enabled for a line-mode, can be sent at both the beginning and at the end (start-stop) or only at the end (stop-only). If none is specified, accounting is disabled for the specified list. If tacacs is specified as the accounting method, accounting records are notified to a TACACS+ server. If radius is the specified accounting method, accounting records are notified to a RADIUS server. For the same set of accounting type and list name, the administrator can change the record type or the methods list without having to first delete the previous configuration. Note the following: • A maximum of five accounting method lists can be created for each exec and commands type. • The same list-name can be used for both exec and commands accounting type. • AAA accounting for commands with RADIUS as the accounting method is not supported. Format aaa accounting {exec | commands} {default | <list-name>} {start-stop | stop-only | none} <method1> [<method2>…] Mode Global Config Term Definition exec Provides accounting for user EXEC terminal sessions. commands Provides accounting for all user-executed commands. default The default list of methods for accounting services. <list-name> Character string used to name the list of accounting methods. start-stop Sends a start accounting notice at the beginning of a process and a stop accounting notice at the end of a process. stop-only Sends a stop accounting notice at the end of the requested user process. none Disables accounting services on this line. <method1> [<method2>…] Use either tacacs or radius for accounting purpose. Management Commands 483 M4100 Series ProSAFE Managed Switches no aaa accounting This command deletes the accounting method list. Format no aaa accounting {exec | commands} {default | <list-name>} Mode Global Config accounting (console/Telnet/SSH) This command applies the accounting method list to a line configuration (console/Telnet/SSH). Apply this command in Line Config mode. Format accounting {exec | commands} [default | <list-name>] Mode Line Config Term Definition exec Configures accounting for an EXEC session. commands Configures accounting for each command execution attempt. Note: If a user is enabling accounting for exec mode for the current type of line configuration, they are logged out. default The default list of methods for authorization services. <list-name> Alphanumeric character string used to name the list of authorization methods. no accounting (console/Telnet/SSH) This command is used to remove accounting from a line configuration mode. Format no accounting {exec | commands} Mode Line Config ip accounting exec This command applies user exec accounting list to the line methods HTTP and HTTPs methods. Format ip {http | https} accounting exec {default | <list-name>} Mode Global Config Term Definition {http | https} Line method for which the list needs to be applied. Management Commands 484 M4100 Series ProSAFE Managed Switches Term Definition default The default list of methods for authorization services. <list-name> Alphanumeric character string used to name the list of authorization methods. no ip http/https accounting exec This command deletes the authorization method list. Format no ip {http | https} accounting exec {default | <list-name>} Mode Global Config show accounting Use this command to display ordered methods for accounting lists. Format show accounting Mode Privileged EXEC Command example: (NETGEAR Switch) #show accounting Number of Accounting Notifications sent at beginning of an EXEC session: Errors when sending Accounting Notifications beginning of an EXEC session: Number of Accounting Notifications at end of an EXEC session: Errors when sending Accounting Notifications at end of an EXEC session: Number of Accounting Notifications sent at beginning of a command execution: Errors when sending Accounting Notifications at beginning of a command execution: Number of Accounting Notifications sent at end of a command execution: Errors when sending Accounting Notifications at end of a command execution: show accounting methods This command displays the configured accounting method lists. Format show accounting methods Mode Privileged EXEC Command example: (NETGEAR Switch) #show accounting methods Acct Type ---------Exec Commands Method Name -----------dfltExecList dfltCmdsList Record Type -----------start-stop stop-only Method Type -----------TACACS TACACS Management Commands 485 M4100 Series ProSAFE Managed Switches Commands Line --------Console Telnet SSH HTTPS HTTP UserCmdAudit start-stop EXEC Method List -------------------none none none none none TACACS Command Method List -------------------none none none none none aaa authorization The command creates an authorization method list. This list is identified by the default keyword or by a user-specified <list-name>. If tacacs is specified as the authorization method, authorization commands are notified to a TACACS+ server. If radius is the specified authorization method, authorization commands are notified to a RADIUS server. If none is specified, command authorization is not applicable. You can create up to five authorization method lists for the commands type. Note: The local method is not supported for command authorization. Command authorization with RADIUS works only if the applied authentication method is also RADIUS. Format aaa authorization {exec | commands} {default | <list-name>} <method1> [<method2>…] Mode Global Config Term Definition exec Provides authorization for user EXEC terminal sessions. commands Provides authorization for all user-executed commands. default The default list of methods for authorization services. <list-name> Character string used to name the list of authorization methods. <method1> [<method2>…] Use either tacacs or radius for authorization purpose. Management Commands 486 M4100 Series ProSAFE Managed Switches no aaa authorization This command deletes the authorization method list. Format no aaa authorization {exec | commands} {default | <list-name>} <method1> [<method2>…] Mode Global Config authorization (console/Telnet/SSH) To apply the command authorization method list to an access method (console/Telnet/SSH). Apply this command in the line configuration mode. Format authorization {commands | exec} {default | <list-name>} Mode • • • Line console Line telnet Line SSH no authorization (console/Telnet/SSH) This command is used to remove command authorization from a line configuration mode. Format no authorization {commands| exec} Mode • • • Line console Line telnet Line SSH show authorization methods This command displays the configured authorization method lists. Format show authorization methods Mode Privileged EXEC Command example: (NETGEAR Switch) #show authorization methods Command Authorization List ---------------------------dfltCmdAuthList Line --------Console Telnet SSH Method -----------------------------none undefined undefined Command Method List --------------------dfltCmdAuthList dfltCmdAuthList dfltCmdAuthList Management Commands 487 undefined M4100 Series ProSAFE Managed Switches Exec Authorization List ---------------------------dfltExecAuthList Line --------Console Telnet SSH Method -----------------------------none undefined undefined undefined Exec Method List --------------------dfltExecAuthList dfltExecAuthList dfltExecAuthList domain-name (Global Config) The managed switch supports authentication based on domain name, in addition to the user name and password. This command allows the switch to be configured in a domain. Users can enable or disable domain functionality: • Domain enabled. In this case, when the user enters only the user name, the managed switch sends the domain name that is configured on the switch and the user name that the user enters in the format "domainname\username” to the RADIUS server. If the user enters the domain name and user name, the managed switch sends the domain name and user name that the user enters in the format "domainname\username” to the RADIUS server. • Domain disabled. In this case, the domain name is not included when the user name is sent to the RADIUS server. Format domain-name <name> Mode Global Config no domain-name This command is used to disable the domain-name in the managed switch. Format no domain-name Mode Global Config domain-name enable (Global Config) This command enables the domain name functionality. Format domain-name enable Mode Global Config Management Commands 488 M4100 Series ProSAFE Managed Switches no domain-name enable This command disables the domain name functionality. Format no domain-name enable Mode Global Config show domain-name This command displays the configured domain-name. Format show domain-name Mode Privileged EXEC Command example: (NETGEAR Switch) #show domain-name Domain : Enable Domain-name :abc aaa ias-user username The Internal Authentication Server (IAS) database is a dedicated internal database used for local authentication of users for network access through the IEEE 802.1X feature. Use this command to add the specified user to the internal user database. This command also changes the mode to AAA User Config mode. Format aaa ias-username <user> Mode Global Config no aaa ias-user username Use this command to remove an ias user. Format no aaa ias-username <user> Mode Global Config aaa session-id This global aaa command specifies whether the same session ID is used for authentication, authorization, and accounting service type within a session.s Default common Format aaa session-id [common | unique] Mode Global Config Management Commands 489 M4100 Series ProSAFE Managed Switches Parameter Definition common Use the same session ID for all AAA Service types. unique Use a unique session ID for AAA Service types. no aaa session-id This command resets the AAA session ID behavior to default. Format no aaa session-id [unique] Mode Global Config password (AAA IAS User Configuration) Use this command to specify a password for a user in the IAS database. Format password <password> [encrypted] Mode AAA IAS User Config Parameter Definition <password> Password for this level. Range: 8-64 characters. encrypted Encrypted password to be entered, copied from another switch configuration. no password (AAA IAS User Configuration) Use this command to remove a password for a user in the IAS database. Format no password Mode AAA IAS User Config clear aaa ias-users Use this command to remove all users from the IAS database. Format clear aaa ias-users Mode Privileged EXEC Management Commands 490 M4100 Series ProSAFE Managed Switches show aaa ias-users Use this command to display configured IAS users and their attributes. Passwords configured are not shown in the show command output. Format show aaa ias-users Mode Privileged EXEC SNMP Commands This section describes the commands you use to configure Simple Network Management Protocol (SNMP) on the switch. You can configure the switch to act as an SNMP agent so that it can communicate with SNMP managers on your network. snmp-server Use this command to set the name and the physical location of the switch and the organization responsible for the network. The range for <name>, <loc> and <con> is from 1 to 31 alphanumeric characters. Default none Format snmp-server {sysname <name> | location <loc> | contact <con>} Mode Global Config snmp-server community Use this command to add (and name) a new SNMP community. A community <name> is a name associated with the switch and with a set of SNMP managers that manage it with a specified privileged level. The length of <name> can be up to 16 case-sensitive characters. Note: Community names in the SNMP community table must be unique. When making multiple entries using the same community name, the first entry is kept and processed and all duplicate entries are ignored. Default • • Format snmp-server community <name> Mode Global Config Public and private, which you can rename. Default values for the remaining four community names are blank. Management Commands 491 M4100 Series ProSAFE Managed Switches no snmp-server community Use this command to remove this community name from the table. The <name> is the community name to be deleted. Format no snmp-server community <name> Mode Global Config snmp-server community ipaddr Use this command to set a client IP address for an SNMP community. The address is the associated community SNMP packet sending address and is used along with the client IP mask value to denote a range of IP addresses from which SNMP clients might use that community to access the device. A value of 0.0.0.0 allows access from any IP address. Otherwise, this value is ANDed with the mask to determine the range of allowed client IP addresses. The name is the applicable community name. Default 0.0.0.0 Format snmp-server community ipaddr <ipaddr> <name> Mode Global Config no snmp-server community ipaddr Use this command to set a client IP address for an SNMP community to 0.0.0.0. The name is the applicable community name. Format no snmp-server community ipaddr <name> Mode Global Config snmp-server community ipmask Use this command to set a client IP mask for an SNMP community. The address is the associated community SNMP packet sending address and is used along with the client IP address value to denote a range of IP addresses from which SNMP clients might use that community to access the device. A value of 255.255.255.255 allows access from only one station and uses that machine’s IP address for the client IP address. A value of 0.0.0.0 allows access from any IP address. The name is the applicable community name. Default 0.0.0.0 Format snmp-server community ipmask <ipmask> <name> Mode Global Config Management Commands 492 M4100 Series ProSAFE Managed Switches no snmp-server community ipmask Use this command to set a client IP mask for an SNMP community to 0.0.0.0. The name is the applicable community name. The community name might be up to 16 alphanumeric characters. Format no snmp-server community ipmask <name> Mode Global Config snmp-server community mode Use this command to activate an SNMP community. If a community is enabled, an SNMP manager associated with this community manages the switch according to its access right. If the community is disabled, no SNMP requests using this community are accepted. In this case the SNMP manager associated with this community cannot manage the switch until the Status is changed back to Enable. Default • • private and public communities - enabled other four - disabled Format snmp-server community mode <name> Mode Global Config no snmp-server community mode Use this command to deactivate an SNMP community. If the community is disabled, no SNMP requests using this community are accepted. In this case the SNMP manager associated with this community cannot manage the switch until the Status is changed back to Enable. Format no snmp-server community mode <name> Mode Global Config snmp-server community ro Use this command to restrict access to switch information. The access mode is read-only (also called public). Format snmp-server community ro <name> Mode Global Config Management Commands 493 M4100 Series ProSAFE Managed Switches snmp-server community rw Use this command to restrict access to switch information. The access mode is read/write (also called private). Format snmp-server community rw <name> Mode Global Config snmp-server enable traps violation Use this command to enable sending new violation traps designating when a packet with a disallowed MAC address is received on a locked port. Note: For other port security commands, see Protected Ports Commands on page 68. Default disabled Format snmp-server enable traps violation Mode Interface Config no snmp-server enable traps violation Use this command to disable sending new violation traps. Format no snmp-server enable traps violation Mode Interface Config snmp-server enable traps Use this command to enable the Authentication Flag. Default enabled Format snmp-server enable traps Mode Global Config no snmp-server enable traps Use this command to disable the Authentication Flag. Format no snmp-server enable traps Mode Global Config Management Commands 494 M4100 Series ProSAFE Managed Switches snmp-server enable traps linkmode Use this command to enable Link Up/Down traps for the entire switch. When enabled, link traps are sent only if the Link Trap flag setting associated with the port is enabled. For more information, see snmp trap link-status on page 498. Default enabled Format snmp-server enable traps linkmode Mode Global Config no snmp-server enable traps linkmode Use this command to disable Link Up/Down traps for the entire switch. Format no snmp-server enable traps linkmode Mode Global Config snmp-server enable traps multiusers Use this command to enable Multiple User traps. When the traps are enabled, a Multiple User Trap is sent when a user logs in to the terminal interface (EIA 232 or Telnet) and there is an existing terminal interface session. Default enabled Format snmp-server enable traps multiusers Mode Global Config no snmp-server enable traps multiusers Use this command to disable Multiple User traps. Format no snmp-server enable traps multiusers Mode Global Config snmp-server enable traps stpmode Use this command to enable sending new root traps and topology change notification traps. Default enabled Format snmp-server enable traps stpmode Mode Global Config Management Commands 495 M4100 Series ProSAFE Managed Switches no snmp-server enable traps stpmode Use this command to disable sending new root traps and topology change notification traps. Format no snmp-server enable traps stpmode Mode Global Config snmptrap Use this command to add an SNMP trap receiver. The maximum length of <name> is 16 case-sensitive alphanumeric characters. The <snmpversion> is the version of SNMP. The version parameter options are SNMPv1 or SNMPv2. The SNMP trap address can be set using both an IPv4 address format as well as an IPv6 global address format. The <name> parameter does not need to be unique. However, the combination of the name and IP address or host name must be unique. Multiple entries can exist with the same <name> parameter, as long as they are associated with a different IP address or host name. The reverse scenario is also acceptable. The <name> parameter is the community name that is used when the trap is sent to the receiver, but the <name> parameter is not directly associated with the SNMP Community Table (see snmp-server community on page 491). Default snmpv2 Format snmptrap <name> {ipaddr {<ipaddr> | <hostname> | ip6addr {<ip6addr> | <hostname>} [snmpversion <snmpversion>] Mode Global Config Command example: (Netgear Switch)# snmptrap mytrap ip6addr 3099::2 no snmptrap Use this command to delete trap receivers for a community. Format no snmptrap <name> {ipaddr {<ipaddr> | <hostname> | ip6addr {<ip6addr> | <hostname>} Mode Global Config snmptrap snmpversion Use this command to modify the SNMP version of a trap. The maximum length of <name> is 16 case-sensitive alphanumeric characters. The <snmpversion> parameter options are snmpv1 or snmpv2. Management Commands 496 M4100 Series ProSAFE Managed Switches Note: This command does not support a no form. Default snmpv2 Format snmptrap snmpversion <name> {<ipaddr> | <hostname>} | {<ip6addr> | <hostname>} {snmpv1 | snmpv2} Mode Global Config snmptrap ipaddr Use this command to assign an IP address to a specified community name. The name can use up to 16 case-sensitive alphanumeric characters. Note: IP addresses in the SNMP trap receiver table must be unique. If you make multiple entries using the same IP address, the first entry is retained and processed. All duplicate entries are ignored. Format snmptrap ipaddr <name> <ipaddrold> {<ipaddrnew | hostnamenew>} Mode Global Config snmptrap mode Use this command to activate or deactivate an SNMP trap. Enabled trap receivers are active (able to receive traps). Disabled trap receivers are inactive (not able to receive traps). Format snmptrap mode <name> {<ipaddr> | <ip6addr> | <hostname>} Mode Global Config no snmptrap mode Use this command to deactivate an SNMP trap. Disabled trap receivers are unable to receive traps. Format no snmptrap mode <name> {<ipaddr> | <ip6addr> | <hostname>} Mode Global Config Management Commands 497 M4100 Series ProSAFE Managed Switches snmp trap link-status Use this command to enable link status traps by interface. Note: This command is valid only when the Link Up/Down Flag is enabled. For more information, see snmp-server enable traps linkmode on page 495. Format snmp trap link-status Mode Interface Config no snmp trap link-status Use this command to disable link status traps by interface. Note: This command is valid only when the Link Up/Down Flag is enabled. Format no snmp trap link-status Mode Interface Config snmp trap link-status all Use this command to enable link status traps for all interfaces. Note: This command is valid only when the Link Up/Down Flag is enabled. For more information, see snmp-server enable traps linkmode on page 495. Format snmp trap link-status all Mode Global Config no snmp trap link-status all Use this command to disable link status traps for all interfaces. Note: This command is valid only when the Link Up/Down Flag is enabled. For more information, see snmp-server enable traps linkmode on page 495. Management Commands 498 M4100 Series ProSAFE Managed Switches Format no snmp trap link-status all Mode Global Config show snmpcommunity Use this command to display SNMP community information. Six communities are supported. You can add, change, or delete communities. The switch does not need to be reset for changes to take effect. The SNMP agent of the switch complies with SNMP versions 1, 2 or 3. For more information about the SNMP specification, see the SNMP RFCs. The SNMP agent sends traps through TCP/IP to an external SNMP manager based on the SNMP configuration (the trap receiver and other SNMP community parameters). Format show snmpcommunity Mode Privileged EXEC Field Definition SNMP Community Name The community string to which this entry grants access. A valid entry is a case-sensitive alphanumeric string of up to 16 characters. Each row of this table must contain a unique community name. Client IP Address An IP address (or portion thereof) from which this device will accept SNMP packets with the associated community. The requesting entity's IP address is ANDed with the Subnet Mask before being compared to the IP address. Note: If the Subnet Mask is set to 0.0.0.0, an IP address of 0.0.0.0 matches all IP addresses. The default value is 0.0.0.0. Client IP Mask A mask to be ANDed with the requesting entity's IP address before comparison with IP address. If the result matches with IP address then the address is an authenticated IP address. For example, if the IP address = 9.47.128.0 and the corresponding Subnet Mask = 255.255.255.0 a range of incoming IP addresses would match, i.e. the incoming IP address could equal 9.47.128.0 - 9.47.128.255. The default value is 0.0.0.0. Access Mode The access level for this community string. Status The status of this community access entry. show snmptrap Use this command to display SNMP trap receivers. Trap messages are sent across a network to an SNMP network manager. These messages alert the manager to events occurring within the switch or on the network. Six trap receivers are simultaneously supported. Format show snmptrap Mode Privileged EXEC Management Commands 499 M4100 Series ProSAFE Managed Switches Field Definition SNMP Trap Name The community string of the SNMP trap packet sent to the trap manager. The string is case-sensitive and can be up to 16 alphanumeric characters. IP Address The IPv4 address to receive SNMP traps from this device. IPv6 Address The IPv6 address to receive SNMP traps from this device. SNMP Version SNMPv2 Status The receiver's status (enabled or disabled). Command example: (Netgear Switch)#show snmptrap Community Name Mytrap IpAddress 0.0.0.0 IPv6 Address 2001::1 Snmp Version SNMPv2 Mode Enable show trapflags show trapflags Use this command to display trap conditions. The command’s display shows all the enabled OSPFv2 and OSPFv3 trap flags. Configure which traps the switch should generate by enabling or disabling the trap condition. If a trap condition is enabled and the condition is detected, the SNMP agent on the switch sends the trap to all enabled trap receivers. You do not have to reset the switch to implement the changes. Cold and warm start traps are always generated and cannot be disabled. Format show trapflags Mode Privileged EXEC Field Definition Authentication Flag Can be enabled or disabled. The factory default is enabled. Indicates whether authentication failure traps will be sent. Link Up/Down Flag Can be enabled or disabled. The factory default is enabled. Indicates whether link status traps will be sent. Multiple Users Flag Can be enabled or disabled. The factory default is enabled. Indicates whether a trap will be sent when the same user ID is logged into the switch more than once at the same time (either through Telnet or the serial port). Spanning Tree Flag Can be enabled or disabled. The factory default is enabled. Indicates whether spanning tree traps are sent. ACL Traps Might be enabled or disabled. The factory default is disabled. Indicates whether ACL traps are sent. DVMRP Traps Can be enabled or disabled. The factory default is disabled. Indicates whether DVMRP traps are sent. Management Commands 500 M4100 Series ProSAFE Managed Switches Field Definition OSPFv2 Traps Can be enabled or disabled. The factory default is disabled. Indicates whether OSPF traps are sent. If any of the OSPF trap flags are not enabled, the command displays disabled. Otherwise, the command shows all the enabled OSPF traps’ information. OSPFv3 Traps Can be enabled or disabled. The factory default is disabled. Indicates whether OSPF traps are sent. If any of the OSPFv3 trap flags are not enabled, the command displays disabled. Otherwise, the command shows all the enabled OSPFv3 traps’ information. PIM Traps Can be enabled or disabled. The factory default is disabled. Indicates whether PIM traps are sent. RADIUS Commands This section describes the commands you use to configure the switch to use a Remote Authentication Dial-In User Service (RADIUS) server on your network for authentication and accounting. authorization network radius Use this command to enable the switch to accept VLAN assignment by the radius server. Default disable Format authorization network radius Mode Global Config no authorization network radius Use this command to disable the switch to accept VLAN assignment by the radius server. Format no authorization network radius Mode Global Config radius accounting mode Use this command to enable the RADIUS accounting function. Default disabled Format radius accounting mode Mode Global Config Management Commands 501 M4100 Series ProSAFE Managed Switches no radius accounting mode Use this command to set the RADIUS accounting function to the default value (disabled). Format no radius accounting mode Mode Global Config radius server attribute Use this command to specify the RADIUS client to use the NAS-IP Address attribute in the RADIUS requests. If the specific IP address is configured while enabling this attribute, the RADIUS client uses that IP address while sending NAS-IP-Address attribute in RADIUS communication. Format radius server attribute 4 [<ipaddr>] Mode Global Config Parameter Definition 4 NAS-IP-Address attribute to be used in RADIUS requests. ipaddr The IP address of the server. no radius server attribute Use this command to disable the NAS-IP-Address attribute global parameter for RADIUS client. When this parameter is disabled, the RADIUS client does not send the NAS-IP-Address attribute in RADIUS requests. Format no radius server attribute 4 [<ipaddr>] Mode Global Config Command example: (NETGEAR Switch) (Config) #radius server attribute 4 192.168.37.60 Command example: (NETGEAR Switch) (Config) #radius server attribute 4 radius server host This command configures the IP address or DNS name to use for communicating with the RADIUS server of a selected server type. While configuring the IP address or DNS name for the authenticating or accounting servers, you can also configure the port number and server name. If the authenticating and accounting servers are configured without a name, the command uses the Default_RADIUS_Auth_Server and Default_RADIUS_Acct_Server as the Management Commands 502 M4100 Series ProSAFE Managed Switches default names, respectively. The same name can be configured for more than one authenticating servers and the name should be unique for accounting servers. The RADIUS client allows the configuration of a maximum 32 authenticating and accounting servers. If you use the auth parameter, the command configures the IP address or host name to use to connect to a RADIUS authentication server. You can configure up to three servers per RADIUS client. If the maximum number of configured servers is reached, the command fails until you remove one of the servers by issuing the no form of the command. If you use the optional port parameter, the command configures the UDP port number to use when connecting to the configured RADIUS server. For the port keyword, the <number> argument must be a value in the range 0–65535, with 1813 being the default. Note: To reconfigure a RADIUS authentication server to use the default UDP port, set the <number> argument to 1812. If you use the acct token, the command configures the IP address or host name to use for the RADIUS accounting server. You can only configure one accounting server. If an accounting server is currently configured, use the no form of the command to remove it from the configuration. The IP address or host name you specify must match that of a previously configured accounting server. If you use the optional port parameter, the command configures the UDP port to use when connecting to the RADIUS accounting server. If a port is already configured for the accounting server, the new port replaces the previously configured port. For the port keyword, the <number> argument must be a value in the range 0–65535, with 1813 being the default. Note: To reconfigure a RADIUS accounting server to use the default UDP port, set the <number> argument to 1813. Format radius server host {auth | acct} {<ipaddr> | <dnsname>} [name <servername>] [port <number>] [type <server-type>] Mode Global Config Parameter Description <ipaddr> The IP address of the server. <dnsname> The DNS name of the server. <servername> The alias name to identify the server. <number> The port number in the range 0–65535 to use to connect to the specified RADIUS server. <server-type> Enter one of the following options: • 0. Specifies a standard server. • 1. Specifies a NETGEAR server. Management Commands 503 M4100 Series ProSAFE Managed Switches no radius server host Use this command to delete the configured server entry from the list of configured RADIUS servers. If the RADIUS authenticating server being removed is the active server in the servers that are identified by the same server name, then the RADIUS client selects another server for making RADIUS transactions. If you use the auth parameter, the previously configured RADIUS authentication server is removed from the configuration. Similarly, If you use the acct parameter, the previously configured RADIUS accounting server is removed from the configuration. The <ipaddr> or <dnsname> parameter must match the IP address or DSN name of the previously configured RADIUS authentication or accounting server. Format no radius server host {auth | acct} {<ipaddr> | <dnsname>} Mode Global Config Command example: (NETGEAR Switch) (Config) #radius server host acct 192.168.37.60 (NETGEAR Switch) (Config) #radius server host acct 192.168.37.60 port 1813 (NETGEAR Switch) (Config) #radius server host auth 192.168.37.60 name Network1_RADIUS_Auth_Server port 1813 (NETGEAR Switch) (Config) #radius server host acct 192.168.37.60 name Network2_RADIUS_Auth_Server (NETGEAR Switch) (Config) #no radius server host acct 192.168.37.60 radius server key Use this command to configure the key to be used in RADIUS client communication with the specified server. Depending on whether the auth or acct keyword is used, the shared secret is configured for the RADIUS authentication or RADIUS accounting server. The IP address or host name provided must match a previously configured server. When this command is executed, the secret is prompted. Text-based configuration supports RADIUS server’s secrets in encrypted and non-encrypted format. When you save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter the key along with the encrypted keyword. In the output of the show running config command, these secret keys are displayed in encrypted format. You cannot show these keys in plain text format. Note: The secret must be an alphanumeric value not exceeding 16 characters. Format radius server key {auth | acct} {<ipaddr> | <dnsname>} encrypted <password> Mode Global Config Management Commands 504 M4100 Series ProSAFE Managed Switches Parameter Description <ipaddr> The IP address of the server. <dnsname> The DNS name of the server. <password> The password in encrypted format. Command example: radius server key acct 10.240.4.10 encrypted <encrypt-string> radius server msgauth Use this command to enable the message authenticator attribute to be used for the specified RADIUS Authenticating server. Format radius server msgauth {<ipaddr> | <dnsname>} Mode Global Config Parameter Description <ipaddr> The IP address of the server. <dnsname> The DNS name of the server. no radius server msgauth Use this command to disable the message authenticator attribute to be used for the specified RADIUS Authenticating server. Format no radius server msgauth {<ipaddr> | <dnsname>} Mode Global Config radius server primary Use this command to designate a configured server as the primary server in the group of servers that have the same server name. Multiple primary servers can be configured for each number of servers that have the same name. When the RADIUS client must perform transactions with an authenticating RADIUS server of specified name, the client uses the primary server that has the specified server name by default. If the RADIUS client fails to communicate with the primary server for any reason, the client uses the backup servers configured with the same server name. These backup servers are identified as the secondary type. Format radius server primary {<ipaddr> | <dnsname>} Mode Global Config Management Commands 505 M4100 Series ProSAFE Managed Switches Parameter Description <ipaddr> The IP address of the RADIUS Authenticating server. <dnsname> The DNS name of the server. radius server retransmit Use this command to configure the global parameter for the RADIUS client that specifies the number of transmissions of the messages to be made before attempting the fall back server upon unsuccessful communication with the current RADIUS authenticating server. When the maximum number of retries are exhausted for the RADIUS accounting server and no response is received, the client does not communicate with any other server. Default 4 Format radius server retransmit <retries> Mode Global Config Parameter Description <retries> The maximum number of transmission attempts in the range of 1–15. no radius server retransmit Use this command to set the value of this global parameter to the default value. Format no radius server retransmit Mode Global Config radius server timeout Use this command to configure the global parameter for the RADIUS client that specifies the time-out value (in seconds) after which a request must be retransmitted to the RADIUS server if no response is received. The time-out value is an integer in the range of 1–30 seconds. Default 5 Format radius server timeout <seconds> Mode Global Config Management Commands 506 M4100 Series ProSAFE Managed Switches no radius server timeout Use this command to set the timeout global parameter to the default value. Format no radius server timeout Mode Global Config show radius Use this command to display the values configured for the global parameters of the RADIUS client. Format show radius Mode Privileged EXEC Field Definition Number of Configured Authentication Servers The number of RADIUS Authentication servers that have been configured. Number of Configured Accounting Servers The number of RADIUS Accounting servers that have been configured. Number of Named Authentication Server Groups The number of configured named RADIUS server groups. Number of Named Accounting Server Groups The number of configured named RADIUS server groups. Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted. Time Duration The configured timeout value, in seconds, for request retransmissions. RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled or not. RADIUS Attribute 4 Mode A global parameter to indicate whether the NAS-IP-Address attribute has been enabled to use in RADIUS requests. RADIUS Attribute 4 Value A global parameter that specifies the IP address to be used in the NAS-IP-Address attribute to be used in RADIUS requests. Command example: (NETGEAR Switch)#show radius Number Number Number Number Number of of of of of Configured Authentication Servers............. Configured Accounting Servers................. Named Authentication Server Groups............ Named Accounting Server Groups................ Retransmits................................... Management Commands 507 32 32 15 3 4 M4100 Series ProSAFE Managed Switches Time Duration........................................... RADIUS Accounting Mode.................................. RADIUS Attribute 4 Mode................................. RADIUS Attribute 4 Value ............................... 10 Disable Enable 192.168.37.60 show radius servers Use this command to display the summary and details of RADIUS authenticating servers configured for the RADIUS client. Format show radius servers [<ipaddr> | <dnsname> | name [<servername>]] Mode Privileged EXEC Field Description Current The ‘*’ symbol preceding the server host address specifies that the server is currently active. Host Address The IP address of the host. Server Name The name of the authenticating server. Port The port used for communication with the authenticating server. Type Specifies whether this server is a primary or secondary type. Current Host Address The IP address of the currently active authenticating server. Secret Configured Yes or No Boolean value that indicates whether this server is configured with a secret. Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted. Message Authenticator A global parameter to indicate whether the Message Authenticator attribute is enabled or disabled. Time Duration The configured timeout value, in seconds, for request retransmissions. RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled or not. RADIUS Attribute 4 Mode A global parameter to indicate whether the NAS-IP-Address attribute has been enabled to use in RADIUS requests. RADIUS Attribute 4 Value A global parameter that specifies the IP address to be used in NAS-IP-Address attribute used in RADIUS requests. Management Commands 508 M4100 Series ProSAFE Managed Switches Command example: (NETGEAR Switch) #show radius servers Cur Host Address rent ---- -----------------------* 192.168.37.200 192.168.37.201 192.168.37.202 192.168.37.203 Server Name Type ----1813 1813 1813 1813 ---------Primary Secondary Primary Secondary --------------------------------Network1_RADIUS_Server Network2_RADIUS_Server Network3_RADIUS_Server Network4_RADIUS_Server Port Command example: (NETGEAR Switch) #show radius servers name Current Host Address Server Name Type ------------------------ --------------------------------- ----------192.168.37.200 Network1_RADIUS_Server Secondary 192.168.37.201 192.168.37.202 192.168.37.203 Network2_RADIUS_Server Network3_RADIUS_Server Network4_RADIUS_Server Primary Secondary Primary Command example: (NETGEAR Switch) #show radius servers name Default_RADIUS_Server Server Name............................ Host Address........................... Secret Configured...................... Message Authenticator ................. Number of Retransmits.................. Time Duration.......................... RADIUS Accounting Mode................. RADIUS Attribute 4 Mode................ RADIUS Attribute 4 Value .............. Default_RADIUS_Server 192.168.37.58 No Enable 4 10 Disable Enable 192.168.37.60 Command example: (NETGEAR Switch) #show radius servers 192.168.37.58 Server Name............................ Host Address........................... Secret Configured...................... Message Authenticator ................. Number of Retransmits.................. Time Duration.......................... RADIUS Accounting Mode................. RADIUS Attribute 4 Mode................ Default_RADIUS_Server 192.168.37.58 No Enable 4 10 Disable Enable Management Commands 509 M4100 Series ProSAFE Managed Switches RADIUS Attribute 4 Value .............. 192.168.37.60 show radius accounting Use this command to display a summary of configured RADIUS accounting servers. Format show radius accounting name [<servername>] Mode Privileged EXEC Field Description RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled or not. If you do not specify any parameters, only the accounting mode and the RADIUS accounting server details are displayed. Field Definition Host Address The IP address of the host. Server Name The name of the accounting server. Port The port used for communication with the accounting server. Secret Configured Yes or No Boolean value indicating whether this server is configured with a secret. Command example: (NETGEAR Switch) #show radius accounting name Host Address Server Name Port Secret Configured ----------------------- --------------------------------- -------- ----------192.168.37.200 Network1_RADIUS_Server 1813 Yes 192.168.37.201 Network2_RADIUS_Server 1813 No 192.168.37.202 Network3_RADIUS_Server 1813 Yes 192.168.37.203 Network4_RADIUS_Server 1813 No Command example: (NETGEAR Switch) #show radius accounting name Default_RADIUS_Server Server Name............................ Host Address........................... RADIUS Accounting Mode................. Port .................................. Secret Configured ..................... Default_RADIUS_Server 192.168.37.200 Disable 1813 Yes Management Commands 510 M4100 Series ProSAFE Managed Switches show radius accounting statistics Use this command to display a summary of statistics for the configured RADIUS accounting servers. Format show radius accounting statistics {<ipaddr> |<dnsname> | name <servername>} Mode Privileged EXEC Field Definition RADIUS Accounting Server Name The name of the accounting server. Server Host Address The IP address of the host. Round Trip Time The time interval, in hundredths of a second, between the most recent Accounting-Response and the Accounting-Request that matched it from this RADIUS accounting server. Requests The number of RADIUS Accounting-Request packets sent to this server. This number does not include retransmissions. Retransmission The number of RADIUS Accounting-Request packets retransmitted to this RADIUS accounting server. Responses The number of RADIUS packets received on the accounting port from this server. Malformed Responses The number of malformed RADIUS Accounting-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types are not included as malformed accounting responses. Bad Authenticators The number of RADIUS Accounting-Response packets containing invalid authenticators received from this accounting server. Pending Requests The number of RADIUS Accounting-Request packets sent to this server that have not yet timed out or received a response. Timeouts The number of accounting time-outs to this server. Unknown Types The number of RADIUS packets of unknown types, which were received from this server on the accounting port. Packets Dropped The number of RADIUS packets received from this server on the accounting port and dropped for some other reason. Command example: (NETGEAR Switch) #show radius accounting statistics 192.168.37.200 RADIUS Accounting Server Name................. Host Address.................................. Round Trip Time............................... Requests...................................... Retransmissions............................... Default_RADIUS_Server 192.168.37.200 0.00 0 0 Management Commands 511 M4100 Series ProSAFE Managed Switches Responses..................................... Malformed Responses........................... Bad Authenticators............................ Pending Requests.............................. Timeouts...................................... Unknown Types................................. Packets Dropped............................... 0 0 0 0 0 0 0 Command example: (NETGEAR Switch) #show radius accounting statistics name Default_RADIUS_Server RADIUS Accounting Server Name................. Host Address.................................. Round Trip Time............................... Requests...................................... Retransmissions............................... Responses..................................... Malformed Responses........................... Bad Authenticators............................ Pending Requests.............................. Timeouts...................................... Unknown Types................................. Packets Dropped............................... Default_RADIUS_Server 192.168.37.200 0.00 0 0 0 0 0 0 0 0 0 show radius statistics Use this command to display the summary statistics of configured RADIUS Authenticating servers. Format show radius statistics {<ipaddr> | <dnsname> | name <servername>} Mode Privileged EXEC Field Definition servername The alias name to identify the server. RADIUS Server Name The name of the authenticating server. Server Host Address The IP address of the host. Access Requests The number of RADIUS Access-Request packets sent to this server. This number does not include retransmissions. Access Retransmissions The number of RADIUS Access-Request packets retransmitted to this RADIUS authentication server. Access Accepts The number of RADIUS Access-Accept packets, including both valid and invalid packets, that were received from this server. Management Commands 512 M4100 Series ProSAFE Managed Switches Field Definition Access Rejects The number of RADIUS Access-Reject packets, including both valid and invalid packets, that were received from this server. Access Challenges The number of RADIUS Access-Challenge packets, including both valid and invalid packets, that were received from this server. Malformed Access Responses The number of malformed RADIUS Access-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types are not included as malformed access responses. Bad Authenticators The number of RADIUS Access-Response packets containing invalid authenticators or signature attributes received from this server. Pending Requests The number of RADIUS Access-Request packets destined for this server that have not yet timed out or received a response. Timeouts The number of authentication time-outs to this server. Unknown Types The number of packets of unknown type that were received from this server on the authentication port. Packets Dropped The number of RADIUS packets received from this server on the authentication port and dropped for some other reason. Command example: (NETGEAR Switch) #show radius statistics 192.168.37.200 RADIUS Server Name............................ Server Host Address........................... Access Requests............................... Access Retransmissions........................ Access Accepts................................ Access Rejects................................ Access Challenges............................. Malformed Access Responses.................... Bad Authenticators............................ Pending Requests.............................. Timeouts...................................... Unknown Types................................. Packets Dropped............................... Default_RADIUS_Server 192.168.37.200 0.00 0 0 0 0 0 0 0 0 0 0 Command example: (NETGEAR Switch) #show radius statistics name Default_RADIUS_Server RADIUS Server Access Access Server Name............................ Host Address........................... Requests............................... Retransmissions........................ Default_RADIUS_Server 192.168.37.200 0.00 0 Management Commands 513 M4100 Series ProSAFE Managed Switches Access Accepts................................ Access Rejects................................ Access Challenges............................. Malformed Access Responses.................... Bad Authenticators............................ Pending Requests.............................. Timeouts...................................... Unknown Types................................. Packets Dropped............................... 0 0 0 0 0 0 0 0 0 TACACS+ Commands TACACS+ provides access control for networked devices via one or more centralized servers. Similar to RADIUS, this protocol simplifies authentication by making use of a single database that can be shared by many clients on a large network. TACACS+ is based on the TACACS protocol (described in RFC1492) but additionally provides for separate authentication, authorization, and accounting services. The original protocol was UDP based with messages passed in clear text over the network. TACACS+ uses TCP to ensure reliable delivery and a shared key configured on the client and daemon server to encrypt all messages. debug tacacs packet Use this command to enable TACACS+ packet debugging. Default Disabled Format debug tacacs packet [receive | transmit] Mode Global Config no debug tacacs packet Use this command to disable TACACS+ packet debugging. Format no debug tacacs packet Mode Global Config tacacs-server host Use this command to configure a TACACS+ server. This command enters into the TACACS+ configuration mode. The <ip-address> or <hostname> parameter is the IP address or host name of the TACACS+ server. To specify multiple hosts, repeat this command. Format tacacs-server host {<ip-address> | <hostname>} Mode Global Config Management Commands 514 M4100 Series ProSAFE Managed Switches no tacacs-server host Use this command to delete the specified TACACS+ server. The <ip-address> or <hostname> parameter is the IP address or host name of the TACACS+ server. Format no tacacs-server host {<ip-address> | <hostname>} Mode Global Config tacacs-server key Use this command to set the authentication and encryption key for all TACACS+ communications between the switch and the TACACS+ daemon. The <key-string> parameter has a range of 0–128 characters and specifies the authentication and encryption key for all TACACS communications between the switch and the TACACS+ server. This key must match the key used on the TACACS+ daemon. Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted format. When you save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter the key along with the encrypted keyword. In the output of the show running config command, these secret keys are displayed in encrypted format. You cannot show these keys in plain text format. Format tacacs-server key [<key-string> | encrypted <key-string>] Mode Global Config no tacacs-server key Use this command to disable the authentication and encryption key for all TACACS+ communications between the switch and the TACACS+ daemon. The <key-string> parameter has a range of 0–128 characters. This key must match the key used on the TACACS+ daemon. Format no tacacs-server key <key-string> Mode Global Config tacacs-server keystring Use this command to set the global authentication encryption key used for all TACACS+ communications between the TACACS+ server and the client. Format tacacs-server keystring Mode Global Config Management Commands 515 M4100 Series ProSAFE Managed Switches tacacs-server source interface Use this command in Global Configuration mode to configure the global source interface (source IP selection) for all TACACS+ communications between the TACACS+ client and the server. Format tacacs-server source-interface {<slot/port> | loopback <loopback-id> | vlan <vlan-id>} Mode Global Config Parameter Description <slot/port The unit identifier assigned to the switch. <loopback-id The loopback interface. The range is 0–7. <vlan-id> The VLAN ID. The range is 1–4,093. no tacacs-server source interface Use this command in Global Configuration mode to remove the global source interface (source IP selection) for all TACACS+ communications between the TACACS+ client and the server. Format no tacacs-server source-interface Mode Privileged Exec tacacs-server timeout Use this command to set the timeout value for communication with the TACACS+ servers. The <timeout> parameter has a range of 1-30 and is the time-out value in seconds. Default 5 Format tacacs-server timeout <timeout> Mode Global Config no tacacs-server timeout Use this command to restore the default time-out value for all TACACS servers. Format no tacacs-server timeout Mode Global Config Management Commands 516 M4100 Series ProSAFE Managed Switches key (TACACS Config) Use the key command in TACACS Configuration mode to specify the authentication and encryption key for all TACACS communications between the device and the TACACS server. This key must match the key used on the TACACS daemon. The <key-string> parameter specifies the key name. For an empty string use “ ”. The range is 0–128 characters. Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted format. When you save the configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter the key along with the encrypted keyword. In the output of the show running config command, these secret keys are displayed in encrypted format. You cannot show these keys in plain text format. Format key [<key-string> | encrypted <key-string>] Mode TACACS Config port (TACACS Config) Use this command in TACACS Configuration mode to specify a server port number. The server <number> range is 0–65535. Default 49 Format port <number> Mode TACACS Config priority (TACACS Config) Use this command in TACACS Configuration mode to specify the order in which servers are used, where 0 (zero) is the highest priority. The <priority> parameter specifies the priority for servers. The highest priority is 0 (zero), and the range is 0 - 65535. Default 0 Format priority <priority> Mode TACACS Config timeout (TACACS Config) Use this command in TACACS Configuration mode to specify the time-out value in seconds. If no time-out value is specified, the global value is used. The <timeout> parameter has a range of 1-30 seconds. Format timeout <timeout> Mode TACACS Config Management Commands 517 M4100 Series ProSAFE Managed Switches show tacacs Use this command to display the configuration and statistics of a TACACS+ server. Format show tacacs [<ip-address> | <hostname>] Mode Privileged EXEC Field Definition Host Address The IP address or hostname of the configured TACACS+ server. Port The configured TACACS+ server port number. TimeOut The timeout in seconds for establishing a TCP connection. Priority The preference order in which TACACS+ servers are contacted. If a server connection fails, the next highest priority server is contacted. Configuration Scripting Commands Configuration Scripting allows you to generate text-formatted script files representing the current configuration of a system. You can upload these configuration script files to a computer or UNIX system and edit them. Then, you can download the edited files to the system and apply the new configuration. You can apply configuration scripts to one or more switches with no or minor modifications. Use the show running-config command (see show running-config on page 349) to capture the running configuration into a script. Use the copy command (see copy on page 371) to transfer the configuration script to or from the switch. You should use scripts on systems with default configuration; however, you are not prevented from applying scripts on systems with non-default configurations. Scripts must conform to the following rules: • Script files are not distributed across the stack, and only live in the unit that is the master unit at the time of the file download. • The file extension must be “.scr”. • A maximum of ten scripts are allowed on the switch. • The combined size of all script files on the switch shall not exceed 2048 KB. • The maximum number of configuration file command lines is 2000. You can type single-line annotations at the command prompt to use when you write test or configuration scripts to improve script readability. The exclamation point (!) character flags the beginning of a comment. The comment flag character can begin a word anywhere on the command line, and all input following this character is ignored. Any command line that begins with the “!” character is recognized as a comment line and ignored by the parser. Management Commands 518 M4100 Series ProSAFE Managed Switches The following lines show an example of a script: ! Script file for displaying management access show telnet !Displays the information about remote connections ! Display information about direct connections show serial ! End of the script file! To specify a blank password for a user in the configuration script, you must specify it as a space within quotes. For example, to change the password for user jane from a blank password to hello, the script entry is as follows: users passwd jane " " hello hello script apply Use this command to apply the commands in the script to the switch. The <scriptname> parameter is the name of the script to apply. Format script apply <scriptname> Mode Privileged EXEC script delete Use this command to delete a specified script, where the <scriptname> parameter is the name of the script to delete. The all option deletes all the scripts present on the switch. Format script delete {<scriptname> | all} Mode Privileged EXEC script list Use this command to list all scripts present on the switch as well as the remaining available space. Format script list Mode Global Config Management Commands 519 M4100 Series ProSAFE Managed Switches Term Definition Configuration Script Name of the script. Size Privileged EXEC script show Use this command to display the contents of a script file, which is named <scriptname>. Format script show <scriptname> Mode Privileged EXEC Term Definition Output Format line <number>: <line contents> script validate Use this command to validate a script file by parsing each line in the script file, where <scriptname> is the name of the script to validate. The validate option is intended to be used as a tool for script development. Validation identifies potential problems. It might not identify all problems with a script on a device. Format script validate <scriptname> Mode Privileged EXEC Pre-Login Banner and System Prompt Commands This section describes the commands you use to configure the pre-login banner and the system prompt. The pre-login banner is the text that displays before you login at the User: prompt. copy (pre-login banner) Use the copy command to upload or download the CLI banner from the switch. You can specify local URLs by using TFTP, Xmodem, Ymodem, or Zmodem. Note: <ip6address> is also a valid parameter for routing packages that support IPv6. Management Commands 520 M4100 Series ProSAFE Managed Switches Format copy <url> nvram:clibanner or copy nvram:clibanner <url> Mode Privileged EXEC set prompt Use this command to change the name of the prompt. The length of name might be up to 64 alphanumeric characters. Format set prompt <prompt_string> Mode Privileged EXEC set clibanner Use this command to add the CLI Banner. The banner message supports up to 2000 characters. Format set clibanner <line> Mode Global Config no set clibanner Use this command to remove the CLI Banner downloaded through TFTP. Format no set clibanner Mode Global Config Management Commands 521 9. Green Ethernet Commands 9 This chapter describes the green Ethernet commands available in the managed switch CLI. The chapter contains the following sections: • Green Feature Support • Energy-Detect Mode • Energy Efficient Ethernet (EEE) • Green Ethernet Commands 522 M4100 Series ProSAFE Managed Switches Green Feature Support The NETGEAR Managed switch supports the following green Ethernet power saving modes: • Energy Detect Mode • EEE Mode The green Ethernet commands supported depends on the switch model. Table 2. Green feature support Model Energy-Detect EEE M4100-D10-POE Yes No M4100-D12G Yes Yes M4100-50G-POE+ Yes Yes M4100-26G-POE Yes Yes M4100-50G Yes Yes M4100-26G Yes Yes M4100-50-POE Yes No M4100-26-POE Yes No M7100-24x No Yes M4100-12GF Yes No M4100-D12G-POE+ Yes No M4100-24G-POE+ Yes No M4100-12G-POE+ Yes No Energy-Detect Mode When Energy-Detect mode is enabled, if communication on a port stops, the port circuitry automatically shuts down for a short period. The port wakes up periodically to check for link activity. If activity is detected, the port circuitry remains active. This allows performing autonegotiation and saving power when there is no active link. Note: Combination ports support both copper and fiber media. Energy Detect mode only applies to copper media. If Energy Detect mode is configured on a combination port, it will only function when a copper media is active. Green Ethernet Commands 523 M4100 Series ProSAFE Managed Switches Energy Efficient Ethernet (EEE) Energy Efficient Ethernet (EEE) combines MAC with ports that support operation in a Low-Power Mode. This feature is defined by the IEEE 802.3az Energy Efficient Ethernet Task Force. Lower Power Mode enables both send and receive sides of a link to disable some port functionality to save power when the port is lightly loaded. Transition to Low-Power Mode does not change the link status. Frames in transit are not dropped or corrupted during transition to and from Low-Power Mode. This transition time is transparent to upper layer protocols and applications. EEE operation is subject to the following conditions: • Autonegotiation must be enabled to use any of the EEE modes. EEE mode is disabled automatically when autonegotiation is disabled. • Enabling or Disabling EEE mode causes the port link to flap once as EEE capability needs to be advertised. This restarts autonegotiation. • EEE must be disabled while running hardware or software cable diagnostics. • Combo (Combination) ports: Combo ports support both copper and fiber media. EEE mode only applies to copper media. If Energy Detect mode is configured on a combination port, it will only function when a copper media is active. EEE LPI statistics are only collected if a copper media is used on the port. If the media on a port changes from copper to fiber while EEE is enabled, LPI statistics collection stops until the media changes back to copper. The outputs of the show green-mode <slot/port> and show green-mode eee-lpi-history interface <slot/port> commands display updated LPI statistics only if the medium is copper. Green Ethernet Commands green-mode energy-detect Use this command enables energy-detect mode on an interface or on all the interfaces. Default Disabled Format green-mode energy-detect Mode • • Interface Config Interface Range Config no green-mode energy-detect This command disables energy-detect mode on an interface or on all the interfaces. Format no green-mode energy-detect Mode • • Interface Config Interface Range Config Green Ethernet Commands 524 M4100 Series ProSAFE Managed Switches green-mode eee This command enables EEE low-power idle mode on an interface or on all interfaces. It allows both send and receive sides of a link to disable some functionality for power savings when the port is lightly loaded. Transition to Low-Power Mode does not change the link status. Frames in transit are not dropped or corrupted in transition to and from Low-Power Mode. Default Disabled Format green-mode eee Mode • • Interface Config Interface Range Config no green-mode eee This command disables EEE. Format no green-mode eee Mode • • Interface Config Interface Range Config clear green-mode statistics This command to clears the following for a specified <slot/port>, or for all ports: • EEE LPI event count, and LPI duration • EEE LPI history table entries • Cumulative Power savings estimates Format clear green-mode statistics {<slot/port> | all} Mode Privileged Exec Command example: (NETGEAR Switch) Are you sure you Green Mode Stats (NETGEAR Switch) Are you sure you Green Mode Stats #clear green-mode want to clear the Cleared. #clear green-mode want to clear the Cleared. statistics 0/1 green mode port stats? (y/n)y statistics all green mode port stats? (y/n)y Green Ethernet Commands 525 M4100 Series ProSAFE Managed Switches show green-mode This command displays the green mode configuration and operational status either for the whole system or for a port. This command can display the per-port configuration and operational status of the green mode. The status is shown only for the modes supported on the switch. Format show green-mode [<slot/port>] Mode Privileged Exec The following table shows the fields that display if you do not specify a slot and port. Field Definition Energy Detect Energy-detect Config Energy-detect Admin mode is enabled or disabled Energy-detect Opr Energy detect mode is currently active or inactive. The energy detect mode might be administratively enabled, but the operational status might be inactive. EEE EEE Config EEE Admin Mode is enabled or disabled. Global Cumulative Energy Saving per Stack Estimated cumulative energy saved per stack in (watts * hours) due to all green modes enabled Current Power Consumption per Stack Power consumption by all ports in stack in mWatts. Power Saving Estimated percentage power saved on all ports in stack due to green mode(s) enabled. Unit Unit index of the stack member Green Ethernet Features List of green features supported on the unit which could be one or more of the supported following: Energy-Detect (Energy Detect), Short-Reach (Short Reach), EEE (Energy Efficient Ethernet), LPI-History (EEE Low Power Idle History), LLDP-Cap-Exchg (EEE LLDP Capability Exchange), Pwr-Usg-Est (Power Usage Estimates). The following table shows the fields that display if you specify a slot and port. Field Definition Energy-detect admin mode Energy-detect mode is enabled or disabled. Energy-detect operational status Energy detect mode is currently active or inactive. The energy detect mode might be administratively enabled, but the operational status might be inactive. The reasons for the same are described below. Green Ethernet Commands 526 M4100 Series ProSAFE Managed Switches Field Definition Reason for Energy-detect The energy detect mode might be administratively enabled, but the operational current operational status status might be inactive. The reasons for the same are: - Port is currently operating in the fiber mode - Link is up. - Admin Mode Disabled - Interface Not Attached If the energy-detect operational status is active, the reason field displays No energy Detected EEE Admin Mode EEE Admin Mode is enabled or disabled. Transmit Idle Time It is the time for which condition to move to LPI state is satisfied, at the end of which MAC TX transitions to LPI state. The Range is (0 to 0xffffffff).The default value is 0. Transmit Wake Time It is the time for which MAC / switch has to wait to go back to ACTIVE state from LPI state when it receives packet for transmission. The Range is (0 to 0xffff).The default value is 0. Rx Low Power Idle Event This field is incremented each time MAC RX enters LP IDLE state. Shows the total Count number of Rx LPI Events since EEE counters are last cleared Rx Low Power Idle Duration (microsec) This field indicates duration of Rx LPI state in 10-microsecond increments. Shows the total duration of Rx LPI since the EEE counters are last cleared. Tx Low Power Idle Event This field is incremented each time MAC TX enters LP IDLE state. Shows the total Count number of Tx LPI Events since EEE counters are last cleared. Tx Low Power Idle Duration (microsec) This field indicates duration of Tx LPI state in 10us increments. Shows the total duration of Tx LPI since the EEE counters are last cleared. Tw_sys_tx (microsec) Integer that indicates the value of Tw_sys that the local system can support. This value is updated by the EEE DLL Transmitter state diagram. This variable maps into the aLldpXdot3LocTxTwSys attribute. Tw_sys Echo (microsec) Integer that indicates the remote system's Transmit Tw_sys that was used by the local system to compute the Tw_sys that it wants to request from the remote system. This value maps into the aLldpXdot3LocTxTwSysEcho attribute. Tw_sys_rx (microsec) Integer that indicates the value of Tw_sys that the local system requests from the remote system. This value is updated by the EEE Receiver L2 state diagram. This variable maps into the aLldpXdot3LocRxTwSys attribute. Tw_sys_rx Echo (microsec) Integer that indicates the remote systems Receive Tw_sys that was used by the local system to compute the Tw_sys that it can support. This value maps into the aLldpXdot3LocRxTwSysEcho attribute. Fallback Tw_sys (microsec) Integer that indicates the value of fallback Tw_sys that the local system requests from the remote system. This value is updated by the local system software. Remote Tw_sys_tx (microsec) Integer that indicates the value of Tw_sys that the remote system can support. This value maps from the aLldpXdot3RemTxTwSys attribute. Remote Tw_sys Echo (microsec) Integer that indicates the value Transmit Tw_sys echoed back by the remote system. This value maps from the aLldpXdot3RemTxTwSysEcho attribute. Green Ethernet Commands 527 M4100 Series ProSAFE Managed Switches Field Definition Remote Tw_sys_rx (microsec) Integer that indicates the value of Tw_sys that the remote system requests from the local system. This value maps from the aLldpXdot3RemRxTwSys attribute. Remote Tw_sys_rx Echo Integer that indicates the value of Receive Tw_sys echoed back by the remote (microsec) system. This value maps from the aLldpXdot3RemRxTwSysEcho attribute. Remote Fallback Tw_sys Integer that indicates the value of fallback Tw_sys that the remote system is (microsec) advertising. This attribute maps to the variable RemFbSystemValue as defined in 78.4.2.3. Tx_dll_enabled Initialization status of the EEE transmit Data Link Layer management function on the local system. Tx_dll_ready Data Link Layer ready: This variable indicates that the tx system initialization is complete and is ready to update/receive LLDPDU containing EEE TLV. This variable is updated by the local system software. Rx_dll_enabled Status of the EEE capability negotiation on the local system. Rx_dll_ready Data Link Layer ready: This variable indicates that the rx system initialization is complete and is ready to update/receive LLDPDU containing EEE TLV. This variable is updated by the local system software. Cumulative Energy Saving Estimated Cumulative energy saved on this port in (Watts * hours) due to all green modes enabled Time Since Counters Last Cleared Time Since Counters Last Cleared (since the time of power up, or after 'clear eee counters' is executed) Note: Executing the clear green-mode statistics command clears only the EEE Transmit, Receive LPI event count, LPI duration, and Cumulative Energy Savings Estimates of the port. Other status parameters listed in the previous table remain unaffected after you executed the clear green-mode statistics command. Command example: (NETGEAR Switch) #show green-mode Current Power Consumption (mW).............. XX Power Saving (%)............................ XX Cumulative Energy Saving /Stack (W * H)... XX Unit ---1 Green Ethernet Features Supported -------------------------------Energy-Detect EEE LPI-History LLDP-Cap-Exchg Pwr-Usg-Est Green Ethernet Commands 528 M4100 Series ProSAFE Managed Switches Interface --------0/1 0/2 0/3 0/4 0/5 0/6 0/7 0/8 0/9 0/10 0/11 0/12 0/13 0/14 0/15 0/16 0/17 0/18 0/19 0/20 0/21 0/22 0/23 0/24 0/25 Energy-Detect Config Opr --------- --------Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Disabled Inactive Short-Reach-Config Auto Forced --------- --------- Command example: (NETGEAR Switch) #show green-mode 0/25 EEE Admin Mode................................. Transmit Idle Time......................... Transmit Wake Time......................... Rx Low Power Idle Event Count.............. Rx Low Power Idle Duration (uSec).......... Tx Low Power Idle Event Count.............. Tx Low Power Idle Duration (uSec).......... Tw_sys_tx (usec)........................... Tw_sys_tx Echo (usec)...................... Tw_sys_rx (usec)........................... Tw_sys_rx Echo (usec)...................... Fallback Tw_sys (usec)..................... Tx DLL enabled............................. Tx DLL ready............................... Enabled 0 0 0 0 0 0 XX XX XX XX XX Yes Yes Green Ethernet Commands 529 Short-Reach Opr ----------- EEE Config -------Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled M4100 Series ProSAFE Managed Switches Rx DLL enabled............................. Yes Rx DLL ready............................... Yes Cumulative Energy Saving (W * H)............. XX Time Since Counters Last Cleared............... 1 day 20 hr 47 min 34 sec green-mode eee-lpi-history Configure the global EEE LPI history collection interval and buffer size using this command. This value is applied globally on all interfaces on the stack. Note: The sampling interval configured by the user takes effect immediately. The current and future samples are collected at this new sampling interval. Default sampling-interval = 3600; max-samples = 168 Format green-mode eee-lpi-history {sampling-interval <30-36000sec> | max-samples <1-168>} Mode Global Config no green-mode eee-lpi-history Use this command to set the sampling interval or max-samples values to defaults: • sampling-interval = 3600 • max-samples = 168 Format no green-mode eee-lpi-history {sampling-interval | max-samples} Mode Global Config show green-mode eee-lpi-history interface This command displays the interface green-mode EEE LPI history. Format show green-mode eee-lpi-history interface <slot/port> Mode Privileged Exec Field Description Sampling Interval Interval at which EEE LPI statistics is collected. Total No. of Samples to Keep Maximum number of samples to keep Green Ethernet Commands 530 M4100 Series ProSAFE Managed Switches Field Description Percentage LPI time per stack Percentage of Total time spent in LPI mode by all port in stack when compared to total time since reset. Sample No Sample Index Sample Time Time since last reset %time spent in LPI mode since last sample Percentage of time spent in LPI mode on this port when compared to sampling interval %time spent in LPI mode since last reset Percentage of total time spent in LPI mode on this port when compared to time since reset. Command example: (NETGEAR Switch)#show green-mode eee-lpi-history interface 0/1 Sampling Interval (sec)........................ 30 Total No. of Samples to Keep................... 168 Percentage LPI time per stack.................. 29 Sample No. Time Since The Sample Was Recorded ------ -------------------10 0d:00:00:13 9 0d:00:00:44 8 0d:00:01:15 7 0d:00:01:46 6 0d:00:02:18 5 0d:00:02:49 4 0d:00:03:20 3 0d:00:03:51 2 0d:00:04:22 1 0d:00:04:53 Percentage of Time spent in LPI mode since last sample -------------3 3 3 3 3 3 3 3 3 3 Percentage of Time spent in LPI mode since last reset -------------2 2 2 2 2 2 2 1 1 1 Green Ethernet Commands 531 10. 10 Log Messages This chapter lists common log messages, along with information regarding the cause of each message. There is no specific action that can be taken per message. If a problem is being diagnosed, a set of these messages in the event log, along with an understanding of the system configuration and details of the problem, can assist NETGEAR technical support in determining the root cause of such a problem. Note: This chapter does not contain a complete list of all syslog messages. The chapter contains the following sections: • Core • Utilities • Management • Switching • QoS • Routing/IPv6 Routing • Multicast • Stacking • Technologies • O/S Support 532 M4100 Series ProSAFE Managed Switches Core Table 3. BSP Log Messages Component Message Cause BSP Event(0xaaaaaaaa) Switch has restarted. BSP Starting code... BSP initialization complete, starting application. Table 4. NIM Log Messages Component Message Cause NIM NIM: L7_ATTACH out of order for intIfNum(x) unit x slot x port x Interface creation out of order NIM NIM: Failed to find interface at unit x slot x port x for event(x) There is no mapping between the USP and Interface number NIM NIM: L7_DETACH out of order for intIfNum(x) unit x slot x port x Interface creation out of order NIM NIM: L7_DELETE out of order for intIfNum(x) unit x slot x port x Interface creation out of order NIM NIM: event(x),intf(x),component(x), in wrong phase An event was issued to NIM during the wrong configuration phase (probably Phase 1, 2, or WMU) NIM NIM: Failed to notify users of interface change Event was not propagated to the system NIM NIM: failed to send message to NIM message Queue. NIM message queue full or non-existent NIM NIM: Failed to notify the components of L7_CREATE event Interface not created NIM NIM: Attempted event (x), on USP x.x.x before phase 3 A component issued an interface event during the wrong initialization phase NIM NIM: incorrect phase for operation An API call was made during the wrong initialization phase NIM NIM: Component(x) failed on event(x) for intIfNum(x) A component responded with a fail indication for an interface event NIM NIM: Timeout event(x), intIfNum(x) remainingMask = “xxxx” A component did not respond before the NIM timeout occurred Log Messages 533 M4100 Series ProSAFE Managed Switches Table 5. System Log Messages Component Message Cause SYSTEM Configuration file Switch CLI.cfg size is 0 (zero) bytes The configuration file could not be read. This message might occur on a system for which no configuration has ever been saved or for which configuration has been erased. SYSTEM could not separate SYSAPI_CONFIG_FILENAME The configuration file could not be read. This message might occur on a system for which no configuration has ever been saved or for which configuration has been erased. SYSTEM Building defaults for file <file name> version Configuration did not exist or could not be <version num> read for the specified feature or file. Default configuration values will be used. The file name and version are indicated. SYSTEM File <filename>: same version (version num) but the sizes (<version size>-><expected version size) differ The configuration file which was loaded was of a different size than expected for the version number. This message indicates the configuration file needed to be migrated to the version number appropriate for the code image. This message might appear after upgrading the code image to a more current release. SYSTEM Migrating config file <filename> from version <version num> to <version num> The configuration file identified was migrated from a previous version number. Both the old and new version number are specified. This message might appear after upgrading the code image to a more current release. SYSTEM Building Defaults Configuration did not exist or could not be read for the specified feature. Default configuration values will be used. SYSTEM sysapiCfgFileGet failed size = <expected size of file> version = <expected version> Configuration did not exist or could not be read for the specified feature. This message is usually followed by a message indicating that default configuration values will be used. Log Messages 534 M4100 Series ProSAFE Managed Switches Utilities Table 6. Trap Mgr Log Message Component Message Cause Trap Mgr Link Up/Down: slot/port An interface changed link state. Table 7. DHCP Filtering Log Messages Component Message Cause DHCP Filtering Unable to create r/w lock for DHCP Filtering Unable to create semaphore used for dhcp filtering configuration structure . DHCP Filtering Failed to register with nv Store. Unable to register save and restore functions for configuration save DHCP Filtering Failed to register with NIM Unable to register with NIM for interface callback functions DHCP Filtering Error on call to sysapiCfgFileWrite file Error on trying to save configuration . Table 8. NVStore Log Messages Component Message Cause NVStore Building defaults for file XXX A component’s configuration file does not exist or the file’s checksum is incorrect so the component’s default configuration file is built. NVStore Error on call to osapiFsWrite routine on file Either the file cannot be opened or the OS’s XXX file I/O returned an error trying to write to the file. NVStore File XXX corrupted from file system. Checksum mismatch. The calculated checksum of a component’s configuration file in the file system did not match the checksum of the file in memory. NVStore Migrating config file XXX from version Y to Z A configuration file version mismatch was detected so a configuration file migration has started. Log Messages 535 M4100 Series ProSAFE Managed Switches Table 9. RADIUS Log Messages Component Message Cause RADIUS RADIUS: Invalid data length - xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Failed to send the request A problem communicating with the RADIUS server. RADIUS RADIUS: Failed to send all of the request A problem communicating with the RADIUS server during transmit. RADIUS RADIUS: Could not get the Task Sync semaphore! Resource issue with RADIUS Client service. RADIUS RADIUS: Buffer is too small for response processing RADIUS Client attempted to build a response larger than resources allow. RADIUS RADIUS: Could not allocate accounting requestInfo Resource issue with RADIUS Client service. RADIUS RADIUS: Could not allocate requestInfo Resource issue with RADIUS Client service. RADIUS RADIUS: osapiSocketRecvFrom returned error Error while attempting to read data from the RADIUS server. RADIUS RADIUS: Accounting-Response failed to validate, id=xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: User (xxx) needs to respond for challenge An unexpected challenge was received for a configured user. RADIUS RADIUS: Could not allocate a buffer for the Resource issue with RADIUS Client packet service. RADIUS RADIUS: Access-Challenge failed to validate, id=xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Failed to validate Message-Authenticator, id=xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Access-Accpet failed to validate, id=xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Invalid packet length – xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Response is missing Message-Authenticator, id=xxx The RADIUS Client received an invalid message from the server. RADIUS RADIUS: Server address does not match configured server RADIUS Client received a server response from an unconfigured server. Log Messages 536 M4100 Series ProSAFE Managed Switches Table 10. TACACS+ Log Messages Component Message Cause TACACS+ TACACS+: authentication error, no server to contact TACACS+ request needed, but no servers are configured. TACACS+ TACACS+: connection failed to server x.x.x.x TACACS+ request sent to server x.x.x.x but no response was received. TACACS+ TACACS+: no key configured to encrypt packet for server x.x.x.x No key configured for the specified server. TACACS+ TACACS+: received invalid packet type from server. Received packet type that is not supported. TACACS+ TACACS+: invalid major version in received packet. Major version mismatch. TACACS+ TACACS+: invalid minor version in received packet. Minor version mismatch. Table 11. LLDP Log Message Component Message Cause LLDP lldpTask(): invalid message type:xx. xxxxxx:xx Unsupported LLDP packet received. Table 12. SNTP Log Message Component Message Cause SNTP SNTP: system clock synchronized on %s UTC Indicates that SNTP has successfully synchronized the time of the box with the server. Management Table 13. SNMP Log Message Component Message Cause SNMP EDB Callback: Unit Join: x. A new unit has joined the stack. Log Messages 537 M4100 Series ProSAFE Managed Switches Table 14. EmWeb Log Messages Component Message Cause EmWeb EMWEB (Telnet): Max number of Telnet login sessions exceeded A user attempted to connect via telnet when the maximum number of telnet sessions were already active. EmWeb EMWEB (SSH): Max number of SSH login sessions exceeded A user attempted to connect via SSH when the maximum number of SSH sessions were already active. EmWeb Handle table overflow All the available EmWeb connection handles are being used and the connection could not be made. EmWeb ConnectionType EmWeb socket accept() failed: errno Socket accept failure for the specified connection type. EmWeb ewsNetHTTPReceive failure in NetReceiveLoop() - closing connection. Socket receive failure. EmWeb EmWeb: connection allocation failed Memory allocation failure for the new connection. EmWeb EMWEB TransmitPending : EWOULDBLOCK error sending data Socket error on send. EmWeb ewaNetHTTPEnd: internal error - handle not in Handle table EmWeb handle index not valid. EmWeb ewsNetHTTPReceive:recvBufCnt exceeds MAX_QUEUED_RECV_BUFS! The receive buffer limit has been reached. Bad request or DoS attack. EmWeb EmWeb accept: XXXX Accept function for new SSH connection failed. XXXX indicates the error info. Table 15. CLI_UTIL Log Messages Component Message Cause CLI_UTIL Telnet Send Failed errno = 0x%x Failed to send text string to the telnet client. CLI_UTIL osapiFsDir failed Failed to obtain the directory information from a volume's directory. Log Messages 538 M4100 Series ProSAFE Managed Switches Table 16. WEB Log Messages Component Message Cause WEB Max clients exceeded This message is shown when the maximum allowed java client connections to the switch is exceeded. WEB Error on send to sockfd XXXX, closing connection Failed to send data to the java clients through the socket. WEB # (XXXX) Form Submission Failed. No Action Taken. The form submission failed and no action is taken. XXXX indicates the file under consideration. WEB ewaFormServe_file_download() - WEB Unknown return code from tftp download result Unknown error returned while downloading file using TFTP from web interface WEB ewaFormServe_file_upload() - Unknown return code from tftp upload result Unknown error returned while uploading file using TFTP from web interface. WEB Web UI Screen with unspecified access attempted to be brought up Failed to get application-specific authorization handle provided to EmWeb/Server by the application in ewsAuthRegister(). The specified web page will be served in read-only mode. Table 17. CLI_WEB_MGR Log Messages Component Message Cause CLI_WEB_MGR File size is greater than 2K The banner file size is greater than 2K bytes. CLI_WEB_MGR No. of rows greater than allowed maximum When the number of rows exceeds the of XXXX maximum allowed rows Table 18. SSHD Log Messages Component Message Cause SSHD SSHD: Unable to create the global (data) semaphore Failed to create semaphore for global data protection. SSHD SSHD: Msg Queue is full, event = XXXX Failed to send the message to the SSHD message queue as message queue is full. XXXX indicates the event to be sent Log Messages 539 M4100 Series ProSAFE Managed Switches Table 18. SSHD Log Messages Component Message Cause SSHD SSHD: Unknown UI event in message, event=XXXX Failed to dispatch the UI event to the appropriate SSHD function as it’s an invalid event. XXXX indicates the event to be dispatched. SSHD sshdApiCnfgrCommand: Failed calling sshdIssueCmd. Failed to send the message to the SSHD message queue Table 19. SSLT Log Messages Component Message Cause SSLT SSLT: Exceeded maximum, ssltConnectionTask Exceeded maximum allowed SSLT connections. SSLT SSLT: Error creating Secure server socket6 Failed to create secure server socket for IPV6. SSLT SSLT: Can't connect to unsecure server at XXXX, result = YYYY, errno = ZZZZ Failed to open connection to unsecure server. XXXX is the unsecure server socket address. YYYY is the result returned from connect function and ZZZZ is the error code. SSLT SSLT: Msg Queue is full, event=XXXX Failed to send the received message to the SSLT message queue as message queue is full. XXXX indicates the event to be sent. SSLT SSLT: Unknown UI event in message, event=XXXX Failed to dispatch the received UI event to the appropriate SSLT function as it’s an invalid event. XXXX indicates the event to be dispatched. SSLT ssltApiCnfgrCommand: Failed calling ssltIssueCmd. Failed to send the message to the SSLT message queue. SSLT SSLT: Error loading certificate from file XXXX Failed while loading the SSLcertificate from specified file. XXXX indicates the file from where the certificate is being read. SSLT SSLT: Error loading private key from file Failed while loading private key for SSL connection. SSLT SSLT: Error setting cipher list (no valid ciphers) Failed while setting cipher list. SSLT SSLT: Could not delete the SSL semaphores Failed to delete SSL semaphores during cleanup.of all resources associated with the OpenSSL Locking semaphores. Log Messages 540 M4100 Series ProSAFE Managed Switches Table 20. User_Manager Log Messages Component Message Cause User_Manager User Login Failed for XXXX Failed to authenticate user login. XXXX indicates the user name to be authenticated. User_Manager Access level for user XXXX could not be determined. Setting to READ_ONLY. Invalid access level specified for the user. The access level is set to READ_ONLY. XXXX indicates the user name. User_Manager Could not migrate config file XXXX from version YYYY to ZZZZ. Using defaults. Failed to migrate the config file. XXXX is the config file name. YYYY is the old version number and ZZZZ is the new version number. Switching Table 21. Protected Ports Log Messages Component Message Cause Protected Ports Protected Port: failed to save configuration Appears when the protected port configuration cannot be saved Protected Ports protectedPortCnfgrInitPhase1Process: Unable to create r/w lock for protectedPort Appears when protectedPortCfgRWLock Fails Protected Ports protectedPortCnfgrInitPhase2Process: Unable to register for VLAN change callback Appears when nimRegisterIntfChange with VLAN fails Protected Ports Cannot add intIfNum xxx to group yyy Appears when an interface could not be added to a particular group. Protected Ports Unable to set protected port group Appears when a dtl call fails to add interface mask at the driver level Protected Ports Cannot delete intIfNum xxx from group yyy Appears when a dtl call to delete an interface from a group fails Protected Ports Cannot update group YYY after deleting interface XXX This message appears when an update group for an interface deletion fails Protected Ports Received an interface change callback while not ready to receive it Appears when an interface change callback has come before the protected port component is ready. Log Messages 541 M4100 Series ProSAFE Managed Switches Table 22. IP Subnet VLANS Log Messages Component Message Cause IPsubnet vlans ERROR vlanIpSubnetSubnetValid :Invalid subnet Occurs when an invalid pair of subnet and netmask has come from the CLI IPsubnet vlans IP Subnet Vlans: failed to save configuration This message appears when save configuration of subnet vlans failed IPsubnet vlans vlanIpSubnetCnfgrInitPhase1Process: Unable to create r/w lock for vlanIpSubnet Appears when a read/write lock creations fails IPsubnet vlans vlanIpSubnetCnfgrInitPhase2Process: Unable to register for VLAN change callback Appears when this component unable to register for VLAN change notifications IPsubnet vlans vlanIpSubnetCnfgrFiniPhase1Process: could not delete avl semaphore Appears when a semaphore deletion of this component fails. IPsubnet vlans vlanIpSubnetDtlVlanCreate: Failed Appears when a dtl call fails to add an entry into the table IPsubnet vlans vlanIpSubnetSubnetDeleteApply: Failed Appears when a dtl fails to delete an entry from the table IPsubnet vlans vlanIpSubnetVlanChangeCallback: Failed to add an Entry Appears when a dtl fails to add an entry for a VLAN add notify event. IPsubnet vlans vlanIpSubnetVlanChangeCallback: Failed to delete an Entry Appears when a dtl fails to delete an entry for a VLAN delete notify event. Table 23. Mac-based VLANs Log Messages Component Message Cause Mac based VLANS MAC VLANs: Failed to save configuration This message appears when save configuration of Mac VLANs failed Mac based VLANS vlanMacCnfgrInitPhase1Process: Unable to create r/w lock for vlanMac Appears when a read/write lock creations fails Mac based VLANS Unable to register for VLAN change callback Appears when this component unable to register for VLAN change notifications Mac based VLANS vlanMacCnfgrFiniPhase1Process: could not delete avl semaphore Appears when a semaphore deletion of this component fails. Mac based VLANS vlanMacAddApply: Failed to add an entry Appears when a dtl call fails to add an entry into the table Mac based VLANS vlanMacDeleteApply: Unable to delete an Entry Appears when a dtl fails to delete an entry from the table Log Messages 542 M4100 Series ProSAFE Managed Switches Table 23. Mac-based VLANs Log Messages Component Message Cause Mac based VLANS vlanMacVlanChangeCallback: Failed to add an entry Appears when a dtl fails to add an entry for a VLAN add notify event. Mac based VLANS vlanMacVlanChangeCallback: Failed to delete an entry Appears when a dtl fails to delete an entry for an VLAN delete notify event. Table 24. 802.1x Log Messages Component Message Cause 802.1X function: Failed calling dot1xIssueCmd 802.1X message queue is full 802.1X function: EAP message not received from server RADIUS server did not send required EAP message 802.1X function: Out of System buffers 802.1X cannot process/transmit message due to lack of internal buffers 802.1X function: could not set state to <authorized/unauthorized>, intf xxx DTL call failed setting authorization state of the port 802.1X dot1xApplyConfigData: Unable to <enable/disable> dot1x in driver DTL call failed enabling/disabling 802.1X 802.1X dot1xSendRespToServer: dot1xRadiusAccessRequestSend failed Failed sending message to RADIUS server 802.1X dot1xRadiusAcceptProcess: error calling radiusAccountingStart, ifIndex=xxx Failed sending accounting start to RADIUS server 802.1X function: failed sending terminate cause, intf xxx Failed sending accounting stop to RADIUS server Table 25. IGMP Snooping Log Messages Component Message Cause IGMP Snooping function: osapiMessageSend failed IGMP Snooping message queue is full IGMP Snooping Failed to set global igmp snooping mode to xxx Failed to set global IGMP Snooping mode due to message queue being full IGMP Snooping Failed to set igmp snooping mode xxx for interface yyy Failed to set interface IGMP Snooping mode due to message queue being full IGMP Snooping Failed to set igmp mrouter mode xxx for interface yyy Failed to set interface multicast router mode due to IGMP Snooping message queue being full IGMP Snooping Failed to set igmp snooping mode xxx for VLAN yyy Failed to set VLAN IGM Snooping mode due to message queue being full Log Messages 543 M4100 Series ProSAFE Managed Switches Table 25. IGMP Snooping Log Messages Component Message Cause IGMP Snooping Failed to set igmp mrouter mode %d for interface xxx on VLAN yyy Failed to set VLAN multicast router mode due to IGMP Snooping message queue being full IGMP Snooping snoopCnfgrInitPhase1Process: Error allocating small buffers Could not allocate buffers for small IGMP packets IGMP Snooping snoopCnfgrInitPhase1Process: Error allocating large buffers Could not allocate buffers for large IGMP packets Table 26. GARP/GVRP/GMRP Log Messages Component Message Cause GARP/GVRP/ GMRP garpSpanState, garpIfStateChange, GarpIssueCmd, garpDot1sChangeCallBack, garpApiCnfgrCommand, garpLeaveAllTimerCallback, garpTimerCallback: QUEUE SEND FAILURE: The garpQueue is full, logs specifics of the message content like internal interface number, type of message, and so on. GARP/GVRP/ GMRP GarpSendPDU: QUEUE SEND FAILURE The garpPduQueue is full, logs specific of the GPDU, internal interface number, VLAN id, buffer handle, and so on. GARP/GVRP/ GMRP garpMapIntfIsConfigurable, gmrpMapIntfIsConfigurable: Error accessing GARP/GMRP config data for interface %d in garpMapIntfIsConfigurable. A default configuration does not exist for this interface. Typically a case when a new interface is created and has no pre-configuration. GARP/GVRP/ GMRP garpTraceMsgQueueUsage: garpQueue usage has exceeded fifty/eighty/ninety percent Traces the buildup of message queue. Helpful in determining the load on GARP. GARP/GVRP/ GMRP gid_destroy_port: Error Removing port %d registration for vlan-mac %d %02X:%02X:%02X:%02X:%02X:%02X Mismatch between the gmd (gmrp database) and MFDB. GARP/GVRP/ GMRP gmd_create_entry: GMRP failure adding MFDB entry: vlan %d and address %s MFDB table is full. Log Messages 544 M4100 Series ProSAFE Managed Switches Table 27. 802.3ad Log Messages Component Message Cause 802.3ad dot3adReceiveMachine: received default event %x Received a LAG PDU and the RX state machine is ignoring this LAGPDU 802.3ad dot3adNimEventCompletionCallback, dot3adNimEventCreateCompletionCallbac k: DOT3AD: notification failed for event(%d), intf(%d), reason(%d) The event sent to NIM was not completed successfully Table 28. FDB Log Message Component Message Cause FDB fdbSetAddressAgingTimeOut: Failure Unable to set the age time in the hardware setting fid %d address aging timeout to %d Table 29. Double VLAN Tag Log Message Component Message Cause Double Vlan Tag dvlantagIntfIsConfigurable: Error accessing A default configuration does not exist for dvlantag config data for interface %d this interface. Typically a case when a new interface is created and has no pre-configuration. Table 30. IPv6 Provisioning Log Message Component Message Cause IPV6 Provisioning ipv6ProvIntfIsConfigurable: Error accessing A default configuration does not exist for IPv6 Provisioning config data for interface this interface. Typically a case when a new %d interface is created and has no pre-configuration. Table 31. MFDB Log Message Component Message Cause MFDB mfdbTreeEntryUpdate: entry does not exist Trying to update a non-existing entry Log Messages 545 M4100 Series ProSAFE Managed Switches Table 32. 802.1Q Log Messages Component Message Cause 802.1Q dot1qIssueCmd: Unable to send message %d to dot1qMsgQueue for vlan %d - %d msgs in queue dot1qMsgQueue is full. 802.1Q dot1qVlanCreateProcess: Attempt to create a vlan with an invalid vlan id %d ; VLAN %d not in range, Accommodates for reserved vlan ids. that is, 4094 - x 802.1Q dot1qMapIntfIsConfigurable: Error accessing DOT1Q config data for interface %d in dot1qMapIntfIsConfigurable. A default configuration does not exist for this interface. Typically a case when a new interface is created and has no pre-configuration. 802.1Q dot1qVlanDeleteProcess: Deleting the default VLAN Typically encountered during clear Vlan and clear config 802.1Q dot1qVlanMemberSetModify, dot1qVlanTaggedMemberSetModify: Dynamic entry %d can only be modified after it is converted to static If this vlan is a learnt via GVRP then, we cannot modify its member set via management. Table 33. 802.1S Log Messages Component Message Cause 802.1S dot1sIssueCmd: Dot1s Msg Queue is full!!!!Event: %u, on interface: %u, for instance: %u The message Queue is full. 802.1S dot1sStateMachineRxBpdu(): Rcvd BPDU Discarded The current conditions, like port is not enabled or we are currently not finished processing another BPDU on the same interface, does not allow us to process this BPDU 802.1S dot1sBpduTransmit(): could not get a buffer Out of system buffers Table 34. Port Mac Locking Log Message Component Message Cause Port Mac Locking pmlMapIntfIsConfigurable: Error accessing A default configuration does not exist for PML config data for interface %d in this interface. Typically a case when a new pmlMapIntfIsConfigurable. interface is created and has no pre-configuration. Log Messages 546 M4100 Series ProSAFE Managed Switches Table 35. Protocol-based VLANs Log Messages Component Message Cause Protocol Based VLANs pbVlanCnfgrInitPhase2Process: Unable to register NIM callback Appears when nimRegisterIntfChange fails to register pbVlan for link state changes. Protocol Based VLANs pbVlanCnfgrInitPhase2Process: Unable to register pbVlan callback with vlans Appears when vlanRegisterForChange fails to register pbVlan for vlan changes. Protocol Based VLANs pbVlanCnfgrInitPhase2Process: Unable to register pbVlan callback with nvStore Appears when nvStoreRegister fails to register save and restore functions for configuration save. QoS Table 36. ACL Log Messages Component Message Cause ACL Total number of ACL rules (x) exceeds max The combination of all ACLs applied to an (y) on intf i. interface has resulted in requiring more rules than the platform supports. ACL ACL name, rule x: This rule is not being logged The ACL configuration has resulted in a requirement for more logging rules than the platform supports. The specified rule is functioning normally except for the logging action. ACL aclLogTask: error logging ACL rule trap for correlator number The system was unable to send an SNMP trap for this ACL rule which contains a logging attribute. ACL IP ACL number: Forced truncation of one or more rules during config migration While processing the saved configuration, the system encountered an ACL with more rules than is supported by the current version. This might happen when code is updated to a version supporting fewer rules per ACL than the previous version. Table 37. CoS Log Message Component Message Cause COS cosCnfgrInitPhase3Process: Unable to The COS component was unable to apply apply saved config -- using factory defaults the saved configuration and has initialized to the factory default settings. Log Messages 547 M4100 Series ProSAFE Managed Switches Table 38. DiffServ Log Messages Component Message Cause DiffServ diffserv.c 165: diffServRestore Failed to reset DiffServ. Recommend resetting device While attempting to clear the running configuration an error was encountered in removing the current settings. This might lead to an inconsistent state in the system and resetting is advised. DiffServ Policy invalid for service intf: "policy name, intIfNum x, direction y The DiffServ policy definition is not compatible with the capabilities of the interface specified. Check the platform release notes for information about configuration limitations. Routing/IPv6 Routing Table 39. DHCP Relay Log Messages Component Message Cause DHCP relay REQUEST hops field more than config value The DHCP relay agent has processed a DHCP request whose HOPS field is larger than the maximum value allowed. The relay agent will not forward a message with a hop count greater than 4. DHCP relay Request's seconds field less than the config value The DHCP relay agent has processed a DHCP request whose SECS field is larger than the configured minimum wait time allowed. DHCP relay processDhcpPacket: invalid DHCP packet type: %u\n The DHCP relay agent has processed an invalid DHCP packet. Such packets are discarded by the relay agent. Table 40. OSPFv2 Log Messages Component Message Cause OSPFv2 Best route client deregistration failed for OSPF Redist OSPFv2 registers with the IPv4 routing table manager (“RTO”) to be notified of best route changes. There are cases where OSPFv2 deregisters more than once, causing the second deregistration to fail. The failure is harmless. OSPFv2 XX_Call() failure in _checkTimers for thread 0x869bcc0 An OSPFv2 timer has fired but the message queue that holds the event has filled up. This is normally a fatal error. Log Messages 548 M4100 Series ProSAFE Managed Switches Table 40. OSPFv2 Log Messages (continued) Component Message Cause OSPFv2 Warning: OSPF LSDB is 90% full (22648 LSAs). OSPFv2 limits the number of Link State Advertisements (LSAs) that can be stored in the link state database (LSDB). When the database becomes 90 or 95 percent full, OSPFv2 logs this warning. The warning includes the current size of the database. OSPFv2 The number of LSAs, 25165, in the OSPF LSDB has exceeded the LSDB memory allocation. When the OSPFv2 LSDB becomes full, OSPFv2 logs this message. OSPFv2 reoriginates its router LSAs with the metric of all nonstub links set to the maximum value to encourage other routers to not compute routes through the overloaded router. OSPFv2 Dropping the DD packet because of MTU mismatch OSPFv2 ignored a Database Description packet whose MTU is greater than the IP MTU on the interface where the DD was received. OSPFv2 LSA Checksum error in LsUpdate, dropping LSID 1.2.3.4 checksum 0x1234. OSPFv2 ignored a received link state advertisement (LSA) whose checksum was incorrect. Table 41. OSPFv3 Log Messages Component Message Cause OSPFv3 Best route client deregistration failed for OSPFv3 Redist OSPFv3 registers with the IPv6 routing table manager (“RTO6”) to be notified of best route changes. There are cases where OSPFv3 deregisters more than once, causing the second deregistration to fail. The failure is harmless. OSPFv3 Warning: OSPF LSDB is 90% full (15292 LSAs). OSPFv3 limits the number of Link State Advertisements (LSAs) that can be stored in the link state database (LSDB). When the database becomes 90 or 95 percent full, OSPFv3 logs this warning. The warning includes the current size of the database. OSPFv3 The number of LSAs, 16992, in the OSPF LSDB has exceeded the LSDB memory allocation. When the OSPFv3 LSDB becomes full, OSPFv3 logs this message. OSPFv3 reoriginates its router LSAs with the R-bit clear indicating that OSPFv3 is overloaded. OSPFv3 LSA Checksum error detected for LSID 1.2.3.4 checksum 0x34f5. OSPFv3 Database might be corrupted. OSPFv3 periodically verifies the checksum of each LSA in memory. OSPFv3 logs this. Log Messages 549 M4100 Series ProSAFE Managed Switches Table 42. Routing Table Manager Log Messages Component Message Cause Routing Table Manager RTO is full. Routing table contains 8000 best routes, 8000 total routes. The routing table manager, also called “RTO,” stores a limited number of best routes, based on hardware capacity. When the routing table becomes full, RTO logs this alert. The count of total routes includes alternate routes, which are not installed in hardware. Routing Table Manager RTO no longer full. Bad adds: 10. Routing When the number of best routes drops table contains 7999 best routes, 7999 total below full capacity, RTO logs this notice. routes. The number of bad adds might give an indication of the number of route adds that failed while RTO was full, but a full routing table is only one reason why this count is incremented. Table 43. VRRP Log Messages Component Message Cause VRRP Changing priority to 255 for virtual router with VRID 1 on interface 0/1 When the router is configured with the address being used as the virtual router ID, the router’s priority is automatically set to the maximum value to ensure that the address owner becomes the VRRP master. VRRP Changing priority to 100 for virtual router with VRID 1 on interface 0/1 When the router is no longer the address owner, Switch CLI reverts the router’s priority to the default. VRRP vrrpPacketValidate: Invalid TTL VRRP ignored an incoming message whose time to live (TTL) in the IP header was not 255. Table 44. ARP Log Message Component Message Cause ARP ARP received mapping for IP address xxx When we receive an ARP response with to MAC address yyy. This IP address might different MAC address from another station be configured on two stations. with the same IP address as ours. This might be a case of misconfiguration. Log Messages 550 M4100 Series ProSAFE Managed Switches Table 45. RIP Log Message Component Message Cause RIP RIP : discard response from xxx via unexpected interface When RIP response is received with a source address not matching the incoming interface’s subnet. Table 46. DHCP6 Log Message Component Message Cause DHCP6 relay_to_server: Cannot relay to relay server intf xxx: not IPv6 enabled Relay is enabled but neither the outgoing interface nor the server IP address is specified. Multicast Table 47. Cache Log Messages Component Message Cause Cache Out of memory when creating entry. When we run out of memory while creating a new cache (MFC) entry Cache Out of memory when creating cache. When we run out of memory while creating the cache itself Table 48. IGMP Log Messages Component Message Cause IGMP Error creating IGMP pipe Error opening IGMP pipe When we fail to create / open IGMP pipe for Mcast control messages IGMP Error creating IGMP data pipe Error opening IGMP data pipe When we fail to create / open IGMP data pipe for Mcast data messages IGMP Error getting memory for source record When we are unable to allocate memory for a source record in the received IGMP V3 report IGMP Failed getting memory for new group When we are unable to allocate memory for a group record in the received IGMP V3/V2/V1 report Log Messages 551 M4100 Series ProSAFE Managed Switches Table 49. IGMP-Proxy Log Messages Component Message Cause IGMP-Proxy Error getting memory for igmp host group record When we are unable to allocate memory for the IGMP group record in the Host (Proxy) table IGMP-Proxy Error getting memory for source record When we are unable to allocate memory for the IGMP source record in the Host (Proxy) table Table 50. PIM-SM Log Messages Component Message Cause PIM-SM PIM-SM not initialized This message arises when trying to activate pimsm interfaces or receiving pimsm packets when pimsm component is not initialized. PIM-SM Unable to take xxx semaphore This message is logged when failed to acquire semaphore to access source list or group list or candidate Rp list or virtual interface list. The xxx specifies the list for which the access is denied. PIM-SM Warning : Could not send packet type xxx (pimsm packet type) on rtrIfNum this warning is logged when failed to send a pimsm control packet on the specified router interface. PIM-SM add_kernel_cache : memory allocation failed This message is logged when there is insufficient memory to add a mroute entry into cache. PIM_SM Config error. Trying to add static RP. Dynamic RP with same ip addr exists Router learns RP-group mapping through Bootstrap messages received.This message pops when the static RP is configured which conflicts the mapping learnt dynamically through Bootstrap messages. PIM-SM Inner xxx(source/group) address of register This log message appears when a register message is invalid message is received with invalid inner ip source or group address. Log Messages 552 M4100 Series ProSAFE Managed Switches Table 51. PIM-DM Log Messages Component Message Cause PIM-DM Out of memory when creating xxx This message is logged when there is insufficient memory to accommodate a new neighbor/(S,G) Entry, Prune, Graft, Join etc. PIM-DM Error entry->ll_xxx LL creation error This message is logged when the SLL creation is Failed. PIM-DM pim_interface_set: Could not give taskSema This message is logged when Task synchronization Semaphore release fails. PIM-DM Error initializing CACHE This message is logged when the PIM-DM (S,G) entry Cache table initialization fails. PIM-DM Error creating PIM-DM pipe This message is logged when the PIM-DM Pipe (that receives control messages) creation fails. Table 52. DVMRP Log Messages Component Message Cause DVMRP dvmrp_send_graft: failed getting memory for graft Failed to allocate memory while sending a graft DVMRP dvmrp_register_neighbor: failed getting memory for nbr Failed to allocate memory while registering a neighbor DVMRP dvmrp_recv_prune: failed getting memory for prune Failed to allocate memory while receiving a prune DVMRP dvmrp_new_route: failed getting memory for route Failed to get memory for a new route entry DVMRP dvmrp_prepare_routes: failed getting memory for dvmrp_ann_rt Failed to get memory while announcing a new route entry Stacking Table 53. EDB Log Message Component Message Cause EDB EDB Callback: Unit Join: <num>. Unit <num> has joined the stack. Log Messages 553 M4100 Series ProSAFE Managed Switches Technologies Table 54. System General Error Messages Component Message Cause OS Invalid USP unit = x, slot = x, port =x A port was not able to be translated correctly during the receive. OS In hapiBroadSystemMacAddress call to 'bcm_l2_addr_add' - FAILED : x Failed to add an L2 address to the MAC table. This should only happen when a hash collision occurs or the table is full. OS Failed installing mirror action - rest of the policy applied successfully A previously configured probe port is not being used in the policy. The release notes state that only a single probe port can be configured OS Policy x does not contain rule x The rule was not added to the policy due to a discrepancy in the rule count for this specific policy . Additionally, the message can be displayed when an old rule is being modified, but the old rule is not in the policy OS ERROR: policy x, tmpPolicy x, size x, data An issue installing the policy due to a xxxxxxxx possible duplicate hash OS ACL x not found in internal table Attempting to delete a non-existent ACL OS ACL internal table overflow Attempting to add an ACL to a full table OS In hapiBroadQosCosQueueConfig, Failed Attempting to configure the bandwidth to configure minimum bandwidth. Available beyond its capabilities bandwidth x OS USL: failed to put sync response on queue A response to a sync request was not enqueued. This could indicate that a previous sync request was received after it was timed out OS USL: failed to sync ipmc table on unit=x Either the transport failed or the message was dropped OS usl_task_ipmc_msg_send(): failed to send with x Either the transport failed or the message was dropped OS USL: No available entries in the STG table The Spanning Tree Group table is full in USL OS USL: failed to sync stg table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: A Trunk doesn't exist in USL Attempting to modify a Trunk that doesn’t exist Log Messages 554 M4100 Series ProSAFE Managed Switches Table 54. System General Error Messages Component Message Cause OS USL: A Trunk being created by bcmx already existed in USL Possible synchronization issue between the application, hardware, and sync layer OS USL: A Trunk being destroyed doesn't exist Possible synchronization issue between in USL the application, hardware, and sync layer. OS USL: A Trunk being set doesn't exist in USL Possible synchronization issue between the application, hardware, and sync layer. OS USL: failed to sync trunk table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: Mcast entry not found on a join Possible synchronization issue between the application, hardware, and sync layer OS USL: Mcast entry not found on a leave Possible synchronization issue between the application, hardware, and sync layer OS USL: failed to sync dvlan data on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync policy table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync VLAN table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS Invalid LAG id x Possible synchronization issue between the BCM driver and HAPI OS Invalid uport calculated from the BCM uport Uport not valid from BCM driver. bcmx_l2_addr->lport = x OS Invalid USP calculated from the BCM uport\nbcmx_l2_addr->lport = x USP not able to be calculated from the learn event for BCM driver. OS Unable to insert route R/P Route ‘R’ with prefix ‘P’ could not be inserted in the hardware route table. A retry will be issued. OS Unable to Insert host H Host ‘H’ could not be inserted in hardware host table. A retry will be issued. OS USL: failed to sync L3 Intf table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync L3 Host table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued Log Messages 555 M4100 Series ProSAFE Managed Switches Table 54. System General Error Messages Component Message Cause OS USL: failed to sync L3 Route table on unit= Could not synchronize unit x due to a x transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync initiator table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync terminator table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued OS USL: failed to sync ip-multicast table on unit=x Could not synchronize unit x due to a transport failure or API issue on remote unit. A synchronization retry will be issued O/S Support Table 55. OSAPI Log Messages Component Message Cause OSAPI ftruncate failed – File resides on a read-only file system. ftruncate is called to correctly set the file’s size in the file system after a write. The file system is R/W so this msg indicates that the file system may be corrupted. OSAPI ftruncate failed – File is open for reading only. ftruncate is called to correctly set the file’s size in the file system after a write. The file is opened for R/W so this msg indicates that the file system may be corrupted. OSAPI ftruncate failed – File descriptor refers to a file on which this operation is impossible. ftruncate is called to correctly set the file’s size in the file system after a write. This msg indicates that the file system may be corrupted. OSAPI ftruncate failed – Returned an unknown code in errno. ftruncate is called to correctly set the file’s size in the file system after a write. This msg indicates that the file system may be corrupted. OSAPI ping: bad host! The address requested to ping cannot be converted to an Internet address. OSAPI osapiTaskDelete: Failed for (XX) error YYY The requested task cannot be deleted because: the requested deletion is called from an ISR, the task is already deleted, or the task ID is invalid. Log Messages 556 M4100 Series ProSAFE Managed Switches Table 55. OSAPI Log Messages (continued) Component Message Cause OSAPI osapiCleanupIf: NetIPGet During the call to remove the interface from the route table, the attempt to get an ipv4 interface address from the stack failed. OSAPI osapiCleanupIf: NetMaskGet During the call to remove the interface from the route table ,the attempt to get the ipv4 interface mask from the stack failed. OSAPI osapiCleanupIf: NetIpDel During the call to remove the interface from the route table, the attempt to delete the primary ipv4 address from the stack failed. OSAPI osapiSemaTake failed The requested semaphore cannot be taken because: the call is made from an ISR or the semaphore ID is invalid. Log Messages 557 Command List {deny | permit} (IP ACL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300 {deny | permit} (IPv6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .306 {deny | permit} (MAC ACL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294 aaa accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483 aaa authentication dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .482 aaa authentication enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .481 aaa authentication login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480 aaa authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .486 aaa ias-user username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .489 aaa session-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .489 absolute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .310 access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .298 accounting (console/Telnet/SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484 acl-trapflags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303 addport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109 arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228 arp access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150 arp cachesize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229 arp dynamicrenew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229 arp purge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230 arp resptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230 arp retries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230 arp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 assign-queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281 authorization (console/Telnet/SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .487 authorization network radius . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501 auto-negotiate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 auto-negotiate all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 auto-voip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .312 auto-voip oui . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313 auto-voip oui-based priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313 auto-voip protocol-based . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 auto-voip vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313 boot autoinstall start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330 boot autoinstall stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330 boot host auto-save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330 boot host dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .331 boot host retry-count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330 558 M4100 Series ProSAFE Managed Switches boot system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 bootfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .386 bootpdhcprelay cidoptmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .252 bootpdhcprelay maxhopcount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253 bootpdhcprelay minwaittime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253 bridge aging-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211 cablestatus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .425 capture {file | remote | line} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400 capture {start | stop} . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400 capture file size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402 capture line wrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402 capture remote port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .401 class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .282 class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .272 class-map rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273 classofservice dot1p-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 classofservice ip-dscp-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 classofservice trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .264 clear aaa ias-users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .490 clear arp-cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 clear arp-switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 clear config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367 clear counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 clear dot1x authentication-history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 clear dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 clear eventlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367 clear green-mode statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525 clear host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .398 clear igmpsnooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 clear ip address-conflict-detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .431 clear ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 clear ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391 clear ip dhcp conflict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .392 clear ip dhcp server statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391 clear ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 clear ip dhcp snooping statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 clear ip helper statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .254 clear ip route all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240 clear ip route counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .241 clear isdp counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215 clear isdp table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215 clear lldp remote-data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 clear lldp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 clear logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367 clear logging email statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .363 559 M4100 Series ProSAFE Managed Switches clear mac-addr-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367 clear pass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 clear port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 clear radius statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 clear traplog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 clear vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 client-identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383 client-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383 clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378 clock summer-time date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .379 clock summer-time recurring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378 clock timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .449 conform-color . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .282 copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .371 copy (pre-login banner) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .520 cos-queue min-bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .264 cos-queue random-detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265 cos-queue strict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265 crypto certificate generate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .459 crypto key generate dsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .460 crypto key generate rsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .460 debug aaa accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .424 debug aaa authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .424 debug arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .403 debug auto-voip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .403 debug clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404 debug console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404 debug crashlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404 debug dhcp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405 debug dot1x packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .406 debug igmpsnooping packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .406 debug igmpsnooping packet receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407 debug igmpsnooping packet transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .406 debug ip acl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408 debug ip dvmrp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .409 debug ip igmp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .409 debug ip mcache packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410 debug ip pimdm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410 debug ip pimsm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411 debug ip vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411 debug ipv6 dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 debug ipv6 mcache packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 debug ipv6 mld packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 560 M4100 Series ProSAFE Managed Switches debug ipv6 ospfv3 packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .417 debug ipv6 pimdm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413 debug ipv6 pimsm packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413 debug isdp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218 debug lacp packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414 debug mldsnooping packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414 debug ospf packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415 debug ping packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .418 debug rip packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419 debug sflow packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420 debug spanning-tree bpdu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420 debug spanning-tree bpdu receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .421 debug spanning-tree bpdu transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422 debug tacacs packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .514 debug udld packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 debug udld packet receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 debug udld packet transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 default-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .384 delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 deleteport (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110 deleteport (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109 description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 dhcp client vendor-id-option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 dhcp client vendor-id-option-string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 dhcp l2relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133 dhcp l2relay circuit-id vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133 dhcp l2relay remote-id vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 dhcp l2relay trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 dhcp l2relay vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 diffserv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .271 dir usb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .441 disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467 dns-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .384 domain-name (DHCP Pool Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .387 domain-name (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .488 domain-name enable (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .488 dos-control all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202 dos-control firstfrag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203 dos-control icmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205 dos-control icmpfrag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209 dos-control icmpv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209 dos-control icmpv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209 dos-control l4port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204 dos-control sipdip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202 dos-control smacdmac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205 561 M4100 Series ProSAFE Managed Switches dos-control tcpfinurgpsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208 dos-control tcpflag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204 dos-control tcpflagseq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206 dos-control tcpfrag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203 dos-control tcpoffset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 dos-control tcpport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206 dos-control tcpsyn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 dos-control tcpsynfin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208 dos-control udpport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206 dot1x dynamic-vlan enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 dot1x eapolflood . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 dot1x guest-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 dot1x initialize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 dot1x mac-auth-bypass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 dot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 dot1x max-users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 dot1x pae . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 dot1x port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 dot1x port-control all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 dot1x re-authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 dot1x re-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 dot1x supplicant max-start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 dot1x supplicant port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 dot1x supplicant timeout auth-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 dot1x supplicant timeout held-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 dot1x supplicant timeout start-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 dot1x supplicant user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 dot1x system-auth-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 dot1x system-auth-control monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 dot1x timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 dot1x unauthenticated-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 dot1x user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 drop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281 dvlan-tunnel ethertype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 enable (Privileged EXEC access) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446 enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .451 enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369 encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240 erase startup-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .331 ezconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .444 filedescr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 green-mode eee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525 green-mode eee-lpi-history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .530 562 M4100 Series ProSAFE Managed Switches green-mode energy-detect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .524 hardware-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385 host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 interface lag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 interface loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 interface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 ip access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303 ip access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300 ip access-list rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300 ip accounting exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484 ip address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 ip address dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235 ip address-conflict-detect run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .431 ip arp inspection filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150 ip arp inspection limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149 ip arp inspection trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149 ip arp inspection validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 ip arp inspection vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 ip arp inspection vlan logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236 ip dhcp bootp automatic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .390 ip dhcp conflict logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391 ip dhcp excluded-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .389 ip dhcp ping packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .390 ip dhcp pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .382 ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 ip dhcp snooping database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 ip dhcp snooping database write-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 ip dhcp snooping limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 ip dhcp snooping log-invalid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 ip dhcp snooping trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 ip dhcp snooping verify mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 ip dhcp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 ip domain list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .396 ip domain lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .395 ip domain name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .395 ip domain retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397 ip domain timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .398 ip helper enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256 ip helper-address (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .255 ip helper-address (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256 ip helper-address discard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .257 ip host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397 563 M4100 Series ProSAFE Managed Switches ip http authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .462 ip http java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461 ip http secure-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466 ip http secure-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466 ip http secure-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461 ip http secure-session hard-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465 ip http secure-session maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .464 ip http secure-session soft-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .464 ip http server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461 ip http session hard-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .462 ip http session maxsessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463 ip http session soft-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463 ip https authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465 ip icmp echo-reply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261 ip icmp error-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261 ip local-proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228 ip management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446 ip mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .239 ip name server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .396 ip netdirbcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .239 ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229 ip redirects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260 ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237 ip route default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238 ip route distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238 ip routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 ip ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .457 ip ssh protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .457 ip ssh server enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .457 ip telnet server enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .452 ip unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260 ip verify binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 ip verify source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142 ipv6 access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .306 ipv6 access-list rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .306 ipv6 host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397 ipv6 traffic-filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307 isdp advertise-v2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214 isdp enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214 isdp holdtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213 isdp run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213 isdp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214 key (TACACS Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517 lacp actor admin key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 564 M4100 Series ProSAFE Managed Switches lacp actor admin state individual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 lacp actor admin state longtimeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112 lacp actor admin state passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112 lacp actor port priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113 lacp actor system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113 lacp admin key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110 lacp collector max-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110 lacp partner admin key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114 lacp partner admin state individual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114 lacp partner admin state longtimeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115 lacp partner admin state passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115 lacp partner port id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116 lacp partner port priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116 lacp partner system id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117 lacp partner system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117 lease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385 length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .351 line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .449 lldp med . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191 lldp med all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 lldp med confignotification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 lldp med confignotification all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 lldp med faststartrepeatcount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 lldp med transmit-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 lldp med transmit-tlv all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194 lldp notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 lldp notification-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 lldp receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183 lldp timers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183 lldp transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182 lldp transmit-mgmt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 lldp transmit-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183 logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 logging buffered wrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 logging cli-command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354 logging console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354 logging email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358 logging email from-addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .360 logging email logtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361 logging email message-type subject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .360 logging email message-type to-addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359 logging email test message-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361 logging email urgent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359 logging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354 logging host remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 565 M4100 Series ProSAFE Managed Switches logging persistent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358 logging syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 logging syslog source-interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 logging traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361 login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450 logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369 mac access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .296 mac access-list extended . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293 mac access-list extended rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294 mac address-table multicast forbidden-unregistered vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 mac address-table multicast forward-all vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 mac address-table multicast forward-unregistered vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 macfilter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 macfilter adddest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130 macfilter adddest all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130 macfilter addsrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131 macfilter addsrc all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131 mail-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .363 mark cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .283 mark cos-as-sec-cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .283 mark ip-dscp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .283 mark ip-precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .284 match any . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274 match class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274 match cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275 match destination-address mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275 match dstip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276 match dstip6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276 match dstl4port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276 match ethertype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273 match ip dscp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277 match ip precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277 match ip tos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277 match ip6flowlbl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275 match protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .278 match secondary cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275 match secondary-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280 match source-address mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279 match srcip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279 match srcip6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279 match srcl4port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279 match vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280 memory free low-watermark processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .352 mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281 566 M4100 Series ProSAFE Managed Switches mode dot1q-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 mode dvlan-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 monitor session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125 mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 mvr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220 mvr group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220 mvr immediate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 mvr mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .221 mvr querytime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .221 mvr type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .223 mvr vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 mvr vlan group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .223 netbios-name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .387 netbios-node-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .388 network (DHCP Pool Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .386 network javamode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .447 network mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446 network mac-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .447 network mgmt_vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 next-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .388 no clock summer-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .380 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .389 password (AAA IAS User Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .490 password (Mail Server Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 passwords aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .474 passwords history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .474 passwords lock-out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .475 passwords min-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .473 passwords strength exclude-keyword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 passwords strength maximum consecutive-characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .477 passwords strength maximum repeated-characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 passwords strength minimum character-classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 passwords strength minimum lowercase-letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .476 passwords strength minimum numeric-characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .476 passwords strength minimum special-characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .477 passwords strength minimum uppercase-letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .475 passwords strength-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .475 periodic time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311 periodic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .310 permit ip host mac host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151 ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369 poe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .318 poe detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .319 poe high-power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .319 poe power limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .320 567 M4100 Series ProSAFE Managed Switches poe power management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .320 poe priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .321 poe reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322 poe timer schedule name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322 poe traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 poe usagethreshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 police-simple . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .284 police-two-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285 policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285 policy-map rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286 port (Mail Server Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 port (TACACS Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517 port lacpmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 port lacpmode enable all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 port lacptimeout (Global Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 port lacptimeout (Interface Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 port-channel adminmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 port-channel linktrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 port-channel load-balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121 port-channel local-preference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 port-channel name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122 port-channel static . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 port-channel system priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122 port-security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178 port-security mac-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180 port-security mac-address move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180 port-security mac-address sticky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180 port-security max-dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179 port-security max-static . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179 priority (TACACS Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517 private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 process cpu threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .347 protocol group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 protocol vlan group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 protocol vlan group all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 quit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .371 radius accounting mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501 radius server attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502 radius server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502 radius server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .504 radius server msgauth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505 radius server primary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505 radius server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .506 radius server timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .506 568 M4100 Series ProSAFE Managed Switches random-detect exponential weighting-constant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .266 random-detect queue-parms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .266 redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .282 release dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236 reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .371 remote-span . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 renew dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236 rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .433 rmon collection history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .435 rmon event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .435 rmon hcalarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .434 routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .371 script apply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519 script delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519 script list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519 script show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .520 script validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .520 security (Mail Server Config) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .363 serial baudrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450 serial timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450 service dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .390 service-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286 session-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .454 session-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .454 set clibanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .521 set garp timer join . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 set garp timer leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 set garp timer leaveall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 set gmrp adminmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 set gmrp interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 set gvrp adminmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 set gvrp interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 set igmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 set igmp fast-leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 set igmp groupmembership-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 set igmp header-validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 set igmp interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 set igmp maxresponse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 set igmp mcrtrexpiretime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158 set igmp mrouter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 set igmp mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 set igmp querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164 set igmp querier election participate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 set igmp querier query-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 569 M4100 Series ProSAFE Managed Switches set igmp querier timer expiry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 set igmp querier version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 set igmp report-suppression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 set mld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168 set mld fast-leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 set mld groupmembership-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170 set mld interfacemode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 set mld maxresponse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170 set mld mcrtexpiretime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 set mld mrouter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 set mld mrouter interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .172 set mld querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175 set mld querier election participate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 set mld querier query_interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 set mld querier timer expiry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 set prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .521 sflow poller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .428 sflow receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .426 sflow sampler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .427 show aaa ias-users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491 show access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305 show accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .485 show accounting methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .485 show arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .232 show arp access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 show arp brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .232 show arp switch (Address Resolution Protocol commands) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233 show arp switch (system information and statistics commands) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333 show authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 show authorization methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .487 show autoinstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329 show auto-voip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 show auto-voip oui-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316 show bootpdhcprelay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .254 show bootvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 show capture packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402 show class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .288 show classofservice dot1p-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .267 show classofservice ip-dscp-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .268 show classofservice ip-precedence-mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .268 show classofservice trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .269 show clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .382 show dhcp client vendor-id-option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 show dhcp l2relay agent-option vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136 570 M4100 Series ProSAFE Managed Switches show dhcp l2relay all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135 show dhcp l2relay interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135 show dhcp l2relay stats interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136 show dhcp lease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237 show diffserv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .289 show diffserv service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .291 show diffserv service brief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .291 show domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .489 show dos-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210 show dot1q-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 show dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 show dot1x authentication-history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 show dot1x clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 show dot1x users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 show dvlan-tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 show eventlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333 show fiber-ports optics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .343 show fiber-ports optics-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344 show flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108 show forwardingdb agetime . . . . . . . . . . . . . . . . . . . . . . . . .