HP ProLiant BL p-Class GbE2 Interconnect Switch
Command Reference Guide
Part number: 331404-008
Eighth edition: March 2007
Contents
Command line interface
Introduction............................................................................................................................................. 9
Setting an IP address......................................................................................................................... 10
Accessing the GbE2 Interconnect Switch................................................................................................... 11
Menu basics
Introduction........................................................................................................................................... 14
Main Menu........................................................................................................................................... 14
Menu summary...................................................................................................................................... 14
Tab completion................................................................................................................................. 17
First-time configuration
Introduction........................................................................................................................................... 18
Configure Simple Network Management Protocol support...................................................................... 18
Setting passwords.................................................................................................................................. 19
Changing the default administrator password....................................................................................... 19
Information Menu
Introduction........................................................................................................................................... 22
System Information Menu........................................................................................................................ 23
SNMPv3 Information Menu..................................................................................................................... 23
SNMPv3 USM User Table information...................................................................................................... 24
SNMPv3 Target Parameters Table information........................................................................................... 27
SNMPv3 dump...................................................................................................................................... 29
System information................................................................................................................................. 30
System user information.......................................................................................................................... 31
Layer 2 information................................................................................................................................ 32
Show all FDB information................................................................................................................... 33
Link Aggregation Control Protocol information........................................................................................... 34
LACP dump........................................................................................................................................... 34
Hot Links Trigger information................................................................................................................... 35
Contents
3
802.1x information................................................................................................................................ 37
Rapid Spanning Tree and Multiple Spanning Tree information..................................................................... 40
Layer 3 information................................................................................................................................ 44
Show all ARP entry information........................................................................................................... 47
OSPF general information....................................................................................................................... 49
RIP user configuration............................................................................................................................. 52
IP information........................................................................................................................................ 52
IGMP multicast router port information...................................................................................................... 53
RMON event information................................................................................................................... 56
Logical Port to GEA Port mapping............................................................................................................ 58
Statistics Menu
Introduction........................................................................................................................................... 60
Ethernet statistics............................................................................................................................... 64
Interface statistics.............................................................................................................................. 66
GEA Layer 3 statistics........................................................................................................................ 71
Contents
4
UDP statistics.................................................................................................................................... 76
OSPF statistics menu.......................................................................................................................... 77
VRRP statistics................................................................................................................................... 79
RIP statistics...................................................................................................................................... 80
UDP statistics.................................................................................................................................... 81
CPU statistics.................................................................................................................................... 81
Access Control List (ACL) statistics menu............................................................................................... 82
SNMP statistics................................................................................................................................. 82
Configuration Menu
Introduction........................................................................................................................................... 87
Reminders............................................................................................................................................. 89
Secure Shell Server configuration........................................................................................................ 92
NTP server configuration.................................................................................................................... 95
View-based Access Control Model configuration................................................................................... 99
SNMPv3 Community Table configuration........................................................................................... 100
User Access Control configuration..................................................................................................... 104
Port link configuration...................................................................................................................... 107
ACL Port configuration..................................................................................................................... 108
Contents
5
802.1x Port configuration..................................................................................................................... 113
CIST port configuration......................................................................................................................... 116
Spanning Tree port configuration...................................................................................................... 119
IP Trunk Hash configuration.............................................................................................................. 121
Hot Links Master configuration.......................................................................................................... 124
Autonomous System Path configuration................................................................................................... 131
RIP Interface configuration................................................................................................................ 132
OSPF Virtual Link configuration......................................................................................................... 137
OSPF MD5 Key configuration........................................................................................................... 139
IGMP configuration.............................................................................................................................. 139
IGMP snooping configuration........................................................................................................... 140
IGMP static multicast router configuration........................................................................................... 141
IGMP filtering port configuration....................................................................................................... 142
Bootstrap Protocol Relay configuration.................................................................................................... 143
Contents
6
VRRP Virtual Router configuration...................................................................................................... 144
VRRP Virtual Router Group configuration............................................................................................ 146
VRRP Interface configuration............................................................................................................. 148
VRRP Tracking configuration............................................................................................................. 148
Access Control configuration................................................................................................................. 149
Access Control List configuration....................................................................................................... 150
ACL Group configuration................................................................................................................. 153
RMON alarm configuration.............................................................................................................. 155
Dump................................................................................................................................................. 159
Operations Menu
Introduction......................................................................................................................................... 161
Operations-level port options............................................................................................................ 161
Boot Options Menu
Introduction......................................................................................................................................... 163
Downloading new software to your GbE2 Interconnect Switch.............................................................. 163
Selecting a configuration block.............................................................................................................. 166
Maintenance Menu
Introduction......................................................................................................................................... 167
IGMP Multicast Group options.......................................................................................................... 170
IGMP Snooping options................................................................................................................... 170
Contents
7
Uuencode flash dump...................................................................................................................... 171
Panic command.............................................................................................................................. 172
Unscheduled system dumps................................................................................................................... 173
Index
Contents
8
Command line interface
Introduction
Your HP ProLiant BL p-Class GbE2 Interconnect Switch is ready to perform basic switching functions right out of the
box. Some of the more advanced features, however, require some administrative configuration before they can be
used effectively.
The extensive switching software included in your GbE2 Interconnect Switch provides a variety of options for
accessing and configuring the GbE2 Interconnect Switch:
•
•
•
A built-in, text-based command line interface (CLI) and menu system for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management software such
as HP OpenView and HP Insight Manager 7
A browser-based management interface for interactive network access through your Web browser
The command line interface is the most direct method for collecting GbE2 Interconnect Switch information and
performing switch configuration. Using a basic terminal, you are presented with a hierarchy of menus that enable you
to view information and statistics about the GbE2 Interconnect Switch, and to perform any necessary configuration.
This chapter explains how to access the CLI to the GbE2 Interconnect Switch.
Additional references
Additional information about installing and configuring the GbE2 Interconnect Switch is available in the following
•
•
•
•
•
•
HP ProLiant BL p-Class GbE2 Interconnect Switch User Guide
HP ProLiant BL p-Class GbE2 Interconnect Switch Application Guide
HP ProLiant BL p-Class GbE2 Interconnect Switch Browser-based Interface Reference Guide
HP ProLiant BL p-Class C-GbE2 Interconnect Kit Quick Setup Instructions
HP ProLiant BL p-Class F-GbE2 Interconnect Kit Quick Setup Instructions
HP BladeSystem p-Class SAN Connectivity Kit Quick Setup Instructions
Connecting to the GbE2 Interconnect Switch
You can access the command line interface in one of the following ways:
•
•
•
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
Establishing a console connection
To establish a console connection with the GbE2 Interconnect Switch, you need:
•
A null modem cable with a female DB-9 connector (See the HP ProLiant BL p-Class GbE2 Interconnect Switch
User Guide for more information.)
•
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
below
Table 1 Console configuration parameters
Parameter
Baud Rate
Data Bits
Parity
Value
9600
8
None
1
Stop Bits
Flow Control
None
Command line interface
9
To establish a console connection with the GbE2 Interconnect Switch:
1.
2.
3.
4.
Connect the terminal to the console port using the null modem cable.
Power on the terminal.
Press the Enter key a few times on your terminal to establish the connection.
You will be required to enter a password for access to the GbE2 Interconnect Switch. (For more information, see
the “Setting passwords” section in the “First-time configuration” chapter.)
Setting an IP address
To access the GbE2 Interconnect Switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP)
address set for the switch. The GbE2 Interconnect Switch can get its IP address in one of two ways:
•
Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to request its IP
address from a BOOTP server. If you have a BOOTP server on your network, add the Media Access Control
(MAC) address of the GbE2 Interconnect Switch to the BOOTP configuration file located on the BOOTP server.
The MAC address can be found on a small white label on the back panel of the GbE2 Interconnect Switch. The
MAC address can also be found in the System Information menu (See the “System information” section in the
“Information Menu” chapter.) If you are using a DHCP server that also does BOOTP, you do not have to
configure the MAC address.
•
Configuring manually—If your network does not support BOOTP, you must configure the management port with
an IP address.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the GbE2 Interconnect Switch from any workstation
connected to the network. Telnet provides the same options for user, operator, and administrator access as those
available through the console port. By default, Telnet is enabled on the GbE2 Interconnect Switch. The GbE2
Interconnect Switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the CLI using a Telnet connection. To establish a Telnet
connection with the GbE2 Interconnect Switch, run the Telnet program on your workstation and enter the telnet
command, followed by the GbE2 Interconnect Switch IP address:
telnet <GbE2 Interconnect Switch IP address>
You will then be prompted to enter a password. The password entered determines the access level: administrator,
operator, or user. See the “Accessing the GbE2 Interconnect Switch” section later in this chapter for description of
default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a GbE2 Interconnect Switch via Telnet, this
method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into the
GbE2 Interconnect Switch over the network.
As a secure alternative to using Telnet to manage GbE2 Interconnect Switch configuration, SSH ensures that all data
sent over the network is encrypted and secure. In order to use SSH, you must first configure it on the GbE2
Interconnect Switch. See the “Secure Shell Server configuration” section in the “Configuration Menu” chapter for
information on how to configure SSH.
The GbE2 Interconnect Switch can perform only one session of key/cipher generation at a time. Therefore, an
SSH/Secure Copy (SCP) client will not be able to log in if the GbE2 Interconnect Switch is performing key generation
at that time or if another client has just logged in before this client. Similarly, the system will fail to perform the key
generation if an SSH/SCP client is logging in at that time.
The supported SSH encryption and authentication methods are listed below.
•
Server Host Authentication—Client RSA authenticates the GbE2 Interconnect Switch in the beginning of every
connection
•
Key Exchange—RSA
Command line interface 10
•
•
Encryption:
•
•
•
•
•
•
AES256-CBC
AES192-CBC
AES128-CBC
3DES-CBC
3DES
ARCFOUR
User Authentication—Local password authentication; Remote Authentication Dial-in User Service (RADIUS)
The following SSH clients are supported:
•
•
•
•
•
SSH 3.0.1 for Linux (freeware)
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
OpenSSH_3.9 for Linux (FC 3)
FedoraCore 3 for SCP commands
PuTTY Release 0.58 (Simon Tatham) for Windows
NOTE: The GbE2 Interconnect Switch implementation of SSH is based on versions 1.5 and 2.0, and supports
SSH clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You may
configure the client software to use protocol SSH version 1 or version 2.
By default, SSH service is not enabled on the GbE2 Interconnect Switch. Once the IP parameters are configured, you
can access the command line interface to enable SSH.
To establish an SSH connection with the GbE2 Interconnect Switch, run the SSH program on your workstation by
issuing the ssh command, followed by the user account name and the GbE2 Interconnect Switch IP address:
>> # ssh <user><GbE2 Interconnect Switch IP address>
You will then be prompted to enter your password.
NOTE: The first time you run SSH from your workstation, a warning message might appear. At the prompt,
enter yes to continue.
Accessing the GbE2 Interconnect Switch
To enable better switch management and user accountability, the GbE2 Interconnect Switch provides different levels
or classes of user access. Levels of access to the CLI and Web management functions and screens increase as needed
to perform various GbE2 Interconnect Switch management tasks. The three levels of access are:
•
User—User interaction with the GbE2 Interconnect Switch is completely passive; nothing can be changed on the
GbE2 Interconnect Switch. Users may display information that has no security or privacy implications, such as
GbE2 Interconnect Switch statistics and current operational state information.
•
Operator—Operators can only effect temporary changes on the GbE2 Interconnect Switch. These changes will
be lost when the GbE2 Interconnect Switch is rebooted/reset. Operators have access to the GbE2 Interconnect
Switch management features used for daily GbE2 Interconnect Switch operations. Because any changes an
operator makes are undone by a reset of the GbE2 Interconnect Switch, operators cannot severely impact
switch operation, but do have access to the Maintenance menu.
•
Administrator—Only administrators can make permanent changes to the GbE2 Interconnect Switch
configuration, changes that are persistent across a reboot/reset of the GbE2 Interconnect Switch. Administrators
can access GbE2 Interconnect Switch functions to configure and troubleshoot problems on the switch. Because
administrators can also make temporary (operator-level) changes as well, they must be aware of the interactions
between temporary and permanent changes.
Access to GbE2 Interconnect Switch functions is controlled through the use of unique usernames and passwords.
Once you are connected to the GbE2 Interconnect Switch via the local console, Telnet, or SSH, you are prompted to
enter a password. The password entered determines the access level. The default user names/password for each
access level is listed in the following table.
NOTE: It is recommended that you change default GbE2 Interconnect Switch passwords after initial
configuration and as regularly as required under your network security policies. For more information, see the
“Setting passwords” section in the “First-time configuration” chapter.
Command line interface 11
Table 2 User access levels
User account
Description and tasks performed
User
The user has no direct responsibility for GbE2 Interconnect Switch management. He or she can view
all GbE2 Interconnect Switch status information and statistics, but cannot make any configuration
changes to the GbE2 Interconnect Switch. The user account is enabled by default.
Operator
The operator manages all functions of the GbE2 Interconnect Switch. The operator can reset ports or
the entire GbE2 Interconnect Switch. By default, the operator account is disabled and has no
password.
Administrator
The super user administrator has complete access to all menus, information, and configuration
commands on the GbE2 Interconnect Switch, including the ability to change both the user and
administrator passwords.
NOTE: With the exception of the admin user, setting the password to an empty value can disable access to
each user level. By default, user and admin are enabled.
Once you enter the administrator password and it is verified, you are given complete access to the GbE2 Interconnect
Switch.
After logging in, the Main Menu of the CLI is displayed. See the “Menu basics” chapter for a summary of the Main
Menu options.
[Main Menu]
info
- Information Menu
stats - Statistics Menu
cfg
oper
boot
- Configuration Menu
- Operations Command Menu
- Boot Options Menu
maint - Maintenance Menu
diff
- Show pending config changes [global command]
apply - Apply pending config changes [global command]
save
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
- Save updated config to FLASH [global command]
>> Main#
Idle timeout
By default, the GbE2 Interconnect Switch will disconnect your console, Telnet, or SSH session after five minutes of
inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. For
information on changing this parameter, see the “System configuration” section in the “Configuration Menu” chapter.
Command line interface 12
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 3 Typographic conventions
Typeface or symbol
AaBbCc123
Meaning
Example
This type depicts onscreen computer output and prompts. Main#
AaBbCc123
This type displays in command examples and shows text Main# sys
that must be typed in exactly as shown.
<AaBbCc123>
This italicized type displays in command examples as a
To establish a Telnet session, enter:
parameter placeholder. Replace the indicated text with host# telnet <IP address>
the appropriate real name or value when using the
command. Do not type the brackets.
This also shows guide titles, special terms, or words to be
emphasized.
Read your user guide thoroughly.
[ ]
Command items shown inside brackets are optional and host# ls [-a]
can be used or excluded as the situation demands. Do
not type the brackets.
Command line interface 13
Menu basics
Introduction
The HP ProLiant BL p-Class GbE2 Interconnect Switch CLI is used for viewing switch information and statistics. In
addition, the administrator can use the CLI for performing all levels of GbE2 Interconnect Switch configuration.
To make the CLI easy to use, the various commands have been logically grouped into a series of menus and
submenus. Each menu displays a list of commands and/or submenus that are available, along with a summary of
what each command will do. Below each menu is a prompt where you can enter any command appropriate to the
current menu.
This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that are commonly
available from all the menus within the CLI.
Main Menu
The Main Menu displays after a successful connection and login. The following table shows the Main Menu for the
administrator login. Some features are not available under the user login.
[Main Menu]
info
- Information Menu
stats - Statistics Menu
cfg
oper
boot
- Configuration Menu
- Operations Command Menu
- Boot Options Menu
maint - Maintenance Menu
diff
- Show pending config changes [global command]
apply - Apply pending config changes [global command]
save
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
- Save updated config to FLASH [global command]
Menu summary
The Main Menu displays the following submenus:
•
•
•
Information Menu
The Information Menu provides submenus for displaying information about the current status of the GbE2
Interconnect Switch: from basic system settings to VLANs, and more.
Statistics Menu
This menu provides submenus for displaying GbE2 Interconnect Switch performance statistics. Included are port,
IF, IP, ICMP, TCP, UDP, SNMP, routing, ARP, and DNS.
Configuration Menu
This menu is available only from an administrator login. It includes submenus for configuring every aspect of the
GbE2 Interconnect Switch. Changes to configuration are not active until explicitly applied. Changes can be
saved to non-volatile memory (NVRAM).
•
•
•
Operations Command Menu
Operations-level commands are used for making immediate and temporary changes to GbE2 Interconnect
Switch configuration. This menu is used for bringing ports temporarily in and out of service. This menu is
available only from an administrator and operator login.
Boot Options Menu
The Boot Options Menu is available only from an administrator login. This menu is used for upgrading GbE2
Interconnect Switch software, selecting configuration blocks, and for resetting the GbE2 Interconnect Switch
when necessary. This menu is also used to set the GbE2 Interconnect Switch back to factory settings.
Maintenance Menu
This menu is used for debugging purposes, enabling you to generate a technical support dump of the critical
state information in the GbE2 Interconnect Switch, and to clear entries in the Forwarding Database and the
Address Resolution Protocol (ARP) and routing tables. This menu is available only from an administrator and
operator login.
Menu basics 14
Global commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful for obtaining
online Help, navigating through menus, and for applying and saving configuration changes.
For help on a specific command, type help. The following screen displays:
Global Commands: [can be issued from any menu]
help
lines
diff
up
verbose
apply
print
exit
save
pwd
quit
revert
history
ping
pushd
traceroute
popd
telnet
who
The following are used to navigate the menu structure:
. Print current menu
.. Move up one menu level
/ Top menu if first, or command separator
! Execute command from history
The following table describes the global commands.
Table 4 Global commands
Command
Action
? command or help
Provides usage information about a specific command on the current menu. When used
without the command parameter, a summary of the global commands is displayed.
. or print
.. or up
/
Displays the current menu.
Moves up one level in the menu structure.
If placed at the beginning of a command, displays the Main Menu. Otherwise, this is used
to separate multiple commands placed on the same line.
lines
diff
Sets the number of lines (n) that display on the screen at one time. The default is 24 lines.
When used without a value, the current setting is displayed.
Shows any pending configuration changes that have not been applied.
diff flashdisplays all pending configuration changes that have been applied but not
saved to flash memory (NVRAM), as well as those that have not been applied.
apply
save
Applies pending configuration changes.
Saves the active configuration to backup, and saves the current configuration as active.
save nsaves the current configuration as active, without saving the active configuration
to backup.
revert
Removes changes that have been made, but not applied.
revert applyremoves all changes that have not been saved.
exit or quit
Exits from the command line interface and logs out.
ping
Verifies station-to-station connectivity across the network. The format is:
ping <host name> | <IP address> [ (number of tries)> [
msec delay ]]
•
•
•
IP address is the hostname or IP address of the device.
number of tries (optional) is the number of attempts (1-32).
msec delay (optional) is the number of milliseconds between attempts.
traceroute
Identifies the route used for station-to-station connectivity across the network. The format is:
traceroute <host name> | <IP address> [<max-hops> [ msec
delay ]]
•
•
•
IP address is the hostname or IP address of the target station.
max-hops (optional) is the maximum distance to trace (1-16 devices)
msec delay (optional) is the number of milliseconds to wait for the response.
pwd
Displays the command path used to reach the current menu.
Menu basics 15
Table 4 Global commands
Command
Action
verbose n
Sets the level of information displayed on the screen:
•
•
•
•
0 = Quiet: Nothing displays except errors, not even prompts.
1 = Normal: Prompts and requested output are shown, but no menus.
2 = Verbose: Everything is shown. This is the default.
When used without a value, the current setting is displayed.
telnet
This command is used to Telnet out of the GbE2 Interconnect Switch. The format is:
telnet <hostname> | <IP address> [port]
history
pushd
popd
Displays the history of the last ten commands.
Remembers the current location in the directory of menu commands.
Returns to the last pushd location.
who
Displays users who are logged in.
Command line history and editing
Using the command line interface, you can retrieve and modify previously entered commands with just a few
keystrokes. The following options are available globally at the command line:
Table 5 Command line history and editing options
Option
history
!!
Description
Displays a numbered list of the last ten previously entered commands.
Repeats the last entered command.
!n
Repeats the nth command shown on the history list.
<Ctrl-p> or
Up arrow key
Recalls the previous command from the history list. This can be used multiple times to work
backward through the last ten commands. The recalled command can be entered as is, or
edited using the options below.
<Ctrl-n> or
Down arrow key
Recalls the next command from the history list. This can be used multiple times to work forward
through the last ten commands. The recalled command can be entered as is, or edited using the
options below.
<Ctrl-a>
<Ctrl-e>
Moves the cursor to the beginning of the command line.
Moves cursor to the end of the command line.
Moves the cursor back one position to the left.
<Ctrl-b> or
Left arrow key
<Ctrl-f> or
Right arrow key
Moves the cursor forward one position to the right.
Erases one character to the left of the cursor position.
<Backspace> or Delete
key
<Ctrl-d>
<Ctrl-k>
<Ctrl-l>
<Ctrl-u>
Other keys
.
Deletes one character at the cursor position.
Erases all characters from the cursor position to the end of the command line.
Redisplays the current line.
Clears the entire line.
Inserts new characters at the cursor position.
Prints the current level menu list.
..
Moves to the previous directory level.
Menu basics 16
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.
Command stacking
As a shortcut, you can type multiple commands on a single line, separated by forward slashes (/). You can connect
as many commands as required to access the menu option that you want.
For example, the keyboard shortcut to access the Simple Network Management Protocol (SNMP) Configuration Menu
from the Main# prompt is:
Main# cfg/sys/ssnmp/name
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others in
the same menu or submenu.
For example, the command shown above could also be entered as:
Main# c/sn/n
Tab completion
By entering the first letter of a command at any menu prompt and pressing the Tab key, the CLI will display all
commands or options in that menu that begin with that letter. Entering additional letters will further refine the list of
commands or options displayed.
If only one command fits the input text when the Tab key is pressed, that command will be supplied on the command
line, waiting to be entered. If the Tab key is pressed without any input on the command line, the currently active menu
displays.
Menu basics 17
First-time configuration
Introduction
This chapter describes how to perform first-time configuration and how to change system passwords.
To begin first-time configuration of the switch, perform the following steps.
1.
2.
Connect to the GbE2 Interconnect Switch console. After connecting, the login prompt displays.
HP ProLiant BL p-Class C-GbE2 Interconnect Switch A
Copyright(C)2003 Hewlett-Packard Development Company, L.P.
Password:
Enter adminas the default administrator password.
The system displays the Main Menu with administrator privileges.
[Main Menu]
info
- Information Menu
stats - Statistics Menu
cfg
oper
boot
- Configuration Menu
- Operations Command Menu
- Boot Options Menu
maint - Maintenance Menu
diff
- Show pending config changes [global command]
apply - Apply pending config changes [global command]
save
- Save updated config to FLASH [global command]
- Exit [global command, always available]
revert - Revert pending or applied changes [global command]
exit
>> Main#
3.
From the Main Menu, enter the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys
port
l2
- System-wide Parameter Menu
- Port Menu
- Layer 2 Menu
l3
qos
- Layer 3 Menu
- QOS Menu
acl
- Access Control List Menu
- RMON Menu
- Port Mirroring Menu
- Uplink Failure Detection Menu
- Dump current configuration to script file
- Backup current configuration to FTP/TFTP server
rmon
pmirr
ufd
dump
ptcfg
gtcfg
cur
- Restore current configuration from FTP/TFTP server
- Display current configuration
Configure Simple Network Management Protocol support
NOTE: SNMP support is enabled by default.
1.
2.
3.
Use the following command to enable SNMP:
>> # /cfg/sys/access/snmp disable|read only|read/write
Set SNMP read or write community string. By default, they are public and private respectively:
>> # /cfg/sys/ssnmp/rcomm|wcomm
When prompted, enter the proper community string.
First-time configuration 18
4.
Apply and save configuration if you are not configuring the GbE2 Interconnect Switch with Telnet support.
Otherwise apply and save after the performing the “Optional Setup for Telnet Support” steps.
>> System# apply
>> System# save
Setting passwords
HP recommends that you change all passwords after initial configuration and as regularly as required under your
network security policies. See the “Accessing the GbE2 Interconnect Switch” section in the “Command line interface”
chapter for a description of the user access levels.
To change the user, operator, or administrator password, you must log in using the administrator password.
Passwords cannot be modified from the user or operator command mode.
NOTE: If you forget your administrator password, call HP technical support for help using the password fix-up
mode.
Changing the default administrator password
The administrator has complete access to all menus, information, and configuration commands, including the ability
to change the user, operator, and administrator passwords.
The default password for the administrator account is admin. To change the default password:
1.
2.
Connect to the GbE2 Interconnect Switch and log in using the adminpassword.
From the Main Menu, use the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys
port
l2
- System-wide Parameter Menu
- Port Menu
- Layer 2 Menu
l3
qos
- Layer 3 Menu
- QOS Menu
acl
- Access Control List Menu
- RMON Menu
- Port Mirroring Menu
- Uplink Failure Detection Menu
- Dump current configuration to script file
- Backup current configuration to FTP/TFTP server
rmon
pmirr
ufd
dump
ptcfg
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
First-time configuration 19
The System Menu is displayed.
[System Menu]
syslog
sshd
- Syslog Menu
- SSH Server Menu
radius
- RADIUS Authentication Menu
tacacs+ - TACACS+ Authentication Menu
ntp
- NTP Server Menu
- System SNMP Menu
- System Access Menu
- Set system date
- Set system time
ssnmp
access
date
time
timezone - Set system timezone (daylight savings)
idle
notice
bannr
- Set timeout for idle CLI sessions
- Set login notice
- Set login banner
hprompt - Enable/disable display hostname (sysName) in CLI prompt
bootp - Enable/disable use of BOOTP
reminders - Enable/disable Reminders
cur
- Display current system-wide parameters
4.
5.
Enter the following command to set the administrator password:
System# access/user/admpw
Enter the current administrator password at the prompt:
Changing ADMINISTRATOR password; validation required...
Enter current administrator password:
NOTE: If you forget your administrator password, call your technical support representative for help using the
password fix-up mode.
6.
7.
8.
Enter the new administrator password at the prompt:
Enter new administrator password:
Enter the new administrator password, again, at the prompt:
Re-enter new administrator password:
Apply and save your change by entering the following commands:
System# apply
System# save
Changing the default user password
The user login has limited control of the GbE2 Interconnect Switch. Through a user account, you can view GbE2
Interconnect Switch information and statistics, but you cannot make configuration changes.
The default password for the user account is user. This password cannot be changed from the user account. Only the
administrator has the ability to change passwords, as shown in the following procedure.
1.
2.
Connect to the GbE2 Interconnect Switch and log in using the admin password.
From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3.
4.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
Enter the following command to set the user password:
System# access/user/usrpw
First-time configuration 20
5.
Enter the current administrator password at the prompt.
Only the administrator can change the user password. Entering the administrator password confirms your
authority.
Changing USER password; validation required...
Enter current administrator password:
6.
7.
8.
Enter the new user password at the prompt:
Enter new user password:
Enter the new user password, again, at the prompt:
Re-enter new user password:
Apply and save your changes:
System# apply
System# save
Changing the default operator password
The operator manages all functions of the GbE2 Interconnect Switch. The operator can reset ports or the entire GbE2
Interconnect Switch. Operators can only effect temporary changes on the GbE2 Interconnect Switch. These changes
will be lost when the GbE2 Interconnect Switch is rebooted/reset. Operators have access to the GbE2 Interconnect
Switch management features used for daily GbE2 Interconnect Switch operations. Because any changes an operator
makes are undone by a reset of the GbE2 Interconnect Switch, operators cannot severely impact GbE2 Interconnect
Switch operation.
By default, the operator account is disabled and has no password. This password cannot be changed from the
operator account. Only the administrator has the ability to change passwords, as shown in the following procedure.
1.
2.
Connect to the GbE2 Interconnect Switch and log in using the admin password.
From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3.
4.
5.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
Enter the following command to set the operator password:
System# access/user/opw
Enter the current administrator password at the prompt.
Only the administrator can change the user password. Entering the administrator password confirms your
authority.
Changing OPERATOR password; validation required...
Enter current administrator password:
6.
7.
8.
Enter the new operator password at the prompt:
Enter new operator password:
Enter the new operator password, again, at the prompt:
Re-enter new operator password:
Apply and save your changes:
System# apply
System# save
First-time configuration 21
Information Menu
Introduction
You can view configuration information for the GbE2 Interconnect Switch in the user, operator, and administrator
command modes. This chapter discusses how to use the CLI to display GbE2 Interconnect Switch information.
Menu overview
Command: /info
[Information Menu]
sys
l2
l3
rmon
link
port
- System Information Menu
- Layer 2 Information Menu
- Layer 3 Information Menu
- Show RMON information
- Show link status
- Show port information
geaport - Show system port and gea port mapping
ufd
dump
- Show Uplink Failure Detection information
- Dump all information
The following table describes the Information Menu options.
Table 6 Information Menu options
Command
sys
Usage
Displays system information.
l2
Displays the Layer 2 Information Menu.
Displays the Layer 3 Information Menu.
Displays the Remote Monitoring Information Menu.
Displays configuration information about each port, including:
l3
rmon
link
•
•
•
•
•
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
port
Displays port status information, including:
•
•
•
•
•
Port number
Whether the port uses VLAN tagging or not
Port VLAN ID (PVID)
Port name
VLAN membership
geaport
ufd
Displays GEA port mapping information, used by service personnel.
Displays Uplink Failure Detection information
dump
Dumps all GbE2 Interconnect Switch information available from the Information Menu (10K or more,
depending on your configuration).
If you want to capture dump data to a file, set your communication software on your workstation to capture
session data prior to issuing the dump commands.
Information Menu 22
System Information Menu
Command: /info/sys
[System Menu]
snmpv3 - SNMPv3 Information Menu
general - Show general system information
log
user
dump
- Show last 30 syslog messages
- Show current user status
- Dump all system information
The following table describes the System Information Menu options.
Table 7 System Information Menu options
Command
snmpv3
general
Usage
Displays the SNMP v3 Menu.
Displays system information, including:
•
•
•
•
•
•
•
•
•
•
System date and time
Switch model name and number
Switch name and location
Time of last boot
MAC address of the switch management processor
IP address of IP interface #1
Hardware version and part number
Software image file and version number
Configuration name
Log-in banner, if one is configured
log
Displays 100 most recent syslog messages.
Displays the User Access Information Menu.
user
dump
Dumps all switch information available from the Information Menu (10K or more, depending
on your configuration).
SNMPv3 Information Menu
Command: /info/sys/snmpv3
[SNMPv3 Information Menu]
usm
view
- Show usmUser table information
- Show vacmViewTreeFamily table information
access - Show vacmAccess table information
group
comm
taddr
- Show vacmSecurityToGroup table information
- Show community table information
- Show targetAddr table information
tparam - Show targetParams table information
notify - Show notify table information
dump
- Show all SNMPv3 information
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2275.
Information Menu 23
The following table describes the SNMPv3 Information Menu options.
Table 8 SNMPv3 Information Menu options
Command
usm
Usage
Displays User Security Model (USM) table information.
Displays information about view name, subtrees, mask and type of view.
Displays View-based Access Control information.
Displays information about the group that includes the security model, user name, and group name.
Displays information about the community table.
Displays the Target Address table.
view
access
group
comm
taddr
tparam
notify
dump
Displays the Target parameters table.
Displays the Notify table.
Displays all the SNMPv3 information.
SNMPv3 USM User Table information
Command: /info/sys/snmpv3/usm
usmUser Table:
User Name
Protocol
-------------------------------- --------------------------------
adminmd5
adminsha
v1v2only
HMAC_MD5, DES PRIVACY
HMAC_SHA, DES PRIVACY
NO AUTH, NO PRIVACY
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of
messages. This security model makes use of a defined set of user identities displayed in the USM user table. The USM
user table contains information like:
•
•
•
the user name
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
•
the privacy protocol.
The following table describes the SNMPv3 User Table information.
Table 9 User Table parameters
Field
Description
User Name
Protocol
This is a string that represents the name of the user that you can use to access the switch.
This indicates whether messages sent on behalf of this user are protected from disclosure using a
privacy protocol. GbE2 software supports DES algorithm for privacy. The software also supports
two authentication algorithms: MD5 and HMAC-SHA.
Information Menu 24
SNMPv3 View Table information
Command: /info/sys/snmpv3/view
View Name
Subtree
Mask
Type
------------------ ---------------------------- ------------- --------
iso
1
included
included
excluded
excluded
excluded
v1v2only
v1v2only
v1v2only
v1v2only
1
1.3.6.1.6.3.15
1.3.6.1.6.3.16
1.3.6.1.6.3.18
The user can control and restrict the access allowed to a group to only a subset of the management information in the
management domain that the group can access within each context by specifying the group’s rights in terms of a
particular MIB view for security reasons.
The following table describes the SNMPv3 View Table information.
Table 10 View Table parameters
Field
Description
View Name
Subtree
Displays the name of the view.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances which
have a common Object Identifier prefix to their names.
Mask
Type
Displays the bit mask.
Displays whether a family of view subtrees is included or excluded from the MIB view.
SNMPv3 Access Table information
Command: /info/sys/snmpv3/access
Group Name Prefix Model Level
Match ReadV
WriteV NotifyV
---------- ------ ------- ------------ ------ --------- -------- -------
v1v2grp
admingrp
snmpv1 noAuthNoPriv exact iso
usm authPriv exact iso
iso
iso
v1v2only
iso
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which could be the
read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking access rights
of a group. This group’s access rights are determined by a read-view, a write-view, and a notify-view. The read-view
represents the set of object instances authorized for the group while reading the objects. The write-view represents the
set of object instances authorized for the group when writing objects. The notify-view represents the set of object
instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Table 11 Access Table parameters
Field
Description
Group Name
Prefix
Model
Displays the name of group.
Displays the prefix that is configured to match the values.
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example, noAuthNoPriv,
authNoPriv, or auth-Priv.
Match
Displays the match for the contextName. The options are: exact and prefix.
Information Menu 25
Table 11 Access Table parameters
Field
Description
ReadV
WriteV
NotifyV
Displays the MIB view to which this entry authorizes the read access.
Displays the MIB view to which this entry authorizes the write access.
Displays the Notify view to which this entry authorizes the notify access.
SNMPv3 Group Table information
Command: /info/sys/snmpv3/group
Sec Model User Name
Group Name
---------- ----------------------------- -------------------------------
snmpv1
usm
usm
v1v2only
adminmd5
adminsha
v1v2grp
admingrp
admingrp
A group is a combination of security model and security name that defines the access rights assigned to all the
security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 12 Group Table parameters
Field
Description
Sec Model
User Name
Group Name
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
Displays the name for the group.
Displays the access name of the group.
SNMPv3 Community Table information
Command: /info/sys/snmpv3/comm
Index
---------- ---------- -------------------- ----------
trap1 public v1v2only v1v2trap
Name
User Name
Tag
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Table 13 Community Table Information parameters
Field
Description
Index
Name
Displays the unique index value of a row in this table.
Displays the community string, which represents the configuration.
Displays the User Security Model (USM) user name.
User Name
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a command
responder application sends an SNMP trap.
Information Menu 26
SNMPv3 Target Address Table information
Command: /info/sys/snmpv3/taddr
Name
---------- --------------- ---- ---------- ---------------
trap1 47.81.25.66 162 v1v2trap v1v2param
Transport Addr Port Taglist
Params
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
The following table describes the SNMPv3 Target Address Table information.
Table 14 Target Address Table Information parameters
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this
snmpTargetAddrEntry.
Transport Addr
Port
Displays the transport addresses.
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified
entry contains SNMP parameters to be used when generating messages to be sent to this
transport address.
SNMPv3 Target Parameters Table information
Command: /info/sys/snmpv3/tparam
Name
------------------- -------- -------------------- --------- -----------
v1v2param snmpv2c v1v2only snmpv1 noAuthNoPriv
MP Model User Name
Sec Model Sec Level
The following table describes the SNMPv3 Target Parameters Table information.
Table 15 Target Parameters Table
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this
entry.
User Name
Sec Model
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Displays the security model used when generating SNMP messages using this entry. The system
may choose to return an inconsistentValue error if an attempt is made to set this variable to a
value for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
Information Menu 27
SNMPv3 Notify Table information
Command: /info/sys/snmpv3/notify
Name
-------------------- --------------------
v1v2trap v1v2trap
Tag
The following table describes the SNMPv3 Notify Table information.
Table 16 SNMPv3 Notify Table
Field
Description
Name
Tag
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
This represents a single tag value which is used to select entries in the snmpTargetAddrTable. Any
entry in the snmpTargetAddrTable that contains a tag value equal to the value of this entry is
selected. If this entry contains a value of zero length, no entries are selected.
Information Menu 28
SNMPv3 dump
Command: /info/sys/snmpv3/dump
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00
usmUser Table:
User Name Protocol
-------------------------------- --------------------------------
admin NO AUTH, NO PRIVACY
adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
vacmAccess Table:
Group Name Prefix Model Level Match ReadV WriteV NotifyV
---------- ------ ------- ---------- ------ ------- -------- ------
admin usm noAuthNoPriv exact org org org
v1v2grp snmpv1 noAuthNoPriv exact org org v1v2only
admingrp usm authPriv exact org org org
vacmViewTreeFamily Table:
View Name Subtree Mask Type
-------------------- --------------- ------------ --------------
org 1.3 included
v1v2only 1.3 included
v1v2only 1.3.6.1.6.3.15 excluded
v1v2only 1.3.6.1.6.3.16 excluded
v1v2only 1.3.6.1.6.3.18 excluded
vacmSecurityToGroup Table:
Sec Model User Name Group Name
---------- ------------------------------- -----------------------
snmpv1 v1v2only v1v2grp
usm admin admin
usm adminsha admingrp
snmpCommunity Table:
Index Name User Name Tag
---------- ---------- -------------------- ----------
snmpNotify Table:
Name Tag
-------------------- --------------------
snmpTargetAddr Table:
Name Transport Addr Port Taglist Params
---------- --------------- ---- ---------- ---------------
snmpTargetParams Table:
Name MP Model User Name Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
Information Menu 29
System information
Command: /info/sys/gen
System Information at 17:29:18 Mon Feb 26, 2007
HP ProLiant BL p-Class C-GbE2 Interconnect Switch B
sysName: 2JUnit1
sysLocation: Houston
RackID: 3334KJP3D030
RackName: BkRm3
Enclosure: D304JTK7D013
EnclosureName: Enterprise
Slot: B
Switch is up 1 days, 2 hours, 3 minutes and 40 seconds.
Last boot: 17:25:38 Mon Feb 26, 2007 (software reset)
MAC address: 00:01:81:2e:ae:e0 IP (If 2) address: 10.30.52.193
Revision: 0A
Switch Serial No: K72550AQKP1863
Hardware Part No: 336181-001 Spare Part No: 321148-001
Interconnect Module Part Number : 283192-B21 Spare Part Number:
321147-001
OctalFC Interconnect Module not present
Software: Version 3.2.0 (FLASH image1), active configuration
System information includes:
•
•
•
•
•
•
•
•
•
•
System date and time
GbE2 Interconnect Switch model name and number
GbE2 Interconnect Switch name and location
Time of last boot
MAC address of the GbE2 Interconnect Switch management processor
IP address of the switch
Hardware version and part number
Software image file and version number
Current configuration block (active, backup, or factory default)
Login banner, if one is configured
Information Menu 30
Show last 100 syslog messages
Command: /info/sys/log
Date Time
Severity level
Message
---- ----
-----------------
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
-------
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:41
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
Jul 8 17:25:42
system: link up on port 1
system: link up on port 8
system: link up on port 7
system: link up on port 12
system: link up on port 11
system: link up on port 14
system: link up on port 13
system: link up on port 16
system: link up on port 15
system: link up on port 17
system: link up on port 20
system: link up on port 22
system: link up on port 23
system: link up on port 21
system: link up on port 4
system: link up on port 3
system: link up on port 6
system: link up on port 5
system: link up on port 10
Jul 8 17:25:42
NOTICE
system: link up on port 9
Each message contains a date and time field and has a severity level associated with it. One of eight different
prefixes is used to indicate the condition:
•
•
•
•
•
•
•
•
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
System user information
Command: /info/sys/user
Usernames:
user
oper
admin
- enabled
- disabled
- Always Enabled
Current User ID table:
1: name tech1 , ena, cos user
2: name tech2 , ena, cos user
, password valid, online
, password valid, offline
The following table describes the User Name information.
Table 17 User Name Information menu
Field
Usage
user
Displays the status of the useraccess level.
oper
Displays the status of the oper(operator) access level.
Displays the status of the admin(administrator) access level.
admin
Current User ID Table
Displays the status of configured user IDs. To configure new user IDs, use the
/cfg/sys/access/user/uid command.
Information Menu 31
Layer 2 information
Command: /info/l2
[Layer 2 Menu]
fdb
lacp
- Forwarding Database Information Menu
- Link Aggregation Control Protocol Menu
hotlink - Show Hot Links information
8021p
acl
- Show QOS 802.1p information
- Show ACL information
8021x
stp
- Show 802.1x information
- Show STP information
cist
trunk
vlan
gen
- Show CIST information
- Show Trunk Group information
- Show VLAN information
- Show general information
- Dump all layer 2 information
dump
The following table describes the Layer 2 Information menu options.
Table 18 Layer 2 Information menu options
Command
fdb
Usage
Displays the Forwarding Database Information Menu.
Displays the Link Aggregation Control Protocol Information Menu.
Displays Hot Links information.
lacp
hotlink
8021p
acl
Displays the 802.1p Information Menu.
Displays Access Control List information.
Displays the 802.1x Information Menu.
8021x
stp
In addition to seeing if STP is enabled or disabled, you can view the following STP bridge
information:
•
•
•
•
•
Priority
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP information:
•
•
•
Port number and priority
Cost
State
cist
Displays Common internal Spanning Tree (CIST) bridge information, including the following:
•
•
•
•
Priority
Hello interval
Maximum age value
Forwarding delay
You can also view port-specific CIST information, including the following:
•
•
•
Port number and priority
Cost
State
trunk
vlan
When trunk groups are configured, you can view the state of each port in the various trunk groups.
Displays VLAN configuration information, including:
•
•
•
•
VLAN Number
VLAN Name
Status
Port membership of the VLAN
gen
Displays general Layer 2 configuration information.
Information Menu 32
Table 18 Layer 2 Information menu options
Command
Usage
dump
Dumps all switch information available from the Layer 2 menu (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication software on your workstation to
capture session data prior to issuing the dump commands.
FDB information menu
Command: /info/l2/fdb
[Forwarding Database Menu]
find
port
vlan
- Show a single FDB entry by MAC address
- Show FDB entries on a single port
- Show FDB entries on a single VLAN
state - Show FDB entries by state
dump - Show all FDB entries
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each
known device to the GbE2 Interconnect Switch port where the device address was learned. The FDB also shows
which other ports have seen frames destined for a particular MAC address.
NOTE: The master forwarding database supports up to 16K MAC address entries on the management
processor (MP) per GbE2 Interconnect Switch.
Table 19 FDB information menu /info/l2/fdb
Command
Usage
find <MAC address> [<VLAN>]
Displays a single database entry by its MAC address. You are prompted
to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx. (For
example: 08:00:20:12:34:56)
You can also enter the MAC address using the format: xxxxxxxxxxxx.
(For example: 080020123456)
port <port number>
vlan <1-4095>
Displays all FDB entries for a particular port.
Displays all FDB entries on a single VLAN.
Displays all FDB entries that match a particular state.
state unknown|ignore|
forward|flood|trunk|ifmac
dump
Displays all entries in the Forwarding Database.
Show all FDB information
Command: /info/l2/fdb/dump
MAC address
VLAN Port State
----------------- ---- ---- -----
00:02:01:00:00:00 300 23
00:02:01:00:00:01 300 23
00:02:01:00:00:02 300 23
00:02:01:00:00:03 300 23
00:02:01:00:00:04 300 23
00:02:01:00:00:05 300 23
00:02:01:00:00:06 300 23
00:02:01:00:00:07 300 23
00:02:01:00:00:08 300 23
00:02:01:00:00:09 300 23
00:02:01:00:00:0a 300 23
00:02:01:00:00:0b 300 23
00:02:01:00:00:0c 300 23
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
An address that is in the forwarding (FWD) state indicates that the GbE2 Interconnect Switch has learned it. When in
the trunking (TRK) state, the port field represents the trunk group number. If the state for the port is listed as unknown
Information Menu 33
(UNK), the MAC address has not yet been learned by the GbE2 Interconnect Switch, but has only been seen as a
destination address. When an address is in the unknown state, no outbound port is indicated.
Clearing entries from the forwarding database
To delete a MAC address from the forwarding database (FDB), see the “Static FDB configuration” section in the
“Configuration Menu” chapter. To clear the entire forwarding database (FDB), see the “Forwarding Database
options” section in the “Maintenance Menu” chapter.
Link Aggregation Control Protocol information
Command: /info/l2/lacp
[LACP Menu]
aggr
port
dump
- Show LACP aggregator information for the port
- Show LACP port information
- Show all LACP ports information
The following table describes the Link Aggregation Control Protocol Menu options.
Table 20 LACP information
Command
aggr
Usage
Displays LACP aggregator information for the port.
Displays LACP information for the port.
Displays all LACP information parameters.
port
dump
LACP dump
Command: /info/l2/lacp/dump
>> LACP# dump
port lacp
adminkey operkey selected
prio
attached trunk
aggr
----------------------------------------------------------------------
1 off
2 off
3 off
4 off
5 off
6 off
7 off
8 off
1
2
3
4
5
6
7
8
1
2
3
4
5
6
7
8
n
n
n
n
n
n
n
n
32768
32768
32768
32768
32768
32768
32768
32768
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
--
…
LACP dump includes the following information for each port in the GbE2 Interconnect Switch:
•
•
•
•
•
•
•
lacp—Displays the port’s LACP mode (active, passive, or off).
adminkey—Displays the value of the port’s adminkey.
operkey—Shows the value of the port’s operational key.
selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.
prio—Shows the value of the port priority.
attached aggr—Displays the aggregator associated with each port.
trunk—This value represents the LACP trunk group number.
Information Menu 34
Hot Links Trigger information
Command: /info/l2/hotlink/trigger
Hot Links Info: Trigger
Current global Hot Links setting: ON
sndfdb disabled
Current Trigger 1 setting: enabled
Name “Corporate Uplinks”, preempt disabled, fdelay 1 sec
Active state: None
Master settings:
port 20
Backup settings:
port 21
Hot Links Trigger information includes the following information:
•
•
•
•
Operational status (on or off)
FDB Update status (enabled or disabled)
Trigger configuration
Trigger state
802.1p information
Command: /info/l2/8021p
Current priority to COS queue information:
Priority COSq Weight
-------- ---- ------
0
1
2
3
4
5
6
7
0
1
2
3
4
5
6
7
1
2
3
4
5
7
15
0
Current port priority information:
Port Priority COSq Weight
----- -------- ---- ------
1
2
3
4
0
0
0
0
0
0
0
0
1
1
1
1
…
23
24
0
0
0
0
1
1
The following table describes the IEEE 802.1p priority to COS queue information.
Table 21 802.1p Priority to COS Queue information
Field
Description
Priority
Cosq
Displays the 802.1p Priority level.
Displays the Class of Service queue.
Displays the scheduling weight of the COS queue.
Weight
The following table describes the IEEE 802.1p port priority information.
Table 22 802.1p Port Priority information
Field
Description
Information Menu 35
Table 22 802.1p Port Priority information
Field
Description
Port
Displays the port number.
Displays the 802.1p Priority level.
Displays the Class of Service queue.
Displays the scheduling weight.
Priority
Cosq
Weight
ACL information
Command: /info/l2/acl
Current ACL information:
------------------------
Filter 1 profile:
Ethernet
- VID
: 1/0xfff
: Set COS to 0
Actions
Filter 2 profile:
Ethernet
- VID
Actions
: 1/0xfff
: Permit
ACL block 1:
- ACL 1
- ACL 2
No ACL groups configured.
ACL information provides configuration parameters for each Access Control List. It also shows which ACLs are
included in each ACL Block, and which ACLs and ACL Blocks are included in each ACL Group.
Information Menu 36
802.1x information
Command: /info/l2/8021x
System capability : Authenticator
System status : disabled
Protocol version : 1
Authenticator
PAE State
Backend
Auth State
Port Auth Mode Auth Status
---- ------------ ------------ -------------- ----------
1
2
3
4
5
6
7
8
9
force-auth
force-auth
force-auth
force-auth
force-auth
force-auth
force-auth
force-auth
force-auth
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
unauthorized initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
initialize
10 force-auth
11 force-auth
12 force-auth
13 force-auth
14 force-auth
15 force-auth
16 force-auth
*17 force-auth
*18 force-auth
19 force-auth
20 force-auth
*21 force-auth
22 force-auth
*23 force-auth
*24 force-auth
------------------------------------------------------------------
* - Port down or disabled
The following table describes the IEEE 802.1x parameters.
Table 23 802.1x information
Field
Description
Port
Displays each port’s name.
Auth Mode
Displays the Access Control authorization mode for the port. The Authorization
mode can be one of the following:
•
•
•
force-unauth
auto
force-auth
Auth Status
Displays the current authorization status of the port, either authorized or
unauthorized.
Authenticator PAE State
Displays the Authenticator Port Access Entity State. The PAE state can be one of
the following:
•
•
•
•
•
•
•
•
initialize
disconnected
connecting
authenticating
authenticated
aborting
held
forceAuth
Backend Auth State
Displays the Backend Authorization State. The Backend Authorization state can
be one of the following:
•
•
•
•
•
•
request
response
success
fail
timeout
idle
Information Menu 37
The following table describes the IEEE 802.1p port priority information.
Table 24 802.1p Port Priority information
Command
Port
Usage
Displays the port number.
Displays the 802.1p Priority level.
Displays the Class of Service queue.
Displays the scheduling weight.
Priority
Cosq
Weight
Spanning Tree information
Command: /info/l2/stp
Spanning Tree Group 1: On (STP/PVST)
VLANs: 1
Current Root:
8000 00:02:a5:d1:0f:ed
Path-Cost
8
Port Hello MaxAge FwdDel Aging
20 20 15 180
2
Parameters: Priority Hello MaxAge FwdDel Aging
32768
2
20
15
180
Port Priority
---- --------
Cost
----
0
0
0
FastFwd
-------- ----------
State
Designated Bridge Des Port
--------------------- -------
1
2
3
0
0
0
n
n
n
FORWARDING *
FORWARDING *
FORWARDING *
The GbE2 Interconnect Switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). If RSTP/MSTP is turned
on, see the “Rapid Spanning Tree information” section for Spanning Tree Group information. In addition to seeing if
STP is enabled or disabled, you can view the following STP bridge information:
•
•
•
•
•
•
•
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP information:
•
•
•
•
•
•
Port number and priority
Cost
State
Port Fast Forwarding state
Designated bridge
Designated port
Information Menu 38
The following table describes the STP parameters.
Table 25 STP parameters
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Port
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
The current root port refers to the port on the GbE2 Interconnect Switch that receives data
from the current root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
Hello
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network.
FwdDel
Aging
The forward delay parameter specifies, in seconds, the amount of time that a bridge port
has to wait before it changes from learning state to forwarding state.
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the Forwarding
Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single segment,
the port with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment.
Generally speaking, the faster the port, the lower the path cost.
State
The State field shows the current state of the port. The State field can be one of the
following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Designated bridge
Designated port
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
The port ID of the port on the Designated Bridge to which this port is connected.
Information Menu 39
Rapid Spanning Tree and Multiple Spanning Tree information
Command: /info/l2/stp
Spanning Tree Group 1: On (RSTP)
VLANs: 1
Current Root:
8000 00:00:01:00:19:00
Path-Cost Port Hello MaxAge FwdDel Aging
20 15 300
0
0
9
Parameters: Priority Hello MaxAge FwdDel Aging
32768 20 15 300
9
Port Prio Cost State Role Designated Bridge Des Port Type
---- ---- ---- ------ ---- --------------------- -------- ----
1
2
3
4
5
6
7
8
9
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DISC
10
11
12
FWD DESG 8000-00:00:01:00:19:00 8017 P2P2,Edge
FWD DESG 8000-00:00:01:00:19:00 8018 P2P
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE 802.1s
Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RSTP bridge
information for the Spanning Tree Group:
•
•
•
•
•
•
•
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific RSTP information:
•
•
•
•
•
•
Port number and priority
Cost
State
Role
Designated bridge and port
Link type
The following table describes the STP parameters in RSTP or MSTP mode.
Table 26 Rapid Spanning Tree parameter descriptions
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Port
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
The current root port refers to the port on the GbE2 Interconnect Switch that receives data
from the current root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
Hello
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configurationbridgeprotocol data unit (BPDU). Any bridge that is not the root
bridge uses the root bridge hello value.
Information Menu 40
Table 26 Rapid Spanning Tree parameter descriptions
Parameter
Description
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network.
FwdDel
Aging
The forward delay parameter specifies, in seconds, the amount of time that a bridge port
has to wait before it changes from learning state to forwarding state.
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the Forwarding
Database.
Priority (port)
Cost
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single segment,
the port with the lowest port priority becomes the designated port for the segment.
The port path cost parameter is used to help determine the designated port for a segment.
Generally speaking, the faster the port, the lower the path cost. A setting of zero (0)
indicates that the cost will be set to the appropriate default after the link speed has been
auto-negotiated.
State
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of the
following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master
(MAST), or Unknown (UNK).
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
Type
The port ID of the port on the Designated Bridge to which this port is connected.
Type of link connected to the port, and whether the port is an edge port. Link type values
are AUTO, P2P, or SHARED.
MSTP: The Type field appears in /info/cist.
Information Menu 41
Common Internal Spanning Tree information
Command: /info/l2/cist
Mstp Digest: 0xac36177f50283cd4b83821d8ab26de62
Common Internal Spanning Tree:
VLANs: 1 3-4094
Current Root:
8000 00:03:42:fa:3b:80
Path-Cost Port MaxAge FwdDel
11
1
20
15
CIST Regional Root:
8000 00:03:42:fa:3b:80
Path-Cost
11
Parameters: Priority MaxAge FwdDel Hops
32768 20 15 20
Port Prio Cost State Role Designated Bridge
Des Port Hello Type
---- ---- ---- ------ ---- --------------------- -------- ----- ----
1 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8001 4 P2P, Edge
2 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8002
3 128 2000 DSB
4 128 2000 DSB
5 128 2000 DSB
6 128 2000 DSB
7 128 2000 DSB
8 128 2000 DSB
9 128 2000 DSB
10 128 0
DSB
11 128 2000 FWD DESG 8000-00:03:42:fa:3b:80
12 128 2000 DSB
In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the following
CIST bridge information:
•
•
•
•
•
•
CIST root
CIST regional root
Priority
Maximum age value
Forwarding delay
Hops
You can also refer to the following port-specific CIST information:
•
•
•
•
•
•
•
Port number and priority
Cost
State
Role
Designated bridge and port
Hello interval
Link type and port type
Information Menu 42
The following table describes the CIST parameters.
Table 27 Common Internal Spanning Tree parameter descriptions
Parameter
Description
CIST Root
Shows information about the root bridge for the Common Internal Spanning Tree
(CIST). Values on this row of information refer to the CIST root.
CIST Regional Root
Priority (bridge)
MaxAge
Shows information about the root bridge for this MSTP region. Values on this row of
information refer to the regional root.
The bridge priority parameter controls which bridge on the network will become the
STP root bridge.
The maximum age parameter specifies, in seconds, the maximum time the bridge
waits without receiving a configuration bridge protocol data unit before it
reconfigures the STP network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge
port has to wait before it changes from learning state to forwarding state.
Hops
Shows the maximum number of bridge hops allowed before a packet is dropped.
Priority (port)
The port priority parameter helps determine which bridge port becomes the
designated port. In a network topology that has multiple bridge ports connected to a
single segment, the port with the lowest port priority becomes the designated port for
the segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A setting of
zero (0) indicates that the cost will be set to the appropriate default after the link
speed has been auto-negotiated.
State
Shows the current state of the port. The state field can be one of the following:
Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of
the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP),
Master (MAST), or Unknown (UNK).
Designated Bridge
Shows information about the bridge connected to each port, if applicable.
Information includes the priority (hex) and MAC address of the Designated Bridge.
Designated Port
Hello
The port ID of the port on the Designated Bridge to which this port is connected.
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
Type
Type of link connected to the port, and whether the port is an edge port. Link type
values are AUTO, P2P, or SHARED.
Trunk group information
Command: /info/l2/trunk
Trunk group 1, port state:
1: STG 1 forwarding
2: STG 1 forwarding
When trunk groups are configured, you can view the state of each port in the various trunk groups.
NOTE: If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining ports in the
trunk group will also be set to forwarding.
Information Menu 43
VLAN information
Command: /info/l2/vlan
VLAN
Name
Status Ports
---- -------------------------------- ------ ----------------
1
2
7
Default VLAN
pc03p
pc07f
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
ena
4 5
2
7
11
14
15
16
17
18
19
20
21
22
24
11
14
15
16
17
18
19
20
21
22
24
pc04u
8600-14
8600-15
8600-16
8600-17
35k-1
35k-2
35k-3
35k-4
pc07z
redlan
300 ixiaTraffic
4000 bpsports
1 12 13 23
3-6 8-10
This information display includes all configured VLANs and all member ports that have an active link state.
VLAN information includes:
•
•
•
•
VLAN Number
VLAN Name
Status
Port membership of the VLAN
Layer 2 general information
Command: /info/l2/gen
STP uplink fast mode : disabled
The following table describes the Layer 2 general information.
Table 28 L2 general information
Field
Description
STP uplink fast mode
Displays the status of STP Uplink Fast: enabled or disabled.
Layer 3 information
Command: /info/l3
[Layer 3 Menu]
route
arp
- IP Routing Information Menu
- ARP Information Menu
ospf
rip
- OSPF Routing Information Menu
- RIP Routing Information Menu
ip
- Show IP information
igmp
vrrp
dump
- Show IGMP Snooping Multicast Group information
- Show Virtual Router Redundancy Protocol information
- Dump all layer 3 information
Information Menu 44
The following table describes the Layer 3 Information Menu options.
Table 29 Layer 3 information menu options
Command
Usage
route
Displays the IP Routing Menu. Using the options of this menu, the system displays the following for
each configured or learned route:
•
•
•
•
Route destination IP address, subnet mask, and gateway address
Type of route
Tag indicating origin of route
Metric for RIP tagged routes, specifying the number of hops to the destination (1-15 hops, or 16
for infinite hops)
•
The IP interface that the route uses
arp
ospf
rip
ip
Displays the Address Resolution Protocol (ARP) Information Menu.
Displays OSPF routing Information Menu.
Displays Routing Information Protocol Menu.
Displays IP Information. IP information, includes:
•
IP interface information: Interface number, IP address, subnet mask, VLAN number, and
operational status.
•
Default gateway information: Metric for selecting which configured gateway to use, gateway
number, IP address, and health status
•
•
IP forwarding information: Enable status, lnet and lmask
Port status
igmp
vrrp
dump
Displays IGMP Information Menu.
Displays the VRRP Information Menu.
Dumps all switch information available from the Layer 3 Menu (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication software on your workstation to
capture session data prior to issuing the dump commands.
Route information
Command: /info/l3/route
[IP Routing Menu]
find
gw
type
tag
if
- Show a single route by destination IP address
- Show routes to a single gateway
- Show routes of a single type
- Show routes of a single tag
- Show routes on a single interface
- Show all routes
dump
Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch.
Table 30 Route Information menu options
Command
Usage
find <IP address>
Displays a single route by IP address.
For example, 100.10.1.1
gw <IP address>
Displays routes to a single gateway.
For example, 100.10.1.2
type indirect|direct|local|
broadcast|martian|multicast
Displays routes of a single type.
tag fixed|static|addr|rip|ospf|
broadcast|martian|multicast
Displays routes of a single tag.
if <IP address>
Displays routes on a single interface.
dump
Displays all routes configured in the switch.
Information Menu 45
Show all IP Route information
Command: /info/l3/route/dump
Status code: * - best
Destination
Mask
Gateway
11.0.0.1
Type
Tag
Metr If
--------------- --------------- --------------- --------- --------- ---- --
* 11.0.0.0
* 11.0.0.1
255.0.0.0
255.255.255.255 11.0.0.1
direct
local
fixed
addr
211
211
211
12
* 11.255.255.255 255.255.255.255 11.255.255.255 broadcast broadcast
* 12.0.0.0
* 12.0.0.1
255.0.0.0
255.255.255.255 12.0.0.1
12.0.0.1
direct
local
fixed
addr
12
* 12.255.255.255 255.255.255.255 12.255.255.255 broadcast broadcast
12
211
24
* 13.0.0.0
* 47.0.0.0
* 47.133.88.0
255.0.0.0
255.0.0.0
255.255.255.0
11.0.0.2
47.133.88.1
47.133.88.46
indirect ospf
indirect static
2
direct
broadcast broadcast 2
martian martian
multicast addr
fixed
24
* 172.30.52.223 255.255.255.255 172.30.52.223
* 224.0.0.0
* 224.0.0.5
224.0.0.0
255.255.255.255 0.0.0.0
0.0.0.0
The following table describes the Typeparameter.
Table 31 IP Routing Type information
Field
Description
indirect
The next hop to the host or subnet destination will be forwarded through a router at the
Gateway address.
direct
Packets will be delivered to a destination host or subnet attached to the switch.
Indicates a route to one of the switch’s IP interfaces.
Indicates a broadcast route.
local
broadcast
martian
The destination belongs to a host or subnet which is filtered out. Packets to this
destination are discarded.
multicast
Indicates a multicast route.
The following table describes the Tagparameter.
Table 32 IP Routing Tag information
Field
Description
fixed
static
addr
The address belongs to a host or subnet attached to the switch.
The address is a static route which has been configured on the GbE2 Switch.
The address belongs to one of the switch’s IP interfaces.
The address was learned by the Routing Information Protocol (RIP).
The address was learned by Open Shortest Path First (OSPF).
Indicates a broadcast address.
rip
ospf
broadcast
martian
The address belongs to a filtered group.
ARP information
Command: /info/arp
[Address Resolution Protocol Menu]
find
port
vlan
addr
dump
- Show a single ARP entry by IP address
- Show ARP entries on a single port
- Show ARP entries on a single VLAN
- Show ARP address list
- Show all ARP entries
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address status
flags, VLAN, and port for the address, and port referencing information.
Information Menu 46
The following table describes the Address Resolution Protocol Menu options.
Table 33 ARP information
Command
Usage
find <IP address>
Displays a single ARP entry by IP address.
For example, 100.10.1.1
port <port number>
vlan <1-4095>
addr
Displays the ARP entries on a single port.
Displays the ARP entries on a single VLAN.
Displays the ARP address list: IP address, IP mask, MAC address, and VLAN flags.
Displays all ARP entries, including:
dump
•
•
•
IP address and MAC address of each entry
Address status flag
The VLAN and port to which the address belongs
The ports which have referenced the address (empty if no port has routed traffic to the
IP address shown)
Show all ARP entry information
Command: /info/arp/dump
IP address
--------------- -----
192.168.2.4
192.168.2.19
192.168.2.61
Flags
MAC address
VLAN
----
Port
----
-----------------
00:50:8b:b2:32:cb
00:0e:7f:25:89:b5
00:0f:6a:ed:46:00
1
1
1
18
17
P
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
Table 34 ARP dump flag parameters
Flag
P
Description
Permanent entry created for GbE2 Interconnect Switch IP interface.
Indirect route entry.
R
U
Unresolved ARP entry. The MAC address has not been learned.
ARP address list information
Command: /info/arp/addr
IP address
IP mask
MAC address
VLAN Flags
--------------- --------------- ----------------- ---- -----
205.178.18.66 255.255.255.255 00:70:cf:03:20:04
205.178.50.1 255.255.255.255 00:70:cf:03:20:06
P
1
1
205.178.18.64 255.255.255.255 00:70:cf:03:20:05
This screen displays all entries in the ARP cache.
Information Menu 47
OSPF information
Command: /info/l3/ospf
[OSPF Information Menu]
general - Show general information
aindex - Show area(s) information
if
- Show interface(s) information
virtual - Show details of virtual links
nbr
dbase
- Show neighbor(s) information
- Database Menu
sumaddr - Show summary address list
nsumadd - Show NSSA summary address list
routes - Show OSPF routes
dump
- Show OSPF information
The following table describes the OSPF Menu options.
Table 35 OSPF information
Command
Usage
general
Displays general OSPF information.
aindex <0-2>
Displays area information for a particular area index. If no parameter is
supplied, it displays area information for all the areas.
if <1-255>
Displays interface information for a particular interface. If no parameter
is supplied, it displays information for all the interfaces.
virtual
Displays information about all the configured virtual links.
nbr <nbr router-id (A.B.C.D)>
Displays the status of a neighbor with a particular router ID. If no router
ID is supplied, it displays the information about all the current neighbors.
dbase
Displays OSPF database menu.
sumaddr <0-2>
nsumadd <0-2>
routes
Displays the list of summary ranges belonging to non-NSSA areas.
Displays the list of summary ranges belonging to NSSA areas.
Displays OSPF routing table.
dump
Displays all OSPF information.
Information Menu 48
OSPF general information
Command: /info/l3/ospf/general
OSPF Version 2
Router ID: 10.10.10.1
Started at 1663 and the process uptime is 4626
Area Border Router: yes, AS Boundary Router: no
LS types supported are 6
External LSA count 0
External LSA checksum sum 0x0
Number of interfaces in this router is 2
Number of virtual links in this router is 1
16 new lsa received and 34 lsa originated from this router
Total number of entries in the LSDB 10
Database checksum sum 0x0
Total neighbors are 1, of which
2 are >=INIT state,
2 are >=EXCH state,
2 are =FULL state
Number of areas is 2, of which 3-transit 0-nssa
Area Id : 0.0.0.0
Authentication : none
Import ASExtern : yes
Number of times SPF ran : 8
Area Border Router count : 2
AS Boundary Router count : 0
LSA count : 5
LSA Checksum sum : 0x2237B
Summary : noSummary
OSPF interface information
Command: /info/l3/ospf/if
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP
Router ID 10.10.10.1, State DR, Priority 1
Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1
Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2
Timer intervals, Hello 10, Dead 40, Wait 1663, Retransmit 5,
Transit delay 1
Neighbor count is 1 If Events 4, Authentication type none
OSPF Database information menu
Command: /info/l3/ospf/dbase
[OSPF Database Menu]
advrtr - LS Database info for an Advertising Router
asbrsum - ASBR Summary LS Database info
dbsumm - LS Database summary
ext
nw
nssa
rtr
self
summ
all
- External LS Database info
- Network LS Database info
- NSSA External LS Database info
- Router LS Database info
- Self Originated LS Database info
- Network-Summary LS Database info
- All
Information Menu 49
The following table describes the OSPF Database information menu options.
Table 36 OSPF Database information
Command
Usage
advrtr <router-id (A.B.C.D)>
Takes advertising router as a parameter. Displays all the Link
State Advertisements (LSAs) in the LS database that have the
advertising router with the specified router ID, for example:
20.1.1.1.
asbrsum <adv-rtr (A.B.C.D)>|
<link_state_id (A.B.C.D>|<self>
Displays ASBR summary LSAs. The usage of this command is
as follows:
a. asbrsum adv-rtr 20.1.1.1 displays ASBR summary
LSAs having the advertising router 20.1.1.1.
b. asbrsum link_state_id 10.1.1.1 displays ASBR
summary LSAs having the link state ID 10.1.1.1.
c. asbrsum self displays the self advertised ASBR
summary LSAs.
d. asbrsum with no parameters displays all the ASBR
summary LSAs.
dbsumm
Displays the following information about the LS database in a
table format:
a. The number of LSAs of each type in each area.
b. The total number of LSAs for each area.
c. The total number of LSAs for each LSA type for all
areas combined.
d. The total number of LSAs for all LSA types for all
areas combined.
No parameters are required.
ext <adv-rtr (A.B.C.D)>| <link_state_id Displays the AS-external (type 5) LSAs with detailed
(A.B.C.D)>|<self>
information of each field of the LSAs. The usage of this
command is the same as the usage of the command
asbrsum.
nw <adv-rtr (A.B.C.D)>| <link_state_id
(A.B.C.D)>|<self>
Displays the network (type 2) LSAs with detailed information
of each field of the LSA.network LS database. The usage of
this command is the same as the usage of the command
asbrsum.
nssa <adv-rtr (A.B.C.D)>| <link_state_id Displays the NSSA (type 7) LSAs with detailed information of
(A.B.C.D)>|<self>
each field of the LSAs. The usage of this command is the same
as the usage of the command asbrsum.
rtr <adv-rtr (A.B.C.D)>| <link_state_id Displays the router (type 1) LSAs with detailed information of
(A.B.C.D)>|<self>
each field of the LSAs. The usage of this command is the same
as the usage of the command asbrsum.
self
Displays all the self-advertised LSAs. No parameters are
required.
summ <adv-rtr (A.B.C.D)>| <link_state_id Displays the network summary (type 3) LSAs with detailed
(A.B.C.D)>|<self>
information of each field of the LSAs.
The usage of this command is the same as the usage of the
command asbrsum.
all
Displays all the LSAs.
Information Menu 50
OSPF route codes information
Command: /info/l3/ospf/routes
Codes: IA - OSPF inter area,
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
IA 10.10.0.0/16 via 200.1.1.2
IA 40.1.1.0/28 via 20.1.1.2
IA 80.1.1.0/24 via 200.1.1.2
IA 100.1.1.0/24 via 20.1.1.2
IA 140.1.1.0/27 via 20.1.1.2
IA 150.1.1.0/28 via 200.1.1.2
E2 172.18.1.1/32 via 30.1.1.2
E2 172.18.1.2/32 via 30.1.1.2
E2 172.18.1.3/32 via 30.1.1.2
E2 172.18.1.4/32 via 30.1.1.2
E2 172.18.1.5/32 via 30.1.1.2
E2 172.18.1.6/32 via 30.1.1.2
E2 172.18.1.7/32 via 30.1.1.2
E2 172.18.1.8/32 via 30.1.1.2
Routing Information Protocol menu
Command: /info/l3/rip
[RIP Information Menu]
routes - Show RIP routes
dump
- Show RIP user's configuration
The following table describes the Routing Information Protocol information menu options.
Table 37 RIP information
Command
Usage
routes
Displays information about RIP routes.
dump <0-255>
Displays RIP user’s configuration. Enter 0 (zero) for all interfaces.
RIP Routes information
Command: /info/l3/rip/routes
>> IP Routing# /info/l3/rip/routes
3.0.0.0/8 via 30.1.1.11 metric 4
4.0.0.0/16 via 30.1.1.11 metric 16
10.0.0.0/8 via 30.1.1.2 metric 3
20.0.0.0/8 via 30.1.1.2 metric 2
This table contains all dynamic routes learned through RIP, including the routes that are undergoing garbage
collection with metric = 16. This table does not contain directly connected routes and locally configured static routes.
Information Menu 51
RIP user configuration
Command: /info/l3/rip/dump <1-255>
RIP USER CONFIGURATION :
RIP on updat 30
RIP Interface 2 : 102.1.1.1, enabled
version 2, listen enabled, supply enabled, default none
poison disabled, trigg enabled, mcast enabled, metric 1
auth none,key none
RIP Interface 3 : 103.1.1.1, enabled
version 2, listen enabled, supply enabled, default none
poison disabled, trigg enabled, mcast enabled, metric 1
IP information
Command: /info/l3/ip
Interface information:
1: 47.80.23.243
255.255.254.0 47.80.23.255,
up
Default gateway information:
1: 47.80.22.1,
2: 47.80.225.2,
up
up
Current BOOTP relay settings: OFF
0.0.0.0, 0.0.0.0
Current IP forwarding settings: OFF, dirbr disabled
Current network filter settings:
none
Current route map settings:
The following interface and default gateway information is displayed:
•
•
•
•
•
•
•
•
•
Interface number
IP address
IP mask
IP broadcast address
Operational status
BootP relay settings
IP forwarding settings
Network filter settings
Route map settings
IGMP multicast group information
Command: /info/l3/igmp
[IGMP Multicast Group Menu]
mrouter - Show IGMP Snooping Multicast Router Port information
find
vlan
port
- Show a single group by IP group address
- Show groups on a single vlan
- Show groups on a single port
trunk - Show groups on a single trunk
dump - Show all groups
Information Menu 52
The following table describes the commands used to display information about IGMP groups learned by the switch.
Table 38 IGMP Multicast Group menu options
Command
Usage
mrouter
Displays the Multicast Router Menu.
find <IP address>
Displays a single IGMP multicast group by its IP address. For example,
100.10.1.1
vlan <1-4095>
port <port number>
trunk <1-12>
dump
Displays all IGMP multicast groups on a single VLAN.
Displays all IGMP multicast groups on a single port.
Displays all IGMP multicast groups on a single trunk group.
Displays information for all multicast groups.
IGMP multicast router port information
Command: /info/l3/igmp/mrouter
[IGMP Multicast Router Menu]
vlan - Show all multicast router ports on a single vlan
dump - Show all learned multicast router ports
The following table describes the commands used to display information about multicast routers learned through
IGMP Snooping.
Table 39 IGMP Multicast Router menu options
Command
Usage
vlan <1-4095> Displays information for all multicast groups learned on a single VLAN
dump
Displays information for all multicast groups learned by the switch.
VRRP information
Virtual Router Redundancy Protocol (VRRP) support on GbE2 Interconnect Switch provides redundancy between
routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each
participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a
number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the
backup virtual routers will assume routing authority and take control of the virtual router IP address.
Command: /info/l3/vrrp
VRRP information:
1: vrid 2, 205.178.18.210, if 1, renter, prio 100, master, server
2: vrid 1, 205.178.18.202, if 1, renter, prio 100, backup
3: vrid 3, 205.178.18.204, if 1, renter, prio 100, master, proxy
When virtual routers are configured, you can view the status of each virtual router using this command. VRRP
information includes:
•
•
•
•
Virtual router number
Virtual router ID and IP address
Interface number
Ownership status
• owner identifies the preferred master virtual router. A virtual router is the owner when the IP address of the
virtual router and its IP interface are the same.
• renter identifies virtual routers which are not owned by this device
•
Priority value. During the election process, the virtual router with the highest priority becomes master.
Information Menu 53
•
Activity status
• master identifies the elected master virtual router.
• backup identifies that the virtual router is in backup mode.
• init identifies that the virtual router is waiting for a startup event. Once it receives a startup event, it
transitions to master if its priority is 255, (the IP address owner), or transitions to backup if it is not the IP
address owner.
•
•
Server status. The server state identifies virtual routers.
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same IP address
as a proxy IP address. The use of virtual proxy routers enables redundant switches to share the same IP address,
minimizing the number of unique IP addresses that must be configured.
RMON Information Menu
Command: /info/rmon
[RMON Information Menu]
hist
- Show RMON History group information
alarm - Show RMON Alarm group information
event - Show RMON Event group information
dump
- Show all RMON information
The following table describes the RMON Information parameters.
Table 40 RMON History Information Menu /info/rmon/hist
Command
hist
Usage
Displays RMON History Information.
Displays RMON Alarm Information.
Displays RMON Event Information.
Displays all RMON Information parameters.
alarm
event
dump
RMON history information
Command: /info/rmon/hist
RMON History group configuration:
Index
IFOID
Interval Rbnum Gbnum
----- ------------------------------ -------- ----- -----
1
2
3
4
5
1.3.6.1.2.1.2.2.1.1.24
1.3.6.1.2.1.2.2.1.1.24
1.3.6.1.2.1.2.2.1.1.18
1.3.6.1.2.1.2.2.1.1.19
1.3.6.1.2.1.2.2.1.1.24
30
30
5
5
5
5
5
5
5
5
5
5
30
30
1800
The following table describes the RMON History Information parameters.
Table 41 RMON History Information: /info/rmon/hist
Command
Index
Usage
Displays the index number that identifies each history instance.
Displays the MIB Object Identifier.
IFOID
Interval
Rbnum
Displays the time interval for each for each sampling bucket.
Displays the number of requested buckets, which is the number of data slots into which data is to be
saved.
Gbnum
Displays the number of granted buckets that may hold sampled data.
Information Menu 54
RMON alarm information
Command: /info/rmon/alarm
RMON Alarm group configuration:
Index Interval Type rLimit
fLimit rEvtIdx fEvtIdx last value
----- -------- ---- -------- -------- ------- ------- ----------
1
2
30 abs
900 abs
300 abs
1800 abs
1800 abs
1800 abs
1800 abs
1800 abs
1800 abs
1800 abs
1800 abs
10
0
0
10
20
0
1
0
0
1
1
1
1
1
1
1
1
0
2
0
0
0
0
0
0
0
0
0
0
0
3
10
10
10
10
10
10
10
10
10
0
4
0
5
0
0
8
0
56344540
10
11
15
18
100
0
0
0
0
0
0
0
0
0
0
Index
OID
----- ------------------------------
1
2
1.3.6.1.2.1.2.2.1.10.257
1.3.6.1.2.1.2.2.1.11.258
1.3.6.1.2.1.2.2.1.12.259
1.3.6.1.2.1.2.2.1.13.260
1.3.6.1.2.1.2.2.1.14.261
1.3.6.1.2.1.2.2.1.10.280
1.3.6.1.2.1.2.2.1.15.262
1.3.6.1.2.1.2.2.1.16.263
1.3.6.1.2.1.2.2.1.19.266
1.3.6.1.2.1.2.2.1.10.279
1.3.6.1.2.1.2.2.1.17.264
3
4
5
8
10
11
15
18
100
The following table describes the RMON Alarm Information parameters.
Table 42 RMON Alarm Information: /info/rmon/alarm
Command
Index
Usage
Displays the index number that identifies each alarm instance.
Interval
Displays the time interval over which data is sampled and compared with the rising and falling
thresholds.
Type
Displays the method of sampling the selected variable and calculating the value to be compared
against the thresholds, as follows:
abs: absolute value, the value of the selected variable is compared directly with the thresholds at
the end of the sampling interval.
delta: delta value, the value of the selected variable at the last sample is subtracted from the
current value, and the difference compared with the thresholds.
rLimit
fLimit
rEvtIdx
fEvtIdx
Last value
OID
Displays the rising threshold for the sampled statistic.
Displays the falling threshold for the sampled statistic.
Displays the rising alarm event index that is triggered when a rising threshold is crossed.
Displays the falling alarm event index that is triggered when a falling threshold is crossed.
Displays the last sampled value.
Displays the MIB Object Identifier for each alarm index.
Information Menu 55
RMON event information
Command: /info/rmon/event
RMON Event group configuration:
Index Type
Last Sent
Description
----- ---- ---------------- ---------------------------------
1 both
2 none
0D: 0H: 1M:20S Event_1
0D: 0H: 0M: 0S Event_2
3 log
0D: 0H: 0M: 0S Event_3
4 trap
0D: 0H: 0M: 0S Event_4
5 both
0D: 0H: 0M: 0S Log and trap event for Link Down
0D: 0H: 0M: 0S Log and trap event for Link Up
0D: 0H: 0M: 0S Send log and trap for icmpInMsg
0D: 0H: 0M: 0S Send log and trap for icmpInEchos
0D: 0H: 0M: 0S Event_100
10 both
11 both
15 both
100 both
The following table describes the RMON Event Information parameters.
Table 43 RMON Event Information: /info/rmon/event
Command
Index
Usage
Displays the index number that identifies each event instance.
Type
Displays the type of notification provided for this event, as follows: none, log, trap, both.
Last Sent
Displays the time that passed since the last switch reboot, when the most recent event was triggered.
This value is cleared when the switch reboots.
Description
Displays a text description of the event.
Link status information
Command: /info/link
------------------------------------------------------------------
Port Speed Duplex Flow Ctrl Link
---- ----- -------- --TX-----RX-- ------
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
any
any
1000
100
any
any
any
1000
100
100
any
any
any
any
any
any
100
100
100
100
1000
any
any
any
any
any
full
full
any
any
any
full
full
full
any
yes
yes
yes
yes
yes
yes
yes
no
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
down
down
down
down
down
down
down
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
any
any
any
any
any
full
full
full
full
full
any
any
any
Information Menu 56
Use this command to display link status information about each port on a GbE2 Interconnect Switch, including:
•
•
•
•
•
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
Port information
Command: /info/port
Port Tag RMON PVID
NAME
VLAN(s)
---- --- ---- ---- -------------- -------------------------------
1 n d
2 n d
3 n d
4 n d
5 n d
6 n d
7 n d
8 n d
9 n d
10 n d
11 n d
12 n d
13 n d
14 n d
15 n d
16 n d
17 n d
18 n d
19 n d
20 n d
21 n d
22 n d
23 n d
24 n d
1 Downlink1
1 Downlink2
1 Downlink3
1 Downlink4
1 Downlink5
1 Downlink6
1 Downlink7
1 Downlink8
1 Downlink9
1 Downlink10
1 Downlink11
1 Downlink12
1 Downlink13
1 Downlink14
1 Downlink15
1 Downlink16
1 Xconnect1
1 Xconnect2
3 Uplink1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
3
3
1
1
1
1
3 Uplink2
1 Uplink3
1 Uplink4
1 FrontPanel1
1 FrontPanel2
Port information includes:
•
•
•
•
•
•
Port number
Whether the port uses VLAN tagging or not (y or n)
Whether Remote Monitoring (RMON) is enabled or disabled (e or d)
Port VLAN ID (PVID)
Port name
VLAN membership
Information Menu 57
Logical Port to GEA Port mapping
Command: /info/geaport
Logical Port GEA Port(0-based) GEA Unit
------------ ----------------- ---------
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
3
2
5
7
4
6
6
0
7
0
0
0
0
0
0
2
0
2
2
2
2
2
2
2
2
2
0
0
0
0
0
2
2
8
11
10
2
4
3
5
9
1
11
10
9
8
0
1
This display correlates the logical port number to the GEA unit on which each port resides.
Uplink Failure Detection information
Command: /info/ufd
Uplink Failure Detection: Enabled
LtM status: Down
Member
--------- ---
STG
STG State
------------
Link Status
-----------
down
port 24
1
10
16
DISABLED
DISABLED *
DISABLED *
* = STP turned off for this port.
LtD status: Auto Disabled
Member
Link Status
-----------
disabled
---------
port 1
port 2
port 3
port 4
disabled
disabled
disabled
Uplink Failure Detection (UFD) information includes:
•
•
•
•
UFD status, either enabled or disabled
LtM status and member ports
Spanning Tree status for LtM ports
LtD status and member ports
Information Menu 58
Information dump
Command: /info/dump
Use the dump command to dump all GbE2 Interconnect Switch information available from the Information Menu (10K
or more, depending on your configuration). This data is useful for tuning and debugging GbE2 Interconnect Switch
performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture session
data prior to issuing the dump commands.
Information Menu 59
Statistics Menu
Introduction
You can view GbE2 Interconnect Switch performance statistics in the user, operator, and administrator command
modes. This chapter discusses how to use the CLI to display GbE2 Interconnect Switch statistics.
Menu information
Command: /stats
[Statistics Menu]
port
l2
l3
- Port Stats Menu
- Layer 2 Stats Menu
- Layer 3 Stats Menu
- MP-specific Stats Menu
- ACL Stats Menu
- Show SNMP stats
- Show NTP stats
- Show Uplink Failure Detection stats
- Clear all MP related stats
- Dump all stats
mp
acl
snmp
ntp
ufd
clrmp
dump
The following table describes the Statistics Menu options.
Table 44 Statistics Menu options
Command
Usage
port <port number>
Displays the Port Statistics Menu for the specified port. Use this command to display
traffic statistics on a port-by-port basis. Traffic statistics are included in SNMP
Management Information Base (MIB) objects.
l2
l3
mp
Displays the Layer 2 Statistics Menu.
Displays the Layer 3 Statistics Menu.
Displays the Management Processor Statistics Menu. Use this command to view
information on how GbE2 Interconnect Switch management processes and resources
are currently being allocated.
acl
Displays the Access Control List Statistics Menu.
Displays SNMP statistics.
snmp
ntp <clear>
Displays Network Time Protocol (NTP) Statistics.
You can execute the clear command option to delete all statistics.
ufd <clear>
Displays Uplink Failure Detection statistics.
Add the argument, clear, to clear UFD statistics.
clrmp
dump
Clear all MP-related statistics.
Dumps all GbE2 Interconnect Switch statistics. Use this command to gather data for
tuning and debugging GbE2 Interconnect Switch performance. If you want to capture
dump data to a file, set your communication software on your workstation to capture
session data prior to issuing the dump command.
Statistics Menu 60
Port Statistics Menu
Command: /stats/port <port number>
[Port Statistics Menu]
8021x - Show 802.1x stats
brg - Show bridging ("dot1") stats
ether - Show Ethernet ("dot3") stats
if
ip
link
rmon
- Show interface ("if") stats
- Show Internet Protocol ("IP") stats
- Show link stats
- Show RMON stats
clear - Clear all port stats
This menu displays traffic statistics on a port-by-port basis.
The following table describes the Port Statistics Menu options:
Table 45 Port Statistics Menu options
Command
8021x
brg
Usage
Displays IEEE 802.1x statistics
Displays bridging (“dot1”) statistics for the port.
Displays Ethernet (“dot3”) statistics for the port.
Displays interface statistics for the port.
Displays Internet Protocol statistics for the port.
Displays link statistics for the port.
ether
if
ip
link
rmon
clear
Displays Remote Monitoring (RMON) statistics for the port.
Clears all the statistics on the port.
Statistics Menu 61
802.1x statistics
Command: /stats/port <port number>/8021x
Authenticator Statistics:
eapolFramesRx
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
eapolFramesTx
eapolStartFramesRx
eapolLogoffFramesRx
eapolRespIdFramesRx
eapolRespFramesRx
eapolReqIdFramesTx
eapolReqFramesTx
invalidEapolFramesRx = 0
eapLengthErrorFramesRx = 0
lastEapolFrameVersion = 0
lastEapolFrameSource = 00:00:00:00:00:00
Authenticator Diagnostics:
authEntersConnecting
authEapLogoffsWhileConnecting
authEntersAuthenticating
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
= 0
authSuccessesWhileAuthenticating
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
authEapStartsWhileAuthenticating
authEapLogoffWhileAuthenticating
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
backendAccessChallenges
backendOtherRequestsToSupplicant
backendNonNakResponsesFromSupplicant = 0
backendAuthSuccesses
backendAuthFails
= 0
= 0
The following table describes the 802.1x authenticator diagnostics for a selected port:
Table 46 802.1x statistics for port
Statistics
Description
Authenticator Diagnostics
authEntersConnecting
Total number of times that the state machine transitions to the
CONNECTING state from any other state.
authEapLogoffsWhileConnecting
authEntersAuthenticating
Total number of times that the state machine transitions from
CONNECTING to DISCONNECTED as a result of receiving an EAPOL-
Logoff message.
Total number of times that the state machine transitions from
CONNECTING to AUTHENTICATING, as a result of an EAPResponse/
Identity message being received from the Supplicant.
authSuccessesWhile
Authenticating
Total number of times that the state machine transitions from
AUTHENTICATING to AUTHENTICATED, as a result of the Backend
Authentication state machine indicating successful authentication of the
Supplicant.
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of the Backend
Authentication state machine indicating authentication timeout.
Total number of times that the state machine transitions from
AUTHENTICATING to HELD, as a result of the Backend Authentication
state machine indicating authentication failure.
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of a re-authentication
request
Statistics Menu 62
Table 46 802.1x statistics for port
Statistics
Description
authEapStartsWhileAuthenticating Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Start message
being received from the Supplicant.
authEapLogoffWhileAuthenticating Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Logoff
message being received from the Supplicant.
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of a re-authentication
request.
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of an EAPOL-Start
message being received from the Supplicant.
Total number of times that the state machine transitions from
AUTHENTICATED to DISCONNECTED, as a result of an EAPOLLogoff
message being received from the Supplicant.
Total number of times that the state machine sends an initial Access-
Request packet to the Authentication server. Indicates that the
Authenticator attempted communication with the Authentication Server.
backendAccessChallenges
Total number of times that the state machine receives an initial Access-
Challenge packet from the Authentication server. Indicates that the
Authentication Server has communication with the Authenticator.
backendOtherRequestsToSupplicant Total number of times that the state machine sends an EAP-Request packet
(other than an Identity, Notification, Failure, or Success message) to the
Supplicant. Indicates that the Authenticator chose an EAP-method.
backendNonNakResponsesFrom
Supplicant
Total number of times that the state machine receives a response from the
Supplicant to an initial EAP-Request, and the response is something other
than EAP-NAK. Indicates that the Supplicant can respond to the
Authenticators chosen EAP-method.
backendAuthSuccesses
backendAuthFails
Total number of times that the state machine receives an Accept message
from the Authentication Server. Indicates that the Supplicant has
successfully authenticated to the Authentication Server.
Total number of times that the state machine receives a Reject message
from the Authentication Server. Indicates that the Supplicant has not
authenticated to the Authentication Server.
Bridging statistics
Command: /stats/port <port number>/brg
Bridging statistics for port 1:
dot1PortInFrames:
dot1PortOutFrames:
63242584
63277826
dot1PortInDiscards:
dot1TpLearnedEntryDiscards:
dot1StpPortForwardTransitions:
0
0
0
Statistics Menu 63
The following table describes the bridging statistics for a selected port:
Table 47 Bridging statistics for port
Statistics
Description
dot1PortInFrames
The number of frames that have been received by this port from its segment.
A frame received on the interface corresponding to this port is counted by this
object, if and only if, it is for a protocol being processed by the local bridging
function, including bridge management frames.
dot1PortOutFrames
The number of frames that have been transmitted by this port to its segment.
A frame transmitted on the interface corresponding to this port is counted by
this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
dot1PortInDiscards
Count of valid frames received which were discarded (that is, filtered) by the
forwarding process.
dot1TpLearnedEntryDiscards
The total number of Forwarding Database entries, which have been or would
have been learned, but have been discarded due to a lack of space to store
them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is
regularly becoming full (a condition which has adverse performance effects
on the sub network).
If this counter has a significant value but is not presently increasing, it
indicates that the problem has been occurring but is not persistent.
dot1StpPortForwardTransitions The number of times this port has transitioned from the Learning state to the
Forwarding state.
Ethernet statistics
Command: /stats/port <port number>/ether
Ethernet statistics for port 1:
dot3StatsAlignmentErrors:
dot3StatsFCSErrors:
0
0
dot3StatsSingleCollisionFrames:
dot3StatsMultipleCollisionFrames:
dot3StatsLateCollisions:
dot3StatsExcessiveCollisions:
dot3StatsInternalMacTransmitErrors:
dot3StatsFrameTooLongs:
0
0
0
0
NA
0
dot3StatsInternalMacReceiveErrors:
0
The following table describes the Ethernet statistics for a selected port:
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsAlignmentErrors
A count of frames received on a particular interface that are not an
integral number of octets in length and do not pass the Frame Check
Sequence (FCS) check.
The count represented by an instance of this object is incremented when
the alignmentErrorstatus is returned by the MAC service to the
Logical Link Control (LLC) (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the LLC.
Statistics Menu 64
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsFCSErrors
A count of frames received on a particular interface that are an integral
number of octets in length but do not pass the Frame Check Sequence
(FCS) check.
The count represented by an instance of this object is incremented when
the frameCheckErrorstatus is returned by the MAC service to the
LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the LLC.
dot3StatsSingleCollisionFrames
dot3StatsMultipleCollisionFrames
dot3StatsLateCollisions
A count of successfully transmitted frames on a particular interface for
which transmission is inhibited by exactly one collision.
A frame that is counted by an instance of this object is also counted by
the corresponding instance of the ifOutUcastPkts, ifOutMulticastPkts, or
ifOutBroadcastPkts, and is not counted by the corresponding instance of
the dot3StatsMultipleCollisionFrame object.
A count of successfully transmitted frames on a particular interface for
which transmission is inhibited by more than one collision.
A frame that is counted by an instance of this object is also counted by
the corresponding instance of the ifOutUcastPkts, ifOutMulticastPkts, or
ifOutBroadcastPkts, and is not counted by the corresponding instance of
the dot3StatsSingleCollisionFrames object.
The number of times that a collision is detected on a particular interface
later than 512 bit-times into the transmission of a packet.
Five hundred and twelve bit-times corresponds to 51.2 microseconds on
a 10 Mbit/s system. A (late) collision included in a count represented
by an instance of this object is also considered as a (generic) collision
for purposes of other
collision-related statistics.
dot3StatsExcessiveCollisions
A count of frames for which transmission on a particular interface fails
due to excessive collisions.
dot3StatsInternalMacTransmitErrors A count of frames for which transmission on a particular interface fails
due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if it is not counted
by the corresponding instance of the dot3StatsLateCollisions object, the
dot3StatsExcessiveCollisions object, or the dot3StatsCarrierSenseErrors
object.
The precise meaning of the count represented by an instance of this
object is implementation specific. In particular, an instance of this object
may represent a count of transmission errors on a particular interface
that are not otherwise counted.
dot3StatsFrameTooLongs
A count of frames received on a particular interface that exceeds the
maximum permitted frame size.
The count represented by an instance of this object is incremented when
the frameTooLong status is returned by the MAC service to the LLC (or
other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the LLC.
dot3StatsInternalMacReceiveErrors
A count of frames for which reception on a particular interface fails due
to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if it is not counted
by the corresponding instance of the dot3StatsFrameTooLongs object,
the dot3StatsAlignmentErrors object, or the dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance of this
object is implementation specific. In particular, an instance of this object
may represent a count of received errors on a particular interface that
are not otherwise counted.
Statistics Menu 65
Interface statistics
Command: /stats/port <port number>/if
Interface statistics for port 1:
ifHCIn Counters
ifHCOut Counters
Octets:
51697080313
51721056808
UcastPkts:
BroadcastPkts:
MulticastPkts:
Discards:
65356399
65385714
0
0
0
0
6516
0
0
Errors:
21187
The following table describes the interface (IF) statistics for a selected port:
Table 49 Interface statistics for port
Statistics
Description
Octets—IfHCIn
UcastPkts—IfHCIn
The total number of octets received on the interface, including framing characters.
The number of packets, delivered by this sublayer to a higher sublayer, which
were not addressed to a multicast or broadcast address at this sublayer.
BroadcastPkts—IfHCIn
MulticastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which
were addressed to a broadcast address at this sublayer.
The total number of packets, delivered by this sublayer. These are the packets that
higher-level protocols requested to be transmitted, and which were addressed to a
multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
Discards—IfHCIn
Errors—IfHCIn
The number of inbound packets which were chosen to be discarded even though
no errors were detected to prevent their being delivered to a higher-layer
protocol. One possible reason for discarding such a packet could be to free up
buffer space.
For packet-oriented interfaces, the number of inbound packets that contained
errors preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound
transmission units that contained errors preventing them from being deliverable to
a higher-layer protocol.
Octets—IfHCOut
The total number of octets transmitted out of the interface, including framing
characters.
UcastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were not addressed to a multicast or broadcast address at this
sublayer, including those that were discarded or not sent.
BroadcastPkts—IfHCOut
MulticastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a broadcast address at this sublayer, including
those that were discarded or not sent. This object is a 64-bit version of
ifOutBroadcastPkts.
The total number of packets that higher-level protocols requested to be transmitted,
and which were addressed to a multicast address at this sublayer, including those
that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This
object is a 64-bit version of ifOutMulticastPkts.
Discards—IfHCOut
Errors—IfHCOut
The number of outbound packets that were chosen to be discarded even though
no errors had been detected to prevent their being transmitted. One possible
reason for discarding such a packet could be to free up buffer space.
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound
transmission units that could not be transmitted because of errors.
Statistics Menu 66
Internet Protocol (IP) statistics
Command: /stats/port <port number>/ip
GEA IP statistics for port 1:
ipInReceives :
ipInHeaderError:
ipInDiscards :
0
0
0
The following table describes the Internet Protocol (IP) statistics for a selected port:
Table 50 IP statistics for port
Statistics
Description
ipInReceives
ipInHeaderError
The total number of input datagrams received from interfaces, including those received in error.
The number of input datagrams discarded because the IP address in their IP header's destination
field was not a valid address to be received at this entity (the switch).
ipInDiscards
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (for example, for lack of buffer space). Note
that this counter does not include any datagrams discarded while awaiting re-assembly.
Link statistics
Command: /stats/port <port number>/link
Link statistics for port 1:
linkStateChange:
2
The following table describes the link statistics for a selected port:
Table 51 Link statistics for port
Statistic
Description
linkStateChange
The total number of link state changes.
Port RMON statistics
Command: /stats/port <port number>/rmon
RMON statistics for port 2:
etherStatsDropEvents:
etherStatsOctets:
NA
0
etherStatsPkts:
0
0
0
0
0
0
NA
0
etherStatsBroadcastPkts:
etherStatsMulticastPkts:
etherStatsCRCAlignErrors:
etherStatsUndersizePkts:
etherStatsOversizePkts:
etherStatsFragments:
etherStatsJabbers:
etherStatsCollisions:
0
0
0
0
0
0
0
etherStatsPkts64Octets:
etherStatsPkts65to127Octets:
etherStatsPkts128to255Octets:
etherStatsPkts256to511Octets:
etherStatsPkts64Octets:
etherStatsPkts1024to1518Octets:
Statistics Menu 67
The following table describes the Remote Monitoring (RMON) statistics of the selected port:
Table 52 RMON Statistics
Statistic
Description
etherStatsDropEvents
The total number of packets received that were dropped because of system
resource constraints.
etherStatsOctets
The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including FCS octets).
etherStatsPkts
The total number of packets (including bad packets, broadcast packets,
and multicast packets) received.
etherStatsBroadcastPkts
etherStatsMulticastPkts
etherStatsCRCAlignErrors
The total number of good packets received that were directed to the
broadcast address.
The total number of good packets received that were directed to a
multicast address.
The total number of packets received that had a length (excluding framing
bits, but including FCS octets) of between 64 and 1518 octets, inclusive,
but had either a bad Frame Check Sequence (FCS) with an integral
number of octets (FCS Error) or a bad FCS with a non-integral number of
octets (Alignment Error).
etherStatsUndersizePkts
etherStatsOversizePkts
etherStatsFragments
The total number of packets received that were less than 64 octets long
(excluding framing bits but including FCS octets) and were otherwise well
formed.
The total number of packets received that were longer than 1518 octets
(excluding framing bits but including FCS octets) and were otherwise well
formed.
The total number of packets received that were less than 64 octets in
length (excluding framing bits but including FCS octets) and had either a
bad Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets (Alignment Error).
etherStatsJabbers
The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error)
or a bad FCS with a non-integral number of octets (Alignment Error).
Jabber is defined as the condition where any packet exceeds 20 ms. The
allowed range to detect jabber is between 20 ms and 150 ms.
etherStatsCollisions
The best estimate of the total number of collisions on this Ethernet segment.
etherStatsPkts64
Octets
The total number of packets (including bad packets) received that were
less than or equal to 64 octets in length (excluding framing bits but
including FCS octets).
etherStatsPkts65to127
Octets
The total number of packets (including bad packets) received that were
greater than 64 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts128to255
Octets
The total number of packets (including bad packets) received that were
greater than 127 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts256to511
Octets
The total number of packets (including bad packets) received that were
greater than 255 octets in length (excluding framing bits but including
FCSoctets).
etherStatsPkts512to1023
Octets
The total number of packets (including bad packets) received that were
greater than 511 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts1024to1518
Octets
The total number of packets (including bad packets) received that were
greater than 1023 octets in length (excluding framing bits but including
FCS octets).
Statistics Menu 68
Layer 2 statistics
Command: /stats/l2
[Layer 2 Statistics Menu]
fdb
lacp
- Show FDB stats
- Show LACP stats
hotlink - Show Hot Links stats
The following table describes the Layer 2 statistics menu options.
Table 53 Layer 2 statistics menu options
Command
fdb
Usage
Displays the Forwarding Database statistics menu.
Displays the Link Aggregation Control Protocol statistics menu.
Displays Hot Links statistics.
lacp
hotlink
FDB statistics
Command: /stats/l2/fdb
This menu option enables you to display statistics regarding the use of the forwarding database, including the number
of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
Table 54 Forwarding Database statistics
Statistic
Description
current
hiwat
Current number of entries in the Forwarding Database.
Highest number of entries recorded at any given time in the Forwarding Database.
LACP statistics
Command: /stats/l2/lacp <port number>
Valid LACPDUs received
Valid Marker PDUs received
- 0
- 0
Valid Marker Rsp PDUs received - 0
Unknown version/TLV type
Illegal subtype received
LACPDUs transmitted
Marker PDUs transmitted
Marker Rsp PDUs transmitted
- 0
- 0
- 0
- 0
- 0
Statistics Menu 69
Hot Links statistics
Command: /stats/l2/hotlink
Hot Links Trigger Stats:
------------------------------------------------------------------
Trigger 1 statistics:
Trigger Name: Corporate Uplinks
Master active:
Backup active:
FDB update:
0
0
0 failed:
0
The following table describes the Hot Links statistics for each trigger:
Table 55 Hot Links trigger statistics
Statistics
Description
Master active
Backup active
FDB update
failed
Total number of times the Master interface transitioned to the Active state.
Total number of times the Backup interface transitioned to the Active state.
Total number of FDB update requests sent.
Total number of FDB update requests that failed.
Layer 3 statistics
Command: /stats/l3
[Layer 3 Statistics Menu]
geal3
ip
- GEA Layer 3 Stats Menu
- Show IP stats
route
arp
dns
icmp
tcp
udp
igmp
ospf
vrrp
rip
- Show route stats
- Show ARP stats
- Show DNS stats
- Show ICMP stats
- Show TCP stats
- Show UDP stats
- Show IGMP stats
- OSPF stats
- Show VRRP stats
- Show RIP stats
clrigmp - Clear IGMP stats
ipclear - Clear IP stats
geal3
dump
-
- Dump layer 3 stats
The following table describes the Layer 3 statistics menu options.
Table 56 Layer 3 statistics menu options
Command
geal3
Usage
Displays the GEA statistics menu.
Displays IP statistics.
Displays route statistics.
ip
route
arp <clear>
Displays Address Resolution Protocol (ARP) statistics. Add the argument, clear, to
clear ARP statistics.
dns
Displays Domain Name System (DNS) statistics.
Displays ICMP statistics.
icmp
Statistics Menu 70
Table 56 Layer 3 statistics menu options
Command
Usage
tcp
Displays Transmission Control Protocol (TCP) statistics. Add the argument, clear, to
clear TCP statistics.
udp
Displays User Datagram Protocol (UDP) statistics. Add the argument, clear, to clear
UDP statistics.
igmp
ospf
vrrp
Displays IGMP statistics.
Displays OSPF statistics menu.
When virtual routers are configured, you can display the following
•
•
•
Advertisements received (vrrpInAdvers)
Advertisements transmitted (vrrpOutAdvers)
Advertisements received, but ignored (vrrpBadAdvers)
rip
Displays Routing Information Protocol (RIP) statistics
Clears all IGMP statistics for the selected VLANs.
Clears IP statistics. Use this command with caution as it will delete all the IP statistics.
Displays all Layer 3 statistics.
clrigmp <1-4095>|all
ipclear
dump
GEA Layer 3 statistics menu
Command: /stats/l3/geal3
[GEA Layer 3 Statistics Menu]
l3bucket - Show GEA L3 bucket for an IP address
dump - Dump GEA layer 3 stats counter
The following table describes the Layer 3 GEA statistics menu options.
Table 57 Layer 3 GEA statistics menu options
Command
l3bucket
dump
Usage
Displays GEA statistics for a specific IP address.
Displays all GEA statistics.
GEA Layer 3 statistics
Command: /stats/l3/geal3/dump
GEA L3 statistics:
Max L3 table size
: 4096
: 9
Number of L3 entries used
Max LPM table size
Number of LPM entries used
Max block in LPM table
: 4097
: 31
: 255
Number of blocks used in LPM table: 24
IP statistics
Command: /stats/l3/ip
IP statistics:
ipInReceives: 36475
ipInAddrErrors: 905
ipInUnknownProtos: 0
ipInDelivers: 4103
ipOutDiscards: 0
ipDefaultTTL: 255
ipInHdrErrors: 0
ipInDiscards: 0
ipOutRequests: 30974
The following table describes the IP statistics:
Statistics Menu 71
Table 58 IP statistics
Statistics
Description
ipInReceives
The total number of input datagrams received from interfaces, including those received in
error.
ipInHdrErrors
ipInAddrErrors
The number of input datagrams discarded due to errors in their IP headers, including bad
checksums, version number mismatch, other format errors, time-to-live exceeded, errors
discovered in processing their IP options, and so on.
The number of input datagrams discarded because the IP address in their IP header destination
field was not a valid address to be received at this GbE2 Interconnect Switch. This count
includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported classes (for
example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this counter
includes datagrams discarded because the destination address was not a local address.
ipInUnknownProtos
ipInDiscards
The number of locally addressed datagrams received successfully but discarded because of an
unknown or unsupported protocol.
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (for example, for lack of buffer space).
This counter does not include any datagrams discarded while awaiting re-assembly.
ipInDelivers
ipOutRequests
The total number of input datagrams successfully delivered to IP user-protocols (including
ICMP).
The total number of IP datagrams that local IP user-protocols (including ICMP) supplied to IP in
requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
ipOutDiscards
ipDefaultTTL
The number of output IP datagrams for which no problem was encountered to prevent their
transmission to their destination, but which were discarded (for example, for lack of buffer
space).
This counter would include datagrams counted in ipForwDatagrams if any such packets met
this (discretionary) discard criterion.
The default value inserted into the Time-To-Live (TTL) field of the IP header of datagrams
originated at this GbE2 Interconnect Switch, whenever a TTL value is not supplied by the
transport layer protocol.
Route statistics
Command: /stats/l3/route
Route statistics:
ipRoutesCur:
ipRoutesMax:
7 ipRoutesHighWater:
4096
7
The following table describes the Route statistics:
Table 59 Route statistics
Statistics
Description
ipRoutesCur
ipRoutesMax
ipRoutesHighWater
The total number of outstanding routes in the route table.
The maximum number of supported routes.
The highest number of routes ever recorded in the route table.
Statistics Menu 72
ARP statistics
Command: /stats/l3/arp
ARP statistics:
arpEntriesCur:
2 arpEntriesHighWater:
4
The following table describes the Address Resolution Protocol (ARP) statistics:
Table 60 ARP statistics
Statistic
Description
arpEntriesCur
arpEntriesHighWater
The total number of outstanding ARP entries in the ARP table.
The highest number of ARP entries ever recorded in the ARP table.
DNS statistics
Command: /stats/l3/dns
DNS statistics:
dnsInRequests:
dnsBadRequests:
0 dnsOutRequests:
0
0
The following table describes the Domain Name System (DNS) statistics:
Table 61 DNS statistics
Statistic
Description
dnsInRequests
dnsOutRequests
dnsBadRequests
The total number of DNS request packets that have been received.
The total number of DNS response packets that have been transmitted.
The total number of DNS request packets received that were dropped.
ICMP statistics
Command: /stats/l3/icmp
ICMP statistics:
icmpInMsgs:
245802 icmpInErrors:
41 icmpInTimeExcds:
0 icmpInSrcQuenchs:
0 icmpInEchos:
244350 icmpInTimestamps:
0 icmpInAddrMasks:
0 icmpOutMsgs:
0 icmpOutDestUnreachs:
0 icmpOutParmProbs:
0 icmpOutRedirects:
253777 icmpOutEchoReps:
0 icmpOutTimestampReps:
0 icmpOutAddrMaskReps:
1393
icmpInDestUnreachs:
icmpInParmProbs:
icmpInRedirects:
icmpInEchoReps:
icmpInTimestampReps:
icmpInAddrMaskReps:
icmpOutErrors:
icmpOutTimeExcds:
icmpOutSrcQuenchs:
icmpOutEchos:
0
0
18
0
0
253810
15
0
0
18
0
0
icmpOutTimestamps:
icmpOutAddrMasks:
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
Table 62 ICMP statistics
Statistics
Description
icmpInMsgs
The total number of ICMP messages which the GbE2 Interconnect Switch received.
Note that this counter includes all those counted by icmpInErrors.
icmpInErrors
The number of ICMP messages which the GbE2 Interconnect Switch received but
determined as having ICMP specific errors (for example bad ICMP checksums and
bad length).
icmpInDestUnreachs
icmpInTimeExcds
The number of ICMP Destination Unreachable messages received.
The number of ICMP Time Exceeded messages received.
Statistics Menu 73
Table 62 ICMP statistics
Statistics
Description
icmpInParmProbs
icmpInSrcQuenchs
The number of ICMP Parameter Problem messages received.
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages received.
icmpInRedirects
icmpInEchos
The number of ICMP Redirect messages received.
The number of ICMP Echo (request) messages received.
The number of ICMP Echo Reply messages received.
The number of ICMP Timestamp (request) messages received.
The number of ICMP Timestamp Reply messages received.
The number of ICMP Address Mask Request messages received.
The number of ICMP Address Mask Reply messages received.
icmpInEchoReps
icmpInTimestamps
icmpInTimestampReps
icmpInAddrMasks
icmpInAddrMaskReps
icmpOutMsgs
The total number of ICMP messages which this GbE2 Interconnect Switch
attempted to send. Note that this counter includes all those counted by
icmpOutErrors.
icmpOutErrors
The number of ICMP messages that this GbE2 Interconnect Switch did not send
due to problems discovered within ICMP such as a lack of buffer. This value
should not include errors discovered outside the ICMP layer such as the inability of
IP to route the resultant datagram. In some implementations there may be no types
of errors that contribute to this counter's value.
icmpOutDestUnreachs
icmpOutTimeExcds
icmpOutParmProbs
icmpOutSrcQuenchs
The number of ICMP Destination Unreachable messages sent.
The number of ICMP Time Exceeded messages sent.
The number of ICMP Parameter Problem messages sent.
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages sent.
icmpOutRedirects
icmpOutEchos
The number of ICMP Redirect messages sent.
The number of ICMP Echo (request) messages sent.
The number of ICMP Echo Reply messages sent.
icmpOutEchoReps
icmpOutTimestamps
icmpOutTimestampReps
icmpOutAddrMasks
icmpOutAddrMaskReps
The number of ICMP Timestamp (request) messages sent.
The number of ICMP Timestamp Reply messages sent.
The number of ICMP Address Mask Request messages sent.
The number of ICMP Address Mask Reply messages sent.
Statistics Menu 74
TCP statistics
Command: /stats/l3/tcp
TCP statistics:
tcpRtoAlgorithm:
tcpRtoMax:
tcpActiveOpens:
tcpAttemptFails:
tcpInSegs:
4 tcpRtoMin:
240000 tcpMaxConn:
252214 tcpPassiveOpens:
528 tcpEstabResets:
756401 tcpOutSegs:
0 tcpInErrs:
0
512
7
4
756655
tcpRetransSegs:
tcpCurBuff:
0
3
0 tcpCurConn:
tcpOutRsts:
417
The following table describes the Transmission Control Protocol (TCP) statistics:
Table 63 TCP statistics
Statistics
Description
tcpRtoAlgorithm
The algorithm used to determine the timeout value used for retransmitting
unacknowledged octets.
tcpRtoMin
tcpRtoMax
tcpMaxConn
The minimum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon
the algorithm used to determine the retransmission timeout. In particular, when the
timeout algorithm is rsre(3), an object of this type has the semantics of the LBOUND
quantity described in Request For Comments (RFC) 793.
The maximum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon
the algorithm used to determine the retransmission timeout. In particular, when the
timeout algorithm is rsre(3), an object of this type has the semantics of the UBOUND
quantity described in RFC 793.
The limit on the total number of TCP connections the GbE2 Interconnect Switch can
support. In entities where the maximum number of connections is dynamic, this object
should contain the value -1.
tcpActiveOpens
tcpPassiveOpens
tcpAttemptFails
The number of times TCP connections have made a direct transition to the SYN-SENT
state from the CLOSED state.
The number of times TCP connections have made a direct transition to the SYN-RCVD
state from the LISTEN state.
The number of times TCP connections have made a direct transition to the CLOSED state
from either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP
connections have made a direct transition to the LISTEN state from the SYN-RCVD state.
tcpEstabResets
tcpInSegs
The number of times TCP connections have made a direct transition to the CLOSED state
from either the ESTABLISHED state or the CLOSE- WAIT state.
The total number of segments received, including those received in error. This count
includes segments received on currently established connections.
tcpOutSegs
The total number of segments sent, including those on current connections but excluding
those containing only retransmitted octets.
tcpRetransSegs
The total number of segments retransmitted, that is, the number of TCP segments
transmitted containing one or more previously transmitted octets.
tcpInErrs
tcpCurBuff
tcpCurConn
tcpOutRsts
The total number of segments received in error (for example, bad TCP checksums).
The total number of outstanding memory allocations from heap by TCP protocol stack.
The total number of outstanding TCP sessions that are currently opened.
The number of TCP segments sent containing the reset (RST) flag.
Statistics Menu 75
UDP statistics
Command: /stats/l3/udp
UDP statistics:
udpInDatagrams:
udpInErrors:
54 udpOutDatagrams:
0 udpNoPorts:
43
1578077
The following table describes the User Datagram Protocol (UDP) statistics:
Table 64 UDP statistics
Statistics
Description
udpInDatagrams
udpOutDatagrams
udpInErrors
The total number of UDP datagrams delivered to the GbE2 Interconnect Switch.
The total number of UDP datagrams sent from this GbE2 Interconnect Switch.
The number of received UDP datagrams that could not be delivered for reasons other than the
lack of an application at the destination port.
udpNoPorts
The total number of received UDP datagrams for which there was no application at the
destination port.
IGMP Multicast Group statistics
Command: /stats/l3/igmp
Enter VLAN number: (1-4095) 1
------------------------------------------------------------
IGMP Snoop vlan 1 statistics:
------------------------------------------------------------
rxIgmpValidPkts:
rxIgmpGenQueries:
rxIgmpLeaves:
txIgmpReports:
txIgmpLeaves:
0
0
0
0
0
rxIgmpInvalidPkts:
rxIgmpGrpSpecificQueries:
rxIgmpReports:
0
0
0
0
txIgmpGrpSpecificQueries:
This menu option enables you to display statistics regarding the use of the IGMP Multicast Groups.
The following table describes the IGMP statistics:
Table 65 IGMP statistics
Statistic
Description
rxIgmpValidPkts
rxIgmpInvalidPkts
rxIgmpGenQueries
Total number of valid IGMP packets received
Total number of invalid packets received
Total number of General Membership Query packets received
rxIgmpGrpSpecificQueries Total number of Membership Query packets received from specific groups
rxIgmpLeaves
rxIgmpReports
txIgmpReports
Total number of Leave requests received
Total number of Membership Reports received
Total number of Membership reports transmitted
txIgmpGrpSpecificQueries Total number of Membership Query packets transmitted to specific groups
txIgmpLeaves
Total number of Leave messages transmitted
Statistics Menu 76
OSPF statistics menu
Command: /stats/l3/ospf
[OSPF stats Menu]
general - Show global stats
aindex - Show area(s) stats
if - Show interface(s) stats
The following table describes the OSPF statistics menu options.
Table 66 OSPF statistics menu options
Command
Usage
general
Displays global statistics.
Displays area index statistics.
Displays interface statistics.
aindex <0-2>
if <1-255>
OSPF global statistics
Command: /stats/l3/ospf/general
OSPF stats
----------
Rx/Tx Stats:
Rx
--------
Tx
--------
Pkts
hello
database
ls requests
ls acks
0
23
4
3
7
0
518
12
1
7
ls updates
Nbr change stats:
hello
9
7
Intf change Stats:
up 4
2
0
2
2
2
2
0
0
2
0
0
1
start
n2way
down 2
loop 0
unloop 0
wait timer 2
backup 0
nbr change 5
adjoint ok
negotiation done
exchange done
bad requests
bad sequence
loading done
n1way
rst_ad
down
Timers kickoff
hello
514
1028
retransmit
lsa lock
lsa ack
dbage
summary
0
0
0
0
0
ase export
The following table describes the OSPF global statistics:
Table 67 OSPF global statistics
Statistic
Description
Rx Tx stats:
Rx Pkts
The sum total of all OSPF packets received on all OSPF areas and interfaces.
The sum total of all OSPF packets transmitted on all OSPF areas and interfaces.
The sum total of all Hello packets received on all OSPF areas and interfaces.
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.
Tx Pkts
Rx Hello
Tx Hello
Rx Database
The sum total of all Database Description packets received on all OSPF areas and
interfaces.
Statistics Menu 77
Table 67 OSPF global statistics
Statistic
Description
Tx Database
The sum total of all Database Description packets transmitted on all OSPF areas and
interfaces.
Rx ls Requests
The sum total of all Link State Request packets received on all OSPF
areas and interfaces.
Tx ls Requests
Rx ls Acks
The sum total of all Link State Request packets transmitted on all OSPF areas and interfaces.
The sum total of all Link State Acknowledgement packets received on all OSPF areas and
interfaces.
Tx ls Acks
The sum total of all Link State Acknowledgement packets transmitted on all OSPF areas and
interfaces.
Rx ls Updates
Tx ls Updates
Nbr change stats:
hello
The sum total of all Link State Update packets received on all OSPF areas and interfaces.
The sum total of all Link State Update packets transmitted on all OSPF areas and interfaces.
The sum total of all Hello packets received from neighbors on all OSPF areas and interfaces.
Start
The sum total number of neighbors in this state (that is, an indication that Hello packets
should now be sent to the neighbor at intervals of HelloIntervalseconds) across all
OSPF areas and interfaces.
n2way
The sum total number of bidirectional communication establishment between this router and
other neighboring routers.
adjoint ok
negotiation done
The sum total number of decisions to be made (again) as to whether an adjacency should
be established/maintained with the neighbor across all OSPF areas and interfaces.
The sum total number of neighbors in this state wherein the Master/slave relationship has
been negotiated, and sequence numbers have been exchanged, across all OSPF areas and
interfaces.
exchange done
The sum total number of neighbors in this state (that is, in an adjacency's final state) having
transmitted a full sequence of Database Description packets, across all OSPF areas and
interfaces.
bad requests
bad sequence
The sum total number of Link State Requests which have been received for a link state
advertisement not contained in the database across all interfaces and OSPF areas.
The sum total number of Database Description packets which have been received that
either:
•
•
•
Has an unexpected DD sequence number
Unexpectedly has the init bit set
Has an options field differing from the last Options field received in a Database
Description packet.
Any of these conditions indicate that some error has occurred during adjacency
establishment for all OSPF areas and interfaces.
loading done
n1way
The sum total number of link state updates received for all out-of-date portions of the
database across all OSPF areas and interfaces.
The sum total number of Hello packets received from neighbors, in which this router is not
mentioned across all OSPF interfaces and areas.
rst_ad
The sum total number of times the Neighbor adjacency has been reset across all OPSF
areas and interfaces.
down
The total number of Neighboring routers down (that is, in the initial state of a neighbor
conversation) across all OSPF areas and interfaces.
Intf Change Stats:
up
The sum total number of interfaces up in all OSPF areas.
The sum total number of interfaces down in all OSPF areas.
down
loop
The sum total of interfaces no longer connected to the attached network across all OSPF
areas and interfaces.
Statistics Menu 78
Table 67 OSPF global statistics
Statistic
Description
unloop
The sum total number of interfaces, connected to the attached network in all OSPF areas.
wait timer
The sum total number of times the Wait Timer has been fired, indicating the end of the
waiting period that is required before electing a (Backup) Designated Router across all
OSPF areas and interfaces.
backup
The sum total number of Backup Designated Routers on the attached network for all OSPF
areas and interfaces.
nbr change
The sum total number of changes in the set of bidirectional neighbors associated with any
interface across all OSPF areas.
Timers Kickoff:
hello
The sum total number of times the Hello timer has been fired (which triggers the send of a
Hello packet) across all OPSF areas and interfaces.
retransmit
lsa lock
lsa ack
The sum total number of times the Retransmit timer has been fired across all OPSF areas and
interfaces.
The sum total number of times the Link State Advertisement (LSA) lock timer has been fired
across all OSPF areas and interfaces.
The sum total number of times the LSA Ack timer has been fired across all OSPF areas and
interfaces.
dbage
The total number of times the data base age (Dbage) has been fired.
The total number of times the Summary timer has been fired.
summary
ase export
The total number of times the Autonomous System Export (ASE) timer has been fired.
VRRP statistics
Virtual Router Redundancy Protocol (VRRP) support on the GbE2 Interconnect Switch provides redundancy between
routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each
participating VRRP-capable routing device.
One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of
the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority
and take control of the virtual router IP address.
When virtual routers are configured, you can display the following protocol statistics for VRRP:
•
•
•
Advertisements received (vrrpInAdvers)
Advertisements transmitted (vrrpOutAdvers)
Advertisements received, but ignored (vrrpBadAdvers)
Command: /stats/l3/vrrp
>> Layer 3 Statistics# vrrp
VRRP statistics:
vrrpInAdvers:
vrrpOutAdvers:
vrrpBadVersion:
vrrpBadAddress:
vrrpBadPassword:
0 vrrpBadAdvers:
0
0 vrrpBadVrid:
0 vrrpBadData:
0 vrrpBadInterval:
0
0
0
0
Statistics Menu 79
The following table describes the VRRP statistics.
Table 68 VRRP statistics
Field
Description
vrrpInAdvers
vrrpOutAdvers
vrrpBadVersion
vrrpBadAddress
vrrpBadPassword
vrrpBadAdvers
vrrpBadVrid
vrrpBadData
vrrpBadInterval
The total number of VRRP advertisements that have been received.
The total number of VRRP advertisements that have been sent.
The total number of VRRP advertisements that had a bad version number.
The total number of VRRP advertisements that had a bad address.
The total number of VRRP advertisements that had a bad password.
The total number of VRRP advertisements received that were dropped.
The total number of VRRP advertisements that had a bad virtual router ID.
The total number of VRRP advertisements that had bad data.
The total number of VRRP advertisements that had a bad interval.
RIP statistics
Command: /stats/l3/rip
RIP ALL STATS INFORMATION:
RIP packets received = 12
RIP packets sent = 75
RIP request received = 0
RIP response received = 12
RIP request sent = 3
RIP response sent = 72
RIP route timeout = 0
RIP bad size packet received = 0
RIP bad version received = 0
RIP bad zeros received = 0
RIP bad src port received = 0
RIP bad src IP received = 0
RIP packets from self received = 0
Management Processor statistics
Command: /stats/mp
[MP-specific Statistics Menu]
tcb
ucb
cpu
- Show All TCP control blocks in use
- Show All UDP control blocks in use
- Show CPU utilization
The following table describes the MP-specific Statistics Menu options:
Table 69 MP-specific Statistics Menu
Command
tcb
Usage
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use.
Displays CPU utilization for periods of up to 1, 4, and 64 seconds.
ucb
cpu
Statistics Menu 80
TCP statistics
Command: /stats/mp/tcb
All TCP allocated control blocks:
10ad41e8: 0.0.0.0
0 <=> 0.0.0.0
80 listen
10ad5790: 47.81.27.5
1171 <=> 47.80.23.243
23 established
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown in this
example:
Table 70 MP specified TCP statistics
Description
Memory
Example statistic
10ad41e8/10ad5790
0.0.0.0/47.81.27.5
0/1171
Destination IP address
Destination port
Source IP
0.0.0.0/47.80.23.243
80/23
Source port
State
listen/established
UDP statistics
Command: /stats/mp/ucb
All UDP allocated control blocks:
161: listen
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in this example:
Table 71 UDP statistics
Description
Control block
State
Example Statistic
161
listen
CPU statistics
Command: /stats/mp/cpu
CPU utilization:
cpuUtil1Second:
cpuUtil4Seconds:
cpuUtil64Seconds:
8%
9%
8%
The following table describes the management port CPU utilization statistics:
Table 72 CPU statistics
Statistics
Description
cpuUtil1Second
cpuUtil4Seconds
cpuUtil64Seconds
The utilization of MP CPU over 1 second. This is shown as a percentage.
The utilization of MP CPU over 4 seconds. This is shown as a percentage.
The utilization of MP CPU over 64 seconds. This is shown as a percentage.
Statistics Menu 81
Access Control List (ACL) statistics menu
Command: /stats/acl
[ACL Menu]
acl
- Display ACL stats
meter
dump
- Display ACL metering stats
- Display all available ACL stats
clracl - Clear ACL stats
clrmeter - Clear ACL metering stats
The following table describes the Access Control List (ACL) Statistics menu options:
Table 73 ACL statistics menu options
Command
Usage
acl <1-4096>
meter <1-63>
dump
Displays the Access Control List Statistics for a specific ACL.
Displays statistics for a specific ACL Meter.
Displays all ACL statistics.
clracl
Clear all ACL statistics.
clrmeter
Clears all ACL metering statistics.
ACL statistics
Command: /stats/acl/acl <1-4096>
Hits for ACL 1, port 20: 26057515
Hits for ACL 2, port 21: 26057497
ACL meter statistics
Command: /stats/acl/meter <1-63>
Meters for ACL Group 1, Port 22: Out of profile: 0
Meters for ACL Group 2, Port 23: Out of profile: 0
SNMP statistics
Command: /stats/snmp
SNMP statistics:
snmpInPkts:
snmpInBadC'tyNames:
snmpInASNParseErrs:
snmpOutPkts:
snmpInTooBigs:
snmpInBadValues:
snmpInGenErrs:
snmpInTotalSetVars:
snmpInGetNexts:
snmpInGetResponses:
snmpOutTooBigs:
snmpOutBadValues:
snmpOutGenErrs:
snmpOutGetNexts:
snmpOutGetResponses:
snmpSilentDrops:
54 snmpInBadVersions:
0 snmpInBadC'tyUses:
0 snmpEnableAuthTraps:
54 snmpInBadTypes:
0 snmpInNoSuchNames:
0 snmpInReadOnlys:
0 snmpInTotalReqVars:
0 snmpInGetRequests:
52 snmpInSetRequests:
0 snmpInTraps:
0 snmpOutNoSuchNames:
0 snmpOutReadOnlys:
0 snmpOutGetRequests:
0 snmpOutSetRequests:
54 snmpOutTraps:
0
0
0
0
0
0
105
2
0
0
2
0
0
0
0
0 snmpProxyDrops:
0
Statistics Menu 82
The following table describes the Simple Network Management Protocol (SNMP) statistics:
Table 74 SNMP statistics
Statistics
Description
snmpInPkts
The total number of messages delivered to the SNMP entity from the transport
service.
snmpInBadVersions
snmpInBadC'tyNames
snmpInBadC'tyUses
The total number of SNMP messages, which were delivered to the SNMP protocol
entity and were for an unsupported SNMP version.
The total number of SNMP messages delivered to the SNMP entity that used an
SNMP community name not known to the GbE2 Interconnect Switch.
The total number of SNMP messages delivered to the SNMP protocol entity that
represented an SNMP operation which was not allowed by the SNMP community
named in the message.
snmpInASNParseErrs
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic Encoding
Rules), errors encountered by the SNMP protocol entity when decoding SNMP
messages received.
The Open Systems Interconnection (OSI) method of specifying abstract objects is
called ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of
rules for representing such objects as strings of ones and zeros is called the BER
(Basic Encoding Rules, defined in X.209).
ASN.1 is a flexible notation that allows one to define a variety of data types, from
simple types such as integers and bit strings to structured types such as sets and
sequences.
BER describes how to represent or encode values of each ASN.1 type as a string of
eight-bit octets.
snmpEnableAuthTraps
snmpOutPkts
An object to enable or disable the authentication traps generated by this GbE2
Interconnect Switch.
The total number of SNMP messages which were passed from the SNMP protocol
entity to the transport service.
snmpInBadTypes
snmpInTooBigs
The total number of SNMP messages which failed ASN.1 parsing.
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is too big.
snmpInNoSuchNames
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is
noSuchName.
snmpInBadValues
snmpInReadOnlys
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is badValue.
The total number of valid SNMP Protocol Data Units (PDUs), which were delivered
to the SNMP protocol entity and for which the value of the error-status field is read-
only.
It should be noted that it is a protocol error to generate an SNMP PDU, which
contains the value read-only in the error-status field. As such, this object is provided
as a means of detecting incorrect implementations of the SNMP.
snmpInGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were delivered to the
SNMP protocol entity and for which the value of the error-status field is genErr.
snmpInTotalReqVars
The total number of MIB objects which have been retrieved successfully by the
SNMP protocol entity as a result of receiving valid SNMP Get-Request and Get-Next
Protocol Data Units (PDUs).
snmpInTotalSetVars
The total number of MIB objects, which have been altered successfully by the SNMP
protocol entity as a result of receiving valid SNMP Set-Request Protocol Data Units
(PDUs).
snmpInGetRequests
snmpInGetNexts
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
Statistics Menu 83
Table 74 SNMP statistics
Statistics
Description
snmpInSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInGetResponses
snmpInTraps
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpOutTooBigs
snmpOutNoSuchNames
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is too big.
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status is
noSuchName.
snmpOutBadValues
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is
badValue.
snmpOutReadOnlys
snmpOutGenErrs
Not in use.
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is genErr.
snmpOutGetRequests
snmpOutGetNexts
snmpOutSetRequests
snmpOutGetResponses
snmpOutTraps
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpSilentDrops
The total number of GetRequest-PDUs, GetNextRequest-PDUs,GetBulkRequest-PDUs,
SetRequest-PDUs, and InformRequest-PDUs delivered to the SNMP entity which were
silently dropped because the size of a reply containing an alternate Response-PDU
with an empty variable-bindings field was too large.
snmpProxyDrops
The total number of GetRequest-PDUs, GetNextRequest-PDUs,GetBulkRequest-PDUs,
SetRequest-PDUs, and InformRequest-PDUs delivered to the SNMP entity which were
silently dropped because the transmission of the message to a proxy target failed in
a manner (other than a time-out) such that no Response-PDU could be returned.
NTP statistics
Command: /stats/ntp
NTP statistics:
Primary Server:
Requests Sent:
Responses Received:
Updates:
17
17
1
Secondary Server:
Requests Sent:
Responses Received:
Updates:
0
0
0
Last update based on response from primary server.
Last update time: 18:04:16 Tue Feb 27, 2007
Current system time: 18:55:49 Tue Feb 27, 2007
The GbE2 Interconnect Switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch’s internal clock
with an atomic time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock to
be consistent with other devices on the network and generates accurate syslogs.
Statistics Menu 84
The following table describes the NTP statistics:
Table 75 NTP statistics
Statistics
Description
Primary Server
Requests Sent: The total number of NTP requests the switch sent to the primary NTP
server to synchronize time.
Responses Received: The total number of NTP responses received from the primary
NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the primary NTP server.
Secondary Server
Requests Sent: The total number of NTP requests the switch sent to the secondary NTP
server to synchronize time.
Responses Received: The total number of NTP responses received from the secondary
NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the secondary NTP server.
Last update based on
response from primary
server
Last update of time on the switch based on either primary or secondary NTP response
received.
Last update time
The time stamp showing the time when the switch was last updated.
Current system time
The switch system time when the command /stats/ntpwas issued.
Link statistics
Command: /stats/port <port number>/link
Link statistics for port 1:
linkStateChange:
1
The following table describes the link statistics for a port:
Table 76 Link statistics
Statistics
Description
linkStateChange
The total number of link state changes.
DNS statistics
This menu option enables you to display Domain Name system statistics.
Command: /stats/dns
DNS statistics:
dnsInRequests:
dnsBadRequests:
0 dnsOutRequests:
0
0
The following table describes the Domain Name System (DNS) statistics:
Table 77 DNS statistics
Statistic
Description
dnsInRequests
dnsOutRequests
dnsBadRequests
The total number of DNS request packets that have been received.
The total number of DNS response packets that have been transmitted.
The total number of DNS request packets received that were dropped.
Statistics Menu 85
Uplink Failure Detection statistics
This menu option allows you to display Uplink Failure Detection (UFD) statistics. To reset UFD statistics, follow the
command /cfg/ufdwith the following argument: clear.
Command: /stats/ufd
Uplink Failure Detection statistics:
Number of times LtM link failure: 1
Number of times LtM link in Blocking State: 0
Number of times LtD got auto disabled: 1
The following table describes the Uplink Failure Detection (UFD) statistics:
Table 78 Uplink Failure Detection statistics
Statistic
Description
Number of times LtM link failure
The total numbers of times that link failures were detected on the
uplink ports in the Link to Monitor group.
Number of times LtM link in Blocking The total number of times that Spanning Tree Blocking state was
State
detected on the uplink ports in the Link to Monitor group.
Number of times LtD got auto
disabled
The total numbers of times that downlink ports in the Link to Disable
group were automatically disabled because of a failure in the Link
to Monitor group.
Statistics dump
Command: /stats/dump
Use the dump command to dump all GbE2 Interconnect Switch statistics available from the Statistics Menu (40K or
more, depending on your configuration). This data can be used to tune or debug GbE2 Interconnect Switch
performance.
If you want to capture dump data to a file, set your communication software on your workstation to capture session
data prior to issuing the dump commands.
Statistics Menu 86
Configuration Menu
Introduction
The Configuration Menu is only available from an administrator login. It includes submenus for configuring every
aspect of the GbE2 Interconnect Switch. Changes to configuration are not active until explicitly applied. Changes can
be saved to non-volatile memory (NVRAM).
Menu information
Command: /cfg
[Configuration Menu]
sys
port
l2
- System-wide Parameter Menu
- Port Menu
- Layer 2 Menu
l3
qos
- Layer 3 Menu
- QOS Menu
acl
- Access Control List Menu
- RMON Menu
- Port Mirroring Menu
- Uplink Failure Detection Menu
- Dump current configuration to script file
- Backup current configuration to FTP/TFTP server
- Restore current configuration from FTP/TFTP server
- Display current configuration
rmon
pmirr
ufd
dump
ptcfg
gtcfg
cur
The following table describes the Configuration Menu options.
Table 79 Configuration Menu options
Command
Usage
sys
Displays the System Configuration Menu.
Displays the Port Configuration Menu.
port <port number>
l2
Displays the Layer 2 Configuration Menu.
Displays the Layer 3 Configuration Menu.
Displays the Quality of Service Configuration Menu.
Displays the Access Control List Configuration Menu.
Displays the RMON Configuration Menu.
Displays the Mirroring Configuration Menu.
Displays the Uplink Failure Detection Configuration Menu.
Dumps current configuration to a script file.
Backs up current configuration to TFTP server.
l3
qos
acl
rmon
pmirr
ufd
dump
ptcfg <host name or IP address of TFTP
server> <filename on host>
gtcfg <host name or IP address of TFTP
server> <filename on host>
Restores current configuration from TFTP server.
cur
Displays current configuration parameters of the GbE2.
Configuration Menu 87
Viewing, applying, reverting, and saving changes
As you use the configuration menus to set GbE2 Interconnect Switch parameters, the changes you make do not take
effect immediately. All changes are considered pending until you explicitly apply them. Also, any changes are lost the
next time the GbE2 Interconnect Switch boots unless the changes are explicitly saved.
While configuration changes are in the pending state, you can:
•
•
•
•
View the pending changes
Apply the pending changes
Revert to restore configuration parameters set with the last apply command
Save the changes to flash memory
Viewing pending changes
You can view all pending configuration changes by entering diffat any CLI prompt:
# diff
You can view all pending configuration changes that have been applied but not saved to flash memory by entering
diff flashat any CLI prompt:
# diff flash
Applying pending changes
To make your configuration changes active, you must apply them. To apply configuration changes, enter the
following command at any prompt:
# apply
NOTE: All configuration changes take effect immediately when applied.
Reverting changes
The revert command removes configuration changes that have been made, but not applied. Enter revert apply to
remove all changes that have not been saved:
# revert
Saving the configuration
In addition to applying the configuration changes, you can save them to flash memory on the GbE2 Interconnect
Switch.
IMPORTANT: If you do not save the changes, they will be lost the next time the system is rebooted.
To save the new configuration, enter the following command at any prompt:
# save
When you save configuration changes, the changes are saved to the active configuration block. The configuration
being replaced by the save is first copied to the backup configuration block. If you do not want the previous
configuration block copied to the backup configuration block, enter the following instead:
# save n
Configuration Menu 88
You can decide which configuration you want to run the next time you reset the GbE2 Interconnect Switch. Your
options include:
•
•
•
The active configuration block
The backup configuration block
Factory default configuration block
You can view all pending configuration changes that have been applied but not saved to flash memory using the diff
flash command. It is a global command that can be executed from any prompt.
For instructions on selecting the configuration to run at the next system reset, see the “Selecting a configuration block”
section in the “Boot Options Menu” chapter.
Reminders
CLI reminders prompt users to complete configuration tasks that require multiple steps. The default setting for CLI
reminders is enabled. Use the following command to disable CLI reminders: /cfg/sys/reminders dis
The following is an example of a configuration task performed with CLI reminders enabled.
>> Layer 2# vlan 5
VLAN number 5 with name "VLAN 5" created.
Reminder: VLAN 5 needs to be enabled.
>> VLAN 5# add 9
Port 9 is an UNTAGGED port and its current PVID is 1.
Confirm changing PVID from 1 to 5 [y/n]: y
Current ports for VLAN 5:
empty
9
Pending new ports for VLAN 5:
Reminder: Port 9 needs to be enabled.
Reminder: VLAN 5 needs to be enabled.
System configuration
Command: /cfg/sys
[System Menu]
syslog
- Syslog Menu
- SSH Server Menu
sshd
radius
- RADIUS Authentication Menu
tacacs+ - TACACS+ Authentication Menu
ntp
- NTP Server Menu
- System SNMP Menu
- System Access Menu
- Set system date
- Set system time
ssnmp
access
date
time
timezone - Set system timezone (daylight savings)
olddst
idle
notice
bannr
- Set system DST for US
- Set timeout for idle CLI sessions
- Set login notice
- Set login banner
hprompt - Enable/disable display hostname (sysName) in CLI prompt
bootp - Enable/disable use of BOOTP
reminders - Enable/disable Reminders
cur
- Display current system-wide parameters
This menu provides configuration of GbE2 Interconnect Switch management parameters such as user and
administrator privilege mode passwords, browser-based management settings, and management access list.
Configuration Menu 89
The following table describes the System Configuration Menu options.
Table 80 System Configuration Menu options
Command
syslog
sshd
Usage
Displays the Syslog Menu.
Displays the SSH Server Menu.
radius
tacacs+
ntp
Displays the RADIUS Authentication Menu.
Displays the TACACS+ Menu.
Displays the Network Time Protocol (NTP) Server Menu.
Displays the System SNMP Menu.
Displays the System Access Menu.
Prompts the user for the system date.
Configures the system time using a 24-hour clock format.
ssnmp
access
date
time
timezone
Configures the time zone where the switch resides. You are prompted
to select your location (continent, country, region) by the timezone
wizard. Once a region is selected, the switch updates the time to
reflect local changes to Daylight Savings Time, etc.
Enables or disables use of the Daylight Saving Time (DST) rules in
olddst
effect prior to the year 2007. The default value is disabled.
idle <1-60>
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The default
is 5 minutes.
notice <1-1024 character multi-
line> <'-' to end>
Displays login notice immediately before the “Enter password:”
prompt. This notice can contain up to 1024 characters and new lines.
bannr <1-80 characters>
Configures a login banner of up to 80 characters. When a user or
administrator logs into the GbE2 Interconnect Switch, the login banner
is displayed. It is also displayed as part of the output from the
/info/sys/gencommand.
hprompt disable|enable
bootp disable|enable
Enables or disables displaying of the host name (system administrator’s
name) in the command line interface.
Enables or disables the use of BOOTP. If you enable BOOTP, the
GbE2 Interconnect Switch will query its BOOTP server for all of the
GbE2 Interconnect Switch IP parameters. The default is enable.
reminders disable|enable
cur
Enables or disables reminder messages in the CLI. The default value is
enabled.
Displays the current system parameters.
Configuration Menu 90
System host log configuration
Command: /cfg/sys/syslog
[Syslog Menu]
host
- Set IP address of first syslog host
host2
sever
- Set IP address of second syslog host
- Set the severity of first syslog host
sever2 - Set the severity of second syslog host
facil - Set facility of first syslog host
facil2 - Set facility of second syslog host
console - Enable/disable console output of syslog messages
log
cur
- Enable/disable syslogging of features
- Display current syslog settings
The following table describes the Syslog Configuration Menu options.
Table 81 Syslog Configuration Menu options
Command
Description
host <IP address>
Sets the IP address of the first syslog host. For example,
100.10.1.1
host2 <IP address>
sever <1-7>
Sets the IP address of the second syslog host. For example,
100.10.1.2
Sets the severity level of the first syslog host displayed. The
default is 7, which means log all the seven severity levels.
sever2 <1-7>
Sets the severity level of the second syslog host displayed. The
default is 7, which means log all the seven severity levels.
facil <1-7>
This option sets the facility level of the first syslog host
displayed. The default is 0.
facil2 <1-7>
This option sets the facility level of the second syslog host
displayed. The default is 0.
console disable|enable
Enables or disables delivering syslog messages to the console.
When necessary, disabling console ensures the GbE2
Interconnect Switch is not affected by syslog messages. It is
enabled by default.
log <feature|all> enable|disable
Displays a list of features for which syslog messages can be
generated. You can choose to enable/disable specific
features or enable/disable syslog on all available features.
Features include:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
console
system
mgmt
cli
stg
vlan
ssh
vrrp
ntp
hotlink
ip
web
ospf
rmon
ufd
802.1x
cfg
cur
Displays the current syslog settings.
Configuration Menu 91
Secure Shell Server configuration
Command: /cfg/sys/sshd
[SSHD Menu]
interval– Set Interval for generating the RSA server key
scpadm – Set SCP-only admin password
hkeygen - Generate the RSA host key
skeygen - Generate the RSA server key
sshport - Set SSH server port number
ena
dis
on
off
cur
- Enable the SCP apply and save
- Disable the SCP apply and save
- Turn SSH server ON
- Turn SSH server OFF
- Display current SSH server configuration
Telnet traffic on the network is not secure. This menu enables Secure Shell (SSH) access from any SSH client. The SSH
program securely logs into another computer over a network and executes commands in a secure environment. All
data using SSH is encrypted.
Secure Shell can be configured on the GbE2 Interconnect Switch using the console port only. Several of the above
menu options do not display if you access the GbE2 Interconnect Switch using Telnet or the Browser-Based Interface
(BBI).
NOTE: See the HP ProLiant BL p-Class GbE2 Interconnect Switch Application Guide for information on SSH.
The following table describes the SSHD Configuration Menu options.
Table 82 SSHD Configuration Menu options
Command
Description
intrval <0-24>
Defines interval for auto-generating the RSA server key. The switch will auto-
generate the RSA server key at the interval defined in this command. The value
of zero (0) means the RSA server key auto-generation is disabled. If the switch
has been busy performing any other key generation and the assigned time of
interval expires, the RSA server will skip generating the key.
scpadm
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another. In the
GbE2 Interconnect Switch, SCP is used to download and upload the switch
configuration using secure channels.
hkeygen
skeygen
Generates the RSA host keys manually. The GbE2 Interconnect Switch creates
this key automatically while configuring the switch with Secure Shell (SSH). But
you can generate the key manually by using this command if you need to
overwrite the key for security reasons. The command will take effect immediately
without executing the apply command.
Generates the RSA server key. The GbE2 Interconnect Switch creates this key
automatically while configuring the switch with Secure Shell (SSH). You can
generate the key manually by using this command if you need to overwrite the
key for security reasons. The command will take effect immediately without
executing the apply command.
sshport <TCP port number>
Sets the SSH server port number.
ena
dis
on
Enables the SCP apply and save.
Disables the SCP apply and save. This is the default for SCP.
Enables the SSH server.
off
cur
Disables the SSH server. This is the default for the SSH server.
Displays the current SSH server configuration.
RADIUS server configuration
Command: /cfg/sys/radius
Configuration Menu 92
[RADIUS Server Menu]
prisrv - Set primary RADIUS server address
secsrv - Set secondary RADIUS server address
secret - Set primary RADIUS server secret
secret2 - Set secondary RADIUS server secret
port
- Set RADIUS port
retries - Set RADIUS server retries
timeout - Set RADIUS server timeout
telnet - Enable/disable RADIUS backdoor for telnet/ssh/http
secbd
on
off
cur
- Enable/disable RADIUS secure backdoor for telnet/ssh/http
- Turn RADIUS authentication ON
- Turn RADIUS authentication OFF
- Display current RADIUS configuration
NOTE: See the HP ProLiant BL p-Class GbE2 Interconnect Switch Application Guide for information on
RADIUS.
The following table describes the RADIUS Server Configuration Menu options.
Table 83 RADIUS Server Configuration Menu options
Command
Description
prisrv <IP address>
Sets the primary RADIUS server address.
For example, 100.10.1.1
secsrv <IP address>
secret <1-32 characters>
secret2 <1-32 characters>
port <UDP port number>
retries <1-3>
Sets the secondary RADIUS server address.
For example, 100.10.1.2
This is the shared secret between the GbE2 Interconnect Switch and the
RADIUS server(s).
This is the secondary shared secret between the switch and the RADIUS
server(s).
Enter the number of the User Datagram Protocol (UDP) port to be
configured, between 1500-3000. The default is 1645.
Sets the number of failed authentication requests before switching to a
different RADIUS server. The default is 3 requests.
timeout <1-10>
Sets the amount of time, in seconds, before a RADIUS server
authentication attempt is considered to have failed. The default is 3
seconds.
telnet
Enables or disables the RADIUS back door for telnet/SSH/ HTTP/HTTPS.
This command does not apply when secure backdoor (secbd) is
enabled.
secbd enable|disable
Enables or disables the RADIUS back door using secure password for
telnet/SSH/ HTTP/HTTPS.
on
Enables the RADIUS server.
off
cur
Disables the RADIUS server. This is the default.
Displays the current RADIUS server parameters.
IMPORTANT: If RADIUS is enabled, you are required to login using RADIUS when using Telnet. If a RADIUS
server is not available and the Telnet backdoor is enabled, type in noradiusas a backdoor to bypass
RADIUS checking, and use the administrator password to log into the GbE2 Interconnect Switch. Using
noradius is only allowed if the RADIUS server is not available.
Configuration Menu 93
TACACS+ server configuration
Command: /cfg/sys/tacacs+
[TACACS+ Server Menu]
prisrv - Set IP address of primary TACACS+ server
secsrv - Set IP address of secondary TACACS+ server
secret - Set secret for primary TACACS+ server
secret2 - Set secret for secondary TACACS+ server
port
- Set TACACS+ port number
retries - Set number of TACACS+ server retries
timeout - Set timeout value of TACACS+ server retries
telnet - Enable/disable TACACS+ back door for telnet/ssh/http/https
secbd - Enable/disable TACACS+ secure backdoor for telnet/ssh/http/https
cmap
- Enable/disable TACACS+ new privilege level mapping
usermap - Set user privilege mappings
on
off
cur
- Enable TACACS+ authentication
- Disable TACACS+ authentication
- Display current TACACS+ settings
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a remote
access server to forward a user's logon password to an authentication server to determine whether access can be
allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service (RADIUS) protocols are more
secure than the TACACS encryption protocol. TACACS+ is described in RFC 1492.
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol (TCP) whereas
RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication and authorization in a user
profile, whereas TACACS+ separates the two operations.
TACACS+ offers the following advantages over RADIUS as the authentication device:
•
•
•
TACACS+ is TCP-based, so it facilitates connection-oriented traffic.
It supports full-packet encryption, as opposed to password-only in authentication requests.
It supports decoupled authentication, authorization, and accounting.
The following table describes the TACACS+ Server Configuration Menu options.
Table 84 TACACS+ Server Configuration Menu options
Command
Description
prisrv <IP address>
Defines the primary TACACS+ server address. For example,
100.10.1.1
secsrv <IP address>
Defines the secondary TACACS+ server address. For example,
100.10.1.2
secret <1-32 characters>
secret2 <1-32 characters>
This is the shared secret between the switch and the TACACS+ server(s).
This is the secondary shared secret between the switch and the TACACS+
server(s).
port <TCP port number>
retries <1-3>
Enter the number of the TCP port to be configured, between 1 - 65000.
The default is 49.
Sets the number of failed authentication requests before switching to a
different TACACS+ server. The range is 1-3 requests. The default is 3
requests.
timeout <4-15>
Sets the amount of time, in seconds, before a TACACS+ server
authentication attempt is considered to have failed. The range is 4-15
seconds. The default is 5 seconds.
telnet enable|disable
Enables or disables the TACACS+ back door for telnet. The telnet
command also applies to SSH/SCP connections and the Browser-based
Interface (BBI). This command does not apply when secure backdoor
(secbd) is enabled.
secbd enable|disable
cmap enable|disable
Enables or disables the TACACS+ back door using secure password for
telnet/SSH/ HTTP/HTTPS. This command does not apply when backdoor
(telnet) is enabled.
Enables or disables TACACS+ privilege-level mapping.
The default value is disabled.
Configuration Menu 94
Table 84 TACACS+ Server Configuration Menu options
Command
Description
usermap <0-15>
user|oper|admin|none
Maps a TACACS+ privilege level to a GbE2 user level. Enter a TACACS+
privilege level (0-15), followed by the corresponding GbE2 user level.
on
Enables the TACACS+ server.
off
cur
Disables the TACACS+ server.
Displays current TACACS+ configuration parameters.
IMPORTANT: If TACACS+ is enabled, you are required to login using TACACS+ when doing Telnet. If a
TACACS+ server is not available and the Telnet backdoor is enabled, type in notacacsas a backdoor to
bypass TACACS+ checking, and use the administrator password to log into the GbE2 Interconnect Switch.
NTP server configuration
Command: /cfg/sys/ntp
[NTP Server Menu]
prisrv - Set primary NTP server address
secsrv - Set secondary NTP server address
intrval - Set NTP server resync interval
tzone
- Set NTP timezone offset from GMT
dlight - Enable/Disable daylight savings time
on
- Turn NTP service ON
off
cur
- Turn NTP service OFF
- Display current NTP configuration
This menu enables you to synchronize the GbE2 Interconnect Switch clock to a Network Time Protocol (NTP) server.
By default, this option is disabled.
The following table describes the NTP Server Configuration Menu options.
Table 85 NTP Server Configuration Menu options
Command
Description
prisrv <IP address>
Prompts for the IP addresses of the primary NTP server to which you want to
synchronize the GbE2 Interconnect Switch clock.
For example, 100.10.1.1
secsrv <IP address>
intrval <1-44640>
Prompts for the IP addresses of the secondary NTP server to which you want to
synchronize the GbE2 Interconnect Switch clock.
For example, 100.10.1.2
Specifies the interval, that is, how often, in minutes (1-44640), to
resynchronize the switch clock with the NTP server. The default is 1440
seconds.
tzone <hh:mm>
Prompts for the NTP time zone offset from Greenwich Mean Time (GMT), in
hours and minutes. The offset format is HH:MM
dlight disable|enable
Disables or enables daylight saving time in the system clock. When enabled,
the GbE2 Interconnect Switch will add an extra hour to the system clock so that
it is consistent with the local clock. By default, this option is disabled.
on
Enables the NTP synchronization service.
off
cur
Disables the NTP synchronization service. This is the default.
Displays the current NTP service settings.
Configuration Menu 95
System SNMP configuration
Command: /cfg/sys/ssnmp
[SNMP Menu]
snmpv3 - SNMPv3 Menu
name
locn
cont
- Set SNMP "sysName"
- Set SNMP "sysLocation"
- Set SNMP "sysContact"
rcomm
wcomm
- Set SNMP read community string
- Set SNMP write community string
timeout - Set timeout for the SNMP state machine
auth
linkt
ufd
- Enable/disable SNMP "sysAuthenTrap"
- Enable/disable SNMP link up/down trap
- Enable/disable SNMP Uplink Failure Detection trap
- Display current SNMP configuration
cur
GbE2 software supports SNMP-based network management. In SNMP model of network management, a
management station (client/manager) accesses a set of variables known as MIBs (Management Information Base)
provided by the managed device (agent). If you are running an SNMP network management station on your network,
you can manage the switch using the following standard SNMP MIBs:
•
•
•
MIB II (RFC 1213)
Ethernet MIB (RFC 1643)
Bridge MIB (RFC 1493)
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP messages.
Each SNMP message sent to the agent contains a list of management objects to retrieve or to modify.
•
•
•
•
•
•
•
SNMP parameters that can be modified include:
System name
System location
System contact
Use of the SNMP system authentication trap function
Read community string
Write community string
The following table describes the System SNMP Configuration Menu options.
Table 86 System SNMP Configuration Menu options
Command
Description
snmpv3
Displays SNMPv3 menu.
name <1-64 characters> Configures the name for the system. The name can have a maximum of 64 characters.
locn <1-64 characters> Configures the name of the system location. The location can have a maximum of 64
characters.
cont <1-64 characters> Configures the name of the system contact. The contact can have a maximum of 64
characters.
rcomm <1-32 characters> Configures the SNMP read community string. The read community string controls SNMP
“get” access to the switch. It can have a maximum of 32 characters. The default read
community string is public.
wcomm <1-32 characters> Configures the SNMP write community string. The write community string controls SNMP
“set” and “get” access to the switch. It can have a maximum of 32 characters. The
default write community string is private.
timeout <1-30>
Sets the timeout value for the SNMP state machine. The range is 1-30 minutes. The
default value is 5 minutes.
auth disable|enable
Enables or disables the use of the system authentication trap facility. The default setting
is disabled.
linkt <port>
[disable|enable]
Enables or disables the sending of SNMP link up and link down traps. The default
setting is enabled.
ufd
Enables or disables the sending of Uplink Failure Detection traps. The default setting is
disabled.
Configuration Menu 96
Table 86 System SNMP Configuration Menu options
Command
Description
cur
Displays the current SNMP configuration.
SNMPv3 configuration
Command: /cfg/sys/ssnmp/snmpv3
[SNMPv3 Menu]
usm
- usmUser Table Menu
view
- vacmViewTreeFamily Table Menu
access - vacmAccess Table Menu
group
comm
taddr
- vacmSecurityToGroup Table Menu
- community Table Menu
- targetAddr Table Menu
tparam - targetParams Table Menu
notify - notify Table Menu
v1v2
cur
- Enable/disable V1/V2 access
- Display current SNMPv3 configuration
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
•
•
•
•
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.
The following table describes the SNMPv3 Configuration Menu options.
Table 87 SNMPv3 Configuration Menu options
Command
Description
usm <1-16>
Configures a user security model (USM) entry for an authorized user. You can also
configure this entry through SNMP. The range is 1-16.
view <1-128>
access <1-32>
Configures different MIB views. The range is 1-128.
Configures access rights. The View-based Access Control Model defines a set of services
that an application can use for checking access rights of the user. You need access control
when you have to process retrieval or modification request from an SNMP entity. The range
is 1-32.
group <1-16>
comm <1-16>
Configures an SNMP group. A group maps the user name to the access group names and
their access rights needed to access SNMP management objects. A group defines the
access rights assigned to all names that belong to a particular group. The range is 1-16.
Configures a community table entry. The community table contains objects for mapping
community strings and version-independent SNMP message parameters.
The range is 1-16.
taddr <1-16>
tparam <1-16>
Configures the destination address and user security levels for outgoing notifications. This is
also called the transport endpoint. The range is 1-16.
Configures SNMP parameters, consisting of message processing model, security model,
security level, and security name information. There may be multiple transport endpoints
associated with a particular set of SNMP parameters, or a particular transport endpoint
may be associated with several sets of SNMP parameters.
notify <1-16>
Configures a notification index. A notification application typically monitors a system for
particular events or conditions, and generates Notification-Class messages based on these
events or conditions. The range is 1-16.
v1v2 disable|enable
cur
This command allows you to enable or disable the access to SNMP version 1 and version
2. This command is enabled by default.
Displays the current SNMPv3 configuration.
Configuration Menu 97
User Security Model configuration
Command: /cfg/sys/ssnmp/snmpv3/usm
[SNMPv3 usmUser 1 Menu]
name
auth
- Set USM user name
- Set authentication protocol
authpw - Set authentication password
priv - Set privacy protocol
privpw - Set privacy password
del
cur
- Delete usmUser entry
- Display current usmUser configuration
You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the
knowledge of applicable attributes of a user.
This menu helps you create a user security model entry for an authorized user. You need to provide a security name
to create the USM entry.
The following table describes the User Security Model Configuration Menu options.
Table 88 User Security Model Configuration Menu options
Command
Description
name <1-32
characters>
Configures a string up to 32 characters long that represents the name of the user. This is the
login name that you need in order to access the switch.
auth md5|sha|none
Configures the authentication protocol between HMAC-MD5-96 or HMAC-SHA-96. The
default algorithm is none.
authpw
Configures your password for authentication. If you selected an authentication algorithm using
the above command, you need to provide a password; otherwise you will get an error
message during validation.
priv des|none
Configures the type of privacy protocol on the switch. The privacy protocol protects messages
from disclosure. The options are des(CBC-DES Symmetric Encryption Protocol) or none. If
you specify desas the privacy protocol, then be sure that you have selected one of the
authentication protocols (MD5 or HMAC-SHA-96). If you select noneas the authentication
protocol, you will get an error message.
privpw
del
This command allows you to create or change the privacy password.
Deletes the USM user entries.
cur
Displays the USM user entries.
SNMPv3 View configuration
Command: /cfg/sys/ssnmp/snmpv3/view
[SNMPv3 vacmViewTreeFamily 1 Menu]
name
tree
mask
type
del
- Set view name
- Set MIB subtree(OID) which defines a family of view subtrees
- Set view mask
- Set view type
- Delete vacmViewTreeFamily entry
- Display current vacmViewTreeFamily configuration
cur
Configuration Menu 98
The following table describes the SNMPv3 View Configuration Menu options.
Table 89 SNMPv3 View Configuration Menu options
Command
Description
name <1-32 characters>
Defines the name for a family of view subtrees up to a maximum of 32
characters.
tree <1-32 characters>
Defines the Object Identifier (OID), a string of maximum 32 characters, which
when combined with the corresponding mask defines a family of view subtrees.
An example of an OID is 1.3.6.1.2.1.1.1.0
mask <1-32 characters>
Defines the bit mask, which in combination with the corresponding tree defines
a family of view subtrees. The mask can have a maximum of 32 characters.
type included|excluded
Selects whether the corresponding instances of
vacmViewTreeFamilySubtree and
vacmViewTreeFamilyMaskdefine a family of view subtrees, which is
included in or excluded from the MIB view.
del
cur
Deletes the vacmViewTreeFamilygroup entry.
Displays the current vacmViewTreeFamilyconfiguration.
View-based Access Control Model configuration
Command: /cfg/sys/ssnmp/snmpv3/access
[SNMPv3 vacmAccess 1 Menu]
name
- Set group name
prefix - Set context prefix
model
level
match
rview
wview
nview
del
- Set security model
- Set minimum level of security
- Set prefix only or exact match
- Set read view index
- Set write view index
- Set notify view index
- Delete vacmAccess entry
- Display current vacmAccess configuration
cur
The view-based Access Control Model defines a set of services that an application can use for checking access rights
of the user. Access control is needed when the user has to process SNMP retrieval or modification request from an
SNMP entity.
The following table describes the User Access Control Configuration Menu options.
Table 90 View-based Access Control Configuration Menu options
Command
Description
name <1-32
characters>
Defines the name of the group, up to a maximum of 32 characters.
model
Selects the security model to be used.
usm|snmpv1|snmpv2
level
Defines the minimum level of security required to gain access rights. The level
noAuthNoPriv|authNo noAuthNoPrivmeans that the SNMP message will be sent without authentication and
Priv|authPriv
without using a privacy protocol. The level authNoPrivmeans that the SNMP message
will be sent with authentication but without using a privacy protocol. The authPrivmeans
that the SNMP message will be sent both with authentication and using a privacy protocol.
rview <1-32
characters>
Defines a 32 character long read view name that allows you read access to a particular MIB
view. If the value is empty or if there is no active MIB view having this value then no access is
granted.
wview <1-32
characters>
Defines a 32 character long write view name that allows you write access to the MIB view. If
the value is empty or if there is no active MIB view having this value then no access is
granted.
nview <1-32
characters>
Defines a 32 character long notify view name that allows you notify access to the MIB view.
Configuration Menu 99
Table 90 View-based Access Control Configuration Menu options
Command
Description
name <1-32
characters>
Defines the name of the group, up to a maximum of 32 characters.
model
Selects the security model to be used.
usm|snmpv1|snmpv2
del
cur
Deletes the View-based Access Control entry.
Displays the View-based Access Control configuration.
SNMPv3 Group configuration
Command: /cfg/sys/ssnmp/snmpv3/group
[SNMPv3 vacmSecurityToGroup 1 Menu]
model
uname
gname
del
- Set security model
- Set USM user name
- Set group name
- Delete vacmSecurityToGroup entry
- Display current vacmSecurityToGroup configuration
cur
The following table describes the SNMPv3 Group Configuration Menu options.
Table 91 SNMPv3 Group Configuration Menu options
Command
Description
model
Defines the security model.
usm|snmpv1|snmpv2
uname <1-32
characters>
Sets the user name as defined in /cfg/sys/ssnmp/snmpv3/usm/name. The user
name can have a maximum of 32 characters.
gname <1-32
characters>
Configures the name for the access group as defined in
/cfg/sys/ssnmp/snmpv3/access/name. The group name can have a maximum
of 32 characters.
del
cur
Deletes the vacmSecurityToGroupentry.
Displays the current vacmSecurityToGroupconfiguration.
SNMPv3 Community Table configuration
Command: /cfg/sys/ssnmp/snmpv3/comm
[SNMPv3 snmpCommunityTable 1 Menu]
index
name
uname
tag
del
cur
- Set community index
- Set community string
- Set USM user name
- Set community tag
- Delete communityTable entry
- Display current communityTable configuration
This command is used for configuring the community table entry. The configured entry is stored in the community table
list in the SNMP engine. This table is used to configure community strings in the Local Configuration Datastore (LCD)
of SNMP engine.
Configuration Menu 100
The following table describes the SNMPv3 Community Table Configuration Menu options.
Table 92 SNMPv3 Community Table Configuration Menu options
Command
Description
index <1-32
characters>
Configures the unique index value of a row in this table. The index can have a maximum of
32 characters.
name <1-32
characters>
Defines the name as defined in /cfg/sys/ssnmp/snmpv3/usm/name. The name
can have a maximum of 32 characters.
uname <1-32
characters>
Defines a readable 32 character string that represents the corresponding value of an SNMP
community name in a security model.
tag <1-255
characters>
Configures a tag of up to 255 characters maximum. This tag specifies a set of transport
endpoints to which a command responder application sends an SNMP trap.
del
cur
Deletes the community table entry.
Displays the community table configuration.
SNMPv3 Target Address Table configuration
Command: /cfg/sys/ssnmp/snmpv3/taddr
[SNMPv3 snmpTargetAddrTable 1 Menu]
name
addr
port
- Set target address name
- Set target transport address IP
- Set target transport address port
taglist - Set tag list
pname
del
cur
- Set targetParams name
- Delete targetAddrTable entry
- Display current targetAddrTable configuration
This menu allows you to set passwords and display current user statistics. Passwords can be a maximum of 15
characters. To disable a user, set the password to null by simply pressing the Enter key when prompted for the
password.
The following table describes the SNMPv3 Target Address Table Configuration Menu options.
Table 93 SNMPv3 Target Address Table Configuration Menu options
Command
Description
name <1-32
characters>
Configures the locally arbitrary, but unique identifier, target address name associated with
this entry.
addr <transport
address IP>
Configures a transport address IP that can be used in the generation of SNMP traps.
port <transport
address port>
Configures a transport address port that can be used in the generation of SNMP traps.
taglist <1-255
characters>
Configures a list of tags (up to 255 characters maximum) that are used to select target
addresses for a particular operation.
pname <1-32
characters>
Defines the name as defined in /cfg/sys/ssnmp/snmpv3/tparam/name.
del
cur
Deletes the Target Address Table entry.
Displays the current Target Address Table configuration.
Configuration Menu 101
SNMPv3 Target Parameters Table configuration
Command: /cfg/sys/ssnmp/snmpv3/tparam
[SNMPv3 snmpTargetParamsTable 1 Menu]
name
- Set targetParams name
mpmodel - Set message processing model
model
uname
level
del
- Set security model
- Set USM user name
- Set minimum level of security
- Delete targetParamsTable entry
- Display current targetParamsTable configuration
cur
You can configure the target parameters entry and store it in the target parameters table in the SNMP engine. This
table contains parameters that are used to generate a message. The parameters include the message processing
model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for example: USM), the security name, and
the security level (noAuthnoPriv,authNoPriv, or authPriv).
The following table describes the SNMPv3 Target Parameters Table Configuration Menu options.
Table 94 SNMPv3 Target Parameters Table Configuration Menu options
Command
Description
name <1-32
characters>
Configures the locally arbitrary, but unique identifier that is associated with this entry.
mpmodel
snmpv1|snmpv2c|snmp
v3
Configures the message processing model that is used to generate SNMP messages.
Selects the security model to be used when generating the SNMP messages.
model
usm|snmpv1|snmpv2
uname <1-32
characters>
Defines the name that identifies the user in the USM table, on whose behalf the SNMP
messages are generated using this entry.
level
Selects the level of security to be used when generating the SNMP messages using this entry.
noAuthNoPriv|authNo The level noAuthNoPrivmeans that the SNMP message will be sent without authen-
Priv|authPriv
tication and without using a privacy protocol. The level authNoPrivmeans that the SNMP
message will be sent with authentication but without using a privacy protocol. The
authPrivmeans that the SNMP message will be sent both with authentication and using a
privacy protocol.
del
cur
Deletes the targetParamsTableentry.
Displays the current targetParamsTableconfiguration.
SNMPv3 Notify Table configuration
Command: /cfg/sys/ssnmp/snmpv3/notify
[SNMPv3 snmpNotifyTable 1 Menu]
name
tag
del
cur
- Set notify name
- Set notify tag
- Delete notifyTable entry
- Display current notifyTable configuration
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for particular events
or conditions, and generates Notification-Class messages based on these events or conditions.
Configuration Menu 102
The following table describes the SNMPv3 Notify Table Configuration menu options.
Table 95 SNMPv3 Notify Table Configuration Menu options
Command
Description
name <1-32
characters>
Defines a locally arbitrary but unique identifier associated with this SNMP notify entry.
tag <1-255
characters>
Defines a tag of 255 characters maximum that contains a tag value which is used to select
entries in the Target Address Table. Any entry in the snmpTargetAddrTable, that
matches the value of this tag, is selected.
del
cur
Deletes the notify table entry.
Displays the current notify table configuration.
System Access configuration
Command: /cfg/sys/access
[System Access Menu]
mgmt
user
http
https
wport
snmp
tnet
- Management Network Definition Menu
- User Access Control Menu (passwords)
- Enable/disable HTTP (Web) access
- HTTPS Web Access Menu
- Set HTTP (Web) server port number
- Set SNMP access control
- Enable/disable Telnet access
tnport - Set Telnet server port number
tport
cur
- Set the TFTP Port for the system
- Display current system access configuration
The following table describes the System Access Configuration menu options.
Table 96 System Access Configuration Menu options
Command
mgmt
Description
Displays the Management Configuration Menu.
Displays the User Access Control Menu.
user
http disable|enable Enables or disables HTTP (Web) access to the Browser-Based Interface. It is enabled by
default.
https
Displays the HTTPS Menu.
wport <TCP port
number>
Sets the switch port used for serving switch Web content. The default is HTTP port 80. If
Global Server Load Balancing is to be used, set this to a different port (such as 8080).
snmp disable|read-
only|read-write
Disables or provides read-only/write-read SNMP access.
tnet
Enables or disables telnet access. This command is enabledby default. You will see this
command only if you are connected to the switch through the management module.
tnport <TCP port
number>
Sets an optional telnet server port number for cases where the server listens for telnet sessions
on a non-standard port.
tport <TFTP port
number>
Sets an optional telnet server port number for cases where the server listens for telnet sessions
on a non-standard port.
cur
Displays the current system access parameters.
Configuration Menu 103
Management Networks configuration
Command: /cfg/sys/access/mgmt
[Management Networks Menu]
add
rem
cur
- Add mgmt network definition
- Remove mgmt network definition
- Display current mgmt network definitions
The following table describes the Management Networks Configuration menu options.
Table 97 Management Networks Configuration menu options
Command
Description
add <IP address> <IP mask>
Adds a defined network through which switch access is allowed through
Telnet, SNMP, RIP, or the browser-based interface. A range of IP addresses is
produced when used with a network mask address. Specify an IP address
and mask address in dotted-decimal notation.
rem <IP address> <IP mask>
Removes a defined network, which consists of a management network
address and a management network mask address.
cur
Displays the current management networks parameters.
User Access Control configuration
Command: /cfg/sys/access/user
[User Access Control Menu]
uid
usrpw
opw
admpw
cur
- User ID Menu
- Set user password (user)
- Set operator password (oper)
- Set administrator password (admin)
- Display current user status
The following table describes the User Access Control menu options.
Table 98 User Access Control Configuration menu options
Command
Description
uid <1-10>
eject <1-10>
Displays the User ID Menu for the selected user.
Ejects the selected user from the switch.
usrpw <1-128
characters>
Sets the user (user) password (maximum 128 characters). The user has no direct
responsibility for switch management. He or she can view switch status information and
statistics, but cannot make any configuration changes.
opw <1-128
characters>
Sets the operator (oper) password (maximum 128 characters). The operator manages all
functions of the switch. He or she can view all switch information and statistics and can reset
ports or the entire switch.
admpw <1-128
characters>
Sets the administrator (admin) password (maximum 128 characters). The super user
administrator has complete access to all menus, information, and configuration commands on
the switch, including the ability to change both the user and administrator passwords.
cur
Displays the current user status.
Configuration Menu 104
User ID configuration
Command: /cfg/sys/access/user/uid <1-10>
[User ID 1 Menu]
cos
name
pswd
ena
dis
del
cur
- Set class of service
- Set user name
- Set user password
- Enable user ID
- Disable user ID
- Delete user ID
- Display current user configuration
The following table describes the User ID Configuration menu options.
Table 99 User ID Configuration menu options
Command
Description
cos
Sets the Class-of-Service to define the user’s authority level.
<user|oper|admin>
name <1-8
Defines the user name.
characters>
pswd <1-128
characters>
Sets the user password of up to 128 characters maximum.
ena
dis
del
cur
Enables the user ID.
Disables the user ID.
Deletes the user ID.
Displays the current user ID parameters.
HTTPS Access configuration
Command: /cfg/sys/access/https
[https Menu]
access - Enable/Disable HTTPS Web access
port - HTTPS WebServer port number
generate - Generate self-signed HTTPS server certificate
certSave - save HTTPS certificate
cur
- Display current SSL Web Access configuration
The following table describes the HTTPS Access Configuration menu options.
Table 100 HTTPS Access Configuration menu options
Command
Description
access
Enables or disables BBI access (Web access) using HTTPS.
Defines the HTTPS Web server port number.
port <TCP port
number>
generate
Allows you to generate a certificate to connect to the SSL to be used during the key exchange.
A default certificate is created when HTTPS is enabled for the first time. The user can create a
new certificate defining the information that they want to be used in the various fields. For
example:
•
•
•
•
•
•
•
Country Name (2 letter code) [ ]: CA
State or Province Name (full name) [ ]: Ontario
Locality Name (for example, city) [ ]: Ottawa
Organization Name (for example, company) [ ]: Hewlett Packard
Organizational Unit Name (for example, section) [ ]: ProLiant
Common Name (for example, user’s name) [ ]: Mr Smith
You must confirm if you want to generate the certificate. It takes approximately 30 seconds to
generate the certificate. Then the switch restarts SSL agent.
Configuration Menu 105
Table 100 HTTPS Access Configuration menu options
Command
Description
certSave
Allows the client, or the Web browser, to accept the certificate and save the certificate to
Flash to be used when the switch is rebooted.
cur
Displays the current SSL Web Access configuration.
Port configuration
Command: /cfg/port <port number>
[Port 1 Menu]
gig
- Gig Phy Menu
- Fiber Link Menu
fiber
aclqos - Acl/Qos Configuration Menu
8021ppri - Set default 802.1p priority
pvid
name
rmon
tag
- Set default port VLAN id
- Set port name
- Enable/Disable RMON for port
- Enable/disable VLAN tagging for port
tagpvid - Enable/disable tagging on pvid
brate
mrate
drate
ena
- Set BroadCast Threshold
- Set MultiCast Threshold
- Set Dest. Lookup Fail Threshold
- Enable port
dis
- Disable port
cur
- Display current port configuration
This menu enables you to configure settings for individual GbE2 Interconnect Switch ports. This command is enabled
by default.
The following table describes the Port Configuration Menu options.
Table 101 Port Configuration Menu options
Command
gig
Description
Displays the Gigabit Ethernet Physical Link Menu.
Displays the Fiber Link Menu.
fiber
aclqos
Displays the ACL Quality of Service Menu.
Configures the port’s 802.1p priority level.
8021ppri
pvid <1-4095>
Sets the default VLAN number which will be used to forward frames
which are not VLAN tagged. The default number is 1.
NOTE:
VLAN 4095 is reserved for switch management.
name <1-64 characters>|none
Sets a name for the port (maximum 64 characters). The assigned port
name displays next to the port number on some information and statistics
screens.
rmon disable|enable
Enables or disables Remote Monitoring for the port. RMON must be
enabled for any RMON configurations to function.
tag disable|enable
Disables or enables VLAN tagging for this port. It is disabled by default.
tagpvid disable|enable
Disables or enables VLAN tag persistence. When disabled, the VLAN tag
is removed from packets whose VLAN tag matches the port PVID. The
default value is enabled.
brate <0-262143>|dis
mrate <0-262143>|dis
drate <0-262143>|dis
ena
Limits the number of broadcast packets per second to the specified value.
If disabled (dis), the port forwards all broadcast packets.
Limits the number of multicast packets per second to the specified value. If
disabled (dis), the port forwards all multicast packets.
Limits the number of unknown unicast packets per second to the specified
value. If disabled (dis), the port forwards all unknown unicast packets.
Enables the port.
Configuration Menu 106
Table 101 Port Configuration Menu options
Command
Description
dis
Disables the port. To temporarily disable a port without changing its
configuration attributes, see the “Temporarily disabling a port” section
later in this chapter.
cur
Displays current port parameters.
Temporarily disabling a port
To temporarily disable a port without changing its stored configuration attributes, enter the following command at any
prompt:
Main# /oper/port <port number>/dis
Because this configuration sets a temporary state for the port, you do not need to use apply or save. The port state
will revert to its original configuration when the GbE2 Interconnect Switch is reset. See the “Menu information”
section in the “Operations Menu” chapter for other operations-level commands.
Port link configuration
Command: /cfg/port <port number>/gig
[Gigabit Link Menu]
speed - Set link speed
mode
fctl
auto
cur
- Set full or half duplex mode
- Set flow control
- Set auto negotiation
- Display current gig link configuration
Use these menu options to set port parameters for the port link.
Link menu options are described in the following table and display on the Gigabit port configuration menus for the
GbE2 Interconnect Switch. Using these configuration menus, you can set port parameters such as speed, duplex, flow
control, and negotiation mode for the port link.
The following table describes the Gigabit Link Configuration Menu options.
Table 102 Gigabit Link Configuration Menu options
Command
Description
speed 10|100|1000|any
Sets the link speed. Not all options are valid on all ports. The choices include:
•
•
•
•
10 Mb/s
100 Mb/s
1000 Mb/s
“Any,” for automatic detection (default)
mode full|half|any
Sets the operating mode. The choices include:
•
•
•
Full-duplex
Half-duplex
“Any,” for automatic detection (default)
fctl rx|tx|both|none
Sets the flow control. The choices include:
•
•
•
•
Receive (rx) flow control
Transmit (tx) flow control
Both receive and transmit flow control (default)
No flow control
auto on|off
cur
Enables or disables auto-negotiation for the port.
Displays current port parameters.
Configuration Menu 107
Port fiber link control
Command: /cfg/port <port number>/fiber
[Fiber Link Menu]
txctrl - Enable/Disable TX control
txpulse - Enable/Disable TX pulse
txdn
txup
cur
- Set TX dn time (secs)
- Set TX up time (secs)
- Display current fiber link configuration
Use this menu to control fiber-port link parameters, if necessary. By default, these menu items are disabled.
The fiber TX control options address any possible interoperability issues that may arise from linking different
transceivers. Some transceivers may require a signal pulse or no signal in order to properly determine a loss of
signal state.
The following table describes the Fiber Link Control Menu options.
Table 103 Fiber Link Control Menu options
Command
Description
txctrl enable|disable
txpulse enable|disable
Enables or disables fiber-port transmit control when the port detects RX signal loss.
Enables or disables fiber-port transmit pulse control.
When disabled, the fiber-port transmitter is disabled when RX signal loss is detected.
When enabled, the fiber-port transmitter pulses the TX signal at a configurable rate
defined by the txdnand txupcommands.
txdn <1-10>
txup <1-10>
cur
Configures the interval that the transmit pulse is down, in seconds. The default value
is 2.
Configures the interval that the transmit pulse is up, in seconds. The default value is
1.
Displays current fiber link control parameters.
ACL Port configuration
Command: /cfg/port <port number>/aclqos
[Port 1 ACL Menu]
meter - ACL Metering Configuration Menu
re-mark - ACL Re-mark Configuration Menu
add
rem
cur
- Add ACL group to this port
- Remove ACL group from this port
- Display current ACLs for this port
The following table describes the Port Access Control List Configuration Menu options.
Table 104 ACL Port Configuration Menu options
Command
Description
meter <1-63>
Displays the Metering Menu.
Displays the Re-Mark Menu.
re-mark <1-63>
add acl|blk|grp <1-4096>
Adds the specified ACL, ACL block, or ACL group to the port. You can add
multiple ACLs, ACL Blocks, or ACL Groups to a port, but the total number of
precedence levels allowed is seven.
rem acl|blk|grp <1-4096>
Removes the specified ACL, ACL Block, or ACL Group from the port.
Displays current ACL QoS parameters.
cur
Configuration Menu 108
ACL Port Metering configuration
Command: /cfg/port <port number>/aclqos/meter
[Metering Menu]
cir
- Set committed rate in KiloBits/s
mbsize - Set maximum burst size in KiloBits
enable - Enable/disable port metering
dpass
- Set to Drop or Pass out of profile traffic
assign - Assign meter to ACL, ACL block or ACL group
unassign - Unassign meter from ACL, ACL block or ACL group
reset
cur
- Reset meter parameters
- Display current settings
The following table describes the ACL Port Metering Configuration Menu options.
Table 105 ACL Port Metering Configuration Menu options
Command
Description
cir <64-1000000>
Configures the committed rate, in Kilobits per second. The committed rate
must be a multiple of 64.
mbsize <32-4096>
Configures the maximum burst size, in Kilobits. Enter one of the following
values for mbsize: 32, 64, 128, 256, 512, 1024, 2048, 4096
Enables or disables ACL Metering on the port.
enable e|d
Configures the ACL Meter to either drop or pass out-of-profile traffic.
Adds an ACL, ACL Block, or ACL Group to the ACL Meter on this port.
Removes an ACL, ACL Block, or ACL Group from the ACL Meter on this port.
Reset ACL Metering parameters to their default values.
dpass drop|pass
assign acl|blk|grp <1-4096>
unassign acl|blk|grp <1-4096>
reset
cur
Displays current ACL Metering parameters.
ACL Port Re-Mark configuration
Command: /cfg/port <port number>/aclqos/re-mark <1-63>
[Re-mark Menu Menu]
inprof - In Profile Menu
outprof - Out Profile Menu
assign - Assign re-mark action to ACL item
unassign - Unassign re-mark action from ACL item
reset
cur
- Reset re-mark settings
- Display current settings
You can choose to re-mark IP header data for the selected ACL Group on the port. You can configure different re-
mark values, based on whether packets fall within the ACL Metering profile, or out of the ACL Metering profile.
The following table describes the ACL Port Re-Mark Configuration Menu options.
Table 106 ACL Port Re-Mark Configuration Menu options
Command
Description
inprof
Displays the Re-Mark In-Profile Menu.
outprof
Displays the Re-Mark Out-of-Profile Menu.
Assign an ACL, ACL Block, or ACL Group for DSCP remarking on this port.
assign acl|blk|grp <1-4096>
unassign acl|blk|grp <1-4096>
Remove an ACL, ACL Block, or ACL Group from DSCP remarking on this
port.
reset
cur
Reset ACL Re-Mark parameters to their default values.
Displays current Re-Mark parameters.
Configuration Menu 109
ACL Port Re-Mark In-Profile configuration
Command: /cfg/port <port number>/aclqos/re-mark <1-63>/inprof
[Re-marking - In Profile Menu]
up1p
- Set Update User Priority Menu
updscp - Set the update DSCP
reset
cur
- Reset in profile settings
- Display current settings
The following table describes the ACL Port Re-Mark In-Profile Configuration Menu options.
Table 107 ACL Port Re-Mark In-Profile Configuration Menu options
Command
up1p
Description
Displays the Re-Mark In-Profile Update User Priority Menu.
Sets the DiffServ Code Point (DSCP) of In-Profile packets to the selected value.
Resets the update DSCP parameters to their default values.
Displays current Re-Mark In-Profile parameters.
updscp <0-63>
reset
cur
Re-Mark Update User Priority configuration
Command: /cfg/port <port number>/aclqos/re-mark <1-63>/inprof/up1p
[Update User Priority Menu]
value
utosp
reset
cur
- Set the update user priority
- Enable/Disable use of TOS precedence
- Reset in profile up1p settings
- Display current settings
The following table describes the Update User Priority Configuration Menu options.
Table 108 ACL Port Update User Priority Configuration Menu options
Command
Description
value <0-7>
Defines 802.1p value. The value is the priority bits information in the packet
structure.
utosp enable|disable
Enable or disable mapping of TOS (Type of Service) priority to 802.1p priority for
In-Profile packets. When enabled, the TOS value is used to set the 802.1p value.
reset
cur
Resets UP1P settings to their default values.
Displays current Re-Mark In-Profile User Priority parameters.
ACL Port Re-Mark Out-of-Profile configuration
Command: /cfg/port <port number>/aclqos/re-mark <1-63>/outprof
[Re-marking - Out Of Profile Menu]
updscp - Set the update DSCP
reset
cur
- Reset out of profile settings
- Display current settings
The following table describes the Re-Mark Out-of-Profile Configuration Menu options.
Table 109 ACL Port Re-Mark Out-of-Profile Configuration Menu options
Command
Description
updscp <0-63>
Sets the DiffServ Code Point (DSCP) of Out-of-Profile packets to the selected value. The
switch sets the DSCP value on Out-of-Profile packets.
reset
cur
Resets the update DSCP parameters for Out-of-Profile packets to their default values.
Displays current Re-Mark Out-of-Profile parameters.
Configuration Menu 110
Layer 2 configuration
Command: /cfg/l2
[Layer 2 Menu]
8021x
mrst
- 802.1x Menu
- Multiple Spanning Tree/Rapid Spanning Tree Menu
- Spanning Tree Menu
stp
fdb
- FDB Menu
- Trunk Group Menu
- IP Trunk Hash Menu
- Link Aggregation Control Protocol Menu
trunk
thash
lacp
hotlink - Hot Links Menu
vlan
- VLAN Menu
upfast - Enable/disable Uplink Fast
update - UplinkFast station update rate
cur
- Display current layer 2 parameters
The following table describes the Layer 2 Configuration Menu options.
Table 110 L2 Configuration Menu options
Command
8021x
mrst
Description
Displays the 802.1x Configuration Menu.
Displays the Rapid Spanning Tree/Multiple Spanning Tree Protocol
Configuration Menu.
stp
Displays the Spanning Tree Configuration Menu.
Displays the Forwarding Database Configuration Menu.
Displays the Trunk Group Configuration Menu.
Displays the IP Trunk Hash Menu.
fdb
trunk <1-12>
thash
lacp
Displays the Link Aggregation Control Protocol Menu.
Displays the Hot Links Menu.
hotlink
vlan <1-4095>
upfast enable|disable
Displays the VLAN Configuration Menu.
Enables or disables Fast Uplink Convergence, which provides rapid Spanning
Tree convergence to an upstream switch during failover.
NOTE:
When enabled, this feature increases bridge priorities to 65500 for all STGs and path cost by 3000 for all external
STP ports.
update <10-200>
Configures the station update rate, in packets per second.
The default value is 40.
cur
Displays current Layer 2 parameters.
802.1x configuration
Command: /cfg/l2/8021x
[802.1x Configuration Menu]
global - Global 802.1x configuration menu
port
ena
dis
cur
- Port 802.1x configuration menu
- Enable 802.1x access control
- Disable 802.1x access control
- Show 802.1x configuration
Configuration Menu 111
This feature allows you to configure the GbE2 Interconnect Switch as an IEEE 802.1x Authenticator, to provide port-
based network access control. The following table describes the 802.1x Configuration Menu options.
Table 111 802.1x Configuration Menu options
Command
Description
global
Displays the global 802.1x Configuration Menu.
Displays the 802.1x Port Menu.
Globally enables 802.1x.
port <port number>
ena
dis
cur
Globally disables 802.1x.
Displays current 802.1x parameters.
802.1x Global configuration
Command: /cfg/l2/8021x/global
[802.1x Global Configuration Menu]
mode - Set access control mode
qtperiod - Set EAP-Request/Identity quiet time interval
txperiod - Set EAP-Request/Identity retransmission timeout
suptmout - Set EAP-Request retransmission timeout
svrtmout - Set server authentication request timeout
maxreq - Set max number of EAP-Request retransmissions
raperiod - Set reauthentication time interval
reauth - Set reauthentication status to on or off
default - Restore default 802.1x configuration
cur
- Display current 802.1x configuration
The global 802.1x menu allows you to configure parameters that affect all ports in the switch. The following table
describes the 802.1x Global Configuration Menu options.
Table 112 802.1x Global Configuration Menu options
Command
Description
mode force-
Sets the type of access control for all ports:
unauth|auto|force-auth
• force-unauth—the port is unauthorized unconditionally.
• auto—the port is unauthorized until it is successfully authorized by the
RADIUS server.
• force-auth—the port is authorized unconditionally, allowing all traffic.
The default value is force-auth.
qtperiod <0-65535>
txperiod <1-65535>
suptmout <1-65535>
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAP-
Request/ Identity frame to the supplicant (client) after an authentication failure
in the previous round of authentication. The default value is 60 seconds.
Sets the time, in seconds, the authenticator waits for an EAP-Response/Identity
frame from the supplicant (client) before retransmitting an EAP-Request/Identity
frame. The default value is 30 seconds.
Sets the time, in seconds, the authenticator waits for an EAP-Response packet
from the supplicant (client) before retransmitting the EAP-Request packet to the
authentication server. The default value is 30 seconds.
Sets the time, in seconds, the authenticator waits for a response from the Radius
server before declaring an authentication timeout. The default value is 30
seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicant’s (client’s) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout(default is 3 seconds).
maxreq <1-10>
Sets the maximum number of times the authenticator retransmits an EAP-Request
packet to the supplicant (client). The default value is 2.
raperiod <1-604800>
Sets the time, in seconds, the authenticator waits before re-authenticating a
supplicant (client) when periodic re-authentication is enabled. The default value
is 3600 seconds.
Configuration Menu 112
Table 112 802.1x Global Configuration Menu options
Command
Description
reauth on|off
default
cur
Sets the re-authentication status to onor off. The default value is off.
Resets the global 802.1x parameters to their default values.
Displays current global 802.1x parameters.
802.1x Port configuration
Command: /cfg/l2/8021x/port <port number>
[802.1x Port Configuration Menu]
mode
- Set access control mode
qtperiod - Set EAP-Request/Identity quiet time interval
txperiod - Set EAP-Request/Identity retransmission timeout
suptmout - Set EAP-Request retransmission timeout
svrtmout - Set server authentication request timeout
maxreq - Set max number of EAP-Request retransmissions
raperiod - Set reauthentication time interval
reauth - Set reauthentication status to on or off
default - Restore default 802.1x configuration
global - Apply current global 802.1x configuration to this port
cur
- Display current 802.1x configuration
The 802.1x port menu allows you to configure parameters that affect the selected port in the switch. These settings
override the global 802.1x parameters.
The following table describes the 802.1x Port Configuration Menu options.
Table 113 802.1x Global Configuration Menu options
Command
Description
mode force-
Sets the type of access control for the port:
unauth|auto|force-auth
• force-unauth—the port is unauthorized unconditionally.
• auto—the port is unauthorized until it is successfully authorized by the
RADIUS server.
• force-auth—the port is authorized unconditionally, allowing all traffic.
The default value is force-auth.
qtperiod <0-65535>
txperiod <1-65535>
suptmout <1-65535>
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAP-
Request/ Identity frame to the supplicant (client) after an authentication failure
in the previous round of authentication. The default value is 60 seconds.
Sets the time, in seconds, the authenticator waits for an EAP-Response/Identity
frame from the supplicant (client) before retransmitting an EAP-Request/Identity
frame. The default value is 30 seconds.
Sets the time, in seconds, the authenticator waits for an EAP-Response packet
from the supplicant (client) before retransmitting the EAP-Request packet to the
authentication server. The default value is 30 seconds.
Sets the time, in seconds, the authenticator waits for a response from the
RADIUS server before declaring an authentication timeout. The default value is
30 seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicant’s (client’s) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout(default is 3 seconds).
maxreq <1-10>
Sets the maximum number of times the authenticator retransmits an EAP-Request
packet to the supplicant (client). The default value is 2.
raperiod <1-604800>
Sets the time, in seconds, the authenticator waits before re-authenticating a
supplicant (client) when periodic re-authentication is enabled. The default value
is 3600 seconds.
reauth on|off
default
Sets the re-authentication status to onor off. The default value is off.
Resets the global 802.1x parameters to their default values.
Configuration Menu 113
Table 113 802.1x Global Configuration Menu options
Command
Description
cur
Displays current global 802.1x parameters.
Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol
configuration
Command: /cfg/l2/mrst
[Multiple Spanning Tree Menu]
cist
name
- Common and Internal Spanning Tree menu
- Set MST region name
version - Set Version of this MST region
maxhop - Set Maximum Hop Count for MST (4 - 60)
mode
on
off
cur
- Spanning Tree Mode
- Globally turns RSTP/MSTP ON
- Globally turns RSTP/MSTP OFF
- Display current MST parameters
HP ProLiant BL p-Class GbE2 Interconnect Switch supports the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) and
IEEE 802.1s Multiple Spanning Tree Protocol (MSTP). MSTP allows you to map many VLANs to a small number of
spanning tree groups, each with its own topology.
You can configure up to 32 spanning tree groups on the switch. MRST is turned off by default.
NOTE: When Multiple Spanning Tree is turned on, VLAN 1 is moved from Spanning Tree Group 1 to the
Common Internal Spanning Tree (CIST). When Multiple Spanning Tree is turned off, VLAN 1 is moved back to
Spanning Tree Group 1.
The following table describes the Multiple Spanning Tree Configuration Menu options.
Table 114 Multiple Spanning Tree Configuration Menu options
Command
Description
cist
Displays the Common Internal Spanning Tree (CIST) Menu.
name <1-32 characters>
Configures a name for the MSTP region. All devices within a MSTP region must
have the same region name.
rev <0-65535>
Configures the revision level for the MSTP region. The revision level is used as a
numerical identifier for the region. All devices within a MSTP region must have the
same revision level number. The range is 0-65535.
maxhop <4-60>
mode rstp|mstp
on
Configures the maximum number of bridge hops a packet may to traverse before
it is dropped. The range is from 4 to 60 hops. The default is 20.
Selects either Rapid Spanning Tree mode (rstp) or Multiple Spanning Tree mode
(mstp). The default mode is RSTP.
Globally turn RSTP/MSTP ON.
NOTE:
off
When RSTP is turned on, the configuration parameters for STP group 1 apply to RSTP.
Globally turn RSTP/MSTP OFF.
cur
Displays the current RSTP/MSTP configuration.
NOTE:
•
IEEE 802.1w standard-based RSTP implementation runs on one STG (i.e. same as one spanning tree
instance) only. As a result, if ‘rstp’ mode is selected under the /cfg/mrst/modecommand, then only a
single RSTP instance (default for STG 1) is supported for all VLANs, including the Default VLAN 1.
If multiple spanning tree instances are required, then select ‘mstp’ mode so that multiple VLANs are
handled by multiple spanning tree instances, as specified by IEEE 802.1s standard-based MSTP
implementation.
•
•
•
IEEE 802.1s MSTP supports rapid convergence using IEEE 802.1w RSTP.
PVST+ does not support rapid convergence in current versions.
Configuration Menu 114
NOTE:
The following configurations are unsupported:
•
•
HP PVST+ (default Spanning Tree setting) is NOT interoperable with Cisco Rapid PVST+.
HP MSTP/RSTP (with mode set to either ‘mstp’ or ‘rstp’) is NOT interoperable with Cisco Rapid PVST+.
The following configurations are supported:
•
•
HP PVST+ (default Spanning Tree setting) is interoperable with Cisco PVST+.
HP MSTP/RSTP (with mode set to ‘mstp’) is interoperable with Cisco MST/RSTP.
Common Internal Spanning Tree configuration
Command: /cfg/l2/mrst/cist
[Common Internal Spanning Tree Menu]
brg
port
- CIST Bridge parameter menu
- CIST Port parameter menu
default - Default Common Internal Spanning Tree and Member parameters
cur - Display current CIST parameters
The Common Internal Spanning Tree (CIST) provides compatibility with different MSTP regions and with devices
running different Spanning Tree instances. It is equivalent to Spanning Tree Group 0.
The following table describes the commands used to configure Common Internal Spanning Tree Configuration Menu
options.
Table 115 Common Internal Spanning Tree Configuration Menu options
Command
Description
brg
Displays the CIST Bridge Menu.
port <port number>
add <1-4095>
default
Displays the CIST Port Menu.
Adds VLANs to the CIST. Enter one VLAN per line, and press Enter to add the VLANs.
Resets all CIST parameters to their default values.
Displays the current CIST configuration.
cur
CIST bridge configuration
Command: /cfg/l2/mrst/cist/brg
[CIST Bridge Menu]
prior - Set CIST bridge Priority (0-65535)
mxage - Set CIST bridge Max Age (6-40 secs)
fwd
cur
- Set CIST bridge Forward Delay (4-30 secs)
- Display current CIST bridge parameters
CIST bridge parameters are used only when the switch is in MSTP mode. CIST parameters do not affect operation of
STP/PVST.
Configuration Menu 115
The following table describes the commands used to configure CIST Bridge Configuration Menu options parameters.
Table 116 CIST Bridge Configuration Menu options
Command
Description
prior <0-65535>
Configures the CIST bridge priority. The bridge priority parameter controls which bridge on the
network is the MSTP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other switches
and bridges on your network. The lower the value, the higher the bridge priority. The range is 0
to 65535, and the default is 32768.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration" section for
more information.
mxage <6-40>
fwd <4-30>
Configures the CIST bridge maximum age. The maximum age parameter specifies the maximum
time the bridge waits without receiving a configuration bridge protocol data unit before it
reconfigures the MSTP network. The range is 6 to 40 seconds, and the default is 20 seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration" section for
more information.
Configures the CIST bridge forward delay parameter. The forward delay parameter specifies the
amount of time that a bridge port has to wait before it changes from the listening state to the
learning state and from the learning state to the forwarding state. The range is 4 to 30 seconds,
and the default is 15 seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration" section for
more information.
cur
Displays the current CIST bridge configuration.
CIST port configuration
Command: /cfg/l2/mrst/cist/port <port number>
[CIST Port 1 Menu]
prior - Set port Priority (0-240)
cost
- Set port Path Cost (1-200000000)
hello - Set CIST port Hello Time (1-10 secs)
link
edge
on
off
cur
- Set MSTP link type (auto, p2p, or shared; default: auto)
- Enables or disables this port as an edge port
- Turn port's Spanning Tree ON
- Turn port's Spanning Tree OFF
- Display current port Spanning Tree parameters
CIST port parameters are used to modify MRST operation on an individual port basis. CIST parameters do not affect
operation of STP/PVST.
For each port, CIST is turned on by default. Port parameters include:
•
•
•
•
•
•
•
Port priority
Port path cost
Port Hello time
Link type
Edge
On and off
Current port configuration
The port option of MRST is turned on by default.
Configuration Menu 116
The following table describes the commands used to configure CIST Port Configuration Menu options.
Table 117 CIST Port Configuration Menu options
Command
Description
prior <0-240>
Configures the CIST port priority. The port priority helps determine which bridge port
becomes the designated port. In a network topology that has multiple bridge ports
connected to a single segment, the port with the lowest port priority becomes the
designated port for the segment. The range is 0 to 240, in steps of 16 (0, 16, 32...),
and the default is 128.
cost <1-200000000>
hello <1-10>
Configures the CIST port path cost. The port path cost is used to help determine the
designated port for a segment. Generally speaking, the faster the port, the lower the
path cost. The default is 20000 for Gigabit ports.
Configures the CIST port Hello time. The Hello time specifies how often the root bridge
transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the
root bridge uses the root bridge Hello value. The range is 1 to 10 seconds, and the
default is 2 seconds.
link auto|p2p|shared
edge disable|enable
Defines the type of link connected to the port, as follows:
auto: Configures the port to detect the link type, and automatically match its settings.
p2p: Configures the port for Point-To-Point protocol.
shared: Configures the port to connect to a shared medium (usually a hub).
The default link type is auto.
Enables or disables this port as an edge port. An edge port is not connected to a
bridge, and can begin forwarding traffic as soon as the link is up. Configure server
ports as edge ports (enabled). This command is disabled by default.
on
Enables CIST on the port.
off
cur
Disables CIST on the port.
Displays the current CIST port configuration.
Spanning Tree configuration
Command: /cfg/l2/stp
[Spanning Tree Group 1 Menu]
brg
port
add
- Bridge parameter menu
- Port parameter menu
- Add VLAN(s) to Spanning Tree Group
remove - Remove VLAN(s) from Spanning Tree Group
clear - Remove all VLANs from Spanning Tree Group
on
off
- Globally turn Spanning Tree ON
- Globally turn Spanning Tree OFF
default - Default Spanning Tree and Member parameters
cur - Display current bridge parameters
HP ProLiant BL p-Class GbE2 Interconnect Switch supports the IEEE 802.1d Spanning Tree Protocol (STP) and Cisco
proprietary PVST and PVST+ protocols. STP is used to prevent loops in the network topology. You can configure up to
32 spanning tree groups on the switch. This command is turned on by default.
NOTE: When RSTP is turned on, only STP group 1 can be configured.
The following table describes the Spanning Tree Configuration Menu options.
Table 118 Spanning Tree Configuration Menu options
Command
Description
brg
Displays the Bridge Spanning Tree Menu.
Displays the Spanning Tree Port Menu.
port <port number>
add <1-4095>
Associates a VLAN with a spanning tree and requires an external VLAN ID as a
parameter.
Configuration Menu 117
Table 118 Spanning Tree Configuration Menu options
Command
Description
remove <1-4095>
Breaks the association between a VLAN and a spanning tree and requires an
external VLAN ID as a parameter.
clear
on
Removes all VLANs from a spanning tree.
Globally enables Spanning Tree Protocol.
off
Globally disables Spanning Tree Protocol.
default
cur
Restores a spanning tree instance to its default configuration.
Displays current Spanning Tree Protocol parameters.
Bridge Spanning Tree configuration
Command: /cfg/l2/stp/brg
[Bridge Spanning Tree Menu]
prior - Set bridge Priority [0-65535]
hello - Set bridge Hello Time [1-10 secs]
mxage - Set bridge Max Age (6-40 secs)
fwd
cur
- Set bridge Forward Delay (4-30 secs)
- Display current bridge parameters
Spanning tree bridge parameters can be configured for each Spanning Tree Group. STP bridge parameters include:
•
•
•
•
•
Bridge priority
Bridge hello time
Bridge maximum age
Forwarding delay
Current bridge configuration
The following table describes the Bridge Spanning Tree Configuration Menu options.
Table 119 Bridge Spanning Tree Configuration Menu options
Command
Description
prior <0-65535>
Configures the bridge priority. The bridge priority parameter controls which bridge on the
network is the STP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other switches
and bridges on your network. The lower the value, the higher the bridge priority. The range is 0
to 65535, and the default is 32768.
RSTP/MSTP: The range is 0 to 61440, in steps of 4096 (0, 4096, 8192...), and the default is
32768.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
hello <1-10>
Configures the bridge hello time. The hello time specifies how often the root bridge transmits a
configuration bridge protocol data unit (BPDU).
Any bridge that is not the root bridge uses the root bridge hello value. The range is 1 to 10
seconds, and the default is 2 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
mxage <6-40>
fwd <4-30>
Configures the bridge maximum age. The maximum age parameter specifies the maximum time
the bridge waits without receiving a configuration bridge protocol data unit before it
reconfigures the STP network. The range is 6 to 40 seconds, and the default is 20 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
Configures the bridge forward delay parameter. The forward delay parameter specifies the
amount of time that a bridge port has to wait before it changes from the listening state to the
learning state and from the learning state to the forwarding state. The range is 4 to 30 seconds,
and the default is 15 seconds.
This command does not apply to MSTP. See the “Common Internal Spanning Tree
configuration” section for more information.
Configuration Menu 118
Table 119 Bridge Spanning Tree Configuration Menu options
Command
Description
cur
Displays the current bridge STP parameters.
When configuring STP bridge parameters, the following formulas must be used:
•
•
2*(fwd-1) > mxage
2*(hello+1) < mxage
Spanning Tree port configuration
Command: /cfg/l2/stp <1-32> / port <port number>
[Spanning Tree Port 1 Menu]
prior - Set port Priority (0-255)
cost
link
edge
on
- Set port Path Cost (1-65535, 0 for default)
- Set port link type (auto, p2p, or shared; default: auto)
- Enables or disables this port as an edge port
- Turn port's Spanning Tree ON
off
- Turn port's Spanning Tree OFF
cur
- Display current port Spanning Tree parameters
By default for STP/PVST+, Spanning tree is turned Off for downlink ports (1-16), and turned On for uplink and cross-
connect ports (17-24). By default for RSTP/MSTP, Spanning tree is turned On for all ports, with downlink ports
configured as Edge ports.
Spanning tree port parameters are used to modify STP operation on an individual port basis. STP port parameters
include:
•
•
Port priority
Port path cost
The following table describes the Spanning Tree Port Configuration Menu options.
Table 120 Spanning Tree Port Configuration Menu options
Command
Description
prior <0-255>
Configures the port priority. The port priority helps determine which bridge port becomes
the designated port.
In a network topology that has multiple bridge ports connected to a single segment, the
port with the lowest port priority becomes the designated port for the segment.
The range is 0 to 255, and the default is 128.
RSTP/MSTP: The range is 0 to 240, in steps of 16 (0, 16, 32...) and the default is 128.
cost <1-200000000>
Configures the port path cost. The port path cost is used to help determine the designated
port for a segment. Generally speaking, the faster the port, the lower the path cost.
The range is 1 to 65535. The default is 10 for 100Mb/s ports, and 1 for Gigabit ports.
A value of 0 indicates that the default cost will be computed for an auto-negotiated link
speed.
RSTP/MSTP: The range is 1 – 200000000, and the default it 20000 for Gigabit ports.
link auto|p2p|shared
Defines the type of link connected to the port, as follows:
auto: Configures the port to detect the link type, and automatically match its settings. This
is the default value.
p2p: Configures the port for Point-To-Point protocol.
shared: Configures the port to connect to a shared medium (usually a hub).
This command only applies when RSTP is turned on. See the “Common Internal Spanning
Tree configuration” section for more information.
edge disable|enable
Enables or disables this port as an edge port. An edge port is not connected to a bridge,
and can begin forwarding traffic as soon as the link is up. Configure server ports as
edge ports (enabled).
This command only applies when RSTP is turned on. See the “Common Internal Spanning
Tree configuration” section for more information.
on
Enables STP on the port.
Disables STP on the port.
off
Configuration Menu 119
Table 120 Spanning Tree Port Configuration Menu options
Command
Description
cur
Displays the current STP port parameters.
Forwarding Database configuration
Command: /cfg/l2/fdb
[FDB Menu]
static - Static FDB Menu
aging
cur
- Configure FDB aging value
- Display current FDB configuration
The following table describes the Forwarding Database Configuration Menu options.
Table 121 FDB Configuration Menu options
Command
Description
static
Displays the Static FDB Configuration Menu.
Configures the aging value for FDB entries. The default value is 300.
Displays current FDB parameters.
aging <0-65535>
cur
Static FDB configuration
Command: /cfg/l2/fdb/static
[Static FDB Menu]
add
del
- Add a permanent FDB entry
- Delete a static FDB entry
clear
cur
- Clear static FDB entries
- Display current static FDB configuration
The following table describes the Static FDB Configuration Menu options.
Table 122 Static FDB Configuration Menu options
Command
Description
add <MAC address> <VLAN> <port>
del <MAC address> <VLAN> <port>
Adds a static entry to the forwarding database.
Deletes a static entry from the forwarding database.
clear mac <MAC Address>|VLAN <1- Clears specified static FDB entries from the forwarding database, as
4095>| Port <port number>|All
follows:
•
•
•
•
MAC address
VLAN
Port
All
cur
Displays current static FDB parameters.
Configuration Menu 120
Trunk configuration
Command: /cfg/l2/trunk <1-12>
[Trunk group 1 Menu]
add
rem
ena
dis
del
cur
- Add port to trunk group
- Remove port from trunk group
- Enable trunk group
- Disable trunk group
- Delete trunk group
- Display current Trunk Group configuration
Trunk groups can provide super-bandwidth connections between GbE2 Interconnect Switches or other trunk capable
devices. A trunk is a group of ports that act together, combining their bandwidth to create a single, larger port. Up to
12 trunk groups can be configured on the GbE2 Interconnect Switch, with the following restrictions.
•
•
•
•
•
Any physical GbE2 Interconnect Switch port can belong to no more than one trunk group.
Up to six ports/trunks can belong to the same trunk group.
All ports in a trunk must have the same configuration for speed, flow control, and auto negotiation.
Trunking from other devices must comply with Cisco® EtherChannel® technology.
By default, port 17 and port 18 are trunked to support an internal switch-to-switch crosslink trunk.
NOTE: See the HP ProLiant BL p-Class GbE2 Interconnect Switch Application Guide for information on
how to use port trunks.
The following table describes the Trunk Group Configuration Menu options.
Table 123 Trunk Group Configuration Menu options
Command
Description
add <port number>
Adds a physical port to the current trunk group.
Removes a physical port from the current trunk group.
Enables the current trunk group.
rem <port number>
ena
dis
del
cur
Turns the current trunk group off.
Removes the current trunk group configuration.
Displays current trunk group parameters.
IP Trunk Hash configuration
Command: /cfg/l2/thash
[IP Trunk Hash Menu]
set
cur
- IP Trunk Hash Settings Menu
- Display current IP trunk hash configuration
The following table describes the IP Trunk Hash Configuration Menu options.
Table 124 IP Trunk Hash Configuration Menu options
Command
Description
Displays the Trunk Hash Settings menu.
Display current trunk hash configuration.
set
cur
Configuration Menu 121
Layer 2 IP Trunk Hash configuration
Command: /cfg/l2/thash/set
[set IP Trunk Hash Settings Menu]
smac
dmac
sip
- Enable/disable smac hash
- Enable/disable dmac hash
- Enable/disable sip hash
dip
- Enable/disable dip hash
cur
- Display current trunk hash setting
Trunk hash parameters are set globally for the GbE2 Interconnect Switch. You can enable one or two parameters, to
configure any of the following valid combinations:
•
•
•
•
•
•
SMAC (source MAC only)
DMAC (destination MAC only)
SIP (source IP only)
DIP (destination IP only)
SIP + DIP (source IP and destination IP)
SMAC + DMAC (source MAC and destination MAC)
The following table describes the IP Trunk Hash Configuration Menu options.
Table 125 IP Trunk Hash Set Menu options
Command
Description
smac enable|disable
dmac enable|disable
sip enable|disable
dip enable|disable
cur
Enable or disable trunk hashing on the source MAC.
Enable or disable trunk hashing on the destination MAC.
Enable or disable trunk hashing on the source IP.
Enable or disable trunk hashing on the destination IP.
Display current trunk hash configuration.
Link Aggregation Control Protocol configuration
Command: /cfg/l2/lacp
[LACP Menu]
sysprio - Set LACP system priority
timeout - Set LACP system timeout scale for timing out partner info
port - LACP port Menu
cur - Display current LACP configuration
The following table describes the LACP Configuration Menu options.
Table 126 LACP Configuration Menu options
Command
Description
sysprio <1-65535>
Defines the priority value (1 through 65535) for the switch. Lower
numbers provide higher priority. The default value is 32768.
timeout short|long
Defines the timeout period before invalidating LACP data from a remote
partner. Choose short(3 seconds) or long(90 seconds). The default
value is long.
NOTE:
HP recommends that you use a timeout value of long, to reduce LACPDU processing. If your switch’s CPU
utilization rate remains at 100% for periods of 90 seconds or more, consider using static trunks instead of LACP.
port <port number>
Displays the LACP Port menu.
cur
Display current LACP configuration.
Configuration Menu 122
LACP Port configuration
Command: /cfg/l2/lacp/port <port number>
[LACP Port 2 Menu]
mode
prio
- Set LACP mode
- Set LACP port priority
adminkey - Set LACP port admin key
cur
- Display current LACP port configuration
The following table describes the LACP Port Configuration Menu options.
Table 127 LACP Port Configuration Menu options
Command
Description
mode off|active|passive
Set the LACP mode for this port, as follows:
•
off
Turn LACP off for this port. You can use this port to manually configure a
static trunk. The default value is off.
•
•
active
Turn LACP on and set this port to active. Active ports initiate LACPDUs.
passive
Turn LACP on and set this port to passive. Passive ports do not initiate
LACPDUs, but respond to LACPDUs from active ports.
prio <1-65535>
adminkey <1-65535>
cur
Sets the priority value for the selected port. Lower numbers provide higher
priority. Default is 128.
Set the admin key for this port. Only ports with the same admin key and oper
key (operational state generated internally) can form a LACP trunk group.
Displays the current LACP configuration for this port.
Hot Links configuration
Command: /cfg/l2/hotlink
[Hot Links Menu]
trigger - Trigger Menu
sndfdb - Enable/disable FDB update
on
- Globally turn Hot Links ON
off
cur
- Globally turn Hot Links OFF
- Display current Hot Links configuration
The following table describes the Hot Links Menu options.
Table 128 Hot Links Menu options
Command
Description
trigger <1-4>
sndfdb enable|disable
Displays the Hot Links trigger menu.
Enables or disables FDB Update, which allows the GbE2 to send FDB and
MAC update packets over the active interface.
The default value is disabled.
on
Globally turns Hot Links on.
off
cur
Globally turns Hot Links off. The default option is off.
Displays the current Hot Links configuration.
Configuration Menu 123
Hot Links Trigger configuration
Command: /cfg/l2/hotlink/trigger <trigger number>
[Trigger 1 Menu]
master - Master Menu
backup - Backup Menu
fdelay - Set Forward Delay (secs)
name
- Set Trigger Name
preempt - Enable/disable Preemption
ena
dis
cur
- Enable Trigger
- Disable Trigger
- Display current Trigger configuration
The following table describes the Hot Links Trigger Menu options.
Table 129 Hot Links Trigger Menu options
Command
Description
master
Displays the Master interface menu for the selected trigger.
Displays the Backup interface menu for the selected trigger.
Configures the Forward Delay interval, in seconds. The default value is 1.
Configures a name for the trigger.
backup
fdelay <0-3600>
name <string>
preempt enable|disable
Enables or disables pre-emption, which allows the Master interface to transition
to the Active state whenever it becomes available.
The default option is enabled.
ena
dis
cur
Enables the Hot Links trigger.
Disables the Hot Links trigger.
Displays the current trigger configuration.
Hot Links Master configuration
Command: /cfg/l2/hotlink/trigger/master
[Master Menu]
port
trunk
cur
- Set port in Master
- Set trunk in Master
- Display current Master configuration
The following table describes the Hot Links Master Menu options.
Table 130 Hot Links Master Menu options
Command
Description
port <port number (17-24)>
Adds the selected port to the Master interface.
Adds the selected trunk to the Master interface.
Displays the current Master configuration.
trunk <1-12>
cur
Hot Links Backup configuration
Command: /cfg/l2/hotlink/trigger/backup
[Backup Menu]
port
trunk
cur
- Set port in Backup
- Set trunk in Backup
- Display current Backup configuration
The following table describes the Hot Links Backup Menu options.
Configuration Menu 124
Table 131 Hot Links Backup Menu options
Command
Description
port <port number (17-24)>
Adds the selected port to the Backup interface.
Adds the selected trunk to the Backup interface.
Displays the current Backup configuration.
trunk <1-12>
cur
VLAN configuration
Command: /cfg/l2/vlan <1-4095>
[VLAN 1 Menu]
name
stg
add
rem
def
ena
dis
del
cur
- Set VLAN name
- Assign VLAN to a Spanning Tree Group
- Add port to VLAN
- Remove port from VLAN
- Define VLAN as list of ports
- Enable VLAN
- Disable VLAN
- Delete VLAN
- Display current VLAN configuration
The commands in this menu configure VLAN attributes, change the status of the VLAN, delete the VLAN, and change
the port membership of the VLAN.
By default, the VLAN menu option is disabled except VLAN 1, which is always enabled. The GbE2 Interconnect
Switch supports a maximum of 1,000 VLANs.
NOTE: See the HP ProLiant BL p-Class GbE2 Interconnect Switch Application Guide for information on VLANs.
The following table describes the VLAN Configuration Menu options.
Table 132 VLAN Configuration Menu options
Command
Description
name <1-32 characters>
Assigns a name to the VLAN or changes the existing name. The default
VLAN name is the first one.
stg <1-32>
Assigns a VLAN to a spanning tree group.
add <port number>
rem <port number>
def <list of port numbers>
Adds ports or trunk groups to the VLAN membership.
Removes ports or trunk groups from this VLAN.
Defines which ports are members of this VLAN. Every port must be a
member of at least one VLAN. By default, it defines ports to VLAN 1.
ena
dis
del
cur
Enables this VLAN.
Disables this VLAN without removing it from the configuration.
Deletes this VLAN.
Displays the current VLAN configuration.
IMPORTANT: All ports must belong to at least one VLAN. Any port which is removed from a VLAN and which
is not a member of any other VLAN is automatically added to default VLAN #1. You cannot remove a port
from VLAN #1 if the port has no membership in any other VLAN. Also, you cannot add a port to more than
one VLAN unless the port has VLAN tagging turned on. Refer to the tag command, in the “Port configuration”
section earlier in this chapter.
Configuration Menu 125
Layer 3 configuration
Command: /cfg/l3
[Layer 3 Menu]
if
- Interface Menu
- Default Gateway Menu
- Static Route Menu
gw
route
arp
- ARP Menu
frwd
nwf
rmap
rip
ospf
igmp
dns
bootp
vrrp
rtrid
cur
- Forwarding Menu
- Network Filters Menu
- Route Map Menu
- Routing Information Protocol Menu
- Open Shortest Path First (OSPF) Menu
- IGMP Menu
- Domain Name System Menu
- Bootstrap Protocol Relay Menu
- Virtual Router Redundancy Protocol Menu
- Set router ID
- Display current IP configuration
The following table describes the Layer 3 Configuration Menu options.
Table 133 L3 Configuration Menu options
Command
if <1-255>
gw <1-4>
route
Description
Displays the IP Interface Menu.
Displays the IP Default Gateway Menu.
Displays the IP Static Route Menu.
Displays the Address Resolution Protocol Menu.
Displays the IP Forwarding Menu.
Displays the Network Filter Configuration Menu.
Displays the Route Map Menu.
arp
frwd
nwf <1-256>
rmap <1-32>
rip
Displays the Routing Interface Protocol Menu.
Displays the OSPF Menu.
ospf
igmp
Displays the IGMP Menu.
dns
Displays the IP Domain Name System Menu.
Displays the Bootstrap Protocol Menu.
Displays the Virtual Router Redundancy Configuration Menu.
Sets the router ID.
bootp
vrrp
rtrid <IP address>
cur
Displays the current IP configuration.
IP interface configuration
Command: /cfg/l3/if <1-255>
[IP Interface 1 Menu]
addr
mask
vlan
relay
ena
- Set IP address
- Set subnet mask
- Set VLAN number
- Enable/disable BOOTP relay
- Enable IP interface
- Disable IP interface
dis
del
cur
- Delete IP interface
- Display current interface configuration
The GbE2 Interconnect Switch can be configured with up to 255 IP interfaces. Each IP interface represents the GbE2
Interconnect Switch on an IP subnet on your network. The IP Interface option is disabled by default.
The following table describes the IP Interface Configuration Menu options.
Table 134 IP Interface Configuration Menu options
Configuration Menu 126
Command
Description
addr <IP address>
Configures the IP address of the switch interface, using dotted decimal
notation.
For example,100.10.1.1
mask <IP subnet mask>
vlan <1-4095>
Configures the IP subnet address mask for the interface using dotted decimal
notation. For example, 255.255.255.0
Configures the VLAN number for this interface. Each interface can belong to
one VLAN, though any VLAN can have multiple IP interfaces in it.
relay disable|enable
Enables or disables the BOOTP relay on this interface. BOOTP Relay is
enabled by default.
ena
dis
del
cur
Enables this IP interface.
Disables this IP interface.
Removes this IP interface.
Displays the current interface settings.
NOTE: If you enter an IP address, you will be prompted to change the BOOTP setting.
Default Gateway configuration
Command: /cfg/l3/gw <1-4>
[Default gateway 1 Menu]
addr
intr
- Set IP address
- Set interval between ping attempts
retry - Set number of failed attempts to declare gateway DOWN
arp
ena
dis
del
cur
- Enable/disable ARP only health checks
- Enable default gateway
- Disable default gateway
- Delete default gateway
- Display current default gateway configuration
The GbE2 Interconnect Switch supports up to four gateways. By default, no gateways are configured on the switch.
Enter 1, 2, 3, or 4 in the command as the <gateway number>, depending upon which gateway you want to
configure.
The following table describes the Default IP Gateway Configuration Menu options.
Table 135 Default IP Gateway Configuration Menu options
Command
Description
addr <IP address>
Configures the IP address of the default IP gateway using dotted decimal
notation.
For example, 100.10.1.1
intr <0-60>
The switch pings the default gateway to verify that it is up. The intr option
sets the time between health checks. The range is from 0 to 60 seconds.
The default is 2 seconds.
retry <1-120>
arp disable|enable
Sets the number of failed health check attempts required before declaring
this default gateway inoperative. The range is from 1 to 120 attempts. The
default is 8 attempts.
Enables or disables Address Resolution Protocol (ARP) health checks. This
command is disabled by default.
ena
dis
del
cur
Enables the gateway for use.
Disables the gateway.
Deletes the gateway from the configuration.
Displays the current gateway settings.
Configuration Menu 127
IP Static Route configuration
Command: /cfg/l3/route
[IP Static Route Menu]
add
rem
cur
- Add static route
- Remove static route
- Display current static route configuration
The following table describes the Static Route Configuration Menu options.
Table 136 Static Route Configuration Menu options
Command
Description
add <IP address> <IP subnet
mask> <gateway> <interface>
Adds a static route. You will be prompted to enter a destination IP address,
destination subnet mask, and gateway address. Enter all addresses using
dotted decimal notation.
rem <IP address> <IP subnet
mask>
Removes a static route. The destination address of the route to remove must be
specified using dotted decimal notation.
cur
Displays the current IP configuration.
Address Resolution Protocol configuration
Command: /cfg/l3/arp
[ARP Menu]
static - Static ARP Menu
rearp
cur
- Set re-ARP period in minutes
- Display current ARP configuration
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves a physical
address from an IP address. ARP queries machines on the local network for their physical addresses. ARP also
maintains IP to physical address pairs in its cache memory. In any IP communication, the ARP cache is consulted to
see if the IP address of the computer or the router is present in the ARP cache. Then the corresponding physical
address is used to send a packet.
The following table describes the ARP Configuration Menu options.
Table 137 ARP Configuration Menu options
Command
Description
static
Displays Static ARP menu.
rearp <2-120>
Defines re-ARP period in minutes. You can set this duration between two and
120 minutes.
cur
Displays the current ARP configurations.
ARP Static configuration
Command: /cfg/l3/arp/static
[Static ARP Menu]
add
del
cur
- Add a permanent ARP entry
- Delete an ARP entry
- Display current static ARP configuration
Static ARP entries are permanent in the ARP cache and do not age out like the ARP entries that are learnt
dynamically. Static ARP entries enable the switch to reach the hosts without sending an ARP broadcast request to the
network. Static ARPs are also useful to communicate with devices that do not respond to ARP requests. Static ARPs
can also be configured on some gateways as a protection against malicious ARP Cache corruption and possible DOS
attacks.
The following table describes the Static ARP Configuration Menu options.
Configuration Menu 128
Table 138 Static ARP Configuration Menu options
Command
Description
add <IP address> <MAC address>
<VLAN number> <port number>
Adds a permanent ARP entry.
del <IP address>
Deletes a permanent ARP entry.
cur
Displays current static ARP configuration.
IP Forwarding configuration
Command: /cfg/l3/frwd
[IP Forwarding Menu]
dirbr
on
off
cur
- Enable/disable forwarding directed broadcasts
- Globally turn IP Forwarding ON
- Globally turn IP Forwarding OFF
- Display current IP Forwarding configuration
The following table describes the IP Forwarding Configuration Menu options.
Table 139 IP Forwarding Configuration Menu options
Command
Description
dirbr disable|enable
Enables or disables forwarding directed broadcasts. This command is disabled
by default.
on
Enables IP forwarding (routing) on the GbE2 Interconnect Switch.
off
Disables IP forwarding (routing) on the GbE2 Interconnect Switch. Forwarding
is turned off by default.
cur
Displays the current IP forwarding settings.
Network Filter configuration
Command: /cfg/l3/nwf <1-256>
[IP Network Filter 1 Menu]
addr
mask
- IP Address
- IP Subnet mask
enable - Enable Network Filter
disable - Disable Network Filter
delete - Delete Network Filter
current - Display current Network Filter configuration
The following table describes the Network Filter Configuration Menu options.
Table 140 Network Filter Configuration Menu options
Command
Description
addr <IP address>
mask <IP subnet mask>
Sets the starting IP address for this filter. The default address is 0.0.0.0
Sets the IP subnet mask that is used with /cfg/l3/nwf/addrto define the
range of IP addresses that will be accepted by the peer when the filter is
enabled. The default value is 0.0.0.0
enable
disable
delete
current
Enables the Network Filter configuration.
Disables the Network Filter configuration.
Deletes the Network Filter configuration.
Displays the current the Network Filter configuration.
Route Map configuration
Command: /cfg/l3/rmap <1-32>
Configuration Menu 129
[IP Route Map 1 Menu]
alist
- Access List number
aspath - AS Filter Menu
ap
lp
- Set as-path prepend of the matched route
- Set local-preference of the matched route
metric - Set metric of the matched route
type
prec
- Set OSPF metric-type of the matched route
- Set the precedence of this route map
weight - Set weight of the matched route
enable - Enable route map
disable - Disable route map
delete - Delete route map
current - Display current route map configuration
Routing maps control and modify routing information. The map number (1-32) represents the routing map you wish to
configure.
The following table describes the Route Map Configuration Menu options.
Table 141 Route Map Configuration Menu options
Command
Description
alist <1-8>
aspath <1-8>
Displays the Access List menu.
Displays the Autonomous System (AS) Filter menu.
ap <AS number> [<AS number>]
[<AS number>]|none
Sets the AS path preference of the matched route. One to three path
preferences can be configured.
lp <0-4294967294>|none
Sets the local preference of the matched route, which affects both inbound
and outbound directions. The path with the higher preference is preferred.
metric <0-4294967294>|none
Sets the metric of the matched route.
type 1|2|none
Assigns the type of OSPF metric. The default is type 1.
•
•
•
Type 1—External routes are calculated using both internal and external
metrics.
Type 2—External routes are calculated using only the external metrics.
Type 2 routes have more cost than Type 2.
none—Removes the OSPF metric.
prec <1-256>
Sets the precedence of the route map. The smaller the value, the higher the
precedence. Default value is 10.
weight <0-65534>|none
Sets the weight of the route map.
Enables the route map.
enable
disable
delete
cur
Disables the route map.
Deletes the route map.
Displays the current route configuration.
Configuration Menu 130
IP Access List configuration
Command: /cfg/l3/rmap <1-32>/alist <1-8>
[IP Access List 1 Menu]
nwf
- Network Filter number
metric - Metric
action - Set Network Filter action
enable - Enable Access List
disable - Disable Access List
delete - Delete Access List
current - Display current Access List configuration
The route map number (1-32) and the access list number (1-8) represent the IP access list you wish to configure. The
following table describes the IP Access List Configuration Menu options.
Table 142 IP Access List Configuration Menu options
Command
Description
nwf <1-256>
Sets the network filter number.
Sets the metric value in the AS-External (ASE) LSA.
Permits or denies action for the access list.
Enables the access list.
metric <1-4294967294>|none
action permit|deny
enable
disable
Disables the access list.
delete
Deletes the access list.
cur
Displays the current Access List configuration.
Autonomous System Path configuration
Command: /cfg/l3/rmap <1-32>/aspath <1-8>
[AS Filter 1 Menu]
as
- AS number
action - Set AS Filter action
enable - Enable AS Filter
disable - Disable AS Filter
delete - Delete AS Filter
current - Display current AS Filter configuration
The rmap number (1-32) and the path number (1-8) represent the AS path you wish to configure. The following table
describes the Autonomous System Path Configuration Menu options.
Table 143 Autonomous System Path Configuration Menu options
Command
Description
as <1-65535>
action permit|deny
enable
Sets the Autonomous System filter’s path number.
Permits or denies Autonomous System filter action.
Enables the Autonomous System filter.
Disables the Autonomous System filter.
Deletes the Autonomous System filter.
Displays the current Autonomous System filter configuration.
disable
delete
cur
Configuration Menu 131
Routing Information Protocol configuration
Command: /cfg/l3/rip
[Routing Information Protocol Menu]
if
- RIP Interface Menu
update - Set update period in seconds
redist - RIP Route Redistribute Menu
on
off
- Globally turn RIP ON
- Globally turn RIP OFF
current - Display current RIP configuration
The RIP Menu is used for configuring Routing Information Protocol parameters. This option is turned off by default.
The following table describes the RIP Configuration Menu options.
Table 144 RIP Configuration Menu options
Command
Description
if <1-255>
update <1-120>
Displays the RIP Interface menu.
Configures the time interval for sending for RIP table updates, in seconds.
The default value is 30 seconds.
redist
on
Displays the RIP Route Redistribute menu.
Globally turns RIP on.
off
Globally turns RIP off.
cur
Displays the current RIP configuration.
RIP Interface configuration
Command: /cfg/l3/rip/if <1-255>
[RIP Interface 1 Menu]
version - Set RIP version
supply - Enable/disable supplying route updates
listen - Enable/disable listening to route updates
poison - Enable/disable poisoned reverse
split
trigg
mcast
- Enable/disable split horizon
- Enable/disable triggered updates
- Enable/disable multicast updates
default - Set default route action
metric - Set metric
auth
key
- Set authentication type
- Set authentication key
enable - Enable interface
disable - Disable interface
current - Display current RIP interface configuration
The RIP Menu is used for configuring Routing Information Protocol parameters. This option is turned off by default.
NOTE: Do not configure RIP1 parameters if your routing equipment uses RIP version 2.
The following table describes the RIP Interface Configuration Menu options.
Table 145 RIP Interface Configuration Menu options
Command
Description
version 1|2|both
Configures the RIP version used by this interface.
The default value is version 2.
supply disable|enable
listen disable|enable
poison disable|enable
When enabled, the switch supplies routes to other routers. This command is
enabled by default.
When enabled, the switch learns routes from other routers. This command is
enabled by default.
When enabled, the switch uses split horizon with poisoned reverse. When
disabled, the switch uses only split horizon. The default value is disabled.
Configuration Menu 132
Table 145 RIP Interface Configuration Menu options
Command
Description
split disable|enable
trigg disable|enable
Enables or disables split horizon. The default value is enabled.
Enables or disables Triggered Updates. Triggered Updates are used to speed
convergence. When enabled, Triggered Updates force a router to send update
messages immediately, even if it is not yet time for the update message. The
default value is disabled.
mcast disable|enable
default disable|enable
Enables or disables multicast updates of the routing table (using address
224.0.0.9). The default value is enabled.
When enabled, the switch accepts RIP default routes from other routers, but
gives them lower priority than configured default gateways. When disabled,
the switch rejects RIP default routes. The default value is disabled.
metric <1-15>
Configures the route metric, which indicates the relative distance to the
destination. The default value is 1.
auth none|password
Configures the authentication type. The default is none.
Configures the authentication key password.
Enables this RIP interface.
key
enable
disable
cur
Disables this RIP interface.
Displays the current RIP configuration.
RIP Route Redistribution configuration
Command: /cfg/l3/rip/redist fixed|static|ospf|eospf
[RIP Redistribute Fixed Menu]
add
rem
- Add rmap into route redistribution list
- Remove rmap from route redistribution list
export - Export all routes of this protocol
cur - Display current route-maps added
The following table describes the RIP Route Redistribute Menu options.
Table 146 RIP Interface Configuration Menu options
Command
Description
add <1-32> <1-32>|all
Adds selected routing maps to the RIP route redistribution list. To add all the 32
route maps, enter all. To add specific route maps, enter routing map numbers
one per line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of the
redistribution protocol matched by the route maps in the route redistribution list
will be redistributed.
remove <1-32> <1-32>|all
Removes the route map from the RIP route redistribution list.
Removes routing maps from the list. To remove all 32 route maps, enter all.
To remove specific route maps, enter routing map numbers one per line, NULL
at end.
export <1-15>|none
Exports the routes of this protocol in which the metric and metric type are
specified. To remove a previous configuration and stop exporting the routes of
the protocol, enter none.
cur
Displays the current RIP route redistribute configuration.
Configuration Menu 133
Open Shortest Path First configuration
Command: /cfg/l3/ospf
[Open Shortest Path First Menu]
aindex - OSPF Area (index) Menu
range
if
virt
- OSPF Summary Range Menu
- OSPF Interface Menu
- OSPF Virtual Links Menu
md5key - OSPF MD5 Key Menu
host - OSPF Host Entry Menu
redist - OSPF Route Redistribute Menu
lsdb - Set the LSDB limit for external LSA
default - Export default route information
on
off
cur
- Globally turn OSPF ON
- Globally turn OSPF OFF
- Display current OSPF configuration
The following table describes the Open Shortest Path First Menu options.
Table 147 OSPF Configuration Menu options
Command
Description
aindex <0-2>
Displays the area index menu. This area index does not represent the
actual OSPF area number.
range <1-16>
if <1-255>
virt <1-3>
Displays summary routes menu for up to 16 IP addresses.
Displays the OSPF interface configuration menu.
Displays the Virtual Links menu used to configure OSPF for a Virtual
Link.
md5key <1-255 characters>
host <1-128>
Assigns a string to MD5 authentication key.
Displays the menu for configuring OSPF for the host routes. Up to 128
host routes can be configured. Host routes are used for advertising
network device IP addresses to external networks to perform server load
balancing within OSPF. It also makes Area Border Route (ABR) load
sharing and ABR failover possible.
redist
Displays Route Distribution Menu.
<fixed|static|rip|ebgp|ibgp>
lsdb <0-2000>
Sets the link state database limit. Enter 0 (zero) for no limit.
default <1-16777215> 1|2>|none
Sets one default route among multiple choices in an area.
Enter nonefor no default route.
on
Enables OSPF.
off
cur
Disables OSPF.
Displays the current OSPF configuration settings.
Configuration Menu 134
OSFP Area Index configuration
Command: /cfg/l3/ospf/aindex <0-2>
[OSPF Area (index) 1 Menu]
areaid - Set area ID
type
- Set area type
metric - Set stub area metric
auth
spf
- Set authentication type
- Set time interval between two SPF calculations
enable - Enable area
disable - Disable area
delete - Delete area
cur
- Display current OSPF area configuration
The following table describes the Area Index Configuration Menu options.
Table 148 OSPF Area Index Configuration Menu options
Command
Description
areaid <IP address>
type transit|stub|nssa
Defines the IP address of the OSPF area number.
Defines the type of area. For example, when a virtual link has to be established
with the backbone, the area type must be defined as transit.
•
Transit area: allows area summary information to be exchanged between
routing devices. Any area that is not a stub area or NSSA is considered to be
transit area.
•
•
Stub area: is an area where external routing information is not distributed.
Typically, a stub area is connected to only one other area.
NSSA: Not-So-Stubby Area (NSSA) is similar to stub area with additional
capabilities. For example, routes originating from within the NSSA can be
propagated to adjacent transit and backbone areas. External routes from
outside the Autonomous System (AS) can be advertised within the NSSA but
are not distributed into other areas.
metric <1-65535>
Configures a stub area to send a numeric metric value. All routes received via that
stub area carry the configured metric to potentially influencing routing decisions.
Metric value assigns the priority for choosing the switch for default route. Metric
type determines the method for influencing routing decisions for external routes.
auth none|password|md5
Defines the authentication method, as follows:
None: No authentication required.
Password: Authenticates simple passwords so that only trusted routing devices
can participate.
MD5: This parameter is used when MD5 cryptographic authentication is required.
spf <0-255>
Sets time interval between two successive SPF (shortest path first) calculations of the
shortest path tree using the Dijkstra’s algorithm.
enable
disable
delete
cur
Enables the OSPF area.
Disables the OSPF area.
Deletes the OSPF area.
Displays the current OSPF configuration.
Configuration Menu 135
OSPF Summary Range configuration
Command: /cfg/l3/ospf/range <1-16>
[OSPF Summary Range 1 Menu]
addr
mask
- Set IP address
- Set IP mask
aindex - Set area index
hide
- Enable/disable hide range
enable - Enable range
disable - Disable range
delete - Delete range
cur
- Display current OSPF summary range configuration
The following table describes the OSPF Summary Range Configuration Menu options.
Table 149 OSPF Summary Range Configuration Menu options
Command
Description
addr <IP Address>
Configures the base IP address for the range.
For example, 100.10.1.1
mask <IP address mask>
aindex <0-2>
hide disable|enable
enable
Configures the IP address mask for the range.
Configures the area index used by the switch.
Hides the OSPF summary range.
Enables the OSPF summary range.
disable
Disables the OSPF summary range.
Deletes the OSPF summary range.
delete
cur
Displays the current OSPF summary range.
OSPF Interface configuration
Command: /cfg/l3/ospf/if <1-255>
[OSPF Interface 1 Menu]
aindex - Set area index
prio
cost
hello
dead
trans
retra
key
- Set interface router priority
- Set interface cost
- Set hello interval in seconds
- Set dead interval in seconds
- Set transit delay in seconds
- Set retransmit interval in seconds
- Set authentication key
mdkey
- Set MD5 key ID
enable - Enable interface
disable - Disable interface
delete - Delete interface
cur
- Display current OSPF interface configuration
The following table describes the OSPF Interface Configuration Menu options.
Table 150 OSPF Interface Configuration Menu options
Command
Description
aindex <0-2>
prio <0-255>
Configures the OSPF area index.
Configures the assigned priority value to the OSPF interfaces.
(A priority value of 127 is the highest and 1 is the lowest. A priority value of 0
specifies that the interface cannot be used as Designated Router (DR) or Backup
Designated Router (BDR).)
cost <1-65535>
hello <1-65535>
Configures cost set for the selected path—preferred or backup. Usually the cost
is inversely proportional to the bandwidth of the interface. Low cost indicates
high bandwidth.
Configures the interval in seconds between the hellopackets for the
interfaces.
Configuration Menu 136
Table 150 OSPF Interface Configuration Menu options
Command
Description
dead <1-65535>
Configures the health parameters of a hellopacket, which is set for an
interval of seconds before declaring a silent router to be down.
trans <1-3600>
retra <1-3600>
key <key string>|none
mdkey <1-255>|none
enable
Configures the transit delay in seconds.
Configures the retransmit interval in seconds.
Sets the authentication key to clear the password.
Assigns an MD5 key to the interface.
Enables the OSPF interface.
disable
Disables the OSPF interface.
delete
Deletes the OSPF interface.
cur
Displays the current settings for OSPF interface.
OSPF Virtual Link configuration
Command: /cfg/l3/ospf/virt <1-3>
[OSPF Virtual Link 1 Menu]
aindex - Set area index
hello
dead
trans
retra
nbr
- Set hello interval in seconds
- Set dead interval in seconds
- Set transit delay in seconds
- Set retransmit interval in seconds
- Set router ID of virtual neighbor
- Set authentication key
key
mdkey
- Set MD5 key ID
enable - Enable interface
disable - Disable interface
delete - Delete interface
cur
- Display current OSPF interface configuration
The following table describes the OSPF Virtual Link Configuration Menu options.
Table 151 OSPF Virtual Link Configuration Menu options
Command
Description
aindex <0-2>
hello <1-65535>
Configures the OSPF area index.
Configures the authentication parameters of a hello packet, which is set
to be in an interval of seconds.
dead <1-65535>
Configures the health parameters of a hello packet, which is set to be in
an interval of seconds. Default is 40 seconds.
trans <1-3600>
retra <1-3600>
nbr <IP address>
key <password>
Configures the delay in transit in seconds. Default is one second.
Configures the retransmit interval in seconds. Default is five seconds.
Configures the router ID of the virtual neighbor. Default is 0.0.0.0
Configures the password (up to eight characters) for each virtual link.
Default is none.
mdkey <1-255>|none
enable
Sets MD5 key ID for each virtual link. Default is none.
Enables OSPF virtual link.
disable
Disables OSPF virtual link.
delete
Deletes OSPF virtual link.
cur
Displays the current OSPF virtual link settings.
OSPF Host Entry configuration
Command: /cfg/l3/ospf/host <1-128>
Configuration Menu 137
[OSPF Host Entry 1 Menu]
addr
- Set host entry IP address
aindex - Set area index
cost
- Set cost of this host entry
enable - Enable host entry
disable - Disable host entry
delete - Delete host entry
cur
- Display current OSPF host entry configuration
The following table describes the OSPF Host Entry Configuration Menu options.
Table 152 OSPF Host Entry Configuration Menu options
Command
Description
addr <IP address>
Configures the base IP address for the host entry.
For example, 100.10.1.1
aindex <0-2>
cost <1-65535>
enable
Configures lays the area index of the host.
Configures the cost value of the host.
Enables OSPF host entry.
disable
Disables OSPF host entry.
delete
Deletes OSPF host entry.
cur
Displays the current OSPF host entries.
OSPF Route Redistribution configuration
Command: /cfg/l3/ospf/redist fixed|static|rip|ebgp|ibgp
[OSPF Redistribute Fixed Menu]
add
rem
- Add rmap into route redistribution list
- Remove rmap from route redistribution list
export - Export all routes of this protocol
cur - Display current route-maps added
The following table describes the OSPF Route Redistribution Configuration Menu options.
Table 153 OSPF Route Redistribution Configuration Menu options
Command
Description
add <1-32> <1-32>|all
Adds selected routing maps to the rmap list. To add all the 32 route maps,
enter all. To add specific route maps, enter routing map numbers one per
line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of the
redistribution protocol matched by the route maps in the route redistribution list
will be redistributed.
rem <1-32> <1-32> ... |all
Removes the route map from the route redistribution list.
Removes routing maps from the rmaplist. To remove all 32 route maps, enter
all. To remove specific route maps, enter routing map numbers one per line,
NULL at end.
export <1-16777215> 1|2|none Exports the routes of this protocol as external OSPF AS-external LSAs in which
the metric and metric type are specified. To remove a previous configuration
and stop exporting the routes of the protocol, enter none.
cur
Displays the current route map settings.
Configuration Menu 138
OSPF MD5 Key configuration
Command: /cfg/l3/ospf/md5key <key ID>
[OSPF MD5 Key 1 Menu]
key
- Set authentication key
delete - Delete key
cur
- Display current MD5 key configuration
The following table describes the OSPF MD5 Key Configuration Menu options.
Table 154 OSPF MD5 Key Configuration Menu options
Command
key
Description
Sets the authentication key for this OSPF packet.
Deletes the authentication key for this OSPF packet.
Displays the current MD5 key configuration.
delete
cur
IGMP configuration
Command: /cfg/l3/igmp
[IGMP Menu]
snoop
- IGMP Snoop Menu
mrouter - Static Multicast Router Menu
igmpflt - IGMP Filtering Menu
on
- Globally turn IGMP ON
off
cur
- Globally turn IGMP OFF
- Display current IGMP configuration
IGMP Snooping allows the switch to forward multicast traffic only to those ports that request it. IGMP Snooping
prevents multicast traffic from being flooded to all ports. The switch learns which server hosts are interested in
receiving multicast traffic, and forwards it only to ports connected to those servers.
The following table describes the IGMP Menu options.
Table 155 IGMP Snoop Menu options
Command
snoop
mrouter
igmpflt
on
Description
Displays the IGMP Snoop Menu.
Displays the Static Multicast Router Menu.
Displays the IGMP Filtering Menu.
Globally turns IGMP on.
off
Globally turns IGMP off.
cur
Displays the current IGMP configuration parameters.
Configuration Menu 139
IGMP snooping configuration
Command: /cfg/l3/igmp/snoop
[IGMP Snoop Menu]
timeout - Set report timeout
mrto - Set multicast router timeout
qintrval - Set IGMP query interval
robust - Set expected packet loss on subnet
aggr
srcip
add
rem
clear
- Aggregate IGMP report
- Set source ip to use when proxying GSQ
- Add VLAN(s) to IGMP Snooping
- Remove VLAN(s) from IGMP Snooping
- Remove all VLAN(s) from IGMP Snooping
fastlv - Enable/disable Fastleave processing in VLAN
cur - Display current IGMP Snooping configuration
The following table describes the IGMP Snoop Configuration Menu options.
Table 156 IGMP Snoop Menu options
Command
Description
timeout <1-255>
Sets the Maximum Response Time (MRT) for IGMP hosts. MRT is one of
the parameters used to determine the age out period of the IGMP hosts.
Increasing the timeout increases the age out period.
The range is from 1 to 255 seconds. The default is 10 seconds
mrto <1-600>
Configures the age-out period for the IGMP Mrouters in the Mrouter
table. If the switch does not receive a General Query from the Mrouter
for mrtoseconds, the switch removes the multicast router from its
Mrouter table.
The range is from 1 to 600 seconds. The default is 255 seconds.
qintrval <1-600>
robust <2-10>
Sets the IGMP router query interval. The range is 1-600 seconds. The
default value is 125.
Configures the IGMP Robustness variable, which allows you to tune the
switch for expected packet loss on the subnet. If the subnet is expected to
be lossy (high rate of packet loss), then increase the value. The default
value is 2.
aggr disable|enable
Enables or disables IGMP Membership Report aggregation.
srcip <IP address>
Configures the source IP address used as a proxy for IGMP Group
Specific Queries.
add <1-4095>
Adds the VLAN to IGMP Snooping.
rem <1-4095>
Removes the VLAN from IGMP Snooping.
Removes all VLANs from IGMP Snooping.
clear
fastlv <1-4095> disable|enable
Enables or disables Fastleave processing. Fastleave allows the switch to
immediately remove a port from the IGMP port list, if the host sends a
Leave message, and the proper conditions are met. This command is
disabled by default.
ena
dis
cur
Enables IGMP Snooping.
Disables IGMP Snooping.
Displays the current IGMP Snooping parameters.
Configuration Menu 140
IGMP static multicast router configuration
Command: /cfg/l3/igmp/mrouter
[Static Multicast Router Menu]
add - Add port as Multicast Router Port
rem - Remove port as Multicast Router Port
cur - Display current Multicast Router configuration
The following table describes the Static Multicast Router Configuration Menu options.
NOTE: When you configure a static multicast router on a VLAN, the process of learning multicast routers is
disabled for that VLAN.
Table 157 IGMP Static Multicast Router Menu
Command
Description
add <port number> <1-4095> <1-2>
Selects a port/VLAN combination on which the static multicast router
is connected, and configures the IGMP version (1 or 2) of the
multicast router.
NOTE:
Port number must be an external port (19-24).
remove <port number> <1-4095> <1-2>
Removes a static multicast router from the selected port/VLAN
combination.
cur
Displays the current IGMP Static Multicast Router parameters.
IGMP filtering configuration
Command: /cfg/l3/igmp/igmpflt
[IGMP Filter Menu]
filter - IGMP Filter Definition Menu
port - IGMP Filtering Port Menu
ena - Enable IGMP Filtering
dis - Disable IGMP Filtering
cur - Display current IGMP Filtering configuration
The following table describes the IGMP Filter Configuration Menu options.
Table 158 IGMP Filtering Menu
Command
Description
filter <1-16>
Displays the IGMP Filter Definition Menu.
Displays the IGMP Filtering Port Menu.
Enables IGMP filtering globally.
Disables IGMP Filtering globally.
Displays the current IGMP Filtering parameters.
port <port number>
ena
dis
cur
Configuration Menu 141
IGMP filter definition
Command: /cfg/l3/igmp/igmpflt/filter <1-16>
[IGMP Filter 1 Definition Menu]
range - Set IP Multicast address range
action - Set filter action
ena - Enable filter
dis - Disable filter
del - Delete filter
cur - Display current IGMP filter configuration
The following table describes the IGMP Filter Definition Menu options.
Table 159 IGMP Filter Definition Menu
Command
Description
range <IP multicast address> <IP
multicast address>
Configures the range of IP multicast addresses for this filter. Enter the
first IP multicast address of the ranger, followed by the second IP
multicast address of the range.
action allow|deny
Allows or denies multicast traffic for the IP multicast addresses
specified.
ena
dis
del
cur
Enables this IGMP filter.
Disables this IGMP filter.
Deletes this filter’s parameter definitions.
Displays the current IGMP filter.
IGMP filtering port configuration
Command: /cfg/l3/igmp/igmpflt/port <port number>
[IGMP Port 17 Menu]
filt - Enable/disable IGMP Filtering on port
add - Add IGMP filter to port
rem - Remove IGMP filter from port
cur - Display current IGMP Filtering Port configuration
The following table describes the IGMP Port Filtering Configuration Menu options.
Table 160 IGMP Filtering Port Menu
Command
Description
filt enable|disable
add <1-16>
rem <1-16>
cur
Enables or disables IGMP Filtering on this port.
Adds an IGMP filter to this port.
Removes an IGMP filter from this port.
Displays the current IGMP filter parameters for this port.
Configuration Menu 142
Domain name system configuration
Command: /cfg/l3/dns
[Domain Name System Menu]
prima - Set IP address of primary DNS server
secon - Set IP address of secondary DNS server
dname - Set default domain name
cur
- Display current DNS configuration
The Domain Name System (DNS) Configuration Menu is used for defining the primary and secondary DNS servers
on your local network, and for setting the default domain name served by the GbE2 Interconnect Switch services.
DNS parameters must be configured prior to using hostname parameters with the ping, traceroute, and tftp
commands.
The following table describes the Domain Name System (DNS) Configuration Menu options.
Table 161 Domain Name System (DNS) Configuration Menu options
Command
Description
prima <IP address>
You will be prompted to set the IP address for your primary
DNS server. Use dotted decimal notation.
For example, 100.10.1.1
secon <IP address>
You will be prompted to set the IP address for your secondary
DNS server. If the primary DNS server fails, the configured
secondary will be used instead. Enter the IP address using
dotted decimal notation. For example,
100.10.1.2
dname <dotted DNS notation>|none
Sets the default domain name used by the switch.
For example: mycompany.com
cur
Displays the current Domain Name System (DNS) settings.
Bootstrap Protocol Relay configuration
Command: /cfg/l3/bootp
[Bootstrap Protocol Relay Menu]
addr
addr2
on
- Set IP address of BOOTP server
- Set IP address of second BOOTP server
- Globally turn BOOTP relay ON
off
- Globally turn BOOTP relay OFF
cur
- Display current BOOTP relay configuration
The Bootstrap Protocol (BOOTP) Relay Menu is used to allow hosts to obtain their configurations from a Dynamic Host
Configuration Protocol (DHCP) server. The BOOTP configuration enables the switch to forward a client request for an
IP address to two DHCP/BOOTP servers with IP addresses that have been configured on the GbE2 Interconnect
Switch.
BOOTP relay is turned off by default.
The following table describes the BOOTP Configuration Menu options.
Table 162 BOOTP Configuration Menu options
Command
Description
addr <IP address>
Sets the IP address of the BOOTP server.
For example, 100.10.1.1
addr2 <IP address>
Sets the IP address of the secondary BOOTP server.
For example, 100.10.1.2
on
Globally turns on BOOTP relay.
off
cur
Globally turns on BOOTP relay.
Displays the current BOOTP relay configuration.
Configuration Menu 143
Virtual Router Redundancy Protocol configuration
Command: /cfg/l3/vrrp
[Virtual Router Redundancy Protocol Menu]
vr
group
if
- VRRP Virtual Router Menu
- VRRP Virtual Router Group Menu
- VRRP Interface Menu
track
on
off
cur
- VRRP Priority Tracking Menu
- Globally turn VRRP ON
- Globally turn VRRP OFF
- Display current VRRP configuration
Virtual Router Redundancy Protocol (VRRP) support on the GbE2 Interconnect Switch provides redundancy between
routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each
participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a
number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the
backup virtual routers will assume routing authority and take control of the virtual router IP address.
By default, VRRP is disabled. For more information on VRRP, see the “High Availability” chapter in the HP ProLiant BL
p-Class GbE2 Interconnect Switch Application Guide.
The following table describes the VRRP Configuration Menu options.
Table 163 VRRP Configuration Menu options
Command
Description
vr <1-255>
Displays the VRRP Virtual Router Menu. This menu is used for configuring up to 255 virtual
routers on this switch.
group
Displays the VRRP virtual router group menu, used to combine all virtual routers together as one
logical entity. Group options must be configured when using two or more GbE2 Interconnect
Switches in a hot-standby failover configuration where only one switch is active at any given
time.
if <1-255>
Displays the VRRP Virtual Router Interface Menu.
track
Displays the VRRP Tracking Menu. This menu is used for weighting the criteria used when modi-
fying priority levels in the master router election process.
on
Globally enables VRRP on this switch.
Globally disables VRRP on this switch.
Displays the current VRRP parameters.
off
cur
VRRP Virtual Router configuration
Command: /cfg/l3/vrrp/vr <1-255>
[VRRP Virtual Router 1 Menu]
track
vrid
addr
if
prio
adver
preem
ena
- Priority Tracking Menu
- Set virtual router ID
- Set IP address
- Set interface number
- Set renter priority
- Set advertisement interval
- Enable/disable preemption
- Enable virtual router
dis
del
- Disable virtual router
- Delete virtual router
cur
- Display current VRRP virtual router configuration
This menu is used for configuring virtual routers for this switch. A virtual router is defined by its virtual router ID and
an IP address. On each VRRP-capable routing device participating in redundancy for this virtual router, a virtual
router will be configured to share the same virtual router ID and IP address.
Virtual routers are disabled by default.
The following table describes the Virtual Router Configuration Menu options.
Configuration Menu 144
Table 164 Virtual Router Configuration Menu options
Command
Description
track
Displays the VRRP Priority Tracking Menu for this virtual router. Tracking is a
proprietary extension to VRRP, used for modifying the standard priority system
used for electing the master router.
vrid <1-255>
Defines the virtual router ID. This is used in conjunction with addr(below) to
define a virtual router on this switch. To create a pool of VRRP-enabled routing
devices which can provide redundancy to each other, each participating VRRP
device must be configured with the same virtual router: one that shares the
same vridand addrcombination.
The vridfor standard virtual routers (where the virtual router IP address is not
the same as any virtual server) can be any integer between 1 and 255. The
default value is 1.
All vridvalues must be unique within the VLAN to which the virtual router’s IP
interface belongs.
addr <IP address>
if <1-255>
Defines the IP address for this virtual router using dotted decimal notation. This
is used in conjunction with the vrid(above) to configure the same virtual
router on each participating VRRP device. The default address is 0.0.0.0
Selects a switch IP interface (between 1 and 255). If the IP interface has the
same IP address as the addroption above, this switch is considered the
“owner” of the defined virtual router. An owner has a special priority of 255
(highest) and will always assume the role of master router, even if it must
preempt another virtual router which has assumed master routing authority. This
preemption occurs even if the preemoption below is disabled. The default
value is 1.
prio <1-254>
Defines the election priority bias for this virtual server. This can be any integer
between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual router’s IP address (addr) is the same as
the one used by the IP interface, the priority for this virtual router will
automatically be set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/trackor
/cfg/l3/vrrp/vr#/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default value is 1.
preem disable|enable
Enables or disables master preemption. When enabled, if this virtual router is in
backup mode but has a higher priority than the current master, this virtual
router will preempt the lower priority master and assume control. Note that
even when preemis disabled, this virtual router will always preempt any other
master if this switch is the owner (the IP interface address and virtual router
addrare the same). By default, this option is enabled.
ena
dis
del
cur
Enables this virtual router.
Disables this virtual router.
Deletes this virtual router from the switch configuration.
Displays the current configuration information for this virtual router.
Configuration Menu 145
VRRP Virtual Router Priority Tracking configuration
Command: /cfg/l3/vrrp/vr <1-255>/track
[VRRP Virtual Router 1 Priority Tracking Menu]
vrs
ifs
ports
cur
- Enable/disable tracking master virtual routers
- Enable/disable tracking other interfaces
- Enable/disable tracking VLAN switch ports
- Display current VRRP virtual router configuration
This menu is used for modifying the priority system used when electing the master router from a pool of virtual routers.
Various tracking criteria can be used to bias the election results. Each time one of the tracking criteria is met, the
priority level for the virtual router is increased by an amount defined through the VRRP Tracking Menu.
Criteria are tracked dynamically, continuously updating virtual router priority levels when enabled. If the virtual router
preemption option is enabled, this virtual router can assume master routing authority when its priority level rises
above that of the current master.
Some tracking criteria (vrs, ifs, and portsbelow) apply to standard virtual routers, otherwise called “virtual
interface routers”. A virtual server router is defined as any virtual router whose IP address (addr) is the same as any
configured virtual server IP address.
The following table describes the Virtual Router Priority Tracking Configuration Menu options.
Table 165 Virtual Router Priority Tracking Configuration Menu options
Command
Description
vrs disable|enable
When enabled, the priority for this virtual router will be increased for each virtual router
in master mode on this switch. This is useful for making sure that traffic for any particular
client/server pairing are handled by the same switch, increasing routing and load
balancing efficiency. This command is disabled by default.
ifs disable|enable
ports disable|enable
cur
When enabled, the priority for this virtual router will be increased for each other IP
interface active on this switch. An IP interface is considered active when there is at least
one active port on the same VLAN. This helps elect the virtual routers with the most
available routes as the master. This command is disabled by default.
When enabled, the priority for this virtual router will be increased for each active port on
the same VLAN. A port is considered “active” if it has a link and is forwarding traffic.
This helps elect the virtual routers with the most available ports as the master. This
command is disabled by default.
Displays the current configuration for priority tracking for this virtual router.
VRRP Virtual Router Group configuration
Command: /cfg/l3/vrrp/group
[VRRP Virtual Router Group Menu]
track
vrid
if
prio
adver
preem
ena
- Priority Tracking Menu
- Set virtual router ID
- Set interface number
- Set renter priority
- Set advertisement interval
- Enable/disable preemption
- Enable virtual router
dis
del
- Disable virtual router
- Delete virtual router
cur
- Display current VRRP virtual router configuration
The Virtual Router Group menu is used for associating all virtual routers into a single logical virtual router, which
forces all virtual routers on the switch to either be master or backup as a group. A virtual router is defined by its
virtual router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this virtual
router, a virtual router will be configured to share the same virtual router ID and IP address.
Configuration Menu 146
The following table describes the Virtual Router Group Configuration Menu options.
Table 166 Virtual Router Group Configuration Menu options
Command
Description
track
Displays the VRRP Priority Tracking Menu for the virtual router group. Tracking
is a proprietary extension to VRRP, used for modifying the standard priority
system used for electing the master router.
vrid <1-255>
Defines the virtual router ID.
The vridfor standard virtual routers (where the virtual router IP address is not
the same as any virtual server) can be any integer between 1 and 255. All
vridvalues must be unique within the VLAN to which the virtual router’s IP
interface (see ifbelow) belongs. The default virtual router ID is 1.
if <1-255>
Selects a switch IP interface (between 1 and 255). The default switch IP
interface number is 1.
prio <1-254>
Defines the election priority bias for this virtual router group. This can be any
integer between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual router’s IP address (addr) is the same as
the one used by the IP interface, the priority for this virtual router will
automatically be set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/trackor
/cfg/l3/vrrp/vr#/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default is 1.
preem disable|enable
Enables or disables master preemption. When enabled, if the virtual router
group is in backup mode but has a higher priority than the current master, this
virtual router will preempt the lower priority master and assume control. Note
that even when preemis disabled, this virtual router will always preempt any
other master if this switch is the owner (the IP interface address and virtual
router addrare the same). By default, this option is enabled.
ena
dis
del
cur
Enables the virtual router group.
Disables the virtual router group.
Deletes the virtual router group from the switch configuration.
Displays the current configuration information for the virtual router group.
VRRP Virtual Router Group Priority Tracking configuration
Command: /cfg/l3/vrrp/group/track
[Virtual Router Group Priority Tracking Menu]
vrs
ifs
ports
cur
- Enable/disable tracking master virtual routers
- Enable/disable tracking other interfaces
- Enable/disable tracking VLAN switch ports
- Display current VRRP Group Tracking configuration
NOTE: If Virtual Router Group Tracking is enabled, then the tracking option will be available only under group
option. The tracking setting for the other individual virtual routers will be ignored.
Configuration Menu 147
The following table describes the Virtual Router Group Priority Tracking Configuration Menu options.
Table 167 Virtual Router Group Priority Tracking Configuration Menu options
Command
Description
vrs disable|enable
When enabled, the priority for this virtual router will be increased for each virtual router
in master mode on this switch. This is useful for making sure that traffic for any particular
client/server pairing are handled by the same switch, increasing routing and load
balancing efficiency. This command is disabled by default.
ifs disable|enable
When enabled, the priority for this virtual router will be increased for each other IP
interface active on this switch. An IP interface is considered active when there is at least
one active port on the same VLAN. This helps elect the virtual routers with the most
available routes as the master. This command is disabled by default.
ports disable|enable
When enabled, the priority for this virtual router will be increased for each active port on
the same VLAN. A port is considered “active” if it has a link and is forwarding traffic.
This helps elect the virtual routers with the most available ports as the master. This
command is disabled by default.
cur
Displays the current configuration for priority tracking for this virtual router.
VRRP Interface configuration
Command: /cfg/l3/vrrp/if <1-255>
[VRRP Interface 1 Menu]
auth
passw
del
- Set authentication types
- Set plain-text password
- Delete interface
- Display current VRRP interface configuration
cur
This menu is used for configuring VRRP authentication parameters for the IP interfaces used with the virtual routers.
The interface-number (1 to 128) represents the IP interface on which authentication parameters must be configured.
The following table describes the VRRP Interface Configuration Menu options.
Table 168 VRRP Interface Configuration Menu options
Command
Description
auth none|password
Defines the type of authentication that will be used: none(no authentication),
or password(password authentication).
passw <password>
Defines a plain text password up to eight characters long. This password will
be added to each VRRP packet transmitted by this interface when password
authentication is chosen (see authabove).
del
cur
Clears the authentication configuration parameters for this IP interface. The IP
interface itself is not deleted.
Displays the current configuration for this IP interface’s authentication
parameters.
VRRP Tracking configuration
Command: /cfg/l3/vrrp/track
[VRRP Tracking Menu]
vrs
ifs
ports
cur
- Set priority increment for virtual router tracking
- Set priority increment for IP interface tracking
- Set priority increment for VLAN switch port tracking
- Display current VRRP Priority Tracking configuration
This menu is used for setting weights for the various criteria used to modify priority levels during the master router
election process. Each time one of the tracking criteria is met, the priority level for the virtual router is increased by an
amount defined through this menu.
NOTE: These priority tracking options only define increment values. These options do not affect the VRRP
master router election process until options under the VRRP Virtual Router Priority Tracking Menu are enabled.
Configuration Menu 148
The following table describes the VRRP Tracking Configuration Menu options.
Table 169 VRRP Tracking Configuration Menu options
Command
Description
vrs <0-254>
Defines the priority increment value (0 through 254) for virtual routers in master mode detected on
this switch. The default value is 2.
ifs <0-254>
ports <0-254>
cur
Defines the priority increment value (0 through 254) for active IP interfaces detected on this
switch. The default value is 2.
Defines the priority increment value (0 through 254) for active ports on the virtual router’s VLAN.
The default value is 2.
Displays the current configuration of priority tracking increment values.
Quality of Service configuration
Command: /cfg/qos
[QOS Menu]
8021p
- 802.1p Menu
Use the Quality of Service (QoS) menus to configure the IEEE 802.1p priority value of incoming packets. This allows
you to differentiate between various types of traffic, and provide different priority levels. The following table describes
the QoS Configuration Menu options.
Table 170 QoS Configuration Menu options
Command
Description
8021p
Displays 802.1p configuration menu.
QoS 802.1p configuration
Command: /cfg/qos/8021p
[802.1p Menu]
priq
- Set priority to COS queue mapping
qweight - Set weight to a COS queue
numcos - Set number of COS queue
cur
- Display current 802.1p configuration
This feature provides the GbE2 Interconnect Switch the capability to filter IP packets based on the IEEE 802.1p bits in
the packet's VLAN header. The 802.1p bits specify the priority that you should give to the packets while forwarding
them. The packets with a higher (non-zero) priority bits are given forwarding preference over packets with numerically
lower priority bits value.
The following table describes the 802.1p Configuration Menu options.
Table 171 802.1p Configuration Menu options
Command
Description
priq <0-7> <0-7>
Maps the 802.1p priority of to the Class of Service queue (COSq) priority. Enter the
802.1p priority value (0-7), followed by the Class of Service queue (0-7) that handles the
matching traffic.
qweight <0-7> <0-15>
Configures the weight of the selected Class of Service queue (COSq). Enter the queue
number (0-7), followed by the scheduling weight (0-15).
numcos 2|8
cur
Sets the number of Class of Service queues for switch ports. Default is 8.
Displays the current 802.1p parameters.
Access Control configuration
Command: /cfg/acl
Configuration Menu 149
[ACL Menu]
acl
- Access Control List Item Config Menu
- Access Control List Block Config Menu
- Access Control List Group Config Menu
- Display current ACL configuration
block
group
cur
Use this menu to create Access Control Lists (ACLs), ACL Blocks, and ACL Groups. ACLs define matching criteria used
for IP filtering and Quality of Service functions.
The following table describes the Access Control Configuration Menu options.
Table 172 Access Control Configuration Menu options
Command
Description
acl <1-4096>
block <1-4096>
group <1-4096>
cur
Displays Access Control List (ACL) configuration menu.
Displays ACL Block configuration menu.
Displays ACL Group configuration menu.
Displays the current Access Control parameters.
Access Control List configuration
Command: /cfg/acl/acl <1-4096>
[ACL 1 Menu]
ethernet - Ethernet Header Options Menu
ipv4 - IP Header Options Menu
tcpudp - TCP/UDP Header Options Menu
pktfmt - Set to filter specific packet format types
egrport - Set to filter for packets egressing this port
action - Set filter action
stats
reset
cur
- Enable/disable statistics for this acl
- Reset filtering parameters
- Display current filter configuration
These menus allow you to define filtering criteria for each Access Control List (ACL). The following table describes the
ACL Configuration Menu options.
Table 173 ACL Configuration Menu options
Command
Description
ethernet
Displays the ACL Ethernet configuration menu.
Displays the ACL IP version 4 configuration menu.
Displays the ACL TCP/UDP configuration menu.
Displays the ACL Packet Format configuration menu.
Configures the ACL to function on egress packets.
ipv4
tcpudp
pktfmt
egrport <port number>
action permit|deny|setcos
Configures a filter action for packets that match the ACL definitions. You can
choose to permit (pass) or deny (drop) packets, or set the Class of Service
queue that handles the packets.
stats e|d
reset
Enables or disables the statistics collection for the Access Control List.
Resets the ACL parameters to their default values.
Displays the current ACL parameters.
cur
Configuration Menu 150
ACL Ethernet Filter configuration
Command: /cfg/acl/acl <1-4096>/ethernet
[Filtering Ethernet Menu]
smac
dmac
vlan
etype
pri
reset
cur
- Set to filter on source MAC
- Set to filter on destination MAC
- Set to filter on VLAN ID
- Set to filter on ethernet type
- Set to filter on priority
- Reset all fields
- Display current parameters
This menu allows you to define Ethernet matching criteria for an ACL. The following table describes the Ethernet Filter
Configuration Menu options.
Table 174 Ethernet Filter Configuration Menu options
Command
Description
smac <MAC address>
Defines the source MAC address for this ACL. For example:
00:60:cf:40:56:00
dmac <MAC address>
Defines the destination MAC address for this ACL. For example:
00:60:cf:40:56:00
vlan <1-4095> <VLAN mask (0xfff)>
Defines a VLAN number and mask for this ACL.
etype ARP|IP|IPv6|MPLS|RARP|any|0xXXXX Defines the Ethernet type for this ACL.
pri <0-7>
reset
Defines the Ethernet priority value for the ACL.
Resets Ethernet parameters for the ACL to their default values.
Displays the current Ethernet parameters for the ACL.
cur
ACL IP Version 4 Filter configuration
Command: /cfg/acl/acl <1-4096>/ipv4
[Filtering IPv4 Menu]
sip
dip
- Set to filter on source IP address
- Set to filter on destination IP address
proto
tos
reset
cur
- Set to filter on protocol
- Set to filter on TOS
- Reset all fields
- Display current parameters
This menu allows you to define IPv4 matching criteria for an ACL. The following table describes the IP version 4 Filter
Configuration Menu options.
Table 175 IPv4 Filter Configuration Menu options
Command
Description
sip <IP address>
Defines a source IP address for the ACL. If defined, traffic with this source IP address will
match this ACL. Specify an IP address in dotted decimal notation. For example, 100.10.1.1
dip <IP address>
proto <0-255>
Defines a destination IP address for the ACL. If defined, traffic with this destination IP address
will match this ACL. For example, 100.10.1.2
Defines an IP protocol for the ACL. If defined, traffic from the specified protocol matches this
filter. Specify the protocol number. Listed below are some of the well-known protocols.
Number Name
1
2
6
icmp
igmp
tcp
17
89
112
udp
ospf
vrrp
tos <0-255>
Defines a Type of Service value for the ACL. For more information on ToS, see RFC 1340
and 1349.
Configuration Menu 151
Table 175 IPv4 Filter Configuration Menu options
Command
reset
cur
Description
Resets the IPv4 parameters for the ACL to their default values.
Displays the current IPV4 parameters.
ACL TCP/UDP Filter configuration
Command: /cfg/acl/acl <1-4096>/tcpudp
[Filtering TCP/UDP Menu]
sport
dport
flags
reset
cur
- Set to filter on TCP/UDP source port
- Set to filter on TCP/UDP destination port
- Set to filter TCP/UDP flags
- Reset all fields
- Display current parameters
This menu allows you to define TCP/UDP matching criteria for an ACL. The following table describes the TCP/UDP
Filter Configuration Menu options.
Table 176 TCP/UDP Filter Configuration Menu options
Command
Description
sport <1-65535>
Defines a source port for the ACL. If defined, traffic with the specified TCP or UDP
source port will match this ACL. Specify the port number. Listed below are some of
the well-known ports:
Number
20
Name
ftp-data
21
ftp
22
ssh
23
25
37
telnet
smtp
time
42
43
53
69
name
whois
domain
tftp
70
79
80
gopher
finger
http
dport <1-65535>
Defines a destination port for the ACL. If defined, traffic with the specified TCP or
UDP destination port will match this ACL. Specify the port number, just as with
sport above.
flags <value (0x0-0x3f)> Defines a TCP/UDP flag for the ACL.
reset
cur
Resets the TCP/UDP parameters for the ACL to their default values.
Displays the current TCP/UDP Filtering parameters.
Configuration Menu 152
ACL Packet Format configuration
Command: /cfg/acl/acl <1-4096>/pktfmt
[Filtering Packet Format Menu]
ethfmt - Set to filter on ethernet format
tagfmt - Set to filter on ethernet tagging format
reset
cur
- Reset all fields
- Display current parameters
The following table describes the Packet Format Configuration Menu options.
Table 177 Packet Format Configuration Menu options
Command
Description
ethfmt none/ethII/802.3
Defines the Ethernet format for the ACL.
Defines the tagging format for the ACL.
tagfmt none|tagged
reset
cur
Resets Packet Format parameters for the ACL to their default values.
Displays the current Packet Format parameters for the ACL.
ACL Block configuration
Command: /cfg/acl/block <1-4096>
[ACL Block 1 Menu]
addacl - Add ACL item to block
remacl - Remove ACL item from block
cur - Display current ACL items in block
This menu allows you to compile one or more ACLs into an ACL Block. Each ACL in the ACL Block must fall within the
same mask.
The following table describes the ACL Block Configuration Menu options.
Table 178 ACL Block Configuration Menu options
Command
Description
addac1 <1-4096>
remacl <1-4096>
cur
Adds the selected ACL to the ACL Block.
Removes the selected ACL from the ACL Block.
Displays the current ACL block parameters.
ACL Group configuration
Command: /cfg/acl/group <1-4096>
[ACL Group 1 Menu]
add
rem
cur
- Add ACL or ACL block to group
- Remove ACL or ACL block from group
- Display current ACL items in group
This menu allows you to compile one or more ACLs and ACL Blocks into an ACL Group. Once you create an ACL
Group, you can assign the ACL Group to one or more ports.
The following table describes the ACL Group Configuration Menu options.
Table 179 ACL Group Configuration Menu options
Command
Description
add acl|blk <1-4096>
rem acl|blk <1-4096>
cur
Adds the selected ACL or ACL Block to the ACL Group.
Removes the selected ACL or ACL Block from the ACL Group.
Displays the current ACL group parameters.
Configuration Menu 153
Remote Monitoring configuration
Command: /cfg/rmon
[RMON Menu]
hist
- RMON History Menu
event - RMON Event Menu
alarm - RMON Alarm Menu
cur
- Display current RMON configuration
Remote Monitoring (RMON) allows you to monitor traffic flowing through the GbE2 Interconnect Switch. The RMON
MIB is described in RFC 1757.
The following table describes the RMON Configuration Menu options.
Table 180 RMON Menu options
Command
hist
Description
Displays the RMON History Menu.
Displays the RMON Event Menu.
Displays the RMON Alarm Menu.
Displays the current RMON configuration.
event
alarm
cur
RMON history configuration
Command: /cfg/rmon/hist <1-65535>
[RMON History 1 Menu]
ifoid - Set interface MIB object to monitor
rbnum - Set the number of requested buckets
intrval - Set polling interval
owner - Set owner for the RMON group of statistics
delete - Delete this history and restore defaults
cur
- Display current history configuration
The following table describes the RMON History Menu options.
Table 181 RMON History Menu options
Command
Description
ifoid <1-127 characters>
Configures the interface MIB Object Identifier. The IFOID must correspond to
the standard interface OID, as follows: 1.3.6.1.2.1.2.2.1.1.x
The interface OID can have a maximum of 127 characters.
rbnum <1-65535>
Configures the requested number of buckets, which is the number of discrete
time intervals over which data is to be saved.
The range is from 1 to 65535. The default is 30.
NOTE:
The maximum number of buckets that can be granted is 50.
intrval <1-3600>
Configures the time interval over which the data is sampled for each bucket.
The range is from 1 to 3600 seconds. The default value is 1800 seconds.
owner <1-127 characters>
Enter a text string that identifies the person or entity that uses this history index.
The owner can have a maximum of 127 characters.
delete
cur
Deletes the selected history index.
Displays the current RMON History parameters.
Configuration Menu 154
RMON event configuration
Command: /cfg/rmon/event <1-65535>
[RMON Event 1 Menu]
descn - Set description for the event
type - Set event type
owner - Set owner for the event
delete - Delete this event and restore defaults
cur
- Display current event configuration
The following table describes the RMON Event Menu options.
Table 182 RMON Event Menu options
Command
Description
descn <1-127 characters> Enter a text string to describe the event.
The description can have a maximum of 127 characters.
type none|log|trap|both
Selects the type of notification provided for this event. For log events, an entry is
made in the log table and sent to the configured syslog host. For trap events, an
SNMP trap is sent to the management station (/cfg/snmp/trap).
owner <1-127 characters> Enter a text string that identifies the person or entity that uses this event index.
The owner can have a maximum of 127 characters.
delete
cur
Deletes this event index.
Displays the current RMON Event parameters.
RMON alarm configuration
Command: /cfg/rmon/alarm <1-65535>
[RMON Alarm 1 Menu]
oid - Set MIB oid datasource to monitor
intrval - Set alarm interval
sample - Set sample type
almtype - Set startup alarm type
rlimit - Set rising threshold
flimit - Set falling threshold
revtidx - Set event index to fire on rising threshold crossing
fevtidx - Set event index to fire on falling threshold crossing
owner - Set owner for the alarm
delete - Delete this alarm and restore defaults
cur
- Display current alarm configuration
The Alarm RMON group can track rising or falling values for a MIB object. The MIB object must be a counter, gauge,
integer, or time interval. Each alarm index must correspond to an event index that triggers once the alarm threshold is
crossed.
The following table describes the RMON Alarm Menu options.
Table 183 RMON Alarm Menu options
Command
Description
oid <1-127 characters>
Configures an alarm MIB Object Identifier.
The alarm OID can have a maximum of 127 characters.
intrval <1-65535 seconds>
Configures the time interval over which data is sampled and compared
with the rising and falling thresholds.
The range is from 1 to 65535 seconds. The default is 1800 seconds.
Configuration Menu 155
Table 183 RMON Alarm Menu options
Command
Description
sample abs|delta
Configures the method of sampling the selected variable and calculating
the value to be compared against the thresholds, as follows:
abs: absolute value, the value of the selected variable is compared directly
with the thresholds at the end of the sampling interval.
delta: delta value, the value of the selected variable at the last sample is
subtracted from the current value, and the difference compared with the
thresholds.
almtype rising|falling|either
Configures the alarm type as rising, falling, or either (rising or falling).
rlimit < -2147483647 to
2147483647>
Configures the rising threshold for the sampled statistic. When the current
sampled value is greater than or equal to this threshold, and the value at
the last sampling interval was less than this threshold, a single event is
generated.
flimit < -2147483647 to
2147483647>
Configures the falling threshold for the sampled statistic. When the current
sampled value is less than or equal to this threshold, and the value at the
last sampling interval was greater than this threshold, a single event is
generated.
revtidx <0-65535>
fevtidx <0-65535>
owner <1-127>
Configures the rising alarm event index that is triggered when a rising
threshold is crossed.
The range is from 0 to 65535. The default value is 0.
Configures the falling alarm event index that is triggered when a falling
threshold is crossed.
The range is from 0 to 65535. The default value is 0.
Enter a text string that identifies the person or entity that uses this alarm
index.
The owner can have a maximum of 127 characters.
delete
cur
Deletes this alarm index.
Displays the current RMON Alarm parameters.
Port mirroring
Command: /cfg/pmirr
[Port Mirroring Menu]
mirror - Enable/Disable Mirroring
monport - Monitoring Port based PM Menu
cur - Display All Mirrored and Monitoring Ports
The Port Mirroring Configuration Menu is used to configure, enable, and disable the monitored port. When enabled,
network packets being sent and/or received on a target port are duplicated and sent to a monitor port. By attaching
a network analyzer to the monitor port, you can collect detailed information about your network performance and
usage. Port mirroring is disabled by default.
NOTE: See the “Troubleshooting Tools” appendix in the HP ProLiant BL p-Class GbE2 Interconnect Switch
Application Guide for information on how to use port mirroring.
The following table describes the Port Mirroring Configuration Menu options.
Table 184 Port Mirroring Configuration Menu options
Command
Description
mirror disable|enable Enables or disables port mirroring
monport <port number> Displays port mirroring menu.
cur
Displays current settings of the mirrored and monitoring ports.
Configuration Menu 156
Port-based port mirroring
Command: /cfg/pmirr/monport <port number>
[Port 1 Menu]
add
rem
- Add "Mirrored" port
- Rem "Mirrored" port
delete - Delete this “Monitor” port
cur - Display current Port-based Port Mirroring configuration
The following table describes the port-based Port Mirroring Configuration Menu options.
Table 185 Port Mirroring Configuration Menu options
Command
Description
add <mirrored port> in|out|both
Adds the port to be mirrored. This command also allows you to enter
the direction of the traffic. It is necessary to specify the direction
because:
•
If the source port of the frame matches the mirrored port and the
mirrored direction is ingress or both (ingress and egress), the frame
is sent to the mirrored port.
•
If the destination port of the frame matches the mirrored port and
the mirrored direction is egress or both, the frame is sent to the
monitoring port.
rem <mirrored port>
Removes the mirrored port.
delete
cur
Deletes this monitored port.
Displays the current settings of the monitoring port.
Uplink Failure Detection configuration
Command: /cfg/ufd
[Uplink Failure Detection Menu]
fdp - Failure Detection Pair Menu
on - Globally turn Uplink Failure Detection ON
off - Globally turn Uplink Failure Detection OFF
cur - Display current Uplink Failure Detection configuration
Uplink Failure Detection (UFD) supports network fault tolerance in network adapter teams. Use this menu to configure
a Failure Detection Pair of one Links to Monitor (LtM) group and one Links to Disable (LtD) group. When UFD is
enabled and a Failure Detection Pair is configured, the switch automatically disables ports in the LtD if it detects a
failure in the LtM. The failure conditions which are monitored in the LtM group include port link state moving to down,
or port state moving to Blocking if Spanning Tree Protocol is enabled.
The following table describes the Uplink Failure Detection (UFD) Configuration Menu options.
Table 186 Uplink Failure Detection Configuration Menu options
Command
fdp
Description
Displays the Failure Detection Pair menu.
Globally turns Uplink Failure Detection ON.
Globally turns Uplink Failure Detection OFF.
Displays the current Uplink Failure Detection configuration parameters.
on
off
cur
Configuration Menu 157
Failure Detection Pair configuration
Command: /cfg/ufd/fdp
[FDP Menu]
ltm
ltd
ena
dis
- Link to Monitor Menu
- Link to Disable Menu
- Enable FDP
- Disable FDP
current - Display current FDP configuration
Use these commands to configure a Failure Detection Pair, which consists of one Link to Monitor (LtM) and one Link to
Disable (LtD). When the switch detects a failure on the LtM, it automatically disables the ports in the LtD.
The following table describes the Failure Detection Pair (FDP) configuration Menu options.
Table 187 Failure Detection Pair Configuration Menu options
Command
ltm
Description
Displays the Links to Monitor menu.
Displays the Links to Disable menu.
Enables the FDP Parameters.
Disables the FDP Parameters.
Displays the current FDP configuration.
ltd
ena
dis
current
Link to Monitor configuration
Command: /cfg/ufd/fdp/ltm
[Failure Link to Monitor Menu]
addport - Add port to Link to Monitor
remport - Remove port from Link to Monitor
addtrnk - Add trunk to Link to Monitor
remtrnk - Remove trunk from Link to Monitor
cur
- Display current LtM configuration
The following table describes the Link to Monitor (LtM) Menu options. The LtM can consist of only one uplink port
(ports 19-24) or a single trunk containing only uplink ports.
Table 188 Link to Monitor Menu options
Command
Description
addport <port number>
remport <port number>
addtrnk <1-12>
Adds a port to the LtM. Only uplink ports (19-24) are allowed in the LtM.
Removes a port from the LtM.
Adds a trunk group to the LtM. The LtM trunk group can contain only uplink ports
(19-24).
remtrnk <1-12>
Removes a trunk group from the LtM.
Displays the current LtM configuration.
cur
Configuration Menu 158
Link to Disable configuration
Command: /cfg/ufd/fdp/ltd
[Failure Link to Disable Menu]
addport - Add port to Link to Disable
remport - Remove port from Link to Disable
addtrnk - Add trunk to Link to Disable
remtrnk - Remove trunk from Link to Disable
cur
- Display current LtD configuration
The following table describes the Link to Disable (LtD) Menu options. The LtD can consist of any mix of downlink ports
(ports 1-16) and trunk groups that contain only downlink ports.
Table 189 Link to Disable Menu options
Command
Description
addport <port number>
remport <port number>
addtrunk <1-12>
Adds a port to the current LtD group. Only downlink ports (1-16) are allowed in the LtD.
Removes a port from the current LtD group.
Adds a trunk group to the current LtD group. LtD trunk groups can contain only downlink
ports (1-16).
remtrunk <1-12>
Removes a trunk group from the current LtD group.
Displays the current LtD configuration.
cur
Dump
Command: /cfg/dump
The dump program writes the current GbE2 Interconnect Switch configuration to the terminal screen. To start the dump
program, at the Configuration# prompt, enter:
Configuration# dump
The configuration is displayed with parameters that have been changed from the default values. The screen display
can be captured, edited, and placed in a script file, which can be used to configure other GbE2 Interconnect
Switches. Paste the configuration commands from the script file at the command line prompt of the GbE2 Interconnect
Switch. The active configuration can also be saved or loaded via TFTP.
Saving the active GbE2 Interconnect Switch configuration
Command: /cfg/ptcfg <TFTP server> <filename>
When the ptcfg command is used, the active configuration commands of the GbE2 Interconnect Switch (as displayed
using /cfg/dump) will be uploaded to the specified script configuration file on the TFTP server. To start the GbE2
Interconnect Switch configuration upload, at the Configuration# prompt, enter:
Configuration# ptcfg <TFTP server> <filename>
Where <TFTP server> is the TFTP server IP address or hostname and <filename> is the name of the target script
configuration file.
NOTE: The output file is formatted with line-breaks but no carriage returns. The file cannot be viewed with
editors that require carriage returns (such as Microsoft Notepad).
NOTE: If the TFTP server is running SunOS™ or the Solaris™ operating system, the specified ptcfg file must
exist prior to executing the ptcfg command and must be writable (set with proper permission, and not locked
by any application). The contents of the specified file will be replaced with the current configuration data.
Configuration Menu 159
Restoring the active GbE2 Interconnect Switch configuration
Command: /cfg/gtcfg <TFTP server> <filename>
When the gtcfg command is used, the active configuration will be replaced with the commands found in the specified
configuration file. The file can contain a full GbE2 Interconnect Switch configuration or a partial configuration. The
configuration loaded using gtcfg is not activated until the apply command is used. If the apply command is found in
the configuration script file loaded using this command, the apply action will be performed automatically.
To start the GbE2 Interconnect Switch configuration download, at the Configuration# prompt, enter:
Configuration# gtcfg <TFTP server> <filename>
Where <TFTP server> is the TFTP server IP address or hostname and <filename> is the name of the target script
configuration file.
NOTE: The GbE2 Interconnect Switch supports three configuration files: active, backup, and factory. See the
“Selecting a configuration block” section in the “Boot Options Menu” chapter for information on how to set
which configuration file to use upon boot up.
Configuration Menu 160
Operations Menu
Introduction
Operations-level commands are used for making immediate and temporary changes to GbE2 Interconnect Switch
configuration. The Operations Menu is used for bringing ports temporarily in and out of service. This menu is
available only from an administrator and operator login.
Menu information
Command: /oper
[Operations Menu]
port
vrrp
- Operational Port Menu
- Operational Virtual Router Redundancy Menu
passwd - Change current user password
clrlog - Clear syslog messages
ntpreq - Send NTP request
The following table describes the Operations Menu options.
Table 190 Operations Menu options
Command
Description
port <port number>
vrrp
Displays the Operational Port Menu.
Displays the Operational Virtual Router Redundancy Menu.
passwd <1-128 characters> Allows the user to change the password. You need to enter the current password in
use for validation.
clrlog
ntpreq
Clears all Syslog messages.
Allows the user to send requests to the NTP server.
Operations-level port options
Command: /oper/port <port number>
[Operations Port 1 Menu]
8021x
rmon
ena
- 8021.x Menu
- Enable/Disable RMON for port
- Enable port
dis
- Disable port
cur
- Current port state
Operations-level port options are used for temporarily disabling or enabling a port.
Table 191 Operations-Level Port Menu options
Command
Description
8021x
Displays the 802.1x Port Menu.
rmon disable|enable
Enables or disables Remote Monitoring for the port. RMON must be enabled for any
RMON configurations to function.
ena
dis
cur
Temporarily enables the port. The port will be returned to its configured operation mode
when the GbE2 Interconnect Switch is reset.
Temporarily disables the port. The port will be returned to its configured operation mode
when the GbE2 Interconnect Switch is reset.
Displays the current settings for the port.
Operations Menu 161
Operations-level port 802.1x options
Command: /oper/port <port number>/8021x
[802.1x Operation Menu]
reset
- Reinitialize 802.1x access control on this port
reauth - Initiate reauthentication on this port now
Operations-level port 802.1x options are used to temporarily set 802.1x parameters for a port.
Table 192 Operations-Level Port 802.1x Menu options
Command
Description
reset
Re-initializes the 802.1x access-control parameters for the port. The following actions take
place, depending on the 802.1x port configuration:
• force unauth—the port is placed in unauthorized state, and traffic is blocked.
• auto—the port is placed in unauthorized state, then authentication is initiated.
• force auth—the port is placed in authorized state, and authentication is not
required.
reauth
Re-authenticates the supplicant (client) attached to the port. This command only applies if
the port’s 802.1x mode is configured as auto.
Operations-level VRRP options
Command: /oper/vrrp
[VRRP Operations Menu]
back
- Set virtual router to backup
Operations-level VRRP options are described in the following table.
Table 193 Operations-Level VRRP Menu options
Command
Description
back <1-255>
Forces the specified master virtual router on this switch into backup mode. This is generally used for
passing master control back to a preferred switch once the preferred switch has been returned to
service after a failure. When this command is executed, the current master gives up control and ini-
tiates a new election by temporarily advertising its own priority level as 0 (lowest). After the new
election, the virtual router forced into backup mode by this command will resume master control in
the following cases:
•
This switch owns the virtual router (the IP addresses of the virtual router and its IP interface are
the same)
•
•
This switch’s virtual router has a higher priority and preemption is enabled.
There are no other virtual routers available to take master control.
Operations Menu 162
Boot Options Menu
Introduction
You must be logged in to the GbE2 Interconnect Switch as the administrator to use the Boot Options Menu.
The Boot Options Menu provides options for:
•
•
•
Selecting a switch software image to be used when the GbE2 Interconnect Switch is next reset.
Selecting a configuration block to be used when the GbE2 Interconnect Switch is next reset.
Downloading or uploading a new software image to the GbE2 Interconnect Switch via FTP/TFTP.
Menu information
Command: /boot
[Boot Options Menu]
image - Select software image to use on next boot
conf - Select config block to use on next boot
gtimg - Download new software image via FTP/TFTP
ptimg - Upload selected software image via FTP/TFTP
reset - Reset switch [WARNING: Restarts Spanning Tree]
cur - Display current boot options
Each of the Boot Options Menu commands is discussed in greater detail in the following sections.
Updating the GbE2 Interconnect Switch software image
The GbE2 Interconnect Switch software image is the executable code running on the switch. A version of the image
ships with the GbE2 Interconnect Switch, and comes pre-installed on the device. As new versions of the image are
released, you can upgrade the software running on your GbE2 Interconnect Switch.
Upgrading the software image on your GbE2 Interconnect Switch requires the following:
•
•
•
Loading the new image onto a FTP/TFTP server on your network
Downloading the new image from the FTP/TFTP server to your GbE2 Interconnect Switch
Selecting the new software image to be loaded into GbE2 Interconnect Switch memory the next time the switch
is reset
Downloading new software to your GbE2 Interconnect Switch
The GbE2 Interconnect Switch can store up to two different software images, called image1 and image2, as well as
boot software, called boot. When you download new software, you must specify where it should be placed: either
into image1, image2, or boot.
For example, if your active image is currently loaded into image1, you would probably load the new image software
into image2. This lets you test the new software and reload the original active image (stored in image1), if needed.
To download new software to your GbE2 Interconnect Switch, you will need the following:
•
•
•
•
The image or boot software loaded on a FTP or TFTP server on your network
The hostname or IP address of the FTP or TFTP server
The user name and password for FTP server, if necessary
The name of the new software image or boot file
NOTE: The DNS parameters must be configured if specifying hostnames. See the “Domain name system
configuration” section in the “Configuration Menu” chapter.
Boot Options Menu 163
When the above requirements are met, use the following procedure to download the new software to your GbE2
Interconnect Switch.
1.
At the Boot Options# prompt, enter:
Boot Options# gtimg
2.
Enter the name of the GbE2 Interconnect Switch software to be replaced:
Enter name of switch software image to be replaced
["image1"/"image2"/"boot"]: <image>
3.
4.
Enter the hostname or IP address of the FTP or TFTP server:
Enter hostname or IP address of FTP/TFTP server: <server name or IP
address>
Enter the name of the new software file on the server:
Enter name of file on FTP/TFTP server: <filename>
The exact form of the name will vary by TFTP server. However, the file location is normally relative to the TFTP
directory.
5.
6.
Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
7.
8.
The system prompts you to confirm your request.
You should next select a software image to run, as described in the “Selecting a Soft Image to Run” section.
If you are loading an image from which you are not currently booted, the system prompts you to change the
image.
image2 currently contains Software Version 3.1.1
that was downloaded at 15:46:36 Wed Apr 23, 2007.
New download will replace image2 with file "3.2.0_OS.img"
from TFTP server 192.168.2.4.
Confirm download operation [y/n]: y
Invoking TFTP over port 69...
Starting download...
File appears valid
Download in
progress....................................................
Image download complete (1333953 bytes)
Writing to flash...This takes about 90 seconds. Please wait
Write complete (1333953 bytes), now verifying FLASH...
Verification of new image2 in FLASH successful.
image2 now contains Software Version 3.2.0
Switch is currently set to boot software image1.
Do you want to change that to the new image2? [y/n] y
Next boot will use new software image2.
Boot Options Menu 164
Selecting a software image to run
You can select which software image (image1 or image2) you want to run in GbE2 Interconnect Switch memory for
the next reboot.
1.
At the Boot Options# prompt, enter:
Boot Options# image
2.
Enter the name of the image you want the GbE2 Interconnect Switch to use upon the next boot. The system
informs you of which image is currently set to be loaded at the next reset, and prompts you to enter a new
choice:
Currently set to use switch software "image1" on next reset.
Specify new image to use on next reset ["image1"/"image2"]:
Uploading a software image from your GbE2 Interconnect Switch
You can upload a software image from the GbE2 Interconnect Switch to a FTP or TFTP server.
1.
At the Boot Options# prompt, enter:
Boot Options# ptimg
2.
The system prompts you for information. Enter the desired image:
Enter name of switch software image to be uploaded
["image1"|"image2"|"boot"]: <image> <hostname or server-IP-addr>
<server-filename>
3.
Enter the name or the IP address of the FTP or TFTP server:
Enter hostname or IP address of FTP/TFTP server: <server name or IP
address>
4.
5.
6.
7.
Enter the name of the file into which the image will be uploaded on the FTP or TFTP server:
Enter name of file on FTP/TFTP server: <filename>
Enter the user name, if you are using a FTP server:
Enter username for FTP server or hit return for TFTP server: <userID>
Enter the password for the FTP server (if prompted):
Enter password for username on FTP server: <password>
The system then requests confirmation of what you have entered. To have the file uploaded, enter y.
image2 currently contains Software Version 3.2.0
Upload will transfer image2 (1889411 bytes) to file "test"
on TFTP server 192.1.1.1.
Confirm upload operation [y/n]: y
Boot Options Menu 165
Selecting a configuration block
When you make configuration changes to the GbE2 Interconnect Switch, you must save the changes so that they are
retained beyond the next time the switch is reset. When you execute the save command, your new configuration
changes are placed in the active configuration block. The previous configuration is copied into the backup
configuration block.
There is also a factory configuration block. This holds the default configuration set by the factory when your GbE2
Interconnect Switch was manufactured. Under certain circumstances, it may be desirable to reset the GbE2
Interconnect Switch configuration to the default. This can be useful when a custom-configured GbE2 Interconnect
Switch is moved to a network environment where it will be re-configured for a different purpose.
Use the following procedure to set which configuration block you want the GbE2 Interconnect Switch to load the next
time it is reset:
1.
At the Boot Options# prompt, enter:
Boot Options# conf
2.
Enter the name of the configuration block you want the GbE2 Interconnect Switch to use.
The system indicates which configuration block is currently set to be loaded at the next reset, and prompts you
to enter a new choice:
Currently set to use active configuration block on next reset.
Specify new block to use ["active"/"backup"/"factory"]:
Resetting the GbE2 Interconnect Switch
You can reset the GbE2 Interconnect Switch to make your software image file and configuration block changes occur.
Resetting the GbE2 Interconnect Switch causes the Spanning Tree Protocol to restart. This process can be lengthy,
depending on the topology of your network.
To reset the GbE2 Interconnect Switch, at the Boot Options# prompt, enter:
>> Boot Options# reset
You are prompted to confirm your request.
To display current boot options, enter:
>> Boot Options# cur
Accessing the ISCLI
To access the ISCLI, enter the following command from the AOS CLI, and reset the switch:
Boot Options# mode iscli
The default command-line interface for the GbE2 is the AOS CLI. To access the AOS CLI, enter the following
command and reset the GbE2:
>> Switch# boot cli-mode aos
Users can select the CLI mode upon login, if the /boot/promptcommand is enabled. Only an administrator
connected through the console port can view and enable /boot/prompt. When /boot/promptis enabled, the
first user to log in can select either the CLI mode. Subsequent users must use the selected CLI mode, until all users have
logged out.
Boot Options Menu 166
Maintenance Menu
Introduction
The Maintenance Menu is used for debugging purposes, enabling you to generate a technical support dump of the
critical state information in the GbE2 Interconnect Switch, and to clear entries in the Forwarding Database and the
Address Resolution Protocol (ARP) and routing tables. This menu is available only from an administrator and operator
login.
Menu information
Command: /maint
[Maintenance Menu]
sys
fdb
- System Maintenance Menu
- Forwarding Database Manipulation Menu
debug - Debugging Menu
arp
- ARP Cache Manipulation Menu
route - IP Route Manipulation Menu
igmp
- IGMP Multicast Group Menu
uudmp - Uuencode FLASH dump
ptdmp - tftp put FLASH dump to tftp server
cldmp - Clear FLASH dump
panic - Dump state information to FLASH and reboot
tsdmp - Tech support dump
pttsdmp - tftp put tech support dump to tftp server
Dump information contains internal GbE2 Interconnect Switch state data that is written to flash memory on the switch
after any one of the following occurs:
•
The GbE2 Interconnect Switch administrator forces a switch panic. The panic option, found in the Maintenance
Menu, causes the GbE2 Interconnect Switch to dump state information to flash memory, and then causes the
switch to reboot.
•
•
The GbE2 Interconnect Switch administrator enters the switch reset key combination (Ctrl-Shift-6) on a
device that is attached to the console port.
The GbE2 Interconnect Switch detects a hardware or software problem that requires a reboot.
The following table describes the Maintenance Menu options.
Table 194 Maintenance Menu options
Command
sys
Usage
Displays the System Maintenance Menu.
Displays the Forwarding Database Manipulation Menu.
Displays the Debug Menu.
fdb
debug
arp
Displays the ARP Cache Manipulation Menu.
Displays the IP Route Manipulation Menu.
Displays the IGMP Maintenance Menu.
Displays dump information in uuencoded format.
route
igmp
uudmp
ptdmp hostname, filename [-mgmt|-data] Saves the system dump information via TFTP.
cldmp
panic
tsdmp
Clears dump information from flash memory.
Dumps MP information to flash and reboots.
Dumps all GbE2 Interconnect Switch information, statistics, and
configuration.
pttsdmp
Redirects the technical support dump (tsdmp) to an external TFTP
server.
Maintenance Menu 167
System maintenance options
Command: /maint/sys
[System Maintenance Menu]
flags - Set NVRAM flag word
The System Maintenance Menu is reserved for use by HP technical support. The options are used to perform system
debugging.
The following table describes the System Maintenance Menu options.
Table 195 System Maintenance Menu options
Command
Usage
flags <new NVRAM flags word as
0xXXXXXXXX>
Sets the flags that are used for debugging purposes by HP
technical support.
Forwarding Database options
Command: /maint/fdb
[FDB Manipulation Menu]
find
port
vlan
dump
- Show a single FDB entry by MAC address
- Show FDB entries for a single port
- Show FDB entries for a single VLAN
- Show all FDB entries
clear - Clear entire FDB, then re-add static entries
The Forwarding Database (FDB) Manipulation Menu can be used to view information and to delete a MAC address
from the Forwarding Database or clear the entire Forwarding Database. This is helpful in identifying problems
associated with MAC address learning and packet forwarding decisions.
The following table describes the FDB Manipulation Menu options.
Table 196 FDB Manipulation Menu options
Command
Usage
find <MAC address> [<1-4095>]
Displays a single database entry by its MAC address. You are prompted to
enter the MAC address of the device. Enter the MAC address using one of
the following:
•
•
xx:xx:xx:xx:xx:xx format (for example: 08:00:20:12:34:56)
xxxxxxxxxxxx format (for example: 080020123456).
port <port number>
vlan <1-4095>
dump
Displays all FDB entries for a particular port.
Displays all FDB entries on a single VLAN.
Displays all entries in the Forwarding Database.
clear
Clears the entire Forwarding Database from GbE2 Interconnect Switch
memory, then adds the static entries to the Forwarding Database.
Debugging options
Command: /maint/debug
[Miscellaneous Debug Menu]
tbuf
snap
- Show MP trace buffer
- Show MP snap (or post-mortem) trace buffer
clrcfg - Clear all flash configs
Maintenance Menu 168
The Miscellaneous Debug Menu displays trace buffer information about events that can be helpful in understanding
GbE2 Interconnect Switch operation. You can view the following information using the Debug Menu:
•
•
Events traced by the management processor (MP)
Events traced to a buffer area when a reset occurs
If the GbE2 Interconnect Switch resets for any reason, the management processor (MP) trace buffer is saved into the
snap trace buffer area. The output from these commands can be interpreted by HP technical support.
The following table describes the Miscellaneous Debug Menu options:
Table 197 Miscellaneous Debug Menu options
Command
Usage
tbuf
Displays the management processor trace buffer. Header information similar to the following is
shown:
MP trace buffer at 13:28:15 Fri May 25, 2002; mask: 0x2ffdf748
The buffer information is displayed after the header.
snap
Displays the management processor snap (or post-mortem) trace buffer. This buffer contains
information traced at the time that a reset occurred.
clrcfg
Deletes all flash configuration blocks. The next time the GbE2 Interconnect Switch is rebooted,
it returns to the factory default settings.
ARP cache options
Command: /maint/arp
[Address Resolution Protocol Menu]
find
port
vlan
addr
dump
add
- Show a single ARP entry by IP address
- Show ARP entries on a single port
- Show ARP entries on a single VLAN
- Show ARP entries for switch's interfaces
- Show all ARP entries
- Add a permanent ARP entry
- Delete an ARP entry
del
clear - Clear ARP cache
The following table describes the Address Resolution Protocol Menu options:
Table 198 Address Resolution Protocol Menu options
Command
Usage
find <IP address>
Shows a single ARP entry by IP address. For example,
192.4.17.35
port <port number>
vlan <1-4095>
addr
Shows ARP entries on a single port.
Shows ARP entries on a single VLAN.
Shows the list of IP addresses that the switch will respond to
for ARP requests.
dump
Shows all ARP entries.
add <IP address> <MAC address> <1-4095> Adds a single ARP entry to switch memory.
<port number>
del <IP address>
Removes a single ARP entry from switch memory.
clear
Clears the entire ARP list from GbE2 Interconnect Switch
memory.
NOTE: To display all ARP entries currently held in the GbE2 Interconnect Switch, or a portion according to one
of the options listed on the menu above (find, port, vlan, dump), see the “ARP information” section of the
“Information Menu” chapter.
Maintenance Menu 169
IP Route Manipulation options
Command: /maint/route
[IP Routing Menu]
find
gw
type
tag
if
dump
clear
- Show a single route by destination IP address
- Show routes to a single gateway
- Show routes of a single type
- Show routes of a single tag
- Show routes on a single interface
- Show all routes
- Clear route table
The following table describes the IP Route Manipulation Menu options:
Table 199 IP Route Manipulation Menu options
Command
Usage
find <IP address>
gw <IP address>
Shows a single route by destination IP address.
Shows routes to a default gateway.
Shows routes of a single type.
type
indirect|direct|local|broadcast|martian|
multicast
tag fixed|static|addr|rip|ospf|
broadcast|martian
Shows routes of a single tag.
if <1-255>
dump
Shows routes on a single interface.
Shows all routes.
clear
Clears the route table from switch memory.
IGMP Multicast Group options
Command: /maint/igmp
[IGMP Multicast Group Menu]
snoop - IGMP Snooping Menu
mrouter - IGMP Multicast Router Port Menu
clear - Clear group and mrouter tables
The following table describes the IGMP Multicast Group Maintenance Menu options.
Table 200 IGMP Multicast Group Menu options
Command
snoop
Usage
Displays the IGMP Snooping maintenance menu.
Displays the IGMP Multicast Router maintenance menu.
Clears IGMP Multicast data from switch memory.
mrouter
clear
IGMP Snooping options
Command: /maint/igmp/snoop
[IGMP Multicast Group Menu]
find
vlan
port
trunk
dump
clear
- Show a single group by IP group address
- Show groups on a single vlan
- Show groups on a single port
- Show groups on a single trunk
- Show all groups
- Clear group tables
Maintenance Menu 170
The following table describes the IGMP Snoop Maintenance Menu options.
Table 201 IGMP Snooping Menu options
Command
Usage
find <IP address>
vlan <1-4095>
port <port number>
dump
Shows a single IGMP Multicast group by IP address.
Shows IGMP Multicast groups on a single VLAN.
Shows IGMP Multicast groups on a single port.
Shows all IGMP Multicast groups.
clear
Clears IGMP Multicast data from switch memory.
IGMP Mrouter options
Command: /maint/igmp/mrouter
[IGMP Multicast Routers Menu]
vlan
dump
clear
- Show all multicast router ports on a single vlan
- Show all multicast router ports
- Clear multicast router port table
The following table describes the IGMP Multicast Routers Maintenance Menu options.
Table 202 IGMP Multicast Group Menu options
Command
vlan <1-4095>
dump
Usage
Shows IGMP Multicast groups on a single VLAN.
Shows all IGMP Multicast routers.
Clears IGMP Multicast router data from switch memory.
clear
Uuencode flash dump
Command: /maint/uudmp
Using this command, dump information is presented in uuencoded format. This format makes it easy to capture the
dump information as a file or a string of characters.
If you want to capture dump information to a file, set your communication software on your workstation to capture
session data prior to issuing the uudmp command. This will ensure that you do not lose any information. Once
entered, the uudmp command will cause approximately 23,300 lines of data to be displayed on your screen and
copied into the file.
Using the uudmp command, dump information can be read multiple times. The command does not cause the
information to be updated or cleared from flash memory.
Dump information is not cleared automatically. In order for any subsequent dump information to be written to flash
memory, you must manually clear the dump region. For more information on clearing the dump region, see the
“Clearing dump information” section later in this chapter.
To access dump information, at the Maintenance# prompt, enter:
Maintenance# uudmp
The dump information is displayed on your screen and, if you have configured your communication software to do
so, captured to a file. If the dump region is empty, the following displays:
No FLASH dump available.
Maintenance Menu 171
FTP/TFTP system dump put
Command: /maint/ptdmp <server> <filename>
Use this command to put (save) the system dump to a FTP or TFTP server.
NOTE: If the FTP/TFTP server is running SunOS or the Solaris operating system, the specified ptdmp file must
exist prior to executing the ptdmp command, and must be writable (set with proper permission, and not locked
by any application). The contents of the specified file will be replaced with the current dump data.
To save dump information via FTP/TFTP, at the Maintenance# prompt, enter:
Maintenance# ptdmp <server> <filename>
Type the FTP/TFTP server IP address or hostname as <server>, and the target dump file as <filename>.
Clearing dump information
Command: /maint/cldmp
To clear dump information from flash memory, at the Maintenance# prompt, enter:
Maintenance# cldmp
The GbE2 Interconnect Switch clears the dump region of flash memory and displays the following message:
FLASH dump region cleared.
If the flash dump region is already clear, the switch displays the following message:
FLASH dump region is already clear.
Panic command
Command: /maint/panic
The panic command causes the GbE2 Interconnect Switch to immediately dump state information to flash memory
and automatically reboot.
To select panic, at the Maintenance# prompt, enter:
>> Maintenance# panic
A FLASH dump already exists.
Confirm replacing existing dump and reboot [y/n]:
Enter y to confirm the command:
Confirm dump and reboot [y/n]: y
A list of messages is displayed:
Starting system dump...done.
Reboot at 11:54:08 Wednesday February 28, 2007...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rebooted because of console PANIC command.
Booting complete
Maintenance Menu 172
Unscheduled system dumps
If there is an unscheduled system dump to flash memory, the following message is displayed when you log on to the
GbE2 Interconnect Switch:
Note: A system dump exists in FLASH. The dump was saved
at 13:43:22 Wednesday February 28, 2007. Use /maint/uudmp to
extract the dump for analysis and /maint/cldmp to
clear the FLASH region. The region must be cleared
before another dump can be saved.
Maintenance Menu 173
Index
configuration block, 166
H
802.1x information, 37
802.1x statistics, 62
health checks: default gateway
of failed health checks, 127
history command, 16
A
configuring RMON (remote
monitoring), 154
Hot Links: configuration, 123
abbreviating commands, 17
access control, user, 101
console port, connecting, 9
port option, 119
I
active switch configuration: gtcfg,
Address Resolution Protocol (ARP):
list, 169
Address Resolution Protocol (ARP)
Menu, 46
IEEE standards, 802.1d Spanning Tree
Protocol, 38
IGMP Multicast Group options, 170
IGMP Snooping options, 170
selection, 165
D
daylight savings time, 95
debugging, 167
default gateway, interval for health
checks, 127
default password: administrator, 19;
auto-negotiation: enable/disable on
configuration, 107
information dump, 59
Information Menu, 22
interface statistics, 66, 67
Internet Protocol (IP) statistics, 67
IP address: ARP information, 47;
BOOTP, 10; default gateway
configuration, 127
active IP interface: active, 148
IP interface: address configuration,
configuration, 127
autonomous system filter action, 131
diff flash command, 15, 88
disconnect idle timeout, 12
download software, 163
dump: configuration, 159;
B
banner (system option), 90
Boot Options Menu, 163
bootstrap protocol (BOOTP): obtain
the IP address, 10
bridge maximum age parameter:
bridge parameter menu, for STP, 115
bridge priority, 39
Bridge Protocol Data Unit (BPDU), 39,
bridge Spanning Tree parameters,
dynamic routes, 170
IP Interface Configuration Menu, 126
IP Route Manipulation options, 170
F
L
factory configuration block, 166
factory default configuration, 18
first-time configuration, 18
Forwarding Database (FDB):
maintenance, 168
Forwarding Database Information
Menu, 33
Forwarding Database Manipulation
Menu, 168
fwd (STP bridge option), 119
FwdDel (forward delay), bridge port,
lines command, 15
Link Aggregation Control Protocol
information, 34
link speed, configuration, 107, 108
port speed, 22, 57
C
capture dump information to a file,
information, 172
completion, 17
log, syslog messages, 91
login notice, 90
Common Internal Spanning Tree
information, 42
G
M
configuration: apply changes, 88;
default gateway interval, for health
address, 127; dump command,
gig (Port Menu option), 106
Gigabit Ethernet Physical Link, 106
Gigabit Ethernet, configuration, 106
global commands, 15
Greenwich Mean Time (GMT), 95
gtcfg (TFTP load command), 160
Maintenance Menu, 167
management processor (MP): trace
buffer, 169
mask, IP interface subnet address, 127
Index 174
MD5 cryptographic authentication,
media access control (MAC) address:
ARP information, 47; display
FDB manipulation, 168
Statistics Menu, 60
subnet address mask configuration, IP
subnet address, 127
subnets: IP interface, 126
switch: reset, 166
syslog: display messages, 31
information, 30, 58
System Configuration Menu, 89
System Information Menu, 23
system options: login banner, 90;
tnport, 90
R
Rapid Spanning Tree and Multiple
Spanning Tree information, 40
read community string (SNMP option),
retries, radius server, 93
retry, health checks for default
gateway, 127
revert apply command, 15, 88
Miscellaneous Debug Menu, 169
monitor port, 156
N
Network Time Protocol (NTP):
null modem cable, 9
T
O
RMON configuration: alarm, 155;
tab completion, 17
TCP statistics, 81
RMON Information Menu, 54
poisoned reverse, as used with split
horizon: poisoned reverse, 133
Routing Information Protocol (RIP):
version 1 parameters, 132
split horizon: split horizon, 133
online help, 15
operating mode, configuration, 107,
Operations-level port 802.1x options,
Operations-level port options, 161
Operations-level VRRP options, 162
Telnet: requirements, 10
telnet command, 16
timeout, radius server, 93
timeouts, idle connection, 12
tnport, system option, 90
trace buffer, 169
traceroute command, 15
Tracking: VRRP; tracking, 145
transmit flow control, 107
Trivial File Transfer Protocol (TFTP):
for updating switch software image,
S
save command, 15, 88, 166
save n command, 15
secret, radius server, 93
secsrv, secondary radius server, 93
Secure Shell (SSH): encryption and
authentication methods, 10
Secure Shell Server (SSHD) Menu, 92
shortcuts, 17
OSPF configuration, 134
P
typographical conventions, 13
tzone, 95
passwords, defaults, 19
ping command, 15
U
Simple Network Management Protocol
(SNMP): optional setup, 18
snap traces, buffer, 169
SNMP: set and get access, 96
SNMPv3 Access Table information, 25
SNMPv3 Community Table
information, 26
popd command, 16
port configuration, 106
UCB statistics, 81
unscheduled system dump, 173
upgrade, switch software, 163
user access control configuration, 101
user access levels, 11
Port Menu: configuration options, 106,
Ethernet (gig) configuration, 106
port mirroring, configuration, 156
port number, 57
uuencode flash dump, 171
SNMPv3 dump, 29
port speed, 22, 57
SNMPv3 Group Table information, 26
SNMPv3 Information Menu, 23
SNMPv3 Notify Table information, 28
SNMPv3 Target Address Table
information, 27
SNMPv3 Target Parameters Table
information, 27
SNMPv3 USM User Table information,
port statistics, 61
V
port trunking configuration, 121
ports: disable (temporarily), 107;
port priority, 119
preemption: assuming VRRP master
routing authority, 146
verbose n command, 16
view pending configuration changes,
virtual router: description, 145;
tracking criteria, 146
priority (STP port option), 119
prisrv, primary radius server, 93
ptcfg (TFTP save command), 159
pushd command, 16
virtual router group: VRRP priority
SNMPv3 View Table information, 25
software: image, 163
Virtual Router Redundancy Protocol
(VRRP): password, authentication;
VRRP authentication, 148; group
options (prio); virtual router; priority,
147; priority election for the virtual
router, 145
virtual routers: increasing priority level
preemption (prio); virtual router, 145
Spanning Tree Protocol (STP): bridge
groups, 43
sshport, 92
starting switch setup, 18
statistics dump, 86
pwd command, 15
Q
quiet (screen display option), 16
Index 175
|