3com Switch 7750 Command Reference
3com Switch 7750 Command Reference
Switch 7750
Switch 7754
Switch 7757
Switch 7758
www.3Com.com
Part Number: 10015463 Rev. AD
Published: December 2007
3Com Corporation Copyright © 2006-2007, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any
350 Campus Drive form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without
written permission from 3Com Corporation.
Marlborough, MA
3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time
USA 01752-3064 without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or
expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality,
and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license agreement
included with the product as a separate document, in the hard copy documentation, or on the removable media in a
directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will
be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are provided to
you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense. Software is
delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item”
as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial
license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or
FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided
on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered
in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
Cisco is a registered trademark of Cisco Systems, Inc.
Funk RADIUS is a registered trademark of Funk Software, Inc.
Aegis is a registered trademark of Aegis Group PLC.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are
registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a
registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed
to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards.
Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
CONTENTS
2 LOGIN COMMANDS
authentication-mode 57
auto-execute command 58
copyright-info enable 58
databits 59
display user-interface 60
display users 61
flow-control 62
free user-interface 62
header 63
history-command max-size 65
idle-timeout 66
ip http shutdown 66
lock 67
modem 68
modem auto-answer 68
modem timer answer 69
parity 69
protocol inbound 70
screen-length 70
send 71
service-type 72
set authentication password 73
shell 74
speed 75
stopbits 75
telnet 76
user-interface 76
4 CONTENTS
default-cost 355
default-route-advertise 356
display ospf abr-asbr 357
display ospf asbr-summary 357
display ospf brief 358
display ospf cumulative 360
display ospf error 361
display ospf interface 363
display ospf lsdb 364
display ospf nexthop 366
display ospf peer 366
display ospf request-queue 368
display ospf retrans-queue 369
display ospf routing 370
display ospf vlink 370
filter-policy export 371
filter-policy import 372
import-route 373
network 374
nssa 375
ospf 376
ospf authentication-mode 376
ospf cost 377
ospf dr-priority 378
ospf mib-binding 378
ospf mtu-enable 379
ospf network-type 380
ospf timer dead 381
ospf timer hello 382
ospf timer poll 382
ospf timer retransmit 383
ospf trans-delay 384
peer 384
preference 385
protocol multicast-mac enable 385
reset ospf 386
router id 387
silent-interface 387
snmp-agent trap enable ospf 388
spf-schedule-interval 389
stub 389
vlink-peer 390
static-rp 554
51 HA CONFIGURATION COMMANDS
display switchover state 683
slave auto-update config 683
slave restart 684
slave switchover 684
slave update configuration 685
expired 723
gateway-list 724
nbns-list 725
netbios-type 725
network 726
option 727
reset dhcp server conflict 728
reset dhcp server ip-in-use 728
reset dhcp server statistics 729
static-bind ip-address 729
static-bind mac-address 730
57 ACL COMMANDS
acl 755
acl mode 756
acl order 757
display acl config 757
display acl config statistics 758
display acl mode 758
display acl order 759
display acl remaining entry 759
display acl running-packet-filter 760
display time-range 760
packet-filter 762
reset acl counter 764
rule (Basic ACL) 765
rule (Advanced ACL) 766
rule (Layer 2 ACL) 771
rule (user-defined ACL) 773
time-range 774
58 QOS COMMANDS
display priority-trust 777
display qos cos-local-precedence-map 777
display qos-interface all 778
display qos-interface line-rate 778
display qos-interface queue-scheduler 779
display qos-interface traffic-bandwidth 780
display qos-interface traffic-limit 781
display qos-interface traffic-priority 781
display qos-interface traffic-red 781
display qos-interface traffic-redirect 782
display qos-interface traffic-remark 782
display qos-interface traffic-statistic 783
inboundcar 783
line-rate 784
priority 785
priority-trust 785
qos 787
qos cos-local-precedence-map 788
queue-scheduler 789
reset traffic-statistic 790
traffic-bandwidth 792
traffic-limit 794
Contents 25
traffic-priority 796
traffic-red 799
traffic-redirect 800
traffic-remark 801
traffic-statistic 803
59 MIRRORING COMMANDS
display mirroring-group 805
display qos-interface mirrored-to 806
mirrored-to 807
mirroring-group 809
mirroring-group (only for configuration recovery) 809
mirroring-group mirroring-port 810
mirroring-group mirroring-slot 811
mirroring-group monitor-port 811
mirroring-group monitor-slot 812
mirroring-group reflector-port 813
mirroring-group remote-probe vlan 813
remote-probe vlan 814
cluster-mac 834
cluster-mac syn-interval 835
delete-member 835
display cluster 836
display cluster candidates 837
display cluster members 838
ftp cluster 840
ftp-server 840
holdtime 841
ip address 841
ip-pool 842
logging-host 843
reboot member 843
snmp-host 844
tftp cluster get 845
tftp cluster put 845
tftp-server 846
timer 846
mkdir 961
more 961
move 962
pwd 963
rename 963
reset recycle-bin 964
rmdir 965
umount 965
undelete 966
ABCDEFGHIJKLMNOPQRSTUV
ABCDEFGHIJKLMNOPQRSTUV
boot bootrom 1037 databits 59
boot bootrom default 1038 data-flow-format 621
boot bootrom default 1131 data-flow-format 645
boot bootrom file-url 1131 debugging 1027
bootrom-update security-check default cost 331
enable 1038 default cost 352
bridgemactocpu 253 default interval 352
broadcast-suppression 101 default limit 353
broadcast-suppression 195 default local-preference 429
bsr-policy 539 default med 429
build 831 default tag 354
bye 945 default type 354
bye 998 default-cost 355
default-route-advertise 356
default-route-advertise 395
C delete 946
cache-sa-enable 557 delete 957
c-bsr 540 delete 999
cd 945 delete static-routes all 327
cd 955 delete-member 835
cd 998 description 102
cdup 946 description 197
cdup 998 description 229
check region-configuration 271 dhcp enable 705
checkzero 331 dhcp relay information enable 734
clock datetime 1017 dhcp relay information strategy 735
clock summer-time 1017 dhcp relay reply broadcast 736
clock timezone 1019 dhcp relay source-ip source-interface
close 999 736
cluster 832 dhcp select global 705
cluster enable 832 dhcp select interface 706
cluster switch-to 833 dhcp server detect 707
cluster-mac 834 dhcp server dns-list 707
cluster-mac syn-interval 835 dhcp server domain-name 709
command-privilege level 53 dhcp server expired 709
compare-different-as-med 425 dhcp server forbidden-ip 710
confederation id 426 dhcp server ip-pool 711
confederation nonstandard 427 dhcp server nbns-list 712
confederation peer-as 427 dhcp server netbios-type 713
control-vlan 1087 dhcp server option 714
copy 956 dhcp server ping 715
copy configuration 196 dhcp server static-bind 716
copyright-info enable 58 dhcp-relay gateway interface 733
cost-style 394 dhcp-relay gateway vlan 734
cpu-usage-threshold 1139 dhcp-security static 737
c-rp 541 dhcp-server 135
crp-policy 541 dhcp-server 738
cut connection 600 dhcp-server ip 738
dhcp-snooping 743
D dhcp-snooping information enable
743
dampening 428
Alphabetical Listing of Commands 41
ABCDEFGHIJKLMNOPQRSTUV
dhcp-snooping information format display bgp routing-table flap-info
744 439
dhcp-snooping information display bgp routing-table peer 440
packet-format 744 display bgp routing-table
dhcp-snooping information regular-expression 441
remote-id 745 display bgp routing-table statistic 441
dhcp-snooping information strategy display boot-loader 1039
745 display brief interface 197
dhcp-snooping information vlan display channel 973
circuit-id 746 display clock 1023
dhcp-snooping information vlan display cluster 836
remote-id 747 display cluster candidates 837
dhcp-snooping trust 748 display cluster members 838
dir 1000 display connection 601
dir 946 display cpu 1039
dir 957 display current-configuration 85
disconnect 1000 display debugging 1023
display acl config 757 display device 1040
display acl config statistics 758 display dhcp server conflict 716
display acl mode 758 display dhcp server expired 717
display acl order 759 display dhcp server free-ip 718
display acl remaining entry 759 display dhcp server ip-in-use 718
display acl running-packet-filter 760 display dhcp server statistics 719
display am user-bind 246 display dhcp server tree 720
display arp | 696 display dhcp-security 739
display arp 695 display dhcp-server 739
display arp attack-list 697 display dhcp-server interface 740
display arp entry-limit 697 display dhcp-snooping 749
display arp interface 698 display dhcp-snooping count 749
display arp proxy 704 display dhcp-snooping trust 750
display arp rate-limit 698 display dhcp-snooping vlan 750
display arp slot 699 display diagnostic-information 1028
display arp source-suppression 699 display dldp 247
display arp timer aging 700 display dns domain 1011
display arp vlan 700 display dns dynamic-host 1011
display bgp group 430 display dns server 1012
display bgp network 431 display domain 602
display bgp paths 431 display dot1x 573
display bgp peer 432 display environment 1041
display bgp routing-table 433 display fan 1041
display bgp routing-table as-path-acl display fib 143
434 display ftp-server 993
display bgp routing-table cidr 435 display ftp-user 993
display bgp routing-table community display garp statistics 177
436 display garp timer 177
display bgp routing-table display gmrp statistics 491
community-list 436 display gmrp status 491
display bgp routing-table dampened display gvrp statistics 183
437 display gvrp status 183
display bgp routing-table display habp 591
different-origin-as 438 display habp table 591
42 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
display habp traffic 592 display local-server statistics 622
display history-command 53 display local-user 603
display hwtacacs 646 display logbuffer 974
display icmp statistics 144 display logbuffer summary 976
display igmp group 525 display loopback-detection 201
display igmp interface 526 display mac-address 254
display igmp-snooping configuration display mac-address aging-time 253
493 display mac-address multicast 523
display igmp-snooping group 493 display mac-address security 233
display igmp-snooping statistics 494 display mac-authentication 261
display info-center 973 display memory 1042
display interface 198 display memory 487
display interface Vlan-interface 102 display memory limit 487
display ip host 1012 display mirroring-group 805
display ip interface 139 display monitor-link group 1125
display ip ip-prefix 475 display mpm forwarding-table 509
display ip netstream cache 1097 display mpm group 510
display ip netstream export 1098 display msdp brief 557
display ip routing-table 315 display msdp peer-status 558
display ip routing-table acl 316 display msdp sa-cache 559
display ip routing-table ip-address display msdp sa-count 560
318 display multicast forwarding-table
display ip routing-table ip-address1 511
ip-address2 320 display multicast routing-table 512
display ip routing-table ip-prefix 321 display multicast-source-deny 514
display ip routing-table protocol 322 display multicast-vlan 495
display ip routing-table radix 323 display ndp 815
display ip routing-table statistics 324 display ntdp 821
display ip routing-table verbose 325 display ntdp device-list 821
display ip socket 145 display ntp-service sessions 909
display ip source static binding 751 display ntp-service status 909
display ip statistics 147 display ntp-service trace 910
display ipx interface 157 display ospf abr-asbr 357
display ipx routing-table 158 display ospf asbr-summary 357
display ipx service-table 160 display ospf brief 358
display ipx statistics 161 display ospf cumulative 360
display isis brief 395 display ospf error 361
display isis interface 396 display ospf interface 363
display isis lsdb 397 display ospf lsdb 364
display isis mesh-group 397 display ospf nexthop 366
display isis peer 398 display ospf peer 366
display isis route 398 display ospf request-queue 368
display isis spf-log 399 display ospf retrans-queue 369
display isolate port 229 display ospf routing 370
display isolate-user-vlan 131 display ospf vlink 370
display lacp system-id 219 display pim bsr-info 542
display link-aggregation interface display pim interface 543
219 display pim neighbor 544
display link-aggregation summary display pim routing-table 544
220 display pim rp-info 546
display link-aggregation verbose 221 display poe interface 849
Alphabetical Listing of Commands 43
ABCDEFGHIJKLMNOPQRSTUV
display poe interface power 851 display rrpp statistics 1088
display poe powersupply 852 display rrpp verbose 1089
display poe pse 853 display rsa local-key-pair public 923
display poe-power ac-input state 861 display rsa peer-public-key 924
display poe-power alarm 861 display saved-configuration 93
display poe-power dc-output state display schedule reboot 1043
862 display shared-vlan 193
display poe-power dc-output value display smart-link flush 1117
863 display smart-link group 1118
display poe-power switch state 863 display snmp-agent 877
display poe-profile 870 display snmp-agent community 877
display port 111 display snmp-agent group 878
display port vlan-vpn 187 display snmp-agent mib-view 879
display port-security 233 display snmp-agent statistics 880
display power 1043 display snmp-agent sys-info 881
display priority-trust 777 display snmp-agent usm-user 881
display protocol-vlan interface 117 display ssh server 925
display protocol-vlan slot 118 display ssh server-info 937
display protocol-vlan vlan 118 display ssh user-information 926
display qos display startup 97
cos-local-precedence-map 777 display stop-accounting-buffer 624
display qos-interface all 778 display stop-accounting-buffer 647
display qos-interface line-rate 778 display stp 272
display qos-interface mirrored-to 806 display stp abnormalport 274
display qos-interface display stp portdown 274
queue-scheduler 779 display stp region-configuration 275
display qos-interface display stp root 276
traffic-bandwidth 780 display stp root 276
display qos-interface traffic-limit 781 display supervision-module
display qos-interface traffic-priority information 864
781 display supervlan 135
display qos-interface traffic-red 781 display switchover state 683
display qos-interface traffic-redirect display tcp statistics 148
782 display tcp status 150
display qos-interface traffic-remark display this 96
782 display time-range 760
display qos-interface traffic-statistic display traffic-accounting
783 accounting-slot 664
display qos-vlan traffic-redirect 1107 display traffic-accounting statistics
display radius 622 664
display radius statistics 623 display traffic-accounting
display rip 332 traffic-group 665
display rip routing 333 display transceiver alarm interface
display rmon alarm 895 1043
display rmon event 896 display transceiver diagnosis interface
display rmon eventlog 897 1046
display rmon history 897 display transceiver interface 1047
display rmon prialarm 898 display transceiver manuinfo
display rmon statistics 900 interface 1048
display route-policy 475 display trapbuffer 976
display rrpp brief 1088 display udp statistics 150
44 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
display udp-helper server 873
display uplink monitor 1048
F
display user-interface 60 file prompt 960
display users 61 filter-policy export 334
display version 1024 filter-policy export 371
display vlan 103 filter-policy export 401
display vlan 124 filter-policy export 442
display voice vlan oui 123 filter-policy import 335
display voice vlan status 123 filter-policy import 372
display vrrp 671 filter-policy import 401
display vrrp statistics 672 filter-policy import 442
display vrrp verbose 673 fixdisk 960
dldp 248 flow interval 204
dldp authentication-mode 249 flow-control 203
dldp delaydown-timer 252 flow-control 62
dldp interval 249 flow-control enable 203
dldp reset 250 flush enable control-vlan 1118
dldp unidirectional-shutdown 251 format 961
dldp work-mode 252 free user-interface 62
dns domain 1013 free web-users 79
dns resolve 1014 ftp 1001
dns server 1014 ftp cluster 840
dns-list 722 ftp server enable 994
domain 605 ftp timeout 994
domain-authentication-mode 400 ftp-server 840
domain-name 723
dot1x 575 G
dot1x authentication-method 576
garp timer 178
dot1x dhcp-launch 577
garp timer leaveall 179
dot1x guest-vlan 578
gateway-list 724
dot1x max-user 579
get 1001
dot1x port-control 580
get 947
dot1x port-method 581
gmrp 492
dot1x quiet-period 582
gratuitous-arp-learning enable 700
dot1x re-authenticate 583
group 443
dot1x retry 584
gvrp 184
dot1x retry-version-max 584
gvrp registration 185
dot1x supp-proxy-check 585
dot1x timer 587
dot1x version-check 589 H
double-vlan-id 189 habp enable 592
duplex 201 habp server vlan 593
habp timer 593
E hardspeedup 204
hash 222
enable 1098
header 63
enable log updown 202
help 948
enable snmp trap updown 882
higig-port mac-learning disable 255
execute 958
history-command max-size 65
exit 947
holdtime 841
expired 723
host-route 336
Alphabetical Listing of Commands 45
ABCDEFGHIJKLMNOPQRSTUV
hwtacacs nas-ip 647 import-route 444
hwtacacs scheme 648 import-route isis level-2 into level-1
icmp redirect send 151 404
import-source 560
inboundcar 783
I info-center channel 977
idle-cut 606 info-center console channel 978
idle-timeout 66 info-center enable 978
if-match { acl | ip-prefix } 476 info-center logbuffer 979
if-match as-path 477 info-center loghost 980
if-match community 477 info-center loghost source 981
if-match cost 478 info-center monitor channel 981
if-match interface 479 info-center snmp channel 982
if-match ip next-hop 479 info-center source 983
if-match tag 480 info-center timestamp 987
igmp enable 527 info-center trapbuffer 988
igmp group-limit 527 instance 277
igmp group-policy 528 interface 205
igmp group-policy vlan 529 interface Vlan-interface 104
igmp host-join 505 ip 152
igmp host-join port 504 ip address 140
igmp host-join port 530 ip address 841
igmp host-join vlan 531 ip as-path-acl 481
igmp lastmember-queryinterval 531 ip check source ip-address 751
igmp max-response-time 532 ip community-list 481
igmp proxy 533 ip forward-broadcast 152
igmp report-aggregation 534 ip host 1015
igmp robust-count 534 ip http acl 80
igmp timer other-querier-present 535 ip http shutdown 66
igmp timer query 536 ip ip-prefix 482
igmp version 537 ip netstream aggregation 1099
igmp-snooping 496 ip netstream export dscp 1100
igmp-snooping fast-leave 496 ip netstream export host 1100
igmp-snooping general-query ip netstream export source 1101
source-ip 497 ip netstream export version 1102
igmp-snooping group-limit 498 ip netstream inbound source 1102
igmp-snooping group-policy 498 ip netstream outbound source 1103
igmp-snooping host-aging-time 500 ip netstream template refresh 1104
igmp-snooping max-response-time ip netstream template timeout 1104
501 ip netstream timeout active 1105
igmp-snooping querier 501 ip netstream timeout inactive 1105
igmp-snooping query-interval 502 ip route-static 327
igmp-snooping report-aggregation ip route-static default-preference 328
502 ip source static binding 752
igmp-snooping router-aging-time ip-pool 842
503 ipv4-family 445
igmp-snooping version 504 ipx enable 163
ignore-lsp-checksum-error 402 ipx encapsulation 163
import-route 336 ipx netbios-propagation 164
import-route 373 ipx network 164
import-route 403 ipx rip import-route static 165
46 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
ipx rip mtu 166 link-aggregation group 1119
ipx rip multiplier 166 link-aggregation group 1125
ipx rip timer update 167 link-aggregation group description
ipx route load-balance-path 167 225
ipx route max-reserve-path 168 link-aggregation group mode 226
ipx route-static 168 loadsharing enable 1049
ipx sap disable 169 local-server 626
ipx sap gns-disable-reply 170 local-user 607
ipx sap gns-load-balance 170 local-user password-display-mode
ipx sap max-reserve-servers 171 608
ipx sap mtu 171 lock 67
ipx sap multiplier 172 logging-host 843
ipx sap timer update 172 log-peer-change 414
ipx service 173 loopback-detection control 207
ipx split-horizon 174 loopback-detection enable 206
ipx tick 174 loopback-detection interval-time 207
ipx update-change-only 175 loopback-detection per-vlan enable
isis 404 208
isis authentication-mode 405 ls 1002
isis circuit-level 406 ls 948
isis cost 407
isis dis-priority 407
isis enable 408
M
isis mesh-group 409 mac-address 256
isis timer csnp 410 mac-address learning
isis timer hello 410 synchronization 257
isis timer holding-multiplier 411 mac-address mac-learning disable
isis timer lsp 412 258
isis timer retransmit 413 mac-address max-mac-count 258
is-level 413 mac-address multicast interface 523
isolate-user-vlan 132 mac-address security 235
isolate-user-vlan enable 132 mac-address timer 259
mac-authentication 263
mac-authentication authmode
J usernameasmacaddress 264
jumboframe enable 206 mac-authentication authmode
usernamefixed 265
mac-authentication authpassword
K 266
key 625 mac-authentication authusername
key 649 266
mac-authentication domain 267
L mac-authentication interface 264
mac-authentication re-authenticate
lacp enable 223 enable 267
lacp port-priority 224 mac-authentication re-authenticate
lacp system-priority 224 mac-address 268
language-mode 1019 mac-authentication timer 268
lcd 1002 md5-compatible 415
level 607 mdi 209
line-rate 784 memory { safety | limit }* 490
link-aggregation 225
Alphabetical Listing of Commands 47
ABCDEFGHIJKLMNOPQRSTUV
memory auto-establish disable 488 netbios-type 725
memory auto-establish enable 489 network 337
messenger 609 network 374
mirrored-to 807 network 445
mirroring-group (only for network 666
configuration recovery) 809 network 726
mirroring-group 809 network-entity 415
mirroring-group mirroring-port 810 nssa 375
mirroring-group mirroring-slot 811 ntdp enable 823
mirroring-group monitor-port 811 ntdp explore 824
mirroring-group monitor-slot 812 ntdp hop 824
mirroring-group reflector-port 813 ntdp timer 825
mirroring-group remote-probe vlan ntdp timer hop-delay 825
813 ntdp timer port-delay 826
mkdir 1003 ntp-service access 911
mkdir 949 ntp-service authentication enable
mkdir 961 912
modem 68 ntp-service authentication-keyid 912
modem auto-answer 68 ntp-service broadcast-client 913
modem timer answer 69 ntp-service broadcast-server 913
monitor inner-channel 1135 ntp-service disable 914
monitor inner-channel 1136 ntp-service in-interface disable 914
monitor slot 1137 ntp-service max-dynamic-sessions
monitor-link group 1126 915
more 961 ntp-service multicast-client 915
move 962 ntp-service multicast-server 916
msdp 561 ntp-service refclock-master 917
msdp-tracert 561 ntp-service reliable
multicast route-limit 514 authentication-keyid 918
multicast routing-enable 515 ntp-service source-interface 918
multicast static-router-port 515 ntp-service unicast-peer 919
multicast static-router-port vlan 516 ntp-service unicast-server 920
multicast wrongif-holdtime 517
multicast-source-deny enable 519
multicast-source-deny enable
O
interface 518 open 1003
multicast-suppression 209 option 727
multicast-vlan enable 506 originating-rp 563
multicast-vlan subvlan 506 ospf 376
ospf authentication-mode 376
ospf cost 377
N ospf dr-priority 378
name 105 ospf mib-binding 378
name 610 ospf mtu-enable 379
nas-ip 627 ospf network-type 380
nas-ip 649 ospf timer dead 381
nbns-list 725 ospf timer hello 382
ndp enable 817 ospf timer poll 382
ndp timer aging 817 ospf timer retransmit 383
ndp timer hello 818 ospf trans-delay 384
48 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
P poe legacy enable slot 855
poe max-power 855
packet-filter 762 poe max-power slot 856
parity 69 poe mode 856
passive 1004 poe power max-value 857
password 610 poe power-management 857
pause-protection 1050 poe priority 858
peer 338 poe upgrade 859
peer 384 poe-power input-thresh lower 865
peer advertise-community 446 poe-power input-thresh upper 865
peer allow-as-loop 446 poe-power output-thresh lower 866
peer as-number 447 poe-power output-thresh upper 866
peer as-path-acl export 447 poe-profile 870
peer as-path-acl import 448 port 111
peer connect-interface 449 port 1119
peer connect-interface 564 port 1127
peer default-route-advertise 449 port 230
peer description 450 port access vlan 112
peer description 564 port hybrid protocol-vlan vlan 119
peer ebgp-max-hop 451 port hybrid pvid vlan 112
peer enable 451 port hybrid vlan 113
peer filter-policy export 452 port isolate group 230
peer filter-policy import 452 port link-aggregation group 226
peer group 453 port link-type 114
peer ip-prefix export 454 port monitor last 210
peer ip-prefix import 454 port monitor last slot 211
peer mesh-group 565 port monitor-link group 1128
peer minimum-ttl 565 port smart-link group 1120
peer next-hop-local 455 port trunk permit vlan 115
peer password 455 port trunk pvid vlan 115
peer public-as-only 456 port-isolate group 231
peer reflect-client 457 port-security authorization ignore
peer request-sa-enable 566 237
peer route-limit 458 port-security enable 236
peer route-policy export 459 port-security intrusion-mode 236
peer route-policy import 460 port-security max-mac-count 238
peer route-update-interval 460 port-security ntk-mode 239
peer sa-cache-maximum 567 port-security oui 239
peer sa-policy 567 port-security port-mode 240
peer sa-request-policy 568 port-security timer disableport 241
peer timer 461 port-security trap 242
peer-public-key end 926 preference 339
pim 546 preference 385
pim bsr-boundary 547 preference 416
pim dm 548 preference 462
pim neighbor-limit 548 primary accounting 628
pim neighbor-policy 549 primary accounting 650
pim sm 549 primary authentication 629
pim timer hello 550 primary authentication 651
ping 1031 primary authorization 652
poe enable 854 priority 785
poe enable slot 854
Alphabetical Listing of Commands 49
ABCDEFGHIJKLMNOPQRSTUV
priority-trust 785 reset arp attack-list 702
protocol inbound 70 reset bgp 464
protocol inbound 926 reset bgp dampening 465
protocol multicast-mac enable 385 reset bgp flap-info 465
protocol-vlan 121 reset counters interface 212
protocol-vlan vlan slot 120 reset dhcp server conflict 728
public-key-code begin 927 reset dhcp server ip-in-use 728
public-key-code begin 937 reset dhcp server statistics 729
public-key-code end 928 reset dhcp-server 741
public-key-code end 938 reset dhcp-snooping 753
put 1004 reset dns dynamic-host 1015
put 949 reset dot1x statistics 589
pwd 1005 reset garp statistics 180
pwd 950 reset hwtacacs statistics 652
pwd 963 reset igmp group 537
reset igmp-snooping statistics 507
reset ip netstream statistics 1106
Q reset ip routing-table statistics 326
qe monitor 1050 reset ip statistics 153
qe monitor errpkt 1051 reset ipx routing-table statistics
qe monitor errpkt check-time 1051 protocol 175
qe monitor inner-bad 1052 reset ipx statistics 176
qe monitor overflow-threshold 1053 reset isis all 417
qos 787 reset isis peer 417
qos cos-local-precedence-map 788 reset lacp statistics 227
queue-scheduler 789 reset logbuffer 989
quit 1005 reset mac-authentication 269
quit 1020 reset msdp peer 569
quit 950 reset msdp sa-cache 569
reset msdp statistics 570
R reset multicast forwarding-table 519
reset multicast routing-table 520
radius nas-ip 630 reset ndp statistics 819
radius scheme 630 reset ospf 386
radius-scheme 611 reset pim neighbor 552
raw-vlan-id inbound 190 reset pim routing-table 552
rdram 1053 reset radius statistics 631
reboot 1054 reset recycle-bin 964
reboot member 843 reset rrpp statistics 1091
reflect between-clients 462 reset saved-configuration 98
reflector cluster-id 463 reset smart-link packets counter 1121
refresh bgp 463 reset stop-accounting-buffer 632
region-name 278 reset stop-accounting-buffer 653
register-policy 551 reset stp 278
remotehelp 1005 reset tcp statistics 153
remote-probe vlan 814 reset traffic-statistic 790
remove 951 reset trapbuffer 989
rename 951 reset udp statistics 154
rename 963 reset udp-helper packet 873
reset 339 reset vrrp statistics 675
reset acl counter 764 retry 633
reset arp 701
50 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
retry realtime-accounting 633 secondary authentication 636
retry stop-accounting 635 secondary authentication 655
retry stop-accounting 654 secondary authorization 656
return 1020 security-policy-server 661
revision-level 279 self-service-url 613
ring 1091 send 71
ring enable 1094 server-type 637
rip 340 service-type 614
rip authentication-mode 340 service-type 72
rip input 341 set authentication password 73
rip metricin 342 set backboard enhance 1056
rip metricout 343 set inlink 1133
rip output 343 set-overload 417
rip split-horizon 344 sftp 952
rip version 345 sftp server enable 943
rip work 345 shared-vlan mainboard 193
rmdir 1006 shared-vlan slot 194
rmdir 952 shell 74
rmdir 965 shutdown 105
rmon alarm 901 shutdown 212
rmon event 902 shutdown 570
rmon history 903 silent-interface 387
rmon prialarm 904 silent-interface 418
rmon statistics 906 slave auto-update config 683
route-policy 484 slave restart 684
router id 387 slave switchover 684
router id 466 slave update configuration 685
rrpp domain 1095 smart-link flush enable 1121
rrpp enable 1095 smart-link group 1122
rsa local-key-pair create 928 smart-link group 1128
rsa local-key-pair destroy 929 snmp-agent 883
rsa peer-public-key 930 snmp-agent community 80
rsa peer-public-key 938 snmp-agent community 883
rsa peer-public-key import sshkey snmp-agent group 81
930 snmp-agent group 884
rsa peer-public-key import sshkey snmp-agent local-switch fabricid 885
939 snmp-agent mib-view 886
rule (Advanced ACL) 766 snmp-agent packet max-size 887
rule (Basic ACL) 765 snmp-agent sys-info 887
rule (Layer 2 ACL) 771 snmp-agent target-host 888
rule (user-defined ACL) 773 snmp-agent trap enable 889
snmp-agent trap enable ospf 388
snmp-agent trap ifmib 891
S snmp-agent trap life 891
save 98 snmp-agent trap queue-size 892
schedule reboot at 1054 snmp-agent trap source 892
schedule reboot delay 1055 snmp-agent usm-user 82
scheme 612 snmp-agent usm-user 893
screen-length 70 snmp-host 844
secondary accounting 635 source-policy 554
secondary accounting 654 speed 213
Alphabetical Listing of Commands 51
ABCDEFGHIJKLMNOPQRSTUV
speed 75 stp mcheck 296
speed auto 213 stp mode 297
speedup 214 stp no-agreement-check 297
spf-delay-interval 419 stp pathcost-standard 298
spf-schedule-interval 389 stp point-to-point 300
spf-slice-size 419 stp port priority 301
spt-switch-threshold 551 stp portlog 302
ssh authentication-type default 931 stp portlog all 302
ssh client assign rsa-key 940 stp priority 303
ssh client first-time enable 940 stp region-configuration 303
ssh server authentication-retries 932 stp root primary 304
ssh server compatible-ssh1x enable stp root secondary 305
932 stp root-protection 306
ssh server rekey-interval 933 stp tc-protection 307
ssh server timeout 933 stp tc-protection threshold 308
ssh user 934 stp timer forward-delay 309
ssh user assign rsa-key 934 stp timer hello 309
ssh user authentication-type 935 stp timer max-age 310
ssh user service-type 943 stp timer-factor 311
ssh2 941 stp transmit-limit 312
startup saved-configuration 99 stub 389
state 614 subvlan 136
state 637 summary 346
static-bind ip-address 729 summary 420
static-bind mac-address 730 summary 466
static-rp 554 super 54
static-rpf-peer 570 super password 55
stop-accounting-buffer enable 638 supervlan 137
stop-accounting-buffer enable 657 sysname 1021
stopbits 75 system-view 1021
stp 279
stp bpdu-protection 280
stp bridge-diameter 281
T
stp config-digest-snooping 282 tcp timer fin-timeout 154
stp cost 283 tcp timer syn-timeout 154
stp edged-port 284 tcp window 155
stp interface 285 telnet 76
stp interface config-digest-snooping temperature-limit 1056
285 terminal debugging 1029
stp interface cost 287 terminal debugging 989
stp interface edged-port 288 terminal logging 990
stp interface loop-protection 289 terminal monitor 990
stp interface mcheck 289 terminal trapping 991
stp interface no-agreement-check tftp cluster get 845
290 tftp cluster put 845
stp interface point-to-point 291 tftp get 1009
stp interface port priority 292 tftp put 1009
stp interface root-protection 293 tftp-server 846
stp interface transmit-limit 294 tftp-server acl 1010
stp loop-protection 294 timer 1096
stp max-hops 295 timer 467
52 ALPHABETICAL LISTING OF COMMANDS
ABCDEFGHIJKLMNOPQRSTUV
timer 639 undo synchronization 467
timer 846 undo vrrp vrid 675
timer lsp-max-age 421 unicast-suppression 215
timer lsp-refresh 421 uplink monitor 1057
timer quiet 640 user 1006
timer quiet 657 user privilege level 77
timer realtime-accounting 641 user-interface 76
timer realtime-accounting 658 user-name-format 642
timer response-timeout 641 user-name-format 659
timer response-timeout 659
timer retry 571
timer spf 422
V
time-range 774 verbose 1007
timers 347 virtual-cable-test 216
tracert 1033 vlan 106
traffic-accounting accounting-slot vlan all 108
666 vlan to 107
traffic-accounting traffic-group 667 vlan-assignment-mode 615
traffic-bandwidth 792 vlan-mapping modulo 312
traffic-group 667 vlan-vpn enable 187
traffic-limit 794 vlan-vpn priority 188
traffic-priority 796 vlan-vpn tunnel 313
traffic-red 799 vlan-vpn vid 190
traffic-redirect 800 vlink-peer 390
traffic-redirect inbound ip-group voice vlan 125
1108 voice vlan aging 125
traffic-redirect outbound ip-group voice vlan enable 126
1109 voice vlan legacy 127
traffic-remark 801 voice vlan mac-address 127
traffic-share-across-interface 347 voice vlan mode 128
traffic-slot 668 voice vlan security enable 129
traffic-statistic 803 vrrp method 675
vrrp ping-enable 676
vrrp un-check ttl 677
U vrrp vrid authentication-mode 677
udp-helper enable 874 vrrp vrid preempt-mode 678
udp-helper port 874 vrrp vrid priority 679
udp-helper server 875 vrrp vrid timer advertise 680
umount 965 vrrp vrid track 681
undelete 966 vrrp vrid virtual-ip 682
undo dhcp-relay gateway all 741
ABOUT THIS GUIDE
This guide describes the 3Com® Switch 7750 and how to install hardware,
configure and boot software, and maintain software and hardware. This guide
also provides troubleshooting and support information for your switch.
This guide is intended for Qualified Service personnel who are responsible for
configuring, using, and managing the switches. It assumes a working knowledge
of local area network (LAN) operations and familiarity with communication
protocols that are used to interconnect LANs.
n Always download the Release Notes for your product from the 3Com World Wide
Web site and check for the latest updates to software and product
documentation:
http://www.3com.com
Conventions Table 1 lists icon conventions that are used throughout this guide.
Table 1 Notice Icons
Related The following manuals offer additional information necessary for managing your
Documentation Switch 7750:
■ Switch 7750 Release Notes — Contains the latest information about your
product. If information in this guide differs from information in the release
notes, use the information in the Release Notes.
http://www.3com.com/
CLI CONFIGURATION COMMANDS
1
command-privilege level
view: Command view. This argument can be any command view the switch
supports.
Description Use the command-privilege level command to set the level of the specified
command in a specified view.
Use the undo command-privilege view command to restore the level of the
specified command in the specified view to the default.
Commands fall into four command levels: visit, monitor, system, and manage,
which are identified as 0, 1, 2, and 3 respectively. The administrator can change
the level of a command to enable users of specific level to utilize the command.
By default, the ping, tracert, and telnet commands are at the visit level (level 0);
the display and debugging commands are at the monitor level (level 1); all
configuration commands are at the system level (level 2); and FTP/TFTP and file
system related commands are at the manage level (level 3).
display history-command
Parameter None
Description Use the display history-command command to display history commands. All
the history commands are saved in the history command cache. When the history
command cache is full, the old information in it will be overlaid.
super
Parameter level: User level. This argument ranges from 0 to 3 and defaults to 3. If you
execute this command with the level argument not provided, this command
switches the current user level to level 3.
Description Use the super command to switch the current user level to the one identified by
the level argument. If a password is previously set by using the super password [
level level ] { simple | cipher } password command, you need to provide the
password as well to switch to the higher user level. You will remain in the original
user level if you fail to provide the correct password.
n Note that:
■ Users logging into a switch also fall into four levels, each of which
corresponding to one of the command levels. Users at a specific level can only
use the commands at the same level and the commands at the lower levels.
■ You can specify an AUX user to provide a password when he switches from a
lower user level to a higher user level and specify the password by using the
super password [ level level ] { simple | cipher } password command. With a
password configured, an AUX user remains in the original user level if the
password provided is incorrect when the AUX user attempts to switch to a
higher user level. If the password is not configured, an AUX user can switch to
a higher user level directly.
■ A password is necessary for a VTY user to switch to a higher user level. You can
use the super password [ level level ] { simple | cipher } password command
to set the password. With the password not configured, a VTY user is
prompted the message reading "Password is not set" and remains in the
previous level.
■ An AUX user or a VTY user can switch to a lower user level directly regardless
of the password.
super password 55
super password
Parameter level: User level. This argument ranges from 1 to 3 and defaults to 3. If you
execute this command with the level argument not provided, this command sets
the password to switch to level 3.
password: Password to be set. If you specify the simple keyword, provide this
argument in plain text. If you specify the cipher keyword, you can provide this
argument in either encrypted text or plain text. In this case, a password containing
no more than 16 characters (such as 123) is regarded to be in plain text and is
converted to the corresponding 24-character encrypted form (such as
7-CZB#/YX]KQ=^Q‘MAF4<1!!) automatically. You can also provide a 24-character
encrypted password directly (such as 7-CZB#/YX]KQ=^Q‘MAF4<1!!). In this case,
you must know its corresponding plain-text password is 123.
Description Use the super password command to set the password for users to switch to a
higher user level. To prevent unauthorized accesses, you can use this command to
require users to provide the password when they switch to a higher user level. For
security purpose, the password a user enters when switching to a higher user level
is not displayed. A user will remain at the original user level if the user has tried
three times to enter the correct password but fails to do this.
Note that no matter what form of the password (plain text or encrypted text) is in,
the password entered for verification must be in plain text.
Example # Set the password to switch from the current user level to user level 3 to
"1234567890".
<SW7750> system-view
System View: return to User View with Ctrl+Z.
56 CHAPTER 1: CLI CONFIGURATION COMMANDS
authentication-mode
If you specify to perform local authentication when a user logs in through the
Console port, a user can log into the switch with the password not configured.
But for a VTY user interface, a password is needed for a user to log into the switch
through it under the same circumstance.
By default, users logging in through the Console port are not authenticated,
whereas modem users and Telnet users are authenticated.
c CAUTION: For a VTY user interface, to specify the none keyword or password
keyword for login users, make sure that SSH is not enabled in the user interface.
Otherwise, the configuration fails. Refer to “protocol inbound” on page 70 for
related configuration.
58 CHAPTER 2: LOGIN COMMANDS
Example # Configure to authenticate users using the local password on the AUX interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface aux 0
[SW7750-ui-aux0] authentication-mode password
auto-execute command
Description Use the auto-execute command command to set the command that is
executed automatically after a user logs in.
c CAUTION:
■ The auto-execute command command may cause you unable to perform
common configuration in the user interface, so use it with caution.
■ Before executing the auto-execute command command and save your
configuration, make sure you can log into the switch in other modes and
cancel the configuration.
copyright-info enable
Parameter None
These two commands apply to users logging in through the Console port and
Telnet users.
# After the above configuration, the copyright information is not displayed when a
user logs into the switch successfully, as shown below.
<SW7750>
databits
Syntax databits { 7 | 8 }
undo databits
Description Use the databits command to set the databits for the user interface.
Use the undo databits command to revert to the default data bits.
display user-interface
Description Use the display user-interface command to display the information about a
specified user interface or all user interfaces. If the summary keyword is not
specified, this command displays user interface type, absolute/relative user
interface number, transmission speed, available command level, authentication
mode, and physical position. If the summary keyword is specified, this command
displays the number and type of the user interfaces, including those that are in use
and those that are not in use.
Filed Description
+ The user interface is in use.
F The user interface operates in asynchronous mode.
Idx The absolute index of the user interface
Type User interface type and the relative index
Tx/Rx Transmission speed of the user interface
Modem Indicates whether or not a modem is used.
Privi Available command level
display users 61
Filed Description
Auth Authentication mode
Int Physical position of the user interface
A The current user is authenticated by AAA.
N Users are not authenticated.
P Users need to provide passwords to pass the authentication.
display users
Description Use the display users command to display the information about user
interfaces. If you do not specify the all keyword, only the information about the
current user interface is displayed.
Field Description
F The information is about the current user interface, and the current user
interface operates in asynchronous mode.
UI The numbers in the left sub-column are the absolute user interface indexes, and
those in the right sub-column are the relative user interface indexes.
Delay The period (in seconds) the user interface idles for.
Type User type
IPaddress The IP address form which the user logs in.
Username The login name of the user that logs into the user interface.
62 CHAPTER 2: LOGIN COMMANDS
Field Description
Userlevel The level of the commands available to the users logging into the user interface
+ The user interface is in use.
flow-control
undo flow-control
Description Use the flow-control command to configure the flow control mode of the user
interface.
Use the undo flow-control command to restore the default flow control mode
of the user interface.
free user-interface
number: Index of the user interface. This argument can be an absolute user
interface index (if you do not provide the type argument) or a relative user
interface index (if you provide the type argument).
header 63
Description Use the free user-interface command to release a specified user interface. If
you execute this command, the corresponding user interface will be disconnected.
After you execute this command, user interface VTY 0 will be disconnected. The
user in it must log in again to connect to the switch.
header
Parameter Incoming: Sets the login banner for users that log in through modems. If you
specify to authenticate login users, the banner appears after a user passes the
authentication. (The session does not appear in this case.)
login: Sets the login banner. The banner set by this keyword is valid only when
users are authenticated before they log into the switch and appears while the
switch prompts for user name and password.
shell: Sets the session banner, which appears after a session is established. If you
specify to authenticate login users, the banner appears after a user passes the
authentication.
Description Use the header command to set the banners that are displayed when a user logs
into a switch. The login banner is displayed on the terminal when the connection
is established. And the session banner is displayed on the terminal if a user
successfully logs in.
Use the undo header command to disable displaying a specific banner or all
banners.
64 CHAPTER 2: LOGIN COMMANDS
Note that if you specify any one of the three keywords without providing the text
argument, the specified keyword will be regarded as the login information.
You can specify the banner in the following three ways, each of which requires
that the first character and the last character of the banner be the same.
■ Enter the banner in multiple lines. If you only type one character in the first line
of a banner, the character and the last character do not act as part of the
banner. The following gives an example of this way.
[SW7750] header shell 0
Input banner text, and quit with the character ’0’.
Welcome!0
When you log in the next time, "Welcome!" is displayed as the banner. The
beginning character and the end character (character 0) do not appear.
■ Enter the banner in multiple lines. If you type multiple characters in the first line
of a banner and the beginning and the end characters of the banner in this line
are not the same, the beginning character is part of the banner. The following
is an example.
[SW7750] header shell hello
Input banner text, and quit with the character ’h’.
my friend !
h
When you log in the next time, "hello" and "my friend !" is displayed respectively
in two lines as the banner. The beginning character "h" appears in the banner.
■ Enter the banner in a single line. You can also specify the banner in a single
line. In this case, the banner does contain the beginning and the end character.
The following is an example.
[SW7750] header shell 0welcome,my friend!0
When you log in the next time, "welcome, my friend!" is displayed as the banner.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] header shell %SHELL: Hello! Welcome%
(Make sure the beginning and end characters of the banner are the same.)
When you log in the next time, the session banner appears on the terminal as the
following:
[SW7750] quit
<SW7750> quit
Please press ENTER
SHELL: Hello! Welcome
(The beginning and end characters of the banner are not displayed.)
history-command max-size 65
<SW7750>
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] header shell %SHELL:
Continue entering the banner and end the banner with the character identical
with the beginning character of the banner.
Hello! Welcome %
(Press <Enter>.)
[SW7750]
When you log in the next time, the session banner appears on the terminal as the
following:
[SW7750] quit
<SW7750> quit
Please press ENTER
%SHELL:
Hello! Welcome
<SW7750>
history-command max-size
Parameter value: Size of the history command buffer. This argument ranges from 0 to 256
and defaults to 10. That is, the history command buffer can store 10 commands
by default.
Description Use the history-command max-size command to set the size of the history
command buffer.
Example # Set the size of the history command buffer of AUX 0 to 20 to enable it to store
up to 20 commands.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface aux 0
[SW7750-ui-aux0] history-command max-size 20
idle-timeout
undo idle-timeout
Description Use the idle-timeout command to set the timeout time. The connection to a
user interface is terminated if no operation is performed in the user interface
within the timeout time.
Use the undo idle-timeout command to revert to the default timeout time.
You can use the idle-timeout 0 command to disable the timeout function.
ip http shutdown
Parameter None
Description Use the ip http shutdown command to shut down the WEB Server.
Use the undo ip http shutdown command to launch the WEB Server.
lock 67
n To improve security and prevent attacks to the unused Sockets, TCP 80 port for
HTTP service will be enabled or disabled after corresponding configurations.
■ TCP 80 port is enabled only after you use the undo ip http shutdown
command to enable the Web server.
■ If you use the ip http shutdown command to disabled the Web server, TCP 80
port is disabled.
lock
Syntax lock
Parameter None
Description Use the lock command to lock the current user interface to prevent unauthorized
operations in the user interface.
With the execution of this command, the system prompts to enter and confirm
the password, and then locks the user interface. You can set the password in the
range of 1 to 16 characters.
Enter the correct password to cancel the lock. If your password contains more
than 16 characters, the system will cancel the lock as long as the first 16
characters are matched.
# In this case, the user interface is locked. To operate the user interface again, you
need to press Enter and provide the password as prompted
Password:
<SW7750>
68 CHAPTER 2: LOGIN COMMANDS
modem
Description Use the modem command to configure the both attribute of the Modem.
Both call in and call out are allowed when the modem command is executed
without any keyword.
Both call in and call out are disabled when the undo modem command is
executed without any keyword.
modem auto-answer
Parameter None
Description Use the modem auto-answer command to set the answer mode to auto
answer.
Use the undo modem auto-answer command to set the answer mode to
manual answer.
Parameter seconds: Waiting timeout time, in seconds, ranging from 1 to 60.The default value
is 30 seconds.
Description Use the modem timer answer to configure the carrier detection timeout time
after off-hook during call-in connection setup.
Use the undo modem timer answer command to restore the default timeout
time.
parity
undo parity
Description Use the parity command to set the check mode of the user interface.
Use the undo parity command to revert to the default check mode.
protocol inbound
Description Use the protocol inbound command to specify the protocols supported by the
user interface.
c CAUTION: To configure a user interface to support SSH, you need to set the
authentication mode to scheme for users to log in successfully. If the
authentication mode is set to password or none for login users, the protocol
inbound ssh command will fail. Refer to “authentication-mode” on page 57 for
the related configuration.
screen-length
undo screen-length
Parameter screen-length: Number of lines the screen can contain. This argument ranges from
0 to 512 and defaults to 24.
Description Use the screen-length command to set the number of lines the terminal screen
can contain.
Use the undo screen-length command to revert to the default number of lines.
You can use the screen-length 0 command to disable the function to display
information in pages.
Example # Set the number of lines the terminal screen can contain to 20.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface aux0
[SW7750-ui-aux0] screen-length 20
send
Description Use the send command to send messages to a specified user interface or all user
interfaces.
service-type
ftp-directory directory: Specifies the path for FTP users. The directory argument is
a string up to 64 characters.
level level: Specifies the user level for Telnet users, Terminal users, or SSH users.
The level argument ranges from 0 to 3 and defaults to 0.
Description Use the service-type command to specify the login type and the corresponding
available command level.
Commands fall into four command levels: access, monitor, system, and
administration, which are described as follows:
■ Access level: Commands of this level are used to diagnose network and change
the language mode of user interface, such as the ping, tracert, and
language-mode command. The Telnet command is also of this level.
Commands of this level cannot be saved in configuration files.
■ Monitor level: Commands of this level are used to maintain the system, to
debug service problems, and so on. The display and debugging command
are of monitor level. Commands of this level cannot be saved in configuration
files.
■ System level: Commands of this level are used to configure services.
Commands concerning routing and network layers are of system level. You can
utilize network services by using these commands.
■ Administration level: Commands of this level are for the operation of the entire
system and the system supporting modules. Services are supported by these
commands. Commands concerning file system, file transfer protocol (FTP),
set authentication password 73
Example # Configure commands of level 0 are available to the users logging in using the
user name of "zbr".
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] local-user zbr
[SW7750-luser-zbr] service-type telnet level 0
# To verify the above configuration, you can quit the system, log in again using the
user name of "zbr", and then list the available commands, as listed in the
following.
[SW7750] quit
<SW7750> ?
User view commands:
cluster Run cluster command
debugging Enable system debugging functions
language-mode Specify the language environment
ping Send echo messages
quit Exit from current command view
super Privilege the current user a specified priority
level
telnet Establish one TELNET connection
tracert Trace route function
undo Cancel current setting
Parameter cipher: Specifies to display the local password in encrypted text when you display
the current configuration.
simple: Specifies to display the local password in plain text when you display the
current configuration.
password: Password. The password must be in plain text if you specify the simple
keyword in the set authentication password command. If you specify the
cipher keyword, the password can be in either encrypted text or plain text. When
you enter the password in plain text containing up to 16 characters (such as 123),
the system converts the password to the corresponding 24-character encrypted
password (such as 7-CZB#/YX]KQ=^Q‘MAF4<1!!). Make sure you are aware of
the corresponding plain password if you enter the password in ciphered text (such
as 7-CZB#/YX]KQ=^Q ‘MAF4<1!!).
Description Use the set authentication password command to set the local password.
74 CHAPTER 2: LOGIN COMMANDS
Use the undo set authentication password command to remove the local
password.
Note that only plain text passwords are expected when users are authenticated.
n By default, modem users and Telnet users need to provide their passwords to log
in. If no password is set, the "Login password has not been set !" message appears
on the terminal when users log in.
shell
Syntax shell
undo shell
Parameter None
Description Use the shell command to make terminal services available for the user interface.
Use the undo shell command to make terminal services unavailable to the user
interface.
■ This command is available in all user interfaces except the AUX (Console) user
interface.
■ This command is unavailable in the current user interface.
■ This command prompts for confirmation when being executed in any valid user
interface.
Example # Log into user interface 0 and make terminal services unavailable in VTY 0
through VTY 4.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface vty 0 4
[SW7750-ui-vty0-4] undo shell
% Disable ui-vty0-4 , are you sure ? [Y/N] y
speed 75
speed
undo speed
Parameter speed-value: Transmission speed (in bps). This argument can be 300, 600, 1200,
2400, 4800, 9600, 19,200, 38,400, 57,600, and 115,200 and defaults to 9,600.
Description Use the speed command to set the transmission speed of the user interface.
Use the undo speed command to revert to the default transmission speed.
note3Use these two commands in the AUX user interface view only.
Example # Set the transmission speed of the AUX user interface to 115,200 bps.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface aux 0
[SW7750-ui-aux0] speed 115200
stopbits
undo stopbits
Description Use the stopbits command to set the stop bits of the user interface.
Use the undo stopbits command to revert to the default stop bits.
n ■
■
The stopbits cannot be 1.5 on an Switch 7750 Ethernet switch.
Changing the stop bits value of the switch to a value different from that of the
terminal emulation utility does not affect the communication between them.
76 CHAPTER 2: LOGIN COMMANDS
telnet
Parameter hostname: Host name of the remote switch. You can use the ip host command to
assign a host name to a switch.
service-port: TCP port number of the port that provides Telnet service on the
switch. This argument ranges from 0 to 65,535.
Description Use the telnet command to Telnet to another switch from the current switch to
manage the former remotely. You can terminate a Telnet connection by pressing
<Ctrl + K> or by executing the quit command.
Example # Telnet to the switch with the host name of 3Com2 and IP address of
129.102.0.1 from the current switch (with the host name of 3Com1).
<SW77501> telnet 129.102.0.1
Trying 129.102.0.1 ...
Press CTRL+K to abort
Connected to 129.102.0.1 ...
*******************************************************************
* Copyright(c) 2004-2007 3Com Corporation *
* Without the owner’s prior written consent, *
* no decompiling or reverse-switch fabricering shall be allowed. *
*******************************************************************
<SW77502>
user-interface
first-number: User interface index, which identifies the first user interface to be
configured.
last-number: User interface index, which identifies the last user interface to be
configured.
Description Use the user-interface command to enter one or more user interface views to
perform configuration.
Description Use the user privilege level command to configure the command level
available to the users logging into the user interface.
Use the undo user privilege level command to revert to the default command
level.
By default, the commands of level 3 are available to the users logging into the
AUX user interface. The commands of level 0 are available to the users logging
into VTY user interfaces.
Example # Configure that commands of level 0 are available to the users logging into VTY
0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface vty 0
[SW7750-ui-vty0] user privilege level 0
# You can verify the above configuration by Telneting to VTY 0 and displaying the
available commands, as listed in the following.
<SW7750> ?
User view commands:
cluster Run cluster command
debugging Enable system debugging functions
language-mode Specify the language environment
ping Send echo message
78 CHAPTER 2: LOGIN COMMANDS
acl
outbound: Filters the users Telneting to other switches from the current switch.
Description Use the acl command to apply an ACL to filter Telnet users.
Use the undo acl command to disable the switch from filtering Telnet users using
the ACL.
Example # Apply ACL 2000 to filter users Telneting to the current switch (assuming that
ACL 2,000 already exists.)
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] user-interface vty 0 4
[SW7750-ui-vty0-4] acl 2000 inbound
free web-users
user-name: User name of the Web user. This argument can contain 1 to 80
characters.
80 CHAPTER 3: COMMANDS FOR USER CONTROL
Description Use the free web-users command to disconnect a specified Web user or all Web
users by force.
ip http acl
Description Use the ip http acl command to apply an ACL to filter Web users.
Use the undo ip http acl command to disable the switch from filtering Web
users using the ACL.
By default, the switch does not use the ACL to filter Web users.
Example # Apply ACL 2000 to filter Web users (assuming that ACL 2000 already exists.)
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip http acl 2000
snmp-agent community
Parameter read: Specifies that the community has read-only permission in the specified view.
Write: Specifies that the community has read/write permission in the specified
view.
mib-view: Sets the name of the MIB view accessible to the community.
acl acl-number: Specifies the ACL number. The acl-number argument ranges from
2,000 to 2,999.
Description Use the snmp-agent community command to set a community name and to
enable users to access the switch through SNMP. You can also optionally use this
command to apply an ACL to filter network management users.
Example # Set the community name to "h123", enable users to access the switch in the
name of the community (with read-only permission), and apply ACL 2,000 to filter
network management users (assuming that ACL 2000 already exists.)
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent community read h123 acl 2000
snmp-agent group
write-view: Name of the view to be set to readable & writable. This argument can
be of 1 to 32 characters.
notify-view: Name of the view to be set to a notifying view. This argument can be
of 1 to 32 characters.
acl acl-number: Specifies an ACL. The acl-number argument ranges from 2,000 to
2,999.
Description Use the snmp-agent group command to create a SNMP group. You can also
optionally use this command to apply an ACL to filter network management users.
Example # Create a SNMP group named "h123" and apply ACL 2001 to filter network
management users (assuming that ACL 2001 already exists).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent group v1 h123 acl 2001
snmp-agent usm-user
group-name: Group name the user corresponds to. This argument can be of 1 to
32 characters.
acl acl-number: Specifies the ACL number. The acl-number argument ranges from
2,000 to 2,999.
switch fabricid: Specifies the ID of the switch fabric associated with the user.
Description Use the snmp-agent usm-user command to add a user to a specified SNMP
group. You can also optionally use this command to apply an ACL to filter network
management users.
Use the undo snmp-agent usm-user command to remove a user from the
corresponding SNMP group. The operation also frees the user from the
corresponding ACL-related configuration.
Example # Add the user named "3com" to the SNMP group named "3comgroup",
specifying to authenticate the user, specifying the authentication protocol to be
HMAC-MD5-96, the authentication password to be "3Com", and applying ACL
2002 to filter network management users (assuming that ACL 2002 already
exists).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent usm-user v3 3com 3comgroup authentication-mode m
d5 3Com acl 2002
84 CHAPTER 3: COMMANDS FOR USER CONTROL
CONFIGURATION FILE MANAGEMENT
4 COMMANDS
display current-configuration
The optional configuration keywords are available only after the related functions
are enabled on the switch.
vlan [ vlan-id ]: Displays the VLAN configuration in the system. If the vlan-id
argument is not specified, the configuration information of all VLANs in the
system is displayed; if the vlan-id argument is specified, the configuration
information of the specified VLAN is displayed.
If some running configuration parameters are the same with the default
operational parameters, they will not be displayed.
When there is much configuration information, you can use the regular expression
to filter the output information.
vlan 2
#
vlan 5
#
vlan 6
#
vlan 7
#
interface Vlan-interface1
ip address 192.168.0.68 255.255.255.0
nat outbound 2001 address-group 0 slot 2
#
interface Aux0/0/0
#
interface M-Ethernet0/0/0
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet3/0/1
#
interface GigabitEthernet3/0/2
#
interface GigabitEthernet3/0/3
#
interface GigabitEthernet3/0/4
#
interface GigabitEthernet3/0/5
#
interface GigabitEthernet3/0/6
#
interface GigabitEthernet3/0/7
#
interface GigabitEthernet3/0/8
#
interface GigabitEthernet3/0/9
#
interface GigabitEthernet3/0/10
#
interface GigabitEthernet3/0/11
#
interface GigabitEthernet3/0/12
#
interface GigabitEthernet3/0/13
#
interface GigabitEthernet3/0/14
#
interface GigabitEthernet3/0/15
#
interface GigabitEthernet3/0/16
#
interface GigabitEthernet3/0/17
#
display current-configuration 89
interface GigabitEthernet3/0/18
#
interface GigabitEthernet3/0/19
#
interface GigabitEthernet3/0/20
#
interface GigabitEthernet3/0/21
#
interface GigabitEthernet3/0/22
#
interface GigabitEthernet3/0/23
#
interface GigabitEthernet3/0/24
#
interface GigabitEthernet3/0/25
#
interface GigabitEthernet3/0/26
#
interface GigabitEthernet3/0/27
#
interface GigabitEthernet3/0/28
#
interface GigabitEthernet3/0/29
#
interface GigabitEthernet3/0/30
#
interface GigabitEthernet3/0/31
#
interface GigabitEthernet3/0/32
#
interface GigabitEthernet3/0/33
#
interface GigabitEthernet3/0/34
#
interface GigabitEthernet3/0/35
#
interface GigabitEthernet3/0/36
#
interface GigabitEthernet3/0/37
#
interface GigabitEthernet3/0/38
#
interface GigabitEthernet3/0/39
#
interface GigabitEthernet3/0/40
#
interface GigabitEthernet3/0/41
#
interface GigabitEthernet3/0/42
#
interface GigabitEthernet3/0/43
#
interface GigabitEthernet3/0/44
#
interface GigabitEthernet3/0/45
#
interface GigabitEthernet3/0/46
#
90 CHAPTER 4: CONFIGURATION FILE MANAGEMENT COMMANDS
interface GigabitEthernet3/0/47
#
interface GigabitEthernet3/0/48
port access vlan 300
#
interface RprGE1/0/1
#
interface RprGE1/0/1.1
#
interface RprGE1/0/1.2
#
interface NULL0
#
interface LoopBack103
ip address 103.1.1.1 255.255.255.0
#
rip
default cost 5
network 103.0.0.0
network 101.0.0.0
network 100.0.0.0
network 192.168.0.0
#
traffic-accounting accounting-slot 2
traffic-slot 1
accounting enable
#
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
#
temperature-limit 0 10 70
temperature-limit 1 10 70
temperature-limit 2 10 80
temperature-limit 3 10 70
#
poe power max-value 2400
#
attack-protection disable-defaultroute
#
password-control login-attempt 3 exceed lock-time 120
#
traffic-accounting traffic-group somegroup
network 1.1.0.0 255.255.0.0
#
radius scheme system
primary authentication 127.0.0.1 1645
primary accounting 127.0.0.1 1646
user-name-format without-domain
#
domain new
vlan-assignment-mode integer
access-limit disable
state active
idle-cut disable
self-service-url disable
messenger time disable
accounting-mode traffic
traffic-group somegroup rate 2
domain system
vlan-assignment-mode integer
access-limit disable
state active
idle-cut disable
self-service-url disable
messenger time disable
#
stp instance 0 PortLog
stp TC-protection enable
#
acl number 2001
rule 0 deny
#
rip
default cost 5
network 103.0.0.0
network 101.0.0.0
network 100.0.0.0
network 192.168.0.0
#
traffic-accounting accounting-slot 2
traffic-slot 1
accounting enable
#
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
display saved-configuration 93
#
return
display saved-configuration
Parameter None
If the Ethernet switch cannot work normally after being booted, you can use this
command to view the booting configuration of this Ethernet switch.
#
radius scheme system
primary authentication 127.0.0.1 1645
primary accounting 127.0.0.1 1646
user-name-format without-domain
#
domain system
vlan-assignment-mode integer
access-limit disable
state active
idle-cut disable
self-service-url disable
messenger time disable
#
stp TC-protection enable
#
vlan 1
#
interface Vlan-interface1
ip address 192.168.0.68 255.255.255.0
#
interface Aux0/0/0
#
interface M-Ethernet0/0/0
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet3/0/1
#
interface GigabitEthernet3/0/2
#
interface GigabitEthernet3/0/3
#
interface GigabitEthernet3/0/4
#
interface GigabitEthernet3/0/5
#
interface GigabitEthernet3/0/6
#
interface GigabitEthernet3/0/7
#
interface GigabitEthernet3/0/8
#
interface GigabitEthernet3/0/9
#
interface GigabitEthernet3/0/10
#
interface GigabitEthernet3/0/11
#
interface GigabitEthernet3/0/12
#
interface GigabitEthernet3/0/13
display saved-configuration 95
#
interface GigabitEthernet3/0/14
#
interface GigabitEthernet3/0/15
#
interface GigabitEthernet3/0/16
#
interface GigabitEthernet3/0/17
#
interface GigabitEthernet3/0/18
#
interface GigabitEthernet3/0/19
#
interface GigabitEthernet3/0/20
#
interface GigabitEthernet3/0/21
#
interface GigabitEthernet3/0/22
#
interface GigabitEthernet3/0/23
#
interface GigabitEthernet3/0/24
#
interface GigabitEthernet3/0/25
#
interface GigabitEthernet3/0/26
#
interface GigabitEthernet3/0/27
#
interface GigabitEthernet3/0/28
#
interface GigabitEthernet3/0/29
#
interface GigabitEthernet3/0/30
#
interface GigabitEthernet3/0/31
#
interface GigabitEthernet3/0/32
#
interface GigabitEthernet3/0/33
#
interface GigabitEthernet3/0/34
#
interface GigabitEthernet3/0/35
#
interface GigabitEthernet3/0/36
#
interface GigabitEthernet3/0/37
#
interface GigabitEthernet3/0/38
#
interface GigabitEthernet3/0/39
#
interface GigabitEthernet3/0/40
#
interface GigabitEthernet3/0/41
#
interface GigabitEthernet3/0/42
96 CHAPTER 4: CONFIGURATION FILE MANAGEMENT COMMANDS
#
interface GigabitEthernet3/0/43
#
interface GigabitEthernet3/0/44
#
interface GigabitEthernet3/0/45
#
interface GigabitEthernet3/0/46
#
interface GigabitEthernet3/0/47
#
interface GigabitEthernet3/0/48
#
interface RprGE1/0/1
#
interface RprGE1/0/1.1
#
interface RprGE1/0/1.2
#
interface NULL0
#
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
display this
Parameter None
Description Use the display this command to display the configuration of the current view.
After finishing configuration in the current view, you can use this command to
display parameters that take effect.
If the configuration parameters are the same as default parameters, the system
does not display such parameters. The system does not display the configuration
parameters that do not take effect, either.
Example # Display the configuration parameters that take effect in system view.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] display this
#
sysname 3Com
#
ftp server enable
#
local-server nas-ip 127.0.0.1
#
domain default enable system
#
nat address-group 0 1.1.1.1 1.1.1.2
nat address-group 1 2.2.2.2 2.2.2.3
nat blacklist start slot 2
nat blacklist mode all
nat blacklist limit amount 202
#
temperature-limit 0 10 70
temperature-limit 1 10 70
temperature-limit 2 10 80
temperature-limit 3 10 70
#
poe power max-value 2400
#
attack-protection disable-defaultroute
#
password-control login-attempt 3 exceed lock-time 120
#
return
display startup
Parameter None
Description Use the display startup command to display the configuration file names used
for the current and the next start-ups.
Example # Display the configuration filenames used for the current and the next start-ups.
<SW7750> display startup
MainBoard:
98 CHAPTER 4: CONFIGURATION FILE MANAGEMENT COMMANDS
reset saved-configuration
Parameter None
Description Use the reset saved-configuration command to erase configuration files from
the flash memory of the Ethernet Switch.
■ After upgrade of software, configuration files in flash memory may not match
the new version’s software. Perform reset saved-configuration command to
erase the old configuration files.
■ If a used Ethernet Switch is applied to the new circumstance and the original
configuration files cannot meet the new requirements, the Ethernet Switch
should be configured again. Erase the original configuration files for
reconfiguration.
If the configuration files do not exist in the flash memory when Ethernet Switch is
electrified and initialized, it will enter setup switch view automatically.
Example # Erase the configuration files from the flash memory of the Ethernet Switch.
<SW7750> reset saved-configuration
The saved configuration will be erased.
Are you sure?[Y/N]y
Configuration in flash memory is being cleared.
Please wait ...
....
Configuration in flash memory is cleared.
save
Parameter file-name: File name with the extension name ".cfg", a character string of 5 to 56
characters.
safely: Saves the configuration files to the flash memory in the safely mode.
Description Use the save command to save the current configuration files to the Flash
memory.
The configured files can be saved in one of the following two ways:
■ Fast saving: in this mode, the configuration files are saved fast. However, if
restart or power-off occurs in the saving procedure, the configuration files will
be lost.
■ Safely saving: in this mode, the configuration files are saved slowly. However,
even if restart or power-off occurs in the saving procedure, the configuration
files still exist.
If the save command is executed without the safely keyword, the configuration
files are saved in the fast saving mode. If the save command is executed with the
safely keyword, the configuration files are saved in the safely saving mode.
You are recommended to adopt the fast saving mode in the conditions of stable
power and adopt the safely saving mode in the conditions of unstable power or
remote maintenance.
Example # Get the current configuration files stored in the flash memory.
<SW7750> save
The configuration will be written to the device.
Are you sure?[Y/N]y
Please input the file name(*.cfg)[flash:/config.cfg]:123.cfg
.......
Now saving current configuration to the device.
Saving configuration flash:/123.cfg. Please wait...
...
Configuration is saved to flash memory successfully.
startup saved-configuration
Parameter cfgfile: The name of the configuration file. It is a string with a length of 5 to 56
characters.
Note that the configuration file must use ".cfg" as its extension name and is saved
under the root directory of the Flash.
Example # Configure the configuration file for the next start-up as config.cfg.
<SW7750> startup saved-configuration config.cfg ......
VLAN CONFIGURATION COMMANDS
5
broadcast-suppression
undo broadcast-suppression
Parameter ratio: Specifies the bandwidth ratio for the maximum broadcast traffic in specific
VLAN. Its value ranges from 1 to 100 and defaults to 100. The smaller the ratio is,
the less the allowed broadcast traffic can pass.
pps pps: Specifies the maximum number of broadcast packets that can pass
through a specific VLAN per second. Its value ranges from 1 to 148800.
When the actual broadcast traffic exceeds the specified value, the system will
discard the extra packets so that the bandwidth occupied by broadcast traffic can
be kept within a specific ratio to ensure normal network operation.
Broadcast storm
suppression mode Type A card Non-Type-A card
VLAN pps suppression Supported Not supported
VLAN bandwidth ratio Supported Not supported
suppression
A VLAN only supports one broadcast storm suppression mode at one time. If you
configure broadcast storm suppression modes multiple times for a VLAN, the
latest configuration will overwrite the previous configuration.
description
undo description
text: Text describing the VLAN interface. It contains 1 to 80 characters and space is
allowed.
Description Use the description command to set the description string or text for the current
VLAN or VLAN interface.
Use the undo description command to restore the default description string or
text.
By default, the description string of a VLAN is its VLAN ID, for example, "VLAN
0001"; the descriptive text of a VLAN interface is its name, for example,
"Vlan-interface 1 Interface".
Description Use the display interface Vlan-interface command to display the related
information of a VLAN interface, including, physical state and link state of the
VLAN interface, format of the sent frames, MAC address, IP address and subnet
mask of the VLAN interface, and descriptive string and MTU of the VLAN interface
If the vlan-id argument is specified, the information about the specified VLAN
interface is displayed; if the vlan-id argument is not specified, the information
about all the created VLAN interfaces is displayed.
Field Description
Vlan-interface2 current state Current state of the VLAN interface
Line protocol current state Current state of the Line protocol
IP Sending Frames’ Format Format of the frames that IP sends
Hardware address MAC address corresponding to the VLAN interface
Internet Address IP address corresponding to the VLAN interface
Description Description on the VLAN interface
The Maximum Transmit Unit Maximum transmission unit
display vlan
Description Use the display vlan command to display the information about specified VLANs
or all VLANs.
104 CHAPTER 5: VLAN CONFIGURATION COMMANDS
If the vlan-id argument or the all keyword is specified, the information about the
specified VLANs or the all VLANs is displayed, including VLAN ID, VLAN type
(dynamic or static), routing function status (If enabled, the primary IP address and
mask are displayed), VLAN description and VLAN name, VLAN broadcast storm
suppression ratio, and VLAN member ports.
If no argument or keyword is specified, this command displays the list of all the
existing VLANs. If the dynamic or static keyword is specified, this command
displays the list of the VLANs that are created dynamically or statically.
Field Description
VLAN ID VLAN ID
VLAN Type VLAN type (dynamic or static)
Route Interface Whether the routing interface function is enable for this VLAN
Description Description on the VLAN
Name VLAN name
Broadcast MAX-ratio VLAN broadcast storm suppression ratio
Tagged Ports The ports that keep packets’ tags when sending packets
Untagged Ports The ports that strip off packet tags when sending packets
interface Vlan-interface
Description Use the interface Vlan-interface command to create a VLAN interface or enter
VLAN interface view.
name 105
name
undo name
Parameter string: String that refers to the VLAN name. It contains 1 to 32 characters.
Parameter Use the name command to assign a name to the current VLAN.
Use the undo name command to restore to the default VLAN name.
By default, the name of a VLAN is its VLAN ID, for example, "VLAN 0001".
shutdown
Syntax shutdown
undo shutdown
Parameter None
If a VLAN interface is disabled, its status is not determined by the status of its
ports.
You can use the undo shutdown command to enable a VLAN interface when its
related parameters and protocols are configured. When a VLAN interface fails, you
can use the shutdown command to disable the interface, and then use the undo
shutdown command to enable this interface again, which may restore the
interface.
The operation of enabling/disabling a VLAN interface does not influence all the
Ethernet ports belonging to this VLAN.
vlan
Parameter vlan-id: ID of the VLAN that you want to enter. Its value ranges from 1 to 4094.
Description Use the vlan command to enter a VLAN view. If the VLAN identified by the vlan-id
argument does not exist, this command creates the VLAN and then enters the
VLAN view.
c CAUTION: You cannot use the undo vlan command to remove the following
kinds of VLANs directly.
■ RRPP-controlled VLAN
■ Guest VLAN
■ VLAN that belongs to a VRRP group
■ Portal-running VLAN
■ Isolate-user-VLAN and all its mapping secondary VLANs.
■ Voice VLAN
vlan to 107
■ Protocol-based VLAN
■ Shared-VLAN
n When you use the undo vlan command to remove a VLAN which is the default
VLAN of an access port, a trunk port or a hybrid port on the device, the port will
use VLAN 1 as the default VLAN after the undo vlan command is executed.
vlan to
to: Specifies a VLAN range. The VLAN ID after to must be greater than or equal to
that before to.
vlan-id2: ID of the last VLAN to be created, in the range of 1 to 4094, and cannot
be less than vlan-id2.
c CAUTION: You cannot use the undo vlan to command to remove the following
kinds of VLANs directly.
■ RRPP-controlled VLAN
■ Guest VLAN
■ VLAN that belongs to a VRRP group
■ Portal-running VLAN
■ Isolate-user-VLAN and all its mapping secondary VLANs.
■ Voice VLAN
■ Protocol-based VLAN
■ Shared-VLAN
108 CHAPTER 5: VLAN CONFIGURATION COMMANDS
n As the default VLAN, VLAN 1 needs not to be created and cannot be removed.
# Display existing VLANs on the device after you create VLANs in a bulk.
vlan all
Parameter None
Description Use the vlan all command to create all VLANs, that is, to create VLANs from
VLAN 2 through VLAN 4094.
c CAUTION: You cannot use the undo vlan all command to remove the following
kinds of VLANs directly.
■ RRPP-controlled VLAN
■ Guest VLAN
■ VLAN that belongs to a VRRP group
■ Portal-running VLAN
■ Isolate-user-VLAN and all its mapping secondary VLANs.
■ Voice VLAN
■ Protocol-based VLAN
■ Shared-VLAN
n ■
■
As the default VLAN, VLAN 1 needs not to be created and cannot be removed.
Operations of creating and removing all VLANs take much of the system
resource, which may cause the system not to respond to the current user
vlan all 109
interface. And during the operations, you cannot perform VLAN configurations
in other user interfaces, either.
# Remove all VLANs, in which VLAN 2, VLAN 5, and VLAN 20 has been configured
as the shared-VLAN, voice VLAN, and remote probe VLAN respectively.
display port
Description Use the display port command to check whether there are hybrid or trunk ports
in the current system and display such ports (if available).
The above information shows the current system has two hybrid ports: Ethernet
2/0/1 and Ethernet 2/0/2.
port
Parameter interface-list: List of Ethernet ports to be added to or removed from a VLAN. You
need to provide this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where:
■ interface-type is port type and interface-number is port number.
■ The port number to the right of the to keyword must be larger than or equal to
the one to the left of the keyword.
■ &<1-10> means that you can provide up to 10 ports or ports lists.
Parameter Use the port command to add a port or multiple ports to a VLAN.
112 CHAPTER 6: PORT-BASED VLAN CONFIGURATION COMMANDS
Use the undo port command to remove a port or multiple ports from a VLAN.
c CAUTION: All access ports belong to VLAN 1, which is the default VLAN of the
system, so you are not allowed to add an access port to VLAN 1 or remove an
access port from VLAN 1. Otherwise, the system will prompt: "Can’t delete ports
from or add ports to the default VLAN!".
Description Use the port access vlan command to add the access port into the specified
VLAN.
Use the undo port access vlan command to remove the access port from the
specified VLAN.
Description Use the port hybrid pvid vlan command to set the default VLAN ID for the
hybrid port.
Use the undo port hybrid pvid command to restore the default VLAN ID of the
port.
c CAUTION: You are recommended to set the default VLAN ID of the local hybrid or
trunk ports to the same value as that of the hybrid or trunk ports on the peer
switch. Otherwise, packet forwarding may fail on the ports.
Examples # After configuring Ethernet 2/0/1 as a hybrid port, set the default VLAN ID to
100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet2/0/1
[SW7750-Ethernet2/0/1] port link-type hybrid
[SW7750-Ethernet2/0/1] port hybrid pvid vlan 100
Parameters vlan-id-list: VLAN range to which the hybrid port will be added. vlan-id-list = [
vlan-id1 [ to vlan-id2 ] ]&<1-10>, where, vlan-id is in the range of 1 to 4094 and
can be discrete, and &<1-10> means you can input up to ten VLAN IDs/ID ranges.
tagged: Keeps VLAN tags when the packets of the specified VLANs are forwarded
on this port.
untagged: Keeps no VLAN tags when the packets of the specified VLANs are
forwarded on this port.
Description Use the port hybrid vlan command to add the hybrid port into specified VLANs.
Use the undo port hybrid vlan command to remove the hybrid port from
specified VLANs.
A hybrid port can belong to multiple VLANs. When you use the command several
times, all VLAN specified in the commands will be allowed to pass the port.
114 CHAPTER 6: PORT-BASED VLAN CONFIGURATION COMMANDS
The VLAN specified by the vlan-id argument must exist. Otherwise, this command
is invalid.
Examples # Add the hybrid port Ethernet 2/0/1 to VLAN 2, VLAN 4 and VLAN 50 through
VLAN 100, with tags assigned to their packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vlan 2
[SW7750-vlan2] quit
[SW7750] interface ethernet 2/0/1
[SW7750-Ethernet2/0/1] port link-type hybrid
[SW7750-Ethernet2/0/1] port hybrid vlan 2 4 50 to 100 tagged
Operation complete, except these VLAN(s):
Non-existent VLAN(s)
port link-type
Description Use the port link-type command to set the link type of the current Ethernet
port.
Use the undo port link-type command to restore the default link type.
The three types of ports can co-exist on the same Ethernet switch. However, a
trunk port cannot be directly switched to a hybrid port, and vice versa. To set a
trunk/hybrid port to another type (different from access), you must first set the
port to an access port and then set the access port to the required type. For
example, a trunk port cannot be directly set to a hybrid port. You must set the
trunk port to an access port and then set it to a hybrid port.
Parameters vlan-id-list: VLAN range to which the trunk port will be added. vlan-id-list = [
vlan-id1 [ to vlan-id2 ] ]&<1-10>, where, vlan-id is in the range of 1 to 4094 and
can be discrete, and &<1-10> means you can input up to ten VLAN IDs/ID ranges.
Description Use the port trunk permit vlan command to add the trunk port into the
specified VLAN.
Use the undo port trunk permit vlan command to remove the hybrid port
from the specified VLAN.
A trunk port can belong to multiple VLANs. When you use the command several
times, all VLAN specified in the commands will be allowed to pass the port.
Examples # Add the trunk port Ethernet 2/0/1 to VLAN 2, VLAN 4 and VLAN 50 through
VLAN 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet 2/0/1
[SW7750-Ethernet2/0/1] port link-type trunk
[SW7750-Ethernet2/0/1] port trunk permit vlan 2 4 50 to 100
Please wait... Done.
Description Use the port trunk pvid vlan command to set the default VLAN ID for the trunk
port.
Use the undo port trunk pvid command to restore the default setting.
To guarantee the proper packet transmission, the default VLAN ID of the local
trunk port must be identical with that of the trunk port on the peer switch
connected with the local trunk port.
Examples # Set the default VLAN ID of the trunk port Ethernet 2/0/1 to 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet 2/0/1
[SW7750-Ethernet2/0/1] port link-type trunk
[SW7750-Ethernet2/0/1] port trunk pvid vlan 100
PROTOCOL-BASED VLAN
7 CONFIGURATION COMMANDS
Example # Display protocol information and protocol index configured for Ethernet2/0/1
and Ethernet2/0/2 ports.
<SW7750> display protocol-vlan interface Ethernet 2/0/1 to Ethernet
2/0/2
Interface: Ethernet2/0/1
VLAN ID Protocol-Index Protocol-type
50 1 ip 192.168.10.1 255.255.255.0
80 2 ip 101.120.34.0 255.255.0.0
100 1 ip 104.232.43.0 255.255.255.0
100 2 ipx ethernetii
Interface: Ethernet2/0/2
VLAN ID Protocol-Index Protocol-type
50 5 ipx raw
80 1 at
100 3 snap etype 0x0abc
100 5 llc dsap 0xac ssap 0xbd
118 CHAPTER 7: PROTOCOL-BASED VLAN CONFIGURATION COMMANDS
Description Use the display protocol-vlan slot command to display the protocol-based
VLAN information in specific module, including VLAN ID, protocol index and
protocol type.
Description Use the display protocol-vlan vlan command to display the protocol
information and protocol index configured for specified VLANs.
Example # Display the protocol information and protocol indices configured for VLAN 2
through VLAN 20..
<SW7750> display protocol-vlan vlan 2 to 20
VLAN ID: 2
VLAN Type: Protocol-based VLAN
port hybrid protocol-vlan vlan 119
VLAN ID: 20
VLAN Type: Protocol-based VLAN
Protocol Index Protocol Type
0 ip 192.168.0.0 255.255.255.0
1 ipx ethernetii
2 snap etype 0x0abc
3 llc dsap 0xac ssap 0xbd
protocol-end: End protocol index, ranging from 0 to 6. Note that its value must be
larger than or equal to the value of the protocol-index argument.
Description Use the port hybrid protocol-vlan vlan command to associate a port with the
protocol-based VLAN.
Use the undo port hybrid protocol-vlan vlan command to remove the
association between the specified protocol-based VLAN and a port.
Example # Associate port Ethernet2/0/1 with the protocol-based VLAN 3, whose protocol
index is from 0 to 6.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] port hybrid protocol-vlan vlan 3 0 to 6
120 CHAPTER 7: PROTOCOL-BASED VLAN CONFIGURATION COMMANDS
protocol-end: End protocol index, ranging from 0 to 6. Note that its value must be
larger than or equal to the value of the protocol-index argument.
Description Use the protocol-vlan vlan slot command to associate a module with
protocol-based VLAN.
Use the undo protocol-vlan vlan slot command to cancel the association.
Note that it is necessary to add those ports that require protocol in the module to
the protocol-based VLAN. Currently, only non-Type-A modules, including I/O
Modules and Fabrics, support this command.
Related command: port hybrid protocol-vlan vlan and display protocol-vlan interface.
protocol-vlan 121
protocol-vlan
ipx { ethernetii | llc | raw I snap }: Specifies IPX protocol-based VLAN. The
ethernetii, llc, raw and snap keywords indicate four encapsulation types.
mode: Specifies VLAN based on other protocol type and encapsulation format.
llc [ dsap dsap-id [ ssap ssap-id ] | ssap ssap-id ]: Specifies VLAN based on logical
link control encapsulation format. The dsap-id argument indicates the destination
service access point and its value ranges from 0 to FF. The ssap-id argument
indicates the source service access point and its value ranges from 0 to FF.
protocol-end: End protocol index, ranging from 0 to 6. Note that its value must be
larger than or equal to the value of the protocol-index argument.
Description Use the protocol-vlan command to configure the protocol template used for
classifying protocol-based VLANs.
c CAUTION: In a VLAN, it is not allowed to configure two templates with the same
protocol type and encapsulation format. If any parameter in a user-defined
template has the same value as the corresponding parameter in the standard
template, the user-defined template and the standard template cannot be
configured in the same VLAN.
[SW7750-vlan3] vlan 5
[SW7750-vlan5] protocol-vlan ip 123.34.56.0
Parameter None
Description Use the display voice vlan oui command to display the currently supported OUI
addresses and the related information.
Parameter None
Description Use the display voice vlan status command to display voice VLAN-related
information, including voice VLAN status (disabled/enabled), security mode, aging
time, port mode (manual mode or automatic mode), and so on.
Field Description
Voice Vlan security mode The status of voice VLAN security mode:
enabled/disabled.
Voice Vlan aging time The voice VLAN aging time
Current voice vlan enabled port mode The operation mode of ports with the voice VLAN
function enabled
PORT Port type and port number
MODE Operation mode of the voice VLAN bound to the
port
STATUS Voice VLAN status on the port (ENABLE or
DISABLE)
Voice VLAN ID ID of the voice VLAN bound to the port
c CAUTION: The "Current voice vlan enable port mode" field lists the ports with the
voice VLAN function enabled. Note that a port listed in this field may not currently
operate in a voice VLAN. To check the ports operating in the current voice VLAN,
use the display vlan command, which is described in section “display vlan” on
page 124.
display vlan
Description Use the display vlan command to display the automatic/manual ports in the
current voice VLAN.
Example # Display the ports included in the current voice VLAN, assuming that the current
voice VLAN is VLAN 6.
<SW7750> display vlan 6
VLAN ID: 6
VLAN Type: static
Route Interface: not configured
Description: VLAN 0006
Name: VLAN 0006
Tagged Ports:
voice vlan 125
GigabitEthernet2/0/5
Untagged Ports:
GigabitEthernet2/0/6
voice vlan
Parameter vlan-id: ID of the VLAN to be bound to the port as a voice VLAN, in the range of 2
to 4094.
Description Use the voice vlan command to bind a VLAN to the port as a voice VLAN.
Use the undo voice vlan command cancel a voice VLAN-to-port binding.
c CAUTION:
■ Before binding a VLAN to a port as a voice VLAN, make sure the VLAN already
exists.
■ To remove a VLAN bound to a port as a voice VLAN, you need to cancel the
voice VLAN-to-port binding first.
Parameter minutes: Aging time (in minutes) to be set for a voice VLAN. This argument ranges
from 5 to 43,200.
126 CHAPTER 8: VOICE VLAN CONFIGURATION COMMANDS
Description Use the voice vlan aging command to set the aging time for a voice VLAN.
Use the undo voice vlan aging command to restore the default aging time for
a voice VLAN.
Example # Set the aging time of the voice VLAN to 100 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] voice vlan aging 100
Parameter None
Description Use the voice vlan enable command to enable the voice VLAN function for a
port.
Use the undo voice vlan enable command to disable the voice VLAN function
for a port.
■ The voice VLAN function takes effect on a port only when it is enabled in both
system view and port view.
■ The access port working in automatic mode does not support the voice VLAN
function.
n ■ After the voice VLAN function is enabled on a port, you cannot enable the
QinQ feature on the port.
■ After the QinQ feature is enabled on a port, you cannot enable the voice VLAN
function on the port.
Parameter None
Description Use the voice vlan legacy command to enable the voice VLAN legacy function.
This function realizes the communication between 3Com’s devices and other
vendors’ voice devices by automatically adding the voice VLAN tags to the voice
data coming from other vendors’ voice devices.
Use the undo voice vlan legacy command to disable the voice VLAN legacy
function.
Parameter oui: OUI address to be set. You need to provide this argument in the format of
H-H-H.
oui-mask: Valid bits of OUI address, indicated by mask in the format of H-H-H.
text: Description string of the OUI address. This argument can contain 1 to 30
characters.
Description Use the voice vlan mac-address command to set an OUI address used for a
voice VLAN to identify voice devices.
128 CHAPTER 8: VOICE VLAN CONFIGURATION COMMANDS
Use the undo voice vlan mac-address command to disable an OUI address
from being used to identify voice devices.
A switch can use up to 16 OUI addresses to identify voice devices, including the
five default OUI addresses (as listed in Table 9). When the number of OUI
addresses reaches 16, you will fail to add new OUI addresses.
Example # Specify 00aa-bb00-0000 as an OUI address, with the description string being
"ABC".
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] voice vlan mac-address 00aa-bb00-0000 mask ffff-ff00-0000 d
escription ABC
Parameter None
Description Use the voice vlan mode auto command to configure an Ethernet port to
operate in the automatic voice VLAN mode.
Use the undo voice vlan mode auto command to configure an Ethernet port
to operate in the manual voice VLAN mode.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface GigabitEthernet 3/0/2
[SW7750-GigabitEthernet3/0/2] undo voice vlan mode auto
Parameter None
Description Use the voice vlan security enable command to enable the voice VLAN
security mode.
Use the undo voice vlan security enable command to disable the voice VLAN
security mode.
In the voice VLAN security mode, the ports in a voice VLAN and with voice devices
attached to can only forward voice data. Data packets with their MAC addresses
not among the OUI addresses that can be identified by the system will be
dropped. This mode has no effects on other VLANs.
n You need to configure the hybrid attribute for a port in the process of configuring
an isolate-user-VLAN. For hybrid port-related commands, refer to “Port-Based
VLAN Configuration Commands” on page 111.
display isolate-user-vlan
Description Use the display isolate-user-vlan command to display the mapping between
the isolate-user-VLAN and the secondary VLAN, and the current status and port
information of the isolate-user-VLAN and the secondary VLAN.
Example # Display the mapping between the isolate-user-VLAN and the secondary VLAN.
<SW7750> display isolate-user-vlan
Isolate-user-VLAN Vlan ID : 3
Secondary Vlan ID : 4-5
Vlan ID: 3
Vlan Type: static
Isolate-user-VLAN type : isolate-user-VLAN
Route Interface: not configured
Description: VLAN 0003
Tagged Ports: none
Untagged Ports:
Ethernet2/0/4 Ethernet2/0/8 Ethernet2/0/18
Vlan ID: 4
Vlan Type: static
Private-vlan Type : Secondary
Route Interface: not configured
Description: VLAN 0004
Tagged Ports: none
Untagged Ports:
Ethernet2/0/4 Ethernet2/0/8
Vlan ID: 5
Vlan Type: static
Private-vlan Type : Secondary
Route Interface: not configured
Description: VLAN 0004
Tagged Ports: none
132 CHAPTER 9: ISOLATE-USER-VLAN CONFIGURATION COMMANDS
Untagged Ports:
Ethernet2/0/4 Ethernet2/0/18
isolate-user-vlan
vlan-list: List of the secondary VLAN that needs to establish the mapping with the
isolate-user-VLAN, provided in the form of vlan-list = { vlan-id [ to vlan-id ]
}&<1-4093>, where the vlan-id is the VLAN ID of the secondary VLAN. VLAN ID
after to must not be less than that before to. You can input this argument
repeatedly to establish the mapping between the isolate-user-VLAN and all other
VLANs.
Description Use the isolate-user-vlan command to establish the mapping between the
isolate-user-VLAN and the secondary VLAN.
Use the undo isolate-user-vlan command to cancel the mapping between the
isolate-user-VLAN and the secondary VLAN.
By default, the user-created isolate-user-VLAN does not map the secondary VLAN.
isolate-user-vlan enable
Parameter None
n ■
■
Multiple isolate-user-VLANs can be configured for a switch.
With GVRP function enabled, a switch cannot be enabled with
isolate-user-VLAN function.
■ The isolate-user-VLAN function and super VLAN function cannot be enabled
simultaneously for a VLAN. If a VLAN is specified as an isolate-user-VLAN or a
secondary VLAN, you cannot configure it as a super VLAN or a sub VLAN
additionally.
dhcp-server
undo dhcp-server
Description Use the dhcp-server command to specify which DHCP server group a VLAN
interface belongs to.
display supervlan
Description Use the display supervlan command to view the mapping relationship between
Super VLAN and Sub VLAN, and the ports identifying mapping relationship
between super VLAN and sub VLAN.
136 CHAPTER 10: SUPER VLAN CONFIGURATION COMMANDS
Example # Display the mapping relationship between Super VLAN 100 and the sub VLANs.
<SW7750> display supervlan 100
Supervlan ID : 100
Subvlan ID : 101-102
VLAN ID: 100
VLAN Type: static
It is a Super VLAN.
Route Interface: not configured
Description: VLAN 0100
Name: VLAN 0100
Broadcast MAX-ratio: 100
Tagged Ports: none
Untagged Ports: none
VLAN ID: 101
VLAN Type: static
It is a Sub VLAN. And the Super VLAN is VLAN 100
ARP proxy disabled.
Route Interface: not configured
Description: VLAN 0101
Name: VLAN 0101
Broadcast MAX-ratio: 100
Tagged Ports: none
Untagged Ports:
Ethernet3/0/3
VLAN ID: 102
VLAN Type: static
It is a Sub VLAN. And the Super VLAN is VLAN 100
ARP proxy disabled.
Route Interface: not configured
Description: VLAN 0102
Name: VLAN 0102
Broadcast MAX-ratio: 100
Tagged Ports: none
Untagged Ports:
Ethernet3/0/4
subvlan
Parameter vlan-list: List of sub VLANs, provided in the format of vlan-list = { vlan-id [ to
vlan-id ] }&<1-10>, where the vlan-id is the VLAN ID of a sub VLAN, and the
&<1-10> means you can specify ten sub VLANs or sub VLAN lists.
Description Use the subvlan commmand to establish the mapping relationship between sub
VLAN and super VLAN.
supervlan 137
Use the undo subvlan commmand to cancel the mapping relationship between
sub VLAN and super VLAN.
Without the argument vlan-list, the undo subvlan command can cancel the
mapping between all the sub VLANs and the isolate-user-VLAN. With this
argument, the command can cancel the mapping between the specified sub VLAN
and the isolate-user-VLAN.
c CAUTION:
■ The sub VLAN must exist before you create mapping between the sub VLAN
and the super VLAN.
■ After establishing the mapping between the sub VLAN and the super VLAN,
you can still add (or delete) ports to (from) the sub VLAN.
■ A super VLAN can establish mappings with 128 sub VLANs.
■ The system can create up to 1024 sub VLANs.
Example # Establish the mapping relationship between sub VLAN 3, 4, 5, 9 and super VLAN
10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vlan 10
[SW7750-vlan10] supervlan
[SW7750-vlan10] subvlan 3 to 5 9
supervlan
Syntax supervlan
undo supervlan
Parameter None
Description Use the supervlan commmand to set current VLAN to super VLAN.
Use the undo supervlan commmand to restore the current VLAN type to
ordinary VLAN.
n Note that:
You can not configure a VLAN which includes Ethernet ports as a super VLAN; and
after you configure a super VLAN, you cannot add any Ethernet port to it.
display ip interface
Description Use the display ip interface command to display information about one specific
or all interfaces.
Field Description
Vlan-interface1 current state Current state of VLAN interface 1
Line protocol current state Current state of the Line protocol
Internet Address IP address
Broadcast address Broadcast address
The Maximum Transmit Unit Max transmit unit
IP packets input number: 9678, bytes: Number of input/output unicast packets, bytes,
475001, multicasts: 7 and multicast packets
IP packets output number: 8622, bytes:
391084, multicasts: 0
TTL invalid packet number Number of received invalid TTL packets
ICMP packet input number: 0 Total number of received ICMP packets,
including:
Echo reply: 0
Echo reply packet, unreachable packet, source
Unreachable: 0
quench packet, routing redirect packet, Echo
Source quench: 0 request packet, router advert packet, router
solicit packet, time exceed packet, IP header
Routing redirect: 0
bad packet, timestamp request packet,
Echo request: 0 timestamp reply packet, information request
packet, information reply packet, netmask
Router advert: 0
request packet, netmask reply packet, and
Router solicit: 0 unknown types of packets.
Time exceed: 0
IP header bad: 0
Timestamp request: 0
Timestamp reply: 0
Information request: 0
Information reply: 0
Netmask request: 0
Netmask reply: 0
Unknown type: 0
ip address
Description Use the ip address command to specify an IP address and mask for a VLAN or
loopback interface.
Use the undo ip address command to remove an IP address and mask of a VLAN
or loopback interface.
■ When you configure a primary IP address for an interface which already has a
primary IP address, the new address will replace the old one.
■ If you execute the undo ip address command without any parameter, the
switch deletes both primary and secondary IP addresses of the interface. The
undo ip address ip-address { mask | mask-length } command is used to delete
the primary IP address. The undo ip address ip-address { mask | mask-length }
sub command is used to delete secondary IP addresses.
Example # Specify the IP address and subnet mask of VLAN interface 1 to 129.12.0.1 and
255.255.255.0 respectively.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] ip address 129.12.0.1 255.255.255.0
142 CHAPTER 11: IP ADDRESS CONFIGURATION COMMANDS
IP PERFORMANCE CONFIGURATION
12 COMMANDS
display fib
Parameter fib-rule: Specifies FIB entries that conform to specific rules. It can be a combination
of multiple rules. The following table describes the combinations.
Table 11 Display combination of specified FIB entries
Description Use the display fib command to view the summary of the forwarding
information base (FIB). Each line indicates an FIB entry. The information includes:
destination address/mask length, next hop, current flag, timestamp, and output
interface. For the ACL configuration, refer to “ACL Commands” on page 755.
Field Description
Destination/Mask Destination address/mask length
Nexthop Next hop address
Flag Flags:
U: A route is up and available.
G: Gateway route
H: Local host route
B: Blackhole route
D: Dynamic route
S: Static route
R: Rejected route
E: Multi-path equal-cost route
L: Route generated by ARP or ESIS
TimeStamp Timestamp
Interface Forwarding interface
# Display all the lines from the line containing the string 1.1.1.1.
Parameter None
display ip socket 145
Description Use the display icmp statistics command to view the statistics about ICMP
packets.
Field Description
bad formats Number of input packets in bad formats
bad checksum Number of input packets with bad checksum
echo Number of input/output echo request packets
destination unreachable Number of input/output packets with unreachable
destination
source quench Number of input/output source quench packets
redirects Number of input/output redirected packets
echo reply Number of input/output echo reply packets
parameter problem Number of input/output packets with parameter
problem
timestamp Number of input/output timestamp packets
information request Number of input information request packets
mask requests Number of input/output mask request packets
mask replies Number of input/output mask reply packets
information reply Number of output information reply packets
time exceeded Number of time exceeded packets
display ip socket
Description Use the display ip socket command to display the information of the current
socket.
Example # Display the information about the socket of the TCP type.
<SW7750> display ip socket socktype 1
SOCK_STREAM:
Task = VTYD(18), socketid = 1, Proto = 6,
LA = 0.0.0.0:23, FA = 0.0.0.0:0,
sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0,
socket option = SO_ACCEPTCONN SO_KEEPALIVE SO_SENDVPNID SO_SETKEEPAL
IVE,
socket state = SS_PRIV SS_ASYNC
Field Description
SOCK_STREAM Type of a socket. Three types are available: SOCK_STREAM
(TCP socket), SOCK_DGRAM (UDP socket or socket
supporting link layer access), and SOCK_RAW (RAW IP
socket).
Task Task ID
socketid Socket ID
Proto Protocol number used by the socket
sndbuf Sending buffer size of the socket
rcvbuf Receiving buffer size of the socket
sb_cc Current data size in the sending buffer. The value makes
sense only for the socket of TCP type, because only TCP is
able to cache data.
rb_cc Current data size in the receiving buffer
socket option Option of a socket
socket state State of a socket
display ip statistics 147
display ip statistics
Parameter None
Description Use the display ip statistics command to view the statistics about IP packets.
Field Description
Input: sum Sum of input packets
Local Number of received packets whose destination
address is the local device
bad protocol Number of packets with wrong protocol
number
bad format Number of packets in bad format
bad checksum Number of packets with bad checksum
bad options Number of packets with wrong options
Output: forwarding Number of forwarded packets
local Number of packets sent by the local device
dropped Number of dropped packets during transmission
no route Number of packets that cannot be routed
compress fails Number of packets that cannot be compressed
Fragment: input Number of input fragments
output Number of output fragments
dropped Number of dropped fragments
fragmented Number of packets that are fragmented
couldn’t fragment Number of packets that cannot be fragmented
Reassembling: sum Number of reassembled packets
timeouts Number of timeout fragment packets
148 CHAPTER 12: IP PERFORMANCE CONFIGURATION COMMANDS
Parameter None
Description Use the display tcp statistics command to view the statistics about TCP
packets.
Sent packets:
Total: 665
urgent packets: 0
control packets: 5 (including 1 RST)
window probe packets: 0, window update packets: 2
data packets: 618 (8770 bytes) data packets retransmitted: 0 (0 bytes)
ACK-only packets: 40 (28 delayed)
Field Description
Received packets Total Total number of received packets
packets in sequence Number of packets in sequence
window probe packets/ Number of window probe
window update packets packets/number of window update
packets
checksum error/ offset Number of checksum errors/number of
error/ short error offset errors/number of short errors
duplicate packets/ partially Number of duplicate packets/number of
duplicate packets partially duplicate packets
out-of-order packets Number of out-of-order packets
packets of data out of Number of packets out of window
window
packets received after Number of received packets after close
close
ACK packets Number of ACK packets
duplicate ACK packets/ too Number of duplicate ACK packets/number
much ACK packets of ACK packets for data not sent.
Sent packets Total Total number of sent packets
urgent packets Number of urgent packets
control packets (including Number of control packets, including one
1 RST) retransmitted packet
window probe packets/ Number of window probe
window update packets packets/number of window update
packets
data packets/ data packets Number of data packets/number of
retransmitted retransmitted packets
ACK-only packets Number of ACK packets (28 delay ACK
packets)
Retransmitted timeout/ connections dropped in Times of retransmission timer
retransmitted timeout timeout/number of dropped connections
because retransmission times exceed the
limit
Keepalive timeout/ keepalive probe/ Keepalive Times of keepalive timer timeout/number
timeout, so connections disconnected of transmitted keepalive probe
packets/number of dropped connections
due to keepalive probe failure
Initiated connections/ accepted connections/ Number of initiated connections/number
established connections of accepted connections/number of
established connections
Parameter None
Description Use the display tcp status command to view the state of all the TCP
connections so that you can monitor TCP connections in real time.
Field Description
TCPCB Address of the TCP control block
Local Add:port Local IP address; port number
Foreign Add:port Remote IP address; port number
State TCP connection state
Parameter None
Description Use the display udp statistics command to view the statistics about UDP
packets.
Field Description
Received Total Total number of received UDP packets
packets:
checksum error Number of packets with checksum errors
shorter than header, Number of packets whose lengths are shorter than
their headers
data length larger than Number of packets whose lengths are larger than
packet the packets
no socket on port Number of packets dropped because the socket
corresponding to the port number is not found
total broadcast or multicast Total number of transmitted broadcast or multicast
packets packets
no socket broadcast or Total number of transmitted broadcast or multicast
multicast packets packets whose sockets are not found
not delivered, input socket Number of not delivered packets because the
full socket cache is full
input packets missing pcb Number of packets missing pcb cache
cache
Sent Total Total number of transmitted UDP packets
packets:
Parameter None
Description Use the icmp redirect send command to enable ICMP redirect message
sending.
Use the undo icmp redirect send command to disable ICMP redirect message
sending.
ip
By default, unreachable packets are not sent to the CPU, while TTL timeout
packets are sent to the CPU.
ip forward-broadcast
undo ip forward-broadcast
Parameter acl-number: Number of the ACL used for filtering directed broadcast packets, in
the range of 2000 to 3997.
By default, the switch does not forward directed broadcast packets to a directly
connected network.
n Note that:
■ If you reference an ACL, only the directed broadcasts that pass the ACL filtering
can be forwarded to the directly connected networks.
reset ip statistics 153
Example # Reference ACL 2000 to filter directed broadcasts to directly connected networks.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] ip forward-broadcast 2000
reset ip statistics
Parameter None
Description Use the reset ip statistics command to clear the statistics information about IP
packets.
Parameter None
Description Use the reset tcp statistics command to clear the statistics information about
TCP packets.
Parameter None
Description Use the reset udp statistics command to clear the statistics information about
UDP packets.
Parameter time-value: TCP finwait timer value, in seconds, with the value ranging from 76 to
3600.
Description Use the tcp timer fin-timeout command to configure the TCP finwait timer.
Use the undo tcp timer fin-timeout command to restore the default value of
the TCP finwait timer.
When the TCP connection state changes from FIN_WAIT_1 to FIN_WAIT_2, the
finwait timer is enabled. If the switch does not receive FIN packets before finwait
timer time outs, the TCP connection will be terminated.
Example # Configure the default value of the TCP finwait timer to 800 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] tcp timer fin-timeout 800
Parameter time-value: TCP synwait timer value, in seconds, with the value ranging from 2 to
600.
Description Use the tcp timer syn-timeout command to configure the TCP synwait timer.
Use the undo tcp timer syn-timeout command to restore the default value of
the TCP synwait timer.
When sending the SYN packet, TCP starts the synwait timer. If the response packet
is not received before synwait times out, the TCP connection will be terminated.
Example # Configure the default value of the TCP synwait timer to 80 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] tcp timer syn-timeout 80
tcp window
Parameter window-size: The size of the transmission and receiving buffers measured in
kilobytes (KB), whose value ranges from 1 to 32.
Description Use the tcp window command to configure the size of the transmission and
receiving buffers of the connection-oriented socket.
Use the undo tcp window command to restore the default size of the
transmission and receiving buffers of the connection-oriented socket.
Example # Configure the size of the transmission and receiving buffers to 3KB.
156 CHAPTER 12: IP PERFORMANCE CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] tcp window 3
IPX CONFIGURATION COMMANDS
13
Description Use the display ipx interface command to view the IPX information of the
specified VLAN interface.
If no vlan-id is specified, the IPX information of all the IPX-enabled VLAN interfaces
will be displayed.
Field Description
Vlan-interface1 is down State of the current VLAN interface
IPX address IPX network number and node address of the
current VLAN interface
[down] State of the IPX protocol
158 CHAPTER 13: IPX CONFIGURATION COMMANDS
Field Description
SAP Indicates whether SAP is enabled on the current
VLAN interface
Split horizon Indicates whether split horizon is enabled on the
current VLAN interface
Update change only Indicates whether triggered update is enabled on
the current VLAN interface
Forwarding of IPX type 20 propagation Indicates whether the IPX packets whose broadcast
packet type is 20 are forwarded through the current VLAN
interface
Delay of this IPX interface Delay of the current VLAN interface
SAP GNS response Indicates whether SAP GNS reply is enabled on the
current VLAN interface
RIP packet maximum size Maximum length of the RIP update packets that the
current VLAN interface can send
SAP packet maximum size Maximum length of the SAP update packets that
the current VLAN interface can send
IPX encapsulation IPX encapsulation format of the current VLAN
interface
0 received, 0 sent The number of IPX packets and bytes sent and
received by the current VLAN interface; the number
0 bytes received, 0 bytes sent
of received, sent, and dropped IPX RIP packets; the
0 RIP received, 0 RIP sent, 0 RIP number of received special request packets and
discarded response packets; the number of received general
request packets and response packets; the number
0 RIP specific requests received, 0 RIP
of received, transmitted, and dropped IPX SAP
specific responses sent
packets; the number of received IPX SAP packets
0 RIP general requests received, 0 RIP and response packets
general responses sent
0 SAP received, 0 SAP sent, 0 SAP
discarded
0 SAP requests received, 0 SAP
responses sent
protocol: Displays the IPX routing information of the specified route type.
verbose: Displays the detailed IPX routing information, including the active and
inactive routes.
Description Use the display ipx routing-table command to view the IPX routing
information.
If no parameters are specified, the information of all the active IPX routes will be
displayed.
Field Description
Dest_Ntwk_ID Destination network number of the route
Proto Protocol type of the route
Pre Route preference
Ticks Tick count of the route
Hops Hop count of the route
Nexthop Next hop of the route
Interface Outgoing interface of the route
# Display the detailed IPX routing information, including the active and inactive
routes.
Field Description
Time Route aging time; it is 0 for the direct and static routes,
meaning they never time out.
State The state of the route. It can be active, inactive, or
delete. Active indicates that this route is an active route.
Inactive indicates that this route is an inactive route.
Delete indicate that this route has been deleted, but it is
not released.
Total 3 2 4 1 1
Table 22 Field descriptions of the display ipx routing-table statistics command
Field Description
Proto/State Routing protocol
Route Number of routes, including active and inactive routes
Active Number of active routes
Added Number of added routes
Deleted Number of deleted, but not released routes
Freed Number of released routes
Syntax display ipx service-table [ inactive | name name | network network | order {
network | type } | type service-type ] [ verbose ]
name name: Displays the name information of the specified server. It is a string of
1 to 47 characters.
range of 0x1 to 0xFFFFFFFF. The leading 0s can be omitted when you input a
network number.
type service-type: Displays the service information with a specified service type. It
comprises four hexadecimal numbers, ranging from 0 to FFFF. 0 indicates all the
service types.
Description Use the display ipx service-table command to view the contents of the IPX
service information table.
Field Description
Name Server name
Type Service type
NetId Network number
NodeId Node number
Sock Socket
Pref Preference
Hops Hop count
Recv-If Name of the interface receiving services
Parameter None
162 CHAPTER 13: IPX CONFIGURATION COMMANDS
Description Use the display ipx statistics command to view the IPX statistics.
Field Description
Received: 0 total, 0 packets pitched Statistics of received packets: the total
number of received packets, the number of
0 packets size errors, 0 format errors
filled packets, the number of packets with
0 bad hops(>16), 0 discarded(hops=16) incorrect length, the number of incorrectly
encapsulated packets, the number of packets
0 other errors, 0 local destination
whose hop count exceeds 16, the number of
0 can not be dealt with packets whose hop count is equal to 16, the
number of other incorrect packets, the
number of packets whose destination is the
local switch, and the number of packets that
cannot be handled
Sent: 0 forwarded, 0 generated Statistics of transmitted packets: the number
of forwarded packets, the number of packets
0 no route, 0 discarded
transmitted from the local switch, the
number of packets that fail to find routes,
and the number of dropped packets
RIP: 0 sent, 0 received Statistics of IPX RIP packets: the total number
of received, transmitted IPX RIP packets, the
0 responses sent, 0 responses received
number of transmitted/received response
0 requests received, 0 requests dealt packets, the number of
received/transmitted/handled packets, and
0 requests sent, 0 periodic updates
the number of the periodic update packets
ipx enable 163
Field Description
SAP: 0 general requests received Statistics of SAP packets: the number of
received general request packets, the
0 specific requests received
number of special request packets, the
0 GNS requests received number of latest request packets, the
number of transmitted periodic update
0 general responses sent
packets, and the number of received error
0 specific responses sent packets
0 GNS responses sent
0 periodic updates, 0 errors
PING: 0 requests sent, 0 requests received Statistics of Ping packets: the number of
transmitted/received request packets, the
0 responses sent, 0 responses received
number of transmitted/received response
0 responses in time, 0 responses time out packets, the number of prompt response
packets, and the number of timeout
response packets
ipx enable
Parameter None
Use the undo ipx enable command to disabled IPX and delete all the IPX
configurations.
Note that after the undo ipx enable command is executed, the IPX
configurations cannot be recovered with the ipx enable command.
ipx encapsulation
Description Use the ipx encapsulation command to configure an IPX frame encapsulation
format on the current VLAN interface.
Use the undo ipx encapsulation command to restore the encapsulation format
to the default format.
Example # Set the IPX frame encapsulation format to Ethernet_II on VLAN interface 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] ipx encapsulation ethernet-2
ipx netbios-propagation
Parameter None
Description Use the ipx netbios-propagation command to enable the current VLAN
interface to forward type 20 broadcast packets.
Use the undo ipx netbios-propagation command to disable the current VLAN
interface from forwarding type 20 broadcast packets.
ipx network
Parameter network: Hexadecimal IPX network number in the range 0x1 to 0xFFFFFFFD. The
leading 0s can be omitted when you input a network number.
Description Use the ipx network command to assign an IPX network number to the VLAN
interface.
Use the undo ipx network command to delete the IPX network number of the
VLAN interface.
Parameter None
Description Use the ipx rip import-route static command to enable RIP to import static
routes. The imported routes are included in the update packets of RIP.
Use the undo ipx rip import-route static command to disable RIP from
importing static routes.
Note that IPX RIP imports only active static routes; inactive static routes are neither
imported nor forwarded.
Parameter bytes: The maximum size of IPX RIP update packets, in bytes. It is in the range of
432 to 1500.
Description Use the ipx rip mtu command to configure the IPX RIP update packet size.
Use the undo ipx rip mtu command to restore the default size.
By default, the default size of IPX RIP update packets is 432 bytes.
Example # Set the maximum RIP update packet size to 500 bytes on VLAN interface 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] ipx rip mtu 500
Parameter multiplier: A multiplier of the update interval, decides the aging period of the RIP
routing entries together with the update interval. It is in the range 1 to 1000.
Multiplying the update interval by the multiplier, you can get the actual aging
period.
Description Use the ipx rip multiplier command to configure the aging period of the IPX RIP
routing entries.
Use the undo ipx rip multiplier command to restore the default value. The
aging period of IPX RIP is a multiple of the IPX RIP update interval. You can set
multiple update intervals as an aging period.
By default, the aging period of the IPX RIP routing entries is three times the RIP
updating interval.
Example # Set the RIP aging period of the routing entries to five times the update interval.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx rip multiplier 5
Description Use the ipx rip timer update command to configure a RIP update interval.
Use the undo ipx rip timer update command to restore the default value.
Parameter paths: The maximum number of equivalent routes to the same destination. It is in
the range of 1 to 64.
Description Use the ipx route load-balance-path command to configure the maximum
number of equivalent routes to the same destination.
Use the undo ipx route load-balance-path command to restore the default
value.
Example # Set the maximum number of equivalent routes to the same destination to 30.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx route load-balance-path 30
Parameter paths: The maximum number of dynamic routes saved in the device to the same
destination. It is in the range of 1 to 255.
Description Use the ipx route max-reserve-path command to configure the maximum
number of dynamic routes saved in the device to the same destination.
Use the undo ipx route max-reserve-path command to restore the default
value.
When the number of dynamic routes saved in the device to the same destination
exceeds the specified maximum value, the new dynamic routes are dropped
directly without being added into the routing table. When the configured new
value is less than the old one, the switch, however, does not delete the excessive
route entries. These route entries either time out or are manually deleted.
Example # Set the maximum number of dynamic routes saved in the device to the same
destination to 200.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx route max-reserve-path 200
ipx route-static
Syntax ipx route-static network network.node [ preference value ] [ tick ticks hop hops
]
Parameter network: Destination network number of an IPX static route. It comprises eight
hexadecimal numbers and is in the range of 1 to 0xFFFFFFFE. IPX static routes
whose destination network number is 0xFFFFFFFE are default routes.
network.node: Next hop address of the IPX static route. network defines the
network number; node defines the node address using 12 hexadecimal numbers
that are separated into three parts using "-", each part in the range of 1 to 0xFFFF.
preference value: Static route preference in the range of 1 to 255. A smaller value
indicates a higher preference. By default, the preference values of the static
routes, direct routes, and dynamic RIP IPX routes are 60 (user-configurable), 0, and
100.
ticks ticks: Time that a packet must take to reach the destination network, with 1
tick = 1/18 seconds. The value ranges from 1 to 65534. The default value is
1.When the tick value of a VLAN interface is modified, the tick value of the static
route also changes. You must configure both the tick value and the hop count.
hop hops: Number of the switches on the way to the destination network. It is in
the range 1 to 15 and defaults to 1. You must configure both the hop count and
tick value.
Description Use the ipx route-static command to configure a static IPX route.
Use the undo ipx route-static command to delete the static IPX route.
The IPX static routes whose destination network number is 0xFFFFFFFE are default
routes.
Example # Configure an IPX static route, with the destination network number being 0x5a,
next hop being 675.0-0c91-f61f, tick value being 10 and hop count being 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx route-static 5a 675.0-0c91-f61f tick 10 hop 2
Parameter None
Description Use the ipx sap disable command to disable SAP on the current VLAN interface.
170 CHAPTER 13: IPX CONFIGURATION COMMANDS
Use the undo ipx sap disable command to enable SAP on the current VLAN
interface.
Parameter None
Description Use the ipx sap gns-disable-reply command to disable IPX GNS reply on the
current VLAN interface.
Use the undo ipx sap gns-disable-reply command to enable IPX GNS reply on
the current VLAN interface.
Parameter None
Description Use the ipx sap gns-load-balance command to configure the switch to respond
to GNS requests through Round-Robin polling.
ipx sap max-reserve-servers 171
Use the undo ipx sap gns-load-balance command to configure the switch to
respond to GNS requests with information of the nearest server.
By default, the switch responds to SAP GNS requests with the information of a
server that is picked out in turn from all the known servers. This prevents a server
from getting overloaded.
Example # Respond to GNS requests with the information of the nearest server.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] undo ipx sap gns-load-balance
Parameter length: The maximum length of the service information reserve queue for one
service type. It is in the range of 1 to 2048.
Description Use the ipx sap max-reserve-servers command to configure the maximum
length of the service information reserve queue for one service type.
Use the undo ipx sap max-reserve-servers command to restore the default
value.
By default, the maximum length of the service information reserve queue for one
service type is 2,048.
Example # Set the maximum length of the service information reserve queue for one service
type to 1024.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx sap max-reserve-servers 1024
Parameter bytes: The maximum SAP packet size, in bytes. It is in the range of 480 to 1500.
Description Use the ipx sap mtu command to configure the maximum size of SAP update
packets.
Use the undo ipx sap mtu command to restore the default value.
Example # Set the maximum size of SAP update packets to 674 bytes, allowing 10 service
entries on VLAN interface 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] ipx sap mtu 674
Parameter multiplier: A multiplier of the update interval, decides the aging period of the SAP
routing entries together with the update interval. It is in the range of 1 to 1000.
Multiplying the update interval by the multiplier, you can get the actual aging
period.
Description Use the ipx sap multiplier command to configure the aging period of the SAP
routing entries.
Use the undo ipx sap multiplier command to restore the default value.
Example # Set the aging period of the SAP service entries to five times the update interval.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx sap multiplier 5
Description Use the ipx sap timer update command to configure a SAP update interval.
Use the undo ipx sap timer update command to restore the default value.
Note that this command is invalid if the triggered updates feature is applied on the
VLAN interface.
ipx service
Syntax ipx service service-type name network.node socket hop hops [ preference
preference ]
Parameter service-type: A 4-byte hexadecimal number ranging from 0 to FFFF. 0 indicates all
the service types.
network.node: Network number and node value of the server. The network
number comprises eight hexadecimal numbers and is in the range of 0x1 to
0xFFFFFFFD. A node address identifies a node in the network; it is 48 bits long and
comprises 12 hexadecimal numbers that are separated into three parts by "-". The
leading 0s can be omitted when you input a network number.
socket: Comprises four hexadecimal numbers and is in the range 0x1 to 0xFFFF.
hop hops: Number of hops to the server, written in decimal and in the range of 1
to 15. The hop count equal to or exceeding 16 indicates that the service is
unreachable.
preference: Service preference value. The value ranges from 1 to 255. A smaller
number indicates a higher preference. By default, the preference value of the
174 CHAPTER 13: IPX CONFIGURATION COMMANDS
Description Use the ipx service command to add a static service entry to the service
information table.
Use the undo ipx service command to delete a static service entry from the
service information table.
Example # Add a static service entry, setting service type to 4, server name to FileServer,
server network number to 130, node number to 0000-0a0b-abcd, hop count to 1
and server preference to 60.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ipx service 4 FileServer 130.0000-0a0b-abcd 451 hop 1 prefe
rence 60
ipx split-horizon
Parameter None
Description Use the ipx split-horizon command to enable split horizon on the current VLAN
interface.
Use the undo ipx split-horizon command to disable split horizon on the current
VLAN interface.
ipx tick
Parameter ticks: Delay, in ticks; ranging from 0 to 30000. One tick is equal to 1/18 seconds.
Description Use the ipx tick command to configure an IPX packet forwarding delay on a
VLAN interface.
Use the undo ipx tick command to restore the default value.
Example # Configure VLAN interface 2 to experience a delay of five ticks before forwarding
IPX packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] ipx tick 5
ipx update-change-only
Parameter None
Description Use the ipx update-change-only command to enable triggered update on the
current VLAN interface.
Syntax reset ipx routing-table statistics protocol { all | default | direct | rip | static }
176 CHAPTER 13: IPX CONFIGURATION COMMANDS
Description Use the reset ipx routing-table statistics protocol command to clear the
statistics on the IPX routes of a specific route type.
Parameter None
Description Use the reset ipx statistics command to clear the IPX statistics.
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index lists for this
argument.
Description Use the display garp statistics command to display the GARP statistics of
specified ports or all ports.
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index lists for this
argument.
Description Use the display garp timer command to display the settings of the GARP timers
on specified ports or all ports.
■ Join timer
■ Leave timer
■ LeaveAll timer
■ Hold timer
garp timer
Parameter hold: Sets the GARP Hold timer. When a GARP entity receives a piece of
registration information, it does not send out a Join message immediately. Instead,
to save the bandwidth resources, it starts the Hold timer, puts all registration
information it receives before the timer times out into one Join message and sends
out the message after the timer times out.
join: Sets the GARP Join timer. To transmit the Join messages reliably to other
entities, a GARP entity sends each Join message two times. The Join timer is used
to define the interval between the two sending operations of each Join message.
leave: Sets the GARP Leave timer. When a GARP entity expects to deregister a
piece of attribute information, it sends out a Leave message. Any GARP entity
receiving this message starts its Leave timer, and deregisters the attribute
information if it does not receives a Join message again before the timer times out.
garp timer leaveall 179
timer-value: Timeout time (in centiseconds) of the GARP timer (Hold, Join or Leave)
to be set. This argument needs to be a multiple of 5. By default, it is 10, 20, and
60 for Hold, Join and Leave timers respectively.
Description Use the garp timer command to set a GARP timer (that is, the Hold timer, the
Join timer, or the Leaver timer) for an Ethernet port.
Use the undo garp timer command to restore the default setting of a GARP
timer.
The timeout ranges of the timers vary depending on the timeout values you set for
other timers. If you want to set the timeout time of a timer to a value out of the
current range, you can set the timeout time of the associated timer to another
value to change the timeout range of this timer.
Example # Set the GARP Join timer to 25 centiseconds for port Ethernet2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] garp timer join 25
Parameter timer-value: Setting (in centiseconds) of the GARP LeaveAll timer. You need to set
this argument with the Leave timer settings of other Ethernet ports as references.
That is, this argument needs to be larger than the Leave timer settings of any
Ethernet ports. Also note that this argument needs to be a multiple of 5 and
cannot be larger than 32,765.
By default, the LeaveAll timer is set to 1,000 centiseconds (that is, 10 seconds).
Description Use the garp timer leaveall command to set the GARP LeaveAll timer.
Use the undo garp timer leaveall command to restore the default setting of
the GARP LeaveAll timer.
Once a GARP entity starts up, it starts the LeaveAll timer, and sends out a
LeaveALL message after the timer times out, so that other GARP entities can
re-register all the attribute information on this entity. After that, the entity restarts
the LeaveAll timer to begin a new cycle.
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index lists for this
argument.
Description Use the reset garp statistics command to clear the GARP statistics (such as the
information about the packets received/sent/discarded by GVRP/GMRP) on
specified or all ports.
Executing the reset garp statistics command without any parameter clears the
GARP statistics of all ports.
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index lists for this
argument.
Description Use the display gvrp statistics command to display the GVRP statistics of
specified or all trunk ports.
■ GVRP status
■ Whether GVRP is running
■ Number of the GVRP entries that fail to be registered
■ Source MAC address of the previous GVRP PDU
■ GVRP registration type of a port
Example # Display the GVRP statistics of port Ethernet2/0/1, assuming that the port is a
trunk port.
<SW7750> display gvrp statistics interface Ethernet2/0/1
GVRP statistics on port Ethernet2/0/1
Parameter None
Description Use the display gvrp status command to display the global GVRP status
(enabled or disabled).
gvrp
Syntax gvrp
undo gvrp
Parameter None
Description Use the gvrp command to enable GVRP globally (in system view) or for a port (in
Ethernet port view).
Use the undo gvrp command to disable GVRP globally (in system view) or on a
port (in Ethernet port view).
n Note that:
■ To enable GVRP for a port, you need to enable GVRP globally first.
■ GVRP is disabled on any ports if GVRP is disabled globally. In this case, you
cannot enable GVRP for a port.
■ You can enable/disable GVRP only on trunk ports.
■ After you enable GVRP on a trunk port, you cannot change the port to other
types.
gvrp registration
Parameter fixed: Allows to add or register the current port to the manually created VLAN,
and prohibits to register or deregister the current port to the dynamic VLAN.
forbidden: Deregisters all the VLANs except VLAN 1 on the current port, and
inhibits the creation and registration of any other VLAN on the current port.
Description Use the gvrp registration command to configure the GVRP registration type on
a port.
Use the undo gvrp registration command to restore the default GVRP
registration type on a port.
Example # Configure the GVRP registration type on the port Ethernet2/0/1 to fixed.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] gvrp registration fixed
186 CHAPTER 15: GVRP CONFIGURATION COMMANDS
QINQ CONFIGURATION COMMANDS
16
Parameter None
Description Use the display port vlan-vpn command to display the QinQ configuration of
the current system, including the current status of VLAN-VPN and the VLAN ID of
VLAN-VPN.
vlan-vpn enable
undo vlan-vpn
Parameter None
Description Use the vlan-vpn enable command to enable the QinQ function for a port.
Use the undo vlan-vpn command to disable the QinQ function for a port.
With the QinQ function enabled, a received packet is tagged with the default
VLAN tag of the receiving port no matter whether or not the packet already carries
a VLAN tag. If the packet already carries a VLAN tag, the packet becomes a
dual-tagged packet. Otherwise, the packet becomes a packet carrying the default
VLAN tag of the port.
188 CHAPTER 16: QINQ CONFIGURATION COMMANDS
c CAUTION:
■ The QinQ feature is unavailable if the port has the Voice VLAN feature enabled.
■ After you enable the QinQ feature for a port, the Voice VLAN function is not
available on the port.
■ 3C16863 and 3C16862 I/O Modules do not support the QinQ feature.
vlan-vpn priority
outer-priority: Priority of the outer tag obtained through mapping the priority of
the inner tag, in the range of 0 to 7.
Description Use the vlan-vpn priority command to enable the inner-to-outer tag priority
mapping for the specific port.
Use the undo vlan-vpn priority command to restore the default setting.
Example # Enable inner-to-outer tag priority mapping for Ethernet2/0/1. Map the inner tag
priority 3 to outer tag priority 5.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] vlan-vpn priority 3 remark 5
SELECTIVE QINQ CONFIGURATION
17 COMMANDS
n You can implement traffic-based selective QinQ on a Switch 7750 by using ACLs
and QoS techniques. Refer to “QoS Commands” on page 777.
double-vlan-id
Parameter inbound vlan-id-list: Species one or more inner VLAN IDs as part of a match
condition. You can provide up to 10 VLAN ID lists, by each of which you can
specify an indiviual VLAN ID in the form of vlan-id, or a range of VLAN IDs in the
form of start-vlan-id to end-vlan-id, where the end VLAN ID must be greater than
the start VLAN ID.
Description Use the double-vlan-id command to define a match condition for outer tag
replacement. The outer VLAN tag of every matched packet will be replaced with
the VLAN tag specifed in the vlan-vpn vid command.
Example # Configure outer tag replacement on Ethernet2/0/1 to replace the outer VLAN
tag of packets with an inner VLAN ID in the range of 8 to 15 and an outer VLAN ID
of 30 with the tag of VLAN 20. Specify Ethernet 2/0/5 as the uplink port and
configure it to send packets without removing the outer VLAN tag.
190 CHAPTER 17: SELECTIVE QINQ CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] vlan-vpn vid 20 uplink Ethernet 2/0/5
[SW7750-Ethernet2/0/1-vid-20] double-vlan-id inbound 8 to 15 outer-vid 30
raw-vlan-id inbound
Parameter vlan-id-list: List of VLAN Ids. You need to provide this argument in the form of
vlan-id-list = { vlan-id [ to { vlan-id } ] } & <1-10>, where & <1-10> means that you
can provide up to ten VLAN Ids/VLAN ID lists.
vlan-vpn vid
Parameter vid vlan-id: Specifies ID of the VLAN whose tag is to be inserted to matched
packets as the outer VLAN tag.
vlan-vpn vid 191
untagged: Sets whether to keep VLAN tags of the packets tagged with outer
VLAN tags when they are forwarded on the upstream port.
Description Use the vlan-vpn vid command to specify the VLAN whose tag is to be inserted
to matched packets as the outer VLAN tag and specify the upstream port for these
packets. You can use the raw-vlan-id inbound command to specify the outer
VLAN tag for packets with the specified inner VLAN tags.
When the upstream port and the port where the selective QinQ configured are not
on the same module, if the module where the upstream port resides is unplugged,
this configuration is invisible. This configuration takes effect again when the
unplugged module is plugged.
n ■ Type-A I/O Modules do not support the selective QinQ feature. Type A I/O
Modules include: 3C16860, 3C16861, LS81FS24A, 3C16858, 3C16859, and
32Gbps and 64Gbps Switch Fabrics.
■ The 3C16863 and 3C16862 I/O Modules do not support the selective QinQ
feature.
Note that the vlan-vpn vid command needs to be coupled by the raw-vlan-id
inbound command.
Example # Configure to use VLAN 20 tag as the outer VLAN tag of packets with the inner
tag of VLAN 10 received on Ethernet2/0/1. Specify the upstream port as
Ethernet2/0/5 and specify the upstream port to remove outer tags of the packets
when forwarding the packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] vlan-vpn vid 20 uplink Ethernet 2/0/5 untagge
d
[SW7750-Ethernet2/0/1-vid-20] raw-vlan-id inbound 10
192 CHAPTER 17: SELECTIVE QINQ CONFIGURATION COMMANDS
SHARED VLAN CONFIGURATION
18 COMMANDS
display shared-vlan
Parameter None
Description Use the display shared-vlan command to display the shared VLANs configured
for all the I/O Modules and Fabrics in the system.
Example # Display the shared VLANs configured for all the I/O Modules and Fabrics in the
system.
<SW7750> display shared-vlan
shared-vlan 1 mainboard
shared-vlan 3 slot 4
The fields above show that the shared VLAN configured in the current system
include VLAN 1 on the Fabric and VLAN 3 on the I/O Module in slot 4.
shared-vlan mainboard
Description Use the shared-vlan mainboard command to configure a shared VLAN on the
Fabric. Use the undo shared-vlan mainboard command to remove the shared
VLAN on the Fabric.
n ■ For a Switch 7758 with two Fabrics equipped, the shared VLAN configured on
the primary Fabric also takes effect on the secondary Fabric.
194 CHAPTER 18: SHARED VLAN CONFIGURATION COMMANDS
■ You must specify an existing VLAN to be the shared VLAN. Otherwise, the
system prompts configuration failure information.
c CAUTION: The shared VLAN can destroy RRPP rings and disable the RRPP feature,
and thus cause rings in the network. So make sure that the RRPP feature and the
shared VLAN feature is not enabled on a switch at the same time.
shared-vlan slot
Description Use the shared-vlan slot command to configure shared VLAN on the I/O
Module. Use the undo shared-vlan slot command to remove the shared VLAN
from the I/O Module.
n You must specify an existing VLAN to be the shared VLAN. Otherwise, the system
prompts configuration failure information.
c CAUTION: The shared VLAN can destroy RRPP rings and disable the RRPP feature,
and thus cause rings in the network. So make sure that the RRPP feature and the
shared VLAN feature is not enabled on a switch at the same time.
Example # Specify VLAN 20 to be the shared VLAN on the I/O Module in slot 3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] shared-vlan 20 slot 3
PORT BASIC CONFIGURATION
19 COMMANDS
broadcast-suppression
undo broadcast-suppression
Parameter ratio: Maximum ratio of the received broadcast traffic to the total bandwidth on
an Ethernet port. The value ranges from 1 to 100 and defaults to 100. The smaller
the ratio is, the less broadcast traffic is allowed.
■ For a 100 Mbps Ethernet port, the pps argument is in the range of 0 to
148,810.
■ For a Gigabit Ethernet port, the pps argument is in the range of 1,488,100.
■ For a 10GE port, the pps argument is in the range of 0 to 14,881,000.
When incoming broadcast traffic exceeds the broadcast traffic threshold you set,
the system drops the packets exceeding the threshold to reduce the broadcast
traffic ratio to the reasonable range, so as to keep normal network service.
A port supports one way of broadcast suppression at the same time. If broadcast
suppression has been configured for a port for multiple times, only the latest
configuration takes effect.
Example # Allow incoming broadcast traffic to occupy at most 20% of the bandwidth on
the port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] broadcast-suppression 20
# Set the maximum number of broadcast packets that can be received per second
by the Ethernet2/0/2 port to 1000 pps.
copy configuration
Description Use the copy configuration command to copy the configuration on a port to
some other ports to keep consistent configuration on them.
n Any aggregation group port you input in the destination port list will be removed
from the list and the copy command will not take effect on the port. If you want
an aggregation group port to have the same configuration with the source port,
you can specify the aggregation group of the port as the destination (with the
destination-agg-id argument).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] copy configuration source Ethernet3/0/1 destination Ethernet3/0/2
The operation will be invalid for some special port(s) in the destination port
list, such as aggregation port.
Copying VLAN configuration...
Copying Protocol based VLAN configuration...
Copying LACP configuration...
Copying QOS configuration...
Copying STP configuration...
Copying speed/duplex configuration...
Port configuration copy complete
description
undo description
Use the undo description command to remove the port description string.
Description Use the display brief interface command to display the brief configuration
information about one or all interfaces, including: interface type, link state, link
rate, duplex mode, link type, default VLAN ID and port description string (only the
first 33 characters are displayed).
This command is similar to the display interface command, but the information
it displays is briefer.
n Currently, for the port types other than Ethernet port, this command only displays
the link state, and shows "--" in all other configuration information fields.
Example # Display the brief configuration information about the Ethernet2/0/1 port.
<SW7750> display brief interface Ethernet2/0/1
Interface:
Eth - Ethernet GE - GigabitEthernet
Loop - LoopBack Vlan - Vlan-interface M-E - M-Ethernet
Link:
spf -spoofing
Speed/Duplex:
A - auto-negotiation
Field Description
Interface Port type
Link Link state: UP or DOWN
Speed Link rate
Duplex Duplex mode
Type Link type: access, hybrid or trunk
PVID Default VLAN ID
Description Port description string (only the first 33 characters are displayed)
display interface
■ If you specify neither port type nor port number, the command displays
information about all ports.
■ If you specify only port type, the command displays information about all ports
of the specified type.
■ If you specify both port type and port number, the command displays
information about the specified port.
Field Description
Ethernet2/0/1 current state Enable/disable status of the current
Ethernet port
IP Sending Frames’ Format Ethernet frame format
Hardware address Port hardware address
The Maximum Transmit Unit The maximum transmit unit (MTU)
Media type Media type
Port hardware type Port hardware type
Flow-control is enabled Flow-control status of the port
The Maximum Frame Length Maximum frame length allowed on
the port
200 CHAPTER 19: PORT BASIC CONFIGURATION COMMANDS
Field Description
Allow jumbo frame to pass Whether Jumbo frame is allowed on
the port.
Port monitor last value: 5 Delay of reporting down state to the
system for a port
PVID Default VLAN ID of the port
Mdi type Network cable type
Port link-type Port link type
Tagged VLAN ID Identify the VLANs whose packets
will be forwarded with tags on the
port.
Untagged VLAN ID Identify the VLANs whose packets
will be forwarded without tags on
the port.
Last 300 seconds input: 0 packets/sec 0 bytes/sec Rate and number of incoming and
outgoing packets in the last 300
Last 300 seconds output: 0 packets/sec 0 bytes/sec
seconds
Input(total): 1150 packets, 149854 bytes Statistics on the incoming packets
and errors on the port
542 broadcasts, 55 multicasts, - pauses
The "-" indicates that the statistical
Input(normal): - packets, - bytes
item is not supported.
- broadcasts, - multicasts, - pauses
Input: - input errors, 0 runts, - giants, 0 throttles, 0 CRC
0 frame, - overruns, - aborts, - ignored, - parity errors
Output(total): 1288 packets, 116919 bytes Statistics on the outgoing packets
and errors on the port
0 broadcasts, 886 multicasts, 0 pauses
The "-" indicates that the statistical
Output(normal): - packets, - bytes
item is not supported.
- broadcasts, - multicasts, - pauses
Output: 0 output errors, - underruns, - buffer failures
0 aborts, 0 deferred, 0 collisions, 0 late collisions
- lost carrier, - no carrier
Receive Packet Peak Value Info Peak incoming rate (in Bps)
A port figures out the average
incoming rate periodically. The Peak
incoming rate displayed by the
display interface command is the
maximum average incoming rate
ever figured out.
happened at Time when the peak rate occurs
Transmit Packet Peak Value Info Peak outgoing rate (in Bps)
A port figures out the average
outgoing rate periodically. The Peak
outgoing rate displayed by the
display interface command is the
maximum average outgoing rate
ever figured out.
display loopback-detection 201
display loopback-detection
Example # Display the information about loopback detection on the port and "40" is
included in the interface information.
<SW7750> display loopback-detection | include 40
Loopback-detection interval time is 30 seconds
Interface detect control per-vlan loopback-status
-------------------------------------------------------------------------
GigabitEthernet2/0/40 N N N not-loop
Ethernet3/0/40 N N N not-loop
Table 28 Field descriptions of the display loopback-detection command
Field Description
Loopback-detection interval time Interval of performing loopback detection
Interface Interface name
detect Whether loopback detection is enabled
control Processing mode for the port where loopback is
detected
per-vlan Whether to perform loopback detection on all the
VLANs on the port
loopback status Whether loopback occurs on the current port
duplex
undo duplex
202 CHAPTER 19: PORT BASIC CONFIGURATION COMMANDS
Description Use the duplex command to set the duplex mode of the current port.
Use the undo duplex command to restore the default duplex mode, that is,
auto-negotiation mode.
Parameter None
Description Use the enable log updown command to allow a port to output the Up/Down
log information.
Use the undo log enable updown command to disable the port from
outputting Up/Down log information.
Example # By default, a port is allowed to output the Up/Down log information. Execute
the shutdown command or the undo shutdown command on Ethernet2/0/1,
and the system outputs the Up/Down log information of Ethernet2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] shutdown
%Sep 8 11:56:41 2006 3Com Switch 7765 (4-Slot Chassis) L2INF/5/PORT LINK STATUS CHANGE:
Ethernet2/0/11: is DOWN
[SW7750-Ethernet2/0/1] undo shutdown
%Sep 8 11:57:00 2006 3Com Switch 7765 (4-Slot Chassis) L2INF/5/PORT LINK STATUS CHANGE:
Ethernet2/0/11: is UP
flow-control 203
flow-control
Syntax flow-control
undo flow-control
Parameter None
Description Use the flow-control command to enable flow control on the port so as to avoid
packet loss during congestion.
Use the undo flow-control command to disable flow control on the port.
flow-control enable
Parameter None
Description Use the flow-control enable command to enable flow control globally.
flow interval
undo flow-interval
Parameter Interval: Interval (in seconds) to perform statistics on port information. This
argument ranges from 5 to 300 (in step of 5) and is 300 by default.
Description Use the flow-interval command to set the interval to perform statistics on port
information.
Example # Set the interval to perform statistics on the Ethernet2/0/1 port to 100 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] flow-interval 100
hardspeedup
hardspeedup disable
interface 205
Parameter None
Description Use the hardspeedup enable command to enable command to enable the
hardware speedup function inside the port.
n ■ The commands above are applicable to type-A I/O Modules only, including
3C16860, 3C16861, LS81FS24A, 3C16858, and 3C16859.
■ The commands above are diagnostic, so you cannot use them at discretion.
interface
Parameter interface-type: Port type, which can be Aux, Ethernet, GigabitEthernet, LoopBack,
M-Ethernet, NULL, Tunnel or Vlan-interface.
Description Use the interface command to enter Ethernet port view. To configure parameters
for a port, you must enter the port view first.
jumboframe enable
Parameter jumboframe-value: Size of the permitted jumbo frame, in the range of 1,536 to
9,216 in byte.
Description Use the jumboframe enable command to allow jumbo frames to pass through
the current Ethernet port.
Use the undo jumboframe enable command to inhibit jumbo frames from
passing through the current Ethernet port.
By default, jumbo frames that are larger than 1,518 bytes and smaller than 1,536
bytes are allowed to pass through the Ethernet port.
Example # Allow jumbo frames smaller than 1,536 bytes to pass through Ethernet2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] jumboframe enable
loopback-detection enable
Parameter None
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] loopback-detection enable
loopback-detection interval-time
Parameter time: Interval for detecting external loopback on a port, in the range of 5 to 300
(in seconds). It is 30 seconds by default.
Description Use the loopback-detection interval-time command to set the interval for
detecting external loopback on a port.
Example # Set the interval for detecting external loopback on a port to 10 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] loopback-detection interval-time 10
loopback-detection control
Parameter block: Specifies to block the port where loop is detected, that is, the port cannot
receive or send any packets except BPDU packets. The system will periodically
detect whether loopback still occurs on the port. If yes, the port will be blocked
continuously. If not, and no other protocols (such as STP, LACP, DLDP) change the
state of the port, the port will be restored to the state of sending and receiving
packets normally.
sending and receiving packets normally, and additionally the MAC address
learning function will be also restored for the port.
shutdown: Specifies to disable the port after loopback is detected on the port.
Description Use the loopback-detection control command to set the processing mode for
the port where loopback is detected.
By default, no processing mode is set for the port where loopback is detected.
Example # Specify the processing mode for the port where loopback is detected as
nolearning.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] loopback-detection control nolearning
Parameter None
By default, loopback detection is enabled for only the default VLAN of a trunk port
or hybrid port.
Example # Enable loopback detection for all the VLANs on the trunk port Ethernet2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] port link-type trunk
[SW7750-Ethernet2/0/1] loopback-detection per-vlan enable
mdi 209
mdi
undo mdi
Description Use the mdi command to set the network types that can be identified by Ethernet
ports.
Use the undo mdi command to restore the default network cable type that can
be identified by Ethernet ports.
c CAUTION: The Switch 7750 supports the auto mode only. If another mode is
specified, the system prompts "Operation not supported".
multicast-suppression
undo multicast-suppression
Parameter ratio: Maximum ratio of received multicast traffic to the total bandwidth on the
Ethernet port. The value ranges from 1 to 100 (in step of 1) and defaults to 100.
The smaller the ratio is, the less multicast traffic is allowed to be received.
kbps kbps-value: Specifies the maximum bandwidth (in Kbps) for receiving
multicast traffic, in the range of 64 to 1,024,000 in the step of 64.
When incoming multicast traffic on the port exceeds the multicast traffic threshold
you set, the system drops the packets exceeding the threshold to reduce the
multicast traffic ratio to the reasonable range, so as to keep normal network
service.
Example # Allow the incoming multicast traffic on the Ethernet2/0/1 port to occupy at most
20% of the bandwidth on the port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] multicast-suppression 20
# Set the maximum number of multicast packets that can be forwarded per
second by the Ethernet2/0/2 port to 1000 pps.
Parameter value: Delay of reporting down state to the system, in the range of 0 to 60. When
this argument is set to 0, the port will report its state as soon as it is brought
down. The bigger this argument is, the longer delay it takes for a port to report its
down state to the system.
Description Use the port monitor last command to set the delay of reporting down state to
the system for the current port.
Use the undo port monitor last command to restore the delay of reporting
down state to the system for the current port to the default value, which is related
to the configuration performed in system view:
■ If you have configured the global delay in stem view (refer to “port monitor last
slot” on page 211 “port monitor last slot” on page 211 for details), the default
delay will be the global delay.
■ If no global delay is configured, the default delay is 1.
n The delay of reporting down state to the system can be configured in either
system view or Ethernet port view. If the delay is configured in both system view
and Ethernet port view simultaneously, the configuration performed in Ethernet
port view is given priority.
After the setting, you can use the display interface command to display the
information about the field "Port monitor last value".
Example # Set the delay of reporting down state to the system to 5 for Ethernet2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] port monitor last 5
Parameter slot-number: Number of the slot where the I/O Module resides.
value: Delay of reporting down state to the system, in the range of 0 to 60. When
this argument is set to 0, the port will report its state as soon as it is brought
down. The bigger this argument is, the longer delay it takes for a port to report its
down state to the system.
Description Use the port monitor last command to set the delay of reporting down state to
the system for the ports of all the I/O Modules or the specified I/O Module.
212 CHAPTER 19: PORT BASIC CONFIGURATION COMMANDS
Use the undo port monitor last command to restore the delay to the default
value.
After the setting, you can use the display interface command to display the
information about the field "Port monitor last value".
Example # Set the delay of report down state to the system to 10 for the ports on the I/O
Module in slot 5.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] port monitor last slot 5 10
Description Use the reset counters interface command to clear the statistics of the port,
preparing for a new statistics collection.
■ If you specify neither port type nor port number, the command clears statistics
of all ports.
■ If specify only port type, the command clears statistics of all ports of this type.
■ If specify both port type and port number, the command clears statistics of the
specified port.
shutdown
Syntax shutdown
undo shutdown
Parameter None
speed
undo speed
n For ports of different types, the parameter prompts after you enter the speed
command are also different.
Use the undo speed command to restore the port speed to the default setting.
speed auto
Description Use the speed auto [ 10 | 100 | 1000 ]* command to configure auto-negotiation
speed(s) for the current port.
The last configuration will take effect if you configure the command for multiple
times.
Example # Configure 10 Mbps and 1000 Mbps as the auto-negotiation speeds of Ethernet
2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] speed auto 10 1000
speedup
speedup disable
Parameter None
Description Use the speedup enable command to enable the hardware speedup function
outside the port.
Use the speedup disable command to disable the hardware speedup function
outside the port.
n ■ The commands above are applicable to type-A I/O Modules only, including
3C16860, 3C16861, LS81FS24A, 3C16858, and 3C16859.
■ The commands above are diagnostic, so you cannot use them at discretion.
unicast-suppression
undo unicast-suppression
Parameter ratio: Maximum ratio of the received unknown unicast traffic to the total
bandwidth on an Ethernet port. The value ranges from 1 to 100 in the step of 1
and defaults to 100. The smaller the ratio is, the less unknown unicast traffic is
allowed.
mbps-value: Maximum bandwidth (in Mbps) for receiving unknown unicast traffic
on an Ethernet port. The range of the mbps-value argument depends on the port
type:
kbps kbps-value: Specifies the maximum bandwidth (in Kbps) for receiving
unknown unicast traffic, in the range of 64 to 1,024,000 in the step of 64.
Description Use the unicast-suppression command to set the size of unknown unicast
traffic allowed to be received on the current port.
When incoming unknown unicast traffic on the port exceeds the threshold you
set, the system drops the packets exceeding the threshold to reduce the unknown
unicast traffic ratio to the reasonable range, so as to keep normal network service.
Example # Allow the incoming unknown unicast traffic on the Ethernet2/0/1 port to occupy
at most 20% of the bandwidth on the port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet 2/0/1
[SW7750-Ethernet2/0/1] unicast-suppression 20
# Set the maximum number of unknown unicast packets that can be forwarded
per second by Ethernet2/0/2 to 1,000 pps.
virtual-cable-test
Syntax virtual-cable-test
Parameter None
Description Use the virtual-cable-test command to enable the system to test the cable
connected to a specific port and to display the results. The system can test these
attributes of the cable:
■ Cable status, including normal, abnormal, abnormal-open, abnormal-short and
failure
■ Cable length
n ■
■
If the cable is in normal state, the displayed information is "-".
If the cable is in any other state, the displayed length value is the length from
the port to the faulty point.
■ Pair impedance mismatch
■ Pair skew
■ Pair swap
■ Pair polarity
■ Insertion loss
■ Return loss
■ Near-end crosstalk
By default, the system does not test the cable connected to the Ethernet port.
n ■
■
The combo port does not support the virtual-cable-test command.
The error for cable length tested through the virtual-cable-test command is
±5m.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet0/1] virtual-cable-test
Cable status: abnormal(open), 7 metres
Pair Impedance mismatch: yes
Pair skew: 4294967294 ns
Pair swap: swap
Pair polarity: normal
Insertion loss: 7 db
Return loss: 7 db
Near-end crosstalk: 7 db
218 CHAPTER 19: PORT BASIC CONFIGURATION COMMANDS
LINK AGGREGATION CONFIGURATION
20 COMMANDS
Parameter None
Description Use the display lacp system-id command to display the device ID of the local
system, including the system priority and the MAC address.
Field Description
Actor System ID Device ID of the local system, including the
system priority and the system MAC address
Description Use the display link-aggregation interface command to display the link
aggregation details about a specified port or port range, including:
■ Link aggregation group ID of the specified port or port range
220 CHAPTER 20: LINK AGGREGATION CONFIGURATION COMMANDS
■ Port priority, operation key and LACP status flag of the local end,
■ Device ID, port number, port priority, operation key and protocol status flag
and LACP packet statistics of the remote end
Note that, for a manual aggregation group, value 0 is displayed for all the above
items of the remote end (which does not indicate the real information of the
remote end), since information about the remote end cannot be obtained for a
manual aggregation group.
Field Description
Attached AggID ID of the aggregation group to which the
specified port belongs
Local: Port priority, operation key and LACP status
flag of the local end
Port-Priority: 32768, Oper key: 1, Flag: 0x00
Remote: Device ID, port number, port priority,
operation key and LACP status flag of the
System ID: 0x0, 0000-0000-0000
remote end
Port Number: 0, Port-Priority: 0, Oper-key: 0,
Flag: 0x00
Received LACP Packets: 0 packet(s), Illegal: 0 Statistics about LACP packets, including: the
packet(s) number of received LACP packets, the
number of illegal LACP packets and the
Sent LACP Packets: 0 packet(s)
number of send LACP packets
Parameter None
Field Description
Actor ID Local device ID
AL ID Aggregation group ID
AL Type Aggregation group type: D (dynamic), S (static), or M (manual)
Partner ID ID of the remote device
Select Ports Number of the selected ports
Standby Ports Number of standby ports
Share Type Load sharing type: Shar (load-sharing), or NonS (non-load-sharing)
Master Port Port with the smallest port number in the aggregation group
Parameter agg-id: ID of the aggregation group to be displayed, which must be the ID of the
existing aggregation group, in the range of 1 to 384.
Description Use the display link-aggregation verbose command to display the details
about a specified aggregation group, including:
■ Aggregation group ID, aggregation group type, load sharing type, aggregation
group description string;
■ Local end details: device ID, port number, port status, port priority, LACP flag,
operation key and connection status;
■ Remote end details: local port, remote port index, remote port priority,
operation key, and device ID.
Note that, for a manual aggregation group, value 0 is displayed for all the above
items of the remote end (which does not indicate the real information of the
remote end), since information about the remote end cannot be obtained for a
manual aggregation group.
Aggregation Description:
System ID: 0x8000, 000f-e218-d0d0
Port Status: S -- Selected, T -- sTandby
Local:
Port Status Priority Flag Oper-Key Link-Status
--------------------------------------------------------------------------
GigabitEthernet2/0/1 S 32768 0x7d 1 Up
GigabitEthernet2/0/2 T 32768 0x45 2 Down
Remote:
Actor Partner Priority Flag Oper-Key SystemID
--------------------------------------------------------------------------
GigabitEthernet2/0/1 0 32768 0x38 0 0x8000,0000-0000-0000
GigabitEthernet2/0/2 0 32768 0x30 0 0x8000,0000-0000-0000
Table 33 Field descriptions of the display link-aggregation verbose command
Field Description
Aggregation ID Aggregation group ID
AggregationType Aggregation group type, including dynamic aggregation, static
aggregation and manual aggregation
Loadsharing Type Loadsharing type, including Loadsharing and Non-Loadsharing
Aggregation Description Aggregation group description string
System ID Local device ID
Port state Port state
Local Other information about the local end, including port number,
port state, port priority, LACP flag, operation key and connection
status
Remote Detailed information about the remote end, including: local port
number, remote port index, port priority, flag bit, operation key
and device ID
hash
Syntax hash { dstip | dstmac | ip | l4port | mac | srcip | srcmac } { ioboard slot
slot-number | mainboard }
undo hash { dstip | dstmac | ip | l4port | mac | srcip | srcmac } { ioboard slot
slot-number | mainboard }
Parameter dstip: Specifies to use a destination IP address as the parameter of the HASH
algorithm.
ip: Specifies to use the value obtained from the XOR operation performed
between the source IP address and the destination IP address as the parameter of
the HASH algorithm.
l4port: Specifies to use the port number of TCP or UDP as the parameter of the
HASH algorithm.
lacp enable 223
mac: Specifies to use the value obtained from the XOR operation performed
between the source MAC address and the destination MAC address as the
parameter of the HASH algorithm.
srcip: Specifies to use a source IP address as the parameter of the HASH algorithm.
srcmac: Specifies to use a source MAC address as the parameter of the HASH
algorithm.
n ■ All the seven parameters are available on type-A I/O Modules including
3C16860, 3C16860, 3C16861, 3C16861, LS81FS24A, LS81FS24, 3C16858,
3C16858, 3C16859, and 3C16859.
■ None of the above seven parameters are available on non-type-A I/O Modules.
■ Only type-A I/O Modules support l4port.
Description Use the hash command to configure parameters used by the HASH algorithm in
link aggregation.
By default, type-A I/O Modules use four-tuple (dstip, dstmac, srcip and srcmac)
as the parameters for HASH operation. I/O Modules other than type-A I/O
Modules use ip as the parameter for HASH operation.
Example # For I/O Module 2, use the destination IP address as the parameter of the HASH
algorithm.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hash dstip ioboard slot 2
lacp enable
Parameter None
Description Use the lacp enable command to enable the LACP protocol.
Use the undo lacp enable command to disable the LACP protocol.
224 CHAPTER 20: LINK AGGREGATION CONFIGURATION COMMANDS
lacp port-priority
Description Use the lacp port-priority command to set the priority of the current port.
Use the undo lacp port-priority command to restore the default port priority.
lacp system-priority
Description Use the lacp system-priority command to set the system priority.
Use the undo lacp system-priority command to restore the default system
priority.
link-aggregation
both: Performs load sharing for both inbound traffic and outbound traffic on all
member ports in the aggregation group.
Description Use the link-aggregation command to add a series of ports to a new manual
aggregation group, to which the system assigns a new group number. The
link-aggregation group agg-id mode command and the port
link-aggregation group command can be used together to implement the
function of the link-aggregation command.
By default:
Example # Set up an aggregation group with Ethernet 2/0/1 to Ethernet 2/0/4 and perform
load sharing for both inbound and outbound traffic of the aggregation group.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] link-aggregation ethernet2/0/1 to ethernet2/0/4 both
Description Use the link-aggregation group description command to set a description for
an aggregation group.
226 CHAPTER 20: LINK AGGREGATION CONFIGURATION COMMANDS
Description Use the link-aggregation group mode command to create a manual or static
aggregation group.
Description Use the port link-aggregation group command to add the current Ethernet
port to a manual or static aggregation group.
Use the undo port link-aggregation group command to remove the current
Ethernet port from the aggregation group.
reset lacp statistics 227
Description Use the reset lacp statistics command to clear LACP statistics on specified
port(s), or on all ports if no port is specified.
description
undo description
Description Use the description command to specify the description string for the current
isolation group.
Use the undo description command to remove the description string for the
current isolation group.
Description Use the display isolate port command to display the configuration of a created
isolation group, including:
■ ID of the isolation group
■ Description string for the isolation group
■ Ports that the isolation group contains
230 CHAPTER 21: PORT ISOLATION CONFIGURATION COMMANDS
port
Description Use the port command to add the specified ports to an isolation group.
Use the undo port command to remove the specified ports from an isolation
group.
This command functions the same as the “port isolate group” on page 230 “port
isolate group” on page 230 command except that Ethernet ports must be
specified in this command.
Description Use the port isolate group command to add the current Ethernet port to a
created isolation group.
Use the undo port isolate command to remove the current Ethernet port from
an isolation group.
This command functions the same as the “port” on page 230 “port” on page 230
command except that Ethernet ports need not be specified in this command.
n ■ An Ethernet port belongs to only one port isolation group. If you add an
Ethernet port to different isolation groups, the port belongs to only the latest
isolation group to which the port is added.
■ Currently, modules of Type A (3C16860, 3C16861, LS81FS24A, 3C16858, and
3C16859) do not support the Port Isolation feature.
port-isolate group
Use the undo port-isolate command to remove the specified isolation group.
Description Use the display mac-address security command to display information about
security MAC addresses. Each piece of information for a port includes: secure
MAC address on the port, VLAN ID of the port, current MAC address state, port
index, and MAC address aging time.
By checking the output of this command, you can verify the current configuration.
Example # Display the security MAC address configuration on GigabitEthernet 2/0/1 port.
<SW7750> display mac-address security interface GigabitEthernet 2/0/1
MAC ADDR VLAN ID STATE PORT INDEX AGING TIME(s)
0001-0001-0001 1 Security GigabitEthernet2/0/1 NOAGED
display port-security
Parameter interface-list: Ethernet port list, which can contain multiple Ethernet ports. The
interface-list argument is in the format of { interface-type interface-number [ to
interface-type interface-number ] } & <1-10>, where interface-type represents the
port type, interface-number represents the port number, and & <1-10> means
that you can provide up to 10 port indexes/port index ranges in this argument.
Description Use the display port-security command to display information about port
security configuration (including global configuration, and configuration on
specified or all ports).
By checking the output of this command, you can verify the current configuration.
c CAUTION:
■ This command will display global and all ports’ security configuration
information if the interface-list argument is not specified.
■ This command will display particular port’s security configuration information if
the interface-list argument is specified.
GigabitEthernet2/0/1 is link-down
Port mode is noRestriction
NeedtoKnow mode is disabled
Intrusion mode is no action
Max mac-address num is not configured
Stored mac-address num is 0
Authorization is permit
GigabitEthernet2/0/2 is link-down
Port mode is noRestriction
NeedtoKnow mode is disabled
Intrusion mode is no action
Max mac-address num is not configured
Stored mac-address num is 0
Authorization is permit
Field Description
Equipment port security is enabled Port security is enabled on the switch.
RALM logoff trap is Enabled The sending of RALM authentication success trap
messages is enabled.
Disableport Timeout: 100 s The temporary port-disabling time is 100 seconds.
OUI value The next line displays OUI value.
mac-address security 235
Field Description
GigabitEthernet2/0/1 is link-down The link status of the port GigabitEthernet 2/0/1 is
"down".
Port mode is noRestriction The security mode of the port is normal.
NeedtoKnow mode is disabled NTK is disabled on a port
Intrusion mode is no action no action is taken when intrusion protection is triggered.
Max mac-address num is 100 The maximum number of MAC addresses allowed on
the port is 100.
Stored mac-address num is 0 No MAC address is stored.
Authorization is permit Authorization information delivered by the RADIUS
server will be applied to the port.
mac-address security
Description Use the mac-address security command to manually add a security MAC
address to a port.
n You can manually add a security MAC address to a port only when port security is
enabled globally and the port-security port-mode autolearn command is
configured on the port.
port-security enable
Parameter None
port-security intrusion-mode
blockmac: Specifies to discard the packets with illegal source MAC addresses.
port-security authorization ignore 237
Description Use the port-security intrusion-mode command to set the action to be taken
by the device when intrusion protection is triggered on the port.
n By checking the source MAC addresses in inbound data frames or the username
and password in 802.1x authentication requests on a port, intrusion protection
detects illegal packets (packets with illegal MAC address) or events and takes a
pre-set action accordingly. The actions you can set include: disconnecting the port
temporarily/permanently and blocking packets with invalid MAC addresses.
■ A packet with unknown source MAC address is received on the port while
MAC address learning is disabled on the port.
■ A packet with unknown source MAC address is received on the port while the
amount of security MAC addresses on the port has reached the preset
maximum number.
■ The user fails the 802.1x or MAC address authentication.
After executing the intrusion-mode blockmac command, you can only use the
display port-security command to view blocked MAC addresses, which you
cannot configure as static MAC addresses.
Example # Configure the switch to disable GigabitEthernet 2/0/1 when intrusion protection
is triggered on the port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] port-security enable
[SW7750] interface GigabitEthernet2/0/1
[SW7750-GigabitEthernet2/0/1] port-security intrusion-mode disableport
Parameter None
238 CHAPTER 22: PORT SECURITY COMMANDS
Description Use the port-security authorization ignore command to configure the port
to ignore the authorization information delivered by the RADIUS server.
By default, the port uses (does not ignore) the authorization information delivered
by the RADIUS server.
port-security max-mac-count
Parameter count-value: Maximum number of MAC addresses allowed on the port, in the
range of 1 to 1,024.
Description Use the port-security max-mac-count command to set the maximum number
of MAC addresses allowed on the port.
By default, there is no limit on the number of MAC addresses allowed on the port.
Example # Set the maximum number of MAC addresses allowed on the port to 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] port-security enable
[SW7750] interface GigabitEthernet2/0/1
[SW7750-GigabitEthernet2/0/1] port-security max-mac-count 100
port-security ntk-mode 239
port-security ntk-mode
Parameter ntkonly: Allows the port to transmit only unicast packets with
successfully-authenticated destination MAC addresses.
Description Use the port-security ntk-mode command to configure the NTK feature on the
port.
Use the undo port-security ntk-mode command to restore the default setting.
Be default, NTK is disabled on a port, namely all frames are allowed to be sent.
n By checking the destination MAC addresses of the data frames to be sent from a
port, the NTK feature ensures that only successfully authenticated devices can
obtain data frames from the port, thus preventing illegal devices from intercepting
network data.
port-security oui
Parameter OUI-value: OUI value. You can input a full MAC address (in hexadecimal format)
for this argument and the system will calculate the OUI value from your input.
Description Use the port-security oui command to set an OUI value for authentication.
Use the undo port-security oui command to cancel the OUI value setting.
c CAUTION:
■ The OUI value set by this command takes effect only when the security mode
of the port is set to userlogin-secure-oui by the port-security port-mode
command.
■ You need only to input a full MAC address in hexadecimal format for the
OUI-value argument in this command, and the system will automatically
convert the address from hexadecimal format to binary format and then take
the higher 24 bits of the resulting binary data as the OUI value.
Example # Set an OUI value by specifying the MAC address 000f-e200-0000, with an OUI
index of 5.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] port-security oui 000f-e200-0000 index 5
port-security port-mode
Description Use the port-security port-mode command to set the security mode of the
port.
Use the undo port-security port-mode command to restore the port to the
normal operating mode.
Port security defines various security modes that allow devices to learn legal source
MAC addresses, in order for you to implement different network security
management as needed. With port security, packets whose source MAC addresses
cannot be learned by your switch in a security mode, or packets that fail to pass
802.1x authentication are considered illegal.
Parameter timer: This argument ranges from 20 to 300 and defaults to 20 (in seconds).
Description Use the port-security timer disableport command to set the time during
which the system temporarily disables a port.
Use undo port-security timer disableport command restore the default time.
Example # Set the time during which the system temporarily disables a port to 50 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] port-security timer disableport 50
port-security trap
Description Use the port-security trap command to enable the sending of specified type(s)
of trap messages.
Use the undo port-security trap command to disable the sending of specified
type(s) of trap messages.
By default, the system disables the sending of any types of trap messages.
port-security trap 243
n This command is based on the trap feature, which enables the switch to send trap
messages when special data packets (generated by illegal intrusion, abnormal user
logon/logoff, or other special activities) are passing through a port, so as to help
the network administrator to monitor special activities.
When you use the display port-security command to display global information,
the system will display which types of trap messages are allowed to send.
am user-bind
Description Use the am user-bind command to bind the MAC and IP addresses of a user
with a specified port.
By default, the MAC and IP addresses of a user is not bound with any port.
n ■
■
Up to 100 MAC addresses and IP addresses can be bound to a port.
A MAC/IP address cannot be bound to more than one port.
Example # Bind the MAC address 000f-e200-5101 and IP address 10.1.1.1 (supposing they
are MAC and IP addresses of a legal user) to GigabitEthernet 2/0/2 port.
246 CHAPTER 23: PORT BINDING COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] am user-bind mac-addr 000f-e200-5101 ip-addr 10.1.1.1 interface GigabitEthernet2/0/2
display am user-bind
Description Use the display am user-bind command to display port binding information.
The above output displays that two port binding settings exist:
■ MAC address 000f-e200-5101 and IP address 1.2.3.3 are bound with Ethernet
2/0/2.
■ MAC address 000f-e200-5102 and IP address 2.3.2.3 are bound with Ethernet
2/0/4.
DLDP CONFIGURATION COMMANDS
24
display dldp
Description Use the display dldp command to display the DLDP configuration information of
the device or the specified port.
Field Description
dldp interval Interval for sending DLDP advertisement packets
dldp work-mode DLDP work mode
dldp authentication-mode DLDP authentication mode
dldp unidirectional-shutdown DLDP action to be performed on detecting a
unidirectional link
dldp delaydown-timer Setting of the DelayDown timer
248 CHAPTER 24: DLDP CONFIGURATION COMMANDS
Field Description
The port number with DLDP Number of the DLDP-enabled ports on device
interface GigabitEthernet2/0/1 Port type and port number
dldp port state DLDP state of a port
dldp link state DLDP link state
The neighbor number of the port Number of the neighbor ports
neighbor mac address MAC address of a neighbor port
neighbor port index Neighbor port index
neighbor state Neighbor state (two way or unknown)
neighbor aged time Neighbor aging time
dldp
Parameter None
Use the dldp enable command to enable DLDP globally on all optical ports of the
switch.
Use the dldp disable command to disable DLDP globally on all optical ports of
the switch.
Use the dldp enable command to enable DLDP on the current port.
Use the dldp disable command to disable DLDP on the current port.
n When you use the dldp enable/dldp disable commands in system view to
enable/disable DLDP globally on all optical ports of the switch, these commands
are only valid for the existing optical ports on the device, however, they are not
valid for those added subsequently.
dldp authentication-mode
simple: Sets the authentication mode with the peer port to plain text.
md5: Specifies the mode of authentication with the peer port to MD5.
Description Use the dldp authentication-mode command to set the DLDP authentication
mode and password for the ports of the local and peer devices.
n Note that:
When you configure the DLDP authentication mode and authentication password,
make sure the same DLDP authentication mode and password are set for the ports
connecting the local and peer devices. Otherwise, DLDP authentication fails. DLDP
cannot work when DLDP authentication fails.
Example # Enable DLDP on the ports connecting two devices. Plaintext authentication is
performed with the password password1.
■ Configure 3Com A:
<SW7750A> system-view
System View: return to User View with Ctrl+Z.
[SW7750A] dldp authentication-mode simple password1
■ Configure 3Com B:
<SW7750B> system-view
System View: return to User View with Ctrl+Z.
[SW7750B] dldp authentication-mode simple password1
dldp interval
Parameter Integer: Interval of sending DLDP packets, in the range of 1 seconds to 100
seconds. It is 5 seconds by default.
Description Use the dldp interval command to set the interval of sending advertisement
packets when all the DLDP-enabled ports are in the Advertisement status.
Use the undo dldp interval command to restore the interval to the default value
5 seconds.
n Note that:
■ The interval you define is applicable to all DLDP-enabled ports.
■ The interval must be shorter than one-third of the STP convergence time. If too
long an interval is set, an STP loop may occur before DLDP shuts down
unidirectional links. On the contrary, if too short an interval is set, network
traffic increases, and port bandwidth is reduced. Generally, the STP
convergence time is 30 seconds.
■ For the dldp interval integer command, make sure that the same interval for
transmitting advertisement packets is set on the ports used to connected both
devices; otherwise DLDP will not operate properly.
Example # Set the interval of sending advertisement packets to 20 seconds for all the
DLDP-enabled ports.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dldp interval 20
dldp reset
Parameter None
Use the dldp reset command to reset the DLDP status of all the ports disabled by
DLDP.
Use the dldp reset command to reset the DLDP status of the current port
disabled by DLDP.
After the dldp reset command is executed, the DLDP status of these ports
changes from disable to active and DLDP restarts to probe the link status of the
fiber cables or copper twisted pairs.
Example # Reset the DLDP status of all the ports disabled by DLDP.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dldp reset
dldp unidirectional-shutdown
Parameter auto: Disables the corresponding port automatically when DLDP detects a
unidirectional link.
manual: Prompts the user to disable the corresponding port manually instead of
disabling the port automatically when DLDP detects an unidirectional link. It stops
the DLDP packet sending/receiving on the port at the same time.
Description Use the dldp unidirectional-shutdown command to set the DLDP handling
mode when a unidirectional link is found.
By default, the handling mode of DLDP after unidirectional links are detected is
auto.
dldp work-mode
Parameter enhance: Configures DLDP to work in enhanced mode. In this mode, DLDP
probes actively whether neighbors exist when neighbor tables are aging.
normal: Configures DLDP to work in normal mode. In this mode, DLDP does not
probe actively whether neighbors exist when neighbor tables are aging.
Description Use the dldp work-mode command to set the DLDP operating mode.
Use the undo dldp work-mode command to restore the default DLDP
operating mode.
dldp delaydown-timer
Parameter delaydown-time: Delaydown timer to be set (in seconds). This argument ranges
from 1 to 5. By default, the delaydown timer expires after 1 second it is triggered.
Description Use the dldp delaydown-timer command to set the delaydown timer.
n This chapter describes the management of static and dynamic MAC address
entries. For information on the management of multicast MAC address entries,
refer to “Static Multicast MAC Address Table Configuration Commands” on page
523.
bridgemactocpu
Parameter enable: Enables the packets to be passed to the CPU for processing.
disable: Disables the packets from being passed to the CPU for processing.
Description Use the bridgemactocpu command to set whether the packets with destination
MAC address as the bridge MAC address of the switch will be passed to the CPU
for processing.
By default, the packets with destination MAC address as the bridge MAC address
of the switch are not passed to the CPU for processing.
Example # Enable the packets with destination MAC address as the bridge MAC address of
the switch to be passed to the CPU for processing.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bridgemactocpu enable
Parameter None
Description Use the display mac-address aging-time command to display the aging time
for the dynamic MAC address entries in the MAC address table.
254 CHAPTER 25: MAC ADDRESS TABLE CONFIGURATION COMMANDS
Example # Display the aging time for the dynamic MAC address entries.
<SW7750> display mac-address aging-time
Mac address aging time: 300s
The output information indicates that the aging time for the dynamic MAC
address entries is 300 seconds.
The output information indicates that dynamic MAC address entries do not age
out.
display mac-address
Parameter display-option: Option used to display specific MAC address table information, as
described in Table 36.
Table 36 Description on the display-option argument
Value Description
mac-address [ vlan vlan-id ] Displays information about a specified MAC
address entry.
{ static | dynamic } [ interface interface-type Displays information about dynamic or static
interface-number ] [ vlan vlan-id ] [ count ] address entries.
interface interface-type interface-number Displays information about the MAC address
[ vlan vlan-id ] [ count ] entries concerning a specified port.
vlan vlan-id [ count ] Displays information about the MAC address
entries concerning a specified VLAN.
count Displays the total number of the MAC
address entries maintained by the switch.
static: Displays static MAC address entries. (A static MAC address entry does not
age.)
dynamic: Displays dynamic MAC address entries. (A dynamic MAC address entry
ages with time.)
count: Displays only the total number of the MAC address entries.
Description Use the display mac-address command to display information about MAC
address entries in a MAC address table, including: MAC address, VLAN and port
corresponding to the MAC address, the type (static or dynamic) of a MAC address
entry, aging time and so on.
Field Description
MAC ADDR MAC address
VLAN ID ID of the VLAN to which the network device identified by the MAC address
belongs
STATE The state of the MAC address. The value of this field can be "Static",
"Learned", and so on.
PORT INDEX Port index (including port type and port number)
AGING TIME(s) Indicates whether a MAC address entry is aging
Parameter slot-number: Number of the module slot for which MAC address learning on
HiGig ports is to be enabled/disabled.
256 CHAPTER 25: MAC ADDRESS TABLE CONFIGURATION COMMANDS
Description Use the higig-port mac-learning disable command to disable the HiGig ports
from learning MAC addresses.
Use the undo higig-port mac-learning disable command to enable the HiGig
ports to learn MAC addresses.
Example # Disable the HiGig ports on the module in slot 3 from learning MAC addresses.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] higig-port mac-learning disable 3
mac-address
Parameter static: Specifies that the MAC address entry to be added/updated is of static type.
Value Description
{ static | dynamic } interface interface-type Removes the static or dynamic MAC address
interface-number entries concerning a specified port.
{ static | dynamic } vlan vlan-id Removes the static or dynamic MAC address
entries concerning a specified VLAN.
{ static | dynamic } mac-address [ interface Removes a specified static or dynamic MAC
interface-type interface-number ] vlan address entry.
vlan-id
mac-address learning synchronization 257
Value Description
interface interface-type interface-number Removes all the MAC address entries
concerning a specified port.
vlan vlan-id Removes all the MAC address entries
concerning a specified VLAN.
mac-address [ interface interface-type Removes a specified MAC address entry.
interface-number ] vlan vlan-id
Use the undo mac-address command to remove one or more MAC address
entries.
If the MAC address you input in the mac-address command already exists in the
MAC address table, the system will modify the attributes of the corresponding
MAC address entry according to your settings in the command.
You can remove all MAC address entries (unicast MAC addresses only) concerning
a specific port, or remove a specific type of MAC address entries, such as the
addresses learnt by the system and dynamic or static MAC address entries
configured.
Example # Configure a static MAC address entry with the following settings:
■ MAC address: 000f-e201-0101
■ Outbound port: Ethernet2/0/1 port
■ Ethernet2/0/1 port belongs to VLAN 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mac-address static 000f-e201-0101 interface Ethernet 2/0/1 vlan 2
Parameter None
Parameter None
Description Use the mac-address mac-learning disable command to disable the current
port from learning MAC addresses.
mac-address max-mac-count
Parameter count: Maximum number of MAC addresses a port can learn. This argument
ranges from 0 to 16384. A value of 0 disables the port from learning MAC
addresses.
Description Use the mac-address max-mac-count command to set the maximum number
of MAC addresses an Ethernet port can learn.
mac-address timer 259
By default, the number of MAC addresses an Ethernet port can learn is not
limited.
When you use the mac-address max-mac-count command, the port stops
learning MAC addresses after the number of MAC addresses it learned reaches
the value of the count argument you provided. You can use the undo
mac-address max-mac-count command to cancel this limit so that the port can
learn an unlimited number of MAC addresses, which is the default setting.
Example # Set the maximum number of MAC addresses Ethernet2/0/3 port can learn to
600.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/3
[SW7750-Ethernet2/0/3] mac-address max-mac-count 600
mac-address timer
Parameter aging age: Specifies the aging time (in seconds) for layer 2 dynamic MAC address
entries. The age argument ranges from 10 to 1000000 and defaults to 300.
Description Use the mac-address timer command to set the aging time for dynamic MAC
address entries.
Use the undo mac-address timer aging command to restore the default aging
time.
Set the aging time for dynamic MAC address entries as required but ensure that
the aging time does not decrease the layer 2 packet forwarding performance of
the switch.
■ If the aging time is too short, the MAC address entries that are still valid may be
removed. Upon receiving a packet destined for a MAC address that is already
removed, the switch broadcasts the packet through all its ports in the VLAN
which the packet belongs to. This decreases the operating performance of the
switch.
260 CHAPTER 25: MAC ADDRESS TABLE CONFIGURATION COMMANDS
■ If the aging time is too long, MAC address entries may still exist even if they
turn invalid. This causes the switch to be unable to update its MAC address
table in time. In this case, the MAC address table cannot reflect the position
changes of network devices in time.
Example # Set the aging time for MAC address entries to 500 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mac-address timer aging 500
CENTRALIZED MAC ADDRESS
26 AUTHENTICATION CONFIGURATION
COMMANDS
display mac-authentication
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Example # Display the global information about centralized MAC address authentication.
<SW7750> display mac-authentication
Mac address authentication is Enabled.
Mac authentication re-authenticate is Disabled.
Authentication mode is UsernameAsMacAddress
Fixed username:mac
Fixed password:not configured
Offline detect period is 300s
Quiet period is 60s.
Server response timeout value is 100s
Mac-reauthenticate period is 1800s.
Max allowed user number is 4096
Current user number amounts to 0
Current domain: not configured, use default domain
Silent Mac User info:
MAC ADDR From Port Port Index
GigabitEthernet2/0/1 is link-down
MAC address authentication is Disabled
Authenticate success: 0, failed: 0
Current online user number is 0
262 CHAPTER 26: CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION COMMANDS
Field Description
Mac address authentication is Enabled Centralized MAC address authentication is
enabled.
Mac authentication re-authenticate is Disabled Centralized MAC address re-authentication
is disabled.
Authentication mode Centralized MAC address authentication
mode. The default is the MAC address
mode.
Fixed username User name used in the fixed mode, which
defaults to mac.
Fixed password Password used in the fixed mode, which is
not configured by default.
Offline detect period Offline detect timer, which sets the time
interval to check whether a user goes
offline and defaults to 300 seconds.
Quiet period Quiet timer sets the quiet period. A switch
goes through a quiet period if a user fails
to pass the MAC address authentication.
The default value is 60 seconds.
Server response timeout value Server timeout timer, which sets the
timeout time for the connection between a
switch and the RADIUS server. By default, it
is 100 seconds.
Mac-reauthenticate period Re-authentication period timer
Max allowed user number The maximum number of users supported
by the switch.
Current user number amounts to The current number of users
Current domain The current used domain. It is not
configured by default.
Silent Mac User info The information about the silent user.
When the user fails to pass MAC address
authentication because of inputting error
user name and password, the switch sets
the user to be in quiet state. During quiet
period, the switch does not process the
authentication request of this user.
GigabitEthernet2/0/1 is link-down The link connected to GigabitEthernet2/0/1
is down.
MAC address authentication is Disabled MAC address authentication is disabled on
GigabitEthernet2/0/1.
Authenticate success: 0, failed: 0 Statistics of the MAC address
authentications performed on the port,
including the numbers of successful and
failed authentication operations.
Current online user number The number of the users current access the
network through the port
MAC ADDR Peer MAC address
mac-authentication 263
Field Description
Authenticate state The state of the users accessing the
network through the port, which can be:
■ MAC_AUTHENTICATOR_CONNECTING:
Connecting
■ MAC_AUTHENTICATOR_SUCCESS:
Authentication passed
■ MAC_AUTHENTICATOR_FAILURE: Fail
to pass authentication
■ MAC_AUTHENTICATOR_LOGOFF:
Offline
AuthIndex Index of the current MAC address with
regard to the authentication port
mac-authentication
Syntax mac-authentication
undo mac-authentication
Parameter None
mac-authentication interface
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges.
Parameter usernameformat: Specifies the input format of the username and password.
By default, the MAC address mode is adopted for the centralized MAC address
authentication.
Example # Specify centralized MAC address authentication mode as MAC address, using
hyphened MAC addresses as the usernames and passwords.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mac-authentication authmode usernameasmacaddress usernamefo
rmat with-hyphen
Parameter None
mac-authentication authpassword
mac-authentication authusername
By default, the user name used in MAC address authentication (in the fixed mode)
is mac.
mac-authentication domain
Parameter isp-name: ISP domain name, a string comprising up to 24 characters. Note that
this argument cannot be null and cannot contain these characters: "/", ":", "*",
"?", "<", and ">".
Description Use the mac-authentication domain command to configure an ISP domain for
centralized MAC address authentication.
Example # Configure the domain for centralized MAC address authentication to be Cams.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mac-authentication domain Cams
Parameter None
c CAUTION: You must enable MAC address authentication globally and on a port
before you can enable the MAC address regular re-authentication function.
268 CHAPTER 26: CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION COMMANDS
c CAUTION:
■ For a user with the specified MAC address, each MAC address
re-authentication configuration will trigger a re-authentication. If the
re-authentication succeeds, the user will be authorized; otherwise, the user will
be made offline.
■ When you configure to re-authenticate a specified MAC address, if the MAC
address has failed the MAC address authentication, the re-authentication
operation will be ignored.
mac-authentication timer
Parameter offline-detect-value: Offline detect timer (in seconds) setting. This argument
ranges from 1 to 65,535 and defaults to 300. The offline detect timer sets the
time interval for a switch to test whether a user goes offline.
reset mac-authentication 269
quiet-value: Quiet timer (in seconds) setting. This argument ranges from 1 to
3,600 and defaults to 60. After a user fails to pass the authentication performed
by a switch, the switch quiets for a specific period (the quiet period) before it
authenticates the user again.
Description Use the mac-authentication timer command to configure the timers used in
centralized MAC address authentication.
reset mac-authentication
Parameter interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
interface-type is the port type, interface-number is the port number, and &<1-10>
means you can provide up to 10 ports/port ranges.
Description Use the reset mac-authentication command to clear the centralized MAC
address authentication statistics. If you execute this command with the interface
keyword specified, the centralized MAC address authentication statistics of the
specified port is cleared. If the keyword is not specified, the command clears the
global centralized MAC address authentication statistics.
active region-configuration
Parameter None
This command causes the switch to operate with the new MST region-related
settings you configured and spanning trees to be regenerated.
check region-configuration
Parameter None
272 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Description Use the check region-configuration command to display the current MST
region configuration, including region name, revision level, and VLAN mapping
table.
MSTP-enabled switches are in the same region only when they have the same MST
region-related configuration. A switch cannot be in a respected region if any one
of the above three MST region-related settings does not be consistent with that of
another switch in the region.
You can use this command to find the MST region the switch currently belongs to
or check to see whether or not the MST region-related configuration is correct.
Field Description
Format selector The selector specified by MSTP
Region name The name of the MST region
Revision level The revision level of the MST region
Instance Vlans Mapped Spanning tree instance-to-VLAN mappings in the MST region
display stp
Parameter instance-id: ID of the spanning tree instance ranging from 0 to 16. A value of 0
specifies the common and internal spanning tree (CIST).
interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
display stp 273
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
brief: Displays only port state and protection measures taken on the port.
Description Use the display stp command to display the state and statistical information
about one or all spanning trees.
The state and statistical information about MSTP can be used to analyze and
maintain the topology of a network. It also can be used to make MSTP operating
properly.
■ If neither spanning tree instance nor port list is specified, the command displays
spanning tree information about all spanning tree instances on all ports in
order of port number.
■ If only a spanning tree instance is specified, the command displays information
about the specified spanning tree instance on all ports in the order of the port
number.
■ If only a port list is specified, the command displays information about all
spanning tree instances on these ports in the order of the port number.
■ If both a spanning tree instance and a port list are specified, the command
displays spanning tree information about the specified spanning tree instance
and the specified ports in order of spanning tree instance ID.
■ Global CIST parameters: Protocol operation mode, switch priority in the CIST
instance, MAC address, Hello time, Max age, Forward delay, Max hops, the
common root of the CIST, the external path cost for the switch to reach the
CIST common root, region root, the internal path cost for the switch to reach
the region root, CIST root port of the switch, the state of the BPDU (bridge
protocol data unit) guard function (enabled or disabled), and the state of the
digest snooping feature (enabled or disabled).
■ CIST port parameters: Port protocol, port role, port priority, path cost,
designated bridge, designated port, edge port/non-edge port, whether or not
the link on the port is a point-to-point link, the maximum transmitting speed,
type of the enabled guard function, state of the digest snooping feature
(enabled or disabled), VLAN mappings, Hello time, Max age, Forward delay,
Message-age time, and Remaining-hops.
■ Global MSTI parameters: MSTI instance ID, bridge priority of the instance,
region root, internal path cost, MSTI root port, and master bridge.
■ MSTI port parameters: Port state, role, priority, path cost, designated bridge,
designated port, and Remaining Hops.
The statistical information includes: the numbers of the TCN BPDUs, the
configuration BPDUs, the RST BPDUs, and the MST BPDUs transmitted/received by
each port.
274 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Example # Display the state and statistical information about a spanning tree.
<SW7750> display stp instance 0 interface Ethernet 1/0/1 to Ethernet 1/0/4 brief
MSTID Port Role STP State Protection
0 Ethernet1/0/1 ALTE DISCARDING LOOP
0 Ethernet1/0/2 DESI FORWARDING NONE
0 Ethernet1/0/3 DESI FORWARDING NONE
0 Ethernet1/0/4 DESI FORWARDING NONE
Table 41 Field descriptions of the display stp command
Field Description
MSTID ID of a spanning tree instance in the MST region
Port Port index
Role Port role
STP State STP state on the port, which can be forwarding and discarding.
Protection Protection type of the port
Parameter None
Description Use the display stp abnormalport command to display the ports that are
blocked by STP guard functions.
Example # Display the ports that are blocked by STP guard functions.
<SW7750> display stp abnormalport
MSTID Port Block Reason
--------- -------------------- -------------
0 Ethernet1/0/20 Root-Protection
1 Ethernet1/0/21 Loop-Protection
Table 42 Field descriptions of the display stp abnormalport command
Field Description
MSTID MST instance ID in the MST region
Port Port number
Block Reason The function blocking the port
Parameter None
Description Use the display stp portdown command to display the ports that are shut
down by STP guard functions.
Example # Display the ports that are shut down by STP guard functions.
<SW7750> display stp portdown
Port Down Reason
--------------------- ------------
Ethernet1/0/20 BPDU-Protection
Table 43 Field descriptions of the display stp portdown command
Field Description
Port Port number
Down Reason The function shutting down the port
Parameter None
Description Use the display stp region-configuration command to display the activated
MST region configuration, including the region name, region revision level, and
spanning tree instance-to-VLAN mappings configured for the switch.
Field Description
Format selector The selector specified by MSTP
Region name The name of the MST region
Revision level The revision level of the MST region
Instance Vlans Mapped Spanning tree instance-to-VLAN mappings in the MST region
276 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Parameter None
Description Use the display stp root command to display information about the root ports
in the MSTP region where the switch resides.
Example # Display information about the root ports in the MSTP region where the switch
resides.
<SW7750> display stp root
MSTID Root Bridge ID ExtPathCost IntPathCost Root Port
-------- -------------------- ------------ ------------- -----------
0 32768.00e0-fc53-d908 0 200 Ethernet1/0/18
Table 45 Field descriptions of the display stp root command
Field Description
MSTID MST instance ID in the MST region
Root Bridge ID ID of the root bridge
ExtPathCost Cost of the external path from the switch to the root bridge
IntPathCost Cost of the internal path from the switch to the root bridge
Root Port Root port
Parameter None
Description Use the display stp root command to display information about the root ports
in the MSTP region where the switch resides.
Example # Display information about the root ports in the MSTP region where the switch
resides.
<SW7750> display stp root
MSTID Root Bridge ID ExtPathCost IntPathCost Root Port
-------- -------------------- ------------ ------------- -----------
0 32768.00e0-fc53-d908 0 200 Ethernet1/0/18
Table 46 Field descriptions of the display stp root command
Field Description
MSTID MST instance ID in the MST region
instance 277
Field Description
Root Bridge ID ID of the root bridge
ExtPathCost Cost of the external path from the switch to the root bridge
IntPathCost Cost of the internal path from the switch to the root bridge
Root Port Root port
instance
vlan-list: List of VLANs. You need to provide this argument in the form of vlan-list
= { vlan-id [ to vlan-id ] }&<1-10>, where &<1-10> means that you can provide up
to 10 VLAN IDs/VLAN ID ranges for this argument. Normally, a VLAN ID can be a
number ranging from 1 to 4094. VLANs with their IDs beyond this range (if the
switch supports this kind VLAN IDs), such as VLAN 4095, VLAN 4096, can only be
mapped to the CIST (spanning tree instance 0).
Description Use the instance command to map specified VLANs to a specified spanning tree
instance.
Use the undo instance command to remove the mappings from the specified
VLANs to the specified spanning tree instance and remap the specified VLANs to
the CIST (spanning tree instance 0). If you specify no VLAN in the undo instance
command, all VLANs that are mapped to the specified spanning tree instance are
remapped to the CIST.
Note that a VLAN cannot be mapped to multiple spanning tree instances at the
same time. A VLAN-to-spanning tree instance mapping is automatically removed if
you map the VLAN to another spanning tree instance.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp region-configuration
[SW7750-mst-region] instance 1 vlan 2
region-name
undo region-name
Parameter name: MST region name to be set for the switch, a string of 1 to 32 characters.
Description Use the region-name command to set an MST region name for a switch.
Use the undo region-name command to revert to the default MST region name.
MST region name, along with VLAN mapping table and MSTP revision level,
determines the MST region which a switch belongs to.
reset stp
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the reset stp command to clear spanning tree-related statistics on Ethernet
ports.
revision-level 279
The spanning tree statistics include the numbers of the TCN BPDUs, configuration
BPDUs, RST BPDUs, and MST BPDUs sent/received through one or more specified
ports or all ports (note that STP BPDUs and TCN BPDUs are counted only for CISTs.)
This command clears the spanning tree-related statistics on specified ports if you
specify the interface-list argument. If you do not specify the interface-list
argument, this command clears the spanning tree-related statistics on all ports.
revision-level
undo revision-level
Parameter level: MSTP revision level to be set for the switch. This argument ranges from 0 to
75,535.
Description Use the revision-level command to set the MSTP revision level for a switch.
Use the undo revision-level command to revert to the default revision level.
MSTP revision level, along with MST region name and VLAN mapping table,
determines the MST region which a switch belongs to.
stp
undo stp
280 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Use the undo stp command to revert to the default MSTP state globally or on a
port.
After MSTP is enabled, the actual operation mode, which can be STP-compatible
mode, RSTP-compatible mode, and MSTP mode, is determined by the protocol
mode configured by users. A switch becomes a transparent bridge if MSTP is
disabled.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet 1/0/1
[SW7750-Ethernet1/0/1] stp disable
stp bpdu-protection
Parameter None
Description Use the stp bpdu-protection command to enable the BPDU guard function.
stp bridge-diameter 281
Use the undo stp bpdu-protection command to revert to the default state of
the BPDU guard function.
Normally, the access ports of the devices operating on the access layer directly
connect to terminals (such as PCs) or file servers. These ports are usually
configured as edge ports to achieve rapid transition. But they resume non-edge
ports automatically upon receiving configuration BPDUs, which causes spanning
trees regeneration and network topology jitter.
Normally, no configuration BPDU will reach edge ports. But malicious users can
attack a network by sending configuration BPDUs deliberately to edge ports to
cause network jitter. You can prevent this type of attacks by utilizing the BPDU
guard function. With this function enabled on a switch, the switch shuts down the
edge ports that receive configuration BPDUs and then reports these cases to the
administrator. If a port is shut down, only the administrator can restore it.
stp bridge-diameter
Parameter bridgenum: Network diameter to be set for a switched network. This argument
ranges from 2 to 7.
Description Use the stp bridge-diameter command to set the network diameter of a
switched network. The network diameter of a switched network is represented by
the maximum possible number of switches between any two terminals in a
switched network.
Use the undo stp bridge-diameter command to revert to the default network
diameter.
By default, the maximum number of switches between any two terminal devices in
the switched network is 7.
After you configure the network diameter of a switched network, MSTP adjusts its
Hello time, Forward delay, and Max age settings accordingly. With the network
diameter set to 7 (the default), the three time-relate settings, Hello time, Forward
delay, and Max age, are set to their defaults as well.
The stp bridge-diameter command only applies to CIST; it is invalid for MSTIs.
282 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Related command: stp timer forward-delay, stp timer hello, and stp timer max-age.
stp config-digest-snooping
Parameter None
Description Use the stp config-digest-snooping command to enable the digest snooping
feature.
According to IEEE 802.1s, two connected switches can interwork with each other
through MSTIs in an MST region only when the two switches have the same MST
region-related configuration. With MSTP employed, interconnected switches
determine whether or not they are in the same MST region by checking the
configuration IDs of the BPDUs between them. (A configuration ID contains
information such as region ID and configuration digest.)
As some partners’ switches adopt proprietary spanning tree protocols, they cannot
interwork with other switches in an MST region even if they are configured with
the same MST region-related settings as other switches in the MST region.
n ■ The digest snooping feature is needed only when your Switch 7750 is
connected to partner’s proprietary protocol-adopted switches.
■ To enable the digest snooping feature successfully, you must first enable it on
all the switch ports that connect to partner’s proprietary protocol-adopted
switches and then enable it globally.
stp cost 283
stp cost
cost: Path cost to be set for the port. This argument ranges from 1 to 200,000.
Description Use the stp cost command to set the path cost of the current port in a specified
spanning tree instance.
Use the undo stp cost command to revert to the default path cost of the current
port in the specified spanning tree instance.
The path costs of a port in spanning tree instances affect the roles of the ports in
the spanning tree instances. By configuring different path costs for the same port
in different MSTIs, you can make flows of different VLANs traveling along different
physical links, so as to achieve VLAN-based load balancing. Changing the path
cost of a port in a spanning tree instance may change the role of the port in the
instance and put it in state transition.
284 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Example # Set the path cost of Ethernet1/0/3 port in spanning tree instance 2 to 200.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet1/0/3
[SW7750-Ethernet1/0/3] stp instance 2 cost 200
stp edged-port
Description Use the stp edged-port enable command to configure the current Ethernet
port as an edge port.
Use the stp edged-port disable command to configure the current Ethernet
port as a non-edge port.
Use the undo stp edged-port command to restore the current Ethernet port to
its default state.
Normally, configuration BPDUs cannot reach an edge port because the port is not
connected to another switch. But when the BPDU guard function is disabled on an
edge port, configuration BPDUs sent deliberately by a malicious user may reach
the port. If an edge port receives a BPDU, it turns to a non-edge port.
c CAUTION: Among loop guard function, root guard function and edge port
setting, only one can be valid on a port at one time.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface ethernet1/0/1
[SW7750-Ethernet1/0/1] stp edged-port disable
stp interface
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface command to enable or disable MSTP on specified ports in
system view.
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the format of interface-list ={ interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface config-digest-snooping command to enable the digest
snooping feature.
According to IEEE 802.1s, two interconnected MSTP switches can interwork with
each other through MSTIs in an MST region only when the two switches have the
same MST region-related configuration. Interconnected MSTP switches determine
whether or not they are in the same MST region by checking the configuration IDs
of the BPDUs between them. (A configuration ID contains information such as
region ID and configuration digest.)
As some partners’ switches adopt proprietary spanning tree protocols, they cannot
interwork with other switches in an MST region even if they are configured with
the same MST region-related settings as other switches in the MST region.
n ■ The digest snooping feature is needed only when your Switch 7750 is
connected to partner’s proprietary protocol-adopted switches.
■ To enable the digest snooping feature successfully, you must first enable it on
all the ports of your Switch 7750 that are connected to partner’s proprietary
protocol-adopted switches and then enable it globally.
■ To enable the digest snooping feature, the interconnected switches must be
configured with exactly the same MST region-related configuration.
■ The digest snooping feature must be enabled on all the ports of your Switch
7750 that are connected to partners’ proprietary protocol-adopted switches in
the same MST region.
■ With the digest snooping feature enabled, the VLAN-to-MSTI mapping cannot
be modified.
■ The digest snooping feature is not applicable to MST region edge ports.
Example # Enable the digest snooping feature on Ethernet1/0/1 port in system view.
stp interface cost 287
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp interface Ethernet 1/0/1 config-digest-snooping
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
cost: Port path cost to be set. This argument ranges from 1 to 200,000,000.
Description Use the stp interface cost command to set the path cost(s) of the specified
port(s) in a specified spanning tree instance in system view.
Use the undo stp interface cost command to revert to the default path cost(s)
of the specified port(s) in the specified spanning tree instance in system view.
The path costs of a port in spanning tree instances affect the roles of the ports in
the spanning tree instances. By configuring different path costs for the same port
in different MSTIs, you can make flows of different VLANs traveling along different
physical links, so as to achieve VLAN-based load balancing. Changing the path
cost of a port in a spanning tree instance may change the role of the port in the
instance and put it in state transition.
The default port path cost differs with port speed. Refer to Table 47 for details.
Example # Set the path cost of Ethernet1/0/3 port in spanning tree instance 2 to 400 in
system view.
288 CHAPTER 27: MSTP CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp instance 2 interface Ethernet 1/0/3 cost 400
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface edged-port enable command to configure the specified
Ethernet port(s) as edge ports in system view.
Use the stp interface edged-port disable command to configure the specified
Ethernet port(s) as non-edge ports in system view.
Use the undo stp interface edged-port command to restore the specified
Ethernet port(s) to their default states.
Normally, configuration BPDUs cannot reach an edge port because the port is not
connected to another switch. But when the BPDU guard function is disabled on an
edge port, configuration BPDUs sent deliberately by a malicious user may reach
the port. If an edge port receives a BPDU, it turns to a non-edge port.
c CAUTION: Among loop guard function, root guard function and edge port
setting, only one can be valid on a port at one time.
stp interface loop-protection 289
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface loop-protection command to enable the loop guard
function in system view.
Use the undo stp interface loop-protection command to revert to the default
state of the loop guard function in system view.
c CAUTION: Among loop guard function, root guard function and edge port
setting, only one can be valid on the same port.
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
290 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Description Use the stp interface mcheck command to perform the mCheck operation on
specified port(s) in system view.
Example # Perform the mCheck operation for Ethernet1/0/3 port in system view.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp interface Ethernet 1/0/3 mcheck
Description Use the stp interface no-agreement-check command to enable the rapid
transition feature on a specified port.
Some manufactures’ switches adopt proprietary spanning tree protocols that are
similar to RSTP in the way to implement rapid transition on designated ports.
When a switch of this kind operates as the upstream switch of a Switch 7750
running MSTP, the upstream designated port fails to change their states rapidly.
The rapid transition feature is developed to avoid this case. When a Switch 7750
running MSTP is connected in the upstream direction to a manufacture’s switch
running proprietary spanning tree protocol, you can enable the rapid transition
feature on the ports of the Switch 7750 operating as the downstream switch.
Among these ports, those operating as the root ports will then send agreement
packets to their upstream ports after they receive proposal packets from the
upstream designated ports, instead of waiting for agreement packets from the
upstream switch. This enables designated ports of the upstream switch to change
their states rapidly.
stp interface point-to-point 291
n ■ The rapid transition feature can be enabled on root ports or alternate ports
only.
■ If you configure the rapid transition feature on the designated port, the feature
does not take effect on the port.
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
force-true: Specifies that the links connected to the specified Ethernet ports are
point-to-point links.
force-false: Specifies that the links connected to the specified Ethernet ports are
not point-to-point links.
Description Use the stp interface point-to-point command to specify whether the links
connected to the specified Ethernet ports are point-to-point links in system view.
Use the undo stp interface point-to-point command to restore the links
connected to the specified ports to their default link types, which are
automatically determined by MSTP.
You are recommended to let MSTP automatically determine the link types.
These two commands only apply to CIST and MSTIs. If you configure the link to
which a port is connected to be a point-to-point link (or a non-point-to-point link),
the configuration applies to all spanning tree instances (that is, the port is
configured to connect to a point-to-point link (or a non-point-to-point link) in all
spanning tree instances). If the actual physical link is not a point-to-point link and
you configure the link to which the port is connected to be a point-to-point link,
loops may temporarily occur.
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
priority: Port priority to be set. This argument ranges from 0 to 240 and must be a
multiple of 16 (such as 0, 16, and 32). The default port priority of a port in any
spanning tree instance is 128.
Description Use the stp interface port priority command to set a port priority for the
specified ports in the specified spanning tree instance.
Use the undo stp interface port priority command to restore the specified
ports to the default port priority in the specified spanning tree instance.
If you specify the instance-id argument to be 0, these two commands apply to the
port priorities on the CIST. The role a port plays in a spanning tree instance is
determined by the port priority in the instance. A port on an MSTP-enabled switch
can have different port priorities and play different roles in different MSTIs. This
enables packets of different VLANs to be forwarded along different physical paths,
stp interface root-protection 293
Example # Set the port priority of Ethernet1/0/3 port (with regard to spanning tree instance
2) to 16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp interface Ethernet 1/0/3 instance 2 port priority 16
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface root-protection command to enable the root guard
function on specified port(s).
Use the undo stp interface root-protection command to restore the root
guard function to the default state on specified port(s).
You can avoid this by utilizing the root guard function. Ports with this function
enabled can only be kept as designated ports in all spanning tree instances. When
a port of this type receives configuration BPDUs with higher priorities, it changes
to Discarding state (rather than becomes a non-designated port) and stops
forwarding packets (as if it is disconnected from the link). It resumes the normal
state if it does not receive any configuration BPDUs with higher priorities for a
specified period.
c CAUTION: Among loop guard function, root guard function and edge port
setting, only one can be valid on a port at one time.
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-type
interface-number [ to interface-type interface-number ] } &<1-10>, where
&<1-10> means that you can provide up to 10 port indexes/port index ranges for
this argument.
Description Use the stp interface transmit-limit command to set the maximum number of
configuration BPDUs each specified port can send in each Hello time.
Use the undo stp interface transmit-limit command to revert to the default
maximum number.
The larger the packetnum argument is, the more packets a port can transmit in
each Hello time. Configure the packetnum argument to a proper value to limit the
number of BPDUs a port can send in each Hello time to avoid MSTP from
occupying too much network resources when network topology jitter occur.
stp loop-protection
Parameter None
Description Use the stp loop-protection command to enable the loop guard function on
the current port.
Use the undo stp loop-protection command to restore the loop guard function
to the default state on the current port.
A switch maintains the states of the root port and other blocked ports by receiving
and processing BPDUs from the upstream switch. These BPDUs may get lost
because of network congestions and link failures. If a switch does not receive
BPDUs from the upstream switch for a certain period, the switch selects a new
root port; the original root port becomes a designated port; and the blocked ports
transit to forwarding state. This may cause loops in the network.
The loop guard function suppresses loops. With this function enabled, if link
congestions or link failures happen, a root port becomes a designated port, and
the port state becomes discarding. The blocked port also becomes designated port
and the port state becomes discarding (do not forward packets), and thereby
loops can be prevented.
stp max-hops
Parameter hops: Maximum hops to be set. This argument ranges from 1 to 40. The default
maximum hops value of an MST region is 20.
Description Use the stp max-hops command to set the maximum hops for the MST region
the current switch belongs to.
Use the undo stp max-hops command to revert to the default maximum hops.
296 CHAPTER 27: MSTP CONFIGURATION COMMANDS
The maximum hops values configured on the region roots of the CIST and MSTI in
an MST region limit the size of the MST region.
A configuration BPDU contains a field that maintains the remaining hops of the
configuration BPDU. And a switch discards the configuration BPDUs whose
remaining hops are 0. After a configuration BPDU reaches a root bridge of a
spanning tree in a MST region, the value of the remaining hops field in the
configuration BPDU is decreased by 1 every time the configuration BPDU passes a
switch. Such a mechanism disables the switches that are beyond the maximum
hops from participating in spanning tree generation, and thus limits the size of an
MST region.
With such a mechanism, the maximum hops configured on the switch operating
as the root bridge of the CIST or an MSTI in a MST region becomes the network
diameter of the spanning tree, which limits the size of the spanning tree in the
current MST region. The switches that are not root bridges in the MST region
adopt the maximum hops settings of their root bridges.
Example # Set the maximum hops of the current MST region to 35.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp max-hops 35
stp mcheck
Parameter None
Description Use the stp mcheck command to perform the mCheck operation on the current
port.
stp mode
Description Use the stp mode command to set the MSTP operation mode.
Use the undo stp mode command to revert to the default MSTP operation
mode.
Related command: stp mcheck, stp, stp interface, and stp interface mcheck.
stp no-agreement-check
Parameter None
Description Use the stp no-agreement-check command to enable the rapid transition
feature for a port.
Some manufactures’ switches adopt proprietary spanning tree protocols that are
similar to RSTP in the way to implement rapid transition on designated ports.
When a switch of this kind operates as the upstream switch of a Switch 7750
running MSTP, the upstream designated port fails to change their states rapidly.
The rapid transition feature aims to resolve this problem. When a Switch 7750
running MSTP is connected in the upstream direction to a manufacture’s switch
running proprietary spanning tree protocol, you can enable the rapid transition
feature on the ports of the Switch 7750 operating as the downstream switch.
Among these ports, those operating as the root ports will then send agreement
packets to their upstream ports after they receive proposal packets from the
upstream designated ports, instead of waiting for agreement packets from the
upstream switch. This enables designated ports of the upstream switch to change
their states rapidly.
n ■ The rapid transition feature can be enabled on root ports or alternate ports
only.
■ If you configure the rapid transition feature on the designated port, the feature
does not take effect on the port.
stp pathcost-standard
Parameter dot1d-1998: Uses the IEEE 802.1D-1998 standard to calculate the default path
costs of ports.
stp pathcost-standard 299
dot1t: Uses the IEEE 802.1t standard to calculate the default path costs of ports.
legacy: Uses the proprietary standard to calculate the default path costs of ports.
Description Use the stp pathcost-standard command to set the standard to be used to
calculate the default path costs of the links connected to the switch.
Use the undo stp pathcost-standard command to specify to use the default
standard.
By default, a switch uses the IEEE 802.1t standard to calculate the default path
costs of ports.
Standard
Transmission Operation mode defined by
speed (half-/full-duplex) 802.1D-1998 IEEE 802.1t Private
0 - 75,535 200,000,000 200,000
10 Mbps Half-duplex/Full-duplex 100 200,000 2,000
Aggregated link 2 ports 95 1,000,000 1,800
Aggregated link 3 ports 95 666,666 1,600
Aggregated link 4 ports 95 500,000 1,400
100 Mbps Half-duplex/Full-duplex 19 200,000 200
Aggregated link 2 ports 15 100,000 180
Aggregated link 3 ports 15 66,666 160
Aggregated link 4 ports 15 50,000 140
1,000 Mbps Full-duplex 4 200,000 20
Aggregated link 2 ports 3 10,000 18
Aggregated link 3 ports 3 6,666 16
Aggregated link 4 ports 3 5,000 14
10 Gbps Full-duplex 2 200,000 2
Aggregated link 2 ports 1 1,000 1
Aggregated link 3 ports 1 666 1
Aggregated link 4 ports 1 500 1
Normally, when a port operates in full-duplex mode, the corresponding path cost
is slightly less than that when the port operates in half-duplex mode.
When calculating the path cost of an aggregated link, the 802.1D-1998 standard
does not take the number of the ports on the aggregated link into account,
whereas the 802.1T standard does. The following formula is used to calculate the
path cost of an aggregated link:
Where the link transmission speed is the sum of the speeds of the unblocked ports
on the aggregated link, which is measured in 100 Kbps.
300 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Example # Configure to use the IEEE 802.1D-1998 standard to calculate the default path
costs of ports.note2
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp pathcost-standard dot1d-1998
# Configure to use the IEEE 802.1t standard to calculate the default path costs of
ports.note2
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp pathcost-standard dot1t
stp point-to-point
Parameter force-true: Specifies that the link connected to the current Ethernet port is a
point-to-point link.
force-false: Specifies that the link connected to the current Ethernet port is not a
point-to-point link.
Description Use the stp point-to-point command to specify whether the link connected to
the current Ethernet port is a point-to-point link.
Use the undo stp point-to-point command to restore the link connected to the
current Ethernet port to its default link type, which is automatically determined by
MSTP.
You are recommended to let MSTP automatically determine the link types of ports.
These two commands only apply to CISTs and MSTIs. If you configure the link to
which a port is connected is a point-to-point link (or a non-point-to-point link), the
configuration applies to all spanning tree instances (that is, the port is configured
to connect to a point-to-point link [or a non-point-to-point link] in all spanning
stp port priority 301
tree instances). If the actual physical link is not a point-to-point link and you
configure the link to which the port is connected to be a point-to-point link, loops
may temporarily occur.
Parameter instance-id: Spanning tree instance ID ranging from 0 to 16. A value of 0 specifies
the CIST.
port priority priority: Sets the port priority. The priority argument ranges from 0
to 240 and must be a multiple of 16 (such as 0, 16, and 32). The default port
priority of a port in any spanning tree instance is 128.
Description Use the stp port priority command to set the port priority of the current port in
the specified spanning tree instance.
Use the undo stp port priority command to restore the current port to the
default port priority in the specified spanning tree instance.
Example # Set the port priority of Ethernet1/0/3 port in spanning tree instance 2 to 16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet1/0/3
[SW7750-Ethernet1/0/3] stp instance 2 port priority 16
302 CHAPTER 27: MSTP CONFIGURATION COMMANDS
stp portlog
Parameter instance instance-id: Specifies a spanning tree instance ID, ranging from 0 to 16.
The value of 0 indicates the CIST.
Description Use the stp portlog command to enable log and trap message output for the
ports of a specified instance.
Executing the stp portlog command (without using the instance instance-id
parameters) will enable log and trap message output for the ports of instance 0.
Example # Enable log and trap message output for the ports of instance 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp instance 1 portlog
Parameter None
Description Use the stp portlog all command to enable log and trap message output for the
ports of all instances.
Use the undo stp portlog all command to disable this function.
By default, log and trap message output is disabled on the ports of all instances.
Example # Enable log and trap message output for the ports of all instances.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp portlog all
stp priority 303
stp priority
Parameter instance-id: Spanning tree instance ID ranging from 0 to 16. A value of 0 specifies
the CIST.
priority: Switch priority to be set. This argument ranges from 0 to 61,440 and
must be a multiple of 4,096 (such as 0, 4,096, and 8,192). There are totally 16
available switch priorities.
Description Use the stp priority command to set the priority of the switch in the specified
spanning tree instance.
Use the undo stp priority command to restore the switch to the default priority
in the specified spanning tree instance.
The priorities of switches are used for spanning tree generation. Switch priorities
are spanning tree-specific. That is, you can set different priorities for the same
switch in different spanning tree instances.
If you do not specify the instance-id argument, the two commands apply to the
CIST.
Example # Set the priority of the switch in spanning tree instance 1 to 4,096.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp instance 1 priority 4096
stp region-configuration
Parameter None
Description Use the stp region-configuration command to enter MST region view.
Use the undo stp region-configuration command to revert to the default MST
region-related settings.
304 CHAPTER 27: MSTP CONFIGURATION COMMANDS
MST region-related settings include: region name, revision level, and VLAN
mapping table. The three MST region-related settings default to:
And you can modify the three settings after entering MST region view by using the
stp region-configuration command.
Parameter instance-id: Spanning tree instance ID ranging from 0 to 16. A value of 0 specifies
the CIST.
centi-seconds: Hello time (in centiseconds) of the specified spanning tree. This
argument ranges from 100 to 1,000 and defaults to 200.
Description Use the stp root primary command to configure the current switch as the root
bridge of a specified spanning tree instance.
Use the undo stp root command to cancel the current configuration.
If you do not specify the instance-id argument, these two commands apply to the
CIST.
You can specify the current switch as the root bridge of a spanning tree instance
regardless of the priority of the switch. You can also specify the network diameter
of the switched network by using the stp root primary command. The switch will
then figure out the following three time parameters: Hello time, Forward delay,
and Max age. As the Hello time figured out by the network diameter is not always
the optimal one, you can set it manually through the hello-time centi-seconds
stp root secondary 305
parameter. Normally, you are recommended to set the network diameter and leave
the Forward delay and Max age parameters being automatically determined by
the network diameter you set.
c CAUTION:
■ You can configure only one root bridge for a spanning tree instance and can
configure one or more secondary root bridges for a spanning tree instance.
Configuring multiple root bridges for a spanning tree instance causes
unpredictable spanning tree computing results.
■ Once a switch is configured as the root bridge or a secondary root bridge, its
priority cannot be modified.
Example # Configure the current switch as the root bridge of spanning tree instance 1,
setting the network diameter of the switched network to 4, and the Hello time to
500 centiseconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp instance 1 root primary bridge-diameter 4 hello-time 50
0
Parameter instance-id: Spanning tree instance ID ranging from 0 to 16. A value of 0 specifies
the CIST.
Description Use the stp root secondary command to configure the current switch as a
secondary root bridge of a specified spanning tree instance.
Use the undo stp root command to cancel the current configuration.
If you do not specify the instance-id argument, these two commands apply to the
CIST.
306 CHAPTER 27: MSTP CONFIGURATION COMMANDS
You can configure one or more secondary root bridges for a spanning tree
instance. If the switch operating as the root bridge fails or is turned off, the
secondary root bridge with the least MAC address becomes the root bridge.
You can also specify the network diameter and the Hello time of the switch that
you are configuring as a secondary root bridge. The switch will then figures out
the other two time parameters: Forward delay and Max age. You can configure
only one root bridge for a spanning tree instance but you can configure one or
more secondary root bridges for a spanning tree instance. Once a switch is
configured as the root bridge or a secondary root bridge, its priority cannot be
modified.
Example # Configure the current switch as a secondary root bridge of spanning tree
instance 4, setting the network diameter of the switched network to 5 and the
Hello time to 300 centiseconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp instance 4 root secondary bridge-diameter 5 hello-time
300
stp root-protection
Parameter None
Description Use the stp root-protection command to enable the root guard function on the
current port.
Use the undo stp root-protection command to restore the root guard function
to the default state on the current port.
You can avoid this by utilizing the root guard function. Ports with this function
enabled can only be kept as designated ports in all spanning tree instances. When
a port of this type receives configuration BPDUs with higher priorities, it changes
to Discarding state (rather than becomes a non-designated port) and stops
forwarding packets (as if it is disconnected from the link). It resumes the normal
state if it does not receive any configuration BPDUs with higher priorities for a
specified period.
stp tc-protection 307
stp tc-protection
Parameter None
Description Use the stp tc-protection enable command to enable the TC-BPDU attack
guard function.
Use the stp tc-protection disable command to disable the TC-BPDU attack
guard function.
Normally, upon receiving a TC-BPDU, a switch removes its local MAC address table
and then updates its ARP address table based on STP instances according to the
updated MAC address table. If a malicious user forges TC-BPDUs to attack a
switch, the switch will receive a large amount of TC-BPDUs in a short period, so
that the switch will be busy in removing local MAC address tables and updating
ARP address tables, which will affect STP calculation and occupy a large amount of
network bandwidth. As a result, the CPU utilization stays high for the switch.
With the TC-BPDU attack guard function enabled, the switch performs the
operation of removing its MAC address table once upon receiving a TC-BPDU, and
triggers a timer with the period of 10 seconds at the same time. If the switch
receives more TC-BPDUs within this period, the switch can perform the operation
of removing MAC address tables for up to six times. Such a mechanism prevents
the switch from removing MAC address tables frequently and the subsequent
negative effect.
Parameter number: Upper threshold of the times for a switch to process TC-BPDUs within 10
seconds, in the range 1 to 255.
Description Use the stp tc-protection threshold command to set the upper threshold of
the times for a switch to remove its MAC address table within 10 seconds.
Normally, upon receiving a TC-BPDU, a switch removes its local MAC address table
and then updates the ARP address table based on STP instances according to the
updated MAC address table. If a malicious user forges TC-BPDUs to attack a
switch, the switch will receive a large amount of TC-BPDUs in a short period, so
that the switch will be busy in removing local MAC address tables and updating
ARP address tables, which will affect STP calculation and occupy a large amount of
network bandwidth. As a result, the CPU utilization stays high for the switch.
With the TC-BPDU attack guard function enabled, the switch performs the
operation of removing the local MAC address table only once after it receives a
TC-BPDU, and triggers a timer with the period of 10 seconds at the same time. If
the switch receives more TC-BPDUs within this period, the switch can perform the
operation of removing MAC address entries for up to six times. Such a mechanism
prevents the switch from removing MAC address tables frequently and the
subsequent negative effect.
You can use the stp tc-protection threshold command to set the upper
threshold of the times for a switch to remove its MAC address table in the period
set by the timer. If the number of received TC-BPDUs is less than the specified
upper threshold, the switch will remove its MAC address table upon receiving a
TC-BPDU. If the number of received TC-BPDUs is more than the specified upper
threshold, the switch will remove its MAC address table for the times equal to the
specified upper threshold. For example, if you set the upper threshold for the
times for the switch to remove its MAC address table to 100 in the specified
period, while the switch receives 200 TC-BPDUs in the period. In this case, the
switch removes its MAC address table for only 100 times within the period.
Example # Specify the switch to remove its MAC address table for up to five times within
10 seconds.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp tc-protection threshold 5
stp timer forward-delay 309
Parameter centi-seconds: Forward delay in centiseconds to be set. This argument ranges from
400 to 3,000 and defaults to 1,500.
Description Use the stp timer forward-delay command to set the Forward delay of the
switch.
Use the undo stp timer forward-delay command to revert to the default
Forward delay.
To prevent the occurrence of temporary loops, when a port changes its state from
discarding to forwarding, it undergoes an intermediate state and waits for a
specific period to synchronize with the remote switches. This state transition
period is determined by the Forward delay configured on the root bridge.
The Forward delay setting configured on a root bridge applies to all switches
operating in the same spanning tree instance.
As for the configuration of the three time-related parameters (that is, the Hello
time, Forward delay, and Max age parameters), the following formulas must be
met to prevent network jitter.
You are recommended to specify the network diameter of the switched network
and the Hello time by using the stp root primary or stp root secondary
command. After that, the three proper time-related parameters are automatically
determined.
Related command: stp timer hello, stp timer max-age, and stp bridge-diameter.
Parameter centi-seconds: Hello time in centiseconds to be set. This argument ranges from
100 to 1,000 and defaults to 200.
Description Use the stp timer hello command to set the Hello time of the switch.
Use the undo stp timer hello command to revert to the default Hello time.
A root bridge regularly sends out configuration BPDUs to maintain the existing
spanning trees. The Hello time is used to set the sending interval. When a switch
becomes a root bridge, it regularly sends BPDUs at the interval specified by the
hello time you have configured on it. While, the other none-root-bridge switches
listen to the BPDUs; if they do not receive a BPDU in a specific period, spanning
trees will be regenerated.
As for the configuration of the three time-related parameters (that is, the Hello
time, Forward delay, and Max age parameters), the following formulas must be
met to prevent network jitter.
You are recommended to specify the network diameter of the switched network
and the Hello time by using the stp root primary or stp root secondary
command. After that, the three proper time-related parameters are automatically
determined.
Related command: stp timer forward-delay, stp timer max-age, and stp bridge-diameter.
Parameter centi-seconds: Max age in centiseconds to be set. This argument ranges from 600
to 4,000 and defaults to 2,000.
Description Use the stp timer max-age command to set the Max age of the switch.
Use the undo stp timer max-age command to revert to the default Max age.
stp timer-factor 311
The Max age is meaningless to MSTIs. The Max age configured for the root bridge
of the CIST applies to all switches operating on the CIST, including the root bridge.
As for the configuration of the three time-related parameters (that is, the Hello
time, Forward delay, and Max age parameters), the following formulas must be
met to prevent network jitter.
You are recommended to specify the network diameter of the switched network
and the Hello time parameter by using the stp root primary or stp root
secondary command. After that, the three proper time-related parameters are
automatically determined.
Related command: stp timer forward-delay, stp timer hello, and stp bridge-diameter.
stp timer-factor
Parameter number: Hello time factor. This argument ranges from 1 to 20 and defaults to 3.
Description Use the stp timer-factor command to set the timeout time of MSTP protocol
packets on a switch in the form of a multiple of the Hello time. For example, with
the number argument set to 3, the timeout time is three times of the Hello time.
Use the undo stp timer-factor command to revert to the default Hello time
factor.
A switch regularly sends protocol packets to its neighboring devices at the interval
specified by the Hello time parameter to test the links. Normally, a switch regards
its upstream switch faulty if the former does receive any protocol packets from the
latter in a period three times of the Hello time and then initiates the spanning tree
regeneration process.
312 CHAPTER 27: MSTP CONFIGURATION COMMANDS
stp transmit-limit
Parameter packetnum: Maximum number of configuration BPDUs a port can transmit in each
Hello time. This argument ranges from 1 to 255 and defaults to 5.
Description Use the stp transmit-limit command to set the maximum number of
configuration BPDUs the current port can transmit in each Hello time.
Use the undo stp transmit-limit command to revert to the default maximum
number.
Example # Set the maximum number of configuration BPDUs that can be transmitted by
the Ethernet1/0/1 port in each Hello time to 15.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet1/0/1
[SW7750-Ethernet1/0/1] stp transmit-limit 15
vlan-mapping modulo
Description Use the vlan-mapping modulo command to map VLANs to specific spanning
tree instances.
By default, all VLANs in a network are mapped to the CIST (spanning tree instance
0).
Note that a VLAN cannot be mapped to multiple different spanning tree instances
at the same time. A VLAN-to-spanning-tree-instance mapping becomes invalid
when you map the VLAN to another spanning tree instance.
n You can map VLANs to specific spanning tree instances quickly by using the
vlan-mapping modulo modulo command. The ID of the spanning tree instance
to which a VLAN is mapped can be figured out by using the following expression:
Where (VLAN ID-1) % modulo yields the module of (VLAN ID-1) with regards to
modulo. For example, if you set the modulo argument to 16, then VLAN 1 is
mapped to spanning tree instance 1, VLAN 2 is mapped to spanning tree instance
2, ..., VLAN 16 is mapped to spanning tree instance 16, VLAN 17 is mapped to
spanning tree instance 1, and so on.
Example # Map VLANs to spanning tree instances, with the modulo being 16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] stp region-configuration
[SW7750-mst-region] vlan-mapping modulo 16
vlan-vpn tunnel
Parameter None
Description Use the vlan-vpn tunnel command to enable the BPDU Tunnel function for a
switch.
314 CHAPTER 27: MSTP CONFIGURATION COMMANDS
Use the undo vlan-vpn tunnel command to disable the BPDU Tunnel function.
n ■
■
The BPDU Tunnel function can only be enabled on devices with STP employed.
The BPDU Tunnel function can only be enabled on access ports.
■ To enable the BPDU Tunnel function, make sure the links between operator’s
networks are trunk links.
■ As the VLAN-VPN function is unavailable on ports with 802.1x, GVRP, GMRP,
STP, or NTDP employed, the BPDU Tunnel function is not applicable to these
ports.
n The words "router" covered in the following text represent routers in common
sense and Ethernet switches running a routing protocol. To improve readability,
this will not be mentioned again in this manual.
display ip routing-table
Parameter None
Description Use the display ip routing-table command to display the routing table
summary.
This command displays the summary of the routing table. Each line represents one
route, containing destination address/mask length, protocol, preference, cost, next
hop, and output interface.
This command displays only the currently used routes, that is, the optimal routes.
Field Description
Destination/Mask Destination address/mask length
Protocol Routing protocol
Pre Route preference
316 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
Field Description
Cost Route cost
Nexthop Next hop address
Interface Output interface, through which the data packets destined for the
destination network segment are sent
verbose: Displays the detailed information about active and inactive routes
filtered by the ACL rules if this keyword is provided; displays the brief information
about the active routes filtered by the ACL rules.
Description Use the display ip routing-table acl command to display the routes filtered by
the basic ACL rules.
This command is mainly used to trace and display the routing policies, that is, to
display the routes filtered by the rules based on the input basic ACL numbers.
Example # Display the brief information about the active routes filtered by the basic ACL
2000.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255
[SW7750-acl-basic-2000] rule deny source any
[SW7750-acl-basic-2000] display ip routing-table acl 2000
Routes matched by access-list 2000:
Summary count: 2
Destination/Mask Protocol Pre Cost Nexthop Interface
10.1.1.0/24 DIRECT 0 0 10.1.1.2 Vlan-interface1
10.1.1.2/32 DIRECT 0 0 127.0.0.1 InLoopBack0
# Display the detailed information about the active and inactive routes filtered by
the basic ACL 2000.
Summary count: 2
Field Description
Destination Destination address
Mask Mask
Protocol Routing protocol that detects this route
Preference Preference of the route
Nexthop Address of the next hop
Interface Outbound interface where packets to the destination network segment are
forwarded.
Vlinkindex Virtual link index
318 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
Field Description
State Route state:
ActiveU Active unicast routes
Blackhole Blackhole routes, which are similar to Reject routes except that
blackhole routes do not send ICMP unreachable messages to the
source end of the packet.
Delete The route is deleted.
Gateway Indirectly reachable routes
Hidden If you do not want to remove some routes that are not available
temporarily for some reasons (such as the configured polices,
the port being down), you can hide the route so as to restore it
later.
Holddown Holddown is a route redistribution policy adopted by some
distance-vector (D-V) routing protocols such as RIP. Through
Holddown, a routing protocol can avoid the flooding of error
routes and deliver route unreachable messages accurately. It
redistributes a certain route every a period of time regardless of
whether the actually found routes destined for the same
destination change. For more details, refer to the specific routing
protocols.
Int The route is discovered by the interior gateway protocol (IGP).
NoAdvise NoAdvise routes are nor released when the routing protocol ad
NotInstall Generally, the route with the highest preference in a routing
table is added to the core routing table and released.
Comparatively, noninstall routes cannot be added to the core
routing table, however, they may be released.
Reject Reject route do not distribute packets as other routes. Instead,
the packet that selects a reject route will be dropped, and ICMP
unreachable messages will be sent to the source end of the
packet. Reject routes are generally used in network tests.
Retain When the routes in the core routing table are removed, the
routes with the retain tag will not be removed. You can tag
some static routes as retain routes so that they can continue to
exist in the core routing table.
Static The static routes manually configured on the route are tagged as
static routes, which will not be removed from the routing table if
the router is restarted after the save command is executed.
Unicast Unicast routes
Age The time that a route exists in the routing table, expressed in the form of
hh:mm:ss.
Cost Route cost
Tag Route tag
longer-match: Specifies all the routes that lead to the destination address and
match the specified mask. If you do not specify the mask argument, those that
match the natural mask are specified.
verbose: With the verbose argument specified, this command displays the
verbose information of both the active and inactive routes. Without the argument
specified, this command only displays the summary of active routes.
Description Use the display ip routing-table ip-address command to display the routing
information of the specified destination address.
This command only displays the routes exactly matching the specified destination
address and mask.
This command displays all destination address routes matching the specified
destination address in the natural mask range.
This command displays all destination address routes matching the specified
destination address in the specified mask range.
Example # There is a corresponding route in the natural mask range. Display the summary.
<SW7750> display ip routing-table 169.0.0.0
Destination/Mask Protocol Pre Cost Nexthop Interface
169.0.0.0/16 Static 60 0 2.1.1.1 LoopBack1
# There are corresponding routes in the natural mask range. Display detailed
information.
320 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
# There is no corresponding route in the natural mask range (only the longest
matched route is displayed). Display the detailed information.
verbose: With the verbose argument provided, this command displays the
verbose information of both active and inactive routes. Without this argument
provided, this command displays the summary of active routes only.
display ip routing-table ip-prefix 321
Example # Display the routing information of destination addresses ranging from 1.1.1.0 to
2.2.2.0.
<SW7750>display ip routing-table 1.1.1.0 24 2.2.2.0 24
Routing tables:
Summary count: 3
Destination/Mask Protocol Pre Cost Nexthop Interface
1.1.1.0/24 DIRECT 0 0 1.1.1.1 Vlan-interface1
1.1.1.1/32 DIRECT 0 0 127.0.0.1 InLoopBack0
2.2.2.0/24 DIRECT 0 0 2.2.2.1 Vlan-interface2
verbose: Displays the detailed information about active and inactive routes
filtered by the ACL rules if this keyword is provided; displays the brief information
about the active routes filtered by the ACL rules.
Description Use the display ip routing-table ip-prefix command to display the routes
filtered based on the specified ip-prefix list.
This command is mainly used to track and display the routing policy. It displays the
routes filtered by the rules based on the input ip-prefix list name.
If the specified ip-prefix list does not exist, with the verbose keyword provided,
this command displays the detailed information about all active and inactive
routes; without the verbose argument keyword, this command displays the brief
information about all active routes only.
Example # Display the brief information about the active routes filtered by the IP-prefix list
named abc2, which permits the route with a prefix of 10.1.1.0 and a mask length
of 24 to 32.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip ip-prefix abc2 permit 10.1.1.0 24 less-equal 32
[SW7750] display ip routing-table ip-prefix abc2
Routes matched by ip-prefix abc2:
Summary count: 2
Destination/Mask Protocol Pre Cost Nexthop Interface
10.1.1.0/24 DIRECT 0 0 10.1.1.2 Vlan-interface1
10.1.1.2/32 DIRECT 0 0 127.0.0.1 InLoopBack0
For detailed information about the displayed information above, please refer to
Table 48.
322 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
# Display the detailed information about the active and inactive routes filtered by
the ip-prefix list named abc2.
Summary count: 2
For detailed description on the displayed information above, refer to Table 49.
Parameter protocol: You can provide one of the following values for this argument.
■ direct: Displays direct-connect route information
■ static: Displays static route information.
■ bgp: Displays BGP route information
■ isis: Displays IS-IS route information.
■ ospf: Displays OSPF route information.
■ ospf-ase: Displays OSPF ASE route information.
■ ospf-nssa: Displays OSPF NSSA route information.
■ rip: Displays RIP route information.
inactive: With this argument provided, this command displays the inactive route
information. Without this argument provided, this command displays both active
and inactive route information.
verbose: With this argument provided, this command displays the verbose route
information. Without this argument provided, this command displays route
summary only.
display ip routing-table radix 323
Description Use the display ip routing-table protocol command to display the route
information of a specific protocol.
Parameter None
Description Use the display ip routing-table radix command to display the route
information in a tree structure.
+--8+--{169.0.0.0
| +-32+--{169.1.1.1
+--0+
| | +--8+--{127.0.0.0
| | | +-32+--{127.0.0.1
| +--1+
| | +--8+--{2.0.0.0
| | | +-24+--{2.2.2.0
| | | | +-32+--{2.2.2.2
324 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
| | | +-22+
| | | +-32+--{2.2.1.1
| +--6+
| +--8+--{1.0.0.0
| +-32+--{1.1.1.1
Table 50 Field descriptions of the display ip routing-table radix command
Field Description
INET Address suite
inodes Number of nodes
routes Number of routes
Parameter None
Description Use the display ip routing-table statistics command to display the statistics
information about routes.
The statistics information about routes includes the total number of routes, the
number of routes added by protocols, the number of routes deleted by the
protocols, the number of routes which are not deleted though they are with the
deleted tag, the number of active routes, and the number of inactive routes.
Field Description
Proto Routing protocol. O_ASE stands for OSPF_ASE routes; O_NSSA stands for
OSPF NSSA routes; AGGRE stands for aggregated routes.
route Number of routes
active Number of active routes
display ip routing-table verbose 325
Field Description
added Number of routes added after the router is rebooted or the routing table is
cleared last time.
deleted Number of routes deleted (Such routes will be freed in a period of time)
Total Total number of the different kinds of routes.
Parameter None
Description Use the display ip routing-table verbose command to display the verbose
routing table information.
With the verbose argument provided, this command displays the verbose routing
table information. The descriptor describing the route state will be displayed first.
Then, the statistics of the entire routing table will be output. Finally, the verbose
description of each route will be output.
The display ip routing-table verbose command can display all current routes,
including inactive routes and invalid routes.
Table 49 describes the meaning of route status and Table 52 shows the statistics
information about the routing table.
326 CHAPTER 28: ROUTING TABLE MONITORING COMMANDS
Field Description
Holddown Number of held-down routes
Delete Number of deleted routes
Hidden Number of hidden routes
Description Use the reset ip routing-table statistics command to clear routing table
statistics.
# Display routing table statistics. Now, all route statistics are cleared.
Parameter None
Description Use the delete static-routes all command to delete all static routes.
The system will request your confirmation before it deletes all the configured static
routes.
ip route-static
mask: Mask.
preference-value: Preference level of the route, in the range from 1 to 255. The
default preference is 60.
By default, the system can obtain the subnet route directly connected to the
router. When you configure a static route, if no preference is specified for the
route, the preference defaults to 60, and if the route is not specified as reject or
blackhole, the route will be reachable by default.
■ If the destination IP address and the mask are both 0.0.0.0, what you are
configuring is a default route. All the packets that fail to find a routing entry
will be forwarded through this default route.
■ You cannot configure an interface address of the local switch as the next hop
address of a static route.
■ You can configure a different preference to implement flexible route
management policy.
ip route-static default-preference
n The word "router" covered in the following text represent routers in common
sense and Ethernet switches running a routing protocol. To improve readability,
this will not be mentioned again in this manual.
checkzero
Syntax checkzero
undo checkzero
Parameter None
Description Use the checkzero command to enable zero field check of RIP-1 packets.
According to the protocol (RFC 1058) specifications, some fields in RIP-1 packets
must be zero and these fields are called zero fields. You can use the checkzero
command to enable/disable zero field check of RIP-1 packets. When zero field
check is enabled, if an incoming RIP-1 packet has a non-zero zero field, the packet
will be rejected.
This command does not apply to RIP-2 packets because they have no zero fields.
default cost
Parameter value: Default routing cost to be set, ranging from 1 to 16. It is 1 by default.
Description Use the default cost command to set the default routing cost of imported
routes.
Use the undo default cost command to restore the default value.
If no routing cost is specified when you use the import-route command to import
routes from another routing protocol, the routes will be imported with the default
routing cost specified with the default cost command.
Example # Set the default routing cost of the routes imported from other routing protocols
to 3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] default cost 3
display rip
Parameter None
Description Use the display rip command to display the current RIP operation state and RIP
configuration.
Field Description
RIP is running RIP is active.
display rip routing 333
Field Description
Checkzero is on Zero field checking is enabled.
Default cost : 1 The default route cost is 1
Summary is on Routes are aggregated automatically
Preference : 100 The preference of RIP is 100
Traffic-share-across-interface is off Traffic is shared across equivalent routes.
Period update timer : 30 Settings of the three timers of RIP
Timeout timer : 180
Garbage-collection timer : 120
No peer router No destination address of a transmission is specified
Network :10.0.0.0 RIP is enabled on network segment 10.0.0.0
Parameter None
Description Use the display rip routing command to display RIP routing information.
Field Description
Destination/Mask Destination address/Mask
Cost Cost
NextHop Net hop address
Age The time that a route exists in the routing table, namely, the aging time
SourceGateway Gateway originating the route
Att Attribute value, which may be one of the three following values:
A Active routes
I Inactive routes
G Unreachable route in the state of garbage collection. If garbage
collection times out, and the unreachable route does not receive
update messages from the same neighbor, the route will be
removed from the routing table completely.
334 CHAPTER 30: RIP CONFIGURATION COMMANDS
filter-policy export
Parameter acl-number: Number of the basic or advanced ACL used to filter routing
information by destination address, in the range of 2,000 to 3,999.
ip-prefix-name: Name of the address ip-prefix list used to filter routing information
by destination address, containing 1 to 19 characters.
process-id: Routing protocol process ID, in the range of 1 to 65535. This argument
is valid only when the protocol is ospf.
Description Use the filter-policy export command to enable RIP to filter the routing
information to be advertised.
Use the undo filter-policy export command to cancel the filtering of the
routing information to be advertised.
Example # Configure to filter route information by ACL 2000 before the information is
advertised.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] filter-policy 2000 export
filter-policy import 335
filter-policy import
Parameter acl-number: Number of the ACL used to filter routing information by destination
address, in the range of 2,000 to 3,999.
ip-prefix-name: Name of the address prefix list used to filter routing information by
destination address, containing 1 to 19 characters.
gateway ip-prefix-name: Name of the address prefix list used to filter routing
information by the address of the neighbor router advertising the information,
containing 1 to 19 characters.
Description Use the filter-policy gateway import command to enable RIP to filter received
routing information by a specified address so that the routing information
advertised by the address can pass the filter.
Use the undo filter-policy gateway import command to disable the above
filtering.
Use the filter-policy import command to filter the received routing information.
Use the undo filter-policy import command to disable the above filtering.
You can control the range of routes received by RIP by specifying an ACL, ip-prefix
list and routing policies.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] filter-policy 2000 import
host-route
Syntax host-route
undo host-route
Parameter None
Description Use the host-route command to enable RIP to accept host routes.
In some special cases, RIP receives a great number of host routes from the same
network segment. These routes are of little help to path searching and occupy a
lot of resources. In this case, the undo host-route command can be used to reject
host routes.
import-route
Parameter protocol: Redistributes routes from the protocol, which can be direct, ospf,
ospf-ase, ospf-nssa, static, isis or bgp.
Description Use the import-route command to redistribute routes from another routing
protocol into RIP.
The import-route command is used to import the routes of another protocol with
a specified cost. RIP regards the imported routes as its own routes and transmits
them with the specified cost. This command can greatly enhance the capability of
RIP to obtain routes, thereby improving RIP performance.
If the cost value is not specified, routes will be imported with the default routing
cost (set by the default cost command, ranging from 1 to 16). If the cost of an
imported route is 16, RIP marks the route as HOLD DOWN (however, the route can
still be used to forward packets), and continues to announce the route with this
cost to other routers running RIP until the Garbage Collection timer times out (the
timeout time defaults to 120 seconds).
n Note that:
The import-route bgp command redistributes only eBGP routes, while the
import-route bgp allow-ibgp command redistributes both iBGP and eBGP
routes. Because the redistributed iBGP routes have the AS-PATH attribute
removed, routing loops may occur. Therefore, use the allow-ibgp keyword with
caution.
# Set the default cost and import OSPF routes with the default cost.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] default cost 3
[SW7750-rip] import-route ospf
network
Parameter network-address: Address of the network for which RIP is enabled/disabled. It can
be the IP network address of any interface.
After a RIP routing process is started, it is disabled on any interface. To enable RIP
routing on an interface, you must use the network command.
When the network command is used on an address, the effect is that the
interface on the network segment at this address is enabled. For example, the
results of viewing the network 129.102.1.1 with both the display
current-configuration command and the display rip command are shown as
network 129.102.0.0.
Example # Enable RIP on the interface with the network address 129.102.0.0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] network 129.102.0.0
peer
Parameter ip-address: IP address of the interface on the peer router with which routing
information needs to be exchanged, in dotted decimal notation.
Description Use the peer command to configure the destination address of the peer device
with which routing information should be exchanged in unicast mode.
By default, RIP does not send packets to any address in unicast mode.
preference 339
preference
undo preference
Parameter value: Preference level, ranging from 1 to 255. By default, the value is 100.
Description Use the preference command to configure the route preference of RIP.
Every routing protocol has its own preference. Its default value is determined by
the specific routing policy. The preferences of routing protocols will finally
determine which routing algorithm’s routes will be selected as the optimal routes
in the IP routing table. You can use this command to modify the RIP preference
manually.
reset
Syntax reset
Parameter None
Description Use the reset command to reset the system configuration parameters of RIP.
When you need to re-configure the parameters of RIP, you can use this command
to restore the default setting.
340 CHAPTER 30: RIP CONFIGURATION COMMANDS
rip
Syntax rip
undo rip
Parameter None
Description Use the rip command to enable RIP and enter RIP view.
RIP must be enabled before you can enter the RIP view and configure various RIP
global parameters. You can, however, configure the interface-based parameters
regardless of whether RIP is enabled.
n Note that the interface parameters configured previously would be invalid when
RIP is disabled.
rip authentication-mode
rfc2453: Specifies that MD5 cipher text authentication packets will use a packet
format (IETF standard) stipulated by RFC2453.
rfc2082: Specifies that MD5 cipher text authentication packets will use a packet
format stipulated by RFC2082.
key-string: MD5 cipher text authentication key. If it is input in a plain text form,
MD5 key is a character string not exceeding 16 characters. And it will be displayed
in a cipher text form in a length of 24 characters when you use the display
current-configuration command. You can also input the MD5 key in a cipher
text form with a length of 24 characters.
RIP-1 does not authenticate packets. Generally RIP authenticates packets in two
modes: plaintext authentication and MD5 ciphertext authentication. There are two
packet formats in the MD5 ciphertext authentication: one format conforms to RFC
2453 and the other format is described in RFC 2082. Routers support both
formats. You can select any format as required.
Example # Specify the interface Vlan-interface 10 to use the simple authentication with the
authentication key of aaa.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] rip version 2
[SW7750-Vlan-interface10] rip authentication-mode simple aaa
# Specify Vlan-interface 10 to use the MD5 cipher text authentication, with the
authentication key of aaa and the packet format of rfc2453.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] rip version 2
[SW7750-Vlan-interface10] rip authentication-mode md5 rfc2453 aaa
rip input
Parameter None
Description Use the rip input command to enable an interface to receive RIP packets.
Use the undo rip input command to disable an interface from receiving RIP
packets.
By default, all interfaces, except loopback interfaces, can receive RIP packets.
This command is used in cooperation with another two commands: rip output
and rip work. Functionally, rip work is equivalent to rip input & rip output. The
latter two control the receipt and the transmission of RIP packets respectively on
an interface. The former command equals the functional combination of the latter
two commands.
rip metricin
Parameter value: Additional route metric added when receiving a RIP route, ranging from 0
to 16. By default, the value is 0.
Description Use the rip metricin command to configure the additional route metric added to
the RIP routes received on an interface.
Use the undo rip metricin command to restore the default value of this
additional route metric.
Example # Set the additional route metric added to RIP routes received on Vlan-interface 10
to 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
rip metricout 343
rip metricout
Parameter value: Additional route metric added when transmitting a RIP route, ranging from
1 to 16. By default, the value is 1.
Description Use the rip metricout command to configure the additional route metric added
to the RIP routes to be transmitted on an interface.
Use the undo rip metricout command to restore the default value of this
additional route metric.
n The rip metricout configuration only applies to the RIP routes learnt by the router
and those generated by the router itself. It does not apply to any route imported
to RIP by any other routing protocol.
Example # Set the additional route metric added to the RIP routes to be transmitted on
Vlan-interface 10 to 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] rip metricout 2
rip output
Parameter None
Description Use the rip output command to enable an interface to transmit RIP packets.
Use the undo rip output command to disable an interface from transmitting RIP
packets.
344 CHAPTER 30: RIP CONFIGURATION COMMANDS
By default, all interfaces except loopback interfaces are enabled to transmit RIP
packets to the external.
This command is used in cooperation with another two commands: rip input and
rip work Functionally, rip work is equivalent to rip input & rip output. The
latter two control the receipt and the transmission of RIP packets respectively on
an interface. The former command equals the functional combination of the latter
two commands.
rip split-horizon
Parameter None
Description Use the rip split-horizon command to configure an interface to use split horizon
when transmitting RIP packets.
Use the undo rip split-horizon command to configure an interface not to use
split horizon when transmitting RIP packets.
Normally, split horizon is necessary for avoiding route loop. Only in some special
cases does split horizon need to be disabled to ensure the correct execution of the
protocol. So, disable split horizon only when necessary.
Example # Specify the interface Vlan-interface 10 not to use split horizon when processing
RIP packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] undo rip split-horizon
rip version 345
rip version
Description Use the rip version command to specify the version of RIP packets on an
interface.
Use the undo rip version command to restore the default RIP packet version on
the interface.
By default, the interface RIP version is RIP-1. RIP-1 transmits packets in broadcast
mode, while RIP-2 transmits packets in multicast mode by default.
When running RIP-1, the interface only receives and transmits RIP-1 broadcast
packets, and receives RIP-2 broadcast packets, but does not receive RIP-2 multicast
packets. When running RIP-2 in broadcast mode, the interface receives and
transmits RIP-2 broadcast packets, receives RIP-1 broadcast packets and RIP-2
multicast packets. When running RIP-2 in multicast mode, the interface only
receives and transmits RIP-2 multicast packets, receives RIP-2 broadcast packets,
but does not receive RIP-1 broadcast packets.
rip work
Parameter None
346 CHAPTER 30: RIP CONFIGURATION COMMANDS
Description Use the rip work command to enable RIP to transmit and receive RIP packets on
an interface.
Use the undo rip work command to disable RIP from transmitting and receiving
RIP packets on an interface.
This command is used in cooperation with rip input, rip output and network
commands.
Example # Disable RIP from transmitting and receiving RIP packets on the interface
Vlan-interface 10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] undo rip work
summary
Syntax summary
undo summary
Parameter None
Description Use the summary command to enable RIP-2 automatic route aggregation.
Use the undo summary command to disable RIP-2 automatic route aggregation.
Route aggregation can be used to reduce the routing traffic on the network as
well as to reduce the size of the routing table. If RIP-2 is used, route aggregation
function can be disabled with the undo summary command when it is necessary
to broadcast subnet routes.
RIP-1 does not support subnet mask. Forwarding subnet routes may cause
ambiguity. Therefore, RIP-1always uses route aggregation.
Example # Set RIP version on the interface Vlan-interface 10 as RIP-2 and disable route
aggregation.
timers 347
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] rip version 2
[SW7750-Vlan-interface10] quit
[SW7750] rip
[SW7750-rip] undo summary
timers
Parameter update-timer: Value of the Period Update timer, ranging from 1 to 3,600 seconds.
By default, it is 30 seconds.
Description Use the timers command to modify the values of the three RIP timers: Period
Update, Timeout, and Garbage-collection.
Example # Set the values of the Period Update timer and the Timeout timer of RIP to 10
seconds and 30 seconds respectively.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rip
[SW7750-rip] timers update 10 timeout 30
traffic-share-across-interface
Syntax traffic-share-across-interface
undo traffic-share-across-interface
348 CHAPTER 30: RIP CONFIGURATION COMMANDS
Parameter None
In the case the number of equal-cost routes reaches the upper limit:
With this function enabled, the newly learned equal-cost routes replace existing
ones in the routing table.
With this function disabled, the router determines whether the aging time of the
equal-cost route with the longest aging time has reached the threshold. If yes, the
router replaces this route with the equal-cost route newly learned; otherwise, the
router drops the equal-cost route newly learned.
n The words "router" covered in the following text represent routers in common
sense and Ethernet switches running a routing protocol. To improve readability,
this will not be mentioned again in this manual.
abr-summary
Description Use the abr-summary command to enable route aggregation on an area border
router (ABR).
This command is applicable to ABRs only and is used for route aggregation in an
area. It allows the ABR to transmit an aggregated route to other areas.
Example # Aggregate the routes in the two network segments, 36.42.10.0 and
36.42.110.0, in OSPF area 1 into one summary route 36.42.0.0 and transmit it to
other areas.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
350 CHAPTER 31: OSPF CONFIGURATION COMMANDS
[SW7750] ospf 1
[SW7750-ospf-1] area 1
[SW7750-ospf-1-area-0.0.0.1] network 36.42.10.0 0.0.0.255
[SW7750-ospf-1-area-0.0.0.1] network 36.42.110.0 0.0.0.255
[SW7750-ospf-1-area-0.0.0.1] abr-summary 36.42.0.0 255.255.0.0
area
Parameter area-id: ID of an OSPF area, which can be a decimal integer (ranging from 0 to
4294967295) or in the form of an IP address.
asbr-summary
tag value: Tag value, which is mainly used to control route advertisement via
route-policy. It ranges from 0 to 4294967295 and defaults to 1.
If the local router acts as both an ABR and a transit router in the NSSA, this
command aggregates Type-5 LSAs transformed from Type-7 LSAs. If the router is
not the router in the NSSA, the aggregation is disabled.
authentication-mode
undo authentication-mode
All the routers in one area must use the same authentication mode (no
authentication, simple text authentication, or MD5 cipher text authentication). If
the mode of supporting authentication is configured, all routers on the same
segment must use the same authentication key.
default cost
Parameter value: Default routing cost of external route imported by OSPF, ranging from 0 to
16,777,214. By default, its value is 1.
Description Use the default cost command to configure the default cost for OSPF to import
external routes.
Use the undo default cost command to restore the default routing cost of
external routes to its default value.
Since OSPF can import external routing information and propagate the
information to the entire autonomous system, routing cost of external routes can
influence route selection and calculation. Therefore, it is necessary to specify the
default routing cost for the protocol to import external routes.
Example # Specify the default routing cost for OSPF to import external routes as 10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] default cost 10
default interval
Parameter seconds: Default interval, in seconds, of importing external routes. It ranges from
1 to 2147483647 and defaults to 1.
Description Use the default interval command to configure the default interval for OSPF to
import external routes.
Use the undo default interval command to restore the default value of the
default interval of importing external routes.
OSPF can import external routing information and propagate it to the entire
autonomous system. However, importing routes too often greatly affects the
performance of the device. Therefore, it is necessary to specify the default interval
for the protocol to import external routes.
Example # Specify the default interval for OSPF to import external routes as 10 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] default interval 10
default limit
Parameter routes: Default limit on the number of external routes imported in a unit time. It
ranges from 200 to 2147483647 and defaults to1000.
Description Use the default limit command to configure the default limit on the number of
routes imported by OSPF in a unit time.
Use the undo default limit command to restore the default value.
OSPF can import external routing information and advertise them to the whole AS.
Importing too many external routes at a time greatly affects the performance of
the device. Therefore, it is necessary to limit the number of external routes
imported during each import interval.
Example # Specify the default limit on the number of external routes imported by OSPF in
each import interval as 200.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
354 CHAPTER 31: OSPF CONFIGURATION COMMANDS
[SW7750] ospf 1
[SW7750-ospf-1] default limit 200
default tag
Description Use the default tag command to configure the default tag of OSPF when it
imports an external route.
Use the undo default tag command to restore the default tag of OSPF when it
imports the external route.
When OSPF imports a route found by another routing protocol in the router and
uses it as the external routing information of its own autonomous system, some
additional parameters are required, including the default cost and the default tag
of the route.
Example # Set the default tag of OSPF imported external route of the autonomous system
as 10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] default tag 10
default type
Description Use the default type command to configure the default type when OSPF
imports external routes.
default-cost 355
Use the undo default type command to restore the default type when OSPF
imports external routes.
OSPF specifies the two types of external routing information. You can use the
command described in this section to specify the default type when external
routes are imported.
default-cost
undo default-cost
Parameter value: Cost value of the default route transmitted by OSPF to the STUB or NSSA
area. It ranges from 0 to 16,777,214 and defaults to 1.
Description Use the default-cost command to configure the cost of the default route
transmitted by OSPF to the STUB or NSSA area.
Use the undo default-cost command to restore the default cost of the default
route transmitted by OSPF to the STUB or NSSA area.
To configure a STUB area, you need to use the stub and default-cost commands.
You must use the stub command on all the routers connected to a STUB area to
configure the area with the STUB attribute.
Use the default-cost command to configure the cost of the default route
transmitted by an ABR to the STUB area or NSSA area.
Example # Set area 1 as the STUB area and the cost of the default route transmitted to this
STUB area to 60.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
356 CHAPTER 31: OSPF CONFIGURATION COMMANDS
[SW7750] ospf 1
[SW7750-ospf-1] area 1
[SW7750-ospf-1-area-0.0.0.1] network 20.0.0.0 0.255.255.255
[SW7750-ospf-1-area-0.0.0.1] stub
[SW7750-ospf-1-area-0.0.0.1] default-cost 60
default-route-advertise
Parameter always: Generates an ase lsa describing the default route and advertises it if the
local router is not configured with the default route. If this keyword is not
provided, the local router must be configured with the default route before it can
import the ase lsa, which generates the default route.
cost value: Specifies the cost value of this ase lsa. The value of value ranges from 0
to 16777214 and defaults to 1.
type type-value: Specifies the cost type of this ase lsa. The value of type-value
ranges from 1 to 2 and defaults 2.
Description Use the default-route-advertise command to import the default route to OSPF
route area.
The import-route command cannot import the default route. To import the
default route to the route area, the default-route-advertise command must be
used. If the local router is not configured with the default route, the keyword
always should be specified so that ase lsa of the default route is generated.
Example # The ase lsa of the default route is generated only if the local router has the
default route.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] default-route-advertise
display ospf abr-asbr 357
# The ase lsa of default route will be generated and advertised to OSPF route area
even the local router has no default route.
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf abr-asbr command to display the information about the
ABR and ASBR of OSPF.
Example # Display the information about the OSPF ABRs and ASBRs.
<SW7750> display ospf abr-asbr
OSPF Process 1 with Router ID 1.1.1.1
Routing Table to ABR and ASBR
Field Description
Destination Router ID of the ABR or ASBR
Area Area where the router is connected to the ASBR
Cost Routing overhead value of the route
Nexthop Nexthop address to the destination
Interface Local output interface
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf asbr-summary command to display the summary
information of OSPF imported route.
If you do not specify an IP address or mask, the summary information of all OSPF
imported routes will be displayed.
Summary Addresses
Total summary address count: 2
Summary Address
net : 168.10.0.0
mask : 255.254.0.0
tag : 1
status : Advertise
The Count of Route is 0
Summary Address
net : 1.1.0.0
mask : 255.255.0.0
tag : 100
status : DoNotAdvertise
The Count of Route is 0
Table 56 Field descriptions of the display ospf asbr-summary command.
Field Description
net Destination network segment
mask Mask
tag Tag
status Status information, which takes one of the following two values:
DoNotAdvertise The summary routing information to the network segment will
not be advertised.
Advertise The summary routing information to the network segment will
be advertised.
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
display ospf brief 359
Description Use the display ospf brief command to display brief OSPF information.
RouterID: 10.1.1.1
Spf-schedule-interval: 5
Routing preference: Inter/Intra: 10 External: 150
Default ASE parameters: Metric: 1 Tag: 1 Type: 2
SPF computation count: 163
Area Count: 1 Nssa Area Count: 0
Area 0.0.0.0:
Authtype: none Flags: <>
SPF scheduled: <Router Net Intra>
Interface: 110.1.1.1 (Vlan-interface110)
Cost: 11 State: DR Type: Broadcast
Priority: 11
Designated Router: 110.1.1.1
Backup Designated Router: 110.1.1.2
Timers: Hello 10, Dead 40, Poll 40, Retransmit 5, Transmit Delay 1
Table 57 Field descriptions of the display ospf brief command
Field Description
RouterID Router ID of the router
spf-schedule-interval Interval of SPF schedule
Authtype Authentication type of OSPF
Routing preference Routing preference of OSPF. The internal route of OSPF includes
intra/inter area route, and its default routing preference is 10,
while that of the external route of OSPF is 150 by default
Default ASE parameters Default ASE parameters of OSPF, including metric, type and tag
SPF computation count SPF computation count since OSPF is enabled
Area Count Areas for connection to this router
Nssa Area Count Number of NSSA areas
SPF scheduled SPF scheduled (flag)
Interface Name of interface belonging to this area
Cost Cost of routes
State State information
Type Network type of OSPF interface/the first type refers to the type of
the imported external route
Priority Priority
Designated Router IP address of designated router (DR)
Backup Designated Router IP address of backup designated router (BDR)
Timers OSPF timers, defined as follows:
Hello Interval of hello packet
Dead Interval of dead neighbors
Poll Interval of poll
Retransmit Interval of retransmitting LSA
Transmit Delay Delay time of transmitting LSA
360 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf cumulative command to display cumulative OSPF
statistics.
IO Statistics
Type Input Output
Hello 6271 9241
DB Description 9659 9915
Link-State Req 419 1426
Link-State Update 30190 51723
Link-State Ack 13642 22262
ASE: 6231 Checksum Sum: C3D40E0
LSAs originated by this router
Router: 141 Net: 5
LSAs Originated: 146 LSAs Received: 161905
Area 0.0.0.0:
Neighbors: 4 Interfaces: 5
Spf: 163 Checksum Sum 3C60A5F8
rtr: 105 net: 187 sumasb: 0 sumnet: 30500
Routing Table:
Intra Area: 8 Inter Area: 0 ASE: 5
Table 58 Field descriptions of the display ospf cumulative command
Field Description
IO Statistics Type Type of input/output OSPF packet
Input Number of received packets
Output Number of transmitted packets
ASE Number of all ASE LSAs
checksum sum Checksum of ASE LSA
LSAs originated Number of originated LSAs
received Number of received LSAs generated by other
routers
Router Number of all Router LSAs
SumNet Number of all Sumnet LSAs
SumASB Number of all SumASB LSAs
display ospf error 361
Field Description
Area Neighbors Number of neighbors in this area
Interfaces Number of interfaces in this area
Spf Number of SPF computation count in this area
rtr, net, sumasb, sumnet Number of all LSAs in this area
Routing Table Intra Area Number of intra-area routes
Inter Area Number of inter-area routes
ASE Number of external routes
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf error command to display OSPF error information.
Field Description
IP: received my own packet Received my own packet
OSPF: wrong packet type OSPF packet type error
OSPF: wrong version OSPF version error
362 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Field Description
OSPF: wrong checksum OSPF checksum error
OSPF: wrong area id OSPF area ID error
OSPF: area mismatch OSPF area mismatch
OSPF: wrong virtual link OSPF virtual link error
OSPF: wrong authentication type OSPF authentication type error
OSPF: wrong authentication key OSPF authentication key error
OSPF: too small packet OSPF packet too small
OSPF: packet size > ip length OSPF packet size exceeds IP packet length
OSPF: transmit error OSPF transmission error
OSPF: interface down OSPF interface is down, unavailable
OSPF: unknown neighbor OSPF neighbors are unknown
HELLO: netmask mismatch Network mask mismatch
HELLO: hello timer mismatch Interval of HELLO packet is mismatched
HELLO: dead timer mismatch Interval of dead neighbor packet is mismatched
HELLO: extern option mismatch Extern option of Hello packet is mismatched
HELLO: router id confusion Hello packet: Router ID confusion
HELLO: virtual neighbor unknown Hello packet: unknown virtual neighbor
HELLO: NBMA neighbor unknown Hello packet: unknown NBMA neighbor
DD: neighbor state low Database description (DD) packet: asynchronous
neighbor state
DD: unknown LSA type DD packet: unknown LSA type
DD: router id confusion DD packet: router id unidentifiable
DD: extern option mismatch DD packet: external route flag error
LS ACK: neighbor state low Link state acknowledgment (LS ACK) packet:
asynchronous neighbor state
LS ACK: wrong ack Link state acknowledgment packet: ack error
LS ACK: duplicate ack Link state acknowledgment packet: ack duplication
LS ACK: unknown LSA type Link state acknowledgment packet: unknown LSA type
LS REQ: neighbor state low Link state request (LS REQ) packet: asynchronous
neighbor state
LS REQ: empty request Link state request packet: empty request
LS REQ: wrong request Link state request packet: erroneous request
LS UPD: neighbor state low Link state update packet: asynchronous neighbor state
LS UPD: newer self-generate LSA Link state update packet: newer LSA generated by itself
LS UPD: LSA checksum wrong Link state update packet: LSA checksum error
LS UPD:received less recent LSA Link state update packet: received less recent LSA
LS UPD: unknown LSA type Link state update packet: unknown LSA type
OSPF routing: next hop not exist Next hop of OSPF routing does not exist
DD: MTU option mismatch MTU option of DD packet is mismatched
ROUTETYPE: wrong type value Route type: the value of the type is wrong
LS UPD: LSA length wrong Link state update packet: LSA length error
display ospf interface 363
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf interface command to display the OSPF interface
information. With the verbose keyword specified, detailed OSPF interface
information will be displayed.
Field Description
Cost Cost of the interface
State State of the interface state machine
Type Network type of OSPF
Priority Priority of DR for interface election
Designated Router DR on the network in which the interface resides
Backup Designated Router BDR on the network in which the interface resides
Timers OSPF timers, defined as follows:
Hello Interval of hello packet
Dead Interval of dead neighbors
Poll Interval of poll
Retransmit Interval of retransmitting LSA
Transmit Delay Delay time of transmitting LSA
364 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Syntax display ospf [ process-id [ area-id ] ] lsdb [ brief | [ asbr | ase | network | nssa |
router | summary ] [ ip-address | verbose ] [ originate-router ip-address |
self-originate ] ]
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
area-id: OSPF area ID, which can be a decimal integer (ranging from 0 to
4294967295) or in the form of an IP address.
ase: Displays the database summary about the Type-5 LSAs (AS-external-LSAs).
This argument is unavailable if you have provided a value for area-id.
network: Displays the database summary about the Type-2 LSAs (network-LSAs).
router: Displays the database summary about the Type-1 LSAs (router-LSAs).
verbose: Specifies to display detailed information about the LSAs in the database.
Description Use the display ospf lsdb command to display the database information about
OSPF connection state. With the verbose keyword specified, detailed information
about the specific type of LSAs in the OSPF connection state database will be
displayed.
Field Description
Type Type of the LSA
LinkStateID Link state ID of the LSA
AdvRouter Router ID of the router that advertises the LSA
Age Age of the LSA
Len Length of the LSA
Sequence Sequence number of the LSA
Metric Cost from the router that advertises the LSA to LSA destination
Where Location of the LSA
Field Description
type Type of the LSA
ls id Link state ID of the LSA
adv rtr Router ID of the router that advertises the LSA
ls age Age of the LSA
len Length of the LSA
366 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Field Description
seq# Sequence number of the LSA
chksum Checksum of the LSA
Options Options of the LSA
Net mask Network mask
E type Type of external route
Forwarding Address Forwarding address
Tag Tag
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf nexthop command to display the OSPF next-hop
information.
Next hops:
Address Type Refcount Intf Addr Intf Name
---------------------------------------------------------------
202.38.160.1 Direct 3 202.38.160.1 Vlan-interface2
202.38.160.2 Neighbor 1 202.38.160.1 Vlan-interface2
Table 63 Field descriptions of the display ospf nexthop command
Field Description
Address Address of next hop
Type Type of next hop
Refcount Reference count of the next hop, namely, number of routes using
the next hop
Intf Addr IP address of the interface to the next hop
Intf Name Interface to the next hop
nexthop Next hop
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf peer command to display the information about OSPF
peer.
Use the display ospf peer brief command to display the brief information,
including router ID, interface, and state, about every OSPF peer.
Use the display ospf peer statistics command to display the statistics of every
OSPF peer, namely, the number of peers in various states in every area.
Field Description
RouterID Router ID of neighbor router
Address Address of the interface, through which neighbor router
communicates with the router
State State of adjacency relation
Mode Master/Slave mode formed by negotiation in exchanging DD
packet
Priority Priority of DR/BDR for neighbor election
DR IP address of the interface of elected DR
BDR IP address of the interface of elected BDR
Dead timer expires in 31s If no hello packet is received from the peer within this interval,
the peer will be considered to be invalid.
Neighbor has been up for Time of neighbor connection
01:14:14
Field Description
Area ID Area ID
368 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Field Description
Down Initial state for OSPF to establish neighbor relation, which indicates that OSPF
router does not receive the message from a certain neighbor router within a
period of time
Attempt It is enabled in an NBMA environment, such as Frame Relay, X.25 or ATM. It
indicates that OSPF router does not receive the message from a certain neighbor
router within a period of time, but still attempts to send Hello packet to the
adjacent routers for their communications with a lower frequency.
Init It indicates that OSPF router has received Hello packet from a neighbor router,
but its IP address is not contained in the Hello packet. Therefore, a two-way
communication between them has not been established.
2-Way It indicates that a two-way communication between OSPF router and neighbor
router has been established. DR and BDR can be selected in this state (or higher
state).
ExStart In this state, the router determines the sequence number of initial database
description (DD) packet used for data exchange, so that it can obtain the latest
link state information
Exchange It indicates that OSPF router sends DD packet to its neighbor routers to exchange
link state information
Loading In this state, OSPF router requests neighbor routers based on the updated link
state information from neighbor routers and its expired information, and waits
for response from neighbor routers
Full It indicates that database synchronization between the routers that have
established neighbor relation has been completed, and their link state databases
have been consistent
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf request-queue command to display the information
about the OSPF request-queue.
Field Description
RouterID Router ID of neighbor router
Address Address of the interface, through which neighbor routers communicate with the
router
Interface Address of the interface on the network segment
Area Area number of OSPF
LSID Link State ID of the LSA
AdvRouter Router ID of the router that advertised the LSA
Sequence Sequence number of the LSA, used to discover old and repeated LSAs
Age Age of the LSA
Parameter process-id: OSPF Process ID. If you do not specify a process ID, this command
applies to all current OSPF processes.
Description Use the display ospf retrans-queue command to display the information
about the OSPF retransmission queue.
Field Description
RouterID Router ID of neighbor router
Address Address of the interface, through which neighbor routers
communicate with the router
Interface Address of the interface on the network segment
Area Area number of OSPF
Type Type of the LSA
LSID Link State ID of the LSA
AdvRouter Router ID of the router that advertises the LSA
370 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf routing command to display the information about OSPF
routing table.
Total Nets: 2
Intra Area: 2 Inter Area: 0 ASE: 0 NSSA: 0
Table 68 Field descriptions of the display ospf routing command
Field Description
Destination Destination network segment
Cost Cost of route
Type Type of route
NextHop Next hop of route
AdvRouter ID of the router that advertises the route
Area Area ID
Intra Area Number of intra-area routes
Inter Area Number of inter-area routes
ASE Number of external routes
NSSA Number of NSSA routes
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the display ospf vlink command to display the information about OSPF
virtual links.
filter-policy export 371
Field Description
Virtual-link Neighbor-id Router ID of virtual-link neighbor router
State State
Interface IP address of the interface on the virtual link
Cost Route cost of the interface
Type Type: virtual link
Transit Area ID of transit area that the virtual link passes, and it cannot be
backbone area, STUB area, or NSSA area
Timers OSPF timers, defined as follows:
Hello Interval of hello packet
Dead Interval of dead neighbors
Poll Interval of poll
Retransmit Interval of retransmitting LSA
Transmit Delay Delay time of transmitting LSA
filter-policy export
Parameter acl-number: Basic or advanced ACL number, in the range of 2,000 to 3,999.
Description Use the filter-policy export command to enable the ASBR routers to filter the
external routes imported to OSPF. This command is applicable only to ASBR routers
Use the undo filter-policy export command to cancel the filtering rule
configured.
By default, OSPF does not receive routes advertised by the other routing protocols.
n ■ The filter-policy export command take effect on only the routes imported to
the local device through the import-route command. If the filter-policy
372 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Example # Configure OSPF to advertise only the routing information permitted by acl 2000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 11.0.0.0 0.255.255.255
[SW7750-acl-basic-2000] rule deny source any
[SW7750-ospf-1] filter-policy 2000 export
filter-policy import
Parameter acl-number: Basic or advanced Access control list used for filtering the destination
addresses of the routing information.
ip-prefix-name: Name of the address prefix list used for filtering the destination
addresses of the routing information, containing 1 to 19 characters.
gateway ip-prefix-name: Specifies the name of the address prefix list used for
filtering the addresses of the neighbor routers advertising the routing information.
Description Use the filter-policy import command to configure the OSPF rules for filtering
the routing information received.
Use the undo filter-policy import command to cancel the filtering of the
routing information received.
In some cases, it may be required that only the routing information meeting some
conditions can be received. You can use the filter-policy command to set the
filtering conditions for the routing information to be received. Only the routing
information passing the filter can be received.
import-route 373
The filter-policy import command filters the routes calculated by OSPF. Only the
routes passing the filter can be added to the routing table. The routes can be
filtered based on next hop and destination address.
OSPF is a dynamic routing protocol based on link state, with routing information
hidden in LSAs. Therefore, OSPF cannot filter any advertised or received LSA. This
command is used much less in OSPF than in distance-vector routing protocols.
Example # Filter the received routing information according to the rule defined by ACL
2000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 20.0.0.0 0.255.255.255
[SW7750-acl-basic-2000] rule deny source any
[SW7750-ospf-1] filter-policy 2000 import
import-route
Syntax import-route protocol [ process-id | allow-ibgp ] [ cost value | type value | tag
value | route-policy route-policy-name ]*
Parameter protocol: Redistributes routes from the protocol, which can be direct, rip, bgp,
isis, static, ospf, ospf-ase and ospf-nssa.
type value: Specifies the cost type of redistributed routes. The value ranges from 1
to 2.
Description Use the import-route command to redistribute routes from another routing
protocol.
n ■ The import-route bgp command redistributes only eBGP routes, while the
import-route bgp allow-ibgp command redistributes both iBGP and eBGP
routes. Because the redistributed iBGP routes have the AS-PATH attribute
removed, routing loops may occur. Therefore, use the allow-ibgp keyword
with caution.
■ You are recommended to configure the route type, cost and tag together in
one command. When you configure them individually, the new configuration
will overwrite the old configuration.
Example # Configure to import RIP routes as type-2 routes, with the route tag of 33 and the
route cost of 50.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] import-route rip type 2 tag 33 cost 50
network
Parameter ip-address: Address of the network segment where the interface resides,
represented in dotted decimal notation.
Description Use the network command to enable an interface to run the OSPF protocol.
Use the undo network command to disable an interface from running OSPF.
To run OSPF on an interface, the master IP address of this interface must be in the
range of the network segment specified by this command. If only the slave IP
address of the interface is in the range of the network segment specified by this
command, this interface will not run OSPF.
Example # Specify the interfaces whose master IP addresses are in the segment range of
10.110.36.0 to run OSPF and specify the number of the OSPF area (where these
interfaces reside) as 6.
nssa 375
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] area 6
[SW7750-ospf-1-area-0.0.0.6] network 10.110.36.0 0.0.0.255
nssa
undo nssa
Description Use the nssa command to configure an OSPF area as an NSSA area.
For all the routers connected to the NSSA area, the nssa command must be used
to configure the area as the NSSA attribute.
ospf
Parameter process-id: OSPF Process ID, ranging from 1 to 65,535. By default, the process ID is
1. process-id is locally significant.
After OSPF is enabled, you can perform the related configuration in OSPF view.
# Enable the running of the OSPF protocol with process ID specified as 120.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] router id 10.110.1.8
[SW7750] ospf 120
[SW7750-ospf-120]
ospf authentication-mode
Parameter simple password: Uses plain text authentication. The password argument is a
string of up to eight characters.
ospf cost 377
key: MD5 authentication key. If it is input in a plain text form, MD5 key is a string
of 1 to 16 characters. It is displayed in a cipher text form with 24 characters in
length when the display current-configuration command is executed. Inputting
the MD5 key in a cipher text form with 24 characters in length is also supported.
The passwords for authentication keys of the routers on the same network
segment must be identical. In addition, you need to use the
authentication-mode command to set the authentication type of the area, so as
to validate the configuration.
ospf cost
Parameter value: Cost for running OSPF protocol, ranging from 1 to 65,535.
Description Use the ospf cost command to configure the cost for running OSPF on the
interface.
Use the undo ospf cost command to restore the default costs.
378 CHAPTER 31: OSPF CONFIGURATION COMMANDS
For the switch, the default cost for running OSPF protocol on a VLAN interface is
1.
Example # Specify the cost spent when an interface runs OSPF as 33.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] ospf cost 33
ospf dr-priority
Parameter dr-priority-value: Interface priority for electing the "designated router", ranging
from 0 to 255. The default value is 1.
Description Use the ospf dr-priority command to configure the priority for electing the
"designated router" on an interface.
Use the undo ospf dr-priority command to restore the default value.
The priority of the interface determines the qualification of the interface when the
"designated router" is elected. The interface with higher priority will be preferred
when the election conflict occurs.
ospf mib-binding
Parameter process-id: OSPF Process ID. It ranges from 1 to 65535 and defaults to 1.
Description Use the ospf mib-binding command to bind MIB operation to the specified
OSPF process.
ospf mtu-enable 379
Use the undo ospf mib-binding command to restore the default settings.
When OSPF enables the first process, OSPF always binds MIB operation to this
process. You can use this command to bind MIB operation to another OSPF
process.
To cancel the binding, use the undo ospf mib-binding command. OSPF will
automatically re-bind MIB operation to the first process that it enables.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf mib-binding 200
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] undo ospf mib-binding
ospf mtu-enable
Parameter None.
Description Use the ospf mtu-enable command to enable the interface to write MTU value
when sending DD packets.
Use the undo ospf mtu-enable command to restore the default settings.
By default, the MTU value is 0 when sending DD packets. That is, the actual MTU
value of the interface is not written.
Database Description (DD) packets are used to describe its own LSDB when the
router running OSPF protocol is synchronizing the database.
The default MTU value of DD packet is 0. You can use this command to configure
the specified interface manually to write the MTU value area in DD packets when
sending DD packets. That is, the actual MTU value of the interface is written in.
380 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Example # Configure interface Vlan-interface 3 to write MTU value area when sending DD
packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 3
[SW7750-Vlan-interface3] ospf mtu-enable
ospf network-type
Description Use the ospf network-type command to configure the network type of OSPF
interface.
Use the undo ospf network-type command to restore the default network
type of the OSPF interface.
OSPF divides networks into four types based on link layer protocol:
For a network not meeting this condition, the network type of the interface must
be changed to point-to-multipoint. In this way, routing information can be
exchanged between two routers not directly reachable to each other through
another router that is directly reachable to the two routers.
If only two routers run OSPF in the same network segment, the network type of
the interface can also be changed to point-to-point.
Note that you must use the peer command to configure the peer if the network
type of the interface is NBMA or manually changed to NBMA with the ospf
network-type command.
Parameter seconds: Dead interval of the OSPF neighbor. It is in seconds and ranges from 1 to
65,535.
Description Use the ospf timer dead command to configure the dead interval of the OSPF
peer.
Use the undo ospf timer dead command to restore the default value of the
dead interval of the peer.
By default, the dead interval is 40 seconds for the OSPF peers of p2p and
broadcast interfaces and is 120 seconds for those of p2mp and nbma interfaces.
The dead interval of OSPF peers means that, within this interval, if no Hello
message is received from the peer, the peer will be considered to be invalid. The
value of dead seconds should be at least four times of that of the Hello seconds.
The dead seconds for the routers on the same network segment must be
identical.
Example # Set the peer dead interval on the interface Vlan-interface 10 to 80 seconds.
382 CHAPTER 31: OSPF CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] ospf timer dead 80
Description Use the ospf timer hello command to configure the interval for transmitting
Hello messages on an interface.
Use the undo ospf timer hello command to restore the interval to the default
value.
Parameter seconds: Poll Hello interval in seconds. It ranges from 1 to 65,535 and defaults to
40.
Description Use the ospf timer poll command to configure the poll Hello packet interval on
NBMA and p2mp network.
ospf timer retransmit 383
Use the undo ospf timer poll command to restore the default poll interval.
Example # Configure to transmit poll Hello packet through interface Vlan-interface 20 every
120 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 20
[SW7750-Vlan-interface20] ospf timer poll 120
Parameter interval: Interval, in seconds, for retransmitting LSA on an interface. It ranges from
1 to 3600 and defaults to 5.
Description Use the ospf timer retransmit command to configure the interval for LSA
retransmission on an interface.
Use the undo ospf timer retransmit command to restore the default interval
value for LSA retransmission on the interface.
If a router running OSPF transmits a "link state advertisement" (LSA) to the peer, it
needs to wait for the acknowledgement packet from the peer. If no
acknowledgement is received from the peer within the LSA retransmission interval,
this LSA will be retransmitted.
The LSA retransmit between adjacent routers should not be set too short;
otherwise, unexpected retransmission will occur (See RFC2328).
Example # Specify the retransmit for LSA transmission between the interface Vlan-interface
10 and the adjacent routers to 12 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] ospf timer retransmit 12
384 CHAPTER 31: OSPF CONFIGURATION COMMANDS
ospf trans-delay
Parameter seconds: LSA transmission delay on an interface. It ranges from 1 to 3,600 and
defaults to 1 (in seconds).
Description Use the ospf trans-delay command to configure the LSA transmission delay on
an interface.
Use the undo ospf trans-delay command to restore the default LSA
transmission delay on an interface.
LSA ages in the "link state database" (LSDB) of the router as time goes by (1
added every second), but it does not age during network transmission. Therefore,
it is necessary to add a period of time set by this command to the aging time of
LSA before transmitting it.
peer
Description Use the peer command to configure the IP address of the neighbor router and
specify DR priority on an NBMA network.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] peer 10.1.1.1
preference
Description Use the preference command to configure the preference of an OSPF protocol
route.
Use the undo preference command to restore the default value of the OSPF
protocol route.
Parameter None
386 CHAPTER 31: OSPF CONFIGURATION COMMANDS
You can disable the protocol multicast MAC address delivery function so that the
system correctly forwards OSPF multicast packets, thus ensuring the normal
running of the routing protocol.
n ■ Disable protocol multicast MAC address delivery (with the undo protocol
multicast-mac enable command) if you are configuring OSPF with Layer
2/Layer 3 multicast function enabled in the system.
■ You do not need to disable protocol multicast MAC address delivery if the
system is enabled with OSPF only.
reset ospf
process-id: OSPF Process ID, ranging from 1 to 65535. If this argument is not
specified, all OSPF processes will be reset.
Description Use the reset ospf all command to reset all OSPF processes.
Use the reset ospf process-id command to reset the specified OSPF process and
clear the statistics.
After this command is issued, the system will prompt you to confirm whether to
re-enable OSPF.
router id
undo router id
Parameter router-id: Router ID, in dotted decimal notation, in the range of 0 to 255.
Description Use the router id command to configure the ID of a router running the OSPF
protocol.
Use the undo router id command to cancel the router ID that has been set.
When the router ID is configured manually, the IDs of any two routers cannot be
same in the autonomous system. Thus, you can select the IP address of an
interface as the ID of this router.
silent-interface
To prevent the router on some network from receiving the OSPF routing
information, you can use this command to disable this interface from transmitting
OSPF packet. On the switch, this command can be used to enable/disable OSPF
packet transmission through the specified VLAN interface.
Parameter process-id: OSPF Process ID, in the range of 1 to 65,535. If you do not specify a
process ID, this command applies to all current OSPF processes.
Description Use the snmp-agent trap enable ospf command to enable the OSPF TRAP
function.
spf-schedule-interval 389
Use the undo snmp-agent trap enable ospf command to disable the OSPF
TRAP function.
This command does not apply to the OSPF processes that are started after the
command is executed.
By default, the switch does not send TRAP packets in case of OSPF anomalies.
spf-schedule-interval
undo spf-schedule-interval
Parameter interval: SPF calculation interval of OSPF, in seconds. It ranges from 1 to 10 and
defaults to 5.
According to the Link State Database (LSDB), the router running OSPF can
calculate the shortest path tree taking itself as the root and determine the next
hop to the destination network according to the shortest path tree. Adjusting SPF
calculation interval restrains frequent network changes, which may occupy too
many bandwidth resources and router resources.
stub
undo stub
390 CHAPTER 31: OSPF CONFIGURATION COMMANDS
Parameter no-summary: Disables an ABR from transmitting Summary LSAs to the STUB
area.
Description Use the stub command to configure the type of an OSPF area as "stub".
If the router is an ABR, it will send a default route to the connected stub area . Use
the default-cost command to configure the default route cost. In addition, you
can specify the no-summary argument in the stub command to disable the
receiving of type-3 LSAs by the stub area connected to the ABR.
vlink-peer
hello seconds: Specifies the interval, in seconds, at which the router transmits
hello packet. It ranges from 1 to 8192 and defaults to 10. This value must equal
the hello seconds value of the router virtually linked to the interface.
retransmit seconds: Specifies the interval, in seconds, for retransmitting the LSA
packets on an interface. It ranges from 1 to 3600 and defaults to 5.
trans-delay seconds: Specifies the delay, in seconds, for transmitting LSA packets
on an interface. It ranges from 1 to 3600 and defaults to 1.
dead seconds: Specifies the interval, in seconds, of death timer. It ranges from 1
to 8192 and defaults to 40. This value must equal the dead seconds of the router
virtually linked to it and must be at least four times of the hello seconds.
vlink-peer 391
keyid: MD5 authentication key ID. It ranges from 1 to 255. It must be equal to the
authentication key ID of the virtually linked peer.
key: MD5 authentication key. If you use simple text authentication key, you can
input a string containing 1 to 16 characters. When you use the display
current-configuration command to display system information, the MD5
authentication key is displayed in the form of cipher text with a length of 24
characters. Inputting the key in the form of cipher text with a length of 24
characters is also supported.
Description Use the vlink-peer command to create and configure a virtual link.
Note that, when configuring virtual link authentication, you use the
authentication-mode command to specify the authentication mode as MD5
cipher text or simple text on the backbone network.
Example # Create a virtual link to 10.110.0.3 and use the MD5 cipher authentication mode.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ospf 1
[SW7750-ospf-1] area 10.0.0.0
[SW7750-ospf-1-area-10.0.0.0] vlink-peer 10.110.0.3 md5 3 345
392 CHAPTER 31: OSPF CONFIGURATION COMMANDS
INTEGRATED IS-IS CONFIGURATION
32 COMMANDS
n The router in this document refers to a generic router and an Ethernet switch
running routing protocols.
area-authentication-mode
password: Specifies the password to be set. For the simple authentication mode,
the password must be plain text. For the md5 authentication mode, the password
can be either plain text or ciphertext, and the result depends on the input. A plain
password can be a string no longer than 16 bytes, such as user918. A cipher
password must be a ciphertext of 24 bytes, such as (TT8F]Y5SQ=^Q‘MAF4<1!!.
ip: Specifies the system to check the configuration for the corresponding field of
IP in LSP.
osi: Specifies the system to check the configuration for the corresponding field of
OSI in LSP.
Whether a password should use the ip keyword or the osi keyword is not affected
by the actual network environment.
The system will neither authenticate the packets received from level-1 route nor
check its password by default.
We can use this command to clear all leve-1 routing packets not compatible with
the area authentication password set by the command. And at the same time, we
394 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
also instruct the system to follow a specific mode to insert the area authentication
password in all the level-1 routing packets sent from the local node.
Example # Set the area authentication password to hello, and the authentication mode to
simple.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] area-authentication-mode simple hello
cost-style
undo cost-style
narrow-compatible: Specifies to receive both narrow and wide packets, but send
only narrow packets.
wide-compatible: Specifies to receive both narrow and wide packets, but send
only wide packets.
relax-spf-metric: Specifies to allow receiving routes with cost bigger than 1,024.
If this keyword is not configured, any route with cost larger than 1,024 will be
dropped. This configuration is only available when the compatible keyword or
when the narrow-compatible keyword is provided.
Description Use the cost-style command to set the cost style of packets received or sent by
IS-IS router.
Use the undo cost-style command to restore the default cost style.
Example # Set the router to send only narrow packets, but receive both narrow and wide
ones.
default-route-advertise 395
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] cost-style narrow-compatible
default-route-advertise
Parameter None
Description Use the display isis brief command to display the brief information about IS-IS.
Description Use the display isis interface command to view the information about the
IS-IS-enabled interfaces.
The information displayed by this command includes the interface name, interface
IP address, interface link state and so on. Besides all the information displayed by
the display isis interface command, the display isis interface verbose
command will display the IS-IS configuration information related to the interface,
such as CSNP packets broadcast intervals, Hello packets broadcast intervals and
the number of invalid Hello packets.
Description Use the display isis lsdb command to display IS-IS link state database.
Parameter None
Description Use the display isis mesh-group command to display the mesh-group of IS-IS.
You can use this command to view the mesh-group configuration of the current
routing interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750-Vlan-interface20] display isis mesh-group
Interface Mesh-group/Blocked
Vlan-interface 10 100
Vlan-interface 20 100
Parameter verbose: Displays the area address advertised in a neighbor’s Hello packet when
this keyword is provided; displays only the brief information if this keyword is not
specified.
Description Use the display isis peer command to display the information of the IS-IS
neighbor.
Besides all the information displayed by the display isis peer command, the
display isis peer verbose command will display the neighbor’s area address,
holdtime of Up state and the IP address of the directly-connected interface.
Description Use the display isis route command to display the IS-IS routing information.
Example # Display the output information of the display isis ip route command.
<SW7750> display isis route
ISIS IP Level - 2 Routing Table :
Parameter None
Description Use the display isis spf-log command to display the log record of IS-IS SPF
calculation.
domain-authentication-mode
password: Specifies the password to be set. For the simple authentication mode,
the password must be plain text. For md5 authentication mode, the password can
be either plain text or ciphertext, and the result depends on the input. A plain
password can be a string no longer than 16 bytes, such as user918. A cipher
password must be a ciphertext of 24 bytes, such as _(TT8F]Y5SQ=^Q‘MAF4<1!!.
ip: Specifies the system to check the configuration for the corresponding field of
IP in LSP.
osi: Specifies the system to check the configuration for the corresponding field of
OSI in LSP.
Whether a password should use the ip keyword or the osi keyword is not affected
by the actual network environment.
The system will neither authenticate the received level-2 routing packet nor check
its password by default.
You can use this command to clear all leve-2 routing packets not matching the
domain-authentication password set by the command. At the same time, we also
instruct the system to follow a specific mode to insert the area-authentication
password in all the level-2 routing packets sent from the local node.
Example # Use the simple mode and set the password to abc to authenticate level-2 routing
packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] domain-authentication-mode simple abc
filter-policy export 401
filter-policy export
Description Use the filter-policy export command to enable IS-IS to filter the routes
advertised by other routing protocols.
Use the undo filter-policy export command to disable the configured filter
rules.
IS-IS does not filter the routes advertised by other routing protocols by default.
n ■ The filter-policy export command takes effect only on the routes imported
through the import-route command. If the filter-policy export command is
configured while the import-route command is not configured to import
other non-IS-IS routes, the filter-policy export command does not take
effect.
■ If the protocol argument is not provided in the filter-policy export command,
the command takes effect on all the routes imported to the local device using
the import-route command.
Example # Use ACL 2000 to filter the routes imported through IS-IS.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] filter-policy 2000 export
filter-policy import
Description Use the filter-policy import command to enable IS-IS to filter the received
routes.
Use the undo filter-policy import command to disable IS-IS from filtering the
received routes.
ignore-lsp-checksum-error
Syntax ignore-lsp-checksum-error
undo ignore-lsp-checksum-error
Parameter None
Description Use the ignore-lsp-checksum-error command to set IS-IS to drop the LSP when
it detects LSP checksum errors.
When the local IS-IS receives a LSP packet, it will check the LSP packet and
compare the checksum calculated with that in the LSP packet. By default, the LSP
packets will not be dropped even if the checksum is wrong. You can use the
ignore-lsp-checksum-error to configure IS-IS to drop the LSP packet in case of
checksum error.
Example # Configure IS-IS to drop the LSP packet in case of checksum error.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] ignore-lsp-checksum-error
import-route 403
import-route
Parameter protocol: Redistributes routes from the routing protocol, which can be direct,
static, rip, bgp, ospf, ospf-ase, or ospf-nssa.
type: Specifies the type of the routing cost. If it is internal, then it is a route
within an area; if it is external, it is a route between areas. The type is internal by
default.
Description Use the import-route command to enable IS-IS to filter the imported routes.
Use the undo import-route command to disable IS-IS from importing other
protocols’ routing information.
IS-IS takes all the routes imported to the routing domain as external routes, which
describe how to select a routes to a destination outside of the routing domain.
n Note that:
The import-route bgp command redistributes only eBGP routes, while the
import-route bgp allow-ibgp command redistributes both iBGP and eBGP
routes. Because the redistributed iBGP routes have the AS-PATH attribute
removed, routing loops may occur. Therefore, use the allow-ibgp keyword with
caution.
Parameter acl-number: ACL number in the range of 2000 to 3999. It can be either basic ACLs
or advanced ACLs.
Description Use the import-route isis level-2 into level-1 command to import the routing
information of Level-2 area to Level-1 area.
Use the undo import-route isis level-2 into level-1 command to disable this
function.
By using the filter policy to filter the routes during the route penetration from
Level-2 to Level-1, you call advertise in the Level-1 area only those routes that have
passed the filter.
The routing information in Level-2 area will not be advertised in Level-1 area by
default.
Example # Set the router to penetrate routes from Level-2 to Level-1 through ACL.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] import-route isis level-2 into level-1 acl 2100
isis
Parameter tag: Name of an IS-IS routing process, consisting of no more than 128 characters.
Its length can be 0, that is, the tag argument can be null.
isis authentication-mode 405
Description Use the isis command to start a corresponding IS-IS routing process and enter the
IS-IS view.
Use the undo isis command to delete the specified IS-IS routing process.
Before running IS-IS protocol normally, you must first use the isis command to
enable IS-IS process, then use the network-entity command to configure a
network entity title (NET) for the router, and then use the isis enable command to
enable each interface that need to run the IS-IS process.
Example # Start the IS-IS routing process, with the system ID as 0000.0000.0002, and area
ID as 01.0001.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] network-entity 01.0001.0000.0000.0002.00
isis authentication-mode
ip: Specifies the system to check the configuration for the corresponding field of
IP in LSP.
406 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
osi: Specifies the system to check the configuration for the corresponding field of
OSI in LSP.
Whether a password should use the ip keyword or the osi keyword is not affected
by the actual network environment.
Description Use the isis authentication-mode command to authenticate the IS-IS hello
packets of the specified level using the specified authentication mode and
password on the IS-IS interface.
If there is no other parameter but the password, then only level-1 and osi are
available.
Example # Set the plain password as tangshi for Level-1 adjacency on Vlan-interface 10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis authentication-mode simple tangshi level-1
isis circuit-level
Parameter level-1: Specifies to set up only level-1 adjacency for the interface.
Description Use the isis circuit-level command to set link adjacency for the level-1-2 router.
Use the undo isis circuit-level command to resume the default configuration of
link adjacency for the level-1-2 router.
This command is only available for a level-1-2 router. If the local host is level-1-2
router and it need to set up some adjacency (level-1 or level-2) with a peer
router, then you can use this command to prescribe the local interface to receive
and send only the hello packets. An interface can receive and send only one type
isis cost 407
of hello packet on a point-to-point link. You can use this command to reduce the
router’s processing time to save bandwidth.
Example # Set the level-1 attributes for Vlan-interface 10 to prohibit sending and receiving
level-2 Hello packets when the interface is connected to a non-backbone router
within the same area.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis enable
[SW7750-Vlan-interface10] isis circuit-level level-1
isis cost
Parameter value: Specifies the link cost value for corresponding SPF calculation, in the range
of 0 to 63. It is 10 by default.
Description Use the isis cost command to set the interface link cost for SPF calculation.
Use the undo isis cost command to resume the default link cost value.
If neither level-1 nor level-2 is assigned in the configuration, then both level-1 and
level-2 are configured by default.
You are recommended to configure a proper link cost for each interface;
otherwise, the link cost for IS-IS route calculation may not reflect the correct cost.
isis dis-priority
Parameter value: Specifies the priority for selecting DIS, ranging from 0 to 127, with the
default as 64.
If neither level-1 nor level-2 is specified in this command, then the level-1 and
level-2 priority is configured by default.
Description Use the isis dis-priority command to specify the priority for selecting
corresponding DIS.
Use the undo isis dis-priority command to resume the default priority.
Unlike DR of OSPF, there is no backup DIS for IS-IS and the router with 0 priority
can also select DIS.
isis enable
Parameter tag: Name assigned to the IS-IS routing process when the isis command is
executed in system view. If this argument is not specified, it is null.
clns: Specifies to enable IS-IS routing processes based on OSI protocol stack on the
interface.
ip: Specifies to enable IS-IS routing processes based on TCP/IP protocol stack on
the interface. By default, IS-IS routing processes based on TCP/IP protocol stack are
enabled.
Description Use the isis enable command to enable the corresponding IS-IS routing process
for the interface.
isis mesh-group 409
The interface does not enable the IS-IS routing process by default.
Before running IS-IS protocol normally, you must use the isis command to enable
IS-IS process, and use the network-entity command to configure a network
entity title (NET) for the router, and then use the isis enable command to enable
each interface that need to run the IS-IS process.
isis mesh-group
Description Use the isis mesh-group command to add an interface to a specified mesh
group.
Use the undo isis mesh-group command to delete an interface from a mesh
group.
An interface is not in any mesh group and can flood LSP normally by default.
For an interface not in a mesh group, it follows the normal process to flood the
received LSP to other interfaces. For the NBMA network with high connectivity
and multiple point-to-point links, this will cause repeated LSP flooding and
bandwidth waste.
After an interface is added to a mesh group, it will only flood a received LSP to
interfaces not belonging to the same mesh group.
When you add an interface to a mesh group or block the interface, make sure to
retain some redundancy so that a link failure will not affect the normal LSP packet
flooding.
410 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
Parameter seconds: Interval in seconds of sending CSNP packets over broadcast network,
ranging from 1 to 65,535, with the default as 10 seconds.
level-1: Specifies the Level-1 time interval for sending CSNP packets.
level-2: Specifies the Level-2 time interval for sending CSNP packets.
If neither the level-1 keyword nor the level-2 keyword is specified, both the
level-1 interval and the level-2 interval are set.
Description Use the isis timer csnp command to specify the time interval for sending CSNP
packet over broadcast network.
Use the undo isis timer csnp command to resume the default value of 10
seconds.
This command only applies to the DIS router, which sends CSNP packets
periodically. Besides, DIS is separated to Level-1 and Level-2, and their time
intervals should be configured respectively.
Example # Configure Level-2 CSNP packets to be sent every 15 seconds over Vlan-interface
10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis timer csnp 15 level-2
Parameter seconds: Interval in seconds for sending Hello packets, ranging from 3 to 255,
with the default as 10 seconds.
level-1: Specifies the time interval for sending Level-1 Hello packets.
level-2: Specifies the time interval for sending Level-2 Hello packets.
If neither the level-1 keyword nor the level-2 keyword is specified, both the
level-1 interval and the level-2 interval are set.
Description Use the isis timer hello command to specify the time interval for sending the
corresponding level Hello packets.
Use the undo isis timer hello command to resume the default value of 10
seconds.
The hello time interval must be configured respectively for the Level-1 and Level-2
packets on a broadcast network, because these two types of hello packets are sent
separately. A point-to-point link does not require this. The shorter the time interval
is, the more system resources will be occupied to send Hello packets, so you
should configure a proper time interval depending on the specific requirements.
Example # Configure Level-2 Hello packets to be sent every 20 seconds over Vlan-interface
10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis timer hello 20 level-2
Parameter value: Number of invalid Hello packets of an IS-IS neighbor, in the range of 3 to
1,000.
level-1: Specifies the number of invalid Hello packets of a Level-1 IS-IS neighbor.
level-2: Specifies the number of invalid Hello packets of a Level-2 IS-IS neighbor.
If neither the level-1 keyword nor the level-2 keyword is specified, the command
takes effect on both level-1 and level-2 IS-IS neighbors.
412 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
Description Use the isis timer holding-multiplier command to configure the number of
invalid Hello packets for an IS-IS neighbor. When a specified number of Hello
packets are not received from a neighbor, the neighbor will be considered as
invalid.
Use the undo isis timer holding-multiplier command to resume the default
configuration.
You can configure the time intervals of Hello packets separately for Level-1 and
Level-2 peers. But for point-to-point link, as there is only one kind of Hello packet,
so you need not specify Level-1 or Level-2.
In fact, the number of invalid Hello packets is used to configure Holddown time. If
a router receives no Hello packet from peer router within Holddown time, it will
take the peer router as invalid. Depending on the interface configuration, the
Holddown time can be configured differently for different routers within an area.
You can adjust the Holddown time by changing either the time interval for
sending Hello packets or the number of invalid Hello packets.
Example # Configure the number of Level-2 Hello packets signifying peer invalid as 5 for
Vlan-interface, that is, if no Hello packet is received from the interface within 5
Hello packet time intervals, the IS-IS peer is considered as invalid.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis timer holding-multiplier 5
Parameter time: Minimum time interval in millisecond for sending link-state packets, ranging
from 1 to 1000, with the default as 33 milliseconds.
Description Use the isis timer lsp command to configure the time interval for sending
link-state packets over interface.
Use the undo isis timer lsp command to resume the default configuration.
Example # Configure the time interval as 500 milliseconds for Vlan-interface 10 to send LSP.
isis timer retransmit 413
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis timer lsp 500
Parameter seconds: Interval in seconds for retransmitting LSP packets, ranging from 1 to 300,
with the default as 5 seconds.
Description Use the isis timer retransmit command to configure the time interval for
retransmitting LSP packets over point-to-point link.
Use the undo isis timer retransmit command to resume the default
configuration.
You need not use this command over a broadcast link, because a LAP packet
requires response from the peer only over a point-to-point link, but not over a
broadcast link,
Example # Configure the time interval as 10 seconds for Vlan-interface 10 to retransmit LSP.
<SW7750> system-view
System View: return to User View with Ctrl+Z..
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] isis timer retransmit 10
is-level
undo is-level
Parameter level-1: Indicates the router works in Level-1, which means it only calculates
routes within the area, and maintains L1 LSDB.
414 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
level-1-2: Indicates the router works in Level-1-2, which means it calculates routes
and maintains LSDB for both L1 and L2.
level-2: Indicates the router works in Level-2, which means it calculates LSP
switching and routes and maintains LSDB for L2 only.
You can configure all the routers as either Level-1 or Level-2 if there is only one
area, because there is no need for all routers to maintain two identical databases
at the same time. You are advised to configure all routers as Level-2 in IP network
so as to facilitate extending later.
log-peer-change
Syntax log-peer-change
undo log-peer-change
Parameter None
Description Use the log-peer-change command to enable the IS-IS adjacency state change
output.
When the adjacency state output is enabled, the IS-IS adjacency state change will
be sent to the configuration terminal.
Example # Enable the IS-IS adjacency state change output on the current router.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
md5-compatible 415
[SW7750] isis
[SW7750-isis] log-peer-change
md5-compatible
Syntax md5-compatible
undo md5-compatible
Parameter None
Description Use the md5-compatible command to specify IS-IS to adopt the MD5 algorithm
compatible with other manufacturers.
Use the undo md5-compatible command to specify IS-IS to adopt the default
MD5 algorithm.
This command must be configured when the switch needs to perform IS-IS MD5
authentication with the devices of others manufacturers.
Example # Specify IS-IS to adopt the MD5 algorithm compatible with other manufacturers.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] md5-compatible
network-entity
Description Use the network-entity command to configure the network entity title (NET) for
an IS-IS routing process.
A NET has three parts: The first part is area ID, which ranges from 1 to 13 bytes.
The routes of the same area have the same area ID. The second part is the router’s
system ID of 6 bytes, which is unique within the whole area and backbone area.
The third part is SEL, the ending byte with the value of 00. You need to configure
only 1 NET for a router. When repartitioning an area, such as merging or splitting,
you can reconfigure the router to ensure correct and continuous routing.
preference
clns: Specifies IS-IS routing preference based on OSI protocol stack, in the range of
1 to 255. It is IP-based preference by default.
ip: Specifies IS-IS routing preference based on TCP/IP protocol stack, in the range
of 1 to 255. By default, IS-IS routing preference based on TCP/IP protocol stack is
used.
Use the undo preference command to resume the default IS-IS protocol
preference.
When a router runs multiple dynamic routing protocols at the same time, the
system will configure a preference for each routing protocol. If several protocols
find routes to the same destination, the one with the highest preference
dominates.
[SW7750] isis
[SW7750-isis] preference 25
Parameter None
Description Use the reset isis all command to clear all ISIS data structure information.
This command is used when a LSP need to be updated immediately. For example,
after performing the area-authentication-mode and
domain-authentication-mode commands, if the router still has some old LSPs,
you can use this command to clear these LSPs.
Description Use the reset isis peer command to clear the data information of a specific IS-IS
peer.
set-overload
Syntax set-overload
418 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
undo set-overload
Parameter None
Description Use the set-overload command to set overload flag for the current router.
When the overload flag is set for a router, the routes calculated by the router will
be ignored by other routes when they calculate SPF. (But the routes directly
connected to the router will not be ignored.)
When a router is set overload flag, other routers will not transmit the packets that
should be forwarded by the router.
silent-interface
Description Use the silent-interface command to prohibit IS-IS packet sending on the
specified interface.
Use the undo silent-interface command to permit IS-IS packet sending on the
specified interface.
[SW7750] isis
[SW7750-isis] silent-interface Vlan-interface 3
spf-delay-interval
undo spf-delay-interval
Parameter number: Interval of releasing CPU during routing calculation, in the range of 1,000
routes to 50,000 routes. It is 5,000 routes by default.
Description Use the spf-delay-interval command to set the interval of releasing CPU during
SPF calculation.
When there are two many routes in the routing table, you can use this command
to release CPU automatically after a certain number of routes are processed in
order to prevent the SPF calculation from occupying the system resources for a
long time to affect the response of the console. The unprocessed routes are to be
processed in one second.
You can adjust the number argument according to the size of the routing table. If
the spf-slice-size command is configured at the same time, the SPF calculation
will be paused if the SPF calculation matches any of the setting.
Example # Set IS-IS to release CPU when every 3,000 routes are processed.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] spf-delay-interval 3000
spf-slice-size
undo spf-slice-size
Parameter seconds: Duration time in milliseconds during SPF calculation, ranging from 150 to
50,000. A calculation is ended when the duration time is reached or exceeded. If
420 CHAPTER 32: INTEGRATED IS-IS CONFIGURATION COMMANDS
the second argument is set to 0, then the SPF calculation will continue until it
finishes. It is 0 by default.
Description Use the spf-slice-size command to configure whether the SPF routing calculation
is fragmented and the duration time for each fragment.
When there are too many routes in the routing table, you can use this command
to fragment the SPF calculation to avoid taking up the system resources for too
long. You are not recommended to change the default configuration.
summary
level-1-2: Specifies to summarize all the routes imported to level-1 area and
backbone area.
Description Use the summary command to configure IS-IS to generate summarized routes.
You can summarize the routes having the same next hop into one to reduce the
routing table size, as well as the LSP and LSDB generated by the router. It is
possible to summarize native IS-IS routes and imported routes. After
summarization, the route cost is the minimum cost of those summarized routes.
timer lsp-max-age
Parameter seconds: Maximum valid time of a LSP, in the range of 1 to 65,535 in seconds. It is
1,200 seconds by default.
Description Use the timer lsp-max-age command to set the maximum valid time of the LSPs
generated on the current router.
Use the undo timer lsp-max-age command to restore the default setting.
When the router generates system LSPs, the LSPs are generated with the
maximum valid time in them. When a LSP is received by other routers, the
maximum valid time will be smaller and smaller. If the maximum valid time
decreases to 0, this LSP will be removed from LSDB.
Example # Set the maximum valid time of the LSPs generated by the current system to 25
minutes, namely, 1,500 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] timer lsp-max-age 1500
timer lsp-refresh
Parameter seconds: LSP updating period in seconds, ranging from 1 to 65,535. It is 900
seconds by default.
Description Use the timer lsp-refresh command to set LSP updating period.
You can keep LSP in synchronization for the whole area with this mechanism.
Example # Set the updating period to 1,500 seconds for the current system LSP.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] timer lsp-refresh 1500
timer spf
Parameter seconds: Maximum time interval (in seconds) for SPF calculation, ranging from 1 to
120, with the default as 10.
level-1: Specifies to set the time interval for only Level-1 SPF calculation.
level-2: Specifies to set the time interval for only Level-2 SPF calculation.
If neither the level-1 keyword nor the level-2 keyword is specified, the interval of
both level-1 SPF calculation and the level-2 SPF calculation are set.
Description Use the timer spf command to set the time interval for SPF calculation.
Use the undo timer spf command to resume the default configuration.
In the IS-IS protocol, the short path must be calculated again when the LSDB
changes. If the SPF calculation is performed frequently, plenty of system resources
will be occupied and the router efficiency will be affected. Comparatively,
performing SPF calculation periodically can improve the efficiency. You can set the
time interval of performing SPF calculation as required.
Example # Set the time interval of performing SPF calculation to three seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] isis
[SW7750-isis] timer spf 3
BGP CONFIGURATION COMMANDS
33
n Routers in this manual refer to common routers or Ethernet switches that run
routing protocols, unless otherwise specified.
For the commands for defining routing policies in BGP, see Chapter 34 “IP Routing
Policy Configuration Commands” on page 469.
aggregate
Description Use the aggregate command to establish an aggregated record in the BGP
routing table.
keywords Description
as-set Used to produce an aggregated route whose AS path information
includes detailed routes. Use this keyword carefully when many AS
paths need to be aggregated, for frequent change of routes may lead to
route vibration.
detail-suppressed This keyword does not establish any aggregated route, but it restrains
the advertisement of all the specific routes. If only some specific routes
are to be restrained, use the peer filter-policy command carefully.
suppress-policy Create an aggregated route with this keyword, at the same time, the
advertisement of the specified route is restrained. If you want to restrain
some specific routes selectively and leaves other routes still being
advertised, use the if-match sub-statement of the route-policy
command.
origin-policy This keyword is used to select only the specific routes in accordance with
the route-policy to create an aggregated route.
attribute-policy This keyword is used to set attributes of the aggregated route. The same
work can be done by using peer route-policy, etc.
bgp
Description Use the bgp command to enable BGP and enter the BGP view.
This command is used to enable/disable BGP and specify the local AS number of
BGP.
balance
undo balance
Parameter num: Number of BGP routes used for load balance. This argument ranges from 1
to 4. Value 1 means the system does not adopt load balance.
Use the undo balance command to cancel the load balance configuration.
compare-different-as-med
Syntax compare-different-as-med
undo compare-different-as-med
Parameter None
By default, it is not allowed to compare the MED attribute values from the routing
paths of different AS peers.
If there are several routes available to one destination address, the route with a
smaller MED can be selected as the final route.
Do not use this command unless it is determined that the same IGP and routing
selection mode are adopted by different autonomous systems.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] compare-different-as-med
confederation id
undo confederation id
Confederation can be adopted to solve the problem of too many IBGP full
connections in a large AS domain. The solution is, first dividing the AS domain into
several smaller sub-ASs, and each sub-ASs remains full-connected. These sub-ASs
form a confederation. Key BGP attributes of the route, such as next hop, MED,
local preference, are not discarded across each sub-ASs. The sub-ASs still look like
a whole from the point of view of a confederation although these sub-ASs have
EBGP relations. This can assure the integrality of the former AS domain, and ease
the problem of too many connections in the domain
Example # Confederation 9 consists of four sub-ASs, namely, 38, 39, 40, and 41. Here, the
peer 10.1.1.1 is an internal member of the AS confederation while the peer
200.1.1.1 is an external member of the AS confederation. For external members,
Confederation 9 is a unified AS domain. The following gives an example of the
configuration of AS 41.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 41
[SW7750-bgp] confederation id 9
[SW7750-bgp] confederation peer-as 38 39 40
[SW7750-bgp] group Confed38 external
[SW7750-bgp] peer Confed38 as-number 38
[SW7750-bgp] peer 10.1.1.1 group Confed 38
[SW7750-bgp] group Remote98 external
[SW7750-bgp] peer Remote98 as-number 98
[SW7750-bgp] peer 200.1.1.1 group Remote98
confederation nonstandard 427
confederation nonstandard
Parameter None
For the communication with nonstandard devices, you must execute the
confederation nonstandard command on all the 3Com routers in the
confederation.
confederation peer-as
Use the undo confederation peer-as command to delete the specified Sub-AS
in the confederation.
428 CHAPTER 33: BGP CONFIGURATION COMMANDS
dampening
undo dampening
reuse: Threshold, in seconds, for disabling route suppression. When the penalty
value is below this threshold, the route will be reused. The range is 1 to 20,000.
The default value is 750.
suppress: Threshold, in seconds, for enabling route suppression. When the penalty
value is above the threshold, the route is suppressed. The range is 1 to 20,000.
The default value is 2,000.
ceiling: Upper penalty threshold in seconds, that is, the penalty value stops
increasing when it reaches the upper threshold. The range is 1001 to 20,000. The
default value is 16,000.
If no value is specified for the arguments, their default values will take effect. The
half-life-reachable, half-life-unreachable, reuse, suppress, and ceiling arguments
are independent of each other.. Therefore, if you specify a value for any of these
arguments, you must specify a value for all the others.
default local-preference 429
Description Use the dampening command to make BGP route attenuation valid or modify
various BGP route attenuation parameters.
Related command: reset bgp dampening, reset bgp flap-info, display bgp routing-table
dampened, and display bgp routing-table flap-info.
default local-preference
Description Use the default local-preference command to configure the default local
preference.
Use the undo default local-preference command to restore the default value.
default med
Parameter med-value: Specified MED value, in the range of 0 to 4294967295. The default
med-value is "0".
Description Use the default med command to configure the default MED value of the
system.
Use the undo default med command to restore the default MED value of the
system.
The multi-exit discriminator (MED) is an external route metric. Different from the
local preference, the MED is exchanged between autonomous systems. After the
MED enters an autonomous system, it will not be sent out of this autonomous
system. The MED attribute is used to select the optimal route, that is, the route
with a smaller MED value is selected. When a router running the BGP obtains
routes with the same destination address but different next hops through different
external peers, the route selection will be based on the MED value. In the case that
all other conditions are the same, the system first selects the route with the smaller
MED value as an external route of the autonomous system.
Description Use the display bgp group command to view the information of peer groups.
Field Description
Group Name of peer group
type Type of peer group: IBGP or EBGP
as-number AS number of peer group
members in this group Members in this peer group
route-policy Name of configured route policy
filter-policy Configured export and import route filter for BGP
acl Configured access control list
ip-prefix Configured IP address prefix list
default route produce Whether or not to advertise default routing information
Description Use the display bgp network command to view the routing information that
has been configured.
Field Description
Network Network address
Mask Mask
Route-policy Configured route policy
Description Use the display bgp paths command to view the information about AS paths
Field Description
Id Value of sequence number
Hash-Index Value of Hash-index
References Number of routes with reference
Aggregator Mask length of aggregate route
Origin Origin attribute of route, which indicates that the route updates its origin relative
to the route originating it from AS. It has three optional values:
IGP The route belongs to inside of AS. BGP treats aggregate route and the
route defined by the command network as inside of AS, and origin type
as IGP.
EGP The route is learned from exterior gateway protocol (EGP).
INC Short for INCOMPLETE: indicates that the original source of the route
information is unknown (learned by other methods). BGP sets the origin
of the route imported through other IGP protocols as INCOMPLETE
As-path AS-path attribute of route, which records all AS areas that the route passes.
With it, route loop can be avoided
Description Use the display bgp peer command to display the information about the
specified BGP peer.
Options: <>
Field Description
Peer IP address of peer and port number used by the peer to establish TCP
connection
Local IP address and port number used to establish TCP connection of local end
Type Type of peer: Internal for IBGP, and External for EBGP
State State of peer
Flags Flags of peer
Last State Last state before entering current state
Last Event Last event of neighbor state machine
Last Error Last error of neighbor state machine
Options Options
Description Use the display bgp routing-table command to display all the BGP routing
information.
Routes total: 10
Table 75 Description on fields of the display bgp routing-table command
Field Description
Flags Status code:
# - valid (valid route)
^ - active (selected optimal route)
I - internal (IBGP route)
D - damped (attenuation dampened)
H - history (history record)
S - aggregate suppressed (aggregation suppressed)
Dest/Mask Destination address/mask
Next Hop IP address of the next hop
Med Value of the MULTI_EXIT_DISC attribute, which ranges from 0 to 4294967295
Local-Pref Local preference, which ranges from 0 to 4294967295
Origin Origin attribute of a route, which indicates that the route updates its origin
relative to the route originating it from the AS. It has three optional values:
IGP The route is inside the AS. BGP treats the aggregation route and the route
defined by the network command inside AS, and the origin type as IGP.
EGP The route is learned from exterior gateway protocol (EGP).
INC Short for INCOMPLETE: indicates that the original source of the route
information is unknown (learned by other methods). BGP sets the origin of
the route imported through other IGP protocols as INCOMPLETE
As-path AS-path attribute of a route, which records all AS areas that the route passes to
void route loop.
Description Use the display bgp routing-table as-path-acl command to view routes that
match an as-path acl.
Field Description
Dest/Mask Destination address/Mask
Pref Preference
Nexthop IP address of next hop
Med MULTI_EXIT_DISC attribute value
Local-pref Local preference
Origin Origin attribute of route, which indicates that the route updates its origin relative
to the route originating it from AS. It has three optional values:
IGP The route belongs to inside of AS. BGP treats aggregate route and the
route defined by the command network as inside of AS, and origin type
as IGP.
EGP The route is learned from exterior gateway protocol (EGP).
INC Short for INCOMPLETE: indicates that the original source of the route
information is unknown (learned by other methods). BGP sets the origin of
the route imported through other IGP protocols as INCOMPLETE
As-path AS-path attribute of route, which records all AS areas that the route passes. With
it, route loop can be avoided
Description Use the display bgp routing-table cidr command to view the routing
information about the non-natural mask (namely the classless inter-domain
routing, CIDR).
For detailed description of the fields in the output information, see Table 75.
aa:nn: Community number. &<1-13> means that you need to provide at least one
and can provide up to 13 community numbers.
no-advertise: Specifies not to advertise a route to other BGP peers after the route
is received.
no-export: Specifies not to export a route to the outside of the local AS after the
route is received. If the confederation is used, the router cannot be exported to the
outside of the confederation, but can be exported to other sub-ASs in the
confederation.
Description Use the display bgp routing-table community command to view the routing
information related to the specified BGP community number in the routing table.
Example # Display the routing information matching BGP community number 11:22.
<SW7750> display bgp routing-table community 11:22
Flags: # - valid ^ - active I - internal
D - damped H - history S - aggregate suppressed
For detailed description of the fields in the output information, see Table 75.
Description Use the display bgp routing-table community-list command to view the
routing information matching the specified BGP community list.
For detailed description of the fields in the output information, see Table 75.
Parameter None
Description Use the display bgp routing-table dampened command to display BGP
dampened routes.
Field Description
Flags Status code:
# - valid (valid route)
^ - active (optimal route selected)
I - internal (IBGP route)
D - damped
H - history
S - aggregate suppressed
B - balance (load balance)
#D Valid and dampened route
Dest/Mask The route to this network segment is dampened.
Source Next hop of the route
Damping-limit Time when damping is invalid, that is, time when the route can be reused.
Origin The ORIGIN attribute of the route, which indicates the routing update
origination of the route relative to the AS the route sourced from. It can be
one of the three value:
IGP This is an AS interior route. BGP regards both aggregated routes and
routes defined by the network command as AS interior routes and set
their origin type to IGP.
EGP This route is learned from EGP (exterior gateway protocol).
INC INCOMPLETE: indicates the route is obtained from an unknown source
(that is, learned from a different source). BGP set the origin of the
routes imported from other IGP protocols to INCOMPLETE
As-path AS_PATH attribute of the route, which records all the ASs the route passes
through and can be used to avoid route ring.
For detailed description of the fields in the output information, see Table 75.
longer-match: Displays the flap-info of the route that has a mask longer than
that specified by the network-address mask argument.
Description Use the display bgp routing-table flap-info command to display BGP
flap-info.
Field Description
Flags State flags:
# - valid (valid)
^ - active (selected)
D - damped (discarded)
H - history (history)
I - internal (interior gateway protocol)
S - aggregate suppressed (suppressed)
B - balance (load balance)
#D The valid and damped route
Dest/Mask The dampened route to the destination network 11.1.0.0
Source The nexthop of the route
Keepup-time The time that route damping has continued
Damping-limit The time before dampening turns invalid and the route can be reused.
440 CHAPTER 33: BGP CONFIGURATION COMMANDS
Field Description
Flap-times The times of the route flap
Origin Origin attribute of route, which indicates that the route updates its origin
relative to the route originating it from AS. It has three optional values:
IGP The route belongs to inside of AS. BGP treats aggregate route and the
route defined by the command network as inside of AS, and origin
type as IGP.
EGP The route is learned from exterior gateway protocol (EGP).
INC Short for INCOMPLETE: indicates that the original source of the route
information is unknown (learned by other methods). BGP sets the
origin of the route imported through other IGP protocols as
INCOMPLETE
As-path AS-path attribute of route, which records all AS areas that the route passes.
With it, route loop can be avoided
Description Use the display bgp routing-table peer command to view the routing
information the specified BGP peer advertised or received.
Here, Appendant Flags indicates the appended flag, @ the route to be sent, ! the
reachable route, and ~ to cancel route. For detailed description of the fields in the
output information, see Table 75.
display bgp routing-table regular-expression 441
Description Use the display bgp routing-table regular-expression command to view the
routing information matching the specified AS regular expression
For detailed description of the fields in the output information, see Table 75.
Description Use the display bgp routing-table statistic command to view the statistics of
BGP routing information.
filter-policy export
Description Use the filter-policy export command to filter the advertised routes and only
the routes passing the filter can be advertised by BGP.
Use the undo filter-policy export command to cancel the filtration to the
advertised routes.
If a value is specified for the protocol argument, only the imported route
generated by the specified protocol is filtered and the imported routes generated
by other protocols are not affected. If no value is specified for the protocol
argument, the imported route generated by any protocol will be filtered.
Example # Use ACL 2000 to filter the routing information advertised by BGP.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] filter-policy 2000 export
filter-policy import
Parameter acl-number: Number of IP access control list, in the range of 2000 to 3999.
Description Use the filter-policy gateway import command to filter the learned routing
information advertised by the peer with the specified address.
Use the undo filter-policy gateway import command to cancel the filtration
to the routing information advertised by the peer with specified address.
Use the filter-policy import command to filter the received global routing
information. Use the undo filter-policy import command to remove the
filtration to the received global routing information.
This command can be used to filter the routes received by BGP and determines
whether to add the routes to the BGP routing table.
group
The basic configurations of members in a peer group must be the same as those
of the peer group. The BGP peer cannot exist independently, and it must belong to
a peer group. Therefore, when configuring a BGP peer, create a peer group first
and then add the BGP peer to the group.
Routing update policies of peer members must be the same as those of the peer
group. However, entry policies can be different.
import-route
Parameter protocol: Redistributes routes from the routing protocol, which can be direct,
ospf, ospf-ase, ospf-nssa, rip, isis or static at present.
process-id: Specific process ID, in the range of 1 to 65,535. This argument is valid
only when the protocol argument is ospf, ospf-ase, or ospf-nssa.
Description Use the import-route command to enable route redistribution from another
routing protocol.
ipv4-family
Description Use the ipv4-family multicast command to enter IPv4 multicast address family
view.
Use the undo ipv4-family multicast command to remove all the configuration
performed in IPv4 multicast address family view.
network
Description Use the network command to advertise the network segment route to the BGP
routing table.
By default, the BGP does not advertise any network segment routes.
peer advertise-community
Example # Transmit the community attribute to the peer group named test.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test advertise-community
peer allow-as-loop
Description Use the peer allow-as-loop command to allow the local AS number to appear
in the AS_Path attribute of the received route and configure the repeated times.
Related command: display current-configuration, display bgp routing-table peer, and display
bgp routing-table group.
peer as-number 447
Example # Set the times of repeating the local AS that learns routes from 1.1.1.1 to 2.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer 1.1.1.1 allow-as-loop 2
peer as-number
Description Use the peer as-number command to configure the AS number of a peer group.
Use the undo peer as-number command to delete the AS number of a peer
group.
Example # Set the AS number for the peer named test to 100.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test as-number 100
Description Use the peer as-path-acl export command to configure filtering Policy of BGP
advertised routes based on AS path list.
448 CHAPTER 33: BGP CONFIGURATION COMMANDS
Use the undo peer as-path-acl command to cancel the existing configuration.
You can use the peer as-path-acl export command on a peer group. In the peer
as-path-acl export command, the acl-number argument is the AS path list
number. It is configured by using the ip as-path-acl command, instead of the acl
command.
Example # Filter routes exported to the peer group (named test) based on AS path ACL 1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test as-path-acl 1 export
Description Use the peer as-path-acl import command to configure filtering Policy of BGP
received routes based on AS path list.
Use the undo peer as-path-acl import command to cancel the existing
configuration.
Example # Apply AS path ACL 1 in the peer group named test to filter BGP received routes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test as-path-acl 1 import
peer connect-interface 449
peer connect-interface
Description Use the peer connect-interface command to specify the source interface of a
route update packet.
Use the undo peer connect-interface command to restore the best source
interface.
By default, BGP uses the interface directly connected to the peer as the source
interface of route update packets.
Generally, BGP uses the optimal source interface for route update packets. In order
for the system to be able to send route update packets in the case that this
interface is faulty, you can configure the loopback interface as the source interface
of route update packets.
Example # Specify the source interface that sends route update packets to the peer group
named test as Loopback 0.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test connect-interface loopback 0
peer default-route-advertise
Description Use the peer default-route-advertise command to send the default route to
the peer group.
450 CHAPTER 33: BGP CONFIGURATION COMMANDS
For this command, no default route needs to exist in the routing table. A default
route is sent unconditionally to a peer/peer group with the next hop as itself.
peer description
Description Use the peer description command to configure the description information of
the peer/peer group.
Use the undo peer description command to cancel the description information
of the peer/peer group.
You need to create a peer group before you can configure the description of the
peer group.
Related command: display current-configuration, display bgp peer, and display bgp
routing-table group.
Example # Configure the description information of an existing peer group named group1
as ISP1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer group1 description ISP1
peer ebgp-max-hop 451
peer ebgp-max-hop
hop-count: Maximum hop value, in the range of 1 to 255. By default, the value is
64.
Description Use the peer ebgp-max-hop command to establish EBGP connection with the
peer on indirectly connected network.
By setting hop-count, you can also configure the maximum hop value of an EBGP
connection.
Example # Allow the establishment of an EBGP connection with the peer group named test
indirectly connected.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test ebgp-max-hop
peer enable
Description Use the peer enable command to enable the specified peer/peer group.
Use the undo peer enable command to disable the specified peer/peer group.
If the specified peer/peer group is disabled, the router will not exchange routing
information with the specified peer/peer group.
Example # Disable the specified peer 18.10.0.9. After the configuration, the local router
does not exchange BGP routing information with the peer 18.10.0.9..
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer 18.10.0.9 group group1
[SW7750-bgp] undo peer 18.10.0.9 enable
Description Use the peer filter-policy export command to configure the filter-policy list of
routes advertised by a peer group.
Use the undo peer filter-policy export command to cancel the existing
configuration.
You can configure the peer filter-policy export command on a peer group only.
Example # Configure to filter the routes advertised by the peer group named test by using
ACL 2000..
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test filter-policy 2000 export
Description Use the peer filter-policy import command to configure the filter-policy list of
the routes received by a peer/peer group.
Use the undo peer filter-policy import command to cancel the existing
configuration.
Related command: peer filter-policy export, ip as-path-acl, peer as-path-acl export and peer
as-path-acl import.
peer group
Description Use the peer group command to add a peer to the existing peer group.
When adding a peer to a EBGP peer group without AS number, you should also
specify the peer’s AS number. While adding a peer to a IBGP peer group or to a
EBGP peer group with AS number, you need not specify the AS number for the
peer.
454 CHAPTER 33: BGP CONFIGURATION COMMANDS
Description Use the peer ip-prefix export command to configure the route filtering policy
of routes advertised by the peer group based on the ip-prefix.
Use the undo peer ip-prefix export command to cancel the route filtering
policy of the peer/peer group based on the ip-prefix.
By default, the route filtering policy of the peer group is not specified.
Example # Configure the route filtering policy of the peer group based on the ip-prefix 1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer group1 ip-prefix list1 export
Description Use the peer ip-prefix import command to configure the route filtering policy
of routes received by the peer/peer group based on the ip-prefix.
Use the undo peer ip-prefix import command to cancel the route filtering
policy of the peer/peer group based on the ip-prefix.
By default, the route filtering policy of the peer/peer group is not specified.
Example # Configure the route filtering policy of the peer group based on the ip-prefix 1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer group1 ip-prefix list1 import
peer next-hop-local
View
BGP view
Description Use the peer next-hop-local command to configure the peer group to take its
own address as the next hop when routes are advertised to the peer group..
Example # When BGP distributes the routes to the peer group "test", it will take its own
address as the next hop.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test next-hop-local
peer password
Description Use the peer password command to configure MD5 authentication for BGP
during TCP connection setup.
By default, BGP does not perform MD5 authentication when TCP connection is set
up.
This command is used to configure MD5 authentication for the specific peer only
when the peer group to which the peer belongs is not configured with MD5
authentication. Otherwise, the peer should be consistent with the peer group.
Example # Adopt MD5 authentication on the TCP connection set up between the local
router at 10.1.100.1 and the peer router at 10.1.100.2.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer 10.1.100.2 password simple abc
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer 10.1.100.1 password simple abc
peer public-as-only
Description Use the peer public-as-only command to configure not to carry the AS number
when transmitting BGP update packets.
Generally, BGP transmits BGP update packets with the AS number (either public
AS number or private AS number). To enable some outbound routers to ignore the
AS number when transmitting update packets, you can configure not to carry the
AS number when transmitting BGP update packets.
Example # Configure not to carry the private AS number when transmitting BGP update
packets to the peer group named test.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test public-as-only
peer reflect-client
Description Use the peer reflect-client command to configure the local device as a route
reflector and configure a peer/peer group as the route reflector client.
Example # Configure the peer group "test" as the route reflector client.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test reflect-client
458 CHAPTER 33: BGP CONFIGURATION COMMANDS
peer route-limit
alert-only: Specifies to only print alert information and maintain the connection
between the router and the specified peer/peer group if the number of route
prefixes received from the peer/peer group exceeds prefix-number.
reconnect reconnect-time: Sets the interval at which the router reconnects to the
specified peer/peer group. reconnect-time is the interval, in seconds, at which the
router reconnects to the specified peer/peer group. The value of this argument
ranges from 1 to 65,535, with no default.
percentage-value: Threshold value for the router to send a notification (that is, the
router sends a notification when the percentage of the number of route prefixes
received to prefix-number reaches percentage-value). It ranges from 1 to 100 and
defaults to 75.
Description Use the peer route-limit command to set a limit on the number of route
prefixes to be received from the specified peer/peer group.
Example # With peer 100.1.1.1 not configured, limit the number of route prefixes to be
received from peer 100.1.1.1 to 10,000
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp]peer 100.1.1.1 route-limit 10000
Warning: No such peer
# Limit the number of route prefixes to be received from the peer group named
external to 10,000, specifying to print alert information when the number of route
prefixes received from external reaches 10,000 and to print notification
information when this number reaches 8,000.
# Limit the number of route prefixes to be received from the peer group named
external to 10,000, specifying to reconnect the router to external every 120
seconds and to print notification information when the number of route prefixes
received from external reaches 8,000.
# Limit the number of route prefixes to be received from the peer group named
external to 10,000, specifying to print notification information when this number
reaches 8,000.
# Cancel the limit on the number of route prefixes to be received from peer
100.1.1.1.
Description Use the peer route-policy export command to assign the Route-policy to the
routes advertised to the peer group.
Use the undo peer route-policy export command to delete the specified
Route-policy.
Example # Apply the Route-policy named test-policy to the route advertised from the peer
group named test.
460 CHAPTER 33: BGP CONFIGURATION COMMANDS
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test route-policy test-policy export
Description Use the peer route-policy import command to assign the Route-policy to the
route coming from the peer/peer group.
Use the undo peer route-policy import command to delete the specified
Route-policy.
The priority of the ingress routing policy configured for the peer is higher than that
for the peer group.
Example # Apply the Route-policy named test-policy to the route coming from the
peer/peer group test.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test route-policy test-policy import
peer route-update-interval
seconds: Minimum interval at which UPDATE packets are sent. It is in the range of
0 to 600 seconds. By default, the advertisement interval is 5 seconds for internal
peer group and 30 seconds for external peer group.
Example # Configure the interval of the BGP peer group "test" sending the route update
packet as 10 seconds.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test route-update-interval 10
peer timer
Description Use the peer timer command to configure the Keepalive and holdtime timers for
a peer/peer group.
Use the undo peer timer command to restore the default value of the timer.
The timer configured by using this command has a higher priority than the one
configured by using the timer command.
Example # Configure Keepalive and Holdtime intervals of the peer group "test".
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] peer test timer keep-alive 60 hold 180
462 CHAPTER 33: BGP CONFIGURATION COMMANDS
preference
undo preference
Parameter ebgp-value: Preference value for EBGP. It is in the range of 1 to 256 and defaults
to 256.
ibgp-value: Preference value for IBGP routes. It is in the range of 1 to 256 and
defaults to 256.
Description Use the preference command to set preference values for. routes learned from
external peers, routes learned from internal peers, and local-originated routes.
Use the undo preference command to restore the default preference values.
Example # Set the preferences of EBGP, IBGP and locally generated routes to 170.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] preference 170 170 170
reflect between-clients
Parameter None
By default, the clients of a route reflector are not fully interconnected and the
route is reflected from a client to another client by default via the route reflector. If
the clients are fully interconnected, you do not need to configure route reflection.
reflector cluster-id 463
reflector cluster-id
Parameter cluster-id: Cluster ID of the route reflector, an integer number ranging from 1 to
4,294,967,295, or an IP address in dotted decimal notation.
Description Use the reflector cluster-id command to configure the cluster ID of the route
reflector.
Use the undo reflector cluster-id command to delete the cluster ID of the route
reflector.
By default, each route reflector uses its Router ID as the cluster ID.
Generally, there is only one route reflector in a cluster. In this case, Router ID of the
route reflector is used to identify the cluster. Setting multiple route reflectors
enhances network stability. If multiple route reflectors are in a cluster, use this
command to configure the same cluster ID for all the route reflectors to prevent
route loop.
Example # A local router is one of the route reflectors in a cluster. Set the cluster ID of the
route reflector as 80.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] bgp 100
[SW7750-bgp] reflector cluster-id 80
refresh bgp
ip-address: Refreshes connection with a BGP peer with the specified IP address in
dotted decimal notation.
Description Use the refresh bgp command to manually refresh BGP connections. Refreshing
BGP connections can refresh the BGP routing table without interruption any BGP
connection and apply a new policy.
After a BGP connection is created, only incremental routes are sent. However, in
some cases, such as when BGP routing policy changes, the peer needs to
re-advertise .routes or to be resent routes so that the routes are filtered again
according to the new policy.
reset bgp
Description Use the reset bgp ip-address command to reset the connection of BGP with a
specified BGP peer.
Use the reset bgp all command to reset all the connections with BGP.
Use the reset bgp group group-name command to reset the BGP connection
with a specified peer group.
After a BGP routing policy or protocol configuration changes, resetting the BGP
connection will make the new configured policy take effect immediately.
reset bgp dampening 465
Example # After using the timer command to configure new Keepalive and Holdtime
intervals, you can reset all BGP connections for the new configuration to take
effects immediately.
<SW7750> reset bgp all
Description Use the reset bgp dampening command to reset the flapping attenuation
information of a route and release the suppression of a suppressed route.
as-path-acl acl-number: Resets the flap-info consistent with a specified filter list.
The range of the parameter acl-number is 1 to 199.
Description Use the reset bgp flap-info command to reset the flap info of a route.
Example # Reset the flap-info of all the routes that go through filter list 1.
466 CHAPTER 33: BGP CONFIGURATION COMMANDS
router id
undo router id
Use the undo router id command to cancel the router ID that has been set.
summary
Syntax summary
undo summary
Parameter None
After the summary is configured, BGP cannot receive the sub-network routes
imported from the IGP, so the amount of the routing information can be reduced.
timer
undo timer
Parameter keepalive-interval: Set the interval time value for keepalive time. The range is 1 to
65,535. By default, its value is 60 seconds.
holdtime-interval: Set the interval time value for hold time. The range is 3 to
65,535. By default, its value is 180 seconds.
Description Use the timer command to configure the Keep-alive and Hold-time timer of BGP.
Use undo timer command to restore the default value of the Keep-alive and
Hold-time of the timer.
undo synchronization
Parameter None
Description Use the undo synchronization command to cancel the synchronization of BGP
and IGP.
If the local BGP is not set synchronous with the IGP and the next hop of the
learned BGP route is reachable, the local BGP will add this BGP route into its
routing table immediately after it learns the route, rather than waiting till the IGP
also learns the route.
This command means BGP does not synchronize with IGP in the current system.
You need not configure it because the the Switch 7750 Family does not support
the synchronization of BGP and IGP.
468 CHAPTER 33: BGP CONFIGURATION COMMANDS
n The word "router" covered in the following text represent routers in common
sense and Ethernet switches running a routing protocol. To improve readability,
this will not be mentioned again in this manual.
apply as-path
Description Use the apply as-path command to add AS number before original AS path in
Router-policy.
Use the undo apply as-path command to remove the added AS number.
apply community
aa:nn: Community number. The value ranges of aa and nn are both from 1 to
65,535. &<1-13> means that you need to provide at least one and can provide up
to 13 community numbers.
Description Use the apply community command to set BGP community attributes in
Route-policy.
Use the undo apply community command to cancel the BGP community
attribute setting .
If the Route-policy matching conditions are met, BGP community attributes will be
changed by the apply community command.
Example # Create a Route-policy named setcommunity and set its node sequence number
as 16 and matching mode as permit. Enter route policy view and set matching
conditions and execute attribute change command
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy setcommunity permit node 16
[SW7750-route-policy] if-match as-path 8
[SW7750-route-policy] apply community no-export
apply cost
Parameter value: Route cost value of route information. The value ranges from 0 to
4294967295.
Description Use the apply cost command to configure the route cost value of route
information.
Use the undo apply cost command to cancel the apply statement.
An apply statement of Route-policy sets the cost of the routes passing the
filtering.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply ip next-hop, apply local-preference,
apply origin, and apply tag.
Example # Define an apply statement. When it is used for setting route information
attribute, it sets the route cost value of route information as 120.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy policy_10 permit node 12
[SW7750-route-policy] apply cost 120
apply cost-type
Parameter internal: Used in BGP, indicates that the IGP cost will be used as the BGP MED
value when BGP peer entity advertises routes to the EBGP peer entity. This
keyword is used only for IS-IS (representing that IS-IS interior cost will be used) and
is invalid for other protocols.
External: This keyword is used only for IS-IS and is invalid for other protocols.
Description Use the apply cost-type command to set the routing cost type of routing
information.
Use the undo apply cost-type command to cancel the setting argument.
apply ip next-hop
Description Use the apply ip next-hop command to set the IP address of next hop.
Use the undo apply ip next-hop command to cancel the setting argument.
An apply statement of Route-policy sets the next hop of the filtered packets.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply local-preference, apply cost, apply
origin and apply tag.
Example # Define an apply statement to set the next hop in the routing information to
193.1.1.8.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy 10 permit node 10
[SW7750-route-policy] apply ip next-hop 193.1.1.8
apply isis
Description Use the apply isis command to define an apply clause to import routing
information into the IS-IS area(s) at specified level(s).
apply local-preference 473
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply cost, apply origin and apply tag.
apply local-preference
Description Use the apply local-preference command to set local preference for routing
information.
Use the undo apply local-preference command to cancel the apply statement
setting.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply ip next-hop, apply local-preference,
apply origin and apply tag.
Example # Define an apply statement to set local preference for the routing information to
130.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy 10 permit node 10
[SW7750-route-policy] apply local-preference 130
apply origin
Parameter igp: Specifies that BGP routing information source is internal route
Description Use the apply origin command to set BGP routing information source.
Use the undo apply origin command to cancel the apply statement setting.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply ip next-hop, apply local-preference,
apply cost and apply tag.
Example # Define an apply statement to specify that the BGP routing information source is
igp.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy 10 permit node 10
[SW7750-route-policy] apply origin igp
apply tag
Parameter value: Tag value of route information. The value ranges from 0 to 4294967295.
Description Use the apply tag command to configure to set the tag area of RIP or OSPF route
information.
Use the undo apply tag command to cancel the apply statement.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, route-policy, apply ip next-hop, apply local-preference,
apply cost, and apply origin.
Example # Define an apply statement. When it is used for setting route information
attribute, it sets the tag area of route information as 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy policy_10 permit node 12
[SW7750-route-policy] apply tag 100
display ip ip-prefix 475
display ip ip-prefix
Description Use the display ip ip-prefix command to display an address prefix list.
Example # Display the information about the address prefix list named p1.
<SW7750> display ip ip-prefix p1
name index conditions ip-prefix / mask GE LE
p1 10 permit 10.1.0.0/16 17 18
Table 79 Field descriptions of the display ip ip-prefix command
Field Description
name Name of ip-prefix
index Internal sequence number of ip-prefix
conditions Mode: permit or deny
ip-prefix / mask Address and network segment length of ip-prefix
GE Greater-equal value of ip-prefix network segment length
LE Less-equal value of ip-prefix network segment length
display route-policy
Description Use the display route-policy command to display the configured Route-policy.
If you do not specify a route policy name, this command displays all route-policies
configured.
Field Description
Route-policy Name of ip-prefix
Permit 10 Information about the route-policy with the mode configured as permit and the
node as 10:
if-match (prefixlist) p1 if-match statement configured
apply cost 100 Apply routing cost 100 to the routes matching the
conditions defined by if-match statement
matched Number of routes matching the conditions set by
if-match statement
denied Number of routes not matching the conditions set by
if-match statement
ip-prefix-name: Name of the prefix address list used for filter, containing 1 to 19
characters.
Description Use the if-match { acl | ip-prefix } command to configure a rule for the
route-policy and specify an matching IP address range.
Use the undo if-match { acl | ip-prefix } command to cancel the setting of the
rule.
Related command: if-match interface, if-match ip next-hop, if-match cost, if-match tag,
route-policy, apply ip next-hop, apply cost, apply local-preference, apply
origin, and apply tag.
Example # Define an if-match statement. When the statement is used for filtering route
information, the route information filtered by route destination address through
address prefix list p1 is permitted to pass the if-match statement.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy policy_10 permit node 12
if-match as-path 477
if-match as-path
Description Use the if-match as-path command to match the AS path field of BGP routing
information.
Use the undo if-match as-path command to cancel the AS path field matching.
Example # Create as-path 2, which permits the routing information of AS 200 and AS 300.
Then create a Route-policy named test, and define an if-match statement quoting
the definitions of as-path 2 for node 10 of the Route-policy.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip as-path-acl 2 permit 200:300
[SW7750] route-policy test permit node 10
[SW7750-route-policy] if-match as-path 2
if-match community
whole-match: Exact match, which means that all communities and only these
communities must be displayed.
478 CHAPTER 34: IP ROUTING POLICY CONFIGURATION COMMANDS
Description Use the if-match community command to match community attributes of BGP
routing information.
if-match cost
Description Use the if-match cost command to configure one of the match rules of the
route-policy to match the cost of routing information.
Use the undo if-match cost command to cancel the configuration of the match
rule.
An if-match statement of the route-policy specifies the route cost of the routing
information meeting the condition.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
tag, route-policy, apply ip next-hop, apply cost, apply local-preference,
apply origin, and apply tag.
Example # Define an if-match statement and allow the routing information with a routing
cost of 8 to pass this if-match statement.
if-match interface 479
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy policy permit node 1
%New sequence of this list
[SW7750-route-policy] if-match cost 8
if-match interface
Description Use the if-match interface command to configure to match the route whose
next hop is the designated interface.
Use the undo if-match interface command to cancel the setting of matching
condition.
Related command: if-match { acl | ip-prefix }, if-match ip next-hop, if-match cost, if-match tag,
route-policy, apply ip next-hop, apply cost, apply local-preference, apply
origin, and apply tag.
Example # Define an if-match statement to match the route whose next hop interface is
Vlan-interface 1
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy policy permit node 1
%New sequence of this list
[SW7750-route-policy] if-match interface Vlan-interface 1
if-match ip next-hop
Parameter acl-number: Number of the ACL used for filter. It ranges from 2,000 to 2,999.
Description Use the if-match ip next-hop command to configure one of the match rules of
route-policy on the next hop address of the routing information.
Use the undo if-match ip next-hop command to cancel the setting of ACL
matching condition.
Use the undo if-match ip next-hop ip-prefix command to cancel the setting
of address prefix list matching condition.
An if-match statement of route-policy is used to specify the next hop matching the
routing information when filtering the routes. It performs filter by referencing an
ACL or an address prefix list.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match cost, if-match tag,
route-policy, apply ip next-hop, apply cost, apply local-preference, apply
origin, and apply tag.
Example # Define an if-match statement. It permits the routing information whose route
next hop address filtered through prefix address list p1 to pass this if-match
statement.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy policy permit node 1
%New sequence of this list
[SW7750-route-policy] if-match ip next-hop ip-prefix p1
if-match tag
Description Use the if-match tag command to configure to match the tag field of route
information.
Use the undo if-match tag command to cancel the existing matching rules.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, route-policy, apply ip next-hop, apply cost, apply local-preference,
apply origin, and apply tag.
ip as-path-acl 481
Example # Define an if-match statement to permit the OSPF route information whose tag
value is 8 to pass the if-match statement.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] route-policy policy permit node 1
%New sequence of this list
[SW7750-route-policy] if-match tag 8
ip as-path-acl
Use the undo ip as-path-acl command to cancel the defined regular expression.
Related command: peer as-path-acl export, peer as-path-acl import and display bgp
routing-table as-path-acl.
ip community-list
aa:nn: Community number. The value ranges of aa and nn are both from 1 to
65,535. &<1-12> means that you need to provide at least one and can provide up
to 12 community numbers.
Example # Define a community list, and specify not to send the routes with the community
attributes out of the local autonomous system.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip community-list 6 permit no-export-subconfed
ip ip-prefix
index-number: Identifier of an item in the prefix address list. The item with a
smaller index-number will be tested first.
permit: Specifies the match mode of the defined address prefix list items as
permit mode. If the permit mode is specified and the IP address to be filtered is in
the ip-prefix range specified by the item, the item is filtered through and the next
item is not tested. If the IP address to be filtered is not in the ip-prefix range
specified by the item, the next item is tested
deny: Specifies the match mode of the defined address prefix list items as deny
mode. If the deny mode is specified and the IP address to be filtered is in the
ip-prefix range specified by the item, the item is not filtered through and the next
item is not tested; otherwise, the next item is tested.
network: IP address prefix range (IP address). If it is specified as 0.0.0.0 0, all the IP
addresses are matched.
len: IP address prefix range (mask length). If it is specified as 0.0.0.0 0, all the IP
addresses are matched.
Description Use the ip ip-prefix command to configure an address prefix list or one of its
items. Use the undo ip ip-prefix command to delete an address prefix list or one
of its items.
An address prefix list is used for IP address filtering. An address prefix list may
contain several items, and each item specifies one address prefix range. The
inter-item filtering relation is "OR". That is, passing an item means filtering
through this address prefix list. Not filtering through any item means not filtering
through this prefix address list.
The address prefix range may contain two parts, which are determined by len and
[greater-equal, less-equal], respectively. If the prefix ranges of these two parts are
both specified, the IP to be filtered must match the prefix ranges of these two
parts.
If you specify network len as 0.0.0.0 0, it matches the default route only.
Example # Define an ip-prefix named p1 to permit only the routes whose mask lengths are
17 or 18 on network segment 10.0.192.0 8 to pass.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip ip-prefix p1 permit 10.0.192.0 8 greater-equal 17 less-e
qual 18
484 CHAPTER 34: IP ROUTING POLICY CONFIGURATION COMMANDS
route-policy
permit: Specifies the match mode of the defined Route-policy node as permit
mode. When a route entry meets all the if-match statements of the node, the
entry is permitted to filter through the node and the apply statement of the node
will be performed. If a route entry does not meet the if-match statement of the
node, the next node of the route-policy will be tested.
deny: Specifies the match mode of the defined Route-policy node as deny mode.
When a route entry meets all the if-match statements of the node, the entry is
prohibited from filtering through the node and the next node will not be tested.
node-number: Index of the node in the route-policy. When this route-policy is used
for routing information filter, the node with smaller node-number will be tested
first.
An if-match statement defines the match rules of this node. An apply statement
defines the actions after filtering through this node. The filtering relationship
between the if-match statements of the node is "and". That is, all if-match
statements of the node must be met.
The filtering relation between Route-policy nodes is "OR". That is, filtering
through one node means filtering through this Route-policy. If the information
does not filter through any node, it cannot filter through this Route-policy.
Related command: if-match interface, if-match { acl | ip-prefix }, if-match ip next-hop, if-match
cost, if-match tag, apply ip next-hop, apply local-preference, apply cost,
apply origin, and apply tag.
route-policy 485
Example # Configure Route-policy policy_10, with the node number of 12 and the match
mode of permit, and enter Route policy view.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750]route-policy policy_10 permit node 12
%New sequence of this list
[SW7750-route-policy]
486 CHAPTER 34: IP ROUTING POLICY CONFIGURATION COMMANDS
ROUTE CAPACITY CONFIGURATION
35 COMMANDS
n The word "router" covered in the following text represent routers in common
sense and Ethernet switches running a routing protocol. To improve readability,
this will not be mentioned again in this manual.
display memory
Parameter slot_number: Number of the slot whose route capacity information is displayed.
Description Use the display memory command to display the memory setting.
Field Description
System Total Memory(bytes) Free memory size, in bytes, of the switch
Total Used Memory(bytes) Occupied memory size, in bytes, of the switch
Used Rate Memory occupation rate
Parameter None
488 CHAPTER 35: ROUTE CAPACITY CONFIGURATION COMMANDS
Description Use the display memory limit command to display the memory setting and
state information related to route capacity.
This command displays the current memory limit configuration, free memory, and
state information about connections, such as times of disconnection, times of
reconnection, and whether the current state is normal.
Field Description
system memory safety Safety value of the switch memory.
system memory limit Lower limit of the switch memory.
auto-establish enabled Automatic connection restoration is enabled (If automatic
connection restoration is disabled, "auto-establish disabled"
is displayed).
Free Memory Size of the current free memory in bytes
The times of disconnect: 0 The times of the disconnection of the routing protocol is 0.
The times of reconnect: 0 The times of reconnection of the routing protocol is 0.
The current state: Normal The current state is normal (If the current state is emergent,
"Exigence" is displayed).
Parameter None
memory auto-establish enable 489
Description Use the memory auto-establish disable command to disable the automatic
restoration of routing protocol connection (even if the free memory recovers to a
safety value).
By default, when the free memory of the switch recovers to a safety value,
connections of all the routing protocols will always recover (when the free memory
of the switch decreases to a lower limit, the connection will be disconnected
forcibly).
After this command is used, connections of all the routing protocols will not
recover when the free memory of the switch recovers to a safety value. In this
case, you need to restart the routing protocol to recover the connections.
Related command: memory auto-establish enable, memory { safety | limit }*, display memory
limit.
Example # Disable automatic restoration of the routing protocol connections when the free
memory of the current switch recovers.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] memory auto-establish disable
Parameter None
By default, when the free memory of the switch recovers to a safety value,
connections of all the routing protocols will always recover (when the free memory
of the switch decreases to a lower limit, the connection will be disconnected
forcibly).
Related command: memory auto-establish disable, memory { safety | limit }*, display memory
limit.
Example # Enable automatic restoration of the connections of all the routing protocols
when the free memory of the current switch recovers..
490 CHAPTER 35: ROUTE CAPACITY CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] memory auto-establish enable
Parameter safety-value: Safety free memory of the switch , in Mbytes. Its value range
depends on the free memory of the current switch. The default is 40.
limit-value: Lower limit of the switch free memory, in Mbytes. Its value range
depends on the free memory of the current switch. The default is 30.
Description Use the memory limit limit-value command to configure the lower limit of the
switch free memory.
When the free memory of the switch is less than this limit, all the routing protocol
connections will be disconnected forcibly. The limit-value argument in the
command must be less than the current free memory safety value; otherwise, the
configuration will fail.
Use the memory safety safety-value command to configure the safety value of
the switch free memory.
Use the memory safety safety-value limit limit-value command to change both
the safety value and lower limit of the switch free memory. The value of
safety-value must be greater than that of limit-value; otherwise, the configuration
will fail.
Use the undo memory command to restore the default safety value and lower
limit of the switch free memory.
Related command: memory auto-establish disable, memory auto-establish enable, and display
memory limit.
Example # Set the lower limit of the switch free memory to 2 MB and the safety value to 4
MB.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] memory safety 4 limit 2
GMRP CONFIGURATION COMMANDS
36
Description Use the display gmrp statistics command to view the statistics information
about GMRP.
This command is used for displaying the statistics information about GMRP,
including the list of ports with GMRP enabled, GMRP status information, GMRP
failed registrations and last origin of GMRP packet data unit (PDU).
Parameter None
492 CHAPTER 36: GMRP CONFIGURATION COMMANDS
Description Use the display gmrp status command to view the status of global GMRP.
gmrp
Syntax gmrp
undo gmrp
Parameter None
Description Use the gmrp command to enable GMRP globally or enable GMRP on a port.
Use the undo gmrp command to disable GMRP globally or disable GMRP on a
port..
Executed in system view, this command will enable the global GMRP. After
performing this command in Ethernet port view, GMRP will be enabled on a port.
Parameter None
When IGMP Snooping is enabled on the switch, this command displays the
following information: IGMP Snooping status, aging time of the router port, query
response timeout time, and aging time of multicast member ports.
The above information shows: IGMP Snooping is enabled, the aging time of the
router port is 105 seconds, the query response timeout time is one second, and
the aging time of multicast member ports is 260 seconds.
Description Use the display igmp-snooping group command to display information about
the IP and MAC multicast groups under one specified VLAN (with vlan vlan-id) or
all VLANs (without vlan vlan-id).
This command displays the following information: VLAN ID, router port, IP
multicast group address, member ports included in the IP multicast group, MAC
multicast group, MAC multicast group address, and member ports included in the
MAC multicast group.
Vlan(id):2.
Total 1 IP Group(s).
Total 1 MAC Group(s).
Static router port(s):
Dynamic router port(s):
IP group(s):the following ip group(s) match to one mac group.
IP group address:225.1.1.1
Host port(s):GigabitEthernet2/0/1
MAC group(s):
MAC group address:0100-5e01-0101
Host port(s):GigabitEthernet2/0/1
Parameter None
This command displays the following information: the numbers of the IGMP
general query messages, IGMP group-specific query messages, IGMP V1 report
messages, IGMP V2 report messages, IGMP leave messages and error IGMP
messages received, and the number of the IGMP group-specific query messages
sent.
display multicast-vlan
Description Use the display multicast-vlan command to display the configuration of the
multicast VLAN.
If the vlan-id argument is not provided when the command is executed, the
configuration information about all the VLANs in the network is displayed.
■ VLAN 2 exists
■ VLAN 1024 is the subvlan of VLAN 2
496 CHAPTER 37: IGMP SNOOPING CONFIGURATION COMMANDS
igmp-snooping
Description Use the igmp-snooping enable command to enable the IGMP Snooping
feature.
igmp-snooping fast-leave
Parameter vlan-list: Multiple VLANs in the form of vlan-list = { vlan-id [ to vlan-id ] } & < 1-10
>. The vlan-id argument is the ID of the VLAN, in the range of 1 to 4,094.
&<1-10> means that you can provide the argument repeatedly for up to ten
times.
Description Use the igmp-snooping fast-leave command to enable IGMP fast leave
processing.
Normally, when receiving an IGMP Leave message, IGMP Snooping does not
immediately remove the port from the multicast group, but sends a group-specific
query message. If no response is received in a given period, it then removes the
port from the multicast group.
igmp-snooping general-query source-ip 497
n ■
■
This feature is effective for IGMP-V2-enabled clients.
When this feature is enabled, if one of the multiple users on a port leaves, the
multicast services for the other users in the same multicast group may be
interrupted.
Parameters current-interface: Configures to use the IP address of the virtual interface of the
current VLAN as the source IP address of IGMP general queries.
This command can take effect only if the IGMP Snooping querier function is
enabled on the switch.
By default, the Layer 2 multicast switch sends general query messages with the
source IP address of 0.0.0.0.
Examples # Configure the Layer 2 multicast switch to send general query messages with the
source IP address 2.2.2.2 in VLAN 3.
<SW7750> system-view
System view, return to user view with Ctrl+Z.
[SW7750] igmp-snooping enable
[SW7750] vlan 3
[SW7750-vlan3] igmp-snooping enable
[SW7750-vlan3] igmp-snooping querier
[SW7750-vlan3] igmp-snooping general-query source-ip 2.2.2.2
498 CHAPTER 37: IGMP SNOOPING CONFIGURATION COMMANDS
igmp-snooping group-limit
Parameter limit: Maximum number of multicast groups the port can join, in the range of 1 to
256.
vlan-list: List of VLANs. You need to provide this argument in the form of vlan-list
= { vlan-id [ to vlan-id ] }&<1-10>, where &<1-10> means that you can provide up
to 10 VLAN IDs/VLAN ID ranges for this argument. Normally, a VLAN ID can be a
number ranging from 1 to 4,094.
Example # Allow the Ethernet 2/0/1 port to join at most 200 multicast groups.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] igmp-snooping group-limit 200
igmp-snooping group-policy
vlan-id: ID of the VLAN for the Ethernet port, in the range of 1 to 4094.
igmp-snooping group-policy 499
You can configure multicast filtering ACLs globally or on the switch ports
connected to user ends so as to use the IGMP Snooping filter function to limit the
multicast streams that the users can access. With this function, you can treat
different VoD users in different ways by allowing them to access the multicast
streams in different multicast groups.
In practice, when a user orders a multicast program, an IGMP host report message
is generated. When the message arrives at the switch, the switch examines the
multicast filtering ACL configured on the access port to determine if the port can
join the corresponding multicast group or not. If yes, it adds the port to the
forward port list of the multicast group. If not, it drops the IGMP host report
message and does not forward the corresponding data stream to the port. In this
way, you can control the multicast streams that users can access.
An ACL rule defines a multicast address or a multicast address range (for example
224.0.0.1 to 239.255.255.255) and is used to.
■ Allow the port(s) to join only the multicast group(s) defined in the rule by a
permit statement.
■ Inhibit the port(s) from joining the multicast group(s) defined in the rule by a
deny statement.
n ■ One port can belong to multiple VLANs. But for each VLAN on the port, you
can configure only one ACL.
■ If the port does not belong to the specified VLAN, the filter ACL you configured
does not take effect on the port.
■ If no ACL rule is configured in the command, the system will reject the
multicast packets from all the multicast groups.
Example # Configure ACL 2000 to allow users under port Ethernet 2/0/1 to access the
multicast streams in groups 225.0.0.0 to 225.255.255.255.
■ Configure ACL 2000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 225.0.0.0 0.255.255.255
[SW7750-acl-basic-2000] quit
■ Create VLAN 2 and add Ethernet 2/0/1 port to VLAN 2.
[SW7750] vlan 2
[SW7750-vlan2] port Ethernet 2/0/1
Gigabit[SW7750-vlan2] quit
■ Configure ACL 2000 on Ethernet 2/0/1 to allow this VLAN 2 port to join only
the IGMP multicast groups defined in the rule of ACL 2000.
500 CHAPTER 37: IGMP SNOOPING CONFIGURATION COMMANDS
# Configure ACL 2001 to allow users under Ethernet 2/0/2 to access the multicast
streams in any groups except groups 225.0.0.0 to 225.0.0.255.
igmp-snooping host-aging-time
Parameter seconds: Aging time of multicast member ports, in the range of 200 to 1000 in
seconds.
The aging time of multicast member ports determines the refresh frequency of
multicast group members. In an environment where multicast group members
change frequently, a relatively shorter aging time is required.
Example # Set the aging time of multicast member ports to 300 seconds.
igmp-snooping max-response-time 501
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] igmp-snooping host-aging-time 300
igmp-snooping max-response-time
The maximum response time you configured determines how long the switch can
wait for a response to an IGMP Snooping query message.
igmp-snooping querier
Parameters None
Description Use the igmp-snooping querier command to enable the IGMP Snooping querier
feature in the current VLAN of the Layer 2 multicast switch.
Use the undo igmp-snooping querier command to disable the IGMP Snooping
querier feature in the current VLAN of the Layer 2 multicast switch.
502 CHAPTER 37: IGMP SNOOPING CONFIGURATION COMMANDS
By default, the IGMP Snooping querier feature of the Layer 2 multicast switch is
disabled.
igmp-snooping query-interval
Parameters seconds: Interval for the Layer 2 multicast switch to send general queries, ranging
from 1 to 300, in seconds.
By default, the Layer 2 multicast switch sends general queries at the interval of 60
seconds.
These commands are effective only after the IGMP Snooping querier feature is
enabled. The configured query interval must be longer than the maximum
response time for general queries.
Examples # Configure the Layer 2 multicast switch to send general queries at the interval of
100 seconds in VLAN 3.
<SW7750> system-view
System view, return to user view with Ctrl+Z.
[SW7750] igmp-snooping enable
[SW7750] vlan 3
[SW7750-vlan3] igmp-snooping enable
[SW7750-vlan3] igmp-snooping querier
[SW7750-vlan3] igmp-snooping query-interval 100
igmp-snooping report-aggregation
Parameter None
Example # Enable suppression on Layer 2 multicast IGMP report packets on the switch.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] igmp-snooping enable
[SW7750] igmp-snooping report-aggregation
igmp-snooping router-aging-time
Parameter seconds: Aging time of the router port, in the range of 1 to 1000 in seconds.
The router port here refers to the port connecting the Layer 2 switch to the router.
The Layer 2 switch receives IGMP general query messages from the router through
this port. The aging time of the router port should be a value about 2.5 times of
the general query interval.
Example # Set the aging time of the router port to 500 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] igmp-snooping router-aging-time 500
igmp-snooping version
Description Use the igmp-snooping version command to configure the IGMP Snooping
version in the current VLAN.
Use the undo igmp-snooping version command to restore the default IGMP
Snooping version.
Parameters group-address: Address of the multicast group that the simulated host will join.
source-address: Address of the multicast source that the simulated host will join.
This parameter is valid only when IGMPv3 Snooping is enabled in the VLAN.
Description Use the igmp host-join port command to enable simulated joining on the
specified port(s) in VLAN interface view.
Use the undo igmp host-join port command to remove the configuration.
igmp host-join
Parameters group-address: Address of the multicast group the simulated host is to join.
source-address: Address of the multicast source the simulated host is to join. This
parameter is valid only when IGMPv3 Snooping is enabled in a VLAN.
vlan-id: ID of the VLAN to which the port belongs, in the range of 1 to 4094.
Description Use the igmp host-join command to configure the current port as a simulated
multicast group member host.
Use the undo igmp host-join command to remove the current port as a
simulated multicast group member host.
c CAUTION:
■ Before configuring a simulated host, enable IGMP Snooping in VLAN view first.
■ The current port must belong to the specified VLAN; otherwise this
configuration does not take effect.
Examples # Configure Ethernet 2/0/1 as a simulated host for multicast source 1.1.1.1 and
multicast group 225.0.0.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]igmp-snooping enable
Enable IGMP-Snooping ok.
[SW7750]vlan 1
[SW7750-vlan1]igmp-snooping enable
[SW7750-vlan1]igmp-snooping version 3
[SW7750-vlan1]quit
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet 2/0/1] igmp host-join 225.0.0.1 source-ip 1.1.1.1 vlan 10
506 CHAPTER 37: IGMP SNOOPING CONFIGURATION COMMANDS
multicast-vlan enable
Parameter None
Description Use the multicast-vlan enable command to configure the current VLAN as a
multicast VLAN.
Use the undo multicast-vlan enable command to disable the current VLAN
from being a multicast VLAN.
c CAUTION:
■ You can configure up to 5 multicast VLANs for the device.
■ A multicast VLAN cannot be configured as a multicast sub-VLAN.
■ A multicast sub-VLAN cannot be configured as a multicast VLAN.
■ A multicast sub-VLAN cannot be configured as the sub-VLAN of other
multicast VLANs.
■ One multicast sub-VLAN is corresponding to only one multicast VLAN.
■ If multicast routing is enabled on a VLAN interface, the corresponding VLAN
cannot be configured as a multicast VLAN.
multicast-vlan subvlan
vlan-list: Multiple VLANs in the form of vlan-list = { vlan-id [ to vlan-id ] } & < 1-10
>. The vlan-id argument is the ID of the VLAN, in the range of 1 to 4,094.
reset igmp-snooping statistics 507
&<1-10> means that you can provide the argument repeatedly for up to ten
times.
Description Use the multicast-vlan subvlan command to configure one or multiple VLANs
as the sub-VLAN(s) of the multicast VLAN.
c CAUTION:
■ A multicast VLAN cannot be configured as a multicast sub-VLAN.
■ A multicast sub-VLAN cannot be configured as a multicast VLAN.
■ A multicast sub-VLAN cannot be configured as the sub-VLAN of other
multicast VLANs.
■ One multicast sub-VLAN is corresponding to only one multicast VLAN.
■ If multicast routing is enabled on a VLAN interface, the corresponding VLAN
cannot be configured as a multicast VLAN.
Example # Configure VLAN 2 to VLAN 5 as the sub-VLANs of the multicast VLAN 10.
<SW7750> system-view
Enter system view, return to user view with Ctrl+Z
[SW7750] igmp-snooping enable
[SW7750] vlan 10
[SW7750-vlan10] igmp-snooping enable
[SW7750-vlan10] multicast-vlan enable
[SW7750-vlan10] quit
[SW7750] multicast-vlan 10 subvlan 2 to 5
Parameter None
Description Use the reset igmp-snooping statistics command to clear IGMP Snooping
statistics.
Parameter group-address: Multicast group address to specify a multicast group, in the range
of 224.0.0.0 to 239.255.255.255.
Description Use the display mpm forwarding-table command to display the information
about multicast forwarding tables containing port information.
Only the (S, G) entry is displayed when the group address or source address is
specified. Otherwise, the command displays all the entries.
If you want to query the information about multicast forwarding tables without
port information, you can use the display multicast forwarding-table
command.
Example # Query the information about the multicast forwarding table containing port
information.
<SW7750> display mpm forwarding-table
Multicast Forwarding Cache Table
Total 1 entry(entries)
Field Description
Multicast Forwarding Cache Table Multicast forwarding table
Total 1 entry(entries) Total number of entries
00001 Serial number of an entry
510 CHAPTER 38: COMMON IP MULTICAST CONFIGURATION COMMANDS
Field Description
(120.0.0.2, 225.0.0.2) (S, G), namely, (source address, group address)
iif Vlan-interface1200 The ingress VLAN of the multicast forwarding table is
VLAN 1200.
1 oif(s): There is one egress VLAN in the multicast forwarding
table.
Vlan-interface32 The outgoing interface is VLAN-interface 32, with the
outgoing port of GigabitEthernet 3/0/19.
GigabitEthernet3/0/19...
Total 1 entry(entries) Listed One (S, G) entry is listed.
Parameter vlan vlan-id: Displays the VLAN where the multicast group information lies. If this
keyword is not specified, the command displays the multicast group information in
all VLANs.
Description Use the display mpm group command to display the information about the IP
multicast groups and MAC multicast groups in the specified VLAN or all the VLANs
on the switch.
■ VLAN identifier
■ Router port
■ Address of the IP multicast group
■ Member ports in the IP multicast group
■ MAC multicast group
■ Address of the MAC multicast group
■ Member ports in the MAC multicast group
c CAUTION:
■ The fields of this command are similar to those of the display igmp group
command, except that the information of the specific ports is added.
■ The fields of this command are the same as those of the display
igmp-snooping group command except that the displayed VLANs are of
different attributes.
■ The display igmp-snooping group command displays the information about
ports joining in layer-2 multicast groups in IGMP-snooping-enabled VLANs,
display multicast forwarding-table 511
while the display mpm group command displays the information about ports
joining in layer-3 multicast groups in IGMP-enabled VLANs.
Field Description
Vlan(id):1200. The information about the multicast groups in VLAN
1200 is displayed.
Static router port(s): Static router ports
Dynamic router port(s): Dynamic router ports
IP group(s):the following ip group(s) IP multicast groups corresponding to the same MAC
match to one mac group multicast group
IP group address:225.0.0.1 Address of the IP multicast group: 225.0.0.1
Host port(s): Ethernet2/0/1 Member ports of an IP multicast group: Ethernet 2/0/1
MAC group(s) MAC multicast group(s)
MAC group address:0100-5e00-0001 MAC multicast group address: 0100-5e00-0001
Host port(s): Ethernet2/0/1 Member ports of a MAC multicast group: Ethernet
2/0/1
Parameter group-address: Address of the specified multicast group, in the range of 224.0.0.0
to 239.255.255.255.
Field Description
Multicast Forwarding Cache Table Multicast forwarding table
Total 1 entries Total number of entries
00001 Serial number of an entry
(10.0.0.4, 225.1.1.1) (s,g)
iif Vlan-interface2, 0 oifs The incoming interface of the multicast forwarding
table is Vlan-interface 2, and the multicast forwarding
table does not have an outgoing interface.
Matched 122 pkts(183000 bytes), 122 packets which are 183,000 bytes in all match the
Wrong If 0 pkts (s, g) entry, and 0 wrong packets match with the (s, g)
entry.
Forwarded 122 pkts(183000 bytes)
122 packets which are 183,000 bytes in all are
forwarded.
Parameter group-address: Multicast group address to specify a multicast group and display
the routing table information corresponding to this group, in the range of
224.0.0.0 to 239.255.255.255.
Description Use the display multicast routing-table command to display the information
about the IP multicast routing table.
This command is used to display the information about the multicast routing table,
while the display multicast forwarding-table command is used to display the
information about the multicast forwarding table.
(4.4.4.4, 224.2.149.17)
Uptime: 00:15:16, Timeout in 272 sec
Upstream interface: Vlan-interface1(4.4.4.6)
Downstream interface list:
1 oifs
Vlan-interface2(2.2.2.4)
(4.4.4.4, 224.2.254.84)
Uptime: 00:15:16, Timeout in 272 sec
Upstream interface: Vlan-interface1(4.4.4.6)
Downstream interface list: NULL
(4.4.4.4, 239.255.2.2)
Uptime: 00:02:57, Timeout in 123 sec
Upstream interface: Vlan-interface1(4.4.4.6)
Downstream interface list: NULL
Matched 3 entries
Field Description
Multicast Routing Table Multicast routing table
Total 3 entries There are 3 entries in all in the multicast routing
table.
(4.4.4.4, 224.2.149.17) (S, G) of the multicast routing table
Uptime: 00:15:16, Timeout in 272 sec The entry is up for 15 minutes and 16 seconds,
and it times out in 272 seconds.
Upstream interface: Vlan-interface1(4.4.4.6)
The IP address of the upstream interface is
Downstream interface list:
4.4.4.6.
1 oifs
Downstream interface list:
Vlan-interface2(2.2.2.4)
The IP address of the downstream interface is
2.2.2.4.
Matched 3 entries Three entries match the configuration.
514 CHAPTER 38: COMMON IP MULTICAST CONFIGURATION COMMANDS
display multicast-source-deny
■ If you specify neither the port type nor the port number, the multicast source
port check information about all the ports on the switch is displayed.
■ If you specify the port type only, the multicast source port check information
about all ports of this type is displayed.
■ If you specify both the port type and the port number, the multicast source port
check information about the specified port is displayed.
Example # Display the multicast source port suppression state of Ethernet 2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] display multicast-source-deny Ethernet 2/0/1
# Display the multicast source port suppression state of all the 100M Ethernet
ports.
multicast route-limit
Parameter limit: Limit on the capacity of the multicast routing table, in the range of 0 to
1,024.
Description Use the multicast route-limit command to limit the capacity of the multicast
routing table. The router will drop the protocols and packets of the new (S, G).
Use the undo multicast route-limit command to restore the default limit on
the capacity of the multicast routing table.
multicast routing-enable 515
The limit on the capacity of the multicast routing table is 1024 by default.
If the number of existing routing entries exceeds the value to be configured when
you configure this command, the existing entries in the routing table will not be
removed. Instead, the system will prompt that the number of existing routing
entries is more than the limit to be configured.
If you execute this command again, the new configuration will overlap the former
configuration.
Example # Set the limit on the capacity of the multicast routing table to 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast route-limit 100
multicast routing-enable
Parameter None
Description Use the multicast routing-enable command to enable the IP multicast routing
feature.
multicast static-router-port
Description Use the multicast static-router-port command to specify the Ethernet port as
the static router port of the current VLAN.
c CAUTION:
■ Up to 256 static router ports can be configured in a system.
■ Reflection ports cannot be configured as static router ports.
■ A port in a multicast sub-VLAN cannot be configured as a static router port.
Description Use the multicast static-router-port vlan command to specify the current port
in the VLAN as a static router port.
c CAUTION:
■ Up to 256 static router ports can be configured in a system.
■ Reflection ports cannot be configured as static router ports.
■ A port in a multicast sub-VLAN cannot be configured as a static router port.
multicast wrongif-holdtime
Parameter seconds: Holdtime to prevent wrongif packets from being reported to the CPU, in
the range of 0 to 300 seconds. During the configuration, if the seconds argument
is less than 15, the system sets the holdtime to 15; if the seconds argument is
more than 15, the system sets the holdtime to the multiples of 15 according to the
user-defined range. For example, if you set the seconds argument to 14, the
system sets the holdtime to 15; if you set the seconds argument to 16, the system
sets the holdtime to 30; if you set the seconds argument to 31, the system sets the
holdtime to 45, and so on.
Description Use the multicast wrongif-holdtime command to set the holdtime to prevent
wrongif packets from being reported to the CPU.
By default, the holdtime to prevent wrongif packets from being reported to the
CPU is 15 seconds.
When the switch receives a multicast packet, the switch will search the multicast
forwarding entry according to the source address and destination address of the
packet. If the matching forwarding entry is found and the packet is received on
the right ingress of the forwarding entry, the packet will be forwarded according
to the forwarding entry. If the packet is not received on the right ingress of the
forwarding entry, the packet is regarded as a wrongif packet. The wrongif packet
will be reported to the CPU.
In some network, many wrongif packets will be reported to the CPU of the switch,
thus aggravating the workload of the switch. In this case, you can configure the
holdtime of wrongif packets, so that the wrongif packets will be dropped instead
of being forwarded to the CPU of the switch, and the CPU will be prevented from
being stricken by too many packets.
In the configured holdtime, wrongif packets are not reported to the CPU, so that
the CPU can be prevented from being stricken by too many multicast packets.
Parameter interface-list: Specifies Ethernet port list, expressed in the form of interface-list = {
{ interface-type interface-num | interface-name } [ to { interface-type
interface-num | interface-name } ] }&<1-10>. The interface-number argument
refers to one single Ethernet port, expressed in the form of interface-number = {
interface-type interface-number | interface-name }, where the interface-type
argument refers to the port type, the interface-number argument refers to the
port number, and the interface-name argument refers to the port name. For
meanings and value ranges of interface-type, interface-number and
interface-name, refer to “interface” on page 205.
By default, the multicast source port suppression feature is disabled on all the
ports.
The multicast source port suppression feature can filter multicast packets on the
unauthorized multicast source port in order to avoid the case that the user
connected to the port sets the multicast server privately.
In the system view, if the interface-list argument is not specified, the multicast
source port suppression feature is enabled globally, that is, the feature is enabled
on all the ports of the switch; if the interface-list argument is specified, the
multicast source port suppression feature is enabled on the specified ports. In
Ethernet port view, the interface-list argument cannot be specified in the
command and you can use the command to enable the multicast source port
suppression feature on the current port only.
c CAUTION: The multicast source port suppression feature is not supported on the
following I/O Modules: 3C16860, 3C16861, LS81FS24A, 3C16859, and 3C16858.
Example # Enable the multicast source port suppression feature on Ethernet 2/0/1 and
Ethernet 2/0/2.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast-source-deny enable interface Ethernet 2/0/1 to Ethernet 2/0/2
multicast-source-deny enable 519
multicast-source-deny enable
Parameter None
The multicast source port suppression feature can filter multicast packets on the
unauthorized multicast source port in order to avoid the case that the user
connected to the port sets the multicast server privately.
c CAUTION: The multicast source port suppression feature is not supported on the
following I/O Modules: 3C16860, 3C16861, LS81FS24A, 3C16859, and 3C16858.
Example # Enable the multicast source port suppression feature on Ethernet 2/0/1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] multicast-source-deny enable
Parameter statistics: Clears the statistics information about MFC forwarding entries if this
keyword is specified. Otherwise, MFC forwarding entries will be cleared.
Description Use the reset multicast forwarding-table command to clear MFC forwarding
entries or the statistics information about MFC forwarding entries.
The order of the group-address argument and the source-address argument can
be turned over. However, you must input valid group addresses and source
addresses. Otherwise, the system prompts error.
Related command: reset pim routing-table, reset multicast routing-table, and reset multicast
forwarding-table.
Example # Clear the forwarding entries whose group address is 225.5.4.3 in the MFC
forwarding table.
<SW7750> reset multicast forwarding-table 225.5.4.3
# Clear the statistics information about the forwarding entries whose group
address is 225.5.4.3 in the MFC forwarding table.
Parameter all: All routing entries in the multicast core routing table.
Description Use the reset multicast routing-table command to clear the routing entries in
the multicast core routing table and remove the corresponding forwarding entries
in the MFC forwarding table.
The order of the group-address argument and the source-address argument can
be turned over. However, you must input valid group addresses and source
addresses. Otherwise, the system prompts error.
Related command: reset pim routing-table, reset multicast forwarding-table and display
multicast forwarding-table.
Example # Clear the routing entries whose group address is 225.5.4.3 from the multicast
core routing table.
<SW7750> reset multicast routing-table 225.5.4.3
522 CHAPTER 38: COMMON IP MULTICAST CONFIGURATION COMMANDS
STATIC MULTICAST MAC ADDRESS
39 TABLE CONFIGURATION COMMANDS
Description Use the display mac-address multicast static command to display the
multicast MAC address entry/entries configured on the switch.
Executing this command with the count keyword will display the information
about the number of multicast MAC address entries configured on the switch.
Example # Display all the multicast MAC address entries manually added in VLAN 1.
<SW7750> display mac-address multicast count
1 mac address(es) found
Description Use the mac-address multicast command to manually add a multicast MAC
address entry.
524 CHAPTER 39: STATIC MULTICAST MAC ADDRESS TABLE CONFIGURATION COMMANDS
Each multicast MAC address entry contains: multicast address, forward port, VLAN
ID, and so on.
Example # Add a multicast MAC address entry, with the multicast address being
0100-5e0a-0805, the forwarding port being Ethernet 2/0/1, and the native VLAN
being VLAN 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mac-address multicast 0100-5e0a-0805 interface Ethernet 2/0/1 vlan 1
IGMP CONFIGURATION COMMANDS
40
n When running IP multicast protocols, Ethernet switches also provide the functions
of switches. We use routers in this manual to stand for not only the common
routers but also the layer 3 Ethernet switches running IP multicast protocols.
Description Use the display igmp group command to view the member information of the
IGMP multicast group.
You can specify to show the information of a group or the member information of
the multicast group on a VLAN interface. The displayed information contains the
multicast groups which are joined by the downstream hosts through IGMP or
through command line.
Field Description
Group address Multicast group address
Last Reporter The last host reporting to join in the multicast group
Uptime Time passed since multicast group is discovered (hh: mm: ss).
526 CHAPTER 40: IGMP CONFIGURATION COMMANDS
Field Description
Expires Specifies when the member will be removed from the multicast group (hh:
mm: ss).
Parameter interface-type interface-number: VLAN interface type and VLAN interface number
of the router which are used to specify a VLAN interface. If this argument is not
specified, the information about all the VLAN interfaces where IGMP is running is
displayed.
Description Use the display igmp interface command to view the IGMP configuration and
running information on a VLAN interface.
Example # View the IGMP configuration and running information of all VLAN interfaces.
<SW7750> display igmp interface
Vlan-interface1 (10.153.17.99):
IGMP is enabled
Current IGMP version is 2
Value of query interval for IGMP(in seconds): 60
Value of other querier time out for IGMP(in seconds): 120
Value of maximum query response time for IGMP(in seconds): 10
Value of robust count for IGMP: 2
Value of startup query interval for IGMP(in seconds): 15
Value of last member query interval for IGMP(in seconds): 1
Value of query timeout for IGMP version 1(in seconds): 400
Policy to accept IGMP reports: none
Querier for IGMP: 10.153.17.99 (this router)
IGMP group limit is 256
No IGMP group reported
Table 88 Field descriptions of the display igmp interface command
Field Description
IGMP version IGMP version
query interval Interval of general query
querier timeout Timeout time of the querier
max query response time Maximum time of response to query
robust count IGMP robust count, that is, the times of sending IGMP
group-specific query packets before the IGMP querier receives
the IGMP leave packet from the host
startup query interval The startup interval of IGMP to send query packets
last member query interval The interval of sending IGMP group-specific query packets
when the IGMP querier receives the IGMP leave packets from
the host
query timeout Query timeout in IGMP version 1
igmp enable 527
Field Description
Policy to accept IGMP reports The filtering policy of the IGMP multicast group to control the
access to IP multicast groups
Querier for IGMP IGMP querier
IGMP group limit Limit on the number of IGMP groups added to the VLAN
interface. The router does not process new IGMP packets
when the number of IGMP packet exceeds the limit
igmp enable
Parameter None
Use the undo igmp enable command to disable IGMP on the interface.
These commands do not take effect until the multicast routing feature is enabled.
After this configuration, start to configure other IGMP features.
igmp group-limit
Description Use the igmp group-limit command to limit the number of multicast groups on
an interface. The router does not process new packets when number of IGMP
groups exceeds the limit.
Use the undo igmp group-limit command to restore the default setting.
The new configuration overwrites the old one if you run the command for a
second time.
c CAUTION:
■ New groups cannot be added when the number of IGMP multicast groups has
exceeded the configured limit.
■ If the number of existing multicast groups on the interface is more than the
configured limit, the system will remove some old groups automatically to
satisfy the configured limit.
igmp group-policy
Parameter acl-number: Number of the basic IP access control list number, defining a multicast
group range. The value ranges from 2000 to 2999.
1: IGMP version 1.
port: Limits the IGMP packets passing the port and matching with the ACL rules.
Description Use the igmp group-policy command to set the filter of multicast groups on the
VLAN interface to control the access to IP multicast groups.
igmp group-policy vlan 529
By default, no filter is configured, that is, a host can join any multicast group.
If you do not want the hosts on the network that the VLAN interface is on to join
some multicast groups and receive packets from the multicast groups to use this
command to limit the range of the multicast groups serviced by the VLAN
interface.
# Configure that only the hosts matching ACL 2000 rules on VLAN-interface10
can be added to the multicast group whose IGMP version is specified to 2.
Parameter acl-number: Number of the basic IP access control list number, defining a multicast
group range. The value ranges from 2000 to 2999.
vlan-id: Specifies the ID for the VLAN to which the port belongs.
Description Use the igmp group-policy vlan command to set the filter of multicast groups
on a port to control the access to the IP multicast groups.
Use the undo igmp group-policy vlan command to remove the configured
filter.
By default, no filter is configured, that is, a host can join any multicast group.
This command has the same function with the igmp group-policy command.
Note that the configured port must belong to the specified VLAN, and the IGMP
protocol must be enabled on this port; otherwise, the configuration does not
function.
530 CHAPTER 40: IGMP CONFIGURATION COMMANDS
Related command: igmp group-policy, igmp host-join vlan, and igmp host-join port.
Example # Configure that only the hosts matching ACL 2000 rules on Ethernet 2/0/1 in
VLAN-interface 10 can be added to the multicast group.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] igmp enable
[SW7750-Vlan-interface10] quit
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] port access vlan 10
[SW7750-Ethernet2/0/1] igmp group-policy 2000 vlan 10
Parameter group-address: Multicast address of the multicast group that an interface will join.
Description Use the igmp host-join port command to configure simulated joining in VLAN
interface view.
Example # Add port Ethernet 2/0/1 in VLAN 10 to the multicast group 225.0.0.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] igmp host-join 225.0.0.1 port Ethernet 2/0
/1
igmp host-join vlan 531
Parameter group-address: Multicast address of the multicast group that an interface will join.
vlan-id: Specifies the ID for the VLAN to which the port belongs.
Description Use the igmp host-join vlan command to configure simulated joining in port
view.
Use the undo igmp host-join vlan command to restore the default.
igmp lastmember-queryinterval
Parameter seconds: Interval for the IGMP querier to send IGMP group-specific query packets
when it receives IGMP leave packets from the host. It is in the range of 1 second to
5 seconds.
Description Use the igmp lastmember-queryinterval command to set the Interval for the
IGMP querier to send IGMP group-specific query packets when it receives IGMP
leave packets from the host.
The interval for the IGMP querier to send IGMP group-specific query packets is one
second by default.
In the shared network, that is, a same network segment including multiple hosts
and multicast routers, the query router (also known as querier) is responsible for
maintaining the IGMP group membership on the interface. When the IGMP v2
host leaves a group, it sends an IGMP Leave message.
When receiving the IGMP Leave message, the IGMP querier must send the IGMP
group-specific query messages for specified times (by the robust-value argument
in the igmp robust-count command, with default value as 2) in a specified time
interval (by the seconds argument in the igmp lastmember-queryinterval
command, with default value as 1 second). If other hosts which are interested in
the specified group receive the IGMP query message from the IGMP query router,
they will send back the IGMP Membership Report message within the specified
maximum response time interval. If it receives the IGMP Membership Report
message within the defined period (equal to robust-value × seconds), the IGMP
query router continue to maintain the membership of this group. When receiving
no IGMP Membership Report message from any hosts within the defined period,
the IGMP query router considers it as timeout and stops membership maintenance
for the group.
This command is only available on the IGMP query router running IGMP v2. For
the host running IGMP v1, this command cannot take effect because the host
does not send the IGMP Leave message when it leaves a group.
igmp max-response-time
Parameter seconds: Maximum response time in the IGMP query messages in second in the
range from 1 to 25. By default, the value is 10 seconds.
The maximum query response time determines the period for a router to quickly
detect that there are no more directly connected group members in a LAN.
Example # Set the maximum response time carried in host-query packets to 8 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] igmp max-response-time 8
igmp proxy
Description Use the igmp proxy command to specify an interface of the Layer 3 endpoint
switch as the IGMP proxy interface of another interface.
You must enable the PIM protocol on the interface first before enabling the igmp
proxy command on the interface. Only one IGMP proxy interface can be
configured for an interface.
One interface cannot serve as the IGMP proxy interface of two or more interfaces.
If the IGMP proxy feature is configured on the same interface for multiple times,
the latest configuration takes effect.
c CAUTION:
■ Both multicast routing and IGMP must be enabled on a proxy interface.
■ Before configuring the igmp proxy command on an interface, make sure that
PIM DM is enabled on this interface. Otherwise, the IGMP proxy feature does
not take effect.
534 CHAPTER 40: IGMP CONFIGURATION COMMANDS
igmp report-aggregation
Parameter None
Example # Enable suppression on Layer 3 multicast IGMP report packets on the switch.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] igmp report-aggregation
igmp robust-count
Parameter robust-value: IGMP robust value, number of sending the IGMP group-specific
query packets after the IGMP querier receives the IGMP Leave packet from the
host. It is in the range of 2 times to 5 times.
Description Use the igmp robust-count command to set the number of sending the IGMP
group query message after the IGMP query router receives the IGMP Leave
message from the host.
Use the undo igmp robust-count command to restore the default value.
In the shared network, that is, a same network segment including multiple hosts
and multicast routers, the query router is responsible for maintaining the IGMP
group membership on the interface. When the IGMP v2 host leaves a group, it
sends an IGMP Leave message. When receiving the IGMP Leave message, IGMP
query router must send the IGMP group-specific query message for specified times
(by the robust-value parameter in the igmp robust-count command, with default
value as 2) in a specified time interval (by the seconds parameter in the igmp
lastmember-queryinterval command, with default value as 1 second). If other
hosts which are interested in the specific group receive the IGMP group-specific
query packets from the IGMP query router, they will send back the IGMP
Membership Report packets within the specified maximum response time interval.
If it receives the IGMP Membership Report packets within the defined period
(equal to robust-value × seconds), the IGMP query router continue to maintain the
membership of this group. When receiving no IGMP Membership Report packet
from any hosts within the defined period, the IGMP query router considers it as
timeout and stops membership maintenance for the group.
This command is only available on the IGMP query router running IGMP v2. For
the host running IGMP v1, this command cannot take effect because the host
does not send IGMP Leave packets when it leaves a group.
Parameter seconds: Presence time of the IGMP querier, in the range of 1 to 131,070 in
seconds.
By default, the presence time of the IGMP querier is twice the value of IGMP query
message interval, that is, 120 seconds.
On a shared network, i.e., there are multiple multicast routers on the same
network segment, the query router (querier for short) takes charge of sending
query messages periodically on the interface. If other non-queriers receive no
query messages within the valid period, the router will consider the previous
querier to be invalid and the router itself becomes a querier.
Parameter seconds: Interval at which a router transmits IGMP query messages, in the range
of 1 to 65,535 seconds.
Description Use the igmp timer query command to configure the interval at which a router
interface sends IGMP query messages.
Use the undo igmp timer query command to restore the default value.
Example # Configure to transmit the host-query message every 150 seconds via
VLAN-interface2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] igmp timer query 150
igmp version
2: IGMP Version 2.
Description Use the igmp version command to specify the version of IGMP that a router
uses.
Use the undo igmp version command to restore the default value.
All routers on a subnet must support the same version of IGMP. After detecting
the presence of IGMP Version 1 system, a router cannot automatically switch to
Version 1.
Description Use the reset igmp group command to delete an existing IGMP group from the
VLAN interface. The deleted group can be added to the VLAN interface again.
bsr-policy
undo bsr-policy
Parameter acl-number: ACL number imported in BSR filtering policy, in the range of 2,000 to
2,999.
Description Use the bsr-policy command to limit the range of legal BSRs to prevent BSR
proofing.
Use the undo bsr-policy command to restore the default setting, that is, no
range limit is set and all received messages are taken as legal.
In the PIM SM network using BSR (bootstrap router) mechanism, every router can
set itself as C-BSR (candidate BSR) and take the authority to advertise RP
information in the network once it wins in the contention. To prevent malicious
BSR proofing in the network, the following two measures need to be taken:
■ Prevent the router from being spoofed by hosts though faking legal BSR
messages to modify RP mapping. BSR messages are of multicast type and their
TTL is 1, so this type of attacks often hit edge routers. Fortunately, BSRs are
inside the network, while assaulting hosts are outside, therefore neighbor and
RPF checks can be used to stop this type of attacks.
■ If a router in the network is manipulated by an attacker, or an illegal router is
accessed into the network, the attacker may set itself as C-BSR and try to win
the contention and gain authority to advertise RP information among the
network. Since the router configured as C-BSR shall propagate BSR messages,
which are multicast messages sent hop by hop with TTL as 1, among the
network, then the network cannot be affected as long as the peer routers do
not receive these BSR messages. One way is to configure bsr-policy on each
router to limit legal BSR range, for example, only 1.1.1.1/32 and 1.1.1.2/32 can
be BSR, thus the routers cannot receive or forward BSR messages other than
these two. Even legal BSRs cannot contest with them.
Problems may still exist if a legal BSR is attacked, though these two measures can
effectively guarantee high BSR security.
540 CHAPTER 41: PIM CONFIGURATION COMMANDS
The source parameter in the rule command is translated as BSR address in the
bsr-policy command.
Related command: acl, rule (Basic ACL), rule (Advanced ACL), rule (Layer 2 ACL), and rule
(user-defined ACL).
Example # Configure BSR filtering policy on routers, only 101.1.1.1/32 can be BSR.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] pim
[SW7750-pim] bsr-policy 2000
[SW7750-pim] quit
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule 0 permit source 101.1.1.1 0
c-bsr
undo c-bsr
Parameter interface-type interface-number: Specifies the VLAN interface. The candidate BSR
is configured on the VLAN interface. PIM-SM must be enabled on the VLAN
interface first.
priority: Priority of the candidate BSR. The larger the value of the priority, the
higher the priority of the BSR. The value ranges from 0 to 255. By default, the
priority is 0.
Use the undo c-bsr command to remove the candidate BSR configured.
When configure the candidate BSR, the larger bandwidth should be guaranteed
since a great amount of information will be exchanged between BSR and other
devices in the PIM domain.
Example # Configure the switch as a BSR with priority 2 (and the C-BSR address is
designated as the IP address of VLAN-interface10).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
c-rp 541
c-rp
acl-number: Number of the basic ACL that defines a group range, which is the
service range of the advertised RP. The value ranges from 2000 to 2999.
priority-value: Priority value of candidate RP, in the range of 0 to 255. The greatest
value corresponds to the lowest priority level
Description Use the c-rp command to configure the router to advertise itself as a candidate RP.
Example # Configure the switch to advertise the BSR that the switch itself is the C-RP in the
PIM. The standard access list 2000 defines the groups related to the RP. The
address of C-RP is designated as the IP address of VLAN-interface10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 225.0.0.0 0.255.255.255
[SW7750] pim
[SW7750-pim] c-rp vlan-interface 10 group-policy 2000
crp-policy
undo crp-policy
Parameter acl-number: ACL number imported in C-RP filtering policy, ranging from 3000 to
3999.
Description Use the crp-policy command to limit the range of legal C-RP, as well as target
service group range of each C-RP, prevent C-RP proofing.
Use the undo crp-policy command to restore the default setting, that is, no
range limit is set and all received messages are taken as legal.
In the PIM SM network using BSR mechanism, every router can set itself as C-RP
(candidate rendezvous point) servicing particular groups. If elected, a C-RP
becomes the RP servicing the current group.
In BSR mechanism, a C-RP router unicast C-RP messages to the BSR, which then
propagates the C-RP messages among the network by BSR message. To prevent
C-RP spoofing, you need to configure crp-policy on the BSR to limit legal C-RP
range and their service group range. Since each C-BSR has the chance to become
BSR, you must configure the same filtering policy on each C-BSR router.
This command uses the ACLs numbered between 3000 and 3999. The source
parameter in the rule command is translated as C-RP address in the crp-policy
command, and the destination parameter as the service group range of this C-RP
address. For the C-RP messages received, only when their C-RP addresses match
the source address and their server group addresses are subset of those in ACL,
can the be considered as matched.
Related command: acl, rule (Basic ACL), rule (Advanced ACL), rule (Layer 2 ACL), and rule
(user-defined ACL).
Example # Configure C-RP filtering policy on the C-BSR routers, allowing only 1.1.1.1/32 as
C-RP and to serve only for the groups 225.1.0.0/16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] pim
[SW7750-pim] crp-policy 3000
[SW7750-pim] quit
[SW7750] acl number 3000
[SW7750-acl-adv-3000] rule 0 permit source 1.1.1.1 0 destination 225.1.0.0 0.0.255.255
Parameter None
display pim interface 543
Description Use the display pim bsr-info command to view the BSR information.
Field Description
BSR Bootstrap router
Priority Priority of BSR
Mask Length: 30 Length of mask
Expires: 00:01:55 Value of the timer
Description Use the display pim interface command to view the PIM configuration
information of the interface.
If neither the VLAN interface type nor the VLAN interface number is specified, the
PIM configuration information of all VLAN interfaces is displayed; if both the VLAN
interface type and the VLAN interface number are specified, the PIM configuration
information about the specified VLAN interface is displayed.
Example # Display the PIM configuration information about the VLAN interface.
<SW7750> display pim interface
PIM information of VLAN-interface 2:
IP address of the interface is 10.10.1.20
PIM is enabled on interface
PIM version is 2
PIM mode is Sparse
PIM query interval is 30 seconds
PIM neighbor limit is 128
PIM neighbor policy is none
Total 1 PIM neighbor on interface
PIM DR(designated router) is 10.10.1.20
544 CHAPTER 41: PIM CONFIGURATION COMMANDS
Field Description
PIM version Version of PIM
PIM mode PIM mode enabled on the VLAN interface (DM or SM)
PIM query interval Hello packet interval
PIM neighbor limit Limit of the PIM neighbors on the VLAN interface. No neighbor can be
added any more when the limit is reached
PIM neighbor policy Filtering policy of the PIM neighbors on the current interface
PIM DR Designated router
Description Use the display pim neighbor command to view the PIM neighbor information
discovered by the VLAN interface of the switch. If the VLAN interface parameter is
specified, only the PIM neighbor information about the specified VLAN interface is
displayed.
Example # Display the PIM neighbor information discovered by the VLAN interface of the
neighbor.
<SW7750> display pim neighbor
Neighbor’s Address Interface Name Uptime Expires
8.8.8.6 VLAN-interface10 01:29:18 00:01:34
Table 91 Field descriptions of the display pim neighbor command
Field Description
Neighbor’s Address Neighbor address
Interface name VLAN interface where the neighbor has been discovered
Uptime Time passed since the multicast group has been discovered
Expires Specifies when the member will be removed from the group
Description Use the display pim routing-table command to view information about the
PIM multicast routing table.
The displayed information about the PIM multicast routing table includes the SPT
information and RPF information.
Example # Display the information about the PIM multicast routing table.
<SW7750> display pim routing-table
PIM-SM Routing Table
Total 0 (*,*,RP)entry, 0 (*,G)entry, 2 (S,G)entries
(192.168.1.2, 224.2.178.130),
Protocol 0x20: PIMSM, Flag 0x4: SPT
UpTime: 23:59, Timeout after 196 seconds
Upstream interface: VLAN-interface2, RPF neighbor: NULL
Downstream interface list: NULL
(192.168.1.2, 224.2.181.90),
Protocol 0x20: PIMSM, Flag 0x4: SPT
UpTime: 23:59, Timeout after 196 seconds
Upstream interface: VLAN-interface2, RPF neighbor: NULL
Downstream interface list: NULL
Field Description
RP Rendezvous Point
(S,G) (source address, multicast group)
PIM-SM PIM Sparse Mode
SPT Shortest Path Tree
RPF Reverse Path Forwarding
546 CHAPTER 41: PIM CONFIGURATION COMMANDS
Description Use the display pim rp-info command to view the RP information of the
multicast group.
In addition, this command can also display the BSR and static RP information.
Group/MaskLen: 224.0.0.0/4
RP 4.4.4.6
Version: 2
Priority: 0
Uptime: 00:39:50
Expires: 00:01:40
Table 93 Field descriptions of the display pim rp-info command
Field Description
PIM-SM RP-SET information: Combination of RP information sets
BSR is: 4.4.4.6 BSR is the VLAN interface of 4.4.4.6 in the network
Group/MaskLen: 224.0.0.0/4 The RP whose group address is 224.0.0.0 and mask length is 4
is the virtual interface of the IP address 4.4.4.6.
RP 4.4.4.6
The priority of the version 2 RP is 0. It is up for 39 minutes and
Version: 2
50 seconds and expires in one minutes and forty seconds
Priority: 0
Uptime: 00:39:50
Expires: 00:01:40
pim
Syntax pim
undo pim
Parameter None
pim bsr-boundary 547
Description Use the pim command to enter PIM view to configure the global PIM parameters.
You cannot use the pim command to enable the PIM protocol.
Use the undo pim command to exit PIM view to system view and clear the global
PIM configuration parameters.
pim bsr-boundary
Parameter None
Description Use the pim bsr-boundary command to configure a VLAN interface of the
switch as the PIM domain boundary.
Use the undo pim bsr-boundary command to remove the configured PIM
domain boundary.
The switch does not set any PIM domain boundary by default.
After you use this command to set a PIM area boundary on a VLAN interface, all
Bootstrap messages cannot cross this domain boundary. However, the other PIM
packets can pass this domain boundary. In this way, you can divide the
PIM-SM-running network into multiple domains, each of which uses a different
Bootstrap router.
Note that you cannot use this command to set up a multicast boundary. Instead,
what you use this command to set up is just a PIM Bootstrap packet boundary.
pim dm
Syntax pim dm
undo pim dm
Parameter None
pim neighbor-limit
Parameter limit: Upper limit of PIM neighbors on the VLAN interface, in the range of 0~128.
Description Use the pim neighbor-limit command to limit the number PIM neighbors on a
router interface. No neighbor can be added to the router any more when the limit
is reached.
Use the undo pim neighbor-limit command to restore the default setting.
If the number of existing PIM neighbors exceeds the configured limit, they will not
be deleted.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] pim neighbor-limit 50
pim neighbor-policy
Description Use the pim neighbor-policy command to configure the router to filter the PIM
neighbors on the current VLAN interface.
Only the routers that match the filtering rule in the ACL can serve as a PIM
neighbor of the current VLAN interface.
The new configuration overwrites the old one if you run the command for a
second time.
Example # Configure that 10.10.1.2 can serve as a PIM neighbor of the Vlan-interface10,
but not 10.10.1.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] interface Vlan-interface 10
[SW7750-Vlan-interface10] pim neighbor-policy 2000
[SW7750-Vlan-interface10] quit
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 10.10.1.2 0
[SW7750-acl-basic-2000] rule deny source 10.10.1.1 0
pim sm
Syntax pim sm
undo pim sm
Parameter None
550 CHAPTER 41: PIM CONFIGURATION COMMANDS
You must enable the PIM-SM protocol on each VLAN interface respectively.
Generally, the PIM-SM protocol is enabled on each VLAN interface.
Parameter seconds: Interval at which a VLAN interface sends Hello packets, in the range of 1
second to 18,000 seconds.
Description Use the pim timer hello command to set the interval at which a VLAN interface
sends Hello packets.
Use the undo pim timer hello command to restore the default value of the
interval.
When the PIM-SM protocol is enabled on a VLAN interface, the switch will
periodically send Hello packets to the network devices supporting PIM. If the VLAN
interface receives Hello packets, it means that the VLAN interface has neighboring
network devices supporting PIM, and the VLAN interface will add the neighbors
into its own neighbor list. If the VLAN interface does not receive any Hello packet
from a neighbor in its neighbor list within the specified time, the neighbor is
considered to have left the multicast group.
register-policy
undo register-policy
Parameter acl-number: Number of IP advanced ACL, defining the rule of filtering the source
and group addresses. The value ranges from 3000 to 3999.
Description Use the register-policy command to configure a RP to filter the register packets
sent by the DR in the PIM-SM network and to accept the specified packets only.
Example # If the local device is the RP in the network, using the following command can
only accept multicast message register of the source sending multicast address in
the range of 225.1.0.0/16 on network segment 10.10.0.0/16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 3010
[SW7750-acl-adv-3010] rule permit ip source 10.10.0.0 0.0.255.255 destination 225.1.0.0 0.0.25
5.255
[SW7750-acl-adv-3010] quit
[SW7750] multicast routing-enable
[SW7750] pim
[SW7750-pim] register-policy 3010
spt-switch-threshold
Parameter traffic-rate: Rate of sending multicast packets, in kbps ranging from 0 to 65,535.
acl-number: Basic ACL number, in the range of 2000 to 2999. It defines a group
range in which the rate of sending multicast packets is suppressed.
In PIM-SM, Ethernet switches forward multicast packets through the RPT initially. If
the rate of sending multicast packets exceeds the specified threshold, the last-hop
switch of the multicast packets will perform RPT-to-SPT switchover.
n Only the threshold 0 and the infinity keyword are supported currently.
■ If the threshold is set to 0, the last-hop switch performs RPT-to-SPT switchover
upon receiving the first multicast packet.
■ The infinity keyword specifies that RPT-to-SPT switchover never takes place.
Example # Set the threshold for perform RPT-to-SPT switchover to 0, that is, specify the
last-hop switch to perform RPT-to-SPT switchover upon receiving the first multicast
packet.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] pim
[SW7750-pim] spt-switch-threshold 0
Description Use the reset pim neighbor command to clear all PIM neighbors or PIM
neighbors on the specified VLAN interface.
Description Use the reset pim routing-table command to clear all PIM route entries or the
specified PIM route entry.
You can type in source address first and group address after in the command, as
long as they are valid. Error information will be given if you type in invalid
addresses.
This command shall clear not only multicast route entries from PIM routing table,
but also the corresponding route entries and forward entries in the multicast core
routing table and MFC.
Related command: reset multicast routing-table, reset multicast forwarding-table, and display
pim routing-table.
Example # Clear the route entries with group address 225.5.4.3 from the PIM routing table.
<SW7750> reset pim neighbor 25.5.4.3
554 CHAPTER 41: PIM CONFIGURATION COMMANDS
source-policy
undo source-policy
Description Use the source-policy command to configure the router to filter the received
multicast data packets according to the source address or group address.
If resource address filtering is configured, as well as basic ACLs, then the router
filters the resource addresses of all multicast data packets received. Those not
matched will be discarded.
When this feature is configured, the router filters not only multicast data, but the
multicast data encapsulated in the registration packets.
The new configuration overwrites the old one if you run the command for a
second time.
Example # Set to receive the multicast data packets from source address 10.10.1.2, but
discard those from 10.10.1.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] multicast routing-enable
[SW7750] pim
[SW7750-pim] source-policy 2000
[SW7750-pim] quit
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 10.10.1.2 0
[SW7750-acl-basic-2000] rule deny source 10.10.1.1 0
static-rp
acl-number: Basic ACL, used to control the range of multicast group served by
static RP, which ranges from 2000 to 2999. If an ACL is not specified upon
configuration, static RP will serve all multicast groups; if an ACL is specified, static
RP will only serve the multicast group passing the ACL.
If both C-RPs and static RPs exist simultaneously, an RP is selected from them as
follows:
First, an RP is dynamically elected from the C-RPs based on the BSR mechanism
and the first eligible static RP is selected from the static RPs.
Then, a comparison takes places between the dynamic RP and the static RP. If the
preferred keyword is configured for the static RP, the static RP is preferred;
otherwise, the dynamic RP is preferred.
The new configuration overwrites the old one if you execute the command for a
second time.
cache-sa-enable
Syntax cache-sa-enable
undo cache-sa-enable
Parameter None
If the router is in the cache state, it sends no SA request message to the specified
MSDP peer when it receives a Join message.
Parameter None
Description Use the display msdp brief command to display the brief information of the
MSDP peer state.
Field Description
Peer’s Address Address of the MSDP peer
State State
Up/Down time Up/down time
AS AS number
SA Count SA count
Reset Count Times of peer connection resets
Description Use the display msdp peer-status command to display the detailed
information of the MSDP peer state.
source-address: Source address of the (S, G) entry. If you do not specify a source
address, the system displays all source information of the specified group. If you
specify neither a group address nor a source address, the system displays all SA
caches.
Description Use the display msdp sa-cache command to display (S, G) state learned from
an MSDP peer.
You must configure the cache-sa-enable command before the system can display
the cache state information.
Field Description
(Source, Group) (S, G) entry
Origin RP Source RP address
Pro Inter-domain unicast routing protocol
AS AS number
Uptime Up time
Expires Expiry of a (S, G) entry
560 CHAPTER 42: MSDP CONFIGURATION COMMANDS
Parameter autonomous-system-number: AS from which a source and group come The value
ranges from 1 to 65535.
Description Use the display msdp sa-count command to display the number of sources and
groups in MSDP cache.
Field Description
Peer’s Address Address of an MSDP peer
Number of SA Number of SA messages
AS AS number
Number of source Number of sources
Number of group Number of groups
import-source
undo import-source
Parameter acl-number: Basic or advanced IP ACL number, ranging from 2000 to 3999. An
ACL controls SA message advertisement by filtering sources (with a basic ACL) and
filtering sources or groups (with an advanced ACL). If you do not specify this
argument, no multicast source is advertised.
msdp 561
Description Use the import-source command to specify the (S, G) entries in this domain that
need to be advertised when an MSDP peer creates an SA message.
In addition, you can use the peer sa-policy import command or the peer
sa-policy export command to filter forwarded SA messages.
Example # Configure the specific (S, G) entry in the multicast routing table to be advertised
when an MSDP peer creates an SA message. For the specific (S, G) entry, the
multicast source is on the 10.10.0.0/16 segment, and the multicast group address
is 225.1.0.0/16.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 3101
[SW7750-acl-adv-3101] rule permit ip source 10.10.0.0 0.0.255.255 destination 225.1.0.0 0.0.25
5.255
[SW7750-acl-adv-3101] quit
[SW7750] msdp
[SW7750-msdp] import-source acl 3101
msdp
Syntax msdp
undo msdp
Parameter None
Description Use the msdp command to enable MSDP and enter MSDP view.
Use the undo msdp command to clear all configurations in MSDP view, release
resources occupied by MSDP, and restore the initial state.
msdp-tracert
rp-address: IP address of an RP
Description Use the msdp-tracert command to trace the path along which an SA message
travels, so as to locate message loss and minimize configuration errors. After
determining the path of the SA message, you can prevent SA flooding through
correct configuration.
# Specify the maximum number of hops to be traced and collect the detailed SA
and MSDP peer information.
Field Description
Router Address The address used by the local router to establish a
peering session with the Peer-RPF neighbor
Peer Uptime The time of the peering session between the local router
and a Peer-RPF neighbor, in minutes. The maximum
value is 255.
originating-rp 563
Field Description
Cache Entry Uptime Up time of the (S, G, RP) entry in SA cache of the local
router, in minutes. The maximum value is 255.
D-bit: 1 An (S, G, RP) entry exists in the SA cache of the local
router, but the RP is different from the RP specified in
the request message.
RP-bit: 1 The local router is an RP, but it may be another RP than
the source RP in the (S, G, RP) entry.
NC-bit: 0 SA cache is enabled on the local router.
C-bit: 1 A (S, G, RP) entry exists in SA cache of the local router.
Return Code: Reached-max-hops Maximum number of hops is reached. Another possible
value is:
Hit-src-RP: The router of this hop is the source RP in the
(S, G, RP) entry.
Next-Hop Router Address: 0.0.0.0 If you use the next-hop-info keyword, the address of
Peer-RPF neighbor is displayed.
Count of SA messages received for The number of SA messages received to trace the (S, G,
this (S,G,RP) RP) entry.
Count of encapsulated data packets The number of packets received to trace the (S, G, RP)
received for this (S,G,RP) entry.
SA cache entry uptime The up time of an SA cache entry
SA cache entry expiry time The expiry time of an SA cache entry
Peering Uptime: 10 minutes The time of the peering session between the local router
and a Peer-RPF neighbor
Count of Peering Resets Count of session resets
originating-rp
undo originating-rp
Description Use the originating-rp command to allow MSDP peer to use the specified
interface IP address as the RP address in the SA message when the MSDP peer
creates SA messages.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] originating-rp Vlan-interface 100
peer connect-interface
Parameter peer-address: IP address of the MSDP peer. This argument is expressed in dotted
decimal notation.
If the MSDP peer of the local router is also a BGP peer, the MSDP peer and the BGP
peer must use the same IP addresses.
Example # Configure the router whose IP address is 125.10 .7.6 as the MSDP peer of the
local router.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 connect-interface Vlan-interface 100
peer description
Parameter peer-address: IP address of the MSDP peer. This argument is expressed in dotted
decimal notation.
Description Use the peer description command to configure the description text for an
MSDP peer. Use the undo peer description command to delete the configured
description text.
Example # Add the description text "router CstmrA" for the router with the IP address
125.10.7.6 to specify that the router is customer A.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 description router CstmrA
peer mesh-group
Description Use the peer mesh-group command to add an MSDP peer to a mesh group.
Example # Configure the MSDP peer whose address is 125.10.7.6 as a member of the
mesh group Grp1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 mesh-group Grp1
peer minimum-ttl
Parameter peer-address: IP address of the MSDP peer to which the TTL threshold applies. This
argument is expressed in dotted decimal notation.
Description Use the peer minimum-ttl command to configure the minimum TTL value of
the multicast data packets encapsulated in SA messages and to be sent to the
specified MSDP peer.
Use the undo peerminimum-ttl command to restore the default TTL threshold.
Example # Set the TTL threshold to 10 so that only those multicast data packets with a TTL
value greater than or equal to 10 can be forwarded to the MSDP peer
110.10.10.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] peer 110.10.10.1 minimum-ttl 10
peer request-sa-enable
Parameter peer-address: IP address of the MSDP peer. This argument is expressed in dotted
decimal notation.
Description Use the peer request-sa-enable command to enable the router to send an SA
request message to the specified MSDP peer upon receipt of a Join message.
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 request-sa-enable
peer sa-cache-maximum
Parameter peer-address: IP address of the MSDP peer. This argument is expressed in dotted
decimal notation.
Description Use the peer sa-cache-maximum command to set the maximum number of SA
messages cached on the router.
Related command: display msdp sa-count, display msdp peer-status, display msdp brief.
Example # Configure the SA cache of the router so that it caches a maximum of 100 SA
messages received from the MSDP peer 125.10.7.6.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 sa-cache-maximum 100
peer sa-policy
Parameter import: Receives the SA messages from the specified MSDP peer.
acl acl-number: Specifies an advanced IP ACL number ranging from 3000 to 3999.
If no ACL is specified, all (S, G) entries are filtered out.
Description Use the peer sa-policy command to configure the filtering list for receiving or
forwarding the SA messages from the specified MSDP peer.
Example # Configure a filtering list so that only those SA messages permitted by the
advanced IP ACL 3100 are forwarded.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 3100
[SW7750-acl-adv-3100] rule permit ip source 170.15.0.0 0.0.255.255 destination 225.1.0.0 0.0.255.255
[SW7750-acl-adv-3100] quit
[SW7750] msdp
[SW7750-msdp] peer 125.10.7.6 connect-interface Vlan-interface 100
[SW7750-msdp] peer 125.10.7.6 sa-policy export acl 3100
peer sa-request-policy
Parameter peer-address: IP address of an MSDP peer, the SA request messages sent from
which will be filtered
acl-number: Basic IP ACL number, describing a multicast group address and in the
range of 2000 to 2999. If no ACL is specified, all SA request messages will be
ignored.
Description Use the peer sa-request-policy command to limit the SA request messages that
the router receives from an MSDP peer.
By default, the router receives all SA request messages from the MSDP peer.
Example # Configure an ACL so that SA request messages from the group address range of
225.1.1.0/24 and from the MSDP peer 175.58.6.5 are received and other SA
messages are ignored.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2001
[SW7750-acl-basic-2001] rule permit source 225.1.1.0 0.0.0.255
[SW7750-acl-basic-2001] quit
[SW7750] msdp
[SW7750-msdp] peer 175.58.6.5 sa-request-policy acl 2001
Parameter peer-address: IP address of the MSDP peer. This argument is expressed in dotted
decimal.
Description Use the reset msdp peer command to reset the TCP connection with the
specified MSDP peer and clear all statistics information of that MSDP peer.
Example # Reset the TCP connection with the MSDP peer 125.10.7.6 and the statistics of
the MSDP peer.
<SW7750> reset msdp peer 125.10.7.6
Parameter group-address: Group address; the cached (S, G) entries matching this address are
to be deleted from the SA cache. If no multicast group address is specified, all
cached SA entries will be cleared.
Description Use the reset msdp sa-cache command to clear cached SA entries of the MSDP
peer.
Example # Clear the cached entries whose group address is 225.5.4.3 from the SA cache.
<SW7750> reset msdp sa-cache 225.5.4.3
570 CHAPTER 42: MSDP CONFIGURATION COMMANDS
Parameter peer-address: Address of the MSDP peer whose statistics, reset information and
input/output information will be cleared. If no MSDP peer address is specified, the
statistics information of all MSDP peers will be cleared.
Description Use the reset msdp statistics command to clear the statistics information of
one or more MSDP peers without resetting the MSDP peer(s).
shutdown
Description Use the shutdown command to shut down the specified MSDP peer.
static-rpf-peer
If only one MSDP peer is configured with the peer command, the MSDP peer will
be regarded as a static RPF peer. When configuring multiple static RPF peers for
the same router, make sure you follow the following two configuration methods::
■ In the case that all the peers use the rp-policy keyword: Multiple static RPF
peers take effect at the same time. RPs in SA messages are filtered according to
the prefix list configured; only SA messages whose RP addresses pass the
filtering are received. If multiple static RPF peers using the same rp-policy
keyword are configured, when any of the peers receives an SA message, it will
forward the SA message to the other peers.
■ In the case that none of the peers use the rp-policy keyword: According to the
configuration sequence, only the first static RPF peer whose connection state is
UP is active. All the SA messages from this peer will be received and those from
other static RPF peers will be discarded. Once the active static RPF peer fails
(because the configuration is removed or the connection is terminated), based
on the configuration sequence, the subsequent first static RPF peer whose
connection is in the UP state will be selected as the active static RPF peer.
timer retry
Parameter seconds: Connection request retry interval in seconds, ranging from 1 to 60.
572 CHAPTER 42: MSDP CONFIGURATION COMMANDS
Description Use the timer retry command to configure a connection request retry interval.
Use the undo timer retry command to restore the default value.
display dot1x
interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of an Ethernet port and
interface-num identifies the number of the port. "&<1-10>" means that up to 10
port indexes/port index lists can be provided.
Description Use the display dot1x command to display 802.1x-related information, such as
configuration information, operation information (session information), and
statistics.
Related commands: reset dot1x statistics, dot1x, dot1x retry, dot1x max-user, dot1x
port-control, dot1x port-method, and dot1x timer.
GigabitEthernet2/0/1 is link-up
802.1X protocol is disabled
Proxy trap checker is disabled
Proxy logoff checker is disabled
Guest Vlan is disabled
Version-Check is disabled
The port is a(n) authenticator
Authenticate Mode is auto
Port Control Type is Mac-based
ReAuthenticate is disabled
Max on-line user number is 1024
......
(Display omitted here)
Table 98 Field descriptions of the display dot1x command
Field Description
Equipment 802.1x protocol is 802.1x protocol (802.1x for short) is enabled on the
enabled switch.
CHAP authentication is enabled CHAP authentication is enabled.
DHCP-launch is disabled With DHCP enabled, manually configuring a static IP
address triggers 802.1x authentication on the switch.
Proxy trap checker is disabled Whether to check a supplicant system that logs in
through a proxy:
■ Disable means the switch does not send Trap
packets when it detects that a supplicant system
logs in through a proxy.
■ Enable means the switch sends Trap packets when it
detects that a supplicant system logs in through a
proxy.
Proxy logoff checker is disabled Whether to check a supplicant system that logs in
through a proxy:
■ Disable means the switch does not disconnect a
supplicant system when it detects that the latter logs
in through a proxy.
■ Enable means the switch disconnects a supplicant
system when it detects that the latter logs in
through a proxy.
Guest Vlan is disabled The Guest VLAN function is disabled.
Transmit Period Setting of the Transmission period timer (the tx-period)
Handshake Period Setting of the handshake period timer (the
handshake-period)
ReAuth Period 802.1x re-authentication
Quiet Period Setting of the quiet period timer (the quiet-period)
Quiet Period Timer is disabled The quiet period timer is disabled.
Supp Timeout Setting of the supplicant timeout timer (supp-timeout)
Server Timeout Setting of the server-timeout timer (server-timeout)
dot1x 575
Field Description
Interval between version requests Client version request timer
maximal request times for version The maximum number of times that the switch can
information send version request packets to an access user
The maximal retransmitting times The maximum number of times that the switch can
send authentication request packets to a supplicant
system
Total maximum 802.1x user The maximum number of 802.1x users that a switch
resource number can accommodate
Total current used 802.1x resource The number of online supplicant systems
number
GigabitEthernet2/0/1 is link-up The GigabitEthernet 2/0/1 port is in up state.
802.1x protocol is disabled 802.1x is disabled on the port
Proxy trap checker is disabled Whether to check a supplicant system that logs in
through a proxy:
■ Disable means the switch does not detect supplicant
login through a proxy
■ Enable means the switch sends Trap packets when it
detects that a supplicant system logs in through a
proxy.
Proxy logoff checker is disabled Whether to check a supplicant system that logs in
through a proxy:
■ Disable means the switch does not detect supplicant
login through a proxy
■ Enable means the switch disconnects a supplicant
system when it detects that the latter logs in
through a proxy.
Guest Vlan is disabled The Guest VLAN function is disabled.
Version-Check is disabled The client version check function is disabled.
The port is a(n) authenticator The port acts as an authenticator.
Authenticate Mode is auto The port access control mode is auto.
Port Control Type is Mac-based The port access control method is MAC-based. That is,
supplicant systems are authenticated based on their
MAC addresses.
Max on-line user number The maximum number of online users that the port can
accommodate
... Information omitted here
dot1x
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
576 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
Description Use the dot1x command to enable 802.1x globally or for specified Ethernet ports.
Use the undo dot1x command to disable 802.1x globally or for specified
Ethernet ports.
When being executed in system view, the dot1x command enables 802.1x
globally if you do not provide the interface-list argument. And if you specify the
interface-list argument, the command enables 802.1x for the specified Ethernet
ports. When being executed in Ethernet port view, this command enables 802.1x
for the current Ethernet port only. In this case, the interface-list argument is not
needed.
Configurations of 8021.x and the maximum number of MAX addresses that can
be learnt are mutually exclusive. This means that when 802.1x is enabled for a
port, it cannot also have the maximum number of MAX addresses to be learned
configured at the same time. And if you configure the maximum number of MAX
addresses that can be learnt for a port, 802.1x is unavailable to it.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dot1x
dot1x authentication-method
CHAP applies a three-way handshaking procedure. In this method, user names are
transmitted rather than passwords. Therefore this method is safer.
Note that the RADIUS server must support PAP, CHAP, or EAP authentication
before the corresponding authentication can be implemented.
dot1x dhcp-launch
Parameter None
578 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
dot1x guest-vlan
Description Use the dot1x guest-vlan command to enable the Guest VLAN function for
specified ports.
Use the undo dot1x guest-vlan command to disable the Guest VLAN function
for specified ports.
■ If you do not provide the interface-list argument, these two commands apply
to all ports of the switch.
■ If you specify the interface-list argument, these two commands apply to the
specified Ethernet ports.
dot1x max-user 579
When being executed in Ethernet port view, these two commands apply to the
current Ethernet port only. In this case, the interface-list argument is not needed.
c CAUTION:
■ The Guest VLAN function is available only when the switch operates in a
port-based authentication mode.
■ Only one Guest VLAN can be configured for each switch.
■ The Guest VLAN function is unavailable when the dot1x dhcp-launch
command is configured on the switch, because the switch does not send
authentication request packets.
dot1x max-user
Parameter user-number: Maximum number of users a port can accommodate, ranging from
1 to 1024. The default number is 1024.
Description Use the dot1x max-user command to set the maximum number of supplicant
systems an Ethernet port can accommodate.
Use the undo dot1x max-user command to revert to the default maximum
supplicant system number.
When being executed in system view, these two commands apply to all Ethernet
ports of the switch if you do not provide the interface-list argument. And if you
580 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
When being executed in Ethernet port view, these two commands apply to the
current Ethernet port only. In this case, the interface-list argument is not needed.
Example # Configure the maximum number of users that Ethernet 3/01 can accommodate
to be 32.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dot1x max-user 32 interface Ethernet 2/0/1
dot1x port-control
Parameter auto: Specifies to operate in auto access control mode. In this mode, a port is
initialized to take all users as unauthorized: it only allows EAPoL packets to pass
through and grants users no permission to network resources. Only after the users
have passed the authentication will the port classify them as authorized and allow
them access to the network resources, which is often the case.
interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of a port and
interface-num identifies the port number. "&<1-10>" means that up to 10 port
indexes/port index lists can be provided.
Description Use the dot1x port-control command to specify the access control method for
specified Ethernet ports.
Use the undo dot1x port-control command to revert to the default access
control method.
Use the dot1x port-control command to configure the access control method
for specified 802.1x-enabled ports.
When being executed in system view, these two commands apply to all Ethernet
ports of the switch if you do not provide the interface-list argument. And if you
specify the interface-list argument, these commands apply to the specified
Ethernet ports.
When being executed in Ethernet port view, these two commands apply to the
current Ethernet port only. In this case, the interface-list argument is not needed.
dot1x port-method
interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of a port and
interface-num identifies the port number. "&<1-10>" means that up to 10 port
indexes/port index lists can be provided.
The default access control method is MAC address-based. That is, the macbased
keyword is specified by default.
Description Use the dot1x port-method command to specify the access control method for
specified Ethernet ports.
Use the undo dot1x port-method command to revert to the default access
control method.
■ If you specify to authenticate supplicant systems by MAC addresses (that is, the
macbased keyword is specified), all supplicant systems connected to the
582 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
specified Ethernet ports are authenticated separately. And if an online user logs
off, others are not affected.
■ If you specify to authenticate supplicant systems by port numbers (that is, the
portbased keyword is specified), all supplicant systems connected to a
specified Ethernet port are able to access the network without being
authenticated if a supplicant system among them passes the authentication.
And when the supplicant system logs off, the network is inaccessible to all
other supplicant systems either.
■ Changing the access control method on a port by the dot1x port-method
command will forcibly log out the online 802.1x users on the port.
When being executed in system view, these two commands apply to all Ethernet
ports of the switch if you do not provide the interface-list argument. And if you
specify the interface-list argument, these commands apply to the specified
Ethernet ports. When being executed in Ethernet port view, these two commands
apply to the current Ethernet port only. In this case, the interface-list argument is
not needed.
dot1x quiet-period
Parameter None
Description Use the dot1x quiet-period command to enable the quiet-period timer.
Use the undo dot1x quiet-period command to disable the quiet-period timer.
dot1x re-authenticate
When you use this command in system view, if you do not specify a port, this
command will enable 802.1x re-authentication on all ports; if you provide a value
for the interface-list argument, this command will enable 802.1x on the specified
port.
When you use this command is Ethernet port view, the interface-list argument is
not available and 8021.x re-authentication is enabled on the current port only.
n ■ 802.1x must be enabled globally and on the current port before 802.1x
re-authentication can be configured on the port.
■ After re-authentication is enabled on a port, you cannot change the dynamic
VLAN delivery attribute value for the port; if you do so, the re-authentication
will cause users to be offline.
dot1x retry
Description Use the dot1x retry command to specify the maximum number of times that a
switch will send authentication request packets to supplicant systems.
Use the undo dot1x retry command to revert to the default value.
Example # Specify the maximum number of times that the switch will resend authentication
request packets to be 9.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dot1x retry 9
dot1x retry-version-max
Description Use the dot1x retry-version-max command to set the maximum number of
times that a switch will resend version request packets to a connected supplicant
system.
dot1x supp-proxy-check 585
By default, the switch can send version request packets to an access user for up to
three times repeatedly.
Having sent a version request packet to the supplicant system, the switch will
resend the packet if within a preset period (as determined by the client version
timer) it still has not received any response from the supplicant system. When the
number set by this command has reached and there is still no response from the
supplicant system, the switch will continue its following authentication without
sending further version requests. This command applies to all ports.
Example # Configure the maximum number of times that the switch will resend version
request packets to be 6.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dot1x retry-version-max 6
dot1x supp-proxy-check
trap: Sends Trap packets if a supplicant system logs in through a proxy or through
multiple network modules.
interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of a port and
interface-num identifies the port number. "&<1-10>" means that up to 10 port
indexes/port index lists can be provided.
Description Use the dot1x supp-proxy-check command to enable the checking and access
control of the users who log in through a proxy.
In system view, after enabling global supplicant proxy checking, you also need to
enable this function on specific ports for the function to take effect on these ports.
A switch may take the following actions in response to any of the above three
cases:
■ Disconnects the supplicant system and sends Trap packets (using the dot1x
supp-proxy-check logoff command.)
■ Sends Trap packets without disconnecting the supplicant system (using the
dot1x supp-proxy-check trap command.)
■ The 802.1x supplicant system must be able to detect whether the client uses
multiple network modules, a proxy, or IE proxy;
■ CAMS has disabled the use of multiple network modules, a proxy server, and
an IE proxy server.
n ■ The supplicant system proxy checking function needs the support of 3Com’s
802.1x client program (V1.29 or later version).
■ The supplicant system proxy checking function takes effect only after it has
been enabled on CAMS and the client version checking function is enabled on
the switch (using the dot1x version-check command).
Or
dot1x timer
Parameter handshake-period: Handshake period timer, triggered when the user has
successfully passed the authentication. It sets the time interval for the switch to
resend handshake request packets to check whether the user is still online. If, after
N times (as specified by the dot1x retry command) of retries, the switch still has
not received any response packet from the supplicant system, it will assume that
the user is offline.
quiet-period: Quiet-period timer, triggered after the user has failed the
authentication. After the time (as specified by the quiet-period timer) has elapsed,
the user can resend the authentication request. During the period, the switch will
perform no authentication.
tx-period: This timer sets the tx-period and is triggered by the switch in one of
the following two cases: The first case is when the client requests for
authentication. The switch sends a unicast request/identity packet to a supplicant
system and then enables the transmission timer. The switch sends another
request/identity packet to the supplicant system if the supplicant system fails to
588 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
send a reply packet to the switch when this timer times out. The second case is
when the switch authenticates the 802.1x client who does not request for
authentication actively. The switch sends multicast request/identity packets
continuously through the port enabled with 802.1x function, with the interval of
tx-period.
server-timeout-value: Value of the server timeout timer, in seconds. This value can
range from 100 to 300 with a default value of 100.
Description Use the dot1x timer command to set a specified 802.1x timer.
Use the undo dot1x timer command to resume the default value of a specified
802.1x timer.
dot1x version-check
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of a port and
interface-num identifies the port number. "&<1-10>" means that up to 10 port
indexes/port index lists can be provided.
Description Use the dot1x version-check command to enable 802.1x client version
checking for specified Ethernet ports.
Use the undo dot1x version-check command to disable 802.1x client version
checking for specified Ethernet ports.
Example # Configure Ethernet 2/0/1 port to check the version of the 802.1x client upon
receiving authentication packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] dot1x version-check
Parameter interface-list: Ethernet port list. You can specify multiple Ethernet ports by
providing this argument in the form of interface-list = { interface-name [ to
interface- name] & < 1-10 >. The interface-name argument is the port index of an
Ethernet port and can be specified in this form: interface-name = { interface-type
interface-num }, where interface-type specifies the type of a port and
590 CHAPTER 43: 802.1X CONFIGURATION COMMANDS
Description Use the reset dot1x statistics command to clear 802.1x-related statistics.
In this command:
display habp
Parameter None
Description Use the display habp command to display HABP configuration and status
information.
Field Description
HABP Mode Indicates the HABP mode of the switch. A switch can operate
as an HABP server (displayed as Server) or an HABP client
(displayed as Client).
Sending HABP request HABP request packets are sent once in every 20 seconds.
packets every 20 seconds
Bypass VLAN Indicates the ID(s) of the VLAN(s) to which HABP request
packets are sent
Parameter None
Description Use the display habp table command to display the MAC address table
maintained by HABP.
592 CHAPTER 44: HABP CONFIGURATION COMMANDS
Field Description
MAC MAC addresses listed in the HABP MAC address table.
Holdtime Hold time of the entries in the HABP MAC address table. An address
will be removed from the table if it has not been updated during the
hold time.
Receive Port The port from which a MAC address is learned
Parameter None
Description Use the display habp traffic command to display statistics on HABP packets.
Field Description
Packets output Number of the HABP packets sent
Input Number of the HABP packets received
ID error Number of HABP packets with ID errors
Type error Number of HABP packets with type errors
Version error Number of HABP packets with version errors
Sent failed Number of HABP packets that failed to be sent
habp enable
Parameter None
Description Use the habp enable command to enable HABP for a switch.
Use the undo habp enable command to disable HABP for a switch.
If an 802.1x-enabled switch does not have HABP enabled, it cannot manage the
switches attached to it.
Description Use the habp server vlan command to configure a switch to operate as an
HABP server and HABP packets to be broadcast in specified VLAN.
Use the undo habp server vlan command to revert to the default HABP mode.
To specify a switch to operate as an HABP server, you need to enable HABP (using
the habp enable command) for the switch first. Even if HABP is not enabled, the
client can still configure the switch to work as an HABP client, although this has no
effect.
Example # Specify the switch to operate as an HABP server and the HABP packets to be
broadcast in VLAN 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] habp server vlan 2
habp timer
Parameter interval: Interval (in seconds) to send HABP request packets. This argument ranges
from 5 to 600.
Description Use the habp timer command to set the interval for a switch to send HABP
request packets.
Use the undo habp timer command to revert to the default interval.
The default interval for a switch to send HABP request packets is 20 seconds.
Example # Configure the switch to send HABP request packets once in every 50 seconds
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] habp timer 50
AAA CONFIGURATION COMMANDS
45
access-limit
undo access-limit
Parameter disable: Specifies not to limit the number of access users that can be contained in
current ISP domain.
Description Use the access-limit command to set the maximum number of access users that
can be contained in current ISP domain.
Use the undo access-limit command to restore the default maximum number.
By default, the number of access users that can be contained in current ISP
domain is unlimited.
Because resource contention may occur between access users, there is a need to
properly limit the number of access users in an ISP domain to provide reliable
performance to the users in the ISP domain.
attribute
mac: Sets the MAC address to which the user is bound. mac-address is in
dash-delimited hexadecimal notation, that is, in the H-H-H format.
idle-cut second: Allows/disallows the enabling of the idle-cut function by the local
user (The data for idle-cut operation depends on the configuration in the ISP
domain). The second argument is the idle time (in seconds) before cutting down. It
ranges from 60 to 7200.
vlan vlan-id: Sets the VLAN to which the user is bound; that is, sets which VLAN
the user belongs to. vlan-id is an integer ranging from 1 to 4094.
nas-ip ip-address: Sets the permitted IP address of the network access server
(RADIUS client) when the local device serves as the RADIUS sever. ip-address is in
dotted decimal notation and is 127.0.0.1 (representing this device) by default.
port port-number: Sets the access limit on the specified port of the network
access server when the local device serves as the RADIUS server. If this parameter is
specified, the RADIUS sever accepts the authentication requests only from the
specified port and drops those from other ports. port-number is in the format of
"slot number subslot number port number". If the port has no subslot number,
just input 0 for this item.
Description Use the attribute command to set the attributes of a local user.
Use the undo attribute command to cancel attribute settings of the local user.
Note that if the user is bound to a remote port, you must specify the nas-ip
keyword. If the user is bound to a local port, you need not specify the nas-ip
keyword.
accounting
undo accounting
Description Use the accounting command to configure the accounting scheme that will be
used by current ISP domain.
Use the undo accounting command to remove the accounting scheme used by
current ISP domain.
If the accounting command is used in ISP domain view, the system uses the
scheme referenced in this command to charge the users. Or else, the system uses
the scheme referenced in the scheme command to charge the users.
Example # Specify "radius" as the RADIUS accounting scheme that will be referenced by
current ISP domain.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] accounting radius-scheme radius
accounting optional
Parameter None
When the system charges an online user but it does not find any available RADIUS
accounting server or fails to communicate with any RADIUS accounting server, the
user can continue the access to network resources if the accounting optional
command has been used; otherwise, the user is disconnected from the system.
The accounting optional command is often used in the cases where only
authentication is needed and no accounting is needed.
Example # Turn on the accounting-optional switch for the ISP domain named aabbcc.net.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] accounting optional
authentication
undo authentication
If you execute the authentication local command, the local scheme is used as
the primary scheme. In this case, only local authentication is performed. If you
execute the authentication none command, no authentication is performed.
With the authentication command configured in an ISP domain view, the system
adopts the authentication scheme referenced in the command to authenticate the
users in the domain, or else it adopts the scheme referenced in the scheme
command.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc
New Domain added.
[SW7750-isp-aabbcc] authentication radius-scheme rd local
authorization
undo authorization
Description Use the authorization command to configure the authorization scheme of the
current ISP domain.
Example # Allow users in current ISP domain to access the network services without being
authorized.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] authorization none
cut connection
domain isp-name: Cuts down all user connections in the specified ISP domain.
isp-name is the name of an ISP domain. It is a character string of up to 24
characters. You can only specify an existing ISP domain.
ip ip-address: Cuts down the connection of the user with the specified IP address.
display connection 601
mac mac-address: Cuts down the user connection with the specified MAC
address. mac-address is in dash-delimited hexadecimal notation, that is, in the
H-H-H format.
vlan vlan-id: Cuts down all user connections of the specified VLAN. vlan-id ranges
from 1 to 4094.
ucibindex ucib-index: Cuts down the user connection with the specified
connection index. The value of ucib-index ranges from 0 to 4119.
user-name user-name: Cuts down the user connection of the specified user.
user-name is a character string of up to 80 characters. The string cannot contain
the following characters: /:*?<>. It can contain no more than one @ character. The
pure user name (user ID, that is, the part before @) can contain no more than 55
characters.
Description Use the cut connection command to cut down one user connection or one type
of user connections forcibly.
Example # Cut down all 802.1x user connections in the ISP domain named aabbcc.net.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] cut connection domain aabbcc.net
display connection
domain isp-name: Displays all user connections in the specified ISP domain.
isp-name is the name of an ISP domain, a character string of up to 24 characters.
You can only specify an existing ISP domain.
mac mac-address: Displays the connection of the user with the specified MAC
address. mac-address is in dash-delimited hexadecimal notation (in the form of
H-H-H).
vlan vlan-id: Displays all user connections of the specified VLAN. The value of
vlan-id ranges from 1 to 4094.
ucibindex ucib-index: Displays the user connection with the specified connection
index.
user-name user-name: Displays the user connection with the specified user name.
user-name is a character string of up to 32 characters. The string cannot contain
the following characters: /:*?<>. It can contain no more than one @ character. The
pure user name (user ID, that is, the part before @) can contain no more than 24
characters.
Description Use the display connection command to display information about the
specified user connection or all user connections, so as to troubleshoot user
connections.
If you execute this command without specifying any argument, all user
connections will be displayed.
This command displays information about the connections of 802.1x users only.
display domain
Description Use the display domain command to display the configuration information
about one specific or all ISP domains.
If you execute this command without specifying any argument, the configuration
of all ISP domains will be displayed.
display local-user 603
Field Description
0 Domain ISP domain index...Domain name
State State
Scheme AAA scheme: LOCAL (local authentication), NONE (no
authentication), or RADIUS scheme name
Access-Limit Limit on the number of access users
Vlan-assignment-mode Dynamic VLAN assignment mode: integer or string
accounting-mode Accounting mode: time (time-based accounting) and traffic
(traffic-based accounting)
Domain User Template Domain user template
Idle-cut Sets the idle-cut function. Disable means the idle-cut function is
disabled; enable means the function is enabled.
Self-service URL of the self-service server. Disable means the self-service
server location function is disabled. After the self-service server
location function is enabled, the URL of the configured
self-service server.
Messenger Time State of the messenger time service. Disable means the
messenger time service is disabled. After the messenger time
service is configured, the time and interval of the prompt
messages.
display local-user
Parameter domain isp-name: Displays all local users belonging to the specified ISP domain.
isp-name is the name of an ISP domain, a character string of up to 24 characters.
You can only specify an existing ISP domain.
idle-cut: Displays the local users who are inhibited from enabling the idle-cut
function, or the local users who are allowed to enable the idle-cut function.
disable specifies the inhibited local users and enable specifies the allowed local
users. This argument only applies to the users configured with lan-access service.
For users configured with any other type of service, the display local-user
idle-cut enable and display local-user idle-cut disable commands do not
output any user information.
service-type: Displays the local users of the specified type. You can specify one of
the following user types: telnet, ftp, lan-access (generally, this type of users are
Ethernet access users, for example, 802.1x users), ssh, terminal (this type of users
are terminal users who log into the switch through the Console port).
state { active | block }: Displays the local users in the specified state. active
represents the users allowed to request network services, and block represents the
users inhibited to request network services.
user-name user-name: Displays the local user who has the specified user name.
user-name is a character string of up to 80 characters. The string cannot contain
the following characters: /:*?<>. It can contain no more than one @ character. The
pure user name (user ID, that is, the part before @) can contain no more than 55
characters.
vlan vlan-id: Displays the local users belonging to the specified VLAN. The value of
vlan-id ranges from 1 to 4094.
Description Use the display local-user command to display information about a specific or
all local users, so as to troubleshoot local user configuration.
By default, this command displays the information about all local users.
Field Description
State State of the local user
ServiceType Mask Service type mark of local user:
T: Telnet
S: SSH
C: Terminal service
LM: lan-access
F: FTP
None: No service type is set.
Idle Cut State of the idle-cut function
Access-Limit Limit on the number of access users
Bind location Whether or not bound to a port
VLAN ID VLAN of the user
IP address IP address of the user
MAC address MAC address of the user
User Privilege User privilege
domain
Description Use the domain command to create an ISP domain or enter the view of an
existing ISP domain.
An ISP domain is an ISP user group comprising the users of the same ISP. Normally,
in a username (such as [email protected]) in the userid@isp-name format,
isp-name (such as aabbcc.net in the above example) after "@" is the name of the
ISP domain. When implementing access control, for ISP users with the name
format userid@isp-name, a 3Com series Ethernet switch uses the userid as the
username for authentication and uses "isp-name" for domain name.
606 CHAPTER 45: AAA CONFIGURATION COMMANDS
You can configure up to 16 ISP domains in the system. If the specified ISP domain
does not exist when you issue this command, the system creates a new ISP
domain. An ISP domain is active immediately after being created.
Example # Create an ISP domain named aabbcc.net and enter its view.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net]
idle-cut
flow: Minimum data flow, ranging from 1 byte to 10,240,000 bytes (10 M).
Description Use the idle-cut command to set the user idle-cut function in current ISP domain.
A user template applies to only one ISP domain. Therefore, you need to configure
different user template attributes for users in different ISP domains.
Example # Allow users in ISP domain aabbcc.net to enable the idle-cut attribute in user
template (that is, allow the user to use the idle-cut function), with the maximum
idle time of 50 minutes and the minimum data flow of 500 bytes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] idle-cut enable 50 500
level
undo level
Parameter level: Priority level of the user. It is an integer ranging from 0 to 3 and defaulting to
0.
Description Use the level command to set the priority level of the user.
Use the undo level command to restore the default priority level of the user.
n The commands that a user can access after login is determined by the priority level
of the user and the level set on the user interface. If the two levels are different
■ The command level that a user passing AAA/RADIUS authentication can access
is determined by the priority level of the user. For example, if the priority level
of a user is 3 and the command level set on the VTY 0 user interface is 1, the
user can access the commands under level 3 after logging in to the system
from VTY 0.
■ The command level that a user passing RSA authentication can access is
determined by the level set on the user interface.
local-user
Parameter user-name: Name of the local user, a character string of up to 80 characters. This
string cannot contain the following characters: /:*?<>. It can contain no more
than one @ character. The pure user name (user ID, that is, the part before @)
cannot be longer than 55 characters. The local user name is case insensitive.
service-type: Specifies the local users of the specified type. You can specify one
of the following user types: telnet, ftp, and lan-access (generally, this type of
users are Ethernet access users, for example, 802.1x users), ssh, and terminal
(this type of users are terminal users who log into the switch through the Console
port).
Description Use the local-user command to add a local user and enter local user view.
Use the undo local-user command to delete one or more specified local users.
local-user password-display-mode
Parameter cipher-force: Adopts the forcible cipher mode so that the passwords of all local
users must be displayed in cipher text.
auto: Adopts the automatic mode so that the passwords of local users are
displayed in the modes set with the password command.
When the cipher-force mode is adopted, all passwords will be displayed in cipher
text even through some users have specified to display their passwords in plain
text by using the password command with the simple keyword.
messenger 609
Example # Specify to display all local user passwords in cipher text forcibly.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] local-user password-display-mode cipher-force
messenger
Parameter limit: Time limit in minutes, ranging from 1 to 60. The switch will send prompt
messages at regular intervals to users whose remaining online time is less than this
limit.
interval: Interval to send prompt messages (in minutes). This argument ranges
from 5 to 60 and must be a multiple of 5.
Description Use the messenger time enable command to enable the messenger function
and set the related parameters.
Use the messenger time disable command to disable the messenger function.
Use the undo messenger time command to restore the messenger function to
its default state.
The purpose of this function is to remind online users of their remaining online
time through clients in the form of message dialog.
You can use messenger time enable command to set a remaining online time
limit and the interval to send prompt messages. After that, the switch regularly
sends prompt messages at the set interval to the clients of the users whose
remaining online time is less than the set limit, and the clients inform the users of
their remaining online time in the form of message dialog.
Example # Enable the switch to send prompt messages at intervals of 5 minutes to users
after their remaining online time is less than 30 minutes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain system
New Domain added.
[SW7750-isp-system] messenger time enable 30 5
610 CHAPTER 45: AAA CONFIGURATION COMMANDS
name
undo name
Description Use the name command to set a VLAN name, which will be used for VLAN
assignment.
By default, an VLAN uses its VLAN ID (like VLAN 0001) as its name.
This command is used for the dynamic VLAN assignment function. For details
about this function, refer to the vlan-assignment-mode command.
password
undo password
Description Use the password command to set a password for the local user.
Example # Set the password of a user named user1 to 20030422 and specify to display the
password in plain text.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] local-user user1
[SW7750-luser-user1] password simple 20030422
radius-scheme
Description Use the radius-scheme command to specify the RADIUS scheme to be used by
current ISP domain.
Once an ISP domain is created, it uses the local AAA scheme instead of any
RADIUS scheme by default.
Example # Specify the scheme "radius1" as the RADIUS scheme to be used by current ISP
domain "aabbcc.net".
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
612 CHAPTER 45: AAA CONFIGURATION COMMANDS
scheme
Description Use the scheme command to specify the AAA scheme used by current ISP
domain.
Use the undo scheme command to restore the default AAA scheme used by the
ISP domain.
Example # Specify the RADIUS scheme "radius1" as the AAA scheme referenced by the ISP
domain "aabbcc.net".
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] scheme radius-scheme radius1
self-service-url
self-service-url disable
Parameter url-string: URL of the web page used to modify user password on the self-service
server. It is a character string with 1 character to 64 characters. This string cannot
contain a question mark "?". If the actual URL of the self-service server contains
any question mark, you should change it to an elect bar "|".
Description Use the self-service-url enable command to enable the self-service server
location function
After this command is executed on the switch, users can locate the self-service
server through the following operation:
A user can choose the [change user password] option on the client only after
passing the authentication. If the user fails the authentication, this option is in
grey and is unavailable.
Example # Under the default ISP domain "system", set the URL of the web page used to
modify user password on the self-service server to
http://10.153.89.94/selfservice/modPasswd1x.jsp|userName.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
614 CHAPTER 45: AAA CONFIGURATION COMMANDS
service-type
ftp-directory directory: Specifies the path for FTP users. directory is a string of up
to 64 characters.
lan-access: Specifies that this is a LAN access user (who is generally an Ethernet
access user, for example, 802.1x user).
terminal: Authorizes the user to access the terminal service (that is, allows the
user to log into the switch through the Console port).
level level: Specifies the level of the Telnet, terminal or SSH user. Where, level is an
integer ranging from 0 to 3 and defaulting to 0.
Description Use the service-type command to authorize the user to access the specified
type(s) of service(s).
Use the undo service-type command to inhibit the user from accessing the
specified type(s) of service(s).
state
Parameter active: Activates the current ISP domain (in ISP domain view) or current user (in
local user view), to allow users in current ISP domain or current user to access the
network.
block: Hangs up the current ISP domain (in ISP domain view) or current user (in
local user view), to inhibit users in current ISP domain or current user from
accessing the network.
Description Use the state command to set the status of current ISP domain or the status of
the local user.
By default, an ISP domain is in the active state once it is created (in ISP domain
view), and a local user is in the active state once the user is created (in local user
view).
In ISP domain view, each ISP domain can be in one of two states: active and
block. Users in an active ISP domain are allowed to access the network. After an
ISP domain is set to the block state, except the online users, the users under this
domain are not allowed to access the network.
Example # Set the ISP domain aabbcc.net to the block state, so that all its offline users
cannot access the network.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain aabbcc.net
New Domain added.
[SW7750-isp-aabbcc.net] state block
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] local-user user1
[SW7750-luser-user1] state block
vlan-assignment-mode
Description Use the vlan-assignment-mode command to set the VLAN assignment mode
(integer or string) on the switch.
616 CHAPTER 45: AAA CONFIGURATION COMMANDS
By default, the VLAN assignment mode is integer, that is, the switch supports its
RADIUS authentication server to assign integer VLAN IDs.
The dynamic VLAN assignment feature enables a switch to dynamically add the
ports of the successfully authenticated users to different VLANs according to the
attributes assigned by the RADIUS server, so as to control the network resources
that different users can access. In actual applications, to use this feature together
with Guest VLAN, you should better set port control to port-based mode.
Currently, the switch supports the RADIUS authentication server to assign the
following two types of VLAN IDs: integer and string.
■ Integer: If the RADIUS server assigns integer type of VLAN IDs, you can set the
VLAN assignment mode to integer on the switch (this is also the default mode
on the switch). Then, upon receiving an integer ID assigned by the RADIUS
authentication server, the switch adds the port to the VLAN whose VLAN ID is
equal to the assigned integer ID. If no such a VLAN exists, the switch first
creates a VLAN with the assigned ID, and then adds the port to the newly
created VLAN.
■ String: If the RADIUS server assigns string type of VLAN IDs, you can set the
VLAN assignment mode to string on the switch. Then, upon receiving a string
ID assigned by the RADIUS authentication server, the switch compares the ID
with existing VLAN names on the switch. If it finds a match, it adds the port to
the corresponding VLAN. Otherwise, the VLAN assignment fails and the user
cannot pass the authentication.
The two dynamic VLAN assignment modes, integer and string, supported by the
switch are set according to the authentication server. Different authentication
servers adopt different dynamic VLAN assignment modes, you are recommended
to configure the device according to the dynamic VLAN assignment mode in use.
c CAUTION:
■ You are recommended to configure the VLAN assignment mode for the switch
the same as that of the assignment attribute value of the RADIUS
authentication server. Configure the correct assignment mode with the
vlan-assignment-mode command so that the switch correctly identifies the
dynamic VLAN assigned by the server. If the assignment modes are different,
the expected configuration may not take effect.
vlan-assignment-mode 617
■ In string mode, the VLAN to be assigned must exist on the switch and must
have been configured with a VLAN name. This is not required in integer mode.
■ In string mode, if the VLAN ID assigned by the RADIUS server is a character
string containing only digits (for example, 1024), the switch first regards it as
an integer VLAN ID: the switch transforms the string to an integer value and
judges if the value is in the valid VLAN ID range; if it is, the switch adds the
authenticated port to the VLAN with the value as the VLAN ID (VLAN 1024, for
example).
accounting-on enable
Description Use the accounting-on enable command to enable the user re-authentication
upon device restart function.
Use the undo accounting-on send command to restore the default maximum
number of attempts to transmit Accounting-On packets.
Use the undo accounting-on interval command to restore the default interval
to transmit Accounting-On packets.
The purpose of this function is to resolve this problem: users cannot re-log into the
switch after the switch restarts because they are already online. After this function
is enabled, every time the switch restarts:
and session ID), and ends the accounting of the users based on the last
accounting update packet.
■ Once the switch receives the response from the CAMS, it stops sending other
Accounting-On packets.
■ If the switch does not receives any response from the CAMS after the times it
transmit Accounting-On packet reaches the configured maximum times, it
does not send any more Accounting-On packets.
n The switch can automatically generate the main attributes (NAS-ID, NAS-IP
address and session ID) in the Accounting-On packets. However, you can also
manually configure the NAS-IP address with the nas-ip command. If you choose
to manually configure this attribute, be sure to configure an appropriate and legal
IP address. If this attribute is not configured, the switch will automatically use the
IP address of the VLAN interface as the NAS-IP address.
Example # Enable the user re-authentication upon device restart function for the RADIUS
scheme named CAMS.
<SW7750> system-view
[SW7750] radius scheme CAMS
[SW7750-radius-CAMS] accounting-on enable
accounting optional
Parameter None
n Note that:
■ When the system charges an online user but it does not find any available
RADIUS accounting server or fails to communicate with any RADIUS
accounting server, the user can continue the access to network resources if the
accounting optional command has been used.
data-flow-format 621
■ After the accounting optional command is used for a RADIUS scheme, the
system will no longer send real-time accounting update packets and
stop-accounting packets for any user who adopts the RADIUS scheme.
■ This configuration takes effect only on the accounting using this RADIUS
scheme.
Example # Execute the accounting-optional command for the RADIUS scheme CAMS.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme CAMS
[SW7750-radius-cams] accounting optional
data-flow-format
undo data-flow-format
Description Use the data-flow-format command to set the units of measure for data flows
sent to RADIUS servers.
By default, the unit of measure for data is byte and that for packets is one-packet.
Example # Specify to measure data and packets in data flows sent to RADIUS server in
kilobytes and kilo-packets respectively.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] data-flow-format data kilo-byte packet kilo-packet
Parameter None
Description Use the display local-server statistics command to display the statistics about
all local RADIUS authentication servers.
display radius
Description Use the display radius command to display the configuration information about
one specific or all RADIUS schemes.
By default, this command displays the configuration information about all RADIUS
schemes.
------------------------------------------------------------------
Total 1 RADIUS scheme(s). 1 listed
Table 105 Field descriptions of the display radius command
Field Description
SchemeName Name of the RADIUS scheme
Index Index number of the RADIUS scheme
Type Type of the RADIUS servers
Primary Auth IP/ Port/ State IP address/access port number/state of the primary
authentication server
Primary Acct IP/ Port/ State IP address/access port number/state of the primary
accounting server
Second Auth IP/ Port/ State IP address/access port number/state of the secondary
authentication server
Second Acct IP/ Port/ State IP address/access port number/state of the secondary
accounting server
Auth Server Encryption Key Login password for the authentication servers
Acct Server Encryption Key Login password for the accounting servers
TimeOutValue (seconds) RADIUS server response timeout time
RetryTimes Maximum number of transmission attempts
Permitted send realtime PKT failed Maximum allowed number of continuous no-response
counts real-time accounting requests
Retry sending times of non-response Maximum number of transmission attempts of the
acct-stop-PKT buffered stop-accounting requests
Username format User name format
Data flow unit Unit of measure for data in data flows
Packet unit Unit of measure for packets
Parameter None
Description Use the display radius statistics command to display the statistics about
RADIUS packets, so as to troubleshoot RADIUS configuration.
Running statistic:
RADIUS received messages statistic:
Normal auth request , Num=0 , Err=0 , Succ=0
EAP auth request , Num=0 , Err=0 , Succ=0
Account request , Num=0 , Err=0 , Succ=0
Account off request , Num=0 , Err=0 , Succ=0
PKT auth timeout , Num=0 , Err=0 , Succ=0
PKT acct_timeout , Num=0 , Err=0 , Succ=0
(The following display is omitted.)
display stop-accounting-buffer
key
Parameter accounting: Sets a shared key for the RADIUS accounting packets.
Description Use the key command to set a shared key for the RADIUS
authentication/authorization packets or accounting packets.
Use the undo key command to restore the corresponding default shared key.
The RADIUS client (that is, the switch) and server adopt MD5 algorithm to encrypt
the RADIUS packets exchanged with each other. The two parties verify the validity
626 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
of the exchanged packets by using the encrypted keys that have been set on
them, and can accept and respond to the packets sent from each other only if
both of them have the same encrypted keys. If the authentication/authorization
server and the accounting server are two separate devices and the two servers
have different encrypted keys, you must set the encrypted keys for
authentication/authorization packets and accounting packets respectively on the
switch.
Example # Set the encrypted key for the RADIUS authentication/authorization packets in
RADIUS scheme radius1 to hello.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] key authentication hello
# Set the encrypted key for the RADIUS accounting packets in RADIUS scheme
radius1 to ok.
local-server
Parameter nas-ip ip-address: Specifies the NAS-IP address of the local RADIUS server. Where,
ip-address is in dotted decimal notation.
key password: Specifies the shared key of the authentication server and access
server. Where, password is a character string of up to 16 characters.
Description Use the local-server command to create a local RADIUS authentication server
(that is, set the related parameters of the server).
Use the undo local-server command to delete the specified local RADIUS
authentication server.
n Note that:
■ The switch not only supports the traditional RADIUS client service to
accomplish user AAA management through foreign
authentication/authorization server and accounting server, but also provides a
nas-ip 627
simple local RADIUS server function for authentication and authorization. This
function is called local RADIUS authentication server function.
■ When you use the local RADIUS authentication server function, the UDP port
number for the authentication/authorization service must be 1645, the UDP
port number for the accounting service is 1646.
■ The packet encryption key set by the local-server command with the key
password parameter must be identical with the authentication/authorization
packet encryption key set by the key authentication command in RADIUS
scheme view.
■ The switch supports at most 16 IP addresses and shared keys of the network
access server (including the default local RADIUS authentication server); that is,
when the switch serves as a RADIUS authentication server, it can support at
most 16 network access servers simultaneously to provide authentication.
■ As a local RADIUS authentication server, the switch does not support EAP
authentication.
Example # Create a network access server granted by the RADIUS authentication server
with an IP address of 10.110.1.2 and a shared key of aabbcc.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] local-server nas-ip 10.110.1.2 key aabbcc
nas-ip
undo nas-ip
Parameter ip-address: Source IP address for RADIUS packets, an IP address of this device. This
address can neither be the all zero address nor be a Class-D address.
Description Use the nas-ip command to set the source IP address used by the switch to send
RADIUS packets.
Use the undo nas-ip command to remove the source IP address setting.
n The nas-ip command in RADIUS scheme view has the same function as the
radius nas-ip command in system view; and the priority of configuration in
RADIUS scheme view is higher than in system view.
You can specify the source address used to send RADIUS packets to prevent the
unreachability of the packets returned from the server due to physical interface
trouble. It is recommended to use the loopback interface address as the source IP
address.
628 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
Example # Set the source IP address used by the switch to send the RADIUS packets to
10.1.1.1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme test1
[SW7750-radius-test1] nas-ip 10.1.1.1
primary accounting
Description Use the primary accounting command to set the IP address and port number of
the primary RADIUS accounting server.
Use the undo primary accounting command to restore the default IP address
and port number of the primary RADIUS accounting server.
The IP address and UDP port number of the primary accounting server used by the
default RADIUS scheme "system" are 127.0.0.1 and 1646. The IP address and the
UDP port number of the primary accounting server used by a newly created
RADIUS scheme are 0.0.0.0 and 1813.
After creating a new RADIUS scheme, you should configure the IP address and
UDP port number of each RADIUS server you want to use in this scheme. These
RADIUS servers fall into two types: authentication/authorization, and accounting.
And for each kind of server, you can configure two servers in a RADIUS scheme:
primary and secondary servers.
Example # Set the IP address and UDP port number of the primary accounting server of the
RADIUS scheme radius1 to 10.110.1.2 and 1813.
primary authentication 629
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] primary accounting 10.110.1.2 1813
primary authentication
Description Use the primary authentication command to set the IP address and port
number of the primary RADIUS authentication/authorization server.
The IP address and UDP port number of the primary authentication server used by
the default RADIUS scheme "system" are 127.0.0.1 and 1645. The IP address and
UDP port number of the secondary authentication server is 0.0.0.0 and 1812. The
IP address and the UDP port number of the primary/secondary authentication
server used by a newly created RADIUS scheme are 0.0.0.0 and 1812.
After creating a new RADIUS scheme, you should configure the IP address and
UDP port number of each RADIUS server you want to use in this scheme. These
RADIUS servers fall into two types: authentication/authorization, and accounting.
And for each kind of server, you can configure two servers in a RADIUS scheme:
primary and secondary servers.
Example # Set the IP address and UDP port number of the primary
authentication/authorization server used by the RADIUS scheme radius1 to
10.110.1.1 and 1812.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] primary authentication 10.110.1.1 1812
630 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
radius nas-ip
Description Use the radius nas-ip command to set the source address used by the NAS to
send RADIUS packets.
Use the undo radius nas-ip command to restore the default setting.
n The nas-ip command in RADIUS scheme view has the same function as the
radius nas-ip command in system view; and the priority of configuration in
RADIUS scheme view is higher than in system view.
n Note that:
■ You can specify the source IP address used to send RADIUS packet to prevent
the unreachability of the packets returned from the server due to physical
interface trouble. It is recommended to use the loopback interface address as
the source IP address.
■ You can specify only one source IP address by using this command. When you
use this command again, the newly specified source IP address will overwrite
the old one.
Example # Set the source address used by the switch to send the RADIUS packets to
129.10.10.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius nas-ip 129.10.10.1
radius scheme
Description Use the radius scheme command to create a RADIUS scheme and enter its view.
Use the undo radius scheme command to delete the specified RADIUS scheme.
By default, a RADIUS scheme named "system" has already been created in the
system. All attributes of the scheme take the default values.
The undo radius scheme command cannot be used to delete the default RADIUS
scheme. Note that you cannot delete a RADIUS scheme which is being used by an
online user.
Example # Create a RADIUS scheme named radius1 and enter its view.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1]
Parameter None
Description Use the reset radius statistics command to clear the statistics about the
RADIUS protocol.
reset stop-accounting-buffer
When the switch sends out a stop-accounting packet but gets no response from
the RADIUS server, it first buffers the packet and then retransmits it until the
maximum number of retransmission attempts (set by the retry stop-accounting
command) is reached.
Example # Delete the stop-accounting request packets buffered in the system for the user
[email protected].
<SW7750> reset stop-accounting-buffer user-name [email protected]
retry
undo retry
Description Use the retry command to set the maximum number of transmission attempts of
RADIUS requests.
Use the undo retry command to restore the default maximum number of
transmission attempts.
n Note that:
■ The communication in RADIUS is unreliable because this protocol adopts UDP
packets to carry data. Therefore, it is necessary for the switch to retransmit a
RADIUS request if it gets no response from the RADIUS server after the
response timeout timer expires. If the maximum number of transmission
attempts is reached but the switch still receives no response, the switch
considers that the request fails.
■ Appropriately set this maximum number of transmission attempts according to
the network situation can improve the reacting speed of the system.
Example # Set the maximum transmission times of RADIUS requests in the RADIUS scheme
radius1 to five.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] retry 5
retry realtime-accounting
Description Use the retry realtime-accounting command to set the maximum number of
real-time accounting request attempts.
By default, the system can allow five real-time accounting request attempts at
most.
n Note that:
■ Generally, the RADIUS server uses the connection timeout timer to determine
whether a user is online or not. If the RADIUS server receives no real-time
accounting packet for a specified period of time, it will consider that the line or
the switch is in trouble and stop the accounting of the user. To make the switch
cooperate with this feature on the RADIUS server, it is necessary to cut down
the user connection on the switch as soon as possible after the RADIUS server
terminates the charging and connection of the user in the case of unforeseen
trouble. For this purpose, you can limit the number of continuous real-time
no-response accounting requests, and the switch will cut down the user
connection if it sends out the maximum number of real-time accounting
requests but does not receive any response.
■ A real-time account request may be sent multiple times (set by the retry
command in RADIUS scheme view) for an accounting attempt. If no response is
received even after the number of transmission attempts reaches the
maximum, the accounting attempt fails. Suppose that the response timeout
time of the RADIUS server is three seconds (set by the timer
response-timeout command), that the maximum number of transmission
attempts (set by the retry command) is 3, and that the real-time accounting
interval is 12 minutes (set by the timer realtime-accounting command), the
maximum number of real-time accounting request attempts is 5 (set by the
retry realtime-accounting command). In this case, the switch sends an
accounting request every 12 minutes; if the switch does not receive a response
within 3 seconds after it sends out an accounting request, it resends the
request; if the switch continuously sends the accounting request for three
times but does not receive any response; it considers this real-time accounting
a failure. Then, the switch sends the accounting request every 12 minutes; if
the number of accounting failures exceeds five, the user connection is cut
down.
Example # Allow the switch to continuously send at most 10 real-time accounting requests
for the RADIUS scheme radius1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] retry realtime-accounting 10
retry stop-accounting 635
retry stop-accounting
Description Use the retry stop-accounting command to set the maximum number of
transmission attempts of the stop-accounting requests buffered due to no
response.
Stop-accounting requests are critical to billing and will eventually affect the
charges of the users; they are important for both the users and the ISP. Therefore,
the NAS should do its best to transmit them to the RADIUS accounting server. If
the RADIUS server does not respond to such a request, the switch should first
buffer the request on itself, and then retransmit the request to the RADIUS
accounting server until it gets a response, or the maximum number of
transmission attempts is reached (in this case, it discards the request).
Example # In RADIUS scheme radius1, specify that the switch can transmit a buffered
stop-accounting request at most 1,000 times
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] retry stop-accounting 1000
secondary accounting
Parameter ip-address: IP address, in dotted decimal notation. By default, the IP address of the
secondary accounting server is 0.0.0.0.
636 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
port-number: UDP port number, ranging from 1 to 65535. By default, the UDP
port number of the secondary accounting service is 1813.
Description Use the secondary accounting command to set the IP address and port number
of the secondary RADIUS accounting server.
Example # Set the IP address and UDP port number of the secondary accounting server of
the RADIUS scheme radius1 to 10.110.1.1 and 1813.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] secondary accounting 10.110.1.1 1813
secondary authentication
Parameter ip-address: IP address, in dotted decimal notation. By default, the IP address of the
secondary authentication/authorization server is 0.0.0.0.
port-number: UDP port number, ranging from 1 to 65535. By default, the UDP
port number of the secondary authentication/authorization service is 1812.
Description Use the secondary authentication command to set the IP address and port
number of the secondary RADIUS authentication/authorization server.
Example # Set the IP address and UDP port number of the secondary
authentication/authorization server used by the RADIUS scheme radius1 to
10.110.1.2 and 1812.
server-type 637
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] secondary authentication 10.110.1.2 1812
server-type
undo server-type
Parameter extended: Specifies that the switch supports 3Com’s RADIUS server. That is, it is
required that the RADIUS client (on the switch) and the RADIUS server (generally
the CAMS) interact with each other. by using 3Com’s proprietary RADIUS protocol
(such as the procedure and packet format)
standard: Specifies to use the standard RADIUS protocol. That is, it is required
that the RADIUS client (on the switch) and the RADIUS server interact with each
other following the procedure and packet format of the standard RADIUS protocol
(RFC2865/2866 or above).
Description Use the server-type command to specify the RADIUS server type supported by
the switch.
Use the undo server-type command to restore the default RADIUS server type
supported by the switch.
By default, the RADIUS server type of a new RADIUS scheme is standard. The type
of RADIUS server in the default RADIUS scheme "system" is extended.
Example # Set the RADIUS server type in RADIUS scheme radius1 to extended.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] server-type extended
state
block: Sets the status of the specified RADIUS server to block (that is, the down
state).
active: Sets the status of the specified RADIUS server to active (that is, the normal
working state).
Description Use the state command to set the status of a RADIUS server.
By default, all the RADIUS servers in a user-defined RADIUS scheme are in the
block state.
■ When the NAS fails to communicate with the primary server due to some
server trouble, the NAS will actively exchange packets with the secondary
server.
■ After the primary server recovers, the NAS does not immediately restore the
communication with the primary server, but keeps communicating with the
secondary server unit the secondary server also fails. In order for the NAS to
quickly restore the communication with the recovered primary server, you need
to manually set the state of the primary server to active by using the state
command.
■ When both the primary and secondary servers are in the active state, the NAS
sends packets to the primary server only.
Example # Set the status of the secondary authentication server in RADIUS scheme radius1
to active.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] state secondary authentication active
stop-accounting-buffer enable
Parameter None
timer 639
By default, the switch is enabled to buffer the stop-accounting requests that bring
no response.
Stop-accounting requests are critical to billing and will eventually affect the
charges; they are important for both the users and the ISP. Therefore, the NAS
should do its best to transmit them to the RADIUS accounting server. If the
RADIUS accounting server does not respond to such a request, the switch should
first buffer the request on itself, and then retransmit the request to the RADIUS
accounting server until it gets a response, or the maximum number of
transmission attempts is reached (in this case, it discards the request).
Example # Enable the switch to buffer the stop-accounting requests that bring no response
from the servers in RADIUS scheme radius1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] stop-accounting-buffer enable
timer
undo timer
Parameter seconds: Response timeout time of RADIUS server, ranging from 1 second to 10
seconds. By default, the response timeout time of the RADIUS server is three
seconds.
Description Use the timer command to set the response timeout time of RADIUS server (that
is, the timeout time of the response timeout timer of RADIUS server).
Use the undo timer command to restore the default response timeout timer of
RADIUS server.
n Note that:
■ If the switch gets no response from the RADIUS server after sending out a
RADIUS request (authentication/authorization request or accounting request)
and waiting for a time, it should retransmit the packet to ensure that the user
can obtain the RADIUS service. This wait time is called response timeout time
640 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
of RADIUS server; and the timer in the switch system that is used to control this
time is called the response timeout timer of RADIUS server. You can use the
timer command to set the timeout time of this timer.
■ Appropriately setting the timeout time of this timer according to the network
situation can improve the performance of the system.
■ The timer command has the same effect with the timer response-timeout
command.
Example # Set the timeout time of the response timeout timer for the RADIUS scheme
radius1 to 5 seconds.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] timer 5
timer quiet
Parameter minutes: Wait time, ranging from 1 minute to 255 minutes. By default, it is 5
minutes.
Description Use the timer quiet command to set the wait time for the primary server to
restore the active state.
Use the undo timer quiet command to restore the default wait time.
After confirming that no response will be received from the primary server, the
switch starts to send RADIUS packets to the secondary RADIUS server.
At the interval of wait time, the switch sets the state of the primary server to
active and sends RADIUS packets to the primary server.
Example # Set the wait time for the RADIUS scheme "radius1" to three minutes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] timer quiet 3
timer realtime-accounting 641
timer realtime-accounting
Description Use the timer realtime-accounting command to set the real-time accounting
interval.
n Note that:
■ To charge the users in real time, you should set the interval of real-time
accounting. After the setting, the NAS sends the accounting information of
online users to the RADIUS server at regular intervals.
■ The setting of the real-time accounting interval depends to some degree on the
performance of the NAS and the RADIUS server. The higher the performance of
the NAS and the RADIUS server is, the shorter the interval can be. You are
recommended to set the interval as long as possible when the number of users
is relatively great (¦1000). Table 106 lists the numbers of users and the
corresponding recommended intervals.
Table 106 Numbers of users and corresponding recommended intervals
Example # Set the real-time accounting interval of the RADIUS scheme radius1 to 51
minutes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] timer realtime-accounting 51
timer response-timeout
Parameter seconds: Response timeout time of RADIUS servers, ranging from 1 second to 10
seconds. By default, the response timeout time of the RADIUS server is three
seconds.
Description Use the timer response-timeout command to set the response timeout time of
RADIUS servers.
n Note that:
■ If the switch gets no response from the RADIUS server after sending out a
RADIUS request (authentication/authorization request or accounting request)
and waiting for a time, it should retransmit the packet to ensure that the user
can obtain the RADIUS service. This wait time is called response timeout time
of RADIUS servers; and the timer in the switch system that is used to control
this time is called the response timeout timer of RADIUS servers. You can use
the timer response-timeout command to set the timeout time of this timer.
■ Appropriately setting the timeout time of this timer according to the network
situation can improve the performance of the system.
■ This command has the same effect with the timer command.
Example # Set the response timeout time in the RADIUS scheme radius1 to five seconds.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] timer response-timeout 5
user-name-format
Parameter with-domain: Specifies to include ISP domain names in the user names to be sent
to RADIUS servers.
without-domain: Specifies to exclude ISP domain names from the user names to
be sent to RADIUS servers.
Description Use the user-name-format command to set the format of the user names to be
sent to RADIUS server
user-name-format 643
By default, except for the default RADIUS scheme "system", the user names sent
to RADIUS servers in any RADIUS scheme carry ISP domain names.
n For a RADIUS scheme, if you have specified that no ISP domain names are carried
in the user names, you should not use this RADIUS scheme in more than one ISP
domain. Otherwise, such errors may occur: the RADIUS server regards two
different users having the same name but belonging to different ISP domains as
the same user (because the user names sent to it are the same).
Example # Specify that the user names sent to a RADIUS server in RADIUS scheme radius1
does not carry ISP domain names.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] radius scheme radius1
[SW7750-radius-radius1] user-name-format without-domain
644 CHAPTER 46: RADIUS CONFIGURATION COMMANDS
HWTACACS CONFIGURATION
47 COMMANDS
data-flow-format
giga-packet: Sets ’giga-packet’ as the unit of packet flow. This means each
giga-packet contains 1 G packets.
kilo-packet: Sets ’kilo-packet’ as the unit of packet flow. This means each
kilo-packet contains 1 K packets.
mega-packet: Sets ’mega-packet’ as the unit of packet flow. This means each
mega-packet contains 1 M packets.
one-packet: Sets ’one-packet’ as the unit of packet flow. This means each
one-packet contains one packet.
Description Use the data-flow-format command to configure the unit of data flows sent to
the TACACS server.
By default, the data unit is byte and the data packet unit is one-packet.
Example # Set the unit of data flow destined for the HWTACACS server to kilo-byte and the
data packet unit to kilo-packet.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750- hwtacacs-test1] data-flow-format data kilo-byte
[SW7750- hwtacacs-test1] data-flow-format packet kilo-packet
display hwtacacs
Description Use the display hwtacacs command to displays the configuration or statistics of
the specified or all HWTACACS schemes.
display stop-accounting-buffer
Example # Display the stop-accounting requests buffered in the HWTACACS scheme "ht".
<SW7750> display stop-accounting-buffer hwtacacs-scheme ht
hwtacacs nas-ip
Parameter ip-address: Specifies a source IP address for the switch, which cannot be an
all-zero address, class D address, class A, B, and C broadcast address, or 127
network segment address.
648 CHAPTER 47: HWTACACS CONFIGURATION COMMANDS
Description Use the hwtacacs nas-ip command to specify the source address of the
hwtacacs packet sent from NAS.
Use the undo hwtacacs nas-ip command to restore the default setting.
n Note that:
■ By specifying the source address of the hwtacacs packet, you can avoid
destination unreachable packets as returned from the server upon interface
failure. The source address is normally recommended to be a loopback
interface address.
■ When you configure the source address for the NAS to send HWTACACS
packets, the priority of HWTACACS scheme view is higher than that of system
view.
■ By default, the source address is not specified, that is, the address of the
interface sending the packet serves as the source address.
■ This command specifies only one source address; therefore, the newly
configured source address may overwrite the original one.
hwtacacs scheme
Description Use the hwtacacs scheme command to enter HWTACACS scheme view and
create the specified HWTACACS scheme if it does not exist.
Example # Create an HWTACACS scheme named "test1" and enter the relevant
HWTACACS view.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
Create a new HWTACACS-server scheme
[SW7750-hwtacacs-test1]
key 649
key
Description Use the key command to configure a shared key for HWTACACS authentication,
authorization or accounting server.
The TACACS client (on the switch) and the TACACS server use the MD5 algorithm
to encrypt the HWTACACS packets communicated between them. They
authenticate packets by using shared keys. Either of them receives and responds to
the packet sent from the other party only when their shared keys are the same.
Therefore, the shared key set on the switch and that on the TACACS server must
be the same.
Example # Use hello as the shared key for TACACS accounting server.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] key accounting hello
nas-ip
undo nas-ip
Description Use the nas-ip command to specify the source address for sending HWTACACS
packets so that all packets sent to the TACACS server carry the same source IP
address.
By specifying the source address of the hwtacacs packet, you can avoid
destination unreachable packets as returned from the server upon interface
failure. The source address is normally recommended to be a loopback interface
address.
By default, the source IP address of the packets is the IP address of the sending
interface.
Example # Set the source IP address of the HWTACACS packets sent by the NAS (switch) to
10.1.1.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] nas-ip 10.1.1.1
primary accounting
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
format. port: Port number of the server, which is in the range 1 to 65535 and
defaults to 49.
Use the undo primary accounting command to delete the configured primary
TACACS accounting server.
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary accounting servers; otherwise, unsuccessful operation is prompted.
primary authentication 651
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
■ You can remove an accounting server only when it is not being used by any
active TCP connections, and the removal impacts only packets forwarded
afterwards.
primary authentication
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
format. port: Port number of the server, which is in the range 1 to 65535 and
defaults to 49.
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary authentication servers; otherwise, unsuccessful operation is
prompted.
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
■ You can remove an authentication server only when it is not being used by any
active TCP connections, and the removal impacts only packets forwarded
afterwards.
primary authorization
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
format. port: Port number of the server, which is in the range 1 to 65535 and
defaults to 49.
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary authorization servers; otherwise, unsuccessful operation is
prompted.
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
■ You can remove an authorization server only when it is not being used by any
active TCP connections, and the removal impacts only packets forwarded
afterwards.
Description Use the reset hwtacacs statistics command to clear HWTACACS protocol
statistics.
reset stop-accounting-buffer
Example # Delete the buffered stop-accounting requests that are according to the
HWTACACS scheme "ht".
<SW7750> reset stop-accounting-buffer hwtacacs-scheme ht
retry stop-accounting
Use the undo retry stop-accounting command to restore the default setting.
secondary accounting
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
notation. port: Port number of the server, which is in the range of 1 to 65535 and
defaults to 49.
secondary authentication 655
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary accounting servers; otherwise, unsuccessful operation is prompted.
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
■ You can remove an accounting server only when it is not being used by any
active TCP connections.
secondary authentication
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
format. port: Port number of the server, which is in the range of 1 to 65535 and
defaults to 49.
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary authentication servers; otherwise, unsuccessful operation is
prompted.
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
656 CHAPTER 47: HWTACACS CONFIGURATION COMMANDS
■ You can remove an authentication server only when it is not being used by any
active TCP connections.
secondary authorization
Parameter ip-address: IP address of the server, a valid unicast address in dotted decimal
format. port: Port number of the server, in the range of 1 to 65535. By default, it
is 49.
n Note that:
■ You are not allowed to assign the same IP address to both primary and
secondary authorization servers.
■ If you repeatedly use this command, the latest configuration overwrites the
previous one.
■ You can remove an authorization server only when it is not being used by any
active TCP connections.
stop-accounting-buffer enable
Parameter None
By default, the switch is enabled to buffer the stop-accounting requests that bring
no response.
Stop-accounting requests are critical to billing and will eventually affect the
charges; they are important for both the users and the ISP. Therefore, the switch
should do its best to transmit them to the HWTACACS accounting server. If the
HWTACACS accounting server does not respond to such a request, the switch
should first buffer the request on itself, and then retransmit the request to the
HWTACACS accounting server until it gets a response, or the maximum number of
transmission attempts is reached (in this case, it discards the request).
Example # Enable the switch to buffer the stop-accounting requests that bring no response
from the servers in HWTACACS scheme test1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] stop-accounting-buffer enable
timer quiet
Parameter minutes: Length of the timer in minutes, in the range of 1 to 255. By default, the
primary server must wait five minutes before it resumes the active state.
658 CHAPTER 47: HWTACACS CONFIGURATION COMMANDS
Description Use the timer quiet command to set the duration that a primary server must
wait before it can resume the active state.
Use the undo timer quiet command to restore the default (five minutes).
With the timer quiet command configured, the switch stops processing the
request packets from users when the communication between the switch and the
server is interrupted. The switch does not send user request packets to the server
until the wait time of the switch is equal to or greater than the time configured
with the timer quiet command.
Example # Set the quiet timer for the primary server to ten minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] timer quiet 10
timer realtime-accounting
n Note that:
■ Real-time accounting interval is necessary for real-time accounting. After an
interval value is set, the switch transmits the accounting information of online
users to the TACACS accounting server at intervals of this value.
■ The setting of real-time accounting interval depends somewhat on the
performance of the switch and the TACACS server: A shorter interval requires
higher device performance. You are therefore recommended to adopt a longer
interval when there are a large number of users (more than 1000, inclusive).
Table 107 recommends the real-time accounting intervals for different
numbers of users.
timer response-timeout 659
Example # Set the real-time accounting interval in the HWTACACS scheme "test1" to 51
minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test11] timer realtime-accounting 51
timer response-timeout
Parameter seconds: Length of the response timer in seconds. It ranges from 1 to 300 and
defaults to 5.
Description Use the timer response-timeout command to set the response timeout timer
of the TACACS server.
Use the undo timer response-timeout command to restore the default (five
seconds).
n As the HWTACACS is based on TCP, either the server response timeout and/or the
TCP timeout may cause disconnection to the TACACS server.
Example # Set the response timeout time of the TACACS server to 30 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] timer response-timeout 30
user-name-format
Parameter with-domain: Specifies to send the username with a domain name to the
TACACS server.
Description Use the user-name-format command to configure the username format sent to
the TACACS server.
n Note that:
■ The supplicants are generally named in userid@isp-name format. The part
following the @ sign is the ISP domain name, according to which the switch
assigns a user to the corresponding ISP domain. However, some earlier TACACS
servers reject the user name including an ISP domain name. In this case, the
user name is sent to the TACACS server after its domain name is removed.
Accordingly, the switch provides this command to decide whether the
username sent to the TACACS server carries an ISP domain name or not.
■ If a HWTACACS scheme is configured to reject usernames including ISP domain
names, the TACACS scheme shall not be simultaneously used in more than one
ISP domains. Otherwise, the TACACS server will regard two users in different
ISP domains as the same user by mistake, if they have the same username.
(excluding their respective domain names.)
Example # Specify to send the username without any domain name to the HWTACACS
scheme "test1".
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] hwtacacs scheme test1
[SW7750-hwtacacs-test1] user-name-format without-domain
EAD CONFIGURATION COMMANDS
48
security-policy-server
Each RADIUS scheme supports at most eight IP addresses of security policy servers.
The switch only responds to the session control packets coming from the
authentication server and security policy server.
accounting enable
Parameter None
Description Use the accounting enable command to enable the traffic accounting function
on the traffic accounting module.
Use the undo accounting enable command to disable the traffic accounting
function on the traffic accounting module.
The traffic accounting module starts traffic accounting immediately after the
traffic accounting function is enabled.
accounting-mode traffic
Parameter None
664 CHAPTER 49: TRAFFIC ACCOUNTING CONFIGURATION COMMANDS
Description Use the accounting-mode traffic command to set the accounting mode to
traffic accounting.
If you specify the slot-num argument, the command displays the configuration
information of the specified traffic accounting slot. Otherwise, the command
displays the configuration information of all traffic accounting slots.
n At present, the system supports only one traffic accounting slot. Therefore the
same configuration information is displayed regardless whether or not you specify
the traffic accounting slot.
Description Use the display traffic-accounting statistics command to display the traffic
accounting statistics of one or all online users.
If you specify the ip-address argument, the command displays the traffic
accounting statistics of the specified online IP address. Otherwise, this command
displays the traffic accounting statistics of all the online IP addresses.
If you specify the group-name argument, this command displays the configuration
information of the specified traffic group. Otherwise, it displays the configuration
information of all traffic groups.
Example # Display the configuration information of the traffic group named somegroup.
<SW7750> display traffic-accounting traffic-group somegroup
Traffic group : somegroup
1.1.1.0/255.255.255.0
not referenced
network
Description Use the network command to configure a network address for the traffic group,
so as to add a destination network segment to the traffic group.
Use the undo network command to remove a network address from the traffic
group, so as to remove a destination network segment from the traffic group.
n The address range of the network segment to be set for a traffic group can neither
overlaps the existing address range of this traffic group nor be identical with the
address range of any other traffic group.
traffic-accounting accounting-slot
traffic-accounting traffic-group
traffic-group
id-num: Charging rate ID, in the range of 1 to 255, used to identify different
charging rates. This argument is not really implemented in the current command,
it is left for future use..
Description Use the traffic-group command to configure the domain to use a traffic group.
If a domain is configured to use a traffic group, when a user who belongs to the
domain accesses an address in the traffic group, the generated traffic is accounted
for and the user is charged based on the traffic.
Example # Configure the domain "CAMS" to use the traffic group "test-group", with the
rate of 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] domain cams
[SW7750-isp-cams] traffic-group test-group rate 1
traffic-slot
Use the undo traffic-slot command to cancel the specified traffic collection
module.
Example # Specify the slot 2 as the traffic accounting slot and the slot 3 as the traffic
collection slot.
traffic-slot 669
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] traffic-accounting accounting-slot 2
[SW7750-accounting-slot-2] traffic-slot 3
670 CHAPTER 49: TRAFFIC ACCOUNTING CONFIGURATION COMMANDS
VRRP CONFIGURATION COMMANDS
50
display vrrp
Description Use the display vrrp command to display the VRRP status information.
■ If the interface and backup group ID are not specified, the status information
about all the backup groups on the switch is displayed.
■ If only the interface is specified, the status information about all the backup
groups on the interface is displayed.
■ If both the interface and backup group ID are specified, the status information
about the specified backup group on the interface is displayed.
Example # Display the status information about all the backup groups on the switch.
<SW7750> display vrrp
Run Method : VIRTUAL-MAC
Virtual Ip Ping : Disable
The total number of the vitual routers: 1
Interface VRID State Run Adver. Auth Virtual
Pri Time Type IP
----------------------------------------------------------------
Vlan1 1 Master 100 1 NONE 192.168.0.133
<SW7750> system-view
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1]display vrrp interface vlan-interface 1
Run Method : VIRTUAL-MAC
Virtual Ip Ping : Disable
Interface : Vlan-interface1
VRID : 1 Adver. Timer : 1
Admin Status : UP State : Master
672 CHAPTER 50: VRRP CONFIGURATION COMMANDS
Field Description
Run Method Current VRRP running mode, which could be Real MAC or virtual MAC
Virtual Ip Ping Whether the ping operation is applicable to the virtual IP address
Interface Interface where the backup group resides
VRID Virtual backup group ID
Adver. Timer Interval at which the VRRP advertisement is sent
Admin Status Administrative status, which could be UP or DOWN.
State Status of the current router in the backup group, which could be Master,
Backup, or Initialize.
Config Pri Configuration priority
Run Pri Running priority
Preempt Mode Preemption mode
Delay Time Preemption delay
Auth Type Authentication type
Virtual IP Virtual IP address of the backup group
Virtual MAC Virtual MAC address corresponding to the virtual IP address of the backup
group. This item is displayed only when the router is in Master status.
Master IP Master IP address of the interface corresponding to the router in Master
status.
Description Use the display vrrp statistics command to display the VRRP statistics
information.
■ If the interface and backup group ID are not specified, the statistics information
about all the backup groups on the switch is displayed.
■ If only the interface is specified, the statistics information about all the backup
groups on the interface is displayed.
display vrrp verbose 673
■ If both the interface and backup group ID are specified, the statistics
information about the specified backup group on the interface is displayed.
Example # Display the statistics information about all the backup groups on the switch.
<SW7750> display vrrp statistics
Interface : Vlan-interface1
VRID : 1
CheckSum Errors : 0 Version Errors : 0
VRID Errors : 0 Advertisement Interval Errors : 0
IP TTL Errors : 0 Auth Failures : 0
Invalid Auth Type : 0 Auth Type Mismatch : 0
Packet Length Errors : 0 Address List Errors : 0
Become Master : 1 Priority Zero Pkts Rcvd : 0
Advertise Rcvd : 0 Priority Zero Pkts Sent : 0
Invalid Type Pkts Rcvd : 0
Global statistics
CheckSum Errors : 0
Version Errors : 0
VRID Errors : 0
Table 109 Field descriptions of the display vrrp statistics command
Field Description
Interface Interface where the backup group resides
VRID Backup group ID
CheckSum Errors Number of checksum errors
Version Errors Number of version errors
VRID Errors Number of backup group ID errors
Advertisement Interval Errors Number of advertisement interval errors
IP TTL Errors Number of TTL errors
Auth Failures Number of authentication errors
Invalid Auth Type Number of invalid authentication types
Auth Type Mismatch Number of mismatched authentication types
Packet Length Errors Number of VRRP packet length errors
Address List Errors Number of the virtual IP address list errors
Become Master Number of the occasions that the switch operates as the
master router
Priority Zero Pkts Rcvd Number of the received advertisements with the priority of 0
Advertise Rcvd Number of the received advertisements
Priority Zero Pkts Sent Number of the sent advertisements with the priority of 0
Invalid Type Pkts Rcvd Number of packet type errors
Global statistics Global statistics
Parameter None
Description Use the display vrrp verbose command to display the detailed VRRP
information.
■ If the interface and backup group ID are not specified,detailed VRRP
information about all the backup groups on the switch is displayed.
■ If only the interface is specified, the detailed VRRP information about all the
backup groups on the interface is displayed.
■ If both the interface and backup group ID are specified, the detailed VRRP
information about the specified backup group on the interface is displayed.
Field Description
Run Method Current VRRP running mode, which could be Real MAC or virtual MAC
Virtual Ip Ping Whether the ping operation is applicable to the virtual IP address
Interface Interface where the backup group resides
VRID Virtual backup group ID
Adver. Timer Interval at which the VRRP advertisement is sent
Admin Status Administrative status, which could be UP or DOWN.
State Status of the current router in the backup group, which could be Master,
Backup, or Initialize.
Config Pri Configuration priority
Run Pri Running priority
Preempt Mode Preemption mode
Delay Time Preemption delay
Auth Type Authentication type
Virtual IP Virtual IP address of the backup group
Virtual MAC Virtual MAC address corresponding to the virtual IP address of the backup
group. This item is displayed only when the router is in Master status.
Master IP Master IP address of the interface corresponding to the router in Master
status.
reset vrrp statistics 675
Description Use the reset vrrp command to clear the statistics information about VRRP.
■ If the interface and backup group ID are not specified, the statistics information
about all the backup groups on the switch is cleared.
■ If only the interface is specified, the statistics information about all the backup
groups on the interface is cleared.
■ If both the interface and backup group ID are specified, the statistics
information about the specified backup group on the interface is cleared.
Example # Clear the VRRP statistics information of all backup groups on all the interfaces.
<SW7750> reset vrrp statistics
Description Use the undo vrrp vrid command to remove all the configurations of the
specified backup group on the VLAN interface.
vrrp method
Parameter real-mac: Maps the real MAC address of a Layer 3 switch routing interface to
virtual router IP addresses.
Description Use the vrrp method command to map the MAC address of a backup group to
the virtual router IP addresses. You can map the actual or virtual MAC address of a
Layer 3 switch routing interface to virtual router IP addresses.
Use the undo vrrp method command to restore the default map settings.
By default, the virtual MAC address of a backup group is mapped to the IP address
of the virtual router.
Note that as the mapping relationship between the MAC addresses of a backup
group and a virtual router IP address cannot be configured after the backup group
is created, configure the mapping relationship before you create a backup group.
n Due to the chips installed, when you map the virtual IP addresses to the virtual
MAC addresses, the type of chips decides the number of backup groups that can
be configured on a VLAN interface. Refer to device specification for detail.
Example # Map the real MAC address of a routing interface to a virtual router IP address.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vrrp method real-mac
vrrp ping-enable
Parameter None
Description Use the vrrp ping-enable command to enable a backup group to respond to
ping operations destined for its virtual router IP address.
By default, a backup group does not respond to ping operations destined for its
virtual router IP address.
vrrp un-check ttl 677
Example # Enable a backup group to respond to ping operations destined for its virtual
router IP address.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vrrp ping-enable
Parameter None
Description Use the vrrp un-check ttl command to disable the TTL check of VRRP packet.
Use the undo vrrp un-check ttl command to enable the TTL check of VRRP
packet.
This command sets the authentication type and authentication key for all the VRRP
backup groups on one or multi interface. As defined in the protocol, all the
backup groups on an interface share the same authentication type and
authentication key. And all the members joining the same backup group share the
same authentication type and authentication key too.
Example # Specify the authentication type as simple, and authentication key as aabbcc for
the VRRP backup group 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] vrrp vrid 1 authentication-mode simple aabb
cc
Description Use the vrrp vrid preempt-mode command to configure a switch to operate in
the preemptive mode and set the delay period.
Use the undo vrrp vrid preempt-mode command to cancel the configuration.
By default, switches in a backup group operate in the preemptive mode, with the
delay period set to 0 seconds.
vrrp vrid priority 679
If you want backup switches to preempt the master switch, configure them to
operate in the preemptive mode. You can also set the delay period for preemption
as needed.
As long as a switch in the backup group becomes the master switch, other
switches, even if they are configured with a higher priority later, do not preempt
the master switch unless they operate in preemptive mode. The switch operating
in preemptive mode will become the master switch when it finds its priority is
higher than that of the current master switch, and the former master switch
becomes a backup switch accordingly.
You can configure a Switch 7750 to operate in preemptive mode. You can also set
the delay period. A backup switch waits for a period of time (the delay period)
before becoming a master switch. Setting a delay period aims at:
n You can use the undo vrrp vrid preempt-mode command to set switches in a
backup group to operate in non-preemptive mode.
Description Use the vrrp vrid priority command to set the priority of a switch in a backup
group.
Use the undo vrrp vrid priority command to revert to the default priority.
Switch priority determines the possibility for the switch to become a master
switch. A switch with larger priority is more likely to become a master switch. Note
that the priority of 0 is reserved for special use, and the priority of 255 is for IP
address owners. That is, the priority of a switch that owns a virtual router IP
address is fixed to 255 and cannot be modified.
Example # Set the priority to 120 for a switch in the backup group.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] vrrp vrid 1 priority 120
adver-interval: Interval (in seconds) for the master switch of a backup group to
send VRRP packets. This argument ranges from 1 to 255.
Description Use the vrrp vrid timer advertise command to set the interval for the master
switch of a backup group to send VRRP packets.
Use the undo vrrp vrid timer advertise command to revert to the default
interval.
Note that configuration error occurs if switches of the same backup group are
configured with different adver-interval values.
By default, the interval for the master switch in a backup group to send VRRP
packets is 1 second.
Example # Set the interval for the master switch to send VRRP packets to 15 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] vrrp vrid 1 timer advertise 15
vrrp vrid track 681
Description Use the vrrp vrid track command to set a VLAN interface/Ethernet port to be
tracked.
Use the undo vrrp vrid track command to disable a VLAN interface/Ethernet
port from being tracked.
By default, the value by which the priority of the VLAN interface decreases is 10.
The VLAN interface/Ethernet port tracking function extends the use of the backup
function. With this function enabled, the backup function is provided not only
when the interface where the backup group resides fails, but also when other
interfaces/Ethernet ports are unavailable. By executing the related command you
can track an interface/Ethernet port.
When a tracked VLAN interface/Ethernet port goes down, the priority of the
switch owning the interface/port will reduce automatically by a specified value
(the value-reduced argument). If the switches with their priorities higher than that
of the current master switch exist in the backup group, a new master switch will
be then determined.
n ■ The Ethernet port tracked can be in or out of the VLAN in whose interface the
backup group resides.
■ If a switch is the IP address owner, the VLAN interface/Ethernet port tracking
function can not be enabled for the switch.
■ If a tracked VLAN interface/Ethernet port goes down, when it is up again, the
priority of the corresponding switch is automatically restored.
■ Each backup group can track up to eight VLAN interfaces/Ethernet ports.
Example # Configure VLAN 2 interface to track VLAN 1 interface and specify the priority of
the master switch of backup group 1 (on VLAN 2 interface) decreases by 50 when
VLAN 1 interface goes down.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
682 CHAPTER 50: VRRP CONFIGURATION COMMANDS
Description Use the vrrp vrid virtual-ip command to add a virtual router IP address to an
existing backup group.
Use the undo vrrp vrid virtual-ip command to remove a virtual router IP
address from an existing backup group.
The vrrp vrid virtual-ip command can also be used to create a backup group.
You can add up to 16 virtual router IP addresses to a backup group. The undo
vrrp vrid virtual-ip command can also be used to remove an existing backup
group. A backup group is removed if all the virtual router IP addresses configured
for it are removed.
Note that the virtual router IP address and the IP addresses used by the member
switches in a backup group must belong to the same network segment. If not, the
backup group will be in the initial state (the state before you configure the VRRP
for the switches). In this case, VRRP does not take effect.
Description Use the display switchover state command to display the backup status of
master/slave module.
This command displays the backup state of master/slave module according to the
specified slot number. If the slot-id is not specified, the status of master module
will be displayed.
Parameter None
Use the undo slave auto-update config command to disable the automatic
synchronization.
slave restart
Parameter None
Description Use the slave restart command to restart the slave module.
When the application of the backup system operates unmorally and requires for
reloading the applications, you can use this command to restart the slave module.
slave switchover
Parameter None
When the slave module operates normally and the master module is in the
real-time backup state, if you want the slave module to operate in place of the
master module, you can use this command to implement master/slave switchover.
After that, the slave module becomes the new master module and controls the
system, and the original master module restarts automatically.
Parameter None
You can use this command to manually synchronize the configuration files on the
master module to the slave module.
Example # Synchronize the configuration files on the master module to the slave module.
<SW7750> slave update configuration
Now saving the current configuration to the slave board.
Please wait...
The configuration has been saved to the slave board successfully.
686 CHAPTER 51: HA CONFIGURATION COMMANDS
ARP CONFIGURATION COMMANDS
52
Parameter None
Description Use the arp check enable command to enable the ARP entry checking function.
Use the undo arp check enable command to disable the ARP entry checking
function.
With the ARP entry checking function enabled, the switch cannot learn any ARP
entry with a multicast MAC address. Configuring such a static ARP entry is not
allowed either; otherwise, the system prompts error information.
After the ARP entry checking function is disabled, the switch can learn the ARP
entry with a multicast MAC address, and you can also configure such a static ARP
entry on the switch.
Parameter None
688 CHAPTER 52: ARP CONFIGURATION COMMANDS
Description Use the arp gratuitous-updating enable command to enable gratuitous ARP
packets to be sent periodically.
By default, the switch is disabled from sending gratuitous ARP packets periodically.
■ If the switch is the master switch, it sends gratuitous ARP messages with the IP
address of the VRRP virtual router.
■ If it is not the master switch, it sends gratuitous ARP messages with the primary
and all the secondary IP addresses of the VLAN interface.
Description Use the arp mac-arp-map limit command to set the maximum number of IP
addresses to be bound to a MAC address of a VLAN.
Use the undo arp mac-arp-map limit command to restore the default value.
n Note that:
arp max-entry
Parameter number: Total maximum number of ARP entries, in the range of 4,096 to 8,192.
Description Use the arp max-entry command to set the total maximum number of ARP
entries.
Use the undo arp max-entry command to restore the default setting.
arp max-dynamic-entry
Parameter number: Maximum number of dynamic ARP entries that can be learnt by the port,
ranging from 0 to 8,192.
Description Use the arp max-dynamic-entry command to set the maximum number of
dynamic ARP entries that can be learnt by a port.
Use the undo arp max-dynamic-entry command to restore the default setting.
By default, the maximum number of dynamic ARP entries that can be learnt by a
port is 2,048.
690 CHAPTER 52: ARP CONFIGURATION COMMANDS
Example # Set maximum number of dynamic ARP entries that can be learnt by
Ethernet3/0/1 to 6,000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 3/0/1
[SW7750-Ethernet3/0/1] arp max-dynamic-entry 6000
Parameter time: Recovery time (in the range 1 to 3600 seconds) of a port that has been
disabled from receiving any packet temporarily because its ARP packet receive rate
exceeded the upper limit.
Description Use the arp protective-down recover interval command to specify a recovery
interval. A port is brought up after the interval (since it was disabled).
Use the undo arp protective-down recover interval command to restore the
default.
<SW7750> system
Parameter None
Description Use the arp rate-limit enable command to enable the ARP packet rate limit
function.
Use the undo arp rate-limit enable command to disable the ARP packet rate
limit function.
arp rate-limit 691
With the ARP packet rate limit function enabled, the maximum ARP packet receive
rate on each port is 15 pps by default.
arp rate-limit
Parameter rate: Maximum ARP packet receive rate, in the range of 1 to 1,024 pps.
Description Use the arp rate-limit command to specify the maximum ARP packet receive
rate on ports.
By default, the maximum ARP packet receive rate on a port (except the trusted
port) is 15 pps.
<SW7750> system
Parameter None
Description Use the arp rate-limit trust command to configure the port as a trusted port for
ARP packet rate limit.
692 CHAPTER 52: ARP CONFIGURATION COMMANDS
Use the undo arp rate-limit trust command to configure the port as an
untrusted port for ARP packet rate limit.
By default, the port is an untrusted port for ARP packet rate limit.
Example # Configure Ethernet 2/0/1 as a trusted port for ARP packet rate limit.
<SW7750> system
System View: return to User View with Ctrl+Z.
[SW7750] int Ethernet2/0/1
[SW7750-Ethernet2/0/1] arp rate-limit trust
Parameter None
Description Use the arp relay enable command to enable ARP forwarding in the
protocol-based VLAN(s).
Use the undo arp relay command to disable ARP forwarding in the
protocol-based VLAN(s).
Parameter total: Sets the maximum number of total arbitrary ARP packets that can be sent to
the CPU in a unit of time. (There is no limit on source and destination IP addresses
in ARP packets.)
arp static 693
limit-value: Maximum number of a type of ARP packets that can be sent to the
CPU in a unit of time. When local or total is adopted, this argument ranges from
1 to 4294967295; when through is adopted, the value ranges from 0 to
4294967295.
Description Use the arp source-suppression limit command to set the maximum number
of a type of ARP packets that can be sent to the CPU in a unit of time.
Use the undo arp source-suppression limit command to restore the default
setting.
Make sure your setting for total is greater than the settings for local and
through.
Example # Configure to allow a maximum of 200 ARP packets to be sent to the CPU totally.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] arp source-suppression limit total 200
arp static
mac-address: MAC address for the ARP entry to be created, in the format of
H-H-H.
694 CHAPTER 52: ARP CONFIGURATION COMMANDS
vlan-id: ID of the VLAN to which the static ARP entry belongs, in the range of 1 to
4094.
interface-type: Type of the port to which the static ARP entry belongs.
interface-number: Number of the port to which the static ARP entry belongs.
Description Use the arp static command to create a static ARP entry in the ARP table.
By default, there is no static ARP entry in the ARP table, and ARP entries are
dynamically created by ARP.
n Note that:
■ A static ARP entry keeps valid as long as the Ethernet switch operates normally,
but removing the VLAN of the entry removes the ARP entry.
■ The VLAN specified by the vlan-id argument in the arp static command must
be an existing VLAN configured with the corresponding VLAN interface and its
IP address, and the port specified by the interface-type and interface-number
arguments must belong to the VLAN.
Example # Create a static ARP entry belonging to Ethernet 2/0/1 in VLAN 1, with IP address
202.38.10.2 and MAC address 000f-e201-0000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] arp static 202.38.10.2 000f-e201-0000 1 Ethernet 2/0/1
Parameter aging-time: Aging time for dynamic ARP entries. This argument ranges from 1 to
1,440 in minutes.
Description Use the arp timer aging command to configure the aging time for dynamic ARP
entries.
Use the undo arp timer aging command to restore the default aging time.
Example # Set the aging time for dynamic ARP entries to 10 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] arp timer aging 10
Parameter updating-interval: Interval, in minutes, at which gratuitous ARP packets are sent.
The value range is 1 to 10.
Description Use the arp timer gratuitous-updating command to set a gratuitous ARP
update interval.
Use the undo arp timer gratuitous-updating command to restore the default
gratuitous ARP update interval.
The gratuitous ARP update interval defaults to five minutes after this function is
enabled on the switch.
Example # Set the gratuitous ARP update interval to 10 minutes on the switch.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] arp timer gratuitous-updating 10
display arp
ip-address: IP address. The ARP entry containing this IP address will be displayed.
Executing this command without any parameter will display all ARP entries.
696 CHAPTER 52: ARP CONFIGURATION COMMANDS
Field Description
IP Address IP address contained in an ARP entry
MAC Address MAC address contained in the ARP entry
VLAN ID ID of the VLAN to which the ARP entry belongs
Port Name Index of the port to which the ARP entry belongs
Aging Aging time of the dynamic ARP entry, in minutes
Type Type of the ARP entry
display arp |
Parameter begin: Displays the ARP entries from the first ARP entry that contains the string
specified by the text argument.
exclude: Displays the ARP entries that do not contain the string specified by the
text argument.
include: Displays the ARP entries that contain the string specified by the text
argument.
Description Use the display arp | command to display the ARP entries matching a specified
rule.
display arp attack-list 697
Example # Display the ARP entries that contain the string "77".
<SW7750> display arp | include 77
Type: S-Static D-Dynamic
IP Address MAC Address VLAN ID Port Name Aging Type
192.168.0.77 0000-e8f5-6a4a 1 Ethernet2/0/2 12 D
# Display the ARP entries that do not contain the string "68".
Parameter None
Description Use the display arp attack-list command to display the ARP attack information,
including the attacking MAC address, IP address and the attack time.
Field Description
MAC ADDR MAC address of the ARP attack packet
VLAN VLAN of the ARP attack packet
IP ADDR IP address of the ARP attack packet
PORT NAME Port that received the ARP attack packet
LAST-ATTACK Time of the last ARP attack
COUNT Number of the ARP attack packets
Description Use the display arp entry-limit command to display the number limits of ARP
entries.
If you specify a port, the command will display the total maximum number of ARP
entries and the maximum number of dynamic ARP entries on the port.
If you do not specify a port, the command will display the total maximum number
of ARP entries and the maximum number of dynamic ARP entries on each port.
Description Use the display arp interface command to display the ARP entries of a
specified port.
Parameter None
Description Use the display arp rate-limit command to display ARP packet rate limit
configuration information.
Blocked Ports:
----------------------------------
Description Use the display arp slot command to display the ARP entries of all ports on the
specified slot.
Parameter None
Description Use the display arp source-suppression command to display the ARP source
suppression configuration on the current switch.
Example # Display the ARP source suppression configuration on the current switch.
700 CHAPTER 52: ARP CONFIGURATION COMMANDS
Parameter None
Description Use the display arp timer aging command to display the setting for ARP aging
timer.
The above information shows that the time for ARP aging timer is 20 minutes.
Description Use the display arp vlan command to display the ARP entries of all ports in a
specified VLAN.
gratuitous-arp-learning enable
Parameter None
If an ARP entry in the cache matches the packet, the switch updates the ARP entry
using the sender hardware address carried in the gratuitous ARP packet.
If no ARP entry in the cache matches the packet, an ARP entry corresponding to
the packet is added to the cache.
reset arp
interface: Clears ARP entries of a specified port. interface-type identifies the port
type, and interface-number identifies the port number.
Parameter None
Description Use the reset arp attack-list command to clear the ARP attack information.
Parameter None
Description Use the arp proxy enable command to enable proxy ARP.
Use the undo arp proxy enable command to disable proxy ARP.
Parameter None
Description Use the arp proxy source-vlan enable command to enable intra-VLAN proxy
ARP, so that proxy ARP is able to process intra-VLAN ARP requests to provide Layer
3 connectivity between Layer 2 isolated ports in the same VLAN.
704 CHAPTER 53: PROXY ARP CONFIGURATION COMMANDS
Use the undo arp proxy source-vlan enable command to disable intra-VLAN
proxy ARP, so that proxy ARP only processes inter-VLAN ARP requests instead of
intra-VLAN ARP request.
By default, intra-VLAN proxy ARP is disabled, and proxy ARP only processes
inter-VLAN ARP requests after it is enabled.
Note that intra-VLAN proxy ARP can be enabled only after proxy ARP is enabled.
Example # With proxy ARP enabled, enable intra-VLAN proxy ARP for VLAN 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 2
[SW7750-Vlan-interface2] arp proxy source-vlan enable
Description Use the display arp proxy command to display the status of proxy ARP
(enabled/disabled).
dhcp enable
Parameter None
You must first enable DHCP before performing other DHCP-related configurations.
This configuration is necessary for both DHCP servers and DHCP relay agents.
System view:
Description Use the dhcp select global command to configure the specified interface(s) or
all interfaces to operate in global DHCP address pool mode. Upon receiving a
DHCP packet from a DHCP client through an interface operating in global DHCP
address pool mode, the DHCP server chooses an IP address from a global DHCP
address pool of the local DHCP server and assigns the address to the DHCP client.
Use the undo dhcp select command to restore the default DHCP packet
processing mode.
By default, an interface operates in local DHCP server global address pool mode.
Example # Configure all interfaces to operate in global DHCP address pool mode, so that
when a DHCP packet is received from a DHCP client through any interface, the
DHCP server assigns an IP address in local global DHCP address pools to the DHCP
client.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp select global all
System view:
Description Use the dhcp select interface command to configure the specified interface(s)
to operate in DHCP interface address pool mode. Upon receiving a DHCP packet
from a DHCP client through an interface operating in interface address pool mode,
the DHCP server chooses an IP address from the interface address pool of the local
DHCP server and assigns the address to the DHCP client.
Use the undo dhcp select command to restore the default DHCP packet
processing mode.
By default, an interface operates in local DHCP server global address pool mode.
Example # Configure all interfaces to operate in interface address pool mode, so that when
a DHCP packet is received from a DHCP client through any interface, the DHCP
server assigns an IP address in the local interface address pool to the DHCP client.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp select interface all
Parameter None
Description Use the dhcp server detect command to enable the unauthorized DHCP server
detecting function.
Use the undo dhcp server detect command to disable the unauthorized DHCP
server detecting function.
With the unauthorized DHCP server detecting function enabled, a DHCP server
tracks the information (such as the IP addresses and interfaces) of DHCP servers to
enable the administrator to detect unauthorized DHCP servers in time and take
proper measures.
System view:
Parameter ip-address&<1-8>: IP address of a DNS server. &<1-8> means you can provide up
to eight DNS server IP addresses. When inputting more than one DNS server IP
address, separate two neighboring IP addresses with a space.
all: (In comparison with the ip-address argument) Specifies all DNS server IP
addresses.
all: (In comparison with the interface keyword) Specifies all interface address
pools.
Description Use the dhcp server dns-list command to configure DNS server IP address(es)
for the DHCP address pool(s) of specified interface(s).
Use the undo dhcp server dns-list command to remove the DNS server IP
address(es) configured for the DHCP address pool(s) of the specified interface(s).
If you execute the dhcp server dns-list command repeatedly, the new
configuration overwrites the previous one.
Example # Configure the DNS server IP address 1.1.1.254 for the DHCP address pool of the
VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] dhcp server dns-list 1.1.1.254
dhcp server domain-name 709
System view:
Parameter domain-name: Domain name of the DHCP clients whose IP addresses are from the
specified interface address pool(s). This argument is a string of 3 to 50 characters.
Description Use the dhcp server domain-name command to configure a domain name for
the DHCP clients whose IP addresses are from the specified interface address
pool(s).
Use the undo dhcp server domain-name command to remove the configured
domain name.
Example # Set aabbcc.com as the domain name of the DHCP client whose IP address is
obtained from the DHCP address pool of the current VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] dhcp server domain-name aabbcc.com
dhcp server expired { day day [ hour hour [ minute minute ] ] | unlimited }
710 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
System view:
dhcp server expired { day day [ hour hour [ minute minute ] ] | unlimited } {
interface interface-type interface-number [ to interface-type interface-number ] |
all }
Parameter day day: Specifies the number of days. The day argument ranges from 0 to 365.
hour hour: Specifies the number of hours. The hour argument ranges from 0 to
23.
minute minute: Specifies the number of minutes. The minute argument ranges
from 0 to 59.
unlimited: Specifies that the lease time is unlimited. (But actually, the system
limits the maximum lease time to about 25 years.)
Description Use the dhcp server expired command to configure the lease time of the IP
addresses in the specified interface address pool(s).
Use the undo dhcp server expired command to restore the default lease time.
Example # Set the lease time of the IP addresses in all interface address pools to be 1 day, 2
hours and 3 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server expired day 1 hour 2 minute 3 all
Parameter low-ip-address: IP address that is not available for being assigned to DHCP clients
automatically (An IP address of this kind is known as a forbidden IP address). This
argument also marks the lower end of the range of the forbidden IP addresses.
high-ip-address: IP address that is not available for being assigned to DHCP clients.
This argument also marks the higher end of the range of the forbidden IP
addresses. Note that this argument cannot be less than the low-ip-address
argument. If you do not provide this argument, only the IP address specified by the
low-ip-address argument is forbidden.
Description Use the dhcp server forbidden-ip command to forbid the specified IP
addresses in a DHCP address pool to be automatically assigned.
Note that the specified address range cannot contain statically-bound addresses
when you use the undo dhcp server forbidden-ip command.
Related commands: dhcp server ip-pool, network, static-bind ip-address, dhcp server
static-bind.
Parameter pool-name: Name of a DHCP address pool, which uniquely identifies the address
pool. This argument is a string of 1 to 35 characters.
Description Use the dhcp server ip-pool command to create a global DHCP address pool
and enter DHCP address pool view. If the address pool identified by the pool-name
argument already exists, this command leads you to DHCP address pool view.
Use the undo dhcp server ip-pool command to remove a specified DHCP
address pool.
712 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
System view:
Parameter ip-address&<1-8>: IP address of a WINS server. &<1-8> means you can provide up
to eight WINS server IP addresses. When inputting more than one WINS server IP
address, separate two neighboring IP addresses with a space.
all: (In comparison with the ip-address argument) Specifies all WINS server IP
addresses.
all: (In comparison with the interface keyword) Specifies all interface address
pools.
Description Use the dhcp server nbns-list command to configure WINS server IP address(es)
for the specified DHCP interface address pool(s).
Use the undo dhcp server nbns-list command to remove the WINS server IP
address(es) configured for the specified DHCP interface address pool(s).
If you execute the dhcp server nbns-list command repeatedly, the new
configuration overwrites the previous one.
Example # Configure the WINS server IP address 10.12.1.99 for all the DHCP interface
address pools.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server nbns-list 10.12.1.99 all
System view:
Parameter b-node: Specifies the broadcast type. Nodes of this type acquire host name-to-IP
address mapping by broadcasting.
p-node: Specifies the peer-to-peer type. Nodes of this type acquire host
name-to-IP address mapping by communicating with the WINS server.
m-node: Specifies the m-typed mixed type. Nodes of this type are p-nodes with
some broadcasting features. (The character m here stands for mixed.)
h-node: Specifies the hybrid type. Nodes of this type are b-nodes with
peer-to-peer communicating features.
Description Use the dhcp server netbios-type command to configure the NetBIOS node
type of the DHCP clients whose IP addresses are from the specified interface
address pool(s).
714 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
Use the undo dhcp server netbios-type command to restore the default
NetBIOS node type.
By default, no NetBIOS node type is specified and the default NetBIOS node type is
h-node.
Example # Specify p-node as the NetBIOS node type of the DHCP clients whose IP addresses
are from the DHCP address pool of VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-interface1] dhcp server netbios-type p-node
System view:
Parameter code: Customized option number, ranging from 2 to 254. Note that this argument
cannot be 3, 6, 15, 44, 46, 50 through 55, 57 through 59.
Description Use the dhcp server option command to customize DHCP options for the
specified DHCP interface address pool(s).
Use the undo dhcp server option command to remove the customized DHCP
options.
If you execute the dhcp server option command repeatedly, the new
configuration overwrites the previous one.
Example # Configure option 100 to be 0x11 and 0x22 for all DHCP interface address pools.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server option 100 hex 11 22 all
Parameter packets number: Specifies the number of the packets to be sent in a ping test.
The number argument ranges from 0 to 10 and defaults to 2. Value 0 means no
packet will be sent.
timeout milliseconds: Specifies the timeout time (in milliseconds) of each packet.
The milliseconds argument ranges from 0 to 10,000 and defaults to 500.
Description Use the dhcp server ping command to set the maximum number of the ICMP
packets a DHCP server sends in a ping test and the maximum response timeout
time of each ICMP packet.
Use the undo dhcp server ping command to restore the default settings.
Example # Set the maximum number of the packets the DHCP server sends in a ping test to
10, and the timeout time of each packet to 300 milliseconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ping packets 10
[SW7750] dhcp server ping timeout 300
716 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
Parameter ip-address: IP address to be statically bound. Note that the specified IP address
must belong to the same network segment as that of the VLAN interface.
Description Use the dhcp server static-bind command to statically bind an IP address of the
current address pool to a MAC address.
Use the undo dhcp server static-bind command to cancel an IP-MAC address
binding.
Example # Statically bind the IP address 10.1.1.1 to the MAC address 0000-e03f-0305.
(Assume that the interface address pool of VLAN-interface 1 already exists and the
IP address belongs to the address pool.)
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-interface1] dhcp server static-bind ip-address 10.1.1.1
mac-address 0000-e03f-0305
Description Use the display dhcp server conflict command to display the statistics of IP
address conflicts on the DHCP server.
Field Description
Address Conflicting IP address
Discover Time Time when the conflict is detected
Description Use the display dhcp server expired command to display the lease expiration
information about an IP address, or the lease expiration information about all IP
addresses in one or all DHCP address pools. When all the IP addresses in an
address pool are assigned, the DHCP server assigns the IP addresses that are
expired to DHCP clients.
Example # Display the lease expiration information about the IP addresses in all DHCP
address pools.
<SW7750> display dhcp server expired all
Global pool:
IP address Hardware address Lease expiration Type
Interface pool:
IP address Hardware address Lease expiration Type
Table 114 Field descriptions of the display dhcp server expired command
Field Description
Global pool The information about the expired IP addresses of global address pools
Interface pool The information about the expired IP addresses of interface address pools
IP address Bound IP addresses
Hardware address MAC addresses to which IP addresses are bound
Lease expiration The time when a lease time expires
Type Address binding type
Parameter None
Description Use the display dhcp server free-ip command to display the free (that is,
unassigned) IP addresses.
Description Use the display dhcp server ip-in-use command to display the address binding
information of an IP address, the specified DHCP address pool(s) or all DHCP
address pools.
Example # Display the address binding information of all DHCP address pools.
<SW7750> display dhcp server ip-in-use all
Global pool:
IP address Hardware address Lease expiration Type
2.2.2.2 4444-4444-4444 NOT Used Manual
Interface pool:
IP address Hardware address Lease expiration Type
5.5.5.1 0050-ba28-930a NOT Used Manual
Field Description
Global pool Address binding information of global DHCP address pools
Interface pool Address binding information of interface DHCP address pools
IP address Bound IP address
Hardware address MAC address to which the IP address is bound
Lease expiration Time when the lease expires
Type Address binding type
Parameter None
Description Use the display dhcp server statistics command to display the statistics on a
DHCP server.
Pool Number: 1
Binding
Auto: 1
Manual: 0
Expire: 0
Boot Request: 6
Dhcp Discover: 1
Dhcp Request: 4
Dhcp Decline: 0
Dhcp Release: 1
Dhcp Inform: 0
Boot Reply: 4
Dhcp Offer: 1
Dhcp Ack: 3
Dhcp Nak: 0
Bad Messages: 0
Table 116 Field descriptions of the display dhcp server statistics command
Field Description
Global Pool Statistics about global address pools
Interface Pool Statistics about interface address pools
Pool Number Number of address pools
Auto Number of the automatically bound IP addresses
Manual Number of the manually bound IP addresses
Expire Number of the expired IP addresses
Boot Request: 6 Statistics about the DHCP packets received from DHCP clients
Dhcp Discover: 1
Dhcp Request: 4
Dhcp Decline: 0
Dhcp Release: 1
Dhcp Inform: 0
Boot Reply: 4 Statistics about the DHCP packets sent to DHCP clients
Dhcp Offer: 1
Dhcp Ack: 3
Dhcp Nak: 0
Bad Messages Number of the error DHCP packets
Parameter pool [ pool-name ]: Specifies a global address pool. The pool-name argument, a
string of 1 to 35 characters, is the name of an address pool. If you do not provide
this argument, this command applies to all global address pools.
display dhcp server tree 721
Description Use the display dhcp server tree command to display information about
address pool tree.
Pool name: 6
static-bind ip-address 10.10.1.2 mask 255.0.0.0
static-bind mac-address 000f-e2fc-0001
Parent node:5
option 10 ip-address 255.255.0.0
expired 1 0 0
Pool name: 7
network 10.10.1.64 mask 255.255.255.192
PrevSibling node:5
option 10 ip-address 255.0.0.0
gateway-list 2.2.2.2
dns-list 1.1.1.1
domain-name 444444
nbns-list 3.3.3.3
expired 1 0 0
Table 117 Field descriptions of the display dhcp server tree command
Field Description
Global pool Information about global address pools
Interface pool Information about interface address pools
Pool name Address pool name
network Assignable IP address range
static-bind ip-address 10.10.1.2 mask Statically bound IP and MAC addresses
255.0.0.0
static-bind mac-address 000f-e2fc-0001
722 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
Table 117 Field descriptions of the display dhcp server tree command
Field Description
Child node:6 The address pool 6 is the child node of this
node.
This field can display the information about
the following types of node:
Child node: Displays the information about an
address pool that is a child of the current
address pool.
Parent node: Displays the information about
the address pool that is the parent of the
current address pool.
Sibling node: Displays the information about
the next sibling address pool of the current
address pool. (The order of sibling address
pools are determined by the time when they
are configured.)
PrevSibling node: Displays the information
about the previous sibling address pool of the
current address pool.
option Customized DHCP options
expired The address lease time (in terms of number of
days, hours, and minutes)
gateway-list List of the gateways configured for the DHCP
clients
dns-list List of the DNS servers configured for the
DHCP clients
domain-name The domain name configured for the DHCP
clients
nbns-list List of the WINS servers configured for the
DHCP clients
dns-list
Parameter ip-address&<1-8>: IP address of a DNS server. &<1-8> string means you can
provide up to eight DNS server IP addresses. When inputting more than one IP
address, separate two neighboring IP addresses with a space.
Description Use the dns-list command to configure one or multiple DNS server IP addresses
for a global DHCP address pool.
Use the undo dns-list command to remove one or all DNS server IP addresses
configured for the DHCP address pool.
domain-name 723
If you execute the dns-list command repeatedly, the new configuration overwrites
the previous one.
Example # Configure the DNS server IP address 1.1.1.254 for global DHCP address pool 0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] dns-list 1.1.1.254
domain-name
undo domain-name
Parameter domain-name: Domain name for the DHCP clients of a global DHCP address pool,
a string of 3 to 50 characters.
Description Use the domain-name command to configure a domain name for the DHCP
clients of a global DHCP address pool.
By default, no domain name is configured for the DHCP clients of a global DHCP
address pool.
Example # Configure the domain name "mydomain.com" for the DHCP clients of the
global DHCP address pool 0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] domain-name mydomain.com
expired
undo expired
Parameter day day: Specifies the number of days. The day argument ranges from 0 to 365.
hour hour: Specifies the number of hours. The hour argument ranges from 0 to
23.
minute minute: Specifies the number of minutes. The minute argument ranges
from 0 to 59.
unlimited: Specifies that the lease time is unlimited. (But actually, the system
limits the maximum lease time to about 25 years.)
Description Use the expired command to configure the lease time of the IP addresses in a
global DHCP address pool.
Use the undo expired command to restore the default lease time.
Example # Set the lease time of the IP addresses in the global DHCP address pool 0 to 1 day,
2 hours and 3 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] expired day 1 hour 2 minute 3
gateway-list
Use the undo gateway-list command to remove one or all the configured
gateway IP addresses configured for the DHCP address pool.
Example # Configure the gateway IP address 10.110.1.99 for the global DHCP address pool
0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] gateway-list 10.110.1.99
nbns-list
Parameter ip-address&<1-8>: IP address of a WINS server. &<1-8> means you can provide up
to eight WINS server IP addresses. When inputting more than one IP address,
separate two neighboring IP addresses with a space.
Description Use the nbns-list command to configure one or multiple WINS server IP
addresses for the DHCP clients of a global DHCP address pool.
Use the undo nbns-list command to remove one or all WINS server IP addresses
configured for the DHCP clients.
Example # Configure the WINS server IP address 10.12.1.99 for the global DHCP address
pool 0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] nbns-list 10.12.1.99
netbios-type
undo netbios-type
Parameter b-node: Specifies the broadcast type. Nodes of this type acquire host name-to-IP
address mapping by broadcasting.
p-node: Specifies the peer-to-peer type. Nodes of this type acquire host
name-to-IP address mapping by communicating with the WINS server.
m-node: Specifies the mixed type. Nodes of this type are p-nodes with some
broadcasting features.
h-node: Specifies the hybrid type. Nodes of this type are b-nodes with
peer-to-peer communicating features.
Description Use the netbios-type command to configure the DHCP clients of a global
address pool to be of specified NetBIOS node type.
Use the undo netbios-type command to restore the default NetBIOS node type.
By default, no NetBIOS node type is specified. In this case, the client uses h-node.
Example # Configure the DHCP clients of the global DHCP address pool 0 to be of b-node
type.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] netbios-type b-node
network
undo network
mask mask: Specifies a subnet mask in dotted decimal notation. If you do not
specify the mask argument, the default subnet mask is used.
Description Use the network command to configure a dynamically assigned IP address range
(where IP addresses will be dynamically assigned to DHCP clients).
Note that you can configure only one such IP address range for a DHCP address
pool. If you execute the network command repeatedly, the new configuration
overwrites the previous one.
Example # Configure the dynamically assigned IP address range 192.168.8.0/24 for the
global DHCP address pool 0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] network 192.168.8.0 mask 255.255.255.0
option
Parameter code: Customized option number ranging from 2 to 254. Note that this argument
cannot be 3, 6, 15, 44, 46, 50 through 55, 57 through 59.
Description Use the option command to customize DHCP options for a global DHCP address
pool.
Use the undo option command to remove the customized DHCP options.
If you execute the option command repeatedly, the new configuration overwrites
the previous one.
Example # Configure option 100 to be 0x11 and 0x22 for the global DHCP address pools.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] option 100 hex 11 22
728 CHAPTER 54: DHCP SERVER CONFIGURATION COMMANDS
Description Use the reset dhcp server conflict command to clear address conflict statistics.
Parameter all: Clears the dynamic address binding information about all IP addresses.
Description Use the reset dhcp server ip-in-use command to clear the specified or all
dynamic address binding information.
Example # Clear the dynamic address binding information about the IP address 10.110.1.1.
<SW7750> reset dhcp server ip-in-use ip 10.110.1.1
reset dhcp server statistics 729
Parameter None
Description Use the reset dhcp server statistics command to clear the statistics on a DHCP
server, such as the number of DHCP unrecognized packets/request
packets/response packets.
static-bind ip-address
mask mask: Subnet mask of the specified IP address. If you do not specify the
mask argument, the default subnet mask is used.
n Note that:
■ The static-bind ip-address command must be used together with the
static-bind mac-address command, to specify a statically bound IP address or
MAC address.
■ If you execute the static-bind ip-address command repeatedly, the new
configuration overwrites the previous one.
Example # Bind the IP address 10.1.1.1 (with the subnet mask 255.255.255.0) to the MAC
address 0000-e03f-0305.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] static-bind ip-address 10.1.1.1 mask 255.255.255.0
[SW7750-dhcp-pool-0] static-bind mac-address 0000-e03f-0305
static-bind mac-address
Parameter mac-address: MAC address of the host to which the IP address is to be bound. You
need to provide this argument in the form of H-H-H.
Description Use the static-bind mac-address command to specify a MAC address to which
an IP address will be bound statically.
n Note that:
■ The static-bind ip-address command must be used together with the
static-bind mac-address command, to respectively specify a statically bound
IP address and MAC address.
■ If you execute the static-bind mac-address command repeatedly, the new
configuration overwrites the previous one.
Example # Bind the IP address 10.1.1.1 (with the subnet mask 255.255.255.0) to the MAC
address 0000-e03f-0305.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp server ip-pool 0
[SW7750-dhcp-pool-0] static-bind ip-address 10.1.1.1 mask 255.255.255.0
[SW7750-dhcp-pool-0] static-bind mac-address 0000-e03f-0305
DHCP RELAY AGENT CONFIGURATION
55 COMMANDS
address-check
address-check disable
Parameter None
Description Use the address-check enable command to enable the address checking
function of the DHCP relay agent.
By default, the address checking function of the DHCP relay agent is disabled on a
VLAN interface.
Example # Enable the address checking function of the DHCP relay agent on
VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-interface1] address-check enable
Address check turns on!
address-check dhcp-relay
Parameter None
Description Use the address-check dhcp-relay enable command to validate the dynamic
entries generated by the DHCP relay agent.
732 CHAPTER 55: DHCP RELAY AGENT CONFIGURATION COMMANDS
By default, the dynamic entries generated by the DHCP relay agent are valid.
This configuration will take effect only after the address checking function of the
DHCP relay agent on the VLAN interface is enabled.
Example # Invalidate the dynamic entries generated by the DHCP relay agent.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] address-check enable
[SW7750-Vlan-interface1] address-check dhcp-relay disable
Description Use the address-check field enable command to enable checking of the
specified field.
By default, after enabled with the address checking function, the DHCP relay
agent checks the IP address, MAC address, VLAN ID, and port number of a DHCP
client respectively.
Example # Disable the checking of the VLAN ID and port number on VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] address-check field vlan disable
[SW7750-Vlan-interface1] address-check field port disable
address-check no-matched
Parameter None
By default, freely-connected clients are not allowed to pass DHCP security check.
This configuration will take effect only after the address checking function of the
DHCP relay agent on the VLAN interface is enabled.
Example # Configure to not allow freely-connected clients to pass DHCP security check on
VLAN-interface 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] address-check enable
[SW7750-Vlan-interface1] address-check no-matched enable
Description Use the dhcp-relay gateway interface command to specify a gateway address
by binding one or multiple ports in the VLAN to one of the VLAN interface’s IP
addresses.
Description Use the dhcp-relay gateway vlan command to specify a gateway address by
binding the Ethernet port in a VLAN to one of the VLAN interface’s IP addresses.
Use the undo dhcp-relay gateway command to remove the specified binding
entry.
n Note that:
If the Ethernet port belongs to a sub-VLAN, you need to specify the ip address
argument as the primary or secondary IP address of the corresponding super VLAN
interface, and specify the vlan-id argument as the VLAN ID of the super VLAN;
otherwise, the system prompts error information due to VLAN mismatch.
Example # Specify a gateway address by binding Ethernet 2/0/4 in VLAN 2 to the secondary
IP address 10.1.1.2 of VLAN-interface 2.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/4
[SW7750-Ethernet2/0/4] dhcp-relay gateway 10.1.1.2 vlan 2
Parameter None
Description Use the dhcp relay information enable command to enable option 82
supporting on a DHCP relay agent, through which you can enable the DHCP relay
agent to insert option 82 into DHCP request packets sent to a DHCP server.
Use the undo dhcp relay information enable command to disable option 82
supporting on a DHCP relay agent, through which you can disable the DHCP relay
agent from inserting option 82 into DHCP request packets sent to a DHCP server.
Parameter drop: Specifies to discard the DHCP request packets that carry option 82.
keep: Specifies to remain the DHCP request packets that carry option 82
unchanged.
replace: Specifies to replace option 82 carried by a DHCP request packet with that
of the DHCP relay agent.
Description Use the dhcp relay information strategy command to instruct a DHCP relay
agent to perform specified operations to DHCP request packets that carry option
82.
Use the undo dhcp relay information strategy command to instruct a DHCP
relay agent to perform the default operations to DHCP request packets that carry
option 82.
By default, the DHCP relay agent replaces the option 82 carried by a DHCP request
packet with its own option 82.
Example # Instruct the DHCP relay agent to drop the DHCP request packets that carry
option 82.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp relay information strategy drop
Parameter None
Description Use the dhcp relay reply broadcast command to force the DHCP relay agent
to broadcast the responses (including DHCP-OFFER, DHCP-ACK, or DHCP-ACK) to
the clients.
Use the undo dhcp relay reply broadcast command to restore the default
settings.
Parameter None
Description Use the dhcp relay source-ip source-interface command to specify the
source IP address of uplink packets to the DHCP server as the IP address of the
relay agent’s interface that connects to the clients.
Use the undo dhcp relay source-ip source-interface command to disable this
function.
dhcp-security static 737
By default, this function is disabled. That is, the source IP address of packets
forwarded to the DHCP server is the IP address of the relay agent’s interface that
connects to the DHCP server.
Example # Specify the source IP address of uplink packets as that of the receiving interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp relay source-ip source-interface
dhcp-security static
Description Use the dhcp-security static command to configure a static client address entry
on the DHCP relay agent, in which an IP address can be bound to one or more
objects among MAC address, VLAN, and port.
Use the undo dhcp-security command to remove one or all client address
entries from the DHCP relay agent.
Example # Configure a static client address entry on the DHCP relay agent.
<SW7750> system-view
System View: return to User View with Ctrl+Z
[SW7750] dhcp-security static 1.1.1.1 mac 0005-5D02-F2B3 vlan 1 port
Ethernet2/0/2
738 CHAPTER 55: DHCP RELAY AGENT CONFIGURATION COMMANDS
dhcp-server
undo dhcp-server
Parameter groupNo: DHCP server group number. This argument ranges from 0 to 19.
Description Use the dhcp-server command to map the current VLAN interface to a DHCP
server group.
dhcp-server ip
Description Use the dhcp-server ip command to configure the DHCP server IP address(es) in
a specified DHCP server group.
Use the undo dhcp-server command to remove all DHCP server IP addresses in a
DHCP server group.
Example # Configure three DHCP server IP addresses 1.1.1.1, 2.2.2.2, and 3.3.3.3 for DHCP
server group 1, so that this group contains three DHCP servers (server 1, server 2
and server 3).
display dhcp-security 739
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp-server 1 ip 1.1.1.1 2.2.2.2 3.3.3.3
display dhcp-security
Parameter ip-address: IP address. This argument is used to display the user address entry with
the specified IP address.
Description Use the display dhcp-security command to display one or all user address
entries, or a specified type of user address entries in the valid user address table of
a DHCP server group.
Example # Display all user address entries contained in the valid user address table of the
DHCP server group.
<SW7750> display dhcp-security
IP Address MAC Address Vlan ID Port Type
192.168.4.1 00e0-fc00-000b 100 GigabitEthernet2/0/13 Dynamic
192.168.0.3 000d-88f8-4e71 --- --- Static
192.168.0.45 00d0-eee3-ff11 --- --- Static
--- 3 dhcp-security item(s) found ---
Table 118 Field descriptions of the display dhcp-security command
Field Description
IP Address IP address of the DHCP client
MAC Address MAC address of the DHCP client
VLAN ID ID of the VLAN to which the DHCP client belongs
Port Type and number of the relay agent’s port connecting to the DHCP client
Type Type of the user address entry (static or dynamic)
display dhcp-server
Description Use the display dhcp-server command to display information about a specified
DHCP server group.
740 CHAPTER 55: DHCP RELAY AGENT CONFIGURATION COMMANDS
Field Description
IP address of DHCP server group 0: DHCP server IP addresses of DHCP server group 0
Messages from this server group Number of packets received from the DHCP server
group
Messages to this server group Number of packets sent to the DHCP server group
Messages from clients to this server group Number of packets received from the DHCP
clients
Messages from this server group to clients Number of packets sent to the DHCP clients
DHCP_OFFER messages Number of received DHCP-OFFER packets
DHCP_ACK messages Number of received DHCP-ACK packets
DHCP_NAK messages Number of received DHCP-NAK packets
DHCP_DECLINE messages Number of received DHCP-DECLINE packets
DHCP_DISCOVER messages Number of received DHCP-DISCOVER packets
DHCP_REQUEST messages Number of received DHCP-REQUEST packets
DHCP_INFORM messages Number of received DHCP-INFORM packets
DHCP_RELEASE messages Number of received DHCP-RELEASE packets
BOOTP_REQUEST messages Number of BOOTP request packets
BOOTP_REPLY messages Number of BOOTP response packets
Description Use the display dhcp-server interface command to display information about
the DHCP server group to which a VLAN interface is mapped.
Example # Display information about the DHCP server group to which VLAN 2 interface is
mapped.
<SW7750> display dhcp-server interface vlan-interface 2
The DHCP server group of this interface is 0
The above display information indicates the VLAN 2 interface is mapped to DHCP
server group 0.
reset dhcp-server
Description Use the reset dhcp-server command to clear the statistics information of the
specified DHCP server group.
Parameter None
Description Use the undo dhcp-relay gateway all command to delete all the gateways
configured on the DHCP relay agent, that is, to remove the bindings between the
VLAN interfaces’ IP addresses (primary or secondary) and the ports in the VLANs.
742 CHAPTER 55: DHCP RELAY AGENT CONFIGURATION COMMANDS
Example # Delete all the gateways configured on the DHCP relay agent.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] undo dhcp-relay gateway all
DHCP SNOOPING CONFIGURATION
56 COMMANDS
dhcp-snooping
Syntax dhcp-snooping
undo dhcp-snooping
Parameter None
Description Use the dhcp-snooping command to enable the DHCP snooping function, so as
to allow the switch to listen to the DHCP broadcast packets.
Parameter None
Parameter hex: Specifies the storage format of Option 82 as HEX (namely, hexadecimal
string).
Parameter extended: Specifies the padding format for Option 82 as the extended format.
standard: Specifies the padding format for Option 82 as the standard format.
dhcp-snooping information remote-id 745
Example # Configure the padding format for Option 82 as the standard one.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp-snooping information packet-format standard
Parameter sysname: Uses the system name of the DHCP snooping device to pad the remote
ID sub-option in Option 82.
Example # Configure the remote ID sub-option of Option 82 as the system name of the
DHCP snooping device.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp-snooping information remote-id sysname
Parameter drop: If a packet contains Option 82, DHCP snooping drops this packet.
746 CHAPTER 56: DHCP SNOOPING CONFIGURATION COMMANDS
keep: If a packet contains Option 82, DHCP snooping keeps and forwards this
packet.
replace: If a packet contains Option 82, DHCP snooping replaces the original
Option 82 field with the Option 82 field having the specified padding content and
forwards the packet.
By default, DHCP snooping replaces the Option 82 field in the requests sent by the
DHCP clients.
c CAUTION:
■ Enable DHCP-snooping and DHCP-snooping Option 82 before performing this
configuration.
■ If a handling policy is configured on a port, this configuration overrides the
globally configured handling policy for requests received on this port, while the
globally configured handling policy applies on those ports where a handling
policy is not natively configured.
Example # Configure the keep handling policy for DHCP requests that contain Option 82
on the DHCP snooping device.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dhcp-snooping information strategy keep
Parameter vlan vlan-id: Specifies a VLAN. DHCP packets from the VLAN are padded with the
circuit ID sub-option.
With vlan vlan-id specified, the customized circuit ID sub-option applies only to
the DHCP packets from the specified VLAN. With no vlan vlan-id specified, the
customized circuit ID sub-option applies to all DHCP packets that pass through the
current port.
By default, the circuit ID field in Option 82 contains the VLAN ID and index of the
port that received the client’s request.
If you have configured a circuit ID with the vlan vlan-id argument specified, and
the other one without the argument in Ethernet port view, the former circuit ID
applies to the DHCP messages from the specified VLAN, while the latter one
applies to DHCP messages from other VLANs.
With vlan vlan-id specified, the customized remote ID sub-option applies only to
the DHCP packets from the specified VLAN. Without vlan vlan-id specified, the
customized remote ID sub-option applies to all DHCP packets that pass through
the current port.
If you have configured a remote ID with the vlan vlan-id argument specified, and
the other one without the argument in Ethernet port view, the former remote ID
applies to the DHCP messages from the specified VLAN, while the latter one
applies to DHCP messages from other VLANs.
Example # Configure the remote ID of Option 82 in DHCP packets to abc on the port
Ethernet 2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] dhcp-snooping information remote-id string abc
dhcp-snooping trust
Parameter None
Description Use the dhcp-snooping trust command to specify an Ethernet port as a trusted
port.
■ Trusted ports can be used to connect DHCP servers or ports of other switches.
Untrusted ports can be used to connect DHCP clients or networks.
display dhcp-snooping 749
■ Trusted ports forward any received DHCP packets to ensure that DHCP clients
can obtain IP addresses from valid DHCP servers. Untrusted ports discard the
DHCP-ACK and DHCP-OFFER responses received from DHCP servers.
display dhcp-snooping
Parameter None
Description Use the display dhcp-snooping command to display the IP-MAC mapping
relations recorded by the DHCP snooping-enabled switch.
Example # Display the IP-MAC mapping relations recorded by the DHCP snooping-enabled
switch.
<SW7750> display dhcp-snooping
DHCP snooping is enabled globally.
Type : D--Dynamic , S--Static
Type IP Address MAC Address Lease VLAN Interface
==== =============== =============== ========= ==== =================
--- 0 DHCP snooping item(s) found ---
Parameter None
Description Use the display dhcp-snooping count command to display the total number
of DHCP-Snooping entries.
750 CHAPTER 56: DHCP SNOOPING CONFIGURATION COMMANDS
Parameter None
Example # Display the state of the DHCP snooping function and the trusted ports.
<SW7750> display dhcp-snooping trust
Interface Trusted
=================================
Ethernet3/0/3 Trusted
The above information indicates that the Ethernet 3/0/3 port is a trusted port.
Parameter vlan-list: Displays the VLAN lists in the specified VLAN range, in the format of
vlan-list = { vlan-id [ to vlan-id ] }&<1-10>. where, vlan-id is in the range of 1 to
4094, and &<1-10> means that you can specify up to 10 VLANs or VLAN ranges
for this argument.
Description Use the display dhcp-snooping vlan command to display the IP-MAC mapping
relations recorded by the DHCP-Snooping-enabled switch in the specified VLAN.
Parameter vlan-id: ID of the VLAN whose IP static binding entries are to be displayed.
Description Use the display ip source static binding command to display the IP static
binding entries configured. If you specify a VLAN, all the IP static binding entries
for the specified VLAN will be displayed. If you specify a port, all the IP static
binding entries for the specified port will be displayed.
Parameter mac-address: Enables IP filtering based on the source MAC address of the
packets.
Description Use the ip check source ip-address command to enable the filtering of the IP
packets received through the current port based on the source IP address of the
packets.
752 CHAPTER 56: DHCP SNOOPING CONFIGURATION COMMANDS
Use the undo ip check source ip-address command to disable the filtering of
the IP packets received through the current port based on the source IP address of
the packets.
By default, the filtering of the IP packets received on a port based on the source IP
address and/or source MAC address of the packets is disabled.
Example # Enable the filtering of the IP packets received through port Ethernet 2/0/11
based on the source IP address of the packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/11
[SW7750-Ethernet2/0/11] ip check source ip-address
Description Use the ip source static binding ip-address command to configure the static
binding among source IP address, source MAC address, and the port number so as
to generate static binding entries.
Use the undo ip source static binding ip-address command to remove the
static binding among source IP address, source MAC address, and the port.
By default, no binding among source IP address, source MAC address, and the
port number is configured.
Example # Configure static binding among source IP address, source MAC address, and
Ethernet 2/0/3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/3
[SW7750-Ethernet2/0/3] ip source static binding ip-address 1.1.1.1 mac-address 0015-e20f-0101
reset dhcp-snooping 753
reset dhcp-snooping
Description Use the reset dhcp-snooping command to clear the specified IP-MAC mapping
relation or all the IP-MAC mapping relations recorded by the
DHCP-Snooping-enabled switch.
acl
Syntax acl { number acl-number | name acl-name [ advanced | basic | link | user ] } [
match-order { config | auto } ]
Parameter number acl-number: Specifies the number of an access control list (ACL) in the
range of:
■ 2,000 to 2,999: identifies basic ACLs.
■ 3,000 to 3,999: identifies advanced ACLs (ACL 3998 and ACL 3999 are
reserved for cluster management, and you cannot configure them.).
■ 4,000 to 4,999: identifies layer 2 ACLs.
■ 5,000 to 5,999: identifies user-defined ACLs.
config: When matching ACL rules, the user’s configuration order is employed.
Description Use the acl command to define an ACL and enter the corresponding ACL view.
756 CHAPTER 57: ACL COMMANDS
Use the undo acl command to delete all entries of an ACL identified by a number
or a name, or the entire ACL.
By default, ACL rules are matched according to the configured order (config).
After entering the corresponding ACL view, you can use the rule command to add
entries to the ACL (use the quit command to quit ACL view).
n User-defined ACL can only be activated on the I/O Modules other than Type A.
You can use the match-order keyword to specify whether to use the configured
order or "depth-first" order (rules with smaller ranges are matched first) to match
rules. If neither match orders are specified, the configured match order will be
adopted.
You cannot modify the match order for an ACL once you have specified it, unless
you delete all the entries of the ACL, and specify the match order over again.
The ACL match order feature is effective only when the ACL is referenced by
software for data filtering and traffic classification.
Related command: rule (Basic ACL), rule (Advanced ACL), rule (Layer 2 ACL), rule (user-defined
ACL), and acl mode.
Example # Define rules for ACL 2000, and specify "depth-first" order as the rule match
order.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000 match-order auto
acl mode
Description Use the acl mode command to set the traffic classification mode for the device.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl mode ip-based
acl order
Parameter auto: Specifies the ACL rules sent to hardware are match according to the
depth-first order.
Description Use the acl order command to set the match order for the ACL rules sent to
hardware.
By default, the configured ACL rules sent to hardware take effect in the depth-first
order.
Use the acl match-order { config | auto } command to set the match order of
ACL rules when they are configured (before they are sent to hardware). While use
the acl order command is to set the match order of ACL rules after they are
configured (after they are sent to hardware).
Parameter all: Displays all ACLs (including those identified by a number or a name).
quotation mark in it; and the word all is not allowed to use in the ACL name to
avoid confusion.
Description Using the display acl config command, you can view the detailed configuration
information of an ACL, including every subrule, sequence number and the times
matched with this rule.
The matched times displayed by this command is software matched times, namely,
the matched times of ACL to be processed by switch CPU. You can use the
traffic-statistic command to calculate the matched times of hardware during
packet-forwarding. You can use the display qos-interface traffic-statistic
command to view the calculation result. See traffic-statistic on page 803 and
display qos-interface traffic-statistic on page 783 for more information.
Parameter None
Description Use the command display acl config statistics to display the statistics of the
current configured ACL rules, including the basic, advanced, Layer 2 and
user-defined ACL rules number, and the total number of ACL rules configured by
the system.
Example # Display statistics information about the current configured ACL rules.
<SW7750> display acl config statistics
The configured rule statistics:
Basic rule(s): 5
Advanced rule(s): 132
Link rule(s): 4
User rule(s): 2
Parameter None
Description Use the display acl mode command to view the ACL running mode chosen by
the switch for filtering the traffic.
Parameter None
Description Use the display acl order command to display the match order of the ACL rules
sent to a port.
Description Use the display acl remaining entry slot command to display the remaining
ACL entries on a specified slot. The displayed content includes the entry resource
type, total entries resource number, reserved entries number for system ACL,
number of configured ACL entries, number of remaining ACL entries, and the
corresponding start port number and end port number of each type of entry.
Field Description
Resource Type Entry resource type
Total Number Total entries resource number
Reserved Number Number of entries reserved for system ACL during initiation
Configured Number Number of entries used by the ACL configured by users
Remaining Number Number of remaining entries
Start Port Name The corresponding start port number of each type of entry
End Port Name The corresponding end port number of each type of entry
Parameter all: Represents all the ACLs to be displayed (including those identified by a
number or a name).
Description Use the display acl running -packet-filter command to view the information
of the activated ACL. The displayed content includes the interface on which ACL is
activated, the activation direction, ACL name, ACL rule number and activation
status.
display time-range
time-name: Name of a time range, a case insensitive string that starts with an
English letter a-z or A-Z and contains up to 32 characters. To avoid confusion, you
are not allowed to use the word all in the time range name.
Description Use the display time-range command to view the configuration and status of
the current time range. For an active time range, this command displays "Active";
for an inactive time range, this command displays "Inactive".
Note that there is a delay (about 1 minute) when the system updates the ACL
status. And the display time-range command will judge according to the current
time. Therefore, sometimes you may find that a time range is active while the ACL
referencing the time range is not activated by using the display time-range
command. This is natural.
Total Time-range : 2
Table 121 Field descriptions of the display time-range command
Field Description
Current time is 14:36:36 4-3-2003 Thursday System time
Time-range : hhy ( Inactive ) Time range hhy. "Inactive" indicates that this
time range is currently in the inactive state
from 08:30 2-5-2005 to 18:00 2-19-2005
(while "Active" indicates that the time range
is in the active state), and the time range is
from 8:30 February 5, 2005 to 18:00 February
19 2005.
Total Time-range Number of time ranges defined in the system.
Field Description
Current time is 14:36:36 4-3-2003 Thursday The current time of the system.
762 CHAPTER 57: ACL COMMANDS
Field Description
Time-range : tm1 ( Inactive ) Time range tm1. "Inactive" indicates that this
time range is currently in the inactive state
from 08:30 2-5-2005 to 18:00 2/19/2005
(while "Active" indicates that the time range
is in the active state), and the time range is
from 8:30 February 5, 2005 to 18:00 February
19 2005.
packet-filter
The command line format for the I/O Modules other than Type A:
packet-filter inbound acl-rule [ system-index system-index ]
n Combined activating of IP ACL and Link ACL is supported by the I/O Modules other
than Type A. But the total character number of the fields defined by IP ACL and
Link ACL can not exceed 32 characters; otherwise the ACL can not be activated.
acl-rule: Applied ACL rules, which can be the combination of different types of
ACL rules. Table 123and Table 125 describe the ACL combinations on Type A I/O
Modules and the corresponding parameter description. Table 124 and Table 125
describe the ACL combinations on I/O Modules other than Type A and the
corresponding parameter description.
Table 124 Combined application of ACLs on I/O Modules other than Type A.
Parameter Description
ip-group { acl-number | acl-name } Basic and advanced ACL.
acl-number: ACL number, ranging from 2,000
to 3,999.
acl-name: ACL name, case insensitive string,
up to 32 characters long, beginning with an
English letter (a to z or A to Z), without space
or quotation mark.
link-group { acl-number | acl-name } Layer 2 ACL
acl-number: ACL number, ranging from 4,000
to 4,999.
acl-name: ACL name, case insensitive string,
up to 32 characters long, beginning with an
English letter (a to z or A to Z), without space
or quotation mark.
user-group { acl-number | acl-name } User-defined ACL
acl-number: ACL number, ranging from 5,000
to 5,999.
acl-name: ACL name, case insensitive string,
up to 32 characters long, beginning with an
English letter (a to z or A to Z), without space
or quotation mark.
rule-id Number of the ACL rule, ranging from 0 to
127.
If this argument is not specified, all rules in the
specified ACL will be applied.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
764 CHAPTER 57: ACL COMMANDS
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
Description Use the packet-filter command to activate ACL on a port to filter packets.
acl-name: ACL name, a case insensitive string, 1 to 32 characters, which must start
with an English letter (a-z or A-Z), and there should not be a space or quotation
mark in it; key word all is not allowed to use in the ACL name to avoid confusion.
Description Use the reset acl counter command to clear ACL statistics.
Table 126 The comparison between reset commands of statistics information
Command Function
reset acl counter Reset the statistics information of the ACL which is used to filter or
classify the data treated by the software of a switch. The case
includes: ACL cited by route policy function, ACL used for controlling
logon user, etc.
rule (Basic ACL) 765
Command Function
reset traffic-statistic Reset statistic information of traffic. This command is applicable to the
ACL which is used to filter or classify the data transmitted by the
hardware of a switch. Commonly, this command is used to reset the
statistics information recorded by the traffic-statistic command.
Syntax rule [ rule-id ] { permit | deny } [ source { source-addr wildcard | any } | fragment
| time-range time-name ]*
fragment: Specifies that the rule takes effect on non-initial fragment packets.
time-range time-name: Specifies a time range within which the rule is valid.
time-name is the time range name, a case insensitive string of 1 to 32 characters,
must start with an English letter a to A or A to Z. To avoid confusion, you are not
allowed to use the word all in the time range name.
Use the undo rule command to delete an ACL rule or the attribute information
of an ACL rule.
Before you can delete a rule, you need to specify the rule ID. If you do not know
the rule ID, you can view it by the display acl command.
In the case that you specify the rule ID when defining a rule:
766 CHAPTER 57: ACL COMMANDS
■ If the rule corresponding to the specified rule ID already exists, you will edit the
rule, and the modified part in the rule will replace the original content, while
other parts remain unchanged.
■ If the rule corresponding to the specified rule ID does not exists, you will create
and define a new rule.
■ The content of a newly created rule must not be identical with the content of
any existing rule; otherwise the rule creation will fail, and the system will
prompt that the rule already exists.
If you do not specify a rule ID, you will create and define a new rule, and the
system will assign an ID for the rule automatically.
n Type A I/O Modules do not support to apply ACL rules configured with fragment
to hardware..
Example # Define a rule to deny the packets whose source IP addresses are 1.1.1.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule deny source 1.1.1.1 0
To define DSCP priority, you can directly input a value ranging from 0 to 63, or
input a keyword listed in Table 128.
To define the IP precedence, you can directly input a value ranging from 0 to 7, or
input a keyword listed in the following table.
To define the ToS value, you can directly input a value ranging from 0 to 15, or
input a keyword listed in the following table.
If the protocol type is TCP or UDP, you can also define the following information:
rule (Advanced ACL) 769
n Only Type A I/O Modules support the "range" operation on the TCP/UDP port.
If the protocol type is ICMP, you can also define the following information:
If the protocol type is ICMP, you can also directly input the ICMP message name
after the icmp-type argument. Table 133 describes some common ICMP
messages.
Use the undo rule command to delete an ACL rule or the attribute information
of an ACL rule.
Before you can delete a rule, you need to specify the rule ID. If you do not know
the rule ID, you can view it by the display acl command.
In the case that you specify the rule ID when defining a rule:
■ If the rule corresponding to the specified rule ID already exists, you will edit the
rule, and the modified part in the rule will replace the original content, while
other parts remain unchanged.
■ If the rule corresponding to the specified rule ID does not exists, you will create
and define a new rule.
■ The content of a newly created rule must not be identical with the content of
any existing rule; otherwise the rule creation will fail, and the system will
prompt that the rule already exists.
If you do not specify a rule ID, you will create and define a new rule, and the
system will assign an ID for the rule automatically.
n Type A I/O Modules do not support to apply ACL rules configured with tos tos, or
fragment to hardware.
Example # Define a rule to permit TCP packets from hosts in the network segment of
129.9.0.0 to hosts in the network of 202.38.160.0 and with the port number of
80 to pass.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 3101
rule (Layer 2 ACL) 771
To define the CoS value, you can directly input a value ranging from 0 to 7, or
input a keyword listed in the following table.
Before you can delete a rule, you must specify the rule ID. If you do not know the
rule ID, you can view it by using the display acl command.
In the case that you specify the rule ID when defining a rule:
■ If the rule corresponding to the specified rule ID already exists, you will edit the
rule, and the modified part in the rule will replace the original content, while
other parts remain unchanged.
rule (user-defined ACL) 773
■ If the rule corresponding to the specified rule ID does not exists, you will create
and define a new rule.
■ The content of a newly created rule must not be identical with the content of
any existing rule; otherwise the rule creation will fail, and the system will
prompt that the rule already exists.
If you do not specify a rule ID, you will create and define a new rule, and the
system will assign an ID for the rule automatically.
Example # Define an ACL to deny the packets with the source MAC address being
000d-88f5-97ed, the destination MAC address being 0011-4301-991e, and the
802.1p priority being 3, to pass.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] acl number 4000
[SW7750-acl-link-4000] rule deny cos 3 ingress 000d-88f5-97ed ffff-f
fff-ffff egress 0011-4301-991e ffff-ffff-ffff
rule-mask: User-defined mask of the rule. It is used to perform the logical AND
operations with packets and must be an even number containing 2 to 160
hexadecimal characters. Note that its length must be the same with that of
rule-string.
offset: Mask offset of the rule. It specifies a byte, through its offset from the
packet header, in the packet as the starting point to perform logical AND
operations. It ranges from 0 to 79 bytes, and the maximum value becomes one
byte less when the value of rule-string (and rule-mask) has two more characters.
For example, when rule-string and rule-mask contains two characters respectively,
the maximum value of offset is 79 bytes; when the former contains four
characters respectively, the maximum value of offset is 78 bytes, and so on.
&<1-8>: At most eight rule-string rule-mask offsets can be defined at one time.
774 CHAPTER 57: ACL COMMANDS
time-name: Specifies a time range within which the rule is valid. time-name: Name
of a time range, a case insensitive string that starts with an English letter (a-z or
A-Z) and contains up to 32 characters. To avoid confusion, you are not allowed to
use the word all in the time range name.
Use the undo rule command to delete an ACL rule or the attribute information
of an ACL rule.
Before you can delete a rule, you need to specify the rule ID. If you do not know
the rule ID, you can view it by the display acl command.
In the case that you specify the rule ID when defining a rule:
■ If the rule corresponding to the specified rule ID already exists, you will edit the
rule, and the modified part in the rule will replace the original content, while
other parts remain unchanged.
■ If the rule corresponding to the specified rule ID does not exists, you will create
and define a new rule.
■ The content of a newly created rule must not be identical with the content of
any existing rule; otherwise the rule modification or creation will fail, and the
system will prompt that the rule already exists.
If you do not specify a rule ID, you will create and define a new rule, and the
system will assign an ID for the rule automatically.
n Only I/O Modules other than Type A support the user-defined ACL.
time-range
Parameter time-name: Name of a time range, a case insensitive string that starts with an
English letter a-z or A-Z and contains up to 32 characters. To avoid confusion, you
are not allowed to use the word all in the time range name.
start-time: Start time of a special time range, in the form of hh:mm. Optional
argument.
end-time: End time of a special time range, in the form of hh:mm. Optional
argument.
days-of-the-week: Day of the week when the special time range is effective.
Optional argument. Available arguments and argument combinations are as
follows:
■ Numerals (0 to 6)
■ Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, and Sunday
■ Working days (Monday through Friday)
■ Off days (Saturday and Sunday)
■ Daily, namely everyday of the week
from start-time start-date: Specifies the start date of a special time range,
optional. In the form of hh:mm MM/DD/ YYYY, start-time start-date and end-time
end-date jointly define a date in which the special time range takes effect.
to end-time end-date: Specifies the end date of a special time range, optional. In
the form of hh:mm MM/DD/ YYYY, start-time start-date and end-time end-date
jointly define a date on which the special time range takes effect.
Use the undo time-range all command to delete all time ranges.
The time range defined by means of the time-range command can include
absolute time sections and periodic time sections. start-time and end-time
days-of-the-week jointly define a periodic time section, while start-time start-date
and end-time end-date jointly define an absolute time section.
If only a periodic time section is defined in a time range, the time range is active
only within the defined periodic time section.
If only an absolute time section is defined in a time, the time range is active only
within the defined absolute time section.
If both a periodic time section and an absolute time section are defined in a time
range, the time range is active only when the periodic time range and the absolute
time range are both matched. Assume that a time range defines an absolute time
section from 00:00 January 1, 2004 to 23:59 December 31, 2004, and a periodic
time section from 12:00 to 14:00 every Wednesday. This time range is active only
from 12:00 to 14:00 every Wednesday in 2004.
776 CHAPTER 57: ACL COMMANDS
The time ranges supported by the switch are within 1970/1/1 to 2100/12/31
(January 1, 1970 to December 31, 2100).
Example # Defines an absolute time section "test" that is effective from 00:00 January 1,
2000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] time-range test from 00:00 2000/1/1
QOS COMMANDS
58
display priority-trust
Parameter None
Description Use the display priority-trust command to display the priority type according
to which the switch puts a packet into an output queue on a port.
Example # Display the queue scheduling mode and the related parameters.
<SW7750> display priority-trust
The information above shows that the switch put a packet into an output queue
on a port according to the local precedence of the packet.
Parameter None
Description Use the display qos-interface all command to view all the QoS configuration
of the ports. If you do not provide the interface-type interface-number argument,
this command will display the QoS parameter configuration of all the ports of the
switch; if you provide the interface-type interface-number argument, this
command will display QoS parameter configuration of the specified port.
GigabitEthernet0/0/1:
Queue scheduling mode: strict-priority
COS configuration:
Config (max queues): 8
Schedule mode: strict
Egress port queue statistics(in bytes):
Priority CosQ Threshold Count Used(%):
0 2 18432 0 0
1 3 2560 0 0
2 4 2560 0 0
3 1 2560 0 0
4 7 2560 0 0
5 0 2560 0 0
6 5 2560 0 0
7 6 2560 0 0
common queue statistics(in bytes):
49152 0 0
GigabitEthernet0/0/2:
Queue scheduling mode: strict-priority
COS configuration:
---- More ----
Description Use the display qos-interface line-rate command to view the rate limit
configuration (including the outbound port and the limit rate) for the outbound
direction of a port or all the ports of a switch. If you do not specify the
interface-type interface-number argument, you will view the rate limit
configuration for the outbound direction of all the ports of a switch; if you specify
that argument, you will view the rate limit configuration for the outbound
direction of the specified port.
GigabitEthernet2/0/2: line-rate
Line rate: 3072 kbps
GigabitEthernet2/0/4: line-rate
Line rate: 5120 kbps
Table 136 Field descriptions of the display qos-interface line-rate command
Field Description
GigabitEthernet2/0/2: line-rate Rate limit configuration on GigabitEthernet
2/0/2:
Line rate: 3072 kbps
The maximum sum of all the packet rates on
GigabitEthernet 2/0/2 is 3,072 kbps.
weight of queue 4: 10
weight of queue 5: 5
weight of queue 6: 10
weight of queue 7: 5
weight of queue 8: 10
COS configuration:
Config (max queues): 8
Schedule mode: weighted round-robin
Weighting (in packets):
COSQ 0 = 10 packets
COSQ 1 = 5 packets
COSQ 2 = 10 packets
COSQ 3 = 10 packets
COSQ 4 = 5 packets
COSQ 5 = 10 packets
COSQ 6 = 5 packets
COSQ 7 = 10 packets
Egress port queue statistics(in bytes):
Priority CosQ Threshold Count Used(%):
0 2 18432 0 0
1 0 2560 0 0
2 1 2560 0 0
3 3 2560 0 0
4 4 2560 0 0
5 5 2560 0 0
6 6 2560 0 0
7 7 2560 0 0
common queue statistics(in bytes):
49152 0 0
Description Use the display qos-interface traffic-limit command to view the traffic limit
configuration of a port or all the ports of a switch, including the applied ACLs for
traffic limit, committed average rate (CAR), and the corresponding actions.
Description Use the display qos-interface traffic-priority command to view the traffic
priority configuration. The information displayed includes the ACL corresponding
to the traffic tagged with priority, priority type and value.
Description Use the display qos-interface traffic-red command to view the RED
configuration.
Ethernet2/0/1: traffic-remark
Inbound:
Matches: Acl 3000 rule 3 running
RemarkVlanId action: remark-vlan 25 uplink Ethernet 2/0/2 untag
ged
Description Use the display qos-interface traffic-statistic command to view the traffic
statistics information. The information displayed includes the ACL corresponding
to the traffic to be counted and the number of packets counted.
inboundcar
n This command applies to only type-A I/O Modules. To make the configuration take
effect, reboot the switch.
With bidirectional CAR enabled, the switch considers an ACL rule applied to
different ports as different rules. As a result, an applied rule can occupy multiple
entries. If you enable CAR for traffic matching a certain rule on multiple ports, the
switch provides the specified bandwidth for the traffic matching the CAR rule on a
per-port basis.
With bidirectional CAR disabled, the switch considers an ACL rule applied to
different ports as the same rule. As a result, an applied rule occupies only one
entry. If you enable CAR for traffic matching a certain rule on multiple ports, the
switch provides the specified bandwidth for all the traffic matching the CAR rule
on these ports to share.
Suppose you want to allocate 2 Mbps of CAR bandwidth for the incoming traffic
matching ACL rule 0 and enable CAR on two ports with the traffic-limit
command.
line-rate
undo line-rate
Parameter kbps: Specifies the rate unit as kbps when the rate limit function is configured.
target-rate: Total limit rate of all the packets sent by the port. If the kbps keyword
is specified, the rate is measured in kbps, in the range of 64 to 1,024,000 with the
granularity being 64. If the number you input is in the range of N*64 to (N+1)*64
(N is a natural number), the switch will set the value to (N+1)*64 kbps
automatically. If the kbps keyword is not specified, the rate is in the range of 1 to
1,000 in mbps.
priority 785
Description Use the line-rate command to limit the rate of the packets on the port.
Use the undo line-rate command to cancel the rate limit configuration on the
port.
priority
undo priority
Description Use the priority command to configure the priority of the Ethernet port.
Use the undo priority command to restore the default priority of the Ethernet
port.
If the switch receives a packet without VLAN tags, the switch will tag the packet
with the default VLAN of the port receiving the packet. In this case the switch
assigns the port priority of the port receiving the packet to the 802.1p priority of
the VLAN tag in the packet.
The switch does not perform the operation above if it receives a packet with VLAN
tags.
priority-trust
Parameter dscp: Puts a packet into the corresponding output queue on a port according to
the DSCP precedence.
cos: Puts a packet into the corresponding output queue on a port according to the
COS precedence.
Description Use the priority-trust command to specify the priority according to which the
switch puts a packet into the output queue on a port.
By default, the switch puts a packet into the output queue on a port according to
the local precedence of the packet.
The switch ports support eight output queues with different levels of precedence.
The higher the precedence is, the earlier it will be delivered. The switch puts a
packet into an output queue on a port according to the precedence of the packet.
You can choose the corresponding packet precedence as the basis for putting a
packet into an output queue on a port as required.
Example # Specify the switch to put a packet into an output queue according to the DSCP
precedence of the packet.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] priority-trust dscp
qos 787
qos
Syntax qos
Parameter None
Description Use the qos command to enter QoS view and perform the corresponding QoS
configuration.
n Different I/O Modules of Switch 7750s support different QoS functions. You can
use "?" to query the supported QoS configurations after entering different QoS
views.
Example # Enter QoS view of a non-type-A I/O Module and query the QoS configuration
supported by the I/O Module.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] qos
[SW7750-qosb-GigabitEthernet2/0/1] ?
Qosb view commands:
display Display current system information
line-rate Limit the rate of the outbound packets of t
he
interface
mirrored-to Mirror the packets
msdp-tracert MSDP traceroute to source RP
packet-filter Filter packets based on acl
ping Send echo messages
queue-scheduler Specify queue scheduling mode and parameter
s
quit Exit from current command view
reset Reset operation
return Exit to User View
tracert Trace route function
traffic-limit Limit the rate of the packets
traffic-priority Specify new priority of the packets
traffic-redirect Redirect the packets
traffic-remark Remark vlan ID of the packets
traffic-statistic Count the packets
undo Cancel current setting
# Enter QoS view of a type-A I/O Module and query the QoS configuration
supported by the I/O Module.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 3/0/1
[SW7750-Ethernet3/0/1] qos
[SW7750-qoss-Ethernet3/0/1]?
Qoss view commands:
788 CHAPTER 58: QOS COMMANDS
qos cos-local-precedence-map
queue-scheduler
undo queue-scheduler
Description Use the queue-scheduler command to configure the queue scheduling mode
and related parameters.
Example # Adopt the WRR queue scheduling mode, and the weight value of each queue is
10, 5, 10, 10, 5, 10, 5, and 10.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] qos
[SW7750-qosb-GigabitEthernet2/0/1] queue-scheduler wrr 10 5 10 10 5
10 5 10
reset traffic-statistic
n I/O Modules, except type-A I/O Modules, support applying the combination of IP
ACL rules and link ACL rules. However, the field defined by the IP ACL rules and
link ACL rules cannot be of more than 32 characters. Otherwise, the combination
cannot be applied successfully.
Parameter acl-rule: Applied ACL which can be the combination of various ACL rules. For the
ways of type-A I/O Modules to combine ACLs and the description on related
parameters, refer to Table 139 and Table 141. For the ways of non-type-A I/O
Modules to combine ACLs and the description on related parameters, refer to
Table 140 and Table 141.
reset traffic-statistic 791
Parameter Description
ip-group { acl-number | acl-name } Basic and advanced ACL
acl-number: ACL number in the range of 2,000 to
3,999.
acl-name: ACL name which contains up to 32
characters. It must start with English letters (a to z or A
to Z) and cannot contain spaces or quotation marks. It
is not sensitive to capitals.
link-group { acl-number | acl-name } Layer 2 ACL
acl-number: ACL number in the range of 4,000 to
4,999.
acl-name: ACL name which contains up to 32
characters. It must start with English letters (a to z or A
to Z) and cannot contain spaces or quotation marks. It
is not sensitive to capitals.
user-group { acl-number | acl-name } User-defined ACL
acl-number: ACL number in the range of 5,000 to
5,999.
acl-name: ACL name which contains up to 32
characters. It must start with English letters (a to z or A
to Z) and cannot contain spaces or quotation marks. It
is not sensitive to capitals.
792 CHAPTER 58: QOS COMMANDS
Parameter Description
rule-id ID of an ACL rule, in the range of 0 to 127.
If the rule-id argument is not specified, the rule
keyword refers to all the rules in the ACL.
Description Use the reset traffic-statistic command to clear the statistics of all or specified
traffic.
Table 142 The reset acl counter command vs. the reset traffic-statistic command
Command Function
reset acl counter Clear the ACL statistics.
This command is applicable to ACLs used for
filtering and classifying the traffic processed
by software.
ACLs are referenced by software in the
following cases:
■ Referenced by routing policies
■ Referenced when login users are
controlled
In these cases, the ACL number is in the range
of 2,000 to 3,999.
Refer to reset acl counter on page 764 for
the introduction to this command.
reset traffic-statistic Clear the traffic statistics.
This command is applicable to ACLs applied to
the hardware of the switch for filtering and
classifying traffic during data forwarding.
Generally, this command is used to clear the
statistics information obtained through the
traffic-statistic command.
traffic-bandwidth
Parameter outbound: Guarantees the bandwidth for the outbound packets sent by the port.
acl-rule: Applied ACL rules which can be the combination of various ACL rules. For
the ways of combining ACLs and the description on related parameters, refer to
Table 139 and Table 141.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
n Assume there are N flows on a port, the bandwidth of the port is Bp, the
minimum guaranteed bandwidth of the ith flow is Bimin, and the maximum
guaranteed bandwidth of the ith flow is Bimax, and the weight is Wi. If the
bandwidth occupied by all the flows is greater than their minimum guaranteed
bandwidth, and the sum of maximum guaranteed bandwidth is greater than port
bandwidth Bp, the bandwidth allocated to the ith flow is
⎛ ⎞ ⎛ ⎞
Bi = Bimin + ⎜ Bp – ∑ B imin⎟ × Wi ⁄ ⎜ ∑ Wi⎟ .
⎝ N
⎠ ⎝N ⎠
Description Use the traffic-bandwidth command to activate the ACL for traffic identifying
and provide bandwidth guarantee for the corresponding traffic. This command is
applicable to only the permit rule).
794 CHAPTER 58: QOS COMMANDS
n ■
■
Only type-A I/O Modules support this command.
Only the permit rule can be referenced in this command and applied to
hardware.
Example # Guarantee the bandwidth of the packets that match the permit rule in ACL
2000: The minimum guaranteed bandwidth is 64 k, the maximum available
bandwidth is 128 k, and bandwidth weight is 50.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] qos
[SW7750-qoss-Ethernet2/0/1] traffic-bandwidth outbound ip-group 2000
64 128 50
traffic-limit
n I/O Modules, except type-A I/O Modules, support applying the combination of IP
ACL rules and link ACL rules. However, the field defined by the IP ACL rules and
link ACL rules cannot be of more than 32 characters. Otherwise, the combination
cannot be applied successfully.
Parameter inbound: Performs traffic policing on the packets received by the port.
acl-rule: Applied ACL which can be the combination of various ACL rules. For the
ways of type-A I/O Modules to combine ACLs and the description on related
parameters, refer to Table 139 and Table 141. For the ways of non-type-A I/O
traffic-limit 795
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
kbps: Specifies the limit rate to be measured in kbps. If the kbps keyword is
specified, the rate is measured in kbps, in the range of 64 to 1,024,000 with the
granularity being 64. If the number you input is in the range of N*64 to (N+1)*64
(N is a natural number), the switch will set the value to (N+1)*64 kbps
automatically.
target-rate: Total rate to limit all the packets sent on a port. For type-A I/O
Modules, the target-rate argument is in the range of 64 to 8,388,608 in kbps with
the granularity being 64. If the kbps keyword is not provided, the target-rate
argument is in mbps in the range of 1 to 1,000.
exceed action: Optional. The action is taken when the traffic exceeds the
threshold. Only type-A I/O Modules support this keyword. The action argument
can be:
Description Use the traffic-limit command to activate ACL for traffic identifying and perform
traffic policing.
This command performs traffic limit on the packets matching the permit rule only.
n Only the permit rule can be referenced in this command and applied to hardware.
Example # Perform traffic limit on the packets matching the permit rule in ACL 2000 on
Ethernet 2/0/1 of a type-A I/O Module. The maximum rate is 128 kbps.
796 CHAPTER 58: QOS COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] qos
[SW7750-qoss-Ethernet2/0/1] traffic-limit inbound ip-group 2000 128
# Perform traffic limit on the packets matching the permit rule in ACL 2000 on
GigabitEthernet 3/0/1 of a non-type-A I/O Module. The maximum rate is 128
kbps.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface GigabitEthernet 3/0/1
[SW7750-GigabitEthernet3/0/1] qos
[SW7750-qosb-GigabitEthernet3/0/1] traffic-limit inbound ip-group 2000 kbps 128
traffic-priority
n I/O Modules, except type-A I/O Modules, support applying the combination of IP
ACL rules and link ACL rules. However, the field defined by the IP ACL rules and
link ACL rules cannot be of more than 32 characters. Otherwise, the combination
cannot be applied successfully.
Parameter inbound: Performs priority marking to the packets received by the port.
acl-rule: Applied ACL which can be the combination of various ACL rules. For the
ways of type-A I/O Modules to combine ACLs and the description on related
parameters, refer to Table 139 and Table 141. For the ways of non-type-A I/O
Modules to combine ACLs and the description on related parameters, refer to
Table 140 and Table 141.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
traffic-priority 797
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
dscp dscp-value: Sets DSCP precedence, ranging from 0 to 63. You can also enter
the keywords in Table 143.
cos cos: Sets 802.1p priority. The pre-value argument ranges from 0 to 7. You can
also enter the keywords in Table 145.
n If you have redirected the packets to CPU, it is not recommended to set the
802.1p priority to 7, and vice versa.
Description Use the traffic-priority command to enable ACLs for remarking priority.
n Only the permit rule can be referenced in this command and applied to hardware.
Example # Remark the local precedence of the packets matching the permit rule in ACL
2000 as 0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet2/0/1
[SW7750-Ethernet2/0/1] qos
[SW7750-qosb-Ethernet2/0/1] traffic-priority inbound ip-group 2000 l
ocal-precedence 0
traffic-red 799
traffic-red
acl-rule: Applied ACL rules which can be the combination of various ACL rules. For
the ways of combining ACLs and the description on related parameters, refer to
Table 139 and Table 141.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
qstart: Queue length where the system starts to drop packets at random, in the
range of 0 to 262,128 in KB. The packets in the queue whose length is less than
the qstart argument will not be dropped. The value must be the multiples of 16
KB.
qstop: Queue length where the system stops dropping of packets at random, in
the range of 0 to 262,128 in KB. All the packets in the queue whose length is
greater than the qstop argument will be dropped. The value must be the multiples
of 16 KB.
probability: Drop probability when the qstop argument is reached, in the range of
0% to 100%.
Description Use the traffic-red command to enable the RED operation and set RED
parameters.
Note that the qstop argument in this command must be no smaller than the qstart
argument.
800 CHAPTER 58: QOS COMMANDS
n ■
■
Only type-A I/O Modules support this command.
Only the permit rule can be referenced in this command and applied to
hardware.
Example # Perform the RED operation on the packets matching the permit rule in ACL
2000. RED parameters can be set as follows: the qstart argument is 64 KB, the
qstop argument is 128 KB, and the probability argument is 20%.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] qos
[SW7750-qoss-Ethernet2/0/1] traffic-red outbound ip-group 2000 64 12
8 20
traffic-redirect
Parameter inbound: Performs traffic redirect on the packets received by the port.
acl-rule: Applied ACL rules which can be the combination of various ACL rules. For
the ways of combining ACLs and the description on related parameters, refer to
Table 139 and Table 141.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
Description Use the traffic-redirect command to enable the ACL to identify and redirect the
traffic. This command is applicable to the permit rules in an ACL only.
Use the undo traffic-redirect command to disable the traffic redirect function. .
n ■
■
Only type-A I/O Modules support this command.
Only the permit rule can be referenced in this command and applied to
hardware.
Example # Redirect the packets matching the permit rule in ACL 2000 to GigabitEthernet
2/0/1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] qos
[SW7750-qosb-GigabitEthernet2/0/1] traffic-redirect inbound ip-group
2000 interface gigabitethernet2/0/1
traffic-remark
n I/O Modules support applying the combination of IP ACL rules and link ACL rules.
However, the field defined by the IP ACL rules and link ACL rules cannot be of
more than 32 characters. Otherwise, the combination cannot be applied
successfully.
Parameter inbound: Tags the packets received by the port with external VLAN tags.
acl-rule: Applied ACL rules which can be the combination of various ACL rules. For
the ways of combining ACLs and the description on related parameters, refer to
Table 140 and Table 141.
vlan-id: ID of the external VLAN tag which is tagged to the packet, in the range of
1 to 4,094.
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect,
■ If you do not enter an index value or the index value is 0, the system will
automatically assign an index value greater than 0.
■ If you enter a non-zero index and this index does not conflict with the interior
index used by the system, the system will adopt this index value.
■ If you enter a non-zero index but this index conflicts with the interior index
used by the system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
entered by you.
untagged: Specifies whether it is required to reserve the VLAN Tag when the
VLAN encapsulated with the VLAN ID is sent through the uplink port.
Description Use the traffic-remark command to enable the ACL for traffic identifying and
tag the packet matching the ACL with the external VLAN tag to implement the
traffic-based flexible QinQ function.
c CAUTION:
■ Execute the vlan-vpn enable command in the corresponding port view before
executing the traffic-remark command.
■ The traffic-based flexible QinQ function is generally configured on the hybrid
port of the edge device connecting the user device to the carrier’s network.
■ QinQ is mutually exclusive with Voice VLAN. That is, you cannot configure both
features on the same port.
■ Type-A, 3C16863, and 3C16862 I/O Modules do not support the traffic-based
flexible QinQ function.
■ The port on which the traffic-based flexible QinQ function is configured and
the specified uplink port cannot be in the same aggregation group.
Example # Tag the packets matching the permit rule in ACL 2000 with the external VLAN
tag on GigabitEthernet 2/0/1, thus implementing the traffic-based flexible QinQ
function.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vlan 25
[SW7750-vlan25] quit
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255
[SW7750-acl-basic-2000] quit
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] port link-type hybrid
traffic-statistic 803
traffic-statistic
n I/O Modules, except type-A I/O Modules, support applying the combination of IP
ACL rules and link ACL rules. However, the field defined by the IP ACL rules and
link ACL rules cannot be of more than 32 characters. Otherwise, the combination
cannot be applied successfully.
Parameter inbound: Performs traffic statistic on the packets received by the port.
acl-rule: Applied ACL rules which can be the combination of various ACL rules. For
the ways of combining ACLs and the description on related parameters, refer to
Table 139 and Table 141.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
Description Use the traffic-statistic command to activate the ACL for traffic identifying and
count the traffic. This command is applicable to only the permit rules in the ACL.
Example # Perform traffic statistics on the packets matching the permit rule in ACL 2000.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] qos
[SW7750-qosb-Ethernet2/0/1] traffic-statistic inbound ip-group 2000
MIRRORING COMMANDS
59
display mirroring-group
remote-source: The specified mirroring group is the source group for remote
mirroring.
Description Use the display mirroring-group command to display the parameter settings
of a mirroring group.
■ Group number
■ Group type: local
■ Group status
■ Information about the source port of mirroring
■ Information about the destination port of mirroring
■ Group number
■ Group type: remote-destination
■ Group status
■ Information of the destination port
■ Remote-probe VLAN information
806 CHAPTER 59: MIRRORING COMMANDS
■ Group number
■ Group type: remote-source
■ Group status
■ Information of the source port
■ Information of the reflector port
■ Remote-probe VLAN information
Parameter interface-type interface-number: Port type and port number. If you enter this
argument, the switch will display the parameter settings of the specified port. If
not, the switch will display the parameters settings of all ports.
Description Use the display qos-interface mirrored-to command to display the parameter
settings of traffic mirroring.
GigabitEthernet2/0/1: mirrored-to
Inbound:
Matches: Acl 2000 rule 0 running
Mirrored to: mirroring-group 3
mirrored-to 807
mirrored-to
acl-rule: Applied ACL rules. Table 146 and Table 147 describe the ACL
combinations on I/O Modules other than Type A and the corresponding parameter
description.
Table 146 Combined application of ACLs on I/O Modules other than Type A.
Parameter Description
ip-group { acl-number | acl-name } Basic and advanced ACL.
acl-number: ACL number, ranging from 2,000 to
3,999.
acl-name: ACL name, up to 32 characters long,
beginning with an English letter (a to z or A to Z)
without space and quotation mark, case insensitive.
link-group { acl-number | acl-name } Layer 2 ACL
acl-number: ACL number, ranging from 4,000 to
4,999.
acl-name: ACL name, up to 32 characters long,
beginning with an English letter (a to z or A to Z)
without space and quotation mark, case insensitive.
808 CHAPTER 59: MIRRORING COMMANDS
Parameter Description
user-group { acl-number | acl-name } User-defined ACL
acl-number: ACL number, ranging from 5,000 to
5,999.
acl-name: ACL name, up to 32 characters long,
beginning with an English letter (a to z or A to Z)
without space and quotation mark, case insensitive.
rule-id Number of the ACL rule, ranging from 0 to 127.
If this argument is not specified, all rules in the
specified ACL will be applied.
system-index: Specifies an interior index value which is used when an ACL rule is
applied to the port. The index value ranges from 0 to 4294,967,295. This keyword
is only available when the ACL rule number is specified in the command. After the
specified ACL takes effect, there are three scenarios when you input the index
value:
■ If you do not input an index value or the index value you input is 0, the system
will automatically assign an index whose value is greater than 0;
■ If the input index value is not 0 and does not conflict with the interior index
used by the system, the system will adopt the index value input by you;
■ If the input index value is not 0 but conflicts with the interior index used by the
system, the system will reassign an index value.
When the specified ACL rule is not effective, the system will adopt the index value
input by you.
Description Use the mirrored-to command to start ACLs to identify traffics and perform
traffic mirroring for packets that match.
This command only applies to the rules whose actions are permit in matching the
specified ACL, and only mirrors the received traffic flows. If you want to mirror
traffic flows to a specified port, the port must be a destination port or reflector
port of a mirroring group.
Example # Mirror packets that match ACL 2000 on port GigabitEthernet 2/0/1 to
GigabitEthernet 2/0/4 through traffic mirroring.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 3 local
[SW7750] mirroring-group 3 monitor-port GigabitEthernet 2/0/4
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] qos
[SW7750-qosb-GigabitEthernet2/0/1] mirrored-to inbound ip-group 3000
interface GigabitEthernet 2/0/4
mirroring-group
remote-source: Specifies the mirroring group as the source mirroring group for
remote mirroring.
mirroring-port-list: Ethernet port list. It means there can be multiple ports. This
argument is provide in the form of port-list={ interface-type interface-number [ to
interface-type interface-number ] }&<1-8>, where Interface-type interface-number
means an Ethernet port, and &<1-8> means you can specify eight Ethernet ports
or Ethernet port lists.
Description Use the mirroring-group command to recover the port mirroring configuration.
After software update, you can use this command to convert the port mirroring
configuration configured with the old software version in the configuration file to
the command syntax supported by the new software version.
Example # Recover the configuration of mirroring group 2, where Ethernet 2/0/1 through
Ethernet 2/0/3 are source ports and Ethernet 2/0/4 is the destination port
monitoring only the incoming packets.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 2 inbound Ethernet 2/0/1 to Ethernet 2/0/3
mirrored-to Ethernet 2/0/4
mirroring-group mirroring-port
n For a centralized I/O Module, if multiple source ports are specified in remote port
mirroring configuration, all the source ports must be on the same I/O Module.
both: Mirrors packets both received and sent via the port.
Example # Configure GigabitEthernet 2/0/1 as the source port and mirror all packets
received via this port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 1 mirroring-port GigabitEthernet2/0/1 inbou
nd
mirroring-group mirroring-slot
slot-number: Number of the slot where the mirroring source I/O Module resides.
Example # Specify the I/O Module residing in slot 3 as the mirroring source I/O Module and
mirror all the packets received on the I/O Module.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 1 mirroring-slot 3 inbound
mirroring-group monitor-port
Example # Configure GigabitEthernet 2/0/4 as the source port and monitor all packets
received via this port.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 1 monitor-port GigabitEthernet2/0/4
mirroring-group monitor-slot
slot-number: Number of the slot where the mirroring destination I/O Module
resides.
Example # Specify the LS81VSNP in slot 4 as the mirroring destination I/O Module.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] mirroring-group 1 monitor-slot 4
mirroring-group reflector-port 813
mirroring-group reflector-port
Description Use the mirroring-group reflector-port command to specify the reflector port.
remote-probe vlan
Parameter None
Description Use the remote-probe vlan enable command to configure the current VLAN as
the remote-probe VLAN.
Before configuring the remote-probe VLAN, make sure that no Access or Hybrid
port belongs to this VLAN. If any Trunk port exists in this VLAN, the port PVID
cannot be the ID of remote-probe VLAN. After setting a VLAN as remote-probe
VLAN, it is recommended that you do not add Access or Hybrid port to the VLAN.
n ■ The undo vlan all command cannot be used to remove the specified
remote-probe VLAN.
■ After you input the remote-probe vlan enable the command, the system will
check whether the current VLAN is a dynamic VLAN or not. If it is a dynamic
VLAN, the command will fail to be executed, and the system prompts that
"Can not set dynamic VLAN as remote-probe VLAN!".
display ndp
Parameter interface port-list: Specifies a list of ports. The list can contain consecutive or
separated ports, or the combination of the both. You need to provide the port-list
argument in the form of interface-type interface-number [ to interface-type
interface-number ] &<1-10>, where interface-type specifies the port type, and
interface-number specifies the port number (in the form of slot number/device
number/port number).to: Specifies a port range. &<1-10> means that you can
provide up to ten port indexes/port index ranges for this argument.
Description Use the display ndp command to display the global NDP configuration
information, including the interval to send NDP packets, the holdtime of NDP
information, and the information about the neighbors of all the ports.
Interface: GigabitEthernet0/0/2
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
Interface: GigabitEthernet0/0/3
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
Interface: GigabitEthernet0/0/4
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
816 CHAPTER 60: NDP CONFIGURATION COMMANDS
Interface: GigabitEthernet2/0/1
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
Interface: GigabitEthernet2/0/2
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
Interface: GigabitEthernet2/0/3
Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
Field Description
Neighbor Discovery Protocol is enabled NDP is enabled globally on the switch
Neighbor Discovery Protocol Ver: 1 NDP version 1 is running
Hello Timer The interval to send NDP packets
Aging Timer The holdtime of the NDP information sent by the
local switch
Interface Port index to specify a specific port
Status NDP is enabled on the port
Pkts Snd Number of the NDP packets transmitted through the
port
Pkts Rvd Number of the NDP packets received through the
port
Pkts Err Number of the error NDP packets received through
the port
Neighbor 1: Aging Time The holdtime of the NDP information received from
the neighbors connected to the port
MAC Address MAC address of a neighbor device
Host Name System name of a neighbor device
Port name Name of the port connected to the neighbor device
Software Ver Neighbor device software version
Device Name Device name of a neighbor device
Port Duplex Port duplex mode of a neighbor device
Product Ver Product version of a neighbor device
BootROM Ver BootROM version of the neighbor device
ndp enable 817
ndp enable
Parameter interface port-list: Specifies a list of ports. The list can contain consecutive or
separated ports, or the combination of the both. You need to provide the port-list
argument in the form of interface-type interface-number [ to interface-type
interface-number ] &<1-10>, where interface-type specifies the port type, and
interface-number specifies the port number (in the form of slot number/device
number/port number).to: Specifies a port range. &<1-10> means that you can
provide up to ten port indexes/port index ranges for this argument.
When the ndp enable command is executed in system view, the NDP feature is
enabled globally if the port-list argument is not specified, while the NDP feature is
enabled on the specified port if the port-list argument is specified.
When this command is used in Ethernet port view, the interface keyword cannot
be provided and the NDP feature is enabled on the current port only.
Note that the NDP feature on a port does not take effect until the NDP feature is
enabled globally.
Parameter aging-in-secs: Holdtime (in seconds) to be set of the NDP information sent by the
local switch. This argument ranges from 5 to 255.
Description Use the ndp timer aging command to set the holdtime of the information in the
NDP packets sent by the local switch, that is, to specify how long a device will hold
the NDP packets received from the local device. After the aging timer expires, the
device removes the received NDP neighbor node information.
Use the undo timer aging command to restore the default NDP information
holdtime.
You can specify how long an adjacent device will hold the NDP information sent
by the local device. An adjacent device holds the NDP information of the local
switch according to the holdtime carried in the NDP packets received from the
local switch and removes the NDP information when the aging timer expires.
Note that NDP information holdtime is longer than the interval to send NDP
packets normally. Otherwise, the neighbor information table of an NDP port will
become unstable.
Example # Configure the holdtime of the information in NDP packets sent by the local
switch to be 60 seconds.
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z.
[aaa_0.3Com] ndp timer aging 60
Parameter timer-in-seconds: Interval (in seconds) to send NDP packets ranging from 5 to 254.
By default, the interval to send NDP packets is 60 seconds.
Description Use the ndp timer hello command to set the interval to send NDP packets.
Use the undo ndp timer hello command to restore the default interval to send
NDP packets.
Parameter interface port-list: Specifies a list of ports. The list can contain consecutive or
separated ports, or the combination of the both. You need to provide the port-list
argument in the form of interface-type interface-number [ to interface-type
interface-number ] &<1-10>, where interface-type specifies the port type, and
interface-number specifies the port number (in the form of slot number/device
number/port number).to: Specifies a port range. &<1-10> means that you can
provide up to ten port indexes/port index ranges for this argument.
Description Use the reset ndp statistics command to clear NDP statistics.
display ntdp
Parameter None
Description Use the display ntdp command to display the global NTDP information. The
information includes the range (in hop count) within which topology information
is collected, the interval to collect topology information (the NTDP timer), the delay
time for a device to forward topology-collection requests, the delay time for a
topology-collection request to be forwarded through a port, and the time cost
during the last topology collection.
Field Description
NTDP is running. NTDP is enabled globally on the local device.
Hops Hop count for topology collection
Timer Interval to collect topology information
Hop Delay Delay time for the device to forward topology collection
requests
Port Delay Delay time for a topology-collection request to be forwarded
through a port
Last collection total time Time cost during the last collection
Description Use the display ntdp device-list command to display the device information
collected through NTDP.
Field Description
MAC MAC address of a device
HOP Hops to the collecting device
IP IP address and mask length of the management VLAN interface
on the device
PLATFORM Platform information about a device
Hostname : aaa_0.3Com
MAC : 00e0-fc00-7506
Hop : 0
Platform : S7757
IP : 100.100.1.1/24
Version :
3Com Comware Platform Software.
Comware Software, Version 3.10
Copyright(c) 2004-2007 3Com Corporation All rights reserved. reserved.
S7757-5308
Cluster : Administrator switch of cluster aaa
-----------------------------------------------------------------------------
Hostname : aaa_1.3Com
MAC : 00e0-fc01-7506
Hop : 1
Platform : S7757
IP : 16.1.1.1/24
Version :
3Com Comware Platform Software.
Comware Software, Version 3.10
Copyright(c) 2004-2007 3Com Corporation All rights reserved.
S7757-5308
Cluster : Candidate switch
Table 151 Field descriptions of the display ntdp device-list verbose command
Field Description
Hostname System name of the device collected through NTDP
MAC Mac address of the device
Hop Number of hops from the device to the device which launches the topology
collection
Platform Software platform of the device
IP IP address of the cluster management VLAN interface on the device (VLAN 1
is the cluster management VLAN of the Switch 7750 )
Version Version of the device
Cluster The role of the device in the cluster
Peer MAC MAC address of a neighbor device
Peer Port ID Name of the peer port connected to the neighbor device
Native Port ID Name of the local port which a neighbor device is connected to
Speed Speed of the neighbor device port
Duplex Duplex mode of the neighbor device port
ntdp enable
Parameter None
Note that the NDTP cannot operate if it is enabled on a port where NDP is
disabled.
n ■ On a management device, NTDP must be enabled globally and on all the ports,
and the NTDP parameters must be configured. On a member device, NTDP
must be enabled globally and on the corresponding port. When NTDP is
running on member devices, it adopts the NTDP parameters from the
management device.
824 CHAPTER 61: NTDP CONFIGURATION COMMANDS
■ NTDP takes effect in the management VLAN only. The Switch 7750 take VLAN
1 as the default VLAN, that is, the NTDP feature of the Switch 7750 takes
effect in VLAN 1 only.
ntdp explore
Parameter None
Description Use the ntdp explore command to start topology information collection
manually.
You can use this command to enable the topology information collection
manually. NTDP will collect the NDP information of every device and the
information about the connections between the local switch and all of its
neighbor devices in the specified network scope. The management device or the
network administrator uses this information to acquire the network topology,
manage and monitor the devices.
ntdp hop
Parameter hop-value: Maximum hops for collecting topology information, ranging from 1 to
16. By default, the value is 3.
Description Use the ntdp hop command to set a range (in terms of hop count) for topology
information collection.
Use the undo ntdp hop command to restore the default range for topology
information collection.
ntdp timer 825
With the ntdp hop command, you can specify to collect the topology information
of the devices within a specified range to avoid infinitive collection. The limit is
performed by controlling the permitted hops from collection origination. For
example, if you set the hop number limit to 2, only the switches less than 2 hops
away from the switch starting the topology collection are collected.
ntdp timer
Parameter interval-in- minutes: Interval (in minutes) to collect topology information, ranging
from 0 to 65,535. This argument defaults to 0, which specifies not to collect
topology information.
Description Use the ntdp timer command to configure the interval to collect topology
information.
Use the undo ntdp timer command to restore the default interval.
A switch collects topology information once in each period set by the ntdp timer
command.
Parameter time: Delay time (in milliseconds) for a switch to forward topology-collection
request packets. This argument ranges from 1 to 1,000 and defaults to 200.
Description Use the ntdp timer hop-delay command to set the delay time for a switch to
forward topology-collection request packets.
Use the undo ntdp timer hop-delay command to restore the default delay
time.
These two commands are intended for switches that collect topology information.
They actually set the hop-delay value for topology-collection request packets sent
by these switches. The hop-delay value determines the delay time for a switch
receiving topology-collection request packets to forward them through its first
port.
Example # Set the delay time for the switch to forward topology-collection request packets
through the first port to 300 ms.
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z.
[aaa_0.3Com] ntdp timer hop-delay 300
Parameter time: Delay time (in milliseconds) for a switch to forward a topology-collection
request packet through its successive ports. This argument ranges from 1 to 100
and defaults to 20.
Description Use the ntdp timer port-delay command to set the delay time for a port (on
the device whose topology information is collected) to wait to forward
topology-collection request packets after the last port (on the device whose
topology information is collected) forwards topology-collection request packets.
Use the undo ntdp timer port-delay command to restore the default delay
time.
These two commands are intended for switches that collect topology information.
They actually set the port-delay value for topology-collection request packets sent
by these switches. The port-delay value determines the delay time for a switch
receiving topology-collection request packets to forward them through the next
port.
Example # Set the delay time for the switch to forward topology-collection request packets
through the successive ports to 40 ms.
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z.
[aaa_0.3Com] ntdp timer port-delay 40
828 CHAPTER 61: NTDP CONFIGURATION COMMANDS
CLUSTER CONFIGURATION
62 COMMANDS
add-member
You can add a candidate device to a cluster on the management device only.
If you do not specify the member number when adding a cluster member, the
management device assigns the next available member number to it.
After a candidate device is added to a cluster, the level-3 password of the device is
replaced by the password of the management device automatically.
Example # Add a candidate device to the cluster, setting the member number to 6. (Assume
that the MAC address and level-3 user password of the candidate device are
00E0-fc00-35e7 and 123456.)
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z.
[aaa_0.3Com] cluster
[aaa_0.3Com-cluster] add-member 6 mac-address 00E0-fc00-35e7 password 123456
administrator-address
undo administrator-address
Description Use the administrator-address command to set the MAC address of the
management device on a member device.
In order that the member devices identify the management device correctly after
the system is restarted, the administrator-address command is enabled
automatically on the switch to specify the MAC address of the management
device in the cluster when the switch is added to the cluster as a member device.
auto-build
Parameter recover: Establishes communication with all the member devices again.
Description Use the auto-build command to add the candidate device to the cluster
automatically to be a member device.
When you use this command on a candidate device, you will be required to enter
the cluster name and build a cluster. The system will collect candidate devices
automatically and then it is for the user to decide whether to add the collected
candidate devices into the cluster.
When you use this command on a management device, the system will collect
candidate devices automatically.
build 831
The recover keyword is used to recover a cluster. Execute the auto-build recover
command to look for the down members in the member list and add them to the
cluster again.
Note: Ensure that NTDP is enabled, because it is the basis of candidate and
member collection. The collection range is also decided through NTDP. You can
use the hop command in system view to modify the collection range.
If a member device is configured with a level-3 user password different from that
of the management device, it cannot be added to the cluster automatically.
c CAUTION: When configuring a cluster, you must ensure that the routing table is
not full. Otherwise, the private IP routes of the cluster cannot be advertised, and
as a result cluster handshake messages cannot be properly sent or received and
devices will repeatedly join or leave the cluster.
■ If the routing table of the administrative device is full upon establishment of a
cluster, all candidate devices will repeatedly join or leave the cluster.
■ If the routing table of the administrative device is full when a candidate device
of a cluster joins the cluster, this device will repeatedly join or leave the cluster.
Candidate list:
[aaa_0.3Com-cluster]
build
undo build
Parameter name: Cluster name, a string comprising up to 8 characters, which can only be
alphanumeric characters, subtraction sign (-), and underline (_).
Description Use the build command to configure or modify the cluster name.
If the build command is executed on the candidate device, the current switch will
be configured as the management device and assigned with a cluster name.
If the build command is executed on the management device, the cluster name
will be modified.
Example # Configure the current switch to be a management device and specify the cluster
name to be aaa.
<SW7750> system-view
System View: return to User View with Ctrl+Z
[SW7750] cluster
[SW7750-cluster] build aaa
[aaa_0.3Com-cluster]
cluster
Syntax cluster
Parameter None
cluster enable
Parameter None
cluster switch-to 833
Description Use the cluster enable command to enable the cluster function on a switch.
Use the undo cluster enable command to disable the cluster function on a
switch.
By default, the cluster function is enabled on all the devices supporting cluster.
You need to create a cluster with the build command before using the cluster
enable command on the management device.
These two commands can be used on any device supporting the cluster function.
When you execute the undo cluster enable command on a management device,
the cluster is removed, and the switch stop operating as a management device.
When you execute this command on a member device, the cluster function is
disabled on the switch, and the switch quit the cluster. When you execute this
command on a switch that belongs to no cluster, the cluster function is disabled
on the switch.
cluster switch-to
Description Use the cluster switch-to command to switch between the management device
and member devices for configuration and management.
You can manage member devices in a cluster through the management device, on
which you can switch to member view to configure or manage specified member
devices, and then use the quit command to return to the management device.
Telnet connection is used for switching between the cluster administrative device
and member device. When switching between the two views, observe the
following rules:
automatically set to the super password of the administrative device. After the
cluster is set up, you are recommended not to change the super password of
the cluster member (including the administrative device and member device).
Otherwise, view switchover may fail because authentication is not passed.
■ When you switch from the administrative device view to the member device
view, the current user level in member device view is consistent with that in the
administrative device view.
■ When you switch from the member device view to the administrative device
view, the user level is assigned according to the preset level of the
administrative device.
■ If the number of Telnet users on the device to be logged in reaches the
threshold, view switchover fails.
When you use this command on the administrative device, if the member number
n does not exist or the specified mac-address is not in the member list, the system
will display an error message. To end the switchover, enter the quit command.
Example # Switch from the management device to the member device numbered 6 and
then switch back to the management device.
<aaa_0.3Com> cluster switch-to 6
<aaa_0.3Com> quit
<aaa_0.3Com>
cluster-mac
undo cluster-mac
Parameters H-H-H: Multicast MAC address to be set for the cluster, in hexadecimal format.
This argument can be one of the following addresses: 0180-C200-0000,
0180-C200-000A, 0180-C200-0020 to 0180-C200-002F.
Description Use the cluster-mac command to configure a multicast MAC address for the
cluster.
Use the undo cluster-mac command to restore the default multicast MAC
address.
Note that, you can only use this command on a management device.
cluster-mac syn-interval
Description Use the cluster-mac syn-interval command to set the interval for the
management device to send Switch Clustering V2 multicast MAC synchronization
packets periodically. You can only use this command on a management device.
If you set this interval to zero on a management device, the management device
will not send Switch Clustering V2 multicast MAC synchronization packets to
other devices.
Examples # Set the interval for the management device to send Switch Clustering V2
multicast MAC synchronization packets to one minute.
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z.
[aaa_0.3Com] cluster
[aaa_0.3Com-cluster] cluster-mac syn-interval 1
delete-member
Description Use the delete-member command to remove a member device from the cluster.
display cluster
Parameter None
Description Use the display cluster command to display the state and statistics of the cluster
to which the current switch belongs.
The system will prompt that the device does not belong to any cluster if you
execute this command on a switch that does not belong to any cluster.
Example # Display cluster information (assuming that the current switch is a management
device).
<aaa_0.3Com> display cluster
Cluster name:"aaa"
Role:Administrator
Field Description
Cluster name Name of the cluster
Role Cluster role of the switch
Member number Member number of the switch
Handshake timer Value of handshake timer
Handshake hold-time Handshake holdtime
Administrator device mac address MAC address of the management device
Administrator status State of the management device
verbose: Displays the detailed information about all the candidate devices.
Description Use the display cluster candidates command to display the information about
the candidate devices of a cluster.
Field Description
MAC MAC address of a candidate device
Hop Hops from a candidate device to the management device
IP IP address of a candidate device
Platform Platform of a candidate device
Hostname : S7757
838 CHAPTER 62: CLUSTER CONFIGURATION COMMANDS
MAC : 000f-e200-7502
Hop : 1
Platform : 3Com Switch 7757
IP : 8.8.8.3
Field Description
Hostname Name of a candidate device
MAC MAC address of a candidate device
Hop Hops from a candidate device to the management device
IP IP address of a candidate device
Platform Platform of a candidate device
verbose: Displays the detailed information about all the devices in a cluster.
Description Use the display cluster members command to display the information about
cluster members.
Example # Display the information about all the devices in the cluster.
<aaa_0.3Com> display cluster members
SN Device MAC Address Status Name
0 3Com Switch 7758 00e0-fc00-7506 Admin aaa_0.3Com
1 3Com S7502 000f-e200-1234 Up aaa_1.3Com-1
2 3Com Switch 7757 000f-e200-7502 Up aaa_2.3Com-2
3 3Com Switch 7758 0000-0000-004d Up aaa_3.3Com-3
Table 155 Field descriptions of the display cluster members command
Field Description
SN Member number
Device Device type
MAC Address MAC address of a device
display cluster members 839
Field Description
Status State of a device
Name Name of a device
# Display the detailed information about the management device and all member
devices.
Member number:1
Name:aaa_1.3Com-1
Device:3Com S7502
MAC Address:000f-e200-1234
Member status:Up
Hops to administrator device:
IP: 8.8.8.2/24
Version:
3Com Comware Platform Software.
Comware Software, Version 3.10
Copyright(c) 2004-2006 3Com Corporation All rights reserved.
S7757-5308
Member number:2
Name:aaa_2. 3Com-2
Device:3Com Switch 7757
MAC Address:000f-e200-7502
Member status:Up
Hops to administrator device:
IP:8.8.8.3/24
Version:
3Com Comware Platform Software.
Comware Software, Version 3.10
Copyright(c) 2004-2006 3Com Corporation All rights reserved.
S7757-5308
Member number:3
Name: aaa_3.3Com-3
Device:3Com Switch 7758
MAC Address:0000-0000-004d
Member status:Up
Hops to administrator device:2
IP: 192.168.1.26/24
Version:
3Com Comware Platform Software.
Comware Software, Version 3.10
Copyright(c) 2004-2006 3Com Corporation All rights reserved.
S7757-5308
840 CHAPTER 62: CLUSTER CONFIGURATION COMMANDS
Table 156 Field descriptions of the display cluster members verbose command
Field Description
Member number Device member number
Name Name of a device
Device Device type
MAC Address MAC address of a device
Member status State of a device
Hops to administrator device Hops from the current device to the management device
IP IP address of a device
Version Software version of the current device
ftp cluster
Parameter None
Description Use the ftp cluster command to establish control connection with the public FTP
server of the cluster and enter FTP client view.
Example # Connect the FTP clients to the remote FTP server of the cluster.
<123_1.3Com> ftp cluster
Trying ...
Press CTRL+K to abort
Connected.
220 FTP service ready.
User(none):hello
331 Password required for hello.
Password:
230 User logged in.
ftp-server
undo ftp-server
Parameter ip-address: IP address of the FTP server to be configured for the cluster.
Description Use the ftp-server command to configure an FTP server on the management
device for the member devices in the cluster.
holdtime 841
Use the undo ftp-server command to remove the FTP server configured for the
member devices in the cluster.
You need to configure the IP address of an FTP server first for the member devices
in a cluster to access the FTP server through the management device.
holdtime
undo holdtime
Use the undo holdtime command to restore the default holdtime value.
■ If a switch does not receive any information of a peer device during the
holdtime, it sets the state of the peer device to "down". When the
communication between the two resumes, the corresponding member device
is re-added to the cluster (automatically).
■ If the downtime does not exceed the holdtime, the member device stays in the
normal state and needs not to be added again.
Execute these two commands on management devices only. The member devices
in a cluster acquire the holdtime setting from the management device.
ip address
mask: Subnet mask of the VLAN interface IP address, expressed in dotted decimal.
mask-length: Length of the subnet mask , namely, the number of "1"s in the
subnet mask.
Description Use the ip address command to specify an IP address and subnet mask for the
VLAN interface.
Use the undo ip address command to remove the IP address and subnet mask
of the VLAN interface.
n Note that:
■ The Switch 7750 use VLAN 1 as the cluster management VLAN to manage the
cluster.
■ The IP address of the Layer 3 virtual interface of the management VLAN must
be configured before a cluster is set up; otherwise, the cluster cannot be set up
successfully.
■ When a cluster is set up, the IP address of the management VLAN interface
cannot be modified any more.
Example # Set the IP address of VLAN interface 1 to 129.12.0.1 and the subnet mask to
255.255.255.0.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-interface1] ip address 129.12.0.1 255.255.255.0
ip-pool
undo ip-pool
Description Use the ip-pool command to configure a private IP address range for cluster
members on the switch to be configured as the management device.
logging-host 843
Use the undo ip-pool command to cancel the IP address range configuration.
Before establishing a cluster, you need to configure a private IP address pool for
the switches to be added to the cluster. When a candidate device is added to a
cluster, the management device assigns a private IP address to it for the candidate
device to communicate with other devices in the cluster. This enables you to
manage and maintain member devices in a cluster through the management
device.
Execute these two commands on switches that belong to no cluster only. The IP
address range of an existing cluster cannot be modified.
logging-host
undo logging-host
Parameter ip-address: IP address of the logging host configured for the cluster.
Description Use the logging-host command to configure a logging host on the management
device for the member devices in the cluster.
Use the undo logging-host command to remove the public logging host for the
member devices in the cluster.
You need to configure the IP address of a logging host first for the member
devices in a cluster to send log information to the logging host through the
management device.
Example # Configure the IP address of the logging host on the management device.
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z
[aaa_0.3Com] cluster
[aaa_0.3Com-cluster] logging-host 10.10.10.9
reboot member
eraseflash: Deletes the configuration file when the member device reboots.
Description Use the reboot member command to reboot a specified member device on the
management device.
The eraseflash keyword specifies to delete the booting configuration file when
the member device reboots.
snmp-host
undo snmp-host
Description Use the snmp-host command to configure an SNMP host for the member
devices inside a cluster on the management device.
Use the undo snmp-host command to cancel the SNMP host configuration.
You need to configure the IP address of an SNMP host first for the cluster, in order
that the member devices in a cluster can send trap messages to the SNMP host
through the management device.
Example # Configure an SNMP host for the cluster on the management device.
tftp cluster get 845
<aaa_0.3Com> system-view
System View: return to User View with Ctrl+Z
[aaa_0.3Com] cluster
[aaa_0.3Com-cluster] snmp-host 1.0.0.9
Parameter source-file: Name of the file to be downloaded from the public TFTP server of the
cluster.
Description Use the tftp cluster get command to download files from the specified directory
on the public TFTP server to the switch.
Example # Download the file name LANSwitch.app from the public TFTP server of the
cluster to the switch and save it as vs.app.
<123_1.3Com> tftp cluster get LANSwitch.app vs.app
destination-file: Name of the uploaded file saved in the storage directory of the
TFTP server.
Description Use the tftp put command to upload the file in the switch to the specified
directory in the TFTP server.
Example # Upload the file named vrpcfg.txt in the switch to the public TFTP server of the
cluster and save it as temp.txt.
<123_1.3Com> tftp cluster put vrpcfg.txt temp.txt
846 CHAPTER 62: CLUSTER CONFIGURATION COMMANDS
tftp-server
undo tftp-server
Description Use the tftp-server command to configure a TFTP server for cluster members on
the management device.
Use the undo tftp-server command to cancel the TFTP server of the cluster
members.
You need to configure the IP address of the TFTP server for the cluster, in order that
the member devices in the cluster can access the TFTP server through the
management device.
timer
undo timer
Parameter interval: Interval (in seconds) to send handshake packets. This argument ranges
from 1 to 255.
Description Use the timer command to set the interval to send handshake packets.
Use the undo timer command to restore the default value of the interval.
Inside a cluster, the connections between member devices and the management
device are kept through transmitting handshake packets. Handshake packets in a
timer 847
cluster enable the management device to acquire the information about member
states link states.
Execute these two commands on management devices only. All the member
devices in a cluster acquire the handshake interval setting from the management
device.
all: Displays the PoE information of all the PoE ports on the switch.
Description Use the display poe interface command to view the PoE status of a specific
port. If the all keyword is specified, the command displays the PoE status of all the
PoE ports.
Field Description
Port power status PoE status of the port:
Disabled: Power is disabled on the port.
PD searching: The port is searching PD.
delivering: The port is delivering power to PD.
PD disconnected: PD is disconnected.
testing: The port is testing the PD.
fault: Nonstandard PD is detected or failure occurs.
Port power mode PoE mode of the port:
signal: The port supplies port in the signal mode.
spare: The port supplies power in the spare mode.
850 CHAPTER 63: POE CONFIGURATION COMMANDS
Field Description
Port PD class Class of power to the PD
Port power priority PoE priority of the port:
■ critical: The highest
■ high: High
■ low: Low
Port max power The maximum available power on the port
Port current power The current power on the port
Port average power The average power on the port
Port peak power The peak power on the port
Port current The current on the port
Port voltage The voltage on the port
Description Use the display poe interface power command to view the power
information of a specific port of the switch. If the all keyword is specified, the
command displays the power information of all PoE ports on the switch.
Parameter None
Description Use the display poe powersupply command to view the parameters of the
external PoE power supply units (PSU).
Field Description
Power Model Identification of the PSU manufacturer
Power manufacturer Name of the power manufacturer
Power Nominal Value Nominal power of the PSU
Power Peak Value Peak power of the PSU
Power Average Value Average power of the PSU
Power Current Current Current current of the PSU
Power Current Voltage Current voltage of the PSU
Power Current Value Current power of the PSU
Power Software Version Version of the PSU software
Power Hardware Version Version of the PSU hardware
Parameter None
Description Use the display poe pse command to display the parameters of all modules that
serve as power sourcing equipment (PSE).
Example # Display the parameters of all modules that serve as PSE on the switch.
<SW7750> display poe pse
PSE Information of board 4:
Power Current Value :450 W
Power Max Value :806 W
Power Peak Value :700 W
Power Average Value :475 W
Software Version :290
Hardware Version :000
CPLD Version :000
Table 159 Field descriptions of the display poe pse command
Field Description
Power Current Value Current power of the board
Power Max Value Maximum power of the board
Power Peak Value Peak power of the board
Power Average Value Average power of the board
Software Version Version of the PSE software
Hardware Version Version of the PSE hardware
CPLD Version Version of the PSE complex programmable logic device (CPLD)
854 CHAPTER 63: POE CONFIGURATION COMMANDS
poe enable
Parameter None
Description Use the poe enable command to enable the PoE feature on a port.
Use the undo poe enable command to disable the PoE feature on a port.
By default, the PoE feature on a port is enabled if the PoE feature is enabled on a
module.
Description Use the poe enable slot command to enable the PoE feature on a module.
Use the undo poe enable slot command to disable the PoE feature on a
module.
Note:
■ Before enabling the PoE feature on a module, you must ensure that the
remaining power output is not less than the maximum power required for the
module. Otherwise, PoE cannot be enabled on the module correctly.
■ After PoE is enabled on a PoE module, the rated power output shall be
reserved for the slot even when the module is removed from the slot. You need
to release this power output using the undo poe enable slot command.
poe legacy enable slot 855
■ If you insert a module which does not support PoE into the slot for which a
rated power output is reserved, the reserved power output shall be released.
■ If you insert a PoE module of another type into the slot for which a rated power
output is reserved, the switch still applies the former PoE configuration to the
port.
Description Use the poe legacy enable slot command to enable the module to perform
PoE-compatibility detection for the remote PDs.
Use the undo poe legacy slot command to disable PoE-compatibility detection
for the remote PDs.
Through the PoE-compatibility detection, the switch can detect the PDs
incompatible with IEEE802.3af and supply power to them.
c CAUTION: PoE-compatibility detection process is very slow and has impact on the
system performance, so you are recommended not to enable the
PoE-compatibility detection on a module if all PDs connected are
IEEE802.3af-compatible.
poe max-power
Parameter max-power: Maximum power distributed to the port, ranging from 1,000 to
15,400 in mW.
Description Use the poe max-power command to configure the maximum power supplied
by the current port.
Use the undo poe max-power command to restore the maximum power
supplied by the current port to the default value.
By default, the maximum power that a port can supply is 15,400 mW.
Parameter max-power: Maximum power distributed to the module, ranging from 37 to 806
in W.
Description Use the poe max-power command to set the maximum power of a module.
Use the undo poe max-power command to restore the default maximum
power of a module.
poe mode
Description Use the poe mode command to configure the PoE mode on the current port.
Use the undo poe mode command to restore the PoE mode on the current port
to the default mode.
Note that the Switch 7750s do not support the spare mode currently.
Parameter max-value: Maximum PoE power output on the switch, ranging from 37 to 2,400
in W.
Description Use the poe power max-value command to set the maximum power output on
the switch.
Note that this command works only when the power you specify is greater than
the power that has been distributed to the modules.
poe power-management
Description Use the poe power-management command to configure the PoE management
mode of the switch.
This command and the PoE priority settings of PoE ports will work together to
control the power feeding of the switch when the switch is reaching its full power
load in power supply.
■ auto mode: When the switch is reaching its full load in supplying power, it will
first supply power to the PDs that are connected to the ports with critical
priority, and secondly supply power to the PDs that are connected to the ports
with high priority. For example: Port A has the power priority of critical. When
the switch is reaching full load and a new PD is now added to the port A, the
switch will power down a PD that is connected to a port with the lowest
priority and turn to feed this new PD.
■ manual mode: When the switch is reaching its full load in supplying power
externally and a new PD is added, it will neither take the priority into account
nor make change to its original power supply status; only the information
about the newly added device is provided. For example: Port A has the priority
of critical. When the switch is reaching full load and a new PD is now
connected to port A, the switch does not supply power to this new device.
Example # Configure the PoE management mode of the module in slot 3 of the switch to
auto.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] poe power-management auto slot 3
poe priority
Description Use the poe priority command to configure the PoE priority of a port.
Use the undo poe priority command to restore the default PoE priority.
Note:
poe upgrade
Parameter refresh: Upgrades the existing valid software in the PSE in the refresh mode.
full: Reloads the software to the PSE when there is no valid software in the PSE.
filename: Upgrade file name, with a length of 1 character to 63 characters.
Description Use the poe upgrade command to update the processing software in the PSE
online.
n ■
■
The full mode is used only when you cannot use the refresh mode.
When the PSE processing software is damaged (that is, all the PoE commands
cannot be successfully executed), you can use the full mode to update and
restore the software.
■ When the upgrade procedure is interrupted for some unexpected reasons
(such as failure which cause restart), if the update in the full mode fails after
restart, you must update the software in the full mode after power-off and
restart of the device, and then restart the device manually. In this way, the
former PoE configuration is restored.
Parameter None
Description Use the display poe-power ac-input state command to display the AC input
state of the PoE power supply units (PSUs) contained in the external PoE power
supply system.
Field Description
AC input state Normal: The AC input is normal.
of PoE PSU 1
Lack Phrase: The PSU is idle.
Under Limit: The AC input voltage is lower than the lower threshold.
Upper Limit: The AC input voltage is higher than the upper threshold.
Fuse Broken: The fuse is broken.
Switch Off: The switch is off.
Parameter None
Description Use the display poe-power alarm command to display the detailed alarm
information about the external PoE PSUs.
862 CHAPTER 64: POE PSU SUPERVISION DISPLAY COMMANDS
Example # Display the detailed alarm information about the external PoE PSUs.
<SW7750> display poe-power alarm
PSU alarm detail:
Number of PSUs : 1
PSU 1 : Absent PSU is absent.
PSU 2 : Normal PSU is in normal state.
PSU 3 : Absent PSU is absent.
Table 161 Field descriptions of the display poe-power alarm command
Field Description
The alarm information PSU is in normal state: The PSU operates normally.
about PoE PSU1
NOTLINK: The PSU is not linked (the controller fails to
communicate with this PSU or the PSU is not inserted). You can
clear the failure by powering off the PSU or inserting a PSU.
INERROR: PSU input error. Restoring the normal AC input can
clear the error.
OUTERROR: PSU output error (No normal DC output from the
PSU).
HIGHVOL: Overvoltage on the PSU (the PSU is shut down because
its outputs overvoltage).
HIGHTEP: It is overheated in the PSU.
FANERROR: The fan fails.
CLOSE: The PSU is shut down.
CURLIMIT: The current of the PSU is limited.
Absent: The PSU is absent.
Parameter None
Description Use the display poe-power dc-output state command to display the DC
output state of the PoE PSUs in-use.
Table 162 Field descriptions of the display poe-power dc-output state command
Field Description
DC output state of the Normal: The DC output is normal.
external PoE PSU
Under Limit: The DC output voltage is lower than the lower
threshold.
Upper Limit: The DC output voltage is higher than the upper
threshold.
Fuse Broken: The fuse is broken.
Switch Off: The switch is off.
Hardware Fault: Hardware fails.
Parameter None
Description Use the display poe-power dc-output value command to display the DC
output voltage/current values of the external PoE PSUs.
Example # Display the DC output voltage/current values of the external PoE PSUs.
<SW7750> display poe-power dc-output value
DC Output Voltage : 53.997
DC Output Current : 0.350 A
Table 163 Field descriptions of the display poe-power dc-output value command
Field Description
DC Out Voltage DC output voltage
DC Output Current DC output current
Parameter None
Description Use the display poe-power switch state command to display the number and
current state of the AC power distribution switches in the external PoE PSU.
Example # Display the number and current state of the AC power distribution switches.
864 CHAPTER 64: POE PSU SUPERVISION DISPLAY COMMANDS
n Currently, the Switch 7750 do not use any AC power distribution switch, so the
returned value is always 0.
Parameter None
Field Description
Supervision Module Version Software version of the supervision module
Supervision Module Name Name of the supervision module
Power Type Model of the external PoE PSU
Power Rating Value Rated power of the external PoE PSU
Power Peak Value Peak power of the external PoE PSU
Power Average Value Average Power of the external PoE PSU
Power Current Value Current power of the external PoE PSU
PSU number Number of PoE PSUs
Rating Output Power Rated output power of the PoE PSU: 2,500 W for 220 VAC
input, 1,250 W for 110 VAC input
Hard Version Info Hardware version information of the external PoE PSUs
POE PSU SUPERVISION
65 CONFIGURATION COMMANDS
Description Use the poe-power input-thresh lower command to set the undervoltage
alarm threshold of AC input for the external PoE PSUs.
For 220 VAC input, the recommended value is 181.0 V; for 110VAC input, the
recommended value is 90.0 V.
Example # Set the undervoltage alarm threshold of AC input for the external PoE PSUs to
181.0 V.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] poe-power input-thresh lower 181.0
Set lower input-threshold power successfully!
Description Use the poe-power input-thresh upper command to set the overvoltage
alarm threshold of AC input for the external PoE PSUs.
866 CHAPTER 65: POE PSU SUPERVISION CONFIGURATION COMMANDS
For 220 VAC input, the recommended value is 264.0 V; For 110VAC input, the
recommended value is 132.0 V.
Example # Set the overvoltage alarm threshold of AC input for the external PoE PSUs to
264.0 V.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] poe-power input-thresh upper 264.0
Set upper input-threshold power successfully!
Parameter string: Undervoltage alarm threshold (in volts V) in the format of X.X, in the range
of 45.0 to 47.0.
Description Use the poe-power output-thresh lower command to set the undervoltage
alarm threshold of DC output for the external PoE PSUs.
For either 220 VAC or 110 VAC input, the recommended threshold is 47.0 V.
Example # Set the undervoltage alarm threshold of DC output for the external PoE PSUs to
47.0 V.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] poe-power output-thresh lower 47.0
Set lower output-threshold power successfully!
Parameter string: Overvoltage alarm threshold (in volts V) in the format of X.X, in the range
of 55.0 to 57.0.
Description Use the poe-power output-thresh upper command to set the overvoltage
alarm threshold of DC output for the external PoE PSUs.
For either 220 VAC or 110 VAC input, the recommended threshold is 55.0 V.
Example # Set the overvoltage alarm threshold of DC output for the external PoE PSUs to
55.0 V.
poe-power output-thresh upper 867
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] poe-power output-thresh upper 55.0
Set upper output-threshold power successfully!
868 CHAPTER 65: POE PSU SUPERVISION CONFIGURATION COMMANDS
POE PROFILE CONFIGURATION
66 COMMANDS
n PoE profile is a set of PoE configurations in Ethernet port view. You can specify PoE
configurations to be applied in Ethernet port view in PoE profiles.
apply poe-profile
Description Use the apply poe-profile command to apply the existing PoE profile
configuration to the specified Ethernet port.
Use the undo apply poe-profile command to cancel the PoE profile
configuration for the specified Ethernet port.
Only one PoE profile can be in use at any time for each Ethernet port.
display poe-profile
Example # Display detailed configuration information for the PoE profile by the name of
profile-test.
<SW7750> display poe-profile name profile-test
poe-profile
Parameter profilename: Name of PoE profile, a string with 1 to 15 characters. It starts with a
letter from a to z or from A to Z, and it cannot be any of reserved keywords like
all, interface, user, undo, and mode.
The following PoE features can be configured in the PoE profile mode:
poe enable
The maximum number of PoE profiles that can be configured for an S3900 switch
is 100.
Description Use the display udp-helper server command to display the information about
the configured destination servers connected to a specified VLAN interface and
the number of the packets forwarded to each destination server. If you do not
specified the vlan-id argument, the corresponding information about all the VLAN
interfaces is displayed.
Example # Display the information about the configured destination servers connected to
VLAN 1 interface and the number of the packets forwarded to the destination
servers.
<SW7750> display udp-helper server interface Vlan-interface 1
Interface name Server address Packets sent
Vlan-interface1 192.1.1.2 0
The information above shows that the server with its IP address being 192.1.1.2 is
configured as a destination server and is connected to VLAN 1 interface, and no
packets are forwarded to it so far.
Parameter None
Description Use the reset udp-helper packet command to clear the statistics about the
packets forwarded by UDP-Helper.
udp-helper enable
Parameter None
Description Use the udp-helper enable command to enable the UDP-Helper function.
udp-helper port
Syntax udp-helper port { port | dns | netbios-ds | netbios-ns | tacacs | tftp | time }
dns: Specifies the DNS UDP port (port 53) as a UDP-Helper destination port.
tacacs: Specifies the TACACS UDP port (port 49) as a UDP-Helper destination port.
tftp: Specifies the TFTP UDP port (port 69) as a UDP-Helper destination port.
time: Specifies the time service UDP port (port 37) as a UDP-Helper destination
port.
udp-helper server 875
Description Use the udp-helper port command to specify a UDP-Helper destination port.
Use the undo udp-helper port command to disable a port from being a
UDP-Helper destination port.
With UDP-Helper enabled, UDP broadcast packets with their destination port
being the six default UDP ports (that is, port 69, 53, 37, 137, 138, and 49) are
forwarded to the configured destination servers by default. After the UDP-Helper
function is disabled, all the configured UDP-Helper destination ports are cancelled,
including the default UDP ports.
n Note that:
■ Before configuring udp-helper port, you must enable UDP-Helper.
■ When you view the configuration information by using the display
current-configuration command, information about default UDP ports is not
displayed. Such information is displayed only when a default port is disabled.
udp-helper server
Description Use the udp-helper server command to specify a destination server for the UDP
broadcast packets to be forwarded.
Note that if you do not provide the ip-address argument when executing the
undo udp-helper server command, all the destination servers configured on the
VLAN interface are removed.
Example # Configure the device with its IP address being 192.1.1.2 as a destination server
for the UDP broadcast packets to be forwarded on VLAN 1 interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Vlan-interface 1
[SW7750-Vlan-interface1] udp-helper server 192.1.1.2
SNMP CONFIGURATION COMMANDS
68
display snmp-agent
Description Use the display snmp-agent command to view the switch fabric ID of the
current device.
SNMP local EngineID in the above information represents the ID of the local SNMP
switch fabric.
Description Use the display snmp-agent community command to view the information
about the currently configured community names for SNMPv1 or SNMPv2c.
878 CHAPTER 68: SNMP CONFIGURATION COMMANDS
Community name:private
Group name:private
Storage-type: nonVolatile
Table 165 Field descriptions of the display snmp-agent community command
Field Description
Community name Community name
Group name Group name
Storage-type Storage type, including volatile, nonVolatile, permanent, readOnly, and
other.
Description Use the display snmp-agent group command to view group name, security
model, state of various views and storage models.
Field Description
Group name SNMP group name
Security model Security model of that group, including authorization and encryption
(AuthPriv), authorization and no encryption (AuthnoPriv), no authorization
and no encryption (noAuthnoPriv).
Readview Read-only MIB view name corresponding to that group
Writeview Writable MIB view corresponding to that group
Notifyview The name of the notify MIB view corresponding to that group
display snmp-agent mib-view 879
Field Description
Storage-type Storage type, including volatile, nonVolatile, permanent, readOnly and
other.
Description Use the display snmp-agent mib-view command to view the MIB view
configuration information of the current Ethernet switch.
Example # Display the information about the currently configured MIB view.
<SW7750> display snmp-agent mib-view
View name:system
MIB Subtree:system
Subtree mask:
Storage-type: nonVolatile
View Type:included
View status:active
View name:ViewDefault
MIB Subtree:iso
Subtree mask:
Storage-type: nonVolatile
View Type:included
View status:active
View name:ViewDefault
MIB Subtree:snmpUsmMIB
Subtree mask:
Storage-type: nonVolatile
View Type:excluded
View status:active
View name:ViewDefault
MIB Subtree:snmpVacmMIB
Subtree mask:
Storage-type: nonVolatile
View Type:excluded
View status:active
View name:ViewDefault
MIB Subtree:snmpModules.18
Subtree mask:
880 CHAPTER 68: SNMP CONFIGURATION COMMANDS
Storage-type: nonVolatile
View Type:excluded
View status:active
Table 167 Field descriptions of the display snmp-agent mib-view command
Field Description
View name View name
MIB Subtree MIB subtree
Subtree mask Subtree mask
Storage-type Storage type
View Type Includes or excludes access to an MIB object
View status: active/inactive Indicates the MIB view status: active or inactive
c CAUTION: For the above commands, when the SNMP agent is disabled, the
system gives the prompt "SNMP agent disabled".
Parameter None
Description Use the display snmp-agent statistics command to view the statistics
information about SNMP packets.
version: Displays the version information about the SNMP running in the system.
Description Use the display snmp-agent sys-info command to view the system contact
(sysContact) string, system location string, and the current SNMP version.
The above information indicates that the contact of this device is 3Com
Corporation.
The above information indicates that the device location is Marlborough, MA.
The above information indicates that the current SNMP version is SNMPv3.
Parameter switch fabricid: Displays the SNMPv3 user information of the specified switch
fabric ID, which ranges from 10 to 64 hexadecimal numerals.
882 CHAPTER 68: SNMP CONFIGURATION COMMANDS
username: Displays information about the specified SNMPv3 user, which ranges
from 1 to 32 bytes.
groupname: Displays information about users in the specified group name, which
ranges from 1 to 32 bytes.
Description Use the display snmp-agent usm-user command to view SNMP user
information.
Field Description
User name SNMP user name
Group name The group name which the SNMP user name belongs to
Engine ID The character string identifying the SNMP device
Storage-type Storage type of SNMP information, including volatile, nonVolatile,
permanent, readOnly and other.
UserStatus SNMP user status
Parameter None
Description Use the enable snmp trap updown command to enable the sending of
port/interface linkUp and linkDown traps.
Use the undo enable snmp trap updown command to disable the sending of
linkUp and linkDown traps.
The enable snmp trap updown and snmp-agent trap enable, snmp-agent
target-host commands are used at the same time. You can use the snmp-agent
target-host command to specify the hosts that can receive Trap information. To
send Trap information, you must configure at least one snmp-agent target-host
command.
Example # Enable the port Ethernet 2/0/1 to send linkUp and linkDown SNMP traps, using
the community name "public" to the NMS whose IP address is 10.1.1.1.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent trap enable
[SW7750] snmp-agent target-host trap address udp-domain 10.1.1.1 par
ams securityname public
[SW7750] interface ethernet2/0/1
[SW7750-Ethernet2/0/1] enable snmp trap updown
snmp-agent
Syntax snmp-agent
undo snmp-agent
Parameter None
snmp-agent community
Parameter read: Indicates that MIB object can only be read. Only the read-only community
can query device information.
884 CHAPTER 68: SNMP CONFIGURATION COMMANDS
write: Indicates that MIB object can be read and written. The read-write
community can configure the device.
acl-number: The basic access control list (ACL) number specified by the
community, ranging from 2,000 to 2,999.
Example # Configure community name as comaccess and permit read-only access by this
community name.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent community read comaccess
snmp-agent group
Version V3:
Description Use the snmp-agent group command to configure a new SNMP group, that is,
to map SNMP user to SNMP view.
Use the undo snmp-agent group command to cancel a specified SNMP group.
Parameter switch fabricid: Specifies the switch fabric ID with a character string, only
composed of 10 to 64 hexadecimal numbers. Two hexadecimal characters form an
octet.
886 CHAPTER 68: SNMP CONFIGURATION COMMANDS
Description Use the snmp-agent local-switch fabricid command to set the switch fabric
ID of the local SNMP entity.
snmp-agent mib-view
oid-tree: The OID MIB subtree of the MIB object subtree. It is a character string,
ranging from 1 to 255 characters. It can be a character string of the variable OID
(such as 1.4.5.3.1), or a variable name (such as system). The character string can
include wildcards (such as 1.4.5.*.*.1).
Description Use snmp-agent mib-view command to create or update the view information,
limiting the MIB objects to be accessed by the NMS.
Use the undo snmp-agent mib-view command to cancel the current setting.
Example # Create an SNMP MIB view that consists of all the objects of MIB-II.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent mib-view included mib2 1.3.6.1.2.1
snmp-agent packet max-size 887
Parameter byte-count: Maximum size of the SNMP packet (in bytes) that the Agent can
send/receive, ranging from 484 to 17,940.
Description Use the snmp-agent packet max-size command to set the maximum size of
SNMP packet that the Agent can send/receive.
Use undo snmp-agent packet max-size command to restore the default size of
SNMP packet.
The sizes of the SNMP packets that the Agent can send/receive are different
because network environments are different.
Example # Set the maximum size of the SNMP packet that the Agent can send/receive to
1,042 bytes.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent packet max-size 1042
snmp-agent sys-info
all: All SNMP versions, including SNMP V1, SNMP V2C, SNMP V3.
Description Use the snmp-agent sys-info command to configure system information such
as geographical location of the device, information for system maintenance and
version information of running SNMP.
Use the undo snmp-agent sys-info location command to remove the current
configuration.
If the device fails, the device maintenance person can use contact information to
contact the manufacturer.
By default, the contact information is " 3Com Corporation", the system location is
" Marlborough, MA", the SNMP version is SNMP V3.
Example # Set contact information for system maintenance as Dial System Operator #
1234.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent sys-info contact Dial System Operator # 1234
snmp-agent target-host
address: Specifies the address of the destination host for transmitting SNMP
messages.
udp-domain: Specifies transport domain over UDP for the target host.
v3: RepresentsSNMPv3.
1 Use the snmp-agent trap enable or enable snmp trap updown command to
set Trap packets allowed to send (all Trap packets can be sent by default).
2 Use the snmp-agent target-host command to set the address of the
destination host receiving SNMP Trap packets.
Related command: snmp-agent trap enable, snmp-agent trap source and snmp-agent trap life.
Example # Enable sending SNMP Trap packets to 10.1.1.1 with community name public.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent trap enable standard
[SW7750] snmp-agent target-host trap address udp-domain 10.1.1.1 par
ams securityname public
coldstart: Configures to send the coldstart trap information when the switch
restarts.
linkdown: Configures to send SNMP linkDown Trap information when the port is
down.
linkup: Configures to send SNMP linkUp Trap information when the port is up.
warmstart: Configures to send SNMP warm start Trap information when SNMP is
rebooted.
Description Use the snmp-agent trap enable command to enable the device to send Trap
packets.
Use the undo snmp-agent trap enable command to disable the device to send
Trap packets.
Example # Enable to send the Trap packet of SNMP authentication failure to 10.1.1.1. The
community name is public.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent trap enable standard authentication
[SW7750] snmp-agent target-host trap address udp-domain 10.1.1.1 par
ams securityname public
snmp-agent trap ifmib 891
Parameter None
Description Use the snmp-agent trap ifmib command to extend the bound variables in the
linkup/linkdown trap packet, that is, to add two objects "ifDescr" (interface
description) and "ifType" (interface type).
Use the undo snmp-agent trap ifmib command to restore the bound variables
in a linkup/linkdown trap packet to the standard format defined in IF-MIB.
Example # Extend the format of linkup/linkdown trap packet, that is, add the "ifDescr"
(interface description) and "ifType" (interface type) fields to the trap packet.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]snmp-agent trap ifmib link extended
# Restore the linkup/linkdown trap packet format to the standard format defined
in IF-MIB.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]undo snmp-agent trap ifmib link extended
Description Use the snmp-agent trap life command to set aging time for Trap packets. The
Trap packets exceeding the aging time are discarded.
Use the undo snmp-agent trap life command to restore the default aging time
for Trap packets.
892 CHAPTER 68: SNMP CONFIGURATION COMMANDS
After the specified aging time has elapsed, the system drops the trap packet.
Description Use the snmp-agent trap queue-size command to configure the information
queue length of Trap packet sent to destination host.
Use the undo snmp-agent trap queue-size command to restore the default
value.
Related command: snmp-agent trap enable, snmp-agent target-host and snmp-agent trap life.
Description Use the snmp-agent trap source command to configure the source address for
sending Trap message.
Use the undo snmp-agent trap source command to cancel the source address
for sending Trap message.
The SNMP Trap message sent from a server has a source IP address no matter
which interface the Trap message is sent from.
You can configure this command to trace a specific event using the source address
of a Trap packet.
n Before setting the IP address of an interface address as the source address of the
sent Trap packet, you must configure an IP address for the interface.
Example # Configure the IP address of the VLAN interface 1 as the source address for
transmitting the Trap packets.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent trap source Vlan-interface 1
snmp-agent usm-user
Syntax
1 Versions V1 and V2C
1 Version V3
Description Use the snmp-agent usm-user command to add a new user to an SNMP group.
Use the undo snmp-agent usm-user command to cancel a user from the
SNMP group.
While using SNMPv3, SNMP switch fabricID (for authentication) is required when
you configure a remote user for an agent. If you change switch fabricID after
configuring a user, the user corresponding to the original switch fabricID is not
effective.
For V1 and V2C, this command will add a new community name. For SNMPv3, it
will add a new user for an SNMP group.
Example # Add a user John to SNMPv3 group Johngroup. Configure to authenticate using
HMAC-MD5 algorithm, require authentication and set authentication password as
hello.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] snmp-agent group v3 Johngroup
[SW7750] snmp-agent usm-user v3 John Johngroup authentication-mode m
d5 hello
RMON CONFIGURATION COMMANDS
69
Parameter entry-number: Alarm entry index, in the range of 1 to 65535. If you do not specify
this argument, the configuration of all alarm entries is displayed.
Description Use the display rmon alarm command to display the configuration of a
specified alarm entry or all the alarm entries.
Field Description
Alarm table Alarm entry
abc Entry creator
VALID Valid for alarm entries corresponding to the index
Samples type Sample type: change value or absolute value
Variable formula Variable formula of the sampled node
Sampling interval Sampling interval
Rising threshold is 100 Rising threshold is 100
Falling threshold is 10 Falling threshold is 10
896 CHAPTER 69: RMON CONFIGURATION COMMANDS
Field Description
When startup enables Alarm startup type:
risingOrFallingAlarm (an alarm is triggered when the rising
or falling threshold is reached)
risingAlarm (an alarm is triggered when the rising threshold
is reached)
FallingAlarm (an alarm is triggered when the falling
threshold is reached)
Latest value Latest sampled value
Parameter event-entry: Event entry index, in the range of 1 to 65535. If you do not specify
this argument, the configuration of all the event entries is displayed.
Description Use the display rmon event command to display the configuration of a
specified event entry or all the event entries.
The displayed information includes: event entry index, event entry owner, event
description, the action triggered by the event (log or alarm messages), and the
time (in seconds) when the latest event is triggered (in terms of the time elapsed
since the system is started/initialized).
Field Description
Event table Event entries
abc Entry creator
VALID The entry corresponding to the index is valid
Description Event description
Will cause log-trap when triggered The event triggers logs and an trap alarm
last triggered at 0days 00h:02m:27s Time the latest event is triggered
display rmon eventlog 897
Parameter event-entry: Event entry index, in the range of 1 to 65535. If you do not specify
this argument, the log of all the event entries is displayed.
Description Use the display rmon eventlog command to display the log of a specified
event entry or all the event entries.
The displayed information includes: the indexes and status of the event entries in
the event table, the time (in seconds) when an event log is generated (in terms of
the time elapsed since the system is started or initialized), and the event
description.
Field Description
Event table Event entries
abc Entry creator
VALID The status of the line corresponding to the line is valid
Generates eventLog 1.1 at Time when the event is triggered. The event may be triggered
0days 00h:01m:39s several times. 1.1 indicates the time event 1 is first triggered
Description Description of an event log
Description Use the display rmon history command to display the RMON history
information about a specified port. The information about the latest sample,
898 CHAPTER 69: RMON CONFIGURATION COMMANDS
including utilization, the number of errors, the total number of packets and so on,
is also displayed.
Example # Display the RMON history information about the RMON port Ethernet2/0/1.
<SW7750> display rmon history ethernet 2/0/1
History control entry 1 owned by abc is VALID
Samples interface : Ethernet2/0/1<ifEntry.642>
Sampling interval : 10(sec) with 10 buckets max
Latest sampled values :
Dropevents :0 , octets : 0
packets :0 , broadcast packets : 0
multicast packets :0 , CRC alignment errors : 0
undersize packets :0 , oversize packets : 0
fragments :0 , jabbers : 0
collisions :0 , utilization : 0
Table 172 Field descriptions of the display rmon eventlog command
Field Description
History control entry 1 Index number in the history control table
abc Entry creator
VALID The entry corresponding to the index is valid
Samples interface Sampled interface
Sampling interval Sampling interval
buckets Number of records in the history control table
Latest sampled values Latest sampled information
Dropevents Event about dropping packets
octets Number of received or transmitted bytes during sampling duration
packet Number of received or transmitted packets during sampling duration
broadcastpackets Number of broadcast packets
multicastpackets Number of multicast packets
CRC alignment errors Number of checkerror packets
undersize packets Number of undersize packets
oversize packets Number of oversize packets
fragments Number of undersize and checkerror packets
jabbers Number of oversize and checkerror packets
collisions Number of collision packets
utilization Utilization ratio
Description Use the display rmon prialarm command to display the configuration of a
specified RMON extended alarm entry or all the RMON extended alarm entries.
Field Description
Prialarm table 1 Index number of a line of the extended alarm table
abc Creator of this extended alarm entry
VALID The entry corresponding to the index is valid
Samples type Sample type: change value or absolute value
Variable formula Alarm variable of the sampled node
Description Description of the alarm variable
Sampling interval Sampling interval
Rising threshold Rising threshold. An alarm is triggered when the rising threshold
is reached
Falling threshold Falling threshold. An alarm is triggered when the falling
threshold is reached
linked with event Event index corresponding to an alarm
When startup enables Alarm startup type:
risingOrFallingAlarm (an alarm is triggered when the rising or
falling threshold is reached)
risingAlarm (an alarm is triggered when the rising threshold is
reached)
FallingAlarm (an alarm is triggered when the falling threshold is
reached)
This entry will exist: forever Existing period. This entry can exist forever or exist in the
specified cycle
Latest value Latest sampled value
900 CHAPTER 69: RMON CONFIGURATION COMMANDS
Description Use the display rmon statistics command to display the RMON statistics of a
specified port.
The displayed information include the number of the following items: collisions,
packets with CRC errors, undersize or oversize packets, broadcast packets,
multicast packets, received bytes, and received packets.
Field Description
Statistics entry 3 Index number of the statistics information table
abc Entry creator
VALID The entry corresponding to this index is valid
Interface Interface
etherStatsOctets Number of received or transmitted bytes
etherStatsPkts Number of received or transmitted packets
etherStatsBroadcastPkts Number of broadcast packets
etherStatsMulticastPkts Number of multicast packets
etherStatsUndersizePkts Number of undersize packets
etherStatsOversizePkts Number of oversize packets
etherStatsFragments Number of undersize and checkerror packets
etherStatsJabbers Number of oversize and checkerror packets
etherStatsCRCAlignErrors Number of checkerror packets
etherStatsCollisions Number of collision packets
rmon alarm 901
Field Description
etherStatsDropEvents Event about dropping packets (network resources are
insufficient)
Packets received according to length Number of received packets, which are made statistics
by byte length
rmon alarm
delta: Specifies to sample increments (that is, the current increment with regard
to the latest sample)
event-entry2: Index of the event entry corresponding to the lower threshold, in the
range of 1 to 65,535.
owner text: Specifies the owner of the entry. The text argument is a string
comprising 1 to 127 characters.
Description Use the rmon alarm command to add an alarm entry to the alarm table.
Use the undo rmon alarm command to remove an alarm entry from the alarm
table.
902 CHAPTER 69: RMON CONFIGURATION COMMANDS
You can use the rmon alarm command to define an alarm entry so that a specific
alarm event can be triggered under specific circumstances. The act (such as
logging and sending trap messages to NMS) taken after an alarm event occurs is
determined by the corresponding alarm entry.
With an alarm entry defined in an alarm group, a network device performs the
following operations accordingly:
Comparison Operation
The sample value is larger than or equal to Triggering the event identified by the
the set upper threshold (threshold-value1) event-entry1 argument
The sample value is smaller than the set Triggering the event identified by the
lower threshold (threshold-value2) event-entry2 argument
n ■ Before adding an alarm entry, you need to use the rmon event command to
define the events to be referenced by the alarm entry.
■ Make sure the node to be monitored exists before executing the rmon alarm
command.
rmon event
trap trap-community: Defines the event as a trap event and specifies the
community name of the NMS that receives the trap messages.
log-trap log-trapcommunity: Defines the event as a log and trap event and
specifies the community name of the NMS that receives the log messages.
owner text: Specifies the creator of the event entry. The text argument is a string
comprising 1 to 127 characters.
Description Use the rmon event command to add an entry to the event table.
Use the undo rmon event command to delete an entry from the event table.
When adding an event entry to an event table, you need to specify the event
index. You need also to specify the corresponding actions, including logging the
event, sending trap messages to the NMS, and the both, for the network device to
perform corresponding operation when an alarm referencing the event is
triggered.
Example # Add the event entry numbered 10 to the event table and configure it to be a log
event.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] rmon event 10 log
rmon history
buckets number: Specifies the size of the history table that corresponds to the
entry, in the range of 1 to 65535. Currently the device only supports 1 to 10. If
you enter an argument greater than 10, the actual table size is still 10.
904 CHAPTER 69: RMON CONFIGURATION COMMANDS
owner text: Specifies the owner of the entry, a string comprising 1 to 127
characters.
Description Use the rmon history command to add an entry to a history control table.
Use the undo rmon history command to delete an entry from a history control
table.
You can use the rmon history command to sample a specific port. You can also
set the sampling interval and the number of the samples that can be saved. After
you execute this command, the RMON system samples the port periodically and
stores the samples for later retrieval. The sampled information includes utilization,
the number of errors, and total number of packets.
You can use the display rmon history command to display the statistics of the
history control table.
Example # Create the history entry numbered 1 for Ethernet2/0/1 port, with the table size
being 10, the sampling interval being 5 seconds, and the owner being user1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1]rmon history 1 buckets 10 interval 5 owner user1
rmon prialarm
event-entry1: Index of the event entry that corresponds to the upper threshold, in
the range of 0 to 65535.
event-entry2: Index of the event entry that corresponds to the lower threshold, in
the range of 0 to 65535.
owner text: Specifies the owner of the alarm entry, a string comprising 1 to 127
characters.
Description Use the rmon prialarm command to create an extended entry in an extended
RMON alarm table.
Use the undo rmon prialarm command to remove a specified extended alarm
entry.
n ■ Before adding an extended alarm entry, you need to use the rmon event
command to define the events to be referenced by the entry.
■ Make sure the node to be monitored exists before executing the rmon event
command.
■ You can define up to 50 extended alarm entries.
With an extended alarm entry defined in an extended alarm group, the network
devices perform the following operations accordingly:
Comparison Operation
The operation result is larger than or equal to Triggering the event identified by the
the set upper threshold (threshold-value1) event-entry1 argument
The operation result is smaller than or equal Triggering the event identified by the
to the set lower threshold (threshold-value2) event-entry2 argument
# Remove the extended alarm entry numbered 2 from the extended alarm table.
rmon statistics
owner text: Specifies the owner of the entry, a string comprising 1 to 127
characters.
Description Use the rmon statistics command to add an entry to the statistics table.
Use the undo rmon statistics command to remove an entry from the statistics
table.
rmon statistics 907
The RMON statistics management function is used to take statistics of the usage
of the monitored ports and errors occurred to them. The statistics includes the
number of the following items: collisions, packet with CRC errors, undersize (or
oversize) packets, broadcast and multicast packets, received packets and bytes and
so on.
n For each port, only one RMON alarm table entry can be created, that is to say, if
one RMON alarm table entry was already created for a given port, creation of
another entry with a different index number for the same port will not succeed.
You can use the display rmon statistics command to display the statistics
entries.
Example # Add the statistics entry numbered 20 to take statistics of Ethernet2/0/1 port.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750]interface Ethernet 2/0/1
[SW7750-Ethernet2/0/1] rmon statistics 20
908 CHAPTER 69: RMON CONFIGURATION COMMANDS
NTP CONFIGURATION COMMANDS
70
Parameter verbose: Displays the detailed information about all the sessions maintained by
the NTP service. When you configure this command without the verbose
parameter, the Ethernet switch displays the brief information about all the
sessions.
Description Use the display ntp-service sessions command to display the status of all the
sessions maintained by NTP service provided by the local device.
c CAUTION: The sessions can be created in all NTP operating modes except the NTP
server mode.
Example # Display the status of all the sessions maintained by the NTP service.
<SW7750> display ntp-service sessions
source reference stra reach poll now offset delay disper
********************************************************************
[12345]1.0.1.11 LOCAL(0) 3 377 64 16 -0.4 0.0 0.9
note: 1 source(master),2 source(peer),3 selected,4 candidate,5 configured
Parameter None
Description Use the display ntp-service status command to display the NTP service status.
Field Meaning
Service status NTP service status: enabled or disabled
Clock status: Local clock status: is not synchronized to any remote NTP server
unsynchronized
Clock stratum Indicates the NTP stratum of the local clock
Reference clock ID Indicates the address of a remote server or the clock source ID when
the local system is synchronized with a remote NTP server or a clock
source
Nominal frequency Nominal frequency of the local system hardware clock
Actual frequency Actual frequency of the local system hardware clock
Clock precision Precision of the local clock
Clock offset Time difference between Offset of the local clock to the NTP server
clock
Root delay Total delay from local device to the master reference clock
Root dispersion Dispersion of the local clock relative to the NTP server clock
Peer dispersion Dispersion of the remote NTP server
Reference time Reference timestamp
Parameter None
Description Use the display ntp-service trace command to display the brief information
about every NTP server on the way from the local device to the reference clock
source.
ntp-service access
synchronization: Only allows the peer device to synchronize its clock to the local
device.
server: Allows the peer device to perform synchronization and control query to
the local device but does not permit the local device to synchronize its clock to the
peer device.
peer: Full access. This level of right permits the peer device to perform
synchronization and control query to the local device and also permits the local
device to synchronize its clock to the peer device.
acl-number: The IP address access control list number, ranging from 2000 to 2999.
Description Use the ntp-service access command to set the right to access the local device
service.
Use the undo ntp-service access command to cancel the access authority
settings.
Compared with authentication, setting the right to access and control the NTP
services is a basic and brief security measure. From the highest NTP service
access-control right to the lowest one are peer, server, synchronization, and
query. When a device receives an NTP request, it will perform an access control
right match and will used first matched right..
Example # Configure to permit the remote switch defined in ACL 2000 to perform time
synchronization request, query and synchronization to the local device..
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service access peer 2000
# Configure to permit the remote switch defined in ACL 2000 to perform time
synchronization request and query to the local device.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service access synchronization 2000
912 CHAPTER 70: NTP CONFIGURATION COMMANDS
Parameter None
ntp-service authentication-keyid
ntp-service broadcast-client
Parameter None
Designate an interface on the local device to receive NTP broadcast packets. The
local device operates in broadcast client mode. The local device listens to the
broadcast packets from the server. When it receives the first broadcast packet, it
starts a brief client/server mode to exchange messages with a remote server for
estimating the network delay. Thereafter, the local device enters broadcast client
mode and continues listening to the broadcast packets and synchronizes the local
clock based on the arrived broadcast packets.
ntp-service broadcast-server
Designate an interface on the local device to broadcast NTP packets. The local
device runs in broadcast-server mode and regularly broadcasts packets to its
clients.
ntp-service disable
Parameter None
Description Use the ntp-service disable command to disable the NTP service function.
Parameter None
ntp-service max-dynamic-sessions
Parameter number: The maximum number of sessions that can be created locally, ranging
from 0 to 100.
n Only the sessions created in NTP peer mode, NTP broadcast client mode and NTP
multicast client mode are dynamic sessions. Other sessions are static sessions.
ntp-service multicast-client
Description Use the ntp-service multicast-client command to configure the NTP multicast
client mode.
Designate an interface on the local device to receive NTP multicast packets. The
local device operates in the multicast client mode. The local device listens to the
multicast packets from the server. When it receives the first multicast packet, it
starts a brief client/server mode to exchange messages with a remote server for
estimating the network delay. Thereafter, the local device enters the multicast
client mode and continues listening to the multicast packets and synchronizes the
local clock based on the arrived multicast message.
Example # Configure to receive NTP multicast packets to the multicast group address of
224.0.1.1 through Vlan-interface1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-Interface1] ntp-service multicast-client 224.0.1.1
ntp-service multicast-server
Designate an interface on the local device to transmit NTP multicast packets. The
local device operates in multicast-server mode and multicasts packets regularly to
its clients.
Example # Configure to transmit NTP multicast packets encrypted with Key 4 through
VLAN-interface 1 at 224.0.1.1 and use NTP version 3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface vlan-interface 1
[SW7750-Vlan-Interface1] ntp-service multicast-server 224.0.1.1 authentication-keyid 4 version 3
ntp-service refclock-master
Parameter ip-address: Specifies the reference clock IP address as 127.127.1.u. Here, u ranges
from 0 to 3.
stratum: Specifies which stratum the local clock is located at. The value ranges
from 1 to 15.
Use the undo ntp-service refclock-master command to cancel the NTP master
clock settings.
You can use this command to designate an external reference clock or the local
clock as an NTP master clock to provide synchronized time to other devices.
ip-address specifies the IP address of an external clock as 127.127.1.u. If no IP
address is specified, the local clock is configured as the NTP master clock by
default. You can also specify the stratum at which the NTP master clock is located.
918 CHAPTER 70: NTP CONFIGURATION COMMANDS
Example # Specify the local clock as the NTP master clock to provide synchronized time for
its peers and locate the master clock at stratum 3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service refclock-master 3
When you enable the authentication, you can use this command to configure one
or more than one reliable keys. In this case, a client only synchronizes to the server
that provides reliable keys.
Example # Enable NTP authentication, adopt MD5 encryption, and designate Key 37
BetterKey and configure it as a reliable key.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service authentication enable
[SW7750] ntp-service authentication-keyid 37 authentication-mode md5 BetterKey
[SW7750] ntp-service reliable authentication-keyid 37
ntp-service source-interface
You can use this command to designate an interface of which the IP address will
be the source IP address in all the NTP packets sent by the local device so that the
remote device sends the response message to this interface only.
Example # Configure all the outgoing NTP packets to use the IP address of Vlan-Interface1
as their source IP address.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service source-interface Vlan-Interface 1
ntp-service unicast-peer
keyid: Key ID used for transmitting messages to a remote server, ranging from 1 to
4,294,967,295.
Description Use the ntp-service unicast-peer command to configure NTP peer mode.
Use the undo ntp-service unicast-peer command to cancel NTP peer mode.
By default, no NTP peer mode is configured. When you do not specify a version
number, the default version number is 3. When you do not specify
authentication-keyid, authentication is disabled and the local server is not the
first choice.
This command sets the remote server at ip-address as a peer of the local device,
which operates in symmetric active mode. ip-address specifies a host address
other than a broadcast address, multicast address, or the IP address of a reference
clock. Under this configuration, a local device can synchronize and be
synchronized by a remote server.
ntp-service unicast-server
keyid: Key ID used for transmitting messages to a remote server, ranging from 1 to
4,294,967,295.
Description Use the ntp-service unicast-server command to configure NTP server mode.
Use the undo ntp-service unicast-server command to disable NTP server mode.
By default, no NTP server mode is configured. When you do not specify a version
number, the default version number is 3. When you do not specify
authentication-keyid, authentication is disabled.
The command announces to use the remote server at ip-address as the local time
server. ip-address specifies a host address other than a broadcast address,
multicast address, or the IP address of a reference clock. By operating in client
mode, a local device can be synchronized by a remote server, but not synchronize
any remote server.
Example # Designate the server at 128.108.22.44 to synchronize the local device and use
NTP version 3.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ntp-service unicast-server 128.108.22.44 version 3
922 CHAPTER 70: NTP CONFIGURATION COMMANDS
SSH SERVER CONFIGURATION
71 COMMANDS
Parameter None
Description Use the display rsa local-key-pair public command to display the public key
of the host key pair (3Com_Host) and the public key of the server key pair
(3Com_Server).
Example # Display the public keys of the server key pair and host key pair.
<SW7750> display rsa local-key-pair public
=====================================================
Time of Key pair created: 16:51:29 2006/04/27
Key name: 3Com_Host
Key type: RSA encryption Key
=====================================================
Key code:
3047
0240
E4B60800 48C19975 3D912FCE 0BBEA711 3E4B94D0
E8E6A080 F4D5D2DA 4BCBAF07 B9F91198 FE9937C6
EE0C7AEE 1B8C06F0 8BF01F36 05CF26DB F789A2D8
23182ECB
0203
010001
=====================================================
Time of Key pair created: 16:51:55 2006/04/27
Key name: 3Com_Server
Key type: RSA encryption Key
=====================================================
Key code:
3067
0260
E1D3BAFE 5E646CF2 241602A1 2FF9AF7F 4AE5A7DE
02894012 1A733A4B 3ABA2F65 DB8CE292 644BB45C
2613F773 BC67C912 DCDACBF6 11DF66CA B48A9F0F
97886142 DB845B18 9C956B16 76D7C8BC 7E355894
CC2854F0 0D29376C 5F30F7A5 98A64CAD
0203
010001
Parameter brief: Displays brief information about all peer public keys.
Description Use the display rsa peer-public-key command to display information about
the peer public keys. If no key name is specified, the command displays detailed
information about all peer public keys.
Description Use the display ssh server command to display the status or session
information about the SSH server.
Field Description
4) Conn 5) Number of VTY interface used for user login
6) Ver 7) SSH version
8) Encry 9) Encryption algorithm used by SSH. Encry is short for encryption. The
encryption algorithms in common use are advanced encryption standard
(AES), data encryption standard (DES), and triple DES (3DES).
10) State 11) Current state
12) Retry 13) Number of retries
14) SerType 15) Type of service
16) Username 17) User name
926 CHAPTER 71: SSH SERVER CONFIGURATION COMMANDS
Description Use the display ssh user-information command to display information about
the current SSH users, including user name, authentication mode, corresponding
public key name and authorized service types. If the username is specified, the
command displays information about the specified user.
peer-public-key end
Parameter None
Description Use the peer-public-key end command to return to system view from public key
view.
protocol inbound
Description Use the protocol inbound command to configure the protocols supported in
the current user interface.
c CAUTION:
■ When SSH protocol is specified, to ensure a successful login, you must
configure the AAA authentication using the authentication-mode scheme
command.
■ The protocol inbound ssh configuration fails if you configured
authentication-mode password or authentication-mode none. When
you configured SSH protocol successfully for the user interface, then you
cannot configure authentication-mode password or
authentication-mode none any more.
public-key-code begin
Parameter None
Description Use the public-key-code begin command to enter public key edit view and
input the client public key.
You can key in a blank space between characters (since the system can remove the
blank space automatically), or press <Enter> to continue your input at the next
line. But the public key, which is generated randomly by the SSH-supporting client
software, should be composed of hexadecimal characters.
Example # Enter public key edit view and input client public keys.
928 CHAPTER 71: SSH SERVER CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rsa peer-public-key 3Com003
[SW7750-rsa-public-key] public-key-code begin
RSA key code view: return to last view with "public-key-code end".
[SW7750-rsa-key-code] 308186028180739A291ABDA704F5D93DC8FDF84C427463
[SW7750-rsa-key-code] 1991C164B0DF178C55FA833591C7D47D5381D09CE82913
[SW7750-rsa-key-code] D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4
[SW7750-rsa-key-code] 0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC
[SW7750-rsa-key-code] C48E3306367FE187BDD944018B3B69F3CBB0A573202C16
[SW7750-rsa-key-code] BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125
[SW7750-rsa-key-code] public-key-code end
[SW7750-rsa-public-key]
public-key-code end
Parameter None
Description Use the public-key-code end command to return from public key edit view to
public key view and save the public keys you set.
After you use this command to terminate the public key editing, public key validity
will be checked before the keys are saved.
■ If there are illegal characters in the keys, the prompt will be given and the keys
will be discarded. Your configuration this time fails.
■ If the keys are valid, they will be saved in the local public key list.
Example # Exit from public key edit view and save the public keys.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]rsa peer-public-key kk
[SW7750-rsa-public-key]public-key-code begin
[SW7750-rsa-key-code] public-key-code end
[SW7750-rsa-public-key]
Parameter None
rsa local-key-pair destroy 929
Description Use the rsa local-key-pair create command to generate an RSA host key pair
and an RSA server key pair.
n Note that:
■ After entering this command, you will be prompted to provide the length of
the key pair. The length of a server/host key must be in the range 512 to 2048
bits and defaults to 1024. If the key pair already exists, the system will ask you
whether you want to overwrite it.
■ The configuration of this command can survive a reboot. You only need to
configure it once.
n Server key pair (3Com_Server) is not used in SSH2.0. Therefore, when the rsa
local-key-pair create command is executed, the system only informs you that
the RSA host key pair (3Com_Host) is generated, but does not inform you of the
information about the server key pair even if the server key pair is generated in the
background for the purpose of SSH1.x compatibility. You can use the display rsa
local-key-pair public command to display the generated key pairs.
Related command: rsa local-key-pair destroy, display rsa local-key-pair public, ssh server
compatible-ssh1x enable.
Parameter None
Description Use the rsa local-key-pair destroy command to destroy all existing RSA key
pairs generated locally.
rsa peer-public-key
Description Use the rsa peer-public-key command to enter public key view.
Use the undo rsa peer-public-key command to remove the configured peer
public key.
After you input the rsa peer-public-key command, you will enter public key view.
You can use the command along with the public-key-code begin command to
configure on the server client public keys, which are generated randomly by the
SSH-supporting client software.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] undo rsa peer-public-key 192.168.0.39
% Do you really want to remove the public key named 192.168.0.39 ? [Y/N]:y
[SW7750]
file-name: Name of the public key file uploaded to the Flash in advance. This
argument is a string of 1 to 136 characters.
Description Use the rsa peer-public-key import sshkey command to import a peer public
key from the public key file.
With this command, you need not configure the public key manually. You only
need to upload the public key file of the RSA key pair of the peer to the local end
by using FTP/TFTP, and then use this command on the local end. This command will
transform the format of the public key and configure the public key automatically.
Example # Import a peer public key named 123 from public key file abc.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rsa peer-public-key 123 import sshkey abc
all: Specifies the authentication type as password or RSA public key, that is, the
user can pass the authentication if either the password or RSA public key is
correct.
Description Use the ssh server authentication-retries command to set the authentication
retry times for SSH connections.
n If you have used the ssh user authentication-type command to configure the
authentication type to password-publickey, you must set the authentication retry
times to a number greater than or equal to 2, for one is counted when a client
sends a public key to the server.
Parameter None
ssh server rekey-interval 933
Description Use the ssh server compatible-ssh1x enable command to make the server
compatible with the SSH1.x version-supporting client.
Use the undo ssh server compatible-ssh1x enable command to make the
server not compatible with the SSH1.x version-supporting client.
Example # Specify the server compatible with the SSH1.x version-supporting client.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ssh server compatible-ssh1x enable
Parameter hours: Update period of the server key, in hours, ranging from 1 to 24.
Description Use the ssh server rekey-interval command to set the update interval for the
server key.
Use the undo ssh server rekey-interval command to cancel the current
configuration.
c CAUTION: This command is only effective on users whose client version is SSH1.x.
Parameter seconds: Authentication timeout time. It is in the range of 1 to 120 (seconds) and
defaults to 60 seconds.
Description Use the ssh server timeout command to set authentication timeout time for
SSH connections.
Use the undo ssh server timeout command to restore the default timeout
time. The default value takes effect at next login.
ssh user
Use the undo ssh user command to remove the specified SSH user.
Note that: an SSH user created in this way adopts the default authentication type
if you do not use the ssh user authentication-type command to specify an
authentication type for this user.
Description Use the ssh user assign rsa-key command to assign public keys to SSH users.
Use the undo ssh user assign rsa-key command to remove the association
between the public keys and SSH users. The configuration takes effect at the next
login.
If the user already has a public key, the new public key overrides the old one.
Example # Set the client public key for the kk user to key1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ssh user kk assign rsa-key key1
all: Specifies the authentication type as either password or RSA public key. That is,
the user can pass the authentication if either the password or RSA public key is
correct.
Description Use the ssh user authentication-type command to define on the server the
available authentication type for an SSH user.
936 CHAPTER 71: SSH SERVER CONFIGURATION COMMANDS
Use the undo ssh user authentication-type command to restore the default
setting.
n This command defines available authentication type on the server. The actual
authentication type, however, is determined by the client.
By default, no authentication type is specified for new users, so they cannot access
the switch.
The new authentication type configuration takes effect at the next login.
Parameter None
Description Use the display ssh server-info command to display the association between
the server public keys configured on the client and the servers.
Example # Display the association between the server public keys and the servers.
<SW7750> display ssh server-info
Server Name(IP) Server public key name
______________________________________________________
192.168.0.1 abc_key01
192.168.0.2 abc_key02
public-key-code begin
Parameter None
Description Use the public-key-code begin command to enter public key edit view and set
server public keys.
You can key in a blank space between characters (since the system can remove the
blank space automatically), or press <Enter> to continue your input at the next
line. But the public key, which are generated randomly after you use the rsa
local-key-pair create command on the server, should be composed of
hexadecimal characters.
Example # Enter public key edit view and set server public keys.
938 CHAPTER 72: SSH CLIENT CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rsa peer-public-key 3Com003
[SW7750-rsa-public-key] public-key-code begin
RSA key code view: return to last view with "public-key-code end".
[SW7750-rsa-key-code] 308186028180739A291ABDA704F5D93DC8FDF84C427463
[SW7750-rsa-key-code] 1991C164B0DF178C55FA833591C7D47D5381D09CE82913
[SW7750-rsa-key-code] D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4
[SW7750-rsa-key-code] 0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC
[SW7750-rsa-key-code] C48E3306367FE187BDD944018B3B69F3CBB0A573202C16
[SW7750-rsa-key-code] BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125
[SW7750-rsa-key-code] public-key-code end
[SW7750-rsa-public-key]
public-key-code end
Parameter None
Description Use the public-key-code end command to return from public key edit view to
public key view and save the public keys you set.
After you use this command to terminate the public key editing, public key validity
will be checked before the keys are saved.
■ If there are illegal characters in the keys, the prompt will be given and the keys
will be discarded. Your configuration this time fails.
■ If the keys are valid, they will be saved in the client list.
Example # Exit from public key edit view and save the public keys.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rsa peer-public-key 3Com003
[SW7750-rsa-public-key] public-key-code begin
[SW7750-rsa-key-code] public-key-code end
[SW7750-rsa-public-key]
rsa peer-public-key
Description Use the rsa peer-public-key command to enter public key view.
After using this command, you will enter public key view. You can use the
command along with the public-key-code begin command to configure on the
client server public keys, which are generated randomly by using the rsa
local-key-pair create command.
<SW7750> system-view
[SW7750-rsa-public-key]
file-name: Name of the public key file uploaded to the Flash in advance. This
argument is a string of 1 to 136 characters.
Description Use the rsa peer-public-key import sshkey command to import a peer public
key from the public key file.
With this command, you need not configure the public key manually. You only
need to upload the public key file of the RSA key pair of the peer to the local end
by using FTP/TFTP, and then use this command on the local end. This command will
transform the format of the public key and configure the public key automatically.
Example # Import a peer public key named 123 from public key file abc.
940 CHAPTER 72: SSH CLIENT CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] rsa peer-public-key 123 import sshkey abc
Description Use the ssh client assign rsa-key command to specify on the client the public
key for the server to be connected to guarantee the client can be connected to a
reliable server.
Use the undo ssh client assign rsa-key command to remove the association
between the public keys and servers.
Example # Specify on the client the public key of the server (with IP address 192.168.0.1) as
abc.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ssh client 192.168.0.1 assign rsa-key abc
Parameter None
Description Use the ssh client first-time enable command to configure the client to run
the initial authentication.
Use the undo ssh client first-time command to remove the configuration.
n In the initial authentication, if the SSH client does not have the public key for the
server which it accesses for the first time, the client continues to access the server
ssh2 941
and save locally the public key of the server. Then at the next access, the client can
authenticate the server with the public key saved locally.
When the initial authentication function is not available, the client does not access
the server if it does not have the public key of the server locally. In this case, you
need first to save the public key of the target server to the client in other ways.
ssh2
port-num: Server port number. It is in the range of 0 to 65,535 and defaults to 22.
n ■
■
DES (Data Encryption Standard) is the standard algorithm for data encryption.
AES (Advanced Encryption Standard) is the advanced encryption standard
algorithm.
Description Use the ssh2 command to enable the connection between SSH client and server,
define key exchange algorithm preference, encryption algorithm preference and
HMAC algorithm preference on the server and client.
Example # Log in to the remote SSH2.0 server with IP address 10.1.1.2 and adopt the
default encryption algorithm.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ssh2 10.1.1.2
Username: 123
Trying 10.1.1.2 ...
Press CTRL+K to abort
Connected to 10.1.1.2 ...
*******************************************************************
* Copyright (c) 2004-2007 3Com Corporation *
* Without the owner’s prior written consent, *
* no decompiling or reverse-switch fabricering shall be allowed. *
*******************************************************************
<SW7750>
SFTP SERVER CONFIGURATION
73 COMMANDS
Parameter None
Description Use the sftp server enable command to enable the secure FTP (SFTP) server.
Use the undo sftp server enable command to disable the SFTP server.
Parameter username: Local user name or the user name defined on the remote RADIUS
server, a string of 1 to 80 characters.
Description Use the ssh user service-type command to specify service type for a user.
944 CHAPTER 73: SFTP SERVER CONFIGURATION COMMANDS
Use the undo ssh user service-type command to restore the default service
type for the SSH user in the system.
bye
Syntax bye
Parameter None
Description Use the bye command to terminate the connection to the remote SFTP server and
return to system view.
This command has the same function as the exit and quit commands.
cd
Syntax cd [ remote-path ]
Description Use the cd command to change the current path on the remote SFTP server. If you
did not specify the remote-path argument, the current path is displayed.
n You can use the cd.. command to return to the upper level directory.
You can use the cd / command to return to the root directory of the system.
cdup
Syntax cdup
Parameter None
Description Use the cdup command to return the current path on the remote SFTP server to
the upper directory.
delete
Parameter remote-file&<1-10>: Name of a file on the server. &<1-10> means that you can
provide up to 10 filenames, which are separated by space.
Description Use the delete command to delete the specified file from the remote SFTP server.
dir
Parameter -a: Displays the filenames or the folder names of the specified directory.
exit 947
-l: Displays in list form detailed information of the files and folder of the specified
directory.
Description Use the dir command to display the specified directory on the remote SFTP server.
With the -a and -l keyword not specified, the command displays detailed
information of files and folder under the specified directory in a list form.
With the remote-path not specified, the command displays the file and folder
information of the current working directory.
Example # Display in a list form detailed file and folder information under the current
working directory.
sftp-client> dir
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06: 52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08: 01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07: 39 pubkey1
-rwxrwxrwx 1 noone nogroup 225 Sep 28 08: 28 pub1
drwxrwxrwx 1 noone nogroup 0 Sep 28 08: 24 new1
drwxrwxrwx 1 noone nogroup 0 Sep 28 08: 18 new2
-rwxrwxrwx 1 noone nogroup 225 Sep 28 08: 30 pub2
Received status: End of file
Received status: Success
exit
Syntax exit
Parameter None
Description Use the exit command to terminate the connection to the remote SFTP server and
return to system view.
This command has the same function as the bye and quit commands.
get
Parameter remote-file: Name of the source file on the remote SFTP server.
Description Use the get command to download and save a file from a remote server.
If no local file name is specified, the name of the source file is used by default.
help
Description Use the help command to get the help information about the specified or all SFTP
client commands.
With neither the argument nor the keyword specified, the command displays a list
of all commands.
ls
Syntax ls [ -a | -l ] [ remote-path ]
Parameter -a: Displays the filenames or the folder names of the specified directory.
-l: Displays in list form detailed information of the files and folder of the specified
directory
Description Use the ls command to display file and folder information under a specified
directory.
With the -a and -l keyword not specified, the command displays detailed
information of files and folder under the specified directory in a list form.
With the remote-path not specified, the command displays the file and folder
information of the current working directory.
Example # Display in a list form detailed file and folder information under the current
working directory.
sftp-client> ls
-rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg
-rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubkey2
-rwxrwxrwx 1 noone nogroup 283 Aug 24 07:39 pubkey1
-rwxrwxrwx 1 noone nogroup 225 Sep 28 08:28 pub1
drwxrwxrwx 1 noone nogroup 0 Sep 28 08:24 new1
drwxrwxrwx 1 noone nogroup 0 Sep 28 08:18 new2
-rwxrwxrwx 1 noone nogroup 225 Sep 28 08:30 pub2
Received status: End of file
Received status: Success
mkdir
Description Use the mkdir command to create a directory on the remote SFTP server.
put
remote-file: Name assigned to the file to be saved on the remote SFTP server.
Description Use the put command to upload a local file to the remote SFTP server.
If no name is specified for the file to be saved on the remote SFTP server, the name
of the source file is used.
Example # Upload local file bb.txt to the remote SFTP server and save it with the name 1.txt.
sftp-client>put bb.txt 1.txt
pwd
Syntax pwd
Parameter None
Description Use the pwd command to display the current directory on the SFTP server.
quit
Syntax quit
Parameter None
Description Use the quit command to terminate the connection to the remote SFTP server and
exit to system view.
This command has the same function as the bye and exit commands.
remove 951
remove
Parameter remote-file&<1-10>: Name of a file on an SFTP server. &<1-10> means that you
can provide up to 10 filenames, which are separated by space.
Description Use the remove command to delete the specified file from the remote SFTP
server.
rename
Description Use the rename command to rename a specified file or directory on an SFTP
server.
rmdir
Parameter remote-path&<1-10>: Name of the directory on the remote SFTP server. &<1-10>
means that you can provide up to 10 filenames that are separated by space.
Description Use the rmdir command to delete the specified directory from the remote SFTP
server.
sftp
port-num: Port number of the server, in the range 0 to 65,535. The default port
number is 22.
Description Use the sftp command to establish a connection to the SFTP server and enter SFTP
Client view.
Example # Establish a connection to the SFTP server with IP address 10.1.1.2 and use the
default encryption algorithms.
[SW7750]sftp 10.1.1.2
Input Username: kk
Trying 10.1.1.2 ...
Press CTRL+K to abort
Connected to 10.1.1.2 ...
sftp-client>
954 CHAPTER 74: SFTP CLIENT CONFIGURATION COMMANDS
FILE SYSTEM MANAGEMENT
75 COMMANDS
n You can provide the directory argument in the following two ways in this chapter:
■ In the form of [drive] [path]. In this case, the argument can be a string
containing 1 to 64 characters.
■ By specifying the name of a storage device, such as flash:/ and cf:/.
You can provide the file-url argument in the following two ways in this chapter:
■ In the form of [drive] [path] [file name]. In this case, the argument can be a
string containing 1 to 64 characters.
■ By specifying the name of a storage device, such as flash:/ and cf:/.
cd
Syntax cd directory
Description Use the cd command to change the current directory or switch to the directory of
a specified storage device.
n Make sure the storage device is correctly installed if you want to switch to the
storage device by using this command.
Example # Change the current directory to the one named test in the flash.
<SW7750> pwd
flash:
<SW7750> cd test
<SW7750> pwd
flash:/test
<SW7750> cd cf:
<SW7750> pwd
cf:
956 CHAPTER 75: FILE SYSTEM MANAGEMENT COMMANDS
copy
Parameter fileurl-source: Path name and file name of the source file in the Flash.
fileurl-dest: Path name and file name of the destination file in the Flash.
Description Use the copy command to copy a file to a specified path with specified name.
You can use this command to copy a file in the current directory to another
directory or copy a file in a directory to the current directory. Make sure the path
and the file identified by the fileurl-source argument exist when executing this
command.
If the fileurl-dest argument identifies an existing file, the system prompts you for
the confirmation to overwrite the existing file.
Example # Display the information about the files in the current directory.
<SW7750> dir
Directory of flash:/
# Copy the file named test.txt, with the destination file name being test2.bak.
# Display the information about the files in the current directory again.
<SW7750> dir
Directory of flash:/
delete
If you execute the delete command with the /unreserved keyword specified, the
specified file is completely deleted. That is, the file cannot be restored. Otherwise,
the specified file is moved to the recycle bin and can be restored using the
undelete command.
To delete the files in the recycle bin, use the reset recycle-bin command.
c CAUTION:
■ The dir command does not display the information about the files in the
recycle bin.
■ To display the information about all the files, including those in the recycle bin,
use the dir /all command. Files in the recycle bin are marked by square
brackets "[ ]".
■ For files with the same name, the recycle bin can only hold the latest deleted
one.
Example # Delete the file named test.txt, assuming that it resides in the root directory of the
flash.
<SW7750> delete flash:/test.txt
Delete flash:/test.txt?[Y/N]:y
...
%Deleted file flash:/test.txt.
dir
Parameter /all: Displays the information about all the files, including those in the recycle bin.
file-ur: Path and the name of a file whose information is to be displayed. You can
use the * character as a wildcard in this argument. For example, the dir *.txt
958 CHAPTER 75: FILE SYSTEM MANAGEMENT COMMANDS
command displays the information about all the files with the extension of txt in
the current directory.
Description Use the dir command to display the information about the specified files or
directories in the storage devices on a switch.
# Display the information about all the files (including the files in the recycle bin) in
directory flash:/hello/.
n In the output information of the dir /all command, the names of the files in the
recycle bin are embraced in brackets.
execute
Parameter File-url: Path and the name of the batch file to be executed. A batch file has an
extension of .bat.
echo on: Displays the command line prompt character and command lines in the
batch processing file when the batch processing file is executed.
If you do not specify the echo on parameter, the device does not display the
prompt character and command lines by default.
Note that
execute 959
■ A batch file cannot contain any invisible character. Otherwise, the command
quits the execution and this process is irretrievable.
■ A syntax error in a batch file results in error messages.
■ This command cannot be executed recursively.
Example # Execute the batch file named test.bat under the directory flash:/.
<SW7750> more test.bat
quit
mkdir testdir
copy test.txt test1.txt
move flash:/test1.txt flash:/testdir
cd testdir
dir
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] execute test.bat
...
%Created dir flash:/testdir.
<SW7750>
# Execute the test.bat batch processing file under the directory flash:/ and display
the command line prompt character and command lines in the batch processing
file
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] execute test.bat echo on
[SW7750]quit
<SW7750>mkdir testdir
% Created dir testdir
<SW7750>
file prompt
Parameter alert: Prompts for confirmation before performing file-related operations that
have potential risks.
Description Use the file prompt command to set the prompt mode for file-related
operations.
If you set the prompt mode of the file-related operations to quiet, the switch does
not prompt for confirmation before performing file-related operations. In this
case, the system is more likely to operate improperly if irretrievable file-related
operations are performed.
fixdisk
For unavailable memory spaces, you can use this command to restore them.
format
Note that all the files on a storage device get lost after the storage device is
formatted. The operation is irretrievable. Moreover, the configuration files get lost
if you format the flash.
mkdir
Description Use the mkdir command to create a directory in the current directory.
Note that the names of all the directories and files in the same directory must be
unique.
Note that the specified directory must exist before you use the above command to
create a sub-directory. For example, to create the sub-directory flash:/test/mytest,
the test directory must exist.
Example # Create a directory in the current directory, with the name being dd.
<SW7750> mkdir dd
...
% Created dir flash:/dd
more
Description Use the more command to display the content of a specified file.
move
Description Use the move command to move a file to a specified directory. You can also
assign a new name for the file.
If the target file name is the name of an existing file, the system prompts you for
the confirmation to overwrite the existing file.
Example # Display the information about the files in flash:/ and flash:/hello.
<SW7750> dir
Directory of flash:/
# Display the information about the files in flash:/ and flash:/hello again.
<SW7750> dir
Directory of flash:/
pwd
Syntax pwd
Parameter None
rename
If the target file name or directory name is the same with any existing file name or
directory name, you will fail to rename the file.
Example # Display the information about the files in the current directory.
<SW7750> dir
Directory of flash:/
# Display the information about the files in the current directory again.
<SW7750>dir
Directory of flash:/
reset recycle-bin
Parameter file-url: Path and the file name of the file to be deleted.
/force: Does not prompt for the confirmation before deleting all the files in the
recycle bin.
Description Use the reset recycle-bin command to clear a specified file or all the files in the
recycle bin.
The files deleted using the delete command are actually moved to the recycle bin.
To delete them completely, you can use the reset recycle-bin command.
rmdir
As only empty directories can be deleted, you need to clear a directory before
deleting it.
umount
Parameter None
Description Use the umount cf: command to disable the CF module. After you execute this
command, you need to re-install the CF module to use it again.
n This command can be executed successfully only when the CF module is correctly
installed.
# Verify the above operation by displaying the information about the CF module.
undelete
Parameter file-url: Path and the file name of a file in the recycle bin.
Description Use the undelete command to restore a deleted file in the recycle bin.
If the name of the file to be restored is the same as that of an existing file, the
system prompts you for the confirmation to overwrite the latter.
Example # Restore the deleted file with its path and file name being flash:/hello/tt2.txt.
<SW7750> undelete flash:/hello/tt2.txt
Undelete flash:/hello/tt2.txt?[Y/N]:y
...
%Undeleted file flash:/hello/tt2.txt.
BIMS CONFIGURATION COMMANDS
76
Description Use the bims boot request command to enable the BIMS device to access the
branch intelligent management system (BIMS) center at startup.
Use the undo bims boot request command to disable the BIMS device to
access the BIMS center automatically at startup.
If a user forcibly disables the BIMS device to access the BIMS center at startup,
when the device is restarted, it will not send messages to BIMS server. Therefore
BIMS center cannot detect that the device is restarted and the waiting for restart
message will be displayed on the interface.
By default, the BIMS device accesses the BIMS center immediately at startup if the
BIMS is enabled on the device.
Example # Configure the BIMS device to access the BIMS center at startup.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims boot request
bims device-id
Parameter string: Unique identifier of the BIMS device, up to 30 characters, among which the
characters "0 to 9", "a to z", "A to Z", "-", "_", "@", and "." can be configured.
968 CHAPTER 76: BIMS CONFIGURATION COMMANDS
Description Use the bims device-id command to configure the unique identifier of the BIMS
device at the BIMS center.
Example # Set the unique identifier of the BIMS device at the BIMS center to
R2102311042W033000076.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims device-id R2102311042W033000076
bims enable
bims interval
Parameter number: Interval for accessing the BIMS center, in the range 10 to 10080 minutes.
Description Use the bims interval command to configure the interval for accessing the BIMS
center. When the interval is set to 0, the BIMS device does not access the BIMS
center regularly.
bims ip address 969
Use the undo bims interval command to delete the interval specified for
accessing the BIMS center.
Example # Set the interval for accessing the BIMS center to 120 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims interval 120
bims ip address
Description Use the bims ip address command to configure the IP address and port number
of the BIMS center.
By default, the IP address of the BIMS center is not configured. If you do not
specify a port number when configuring the IP address of the BIMS center, port 80
applies by default.
c CAUTION: The port number configured on the BIMS device must be consistent
with that configured on the BIMS center.
Example # Set the IP address and port number of the BIMS center to 129.33.72.66 and 81
respectively.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims ip address 129.33.72.66 port 81
bims request
Description Use the bims request command to have the BIMS device access the BIMS center.
bims sharekey
Parameter sharekey: Shared Key between the BIMS device and the BIMS center. It is 16 bits
long.
cipher: Displays the shared key in ciphertext. Two key configuration modes are
available:
The key in clear text is used regardless of the configuration mode selected. Thus,
you are recommended to use the clear text mode for configuration.
Description Use the bims sharekey command to configure the shared key between the BIMS
device and the BIMS center.
Use the undo bims sharekey command to delete the shared key.
By default, no shared key is configured between the BIMS device and the BIMS
center.
Example # Set the shared key between the BIMS device and the BIMS center to
1234567812345678. It is to be displayed in clear text.
bims source ip-address 971
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims sharekey simple 1234567812345678
Parameter ip-address: Source IP address in the packets sent by the BIMS device.
Description Use the bims source ip-address command to configure a source IP address for
the packets sent by the BIMS device. It can be the IP address of a port on the
device.
Use the undo bims source ip-address command to delete the source IP
address configured for the BIMS device.
By default, no source IP address is configured for the packets sent by the BIMS
device. The BIMS device and BIMS center use the source IP address configured for
communication.
bims specify-time
Parameter start-time: Start time of a period during which the device accesses the BIMS
center.
end-time: End time of a period during which the device accesses the BIMS center.
Description Use the bims specify-time command to configure the BIMS device to access the
BIMS center at the specified time and if desired, configure the device to access the
BIMS center at regular intervals from then on during a specified period.
The precision of the timer is one minute. The device will access BIMS center in one
minute after the specified time comes.
Example # Configure the router to access the BIMS center at 01:01 on December 12, 2004,
and from then on, to access the BIMS center at seven-day intervals until December
12, 2005 01:01. If the current time hasn’t reached the specified start time, after
the above configuration, the router will access the BIMS center at 01:01 on
December 12, 2004 and next time at 01:01 on December 19, 2004 after a 7*24
hours interval.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] bims specify-time 01:01 2004/12/12 01:01 2005/12/12 period 7
INFORMATION CENTER COMMANDS
77
display channel
Parameter channel-number: Channel number, ranging from 0 to 9, that is, the system has ten
channels.
Description Use the display channel command to display the settings of an information
channel.
display info-center
Parameter None
Description Use the display info-center command to display the operation status of
information center, the configuration of information channels, and the format of
time stamp.
If the information records in the current log/trap buffer are less than the buffer size
specified by a user, this command displays the actual log/trap information.
974 CHAPTER 77: INFORMATION CENTER COMMANDS
Field Description
Information Center: Information center is enabled.
Log host: Information about the log host, including its IP address, name
and number of information channel, language and level of the
log host
Console: Information about the console port, including name and
channel of its information channel
Monitor: Information about the monitor port, including name and
channel of its information channel
SNMP Agent: Information about SNMP Agent, including name and number
of its information channel
Log buffer: Information about the log buffer, including its state (enabled
or disabled), its maximum size, current size, current messages,
information channel name and number, dropped messages,
and overwritten messages
Trap buffer: Information about the trap buffer, including its state (enabled
or disabled), maximum size, current size, current messages,
channel number and name, dropped messages, and
overwritten messages
Information timestamp setting Information about time stamp setting, describing log
information, trap information, and the time stamp format of
the debugging information
display logbuffer
Parameter level severity: Specifies an information severity level. The severity argument ranges
from 1 to 8.
Table 179 Severity definitions made on the information center
size buffersize: Specifies the size of the log buffer (number of messages the log
buffer holds) you want to display. The buffersize argument ranges from 1 to 1024
and defaults to 256.
begin: Displays the log information beginning with the specified characters.
Description Use the display logbuffer command to display the state of logbuffer and the
information recorded in logbuffer.
976 CHAPTER 77: INFORMATION CENTER COMMANDS
Example # Display the state of logbuffer and the log information recorded in the logbuffer.
<SW7750> display logbuffer
Logging buffer configuration and contents:enabled
Allowed max buffer size : 1024
Actual buffer size : 512
Channel number : 4 , Channel name : logbuffer
Dropped messages : 0
Overwritten messages : 0
Current messages : 91
...... (Omitted)
Parameter Level severity: Specifies an information severity level. The severity argument
ranges from 1 to 8.
Description Use the display logbuffer summary command to display the statistics of the
log buffer.
display trapbuffer
Parameter size buffersize: Specifies the size of the trap buffer (number of messages the
buffer holds) you want to display. The buffersize argument ranges from 1 to 1024
and defaults to 256.
Description Use the display trapbuffer command to display the status of the trap buffer
and the trap information recorded in the trap buffer.
Executing the command with the size buffersize parameters will display the latest
trap records.
Example # Display the trapbuffer status and the trap information in trapbuffer.
info-center channel 977
...(Omitted)
info-center channel
Parameter channel-number: Channel number, ranging from 0 to 9, that is, system has ten
channels.
Description Use info-center channel name command to name a channel specified by the
channel-number as channel-name.
Use undo info-center channel command to restore the default channel name.
Note that the channel names must not be the same with each other.
Parameter channel-number: Channel number, ranging from 0 to 9, that is, system has ten
channels.
Description Use the info-center console channel command to configure the channel
through which the log information is output to the console.
Use the undo info-center console channel command to restore the default
channel through which the log information is output to the console.
This command takes effect only after the information center function is enabled.
info-center enable
Parameter none
Description Use the info-center enable command to enable the information center function.
Use the info-center enable command to disable the information center function.
The switch can output system information to the log host, the console, and other
destinations only when the information center function is enabled.
info-center logbuffer 979
info-center logbuffer
channel-number: Channel number, ranging from 0 to 9, that is, system has ten
channels.
size buffersize: Specifies the size of the log buffer (number of messages the buffer
holds). The buffersize argument ranges from 0 to 1024 and defaults to 512.
For special characters used in the regular expression, refer to Table 180.
Description Use the info-center logbuffer command to configure information output to the
log buffer.
By default, the system outputs information to the log buffer, which can hold 512
records.
This command takes effect only when the information center function is enabled
for the system.
980 CHAPTER 77: INFORMATION CENTER COMMANDS
Example # Send log information to log buffer and sets the size of log buffer to 50.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center logbuffer size 50
info-center loghost
channel-number: Channel number, ranging from 0 to 9, that is, system has ten
channels.
facility local-number: Specifies the logging facility of the log host, which ranges
from local0 to local7, with the corresponding value ranging from 16 to 23; and
defaults to local7, with the corresponding value being 23.
Description Use the info-center loghost command to enable information output to loghost
by setting the IP address of the loghost.
This command works only when the information center function is enabled for the
system.
Example # Configure the Ethernet switch to send information to the workstation Unix
whose IP address is 202.38.160.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center loghost 202.38.160.1
Description Use the info-center loghost source command to configure the source interface
through which information is sent to the loghost.
Use the undo info-center loghost source command to cancel the source
interface configuration.
Example # Specify source address of the packets sent to loghost as the address of the VLAN
1 interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center loghost source Vlan-interface 1
Parameter channel-number: Channel number, ranging from 0 to 9, that is, the system has ten
channels.
Description Use the info-center monitor channel command to set the channel through
which information is output to user terminals.
Use the undo info-center monitor channel command to restore the default
channel through which the information is output to user terminals.
This command takes effect only when the information center function is enabled.
Parameter channel-number: Channel number, ranging from 0 to 9, that is, the system has ten
channels.
Description Use the info-center snmp channel command to set the channel through which
information is output to the SNMP.
Use the undo info-center snmp channel command to restore the default
channel through which information is output to the SNMP.
Example # Configure the system to output information to the SNMP agent through channel
6.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center snmp channel 6
info-center source 983
info-center source
Parameter modu-name: Module name. Refer to Table 181 for the detail.
Table 181 Modules generating the information
severity: Information severity level. The information below this level will not be
output.
The default information level of each channel is shown in the following table.
986 CHAPTER 77: INFORMATION CENTER COMMANDS
The default information state of each channel is shown in the following table.
Description Use the info-center source command to specify the information source in the
information center and the output direction.
This command can be used for filtering of log, trap or debugging information. For
example, it can control information output from the IP module to any direction.
You can configure to output information with severity higher than "warning" to
the log host, and information with severity higher than "informational" to the log
buffer. You can also configure to output trap information to the log host at the
same time.
info-center timestamp 987
In addition, each information channel has a default record with the module name
"default" and module number as 0xffff0000. However, for different information
channel, the default log, trap and debugging settings in the records may be
different with one another. Use default configuration record if a module does not
have any specific configuration record in the channel.
Example # Enable the log information of VLAN module in SNMP channel and allow the
output of the information with a level higher than emergencies.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center source vlan channel snmp log level emergencies
info-center timestamp
boot: Specifies to adopt the time elapsed since system boot, which is in the
format of "xxxxxx.yyyyyy", where xxxxxx is the high 32 bits and yyyyyy the low 32
bits of the elapsed milliseconds.
date: Specifies to adopt the current system date and time, which is in format
"yyyy/mm/dd-hh:mm:ss:ms" for Chinese environment and "Mmm dd
hh:mm:ss:ms yyyy" for English environment.
Description Use the info-center timestamp command to configure the timestamp output
format in debugging/trap information.
Use the undo info-center timestamp command to restore the default settings.
By default, the date time stamp is adopted for all types of information.
info-center trapbuffer
buffersize: Size of trap buffer (numbers of messages). This argument ranges from
0 to 1,024 and defaults to 256.
channel: Sets the channel through which information is sent to the trap buffer.
channel-number: Channel number, ranging from 0 to 9, that is, the system has ten
channels.
Description Use the info-center trapbuffer command to enable information output to the
trap buffer.
This command takes effect only after the information center function is enabled.
Example # Send information to the trap buffer and sets the size of buffer to 30.
<SW7750>system-view
System View: return to User View with Ctrl+Z.
[SW7750] info-center trapbuffer size 30
reset logbuffer 989
reset logbuffer
Parameter none
Description Use the reset logbuffer command to reset information in log buffer.
reset trapbuffer
Parameter none
Description Use the reset trapbuffer command to reset information in trap buffer.
terminal debugging
Parameter none
Description Use the terminal debugging command to configure to display the debugging
information on the terminal.
Use the undo terminal debugging command to configure not to display the
debugging information on the terminal.
terminal logging
Parameter none
Description Use the terminal logging command to enable terminal log information display.
Use the undo terminal logging command to disable terminal log information
display.
By default, this function is enabled for console users and terminal users.
terminal monitor
Parameter none
By default, these functions are enabled for console users and terminal users.
This command only takes effect on the current terminal where the commands are
input. The debugging/log/trap information can be output to the current terminal,
beginning in user view. When the terminal monitor is shut down, no
debugging/log/trap information will be displayed in local terminal, which is equals
to having performed undo terminal debugging, undo terminal logging,
undo terminal trapping commands. When the terminal monitor is enabled, you
terminal trapping 991
terminal trapping
Parameter None
Description Use the terminal trapping command to enable terminal trap information
display.
display ftp-server
Parameter None
Description Use the display ftp-server command to display the FTP server-related settings of
a switch when it operates as an FTP server.
Example # Display the FTP server-related settings of the switch (assuming that the switch is
operating as an FTP server).
<SW7750> display ftp-server
FTP server is running
Max user number 1
User count 0
Timeout value(in minute) 30
Table 185 Field descriptions of the display ftp-server command
Field Description
FTP server is running The FTP server is started
Max user number 1 The FTP server can accommodate up to one user.
User count The current login user number
Timeout value (in minute) The connection idle time
display ftp-user
Parameter None
994 CHAPTER 78: FTP SERVER CONFIGURATION COMMANDS
Description Use the display ftp-user command to display the settings of the current FTP user,
including the user name, host IP address, port number, connection idle time, and
work directory.
# If the user name exceeds ten characters, characters behind the tenth will be
displayed in a new line in the left-aligning mode. Take username username@test
for example, the result is:
Parameter None
Description Use the ftp server enable command to enable the FTP server for users to log in.
Use the undo ftp server command to disable the FTP server.
ftp timeout
Parameter minutes: Connection idle time (in minutes) ranging from 1 to 35,791.
ftp timeout 995
Description Use the ftp timeout command to set the connection idle time.
Use the undo ftp timeout command to restore the default connection idle time.
If a FTP connection between an FTP server and an FTP client breaks down
abnormally and the FTP server is not acknowledged with this, the FTP server keeps
the connection as usual.
You can set a connection idle time, so that the FTP server considers a FTP
connection to be invalid and terminate it if no data exchange occurs on it in a
specific period known as connection idle time.
n ■ You need to use the ftp command to enter FTP client view for configurations
under this view. For details, refer to section “ftp” on page 1001 .
■ After you execute the commands in this section, the output information varies
with the FTP server software you use. Examples in this section are for your
reference only.
ascii
Syntax ascii
Parameter None
Description Use the ascii command to specify that files be transferred in the ASCII mode.
binary
Syntax binary
Parameter None
Description Use the binary command to specify that files be transferred in the binary mode.
bye
Syntax bye
Parameter None
Description Use the bye command to terminate the control connection and data connection
with the remote FTP server and quit to user view.
This command has the same effect as that of the quit command.
Example # Terminate the connections with the remote FTP server and return to user view.
[ftp] bye
221 Server closing.
<SW7750>
cd
Syntax cd pathname
Description Use the cd command to change the work directory on the remote FTP server.
Note that you can use this command to enter the authorized directories only.
[ftp] pwd
257 "flash:/temp" is current directory.
cdup
Syntax cdup
Parameter None
close 999
Description Use the cdup command to go to the parent directory of the current directory.
[ftp] cdup
200 CDUP command successful.
[ftp] pwd
257 "flash:" is current directory.
close
Syntax close
Parameter None
Description Use the close command to terminate an FTP connection without quitting FTP
client view.
This command has the same effect as that of the disconnect command.
Example # Terminate the FTP connection without quitting FTP client view.
[ftp] close
221 Server closing.
[ftp]
delete
dir
localfile: Name of the local file where the query result is to be saved.
Description Use the dir command to query specified files on a remote FTP server, or to display
file information in the current directory. The output information, which includes
the name, size and creation time of files, will be saved in a local file.
If you do not specify the filename argument, the information about all the files in
the current directory is displayed.
Example # Display the information about all the files in the current directory on the remote
FTP server.
[ftp] dir
200 PORT command okay
150 File Listing Follows in ASCII mode
-rwxrwxrwx 1 noone nogroup 430585 Dec 21 2005 4.app
-rwxrwxrwx 1 noone nogroup 430585 Dec 21 2005 5.app
-rwxrwxrwx 1 noone nogroup 430585 Dec 23 2005 6. app
-rwxrwxrwx 1 noone nogroup 430585 Dec 21 2005 6. app.bak
-rwxrwxrwx 1 noone nogroup 638912 Nov 15 2005 abc.BTM
drwxrwxrwx 1 noone nogroup 0 Dec 15 2005 TEST
-rwxrwxrwx 1 noone nogroup 3212176 Jul 14 2005 21.bin
226 Transfer finished successfully.
FTP: 5346 byte(s) received in 6.782 second(s) 788.00 byte(s)/sec.
# Display the information about the file named 4.app and save the output
information in the file named temp1.
disconnect
Syntax disconnect
Parameter None
ftp 1001
Description Use the disconnect command to terminate a FTP connection without quitting FTP
client view.
This command has the same effect as that of the close command.
Example # Terminate the FTP connection without quitting FTP client view.
[ftp] disconnect
221 Server closing.
[ftp]
ftp
ftp-server: Host name or the IP address of an FTP server. Note that the host name
can be a string comprising 1 to 20 characters.
port-number: Port number of the FTP server, ranging from 0 to 65535. The default
is 21.
Description Use the ftp command to establish a control connection with an FTP server and
enter FTP client view.
n The above information is output when you use the WFTPD software as the FTP
server software. The output information may be different if you use other FTP
server software.
get
Description Use the get command to download a remote file and save it as a local file.
If you do not specify the localfile argument, the downloaded file is saved using its
original name.
c CAUTION: When using the get command to download files from a remote FTP
server, make sure the number of the characters containing in the path and file
name is within the system-acceptable range
lcd
Syntax lcd
Parameter None
Description Use the lcd command to display the local work directory on the FTP client.
ls
Localfile: Name of the local file where the querying result is to be saved.
Description Use the ls command to display the name of a specified file on a remote FTP server.
This command does not support extended parameters, such as -a.
mkdir 1003
If you do not specify the remotefile argument, the names of all the files in the
current remote directory are displayed.
c CAUTION: The ls command only displays file names, while the dir command
displays file information in more detail, including file size, creation date and so on.
Example # Display the names of all the files in the current directory on the remote FTP
server.
[ftp] ls
227 Entering Passive Mode (2,2,2,2,4,9).
125 ASCII mode data connection already open, transfer starting for *.
s7500.app
test.cfg
s7500-1.app
another.bat
test
default.diag
226 Transfer complete.
FTP: 189 byte(s) received in 0.011 second(s) 17.18Kbyte(s)/sec.
mkdir
This command is available only to the FTP clients that are assigned the permission
to create directories on FTP servers.
open
port: Port number on the remote FTP server, ranging from 0 to 65535. The default
value is 21.
1004 CHAPTER 79: FTP CLIENT CONFIGURATION COMMANDS
Description Use the open command to establish a control connection with an FTP server.
Example # Establish a control connection with the FTP server whose IP address is 1.1.1.1.
[ftp]open 1.1.1.1
Trying ...
Press CTRL+K to abort
Connected.
220-
220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user
User(none):abc
331 Give me your password, please
Password:
230 Logged in successfully
passive
Syntax passive
undo passive
Parameter None
Description Use the passive command to set the data transfer mode to the passive mode.
Use the undo passive command to set the data transfer mode to the active
mode.
put
Description Use the put command to upload a local file to an FTP server.
pwd 1005
If you do not specify the remotefile argument, the local file is saved on the FTP
server using the original name.
Example # Upload the local file named temp.c to the FTP server.
[ftp] put temp.c
200 Port command okay.
150 Opening ASCII mode data connection for config.cfg.
pwd
Syntax pwd
Parameter None
Description Use the pwd command to display the work directory on an FTP server.
quit
Syntax quit
Parameter None
Description Use the quit command to terminate an FTP connection and quit to user view.
This command has the same effect as that of the bye command.
remotehelp
Description Use the remotehelp command to display the on-line help of an FTP protocol
command.
This command works only when the FTP server provides the on-line help
information about FTP protocol commands.
c CAUTION:
■ This command is always valid when a 3Com switch operates as an FTP server.
■ If you use other FTP server software, refer to related instructions to make sure
whether it provides on-line help information about FTP protocol commands.
rmdir
Note that you can only use this command to remove directories that are empty.
Example # Remove directory flash:/temp1 on the FTP server. (Assume that the directory is
empty.)
[ftp] rmdir flash:/temp1
200 RMD command successful.
user
Example # Switch to the user named tom, assuming that the corresponding password is
111.
[ftp] user tom 111
331 Give me your password, please
230 Logged in successfully
verbose
Syntax verbose
undo verbose
Parameter None
Description Use the verbose command to enable the verbose function, which displays the
execution and response information of when a command is executed.
tftp get
Description Use the tftp get command to download a file from a TFTP server to the local
switch.
Example # Download the file named abc.txt from the TFTP server whose IP address is
1.1.1.1 and save it as efg.txt.
<SW7750> tftp 1.1.1.1 get abc.txt efg.txt
File will be transferred in binary mode.
Downloading file from remote tftp server, please wait......
TFTP: 35 bytes received in 0 second(s).
File downloaded successfully.
tftp put
Description Use the tftp put command to upload a file to a specified directory on a TFTP
server.
Example # Upload the file named config.cfg to the TFTP server whose IP address is 1.1.1.1
and save it as temp.cfg.
<SW7750> tftp 1.1.1.1 put config.cfg temp.cfg
File will be transferred in binary mode.
Copying file to remote tftp server. Please wait... /
TFTP: 962 bytes sent in 0 second(s).
File uploaded successfully.
tftp-server acl
Description Use the tftp-server acl command to specify the ACL adopted for the connection
between a TFTP client and a TFTP server.
Use the undo tftp-server acl command to cancel all the ACLs adopted.
Parameter None
Description Use the display dns domain command to display the information in the DNS
suffix list.
Field Description
No. Sequence number
Domain-name Domain name suffix
Parameter None
Description Use the display dns dynamic-host command to display information about the
dynamic DNS cache.
The DNS Client saves successful DNS resolution results to the DNS cache. When
receiving a name query, the DNS Client first looks up the DNS cache for a match. If
a match is found, it returns the corresponding IP address to the user program. If
not, it sends a query to the DNS Server.
1012 CHAPTER 81: DNS CONFIGURATION COMMANDS
Field Description
No. Sequence number
Domain-name Domain name
IpAddress IP address corresponding to the domain name
TTL Time for the entry to be stored in the cache (in seconds)
Alias Alias name for the domain name, up to 4
Parameter Dynamic: Displays the DNS server information dynamically obtained by DHCP or
other protocols.
Description Use the display dns server command to display the DNS server information.
Field Description
Domain-server Sequence number of the DNS server. The system automatically
numbers the configured DNS servers starting from 0.
IpAddress IP address of the DNS server
display ip host
Parameter None
Description Use the display ip host command to display the hostnames and corresponding
IP addresses in the static DNS list.
Example # Display the hostnames and corresponding IP addresses in the static DNS list.
<SW7750> display ip host
Host Age Flags Address
My 0 static 1.1.1.1
Aa 0 static 2.2.2.4
Table 189 Field descriptions of the display ip host command
Field Description
Host Hostname
Age Time to live. It is always 0, meaning the static entries will never age out.
A static name-to-address mapping entry can only be manually removed.
Flags Type flag for the name-to-address mapping entry. It is "static" for static entries.
Address IP address of the host
dns domain
Use the undo dns domain command to delete one or all DNS suffixes.
You can configure up to 10 DNS suffixes. When using the undo dns domain
command, if you specify a DNS suffix, only the specified DNS suffix is removed,
otherwise, all statically configured suffixes are removed.
n The DNS resolution function supported by Switch 7750 should be used together
with a DNS Server. Different DNS Servers may have differences in DNS
implementation. For example, the Switch 7750 supports a domain name which
includes "_", while Windows 2000 Server may be unable to resolve the "_".
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dns domain com
dns resolve
Parameter None
Description Use the dns resolve command to enable dynamic DNS resolution.
Use the undo dns resolve command to disable dynamic DNS resolution.
dns server
Description Use the dns server command to configure a DNS server IP address.
Use the undo dns server to remove a configured DNS server IP address.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] dns server 172.16.1.1
ip host
Description Use the ip host command to add a hostname-to-IP address mapping entry in the
static DNS list.
Use the undo ip host command to remove a mapping entry from the static DNS
list.
As one hostname can mapped to only one IP address, when you add multiple
hostname-to-address mapping entries with the same hostname, only the last one
will be valid.
Example # Configure a mapping entry from the host named aaa to the IP address
10.110.0.1
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip host aaa 10.110.0.1
Parameter None
Description Use the reset dns dynamic-host command to clear the dynamic DNS cache.
clock datetime
Parameter HH:MM:SS: Current time, where HH ranges from 0 to 23, MM and SS range from
0 to 59.
YYYY/MM/DD: Current date, where YYYY is the year ranging from 2000 to 2099,
MM is the month ranging from 1 to 12, and DD is the day the range of which is
related with the month.
Description Use the clock datetime command to set the current date and time of the
Ethernet switch.
Example # Set the current date and time of the Ethernet switch to 0:0:0 2001/01/01.
<SW7750> clock datetime 0:0:0 2001/01/01
clock summer-time
one-off: Sets the summer time for only one year (the specified year).
repeating: Sets the summer time for every year starting from the specified year.
start-time start-date: Start time and start date of the summer time, in the form of
HH:MM:SS YYYY/MM/DD.
end-time end-date: End time and end date of the summer time, in the form of
HH:MM:SS YYYY/MM/DD.
start-month: Start month, the value of which is January, February, March, April,
May, June, July, August, September, October, November, and December.
start-week: Start week, the value of which is first, second, third, fourth, fifth, and
last.
start-day: Start day, the value of which is Sunday, Monday, Tuesday, Wednesday,
Thursday, Friday, and Sunday.
end-year: End year, which should be the same year as the start year, ranges from
2000 to 2099.
end-month: End month, the value of which is January, February, March, April,
May, June, July, August, September, October, November, and December.
end-week: End week, the value of which is first, second, third, fourth, fifth, and
last.
end-day: End day, the value of which is Sunday, Monday, Tuesday, Wednesday,
Thursday, Friday, Sunday.
Description Use the clock summer-time command to set the name and time range of the
summer time.
After the setting, you can use the display clock command to check the results.
The time of the log and debugging information adopts the local time that has
been adjusted by the time zone and summer time.
Example # Set the summer time named z2, which starts from 06:00:00 2002/06/08, ends
until 06:00:00 2002/09/01, and is one hour ahead of the standard time.
<SW7750> clock summer-time z2 one-off 06:00:00 2005/06/08 06:00:00 2
002/09/01 01:00:00
clock timezone 1019
# Set the summer time named z2, which starts from 06:00:00 06/08, ends until
06:00:00 09/01, and is one hour ahead of the standard time every year from 2002
on.
clock timezone
add: Sets the time zone to a time before the UTC time.
minus: Sets the time zone to a time behind the UTC time.
HH:MM:SS: Time to be subtracted from the UTC time, in the form of HH:MM:SS.
Description Use the clock timezone command to set the local time zone.
Use the undo clock timezone command to restore the local time zone to the
default UTC (universal time coordinated) time zone.
After the setting, you can use the display clock command to check the results.
The log information time and the debugging information time adopt the local
time that has been adjusted by the time zone and the summer time.
Example # Set the local time zone named z5, which is five hours ahead of the UTC time.
<SW7750> clock timezone z5 add 05:00:00
language-mode
Description Use the language-mode command to toggle between the language modes
(that is, language environments) of the command line interface (CLI) to meet your
requirement.
quit
Syntax quit
Parameter None
Description Use the quit command to return from current view to lower level view, or exit the
system if current view is user view.
The following lists the three levels of views available (from lower level to higher
level):
■ User view
■ System view
■ VLAN view, Ethernet port view, and so on
return
Syntax return
Parameter None
Description Use the return command to return from current view to user view. The composite
key <Ctrl+Z> has the same effect with the return command.
sysname 1021
sysname
undo sysname
Parameter sysname: System name of the Ethernet switch. It is a character string in length of 1
to 30 characters. By default, it is 3Com.
Description Use the sysname command to set the system name of the Ethernet switch.
Changing the system name will affect the CLI prompt. For example, if the system
name of the switch is 3Com, the prompt for user view is <SW7750>.
Use the undo sysname command to restore the default system view of the
Ethernet switch.
system-view
Syntax system-view
Parameter None
Description Use the system-view command to enter system view from user view.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750]
SYSTEM STATUS/INFORMATION
83 DISPLAY COMMANDS
display clock
Parameter None
Description Use the display clock command to display the current date and time of the
system, so that you can adjust them if they are wrong.
The maximum date and time that can be displayed by this command is 23:59:59
9999/12/31.
Field Description
18:36:31 beijing Sat 2002/02/02 Current date and time of the system
Time Zone Configured time zone information
Summer-Time Configured summer time information
display debugging
Parameter interface-type: Interface type, supported by the switch, which can be Ethernet,
GigabitEthernet, AUX, VLAN-interface and so on.
1024 CHAPTER 83: SYSTEM STATUS/INFORMATION DISPLAY COMMANDS
If you want to view the current enabled debugging, you can execute the display
debugging command. Executing this command without any parameter will
display all enabled debugging.
display version
Parameter None
Description Use the display version command to display the information (such as the
version information) about the switch system.
Specifically, you can use this command to check the software version and issue
time, the basic hardware configuration, and some other information about the
switch.
debugging
timeout interval: Sets the timeout time for all debugging, in the range of 1 to
1,440 (in minutes). After the setting, all debugging is valid in the specified period
which starts from the time when the debugging is enabled. After the period, all
debugging will be disabled.
Enabling debugging will generate a great deal of debugging information and thus
will affect the efficiency of the system, especially after enabling all debugging
through the debugging all command, the system may collapse. Therefore, it is
recommended not to use the debugging all command. The undo debugging
all command brings great convenience for you to disable all debugging at a time
instead of disabling them one by one.
display diagnostic-information
Parameter module-name: Module name. See the following table for details:
Table 191 Module name list
When the system goes wrong, you need to collect much information to locate the
fault. However, each module has its corresponding display command, which make
it difficult for you to collect all the information needed at a time. In this case, you
can use display diagnostic-information command to collect the operation
information about all or specified module. For displaying all information at a time
costs a long time and is not convenient to view, this command provides two
modes for you to collect the information
Example # Display operation information about ARP module, output the information to the
file diaginfo.txt and save the file to the Flash memory.
<SW7750 > display diagnostic-information ARP
Redirect it to file?[Y/N]y
Please input the file name(*.txt)[flash:/diaginfo.txt]:
This operation may take a few minutes, continue?[Y/N]y
terminal debugging 1029
terminal debugging
Parameter None
Description Use the terminal debugging command to enable terminal display for
debugging information.
Use the undo terminal debugging command to disable terminal display for
debugging information.
ping
Parameter -a ip-address: Sets the source IP address to send the ICMP ECHO-REQUEST
packets.
-c count: Specifies how many times the ICMP ECHO-REQUEST packet will be sent.
The count argument is the times, which ranges from 1 to 4,294,967,295 and
defaults to 5.
-h ttl: Sets the TTL (time to live) value of the echo request packets in the range of
1 to 255. By default, the TTL value is 255.
-q: Specifies to display only the statistics and not to display the details. By default,
all the information including the details and statistics will be displayed.
1032 CHAPTER 85: NETWORK CONNECTIVITY TEST COMMANDS
-r: Specifies to record the routes. By default, the system does not record any route.
-t timeout: Sets the timeout time (in ms) waiting for an ECHO-RESPONSE packet
after an ECHO-REQUEST packet is sent. The timeout argument ranges defaults to
2,000 ms.
-tos tos: Sets the ToS value of the echo request packets in the range of 0 to 255.
By default, this value is 0.
-v: Specifies to display other ICMP packets received (that is, non-ECHO-RESPONSE
packets). By default, except for the ECHO-RESPONSE packets, other ICMP packets
are not displayed.
Description Use the ping command to check the connectivity of IP network or IPX network,
and the reachability of a host.
The process of executing of the ping command in the IP network: First, the source
host sends an ICMP ECHO-REQUEST packet to the destination host. If the
connection to the destination network is normal, the destination host receives this
packet and responds with an ICMP ECHO-REPLY packet.
You can use the ping command to check the network connectivity and the quality
of a network line. This command can output the following information:
You can set a relatively long timeout time waiting for response packet if the
network transmission is slow.
tracert 1033
tracert
-f first-TTL: Sets the initial TTL of the packets to be sent, so that this command
displays the addresses of only those gateways on the path whose hop counts are
not smaller than the hop count specified by the first-TTL argument. For example, if
the first-TTL argument is three, the command displays the addresses of the
gateways from the third hop. The first-TTL argument ranges from 1 to 255 and
defaults to 1.
-m max-TTL: Sets the maximum TTL value of the packets to be sent. After the
command sends a packet with the maximum TTL, it will not send any more
packets. With this argument, this command displays the addresses of only those
gateways from the source destination to the hop count specified by the argument.
For example, if the max-TTL argument is 5, the command displays the addresses of
the gateways from the source to the fifth count. The max-TTL argument ranges
from 1 to 255 and defaults to 30.
-p port: Sets the destination port of the packets to be sent. The port argument
ranges from 0 to 65535 and defaults to 33434. Generally, you need not change
the argument.
-q num-packet: Sets the number of packets to be sent every time. The nqueries
argument ranges from 0 to 65,535 and defaults to 3.
-w timeout: Sets the timeout time to wait for ICMP error packets. The timeout
argument ranges from 0 to 65,535 and defaults to 5,000 (in milliseconds).
1034 CHAPTER 85: NETWORK CONNECTIVITY TEST COMMANDS
host: IP address of the destination host or the host name of the remote system, 1
to 30 characters long.
-m max-TTL: Sets a maximum TTL value. The max-TTL argument ranges from 1 to
255 and defaults to 30.
-n num-packet: Indicates the integral number of the sent test packets. The
num-packet argument ranges from 0 to 65535 and defaults to 3.
-t timeout: Sets the timeout time of the tracert command. The timeout argument,
in seconds, ranges from 0 to 65535 and defaults to 5.
-v: Explains the error if the response packet error occurs. If no error occurs, after
you execute the command, the result is the same as the command is executed
without -v.
Description Use the tracert command to trace the gateways the test packets passes through
during its journey from the source to the destination. This command is mainly
used to check the network connectivity. It can help you locate the trouble spot of
the network.
The executing procedure of the tracert command is as follows: First, the source
sends a packet with the TTL of 1, and the first hop device returns an ICMP error
message indicating that it cannot forward this packet because of TTL timeout.
Then, the source resends a packet with the TTL of 2, and the second hop device
also returns an ICMP TTL timeout message. This procedure goes on and on until a
packet gets to the destination or the maximum TTL is reached. During the
procedure, the system records the source address of each ICMP TTL timeout
message in order to offer the path that the packets pass through to the
destination.
If you find that the network is in trouble by using the ping command, you can use
the tracert command to find where the trouble is in the network.
The tracert command can output the IP addresses of all the gateways the packets
pass through to the destination. It output the string "***" if a gateway times out.
Example # Trace the gateways the packets pass through during its journey to the
destination with IP address 18.26.0.115.
<SW7750> tracert 18.26.0.115
tracert to allspice.lcs.mit.edu (18.26.0.115), 30 hops max, 40 bytes
packet
1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms
2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms
3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms
4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms
5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms
6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms
7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms
tracert 1035
8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms
9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms
10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms
11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms
12 * * *
13 128.121.54.72 (128.121.54.72) 259 ms 499 ms 279 ms
14 * * *
15 * * *
16 * * *
17 * * *
18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms
1036 CHAPTER 85: NETWORK CONNECTIVITY TEST COMMANDS
DEVICE MANAGEMENT COMMANDS
86
boot boot-loader
Description Use the boot boot-loader command to specify the APP file that will be adopted
when the switch reboots next time.
You can use this command to specify a primary and backup boot application for a
switch. The boot process is as following:
The Boot ROM with the version not below 400 supports double applications boot.
Example # Specify the S7750.APP as the main application adopted when the active Fabric
reboots next time.
<SW7750> boot boot-loader primary S7750.APP slot 0
# Specify the S7750.APP as the main application file adopted when the standby
Fabric reboots next time.
boot bootrom
Parameter file-url: Path + name of a Boot ROM file (that is, a .btm file) in the Flash memory.
slot slot-list: Specifies the slot number list, which is provided in the format of
slot-list= { slot-number [ to slot-number ] } & <1-N>, where &<1-N> means that
you can specify up to N slot numbers or slot number ranges. For the Switch 7757,
and 7758, N is 7 and for the Switch 7754, N is 4.
Description Use the boot bootrom command to update the Boot ROM.
Example # Update the Boot ROM of the module in slot 1 of the switch using the file named
S7750.btm.
<SW7750> boot bootrom S7750.btm slot 1
Parameter slot-list: Slot number list, provided in the format of slot-list = [ slot-number [ to
slot-number ] ]&<1-N>, where &<1-N> means that you can specify up to N slot
numbers or slot number ranges. For the Switch 7757, and 7758, N is 7 and for the
Switch 7754, N is 4.
Description Use the boot bootrom default command to upgrade the Boot ROM by using
the current boot file.
Example # Use the current boot file to upgrade the Boot ROM of all service modules that
working normally.
<SW7750> boot bootrom default
Parameter None
Switch 7750s have many modules. Every module has its own Boot ROM
application. Wrongly upgrading the Boot ROM causes serious results. The validity
checking is used to avoid the above wrong operation.
display boot-loader
Parameter None
Description Use the display boot-loader command to display the APP file that is adopted
when the switch boots this time and next time.
Example # Display the APP that will be adopted when the switch reboots.
<SW7750> display boot-loader
The primary app to boot of board 0 at the next time is: flash:/ccc.a
pp
The backup app to boot of board 0 at the next time is: flash:/ddd.ap
p
The app to boot of board 0 at this time is: flash:/ccc.app
Table 192 Field descriptions of the display boot-loader command
Field Description
The primary app to boot of module 0 at Primary boot file used by the device for reboot next
the next time time
The backup app to boot of module 0 at Backup boot file used by the device for reboot next
the next time time
The app to boot of module 0 at this Boot file used by the device for boot this time
time
display cpu
Parameter slot slot-number: Specifies a slot. The CPU status of the module on the slot is
displayed.
Description Use the display cpu command to display the CPU usage of a specified switch.
Example # Display the CPU usage of the module on slot 0 of the switch.
<SW7750> display cpu slot 0
Board 0 CPU busy status:
18% in last 5 seconds
19% in last 1 minute
19% in last 5 minutes
Table 193 Field descriptions of the display cpu command
Field Description
CPU busy status Indicates that the following lines describe the CPU occupancies in
different time periods.
18% in last 5 seconds The CPU usage in the last five seconds is 18%.
19% in last 1 minute The CPU usage in the last one minute is 19%.
19% in last 5 minutes The CPU usage in the last five minutes is 19%.
display device
Syntax display device [ detail | [ shelf shelf-no ] [ frame frame-no ] [ slot slot-number ]
]
Description Use the display device command to display the information, such as the module
type and operating status, about each module (main module and sub module) of a
specified switch.
You can use this command to display the following information about each
module: slot number, sub slot number, versions of PCB, FPGA, hardware and Boot
ROM software, address learning mode, interface module type, and patch version.
display environment
Parameter none
display fan
Description Use the display fan command to view the working state of the built-in fans.
1042 CHAPTER 86: DEVICE MANAGEMENT COMMANDS
You can check whether the fans are working normally through the command.
display memory
Parameter slot slot-number Specifies a slot number, the usage state of the memory on the
slot will be displayed.
Description Use the display memory command to display the memory usage of a specified
switch.
Field Description
System Total Memory(bytes) Total memory size of the system, in unit of bytes
Total Used Memory(bytes) Used memory size of the system, in unit of bytes
Used Rate Percentage of the used memory
display power
Description Use the display power command to view the state of the power supply of the
switch.
Parameter None
Description Use the display schedule reboot command to display information about
scheduled reboot.
Description Use the display transceiver alarm interface command to display the current
alarm information of a single or all transceivers.
1044 CHAPTER 86: DEVICE MANAGEMENT COMMANDS
Table 195 shows the alarm information that may occur for the four types of
transceivers.
Field Remarks
GBIC/SFP
RX loss of signal RX signal is lost.
RX power high RX power is high.
RX power low RX power is low.
TX fault TX fault
TX bias high TX bias current is high.
TX bias low TX bias current is low.
TX power high TX power is high.
TX power low TX power is low.
Temp high Temperature is high.
Temp low Temperature is low.
Voltage high Voltage is high.
Voltage low Voltage is low.
Transceiver info I/O error Transceiver information read and write error
Transceiver info checksum error Transceiver information checksum error
Transceiver type and port Transceiver type does not match port configuration.
configuration mismatch
Transceiver type not supported by port Transceiver type is not supported on the port.
hardware
XFP
RX loss of signal RX signal is lost.
RX not ready RX is not ready
RX CDR loss of lock RX clock cannot be recovered.
RX power high RX power is high.
RX power low RX power is low.
TX not ready TX is not ready.
TX fault TX fault
TX CDR loss of lock TX clock cannot be recovered.
TX bias high TX bias current is high.
TX bias low TX bias current is low.
TX power high TX power is high.
TX power low TX power is low.
Module not ready Module is not ready.
APD supply fault APD (Avalanche Photo Diode) supply fault
TEC fault TEC (Thermoelectric Cooler) fault
Wavelength unlocked Wavelength of optical signal exceeds the
manufacturer’s tolerance.
Temp high Temperature is high.
display transceiver alarm interface 1045
Field Remarks
Temp low Temperature is low.
Voltage high Voltage is high.
Voltage low Voltage is low.
Transceiver info I/O error Transceiver information read and write error
Transceiver info checksum error Transceiver information checksum error
Transceiver type and port Transceiver type does not match port configuration.
configuration mismatch
Transceiver type not supported by port Transceiver type is not supported on the port.
hardware
XENPAK
WIS local fault WIS (WAN Interface Sublayer) local fault
Receive optical power fault Receive optical power fault
PMA/PMD receiver local fault PMA/PMD (Physical Medium Attachment/Physical
Medium Dependent) receiver local fault
PCS receive local fault PCS (Physical Coding Sublayer) receiver local fault
PHY XS receive local fault PHY XS (PHY Extended Sublayer) receive local fault
RX power high RX power is high.
RX power low RX power is low.
Laser bias current fault Laser bias current fault
Laser temperature fault Laser temperature fault
Laser output power fault Laser output power fault
TX fault TX fault
PMA/PMD receiver local fault PMA/PMD receiver local fault
PCS receive local fault PCS receive local fault
PHY XS receive local fault PHY XS receive local fault
TX bias high TX bias current is high.
TX bias low TX bias current is low.
TX power high TX power is high.
TX power low TX power is low.
Temp high Temperature is high.
Temp low Temperature is low.
Transceiver info I/O error Transceiver information read and write error
Transceiver info checksum error Transceiver information checksum error
Transceiver type and port Transceiver type does not match port configuration.
configuration mismatch
Transceiver type not supported by port Transceiver type is not supported on the port.
hardware
Field Description
transceiver current alarm information Current alarm information of the transceiver
TX fault TX fault
Description Use the display transceiver diagnosis interface command to display the
currently measured value of digital diagnosis parameters of a single or all
anti-spoofing transceivers customized by 3Com.
Examples # Display the currently measured value of digital diagnosis parameters of the
anti-spoofing pluggable optical transceiver customized by 3Com on interface
GigabitEthernet 2/0/2.
<SW7750> display transceiver diagnosis interface gigabitethernet 2/0
/2
GigabitEthernet2/0/2 transceiver diagnostic information:
Current diagnostic parameters:
Temp(°C) Voltage(V) Bias(mA) RX power(dBM) TX power(dBM)
35 3.26 6.18 -35.64 -5.17
Table 197 Field descriptions of display transceiver diagnosis interface
Field Description
transceiver diagnostic information Digital diagnosis information of the transceiver carried by
an interface
Current diagnostic parameters Current diagnostic parameters
Temp.(°C) Digital diagnosis parameter-temperature, in °C, with the
precision to 1°C.
Voltage(V) Digital diagnosis parameter-voltage, in V, with the
precision to 0.01 V.
Bias(mA) Digital diagnosis parameter-bias current, in mA, with the
precision to 0.01 mA.
RX power(dBM) Digital diagnosis parameter-RX power, in dBM, with the
precision to 0.01 dBM.
TX power(dBM) Digital diagnosis parameter-TX power, in dBM, with the
precision to 0.01 dBM.
display transceiver interface 1047
Description Use the display transceiver interface command to display main parameters of
a single or all transceivers.
Field Description
transceiver information Transceiver information of the interface
Transceiver Type Transceiver type
Connector Type Type of the connectors of the transceiver:
■ Optical connectors, including SC (SC connector,
developed by NTT) and LC (LC connector, 1.25 mm/RJ45
optical connector developed by Lucent).
■ Other connectors, including RJ-45 and CX4.
Wavelength(nm) ■ Optical transceiver: central wavelength of the laser sent,
in nm. If the transceiver supports multiple wavelengths,
every two wavelength values are separated by a comma.
■ Electrical transceiver: displayed as N/A.
Transfer distance(xx) Transfer distance, with xx representing km for single-mode
transceivers and m for other transceivers. If the transceiver
supports multiple transfer medium, every two values of the
transfer distance are separated by a comma. The
corresponding transfer medium is included in the bracket
following the transfer distance value. The following are the
transfer media:
■ 9 um: 9/125 um single-mode fiber
■ 50 um: 50/125 um multi-mode fiber
■ 62.5 um: 62.5/125 um multi-mode fiber
■ TP: Twisted pair
■ CX4: CX4 cable
1048 CHAPTER 86: DEVICE MANAGEMENT COMMANDS
Field Description
Digital Diagnostic Monitoring Whether the digital diagnosis function is supported, where:
■ YES: supported
■ NO: not supported
Vendor Name Vendor name or vendor name specified of the transceiver:
■ The anti-spoofing transceiver customized by 3Com:
3Com is displayed.
■ Other transceivers: The original vendor name is displayed.
Ordering Name ■ Ordering name of the transceiver
Description Use the display transceiver manuinfo interface command to display part of
the electrical label information of a single or all anti-spoofing pluggable
transceivers customized by 3Com.
Examples # Display part of the electrical label information of the anti-spoofing pluggable
transceiver customized by 3Com on interface GigabitEthernet 2/0/4.
<SW7750> display transceiver manuinfo interface gigabitethernet 2/0/
4
GigabitEthernet2/0/4 transceiver manufacture information:
Manu. Serial Number : 213410A0000054000251
Manufacturing Date : 2007-07-28
Vendor Name : 3Com
Table 199 Field descriptions of display transceiver manuinfo interface
Field Description
Manu. Serial Number Serial number generated during debugging
and testing
Manufacturing Date Debugging and testing date.. The date takes
the value of the system clock of the computer
that performs debugging and testing.
Vendor Name Vendor name specified, that is, 3Com.
Parameter None
Description Use the display uplink monitor command to view information about Layer 3
connectivity between the local device and the remote device.
Example # View information about Layer 3 connectivity between the local device and the
remote device.
<SW7750> display uplink monitor
UpLink monitor information
No. Dest_IP_Addr Dest_MAC_Addr Vlan Port ErrCnt Last_Err_Time
1 192.168.0.35 ----.----.---- 1 - 135 04/29 16:15:04
The above information shows there are 135 Layer 3 connectivity errors between
the local device and the remote device whose IP address is 192.168.0.35.
loadsharing enable
Parameter None
Description Use the loadsharing enable command to enable system load sharing.
Use the undo loadsharing enable command to disable system load sharing.
With system load sharing enabled, when an I/O Module receives traffic to be
cross-card forwarded, load sharing is performed between the active Fabric and the
standby Fabric.
n ■
■
Only unicast traffic supports load sharing.
Only 32Gbps and 64Gbps Switch Fabrics support load sharing.
■ Only I/O Modules of XGbus type support load sharing.
pause-protection
Pause frames, which can be utilized as packets to attack a network, are used in
traffic controlling. A switch that has pause frame protection mechanism enabled
discards the detected pause frames that are utilized to attack the network it
resides and logs these attacks in the log buffer. If the switch experiences successive
pause frame attacks, it sends messages to the console to warn users.
c CAUTION: Only A type modules support pause frame protection mechanism and
the related commands. A type modules include: 3C16860, 3C16861, LS81FS24A,
3C16858, and 3C16859.
qe monitor
With queue traffic monitoring enabled on a switch, the switch monitors the queue
traffic and relieves blocks in the output queue of its interfaces.
qe monitor errpkt 1051
The criterion used to distinguish a block is that the queue is full and the traffic of
the corresponding interface is less than the specified threshold.
qe monitor errpkt
runt: Specifies to detect error packets that are of runt type on current interface.
Error packets that are of runt type refer to frames whose data segment is less than
64 bytes without CRC errors.
Description Use the qe monitor errpkt command to configure error packets detection
function on current interface.
If the switch receives a great number of error packets, it will not be able to
send/receive packets properly. With error packets monitoring enabled, the switch
collects information about received error packets regularly. If error packets are
detected, it takes protection measures to ensure that its interfaces send/receive
packets properly.
Example # Specify to detect error packets that are of runt type on Ethernet4/0/1 interface.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 4/0/1
[SW7750-Ethernet4/0/1] qe monitor errpkt runt
Parameter interval: Specifies the interval for detecting error packets. The interval argument
ranges from 1 to 3600 (in seconds) and defaults to 5.
Description Use the qe monitor errpkt check-time command to set the interval for
detecting error packets.
If the switch receives a great number of error packets, it will not be able to
send/receive packets properly. With error packets monitoring enabled, the switch
collects information about received error packets at intervals. If error packets are
detected, it takes protection measures to ensure that its interfaces send/receive
packets properly.
qe monitor inner-bad
Description Use the qe monitor inner-bad enable command to enable error packet
monitoring on internal ports.
If detecting that an internal port receives error packets, the system clears the
queues under this port.
n ■
■
This command is applicable to type-A I/O Modules only.
Type-A I/O Modules refer to the following I/O Modules: 3C16860, 3C16861,
LS81FS24A, 3C16858, 3C16859, 3C16860, 3C16861, LS81FS24, 3C16858,
and 3C16859.
qe monitor overflow-threshold
Parameter threshold: Integer that sets the overall traffic threshold, ranging from 0 to
4294967295 (in bps).
With queue traffic monitoring enabled, the switch monitors the queue traffic and
relieves blocks in the output queue of its interfaces.
The criterion used to distinguish a block is that the queue is full and the traffic of
the corresponding interface is less than the specified threshold.
Example # Set the overall traffic threshold used in queue traffic monitoring to 90 Mbps.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] qe monitor overflow-threshold 90000000
rdram
Parameter enable: Enables rambus dynamic random access memory (RDRAM) of the device.
Description Use the rdram enable command to enable RDRAM of the device.
reboot
Description Use the reboot command to restart the whole system or the specified module.
schedule reboot at
Parameter hh:mm: Reboot time, where hh (hour) ranges from 0 to 23, and mm (minute)
ranges from 0 to 59.
yyyy/mm/dd: Reboot date, where yyyy (year) ranges from 2,000 to 2,099, mm
(month) ranges from 1 to 12, and the range of dd (day) depends on the specific
month.
Description Use the schedule reboot at command to schedule a reboot on the current
switch and set the reboot date and time.
Use the undo schedule reboot command to cancel the scheduled reboot.
n There is at most one minute defer for scheduled reboot, that is, the switch will
reboot within one minute after reaching the specified reboot date and time.
After you execute the schedule reboot at command with a future date specified,
the switch will reboot at the specified time with at most one minute delay.
After you execute the schedule reboot at command without specifying a date,
the switch will:
■ Reboot at the specified time on the current day if the specified time is later
than the current time.
schedule reboot delay 1055
■ Reboot at the specified time on the next day if the specified time is earlier than
the current time.
Note that the specified date can not be 30 days later than the current date. And
after you execute the command, the system will prompt you to confirm. Enter "Y"
or "y" for your setting to take effect, and your setting will overwrite the old one (if
available).
If you adjust the system time by the clock command after executing the schedule
reboot at command, the schedule reboot at command will be invalid and the
scheduled reboot will not happen.
Example # Suppose the current time is16:21, schedule a reboot so that the switch reboots
at 22:00 on the current day.
<SW7750> schedule reboot at 22:00
Reboot system at 22:00 2005/04/06(in 5 hours and 39 minutes)
confirm?[Y/N]:y
<SW7750>
%Apr 6 16:21:03 2005 S7758 CMD/5/REBOOT:
aux0: schedule reboot parameters at 16:21:00 2005/04/06. And system
will reboot
at 22:00:2005 04/06/2005.
Parameter hhh:mm: Reboot waiting delay, in the format of "hour:minute". hh ranges from 0
to 720, and mm ranges from 0 to 59.
Description Use the schedule reboot delay command to schedule a reboot on the switch,
and set the reboot waiting delay.
Use the undo schedule reboot command to cancel the scheduled reboot.
n There is at most one minute defer for scheduled reboot, that is, the switch will
reboot within one minute after waiting for the specified delay.
You can set the reboot waiting delay in two formats: the hour:minute format and
the absolute minutes format, and both must be less than or equal to 30 × 24 × 60
(that is, 30 days).
1056 CHAPTER 86: DEVICE MANAGEMENT COMMANDS
After you execute the command, the system will prompt you to confirm. Enter
"Y" or "y" for your setting to take effect. Your setting will overwrite the old one
(if available).
If you adjust the system time by the clock command after executing the schedule
reboot delay command, the schedule reboot delay command will be invalid
and the scheduled reboot will not happen.
Related command: reboot, schedule reboot at, undo schedule reboot at, and display schedule
reboot.
Example # Suppose the current time is 16:26, schedule a reboot so that the switch reboots
after 88 minutes.
<SW7750> schedule reboot delay 88
Reboot system at 17:54 2005/04/06(in 1 hours and 28 minutes)
confirm?[Y/N]:y
<SW7750>
%Apr 6 16:26:38 2005 S7758 CMD/5/REBOOT:
aux0: schedule reboot parameters at 16:26:34 2005/04/06. And system will reboot
at 17:54:2005 04/06/2005.
Parameter None
Description Use the set backboard enhance command to set the running mode of
cross-card HG clock to enhanced mode (frequency: 187MHz).
Use the undo set backboard enhance command to restore the default running
mode of cross-card HG clock, that is, standard mode (frequency: 127 MHz).
Example # Set the running mode of the HG clock between LS81GT48B and LS81VSNP
modules to enhanced mode.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] set backboard enhance
temperature-limit
up-value: Upper temperature limit, in centigrade, ranging from 20 to 90, and must
be greater than the down-value.
Example # Set the lower temperature limit of module 0 to 10, and upper temperature limit
to 75.
<SW7750> temperature-limit 0 10 75
Success temperature limit set successfully
uplink monitor
Parameter ip-address: IP address of a interface on the Layer 3 device in the remote peer. The
interface connects with the local device.
Description Use the uplink monitor ip command to enable the Layer 3 connectivity
detection function on the current port, and specify the IP address to be detected,
that is the IP address of the interface on the remote device that connects with the
local device.
Use the undo uplink monitor ip to disable the Layer 3 connectivity detection
function.
n This function requires no Layer 3 device existing between the local peer and the
remote peer.
Example # Enable Layer 3 connectivity detection function on Ethernet4/0/1, and specify the
IP address to be detected as 1.1.1.1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 4/0/1
[SW7750-Ethernet4/0/1] uplink monitor ip 1.1.1.1
1058 CHAPTER 86: DEVICE MANAGEMENT COMMANDS
REMOTE-PING CLIENT COMMANDS
87
count
undo count
Parameter times: Number of probes in each test. The times argument ranges from 1 to 15.
Description Use the count command to set the number of probes in each test.
For tests except jitter test, only one packet is sent in a probe. In a jitter test, you
can use the jitter-packetnum command to set the number of packets to be sent
in a probe.
datasize
undo datasize
Parameter size: Size of a test packet in bytes. The value range varies with the test types.
1060 CHAPTER 87: REMOTE-PING CLIENT COMMANDS
The packet size configuration applies to ICMP, UDP, and jitter tests only.
Description Use the datasize command to configure the size of a test packet in a test.
destination-ip
undo destination-ip
n The destination address can be an IP address or a host name in HTTP test, while in
other types of tests, it must be an IP address.
destination-port
undo destination-port
Parameter port-number: Destination port number for an remote-ping test, in the range of 1
to 65535.
Description Use the destination-port command to configure a destination port number for
an remote-ping test.
Example # Set the destination port number for a tcpprivate test to 9000.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator tcp
[7750-remote-ping-administrator-tcp] test-type tcpprivate
[7750-remote-ping-administrator-tcp] destination-port 9000
display remote-ping
Description Use the display remote-ping command to display the result of the last
remote-ping test or the history of remote-ping tests.
Example # Display the result of the test group with the administrator name being
administrator, and the operation tag being icmp.
[7750-remote-ping-administrator-icmp] display remote-ping results administrator
icmp
remote-ping entry(admin administrator, tag icmp) test result:
Destinationip address:10.2.2.2
Send operation times: 10 Receive response times: 10
Min/Max/Average Round Trip Time: 1/2/1
Square-Sum of Round Trip Time: 13
Last succeeded test time: 2004-11-25 16:28:55.0
Extend result:
SD Maximal delay: 0 DS Maximal delay: 0
Packet lost in test: 0%
Disconnect operation number:0 Operation timeout number:0
System busy operation number:0 Connection fail number:0
Operation sequence errors:0 Drop operation number:0
Other operation errors:0
Table 201 Description of the display remote-ping result command fields
Filed Description
Destination ip address Destination IP address
Send operation times Number of probes made
Receive responds times Number of received response packets
Min/Max/Average Round Trip Minimum/maximum/average round trip time
Time
Square-Sum of Round Trip Time Square sum of round trip time
Last succeeded test time Completion time of the last successful test
SD Maximal delay Maximum delay from the source to the destination
DS Maximal delay Maximum delay from the destination to the source
Packet lost in test Average packet loss ratio
Disconnect operation number Number of times the test was disconnected by the remote
end
System busy operation number Number of times the test failed because the system was
busy
Operation sequence errors Number of out-of-sequence packets received
Other operation errors Number of other errors
Operation timeout number Number of time-out occurrences in a test
Connection fail number Number of failures to connect with the remote end
Drop operation number Number of system resource allocation failures
1 1 1 0 2004-11-25 16:28:55.0
2 1 1 0 2004-11-25 16:28:55.0
3 1 1 0 2004-11-25 16:28:55.0
4 1 1 0 2004-11-25 16:28:55.0
5 1 1 0 2004-11-25 16:28:55.0
6 2 1 0 2004-11-25 16:28:55.0
7 1 1 0 2004-11-25 16:28:55.0
8 1 1 0 2004-11-25 16:28:55.0
9 1 1 0 2004-11-25 16:28:55.9
10 1 1 0 2004-11-25 16:28:55.9
Table 202 Description of the display remote-ping history command fields
Field Description
Response Round trip time in the case of a successful test, timeout time
in the case of test timeout, or 0 in the case of a test failure
(in milliseconds)
Status Test result values, including:
1: responseReceived: Response received
2: unknown: Unknown error.
3: internalError: System internal error
4: requestTimeOut: Request timed out
5: unknownDestinationAddress: Unknown destination
address
6: noRouteToTarget: Destination unreachable
7: interfaceInactiveToTarget: Interface to destination
address inactive
8: arpFailure: ARP operation failed.
9: maxConcurrentLimitReached: Maximum limit of
concurrent accesses reached
10: unableToResolveDnsName: Unable to resolve DNS
domain name
11: invalidHostAddress: Invalid host address
LasrRC Last response code received (this code is based on the
specific implementation). With ICMP echo enabled on the
system, receiving ICMP response which includes
ICMP_ECHOREPLY(0) indicates the probe succeeds. ICMP
response is often defined in a file including ip_icmp.
Time Test completion time
# Display the result of the test group with the administrator name being
administrator, and the operation tag being http.
Field Description
DNS Resolve Time Time used for a DNS resolution
HTTP Operation Time Total time used to establish an HTTP connection
DNS Resolve Min Time Minimal time used for a DNS resolution
HTTP Test Total Time Total time used for an HTTP test
DNS Resolve Max Time Maximum time used for a DNS resolution
HTTP Transmission Successful Number of successful HTTP transmissions
Times
DNS Resolve Failed Times Number of failed DNS resolutions
HTTP Transmission Failed Times Number of failed HTTP transmissions
DNS Resolve Timeout Times DNS resolution timeout times
HTTP Transmission Timeout HTTP transmission timeout times
Times
TCP Connect Time Total time used to establish a TCP connection
HTTP Operation Min Time Minimum time used to establish an HTTP connection
TCP Connect Min Time Minimum time used to establish a TCP connection
HTTP Operation Max Time Maximum time used to establish an HTTP connection
TCP Connect Max Time Maximum time used to establish a TCP connection
TCP Connect Timeout Times TCP connection timeout times
# Display the result of the test group with the administrator name being
administrator, and the operation tag being Jitter.
Field Description
RTT Number Number of received response packets
Min Positive SD Minimum positive jitter delay from the source to the
destination
Min Positive DS Minimum positive jitter delay from the destination to the
source
Max Positive SD Maximum positive jitter delay from the source to the
destination
Max Positive DS Maximum positive jitter delay from the destination to the
source
Positive SD Number Number of positive jitter delays from the source to the
destination
Positive DS Number Number of positive jitter delays from the destination to the
source
Positive SD Sum Sum of positive jitter delays from the source to the
destination
Positive DS Sum Sum of positive jitter delays from the destination to the
source
Positive SD average Average of positive jitter delays from the source to the
destination
Positive DS average Average of positive jitter delays from the destination to the
source
Positive SD Square Sum Sum of the square of positive jitter delays from the source to
the destination
Positive DS Square Sum Sum of the square of positive jitter delays from the
destination to the source
Min Negative SD Minimum absolute value of negative jitter delays from the
source to the destination
Min Negative DS Minimum absolute value of negative jitter delays from the
destination to the source
Max Negative SD Maximum absolute value of negative jitter delays from the
source to the destination
Max Negative DS Maximum absolute value of negative jitter delays from the
destination to the source
Negative SD Number Number of negative jitter delays from the source to the
destination
Negative DS Number Number of negative jitter delays from the destination to the
source
Negative SD Sum Sum of absolute values of negative jitter delays from the
source to the destination
Negative DS Sum Sum of absolute values of negative jitter delays from the
destination to the source
Negative SD average Average of negative jitter delays from the source to the
destination
1066 CHAPTER 87: REMOTE-PING CLIENT COMMANDS
Field Description
Negative DS average Average of negative jitter delays from the destination to the
source
Negative SD Square Sum Sum of the square of negative jitter delays from the source
to the destination
Negative DS Square Sum Sum of the square of negative jitter delays from the
destination to the source
SD lost packets number Number of lost packets from the source to the destination
DS lost packet number Number of lost packets from the destination to the source
Unknown result lost packet Number of lost packets for unknown reasons
number
# Display the result of the test group with the administrator name being
administrator, and the operation tag being dns.
Field Description
DNS Resolve Current Time Default time used for a DNS resolution
DNS Resolve Min Time Minimum time used for a DNS resolution
DNS Resolve Times Number of DNS resolutions
DNS Resolve Max Time Maximum time used for a DNS resolution
DNS Resolve Timeout Times DNS resolution timeout times
DNS Resolve Failed Times Number of failed DNS resolutions
n The description on a specific field is available for the test results of all types of
tests, so that not the description on the output information of all types of tests is
provided here.
dns-server
undo dns-server
1067
Description Use the dns-server command to configure the IP address of a DNS server.
Use the undo dns-server command to remove the IP address of a DNS server.
n ■
■
This command applies to DNS and HTTP tests only.
For an HTTP test, if configuring the destination address as the host name, you
must configure the IP address of the DNS server to resolve the host name into
an IP address, which is the destination IP address of this HTTP test
dns resolve-target
filename
undo filename
Use the undo filename command to remove the configured file name.
Example # Specify to transmit config.txt between remote-ping client and FTP server in an
FTP test.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator ftp
[7750-remote-ping-administrator-ftp] test-type ftp
[7750-remote-ping-administrator-ftp] filename config.txt
frequency
undo frequency
Description Use the frequency command to configure the time interval of performing
automatic tests.
If interval is configured greater than 0, the system performs automatic tests at this
interval.
1069
n ■
■
The frequency command does not apply to DHCP tests.
The frequency command supports fabric only when the test type of this test
group is ICMP. With fabric enabled, you are allowed to configure the
frequency command and use the display command to check your
configuration, but unless the test type is ICMP, your configuration does not
take effect until fabric is disabled.
ftp-operation
Parameters get: Specifies the test operation as download from the FTP server.
Description Use the ftp-operation command to configure the FTP operation mode, which can
be get and put.
history-records
undo history-records
Parameter Number: Maximum number of history records that can be saved in a test group, in
the range of 0 to 50, and 50 by default.
Description Use the history-records command to set the maximum number of history records
that can be saved in a test group.
Example # Set the maximum number of history records that can be saved to 10.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] history-records 10
http-operation
Parameters get: Specifies the test operation to be download from the HTTP server.
Description Use the http-operation command to configure the HTTP operation mode.
http-string
undo http-string
Parameters string: HTTP operation string used to specify the webpage to be accessed, in the
range 1 to 255 characters.
version: HTTP version, in the range 1 to 255 characters. At present, this argument
can only be HTTP/1.0, where HTTP must be capitalized.
Description Use the http-string command to configure the HTTP operation string and version
in an HTTP test.
Use the undo http-string command to remove the configured HTTP operation
string and version.
Example # Set the webpage to be accessed by an HTTP test as /index.htm and the HTTP
version as HTTP/1.0.
<7750> system-view
[7750] remote-ping administrator http
[7750-remote-ping-administrator-http] test-type http
[7750-remote-ping-administrator-http] http-string /index.htm
HTTP/1.0
remote-ping
Description Use the remote-ping command to create an remote-ping test group and enter
remote-ping test group view. If the specified remote-ping test group already exists,
this command leads you to remote-ping test group view directly.
remote-ping-agent
enable
Parameters None
Description Use the remote-ping-agent enable command to enable the remote-ping client
function.
You can perform tests only after you enable the remote-ping client function.
jitter-interval
undo jitter-interval
Parameter interval: Interval in milliseconds between jitter test packets. The value is in the
range of 10 to 1000.
Description Use the jitter-interval command to configure the interval between sending jitter
test packets.
1073
Example # Set the interval between sending jitter test packets to 30 milliseconds.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator jitter
[7750-remote-ping-administrator-jitter] test-type jitter
[7750-remote-ping-administrator-jitter] jitter-interval 30
jitter-packetnum
undo jitter-packetnum
Parameter number: Number of packets to be transmitted in one probe for a jitter test, in the
range of 10 to 100.
password
undo password
Description Use the password command to configure a password for logging in to the FTP
server.
By default, the password for logging in to the FTP server is not configured.
Example # Set the password for logging into the FTP server as remote-ping in an FTP test.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator ftp
[7750-remote-ping-administrator-ftp] test-type ftp
[7750-remote-ping-administrator-ftp] password remote-ping
probe-failtimes
undo probe-failtimes
Description Use the probe-failtimes command to configure the number of consecutive times
the probe fails before the switch sends out a trap message.
By default, the switch sends a trap about probe failure each time when a probe
fails.
1075
Example # Configure the switch to send a trap after the probe in an ICMP test fails for three
consecutive times.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] probe-failtimes 3
send-trap
source-interface
undo source-interface
Description For ICMP tests, use the source-interface command to specify a source interface
for sending ICMP requests. The corresponding IP address of the specified interface
1076 CHAPTER 87: REMOTE-PING CLIENT COMMANDS
is used as the source IP address of ICMP requests. For DHCP tests, use the
source-interface command to specify an interface for DHCP probes.
For ICMP tests, use the undo source-interface command to remove the specified
source interface, and its corresponding IP address is no longer used as the source
IP address of ICMP requests. For DHCP tests, use the undo source-interface
command to remove the specified interface for DHCP probes.
n ■ For DHCP tests, this command is required. For ICMP tests, this command is
optional. This command does not apply to other tests.
■ For ICMP tests, if a source IP address has been configured with the source-ip
command, the source-interface command cannot change the configured IP
address.
■ The interface to be specified in this command can be only a VLAN interface.
■ The interface to be specified must be Up; otherwise the test will fail.
Example # Configure the source interface that sends test packets in DHCP tests as
VLAN-interface 1.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator dhcp
[7750-remote-ping-administrator-dhcp] test-type dhcp
[7750-remote-ping-administrator-dhcp] source-interface Vlan-interface 1
source-ip
undo source-ip
Description Use the source-ip command to configure the source IP address for the test.
Use the undo source-ip command to remove the configured source IP address.
By default, the IP address of the interface that sends test packets serves as the
source IP address.
n ■ For FTP tests, this command is required. This command does not apply to DHCP
tests. For other tests, this command is optional.
■ The specified source IP address by this command cannot be of an interface on a
remote device, and the interface must be Up; otherwise the test will fail.
Example # Configure the source IP address as 169.254.10.2 for this ICMP test.
1077
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] source-ip 169.254.10.2
source-port
undo source-port
Description Use the source-port command to configure the source port number for this test.
Use the undo source-port command to remove the configured source port
number.
n This command does not apply to ICMP, DHCP, and DNS tests.
Example # Configure the source port number as 8000 for this ICMP test.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] source-port 8000
test-type
test-enable
Syntax test-enable
undo test-enable
Parameters None
n The result of the remote-ping test cannot be displayed automatically, and you
need to use the display remote-ping command to display the test result.
Example # Perform a remote-ping test on an ICMP test group with the administrator name
and operation tag being administrator and icmp respectively.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] destination-ip 169.254.10.3
[7750-remote-ping-administrator-icmp] test-enable
test-failtimes
undo test-failtimes
1079
Parameter times: Number of times of consecutive test failure, in the range of 1 to 15.
Description Use the test-failtimes command to configure the number of consecutive times a
remote-ping test fails before the switch sends out a trap message.
By default, the switch sends a trap about test failure each time when a test fails.
Example # Configure the switch to send out a trap message after an ICMP test fails for
three consecutive times.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] test-failtimes 3
timeout
undo timeout
Parameter time: Timeout time for one probe, in the range of 1 to 60, in seconds.
Description Use the timeout command to set the timeout time for a probe. That is, the value
of the probe timer that is started after the remote-ping client sends out a test
packet.
Example # Set the timeout time for one probe in an ICMP test to 10 seconds.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] timeout 10
tos
undo tos
1080 CHAPTER 87: REMOTE-PING CLIENT COMMANDS
Parameter value: ToS value in a remote-ping test packet header, in the range of 0 to 255.
Description Use the tos command to configure the ToS value in a remote-ping test packet
header.
Use the undo tos command to remove the ToS value in a remote-ping test packet
header.
Example # Set the ToS value in the header of an ICMP test packet to 1.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping administrator icmp
[7750-remote-ping-administrator-icmp] test-type icmp
[7750-remote-ping-administrator-icmp] tos 1
username
undo username
Description Use the username command to configure a username for logging in to the FTP
server.
Example # Configure the username for logging into the FTP server in an FTP test as
administrator.
<7750> system-view
System View: return to User View with Ctrl+Z
1081
n ■
■
A remote-ping server is required for only jitter, TCP, and UDP tests.
You are not recommended to configure remote-ping jitter/UDP/TCP servers on
ports 1 through 1023 (well-known ports); otherwise, remote-ping probes may
fail or the services corresponding to these ports may be unavailable.
remote-ping-server
enable
Parameters None
Description Use the remote-ping-server enable command to enable the remote-ping server
function.
remote-ping-server
tcpconnect
Parameters ip-address: IP address from which a remote-ping server performs TCP listening.
port-number: Port from which a remote-ping server performs TCP listening. The
value ranges from 1 to 65535. Note that the ports with a number greater than
50000 or some special ports (that is, those used for fixed functions, such as port
1701) cannot be configured.
c CAUTION: The port number used by remote-ping server for TCP listening cannot
be set to a number greater than 50000 or to some special port numbers that are
for fixed functions, such as 1701.
Example # Enable TCP listening, using 169.254.10.2 as the IP address and 9000 as the port
number.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping-server tcpconnect 169.254.10.2 9000
remote-ping-server
udpecho
Parameters ip-address: IP address from which a remote-ping server performs UDP listening.
port-number: Port from which a remote-ping server performs UDP listening. The
value ranges from 1 to 65535. Note that the ports with a number greater than
49999 or some special ports (that is, those used for fixed functions, such as port
1701) cannot be configured.
c CAUTION: The port number used by remote-ping server for UDP listening cannot
be set to a number greater than 49999 or to some special port numbers that are
for fixed functions, such as 1701.
Example # Enable UDP listening, using 169.254.10.2 as the IP address and 9000 as the port
number.
<7750> system-view
System View: return to User View with Ctrl+Z
[7750] remote-ping-server udpecho 169.254.10.2 9000
1086 CHAPTER 88: REMOTE-PING SERVER COMMANDS
RRPP CONFIGURATION COMMANDS
89
n This board is supported if you have the special order modules listed in the Switch
7750 Family Configuration Guide, in the chapter entitled “RPPP Configuration.”
control-vlan
Description Use the control-vlan command to specify the control VLAN for the RRPP domain.
You can configure the control VLAN of the primary ring. The control VLAN of the
subring is assigned by the system automatically and its ID is the control VLAN ID of
the primary ring plus 1.
A control VLAN is a special VLAN used to transfer RRPP packets. The port on each
switch for connecting the switch with the Ethernet ring belongs to the control
VLAN, and only the ports connected to the Ethernet ring can be added to the
control VLAN. It is not allowed to configure an IP address for the interface of the
control VLAN.
c CAUTION:
■ A specified control VLAN cannot be removed by using the undo vlan all
command.
■ The control VLAN of an RRPP domain cannot be a static VLAN already created
on the switch. If you configure a dynamic VLAN as the control VLAN of an
RRPP domain, the VLAN becomes a static VLAN automatically.
■ You are not recommended to configure a VLAN as both an RRPP control VLAN
and a remote-probe VLAN. (Refer to remote-probe vlan on page 814.)
■ You are not recommended to configure a VLAN as both an RRPP control VLAN
and an isolate-user-VLAN/sub VLAN. (Refer to “Isolate-User-VLAN
Configuration Commands” on page 131 and subvlan on page 136 for more
information.)
Example # Configure VLAN 100 as the control VLAN of the RRPP domain 1.
1088 CHAPTER 89: RRPP CONFIGURATION COMMANDS
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] control-vlan 100
Parameter None
Description Use the display rrpp brief command to display the brief information of all RRPP
domains configured on the switch, including the RRPP enable state, RRPP domain
configuration, and Ethernet rings in the domains.
Domain Index : 2
Control Vlan : major 2003 sub 2004
Hello Timer : 1 sec Fail Timer : 3 sec
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------
1 0 T GigabitEthernet 2/0/11 GigabitEthernet 2/0/12 No
Description Use the display rrpp statistics command to display the RRPP packet statistics.
display rrpp verbose 1089
Example # Display the packet statistics of primary ring 10 in RRPP domain1 (the current
switch is the master node of ring 10).
<SW7750> display rrpp statistics domain 1 ring 10
RRPP Ring : 10
Ring Level : 0
Node Mode : Master
Is Activated : No
Primary port : -
Packet LINK LINK COMMON COMPLETE Packet
Direct HEALTH UP DOWN FDB FDB Total
-------------------------------------------------------------------------
Send 0 0 0 0 0 0
Rcv 0 0 0 0 0 0
Secondary port: -
Packet LINK LINK COMMON COMPLETE Packet
Direct HEALTH UP DOWN FDB FDB Total
-------------------------------------------------------------------------
Send 0 0 0 0 0 0
Rcv 0 0 0 0 0 0
# Display the packet statistics of secondary ring 20 in RRPP domain1 (the current
switch is an edge node of secondary ring 20).
Description Use the display rrpp verbose command to display the RRPP configuration
details on the switch. If you do not specify the RRPP ring ID, the command displays
the details of all rings in the specified domain. Otherwise, the command displays
the details of the specified ring.
1090 CHAPTER 89: RRPP CONFIGURATION COMMANDS
Example # Display the details of primary ring 10 in RRPP domain 1 (the current switch is the
master node in ring 10).
<SW7750> display rrpp verbose domain 1 ring 10
Domain Index : 1
Control VLAN : major 2003 sub 2004
Hello Timer : 1 sec Fail Timer : 3 sec
RRPP Ring : 10
Ring Level : 0
Node Mode : Master
Ring State : -
Is Enabled : No Is Activated : No
Primary port : - Port status: -
Secondary port: - Port status: -
# Display the details of primary ring 10 in RRPP domain 1 (the current switch is the
transit node in ring 10).
# Display the details of secondary ring 20 in RRPP domain 1 (the current switch is
the transit node in secondary ring 20).
# Display the details of secondary ring 20 in RRPP domain 1 (the current switch is
the edge node in secondary ring 20).
Description Use the reset rrpp statistics command to clear the statistics information of the
specified RRPP domain.
If you specify the RRPP ring ID, the command clears the RRPP packet statistics
information of the specified ring in the specified domain. Otherwise, the
command clears the RRPP packet statistics information of all the rings in the
specified domain.
Example # Clear the packet statistics of ring 10 in RRPP domain 1 on the current switch.
<SW7750> reset rrpp statistics domain 1 ring 10
# Clear the packet statistics of all rings in RRPP domain 1 on the current switch.
ring
master: Defines the current switch as the master node on the Ethernet ring
network.
transit: Defines the current switch as the transit node on the Ethernet ring
network.
1092 CHAPTER 89: RRPP CONFIGURATION COMMANDS
level-value: RRPP ring level, 0 for primary ring and 1 for secondary ring.
edge: Specifies the current switch as an edge node on the Ethernet ring network.
Description Use the ring command to configure the node role for the current switch and the
port role for the port connecting to the Ethernet ring.
For an edge node or an assistant edge node, make sure you have removed the
secondary ring configuration before removing the primary ring configuration.
Node roles ■ Master node: The node that initiates loop detection and prevents data loops.
Each ring has one and only one master node.
■ Transit node: Nodes on a ring other than the master node are all transit nodes.
■ Edge node: A node on the primary ring and a secondary ring at the same time
is an edge node. An edge node serves as a transit node on a primary ring and
an edge node on a secondary ring. In an RRPP domain, a secondary ring has
two edge nodes. You must specify one of them as assistant edge node.
n In the same RRPP domain, different rings must have different Ring IDs.
Port roles Of the two ports that connect the master node and a transit node to an Ethernet
ring, one is the primary port and the other the secondary port. The port roles are
determined by user configuration.
■ The primary port and secondary port of the master node
The primary port of the master node transmits the loop detection packet, and the
secondary port of the master node receives the loop detection packet.
When an Ethernet ring is in the healthy state, the secondary port of the master
node allows only packets of control VLAN to pass, but logically blocks packets of
data VLAN.
When the Ethernet ring is in the broken state, the secondary port of the master
node stops blocking the data VLAN and begins to forwards packets of data VLAN.
■ The primary and secondary ports on a transit node are functionally the same.
■ Of the two ports connecting an edge node to a subring, one is the common
port and the other is the edge port of the node. The common port connects
ring 1093
the edge node to the primary ring and a subring at the same time. An edge
port is connected only with a subring.
n ■ RRPP and loopback test functions are mutually exclusive. You must disable the
loopback test on the primary/secondary port of the master/transit node and the
common/edge port of the edge node.
■ An aggregation port cannot be configured as a primary/secondary port of the
master/transit node and a common/edge port of the edge node.
Example # Configure the current switch as the master node on primary ring 10 in RRPP
domain 1, GigabitEthernet2/0/5 as the primary port, and GigabitEthernet 2/0/6 as
the secondary port.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 10 node-mode master primary-port GigabitE
thernet2/0/5 secondary-port GigabitEthernet 2/0/6 level 0
# Configure the current switch as the transit node on primary ring 10 in RRPP
domain 1, GigabitEthernet2/0/5 as the primary port, and GigabitEthernet 2/0/6 as
the secondary port.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 10 node-mode transit primary-port Gigabit
Ethernet2/0/5 secondary-port GigabitEthernet 2/0/6 level 0
# Configure the current switch as the master node on secondary ring 20 in RRPP
domain 1, GigabitEthernet2/0/10 as the primary port, and GigabitEthernet 2/0/11
as the secondary port.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 20 node-mode master primary-port GigabitE
thernet 0/10 secondary-port GigabitEthernet 0/11 level 1
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 20 node-mode transit primary-port Gigabit
Ethernet 2/0/10 secondary-port GigabitEthernet 2/0/11 level 1
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 20 node-mode edge common-port GigabitEthe
rnet 2/0/5 edge-port GigabitEthernet 2/0/10
1094 CHAPTER 89: RRPP CONFIGURATION COMMANDS
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] ring 20 node-mode assistant-edge common-port G
igabitEthernet 2/0/6 edge-port GigabitEthernet 2/0/11
# Remove the node role configured for the current switch on RRPP ring 10, and
the role configured for the port connecting to the Ethernet ring.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] undo ring 10 enable
[SW7750-rrpp-domain1] undo ring 10
ring enable
Description Use the ring enable command to enable an RRPP ring for the current switch.
Use the undo ring enable command to disable an RRPP ring on the current
switch.
To enable the RRPP domain of the current switch, you must enable RRPP and the
RRPP ring at the same time.
RRPP and STP are mutually exclusive on the port to prevent the possible conflict
when the RRPP and STP calculate the blocked/unblocked status of the port.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] undo ring 10 enable
rrpp domain 1095
rrpp domain
Description Use the rrpp domain command to create an RRPP domain and enter RRPP
domain view.
Before deleting an RRPP domain, make sure that no RRPP ring exists in the
domain. Otherwise, the deletion operation will fail.
<SW7750> system-view
[SW7750] undo rrpp domain 1
rrpp enable
Parameter None
Description Use the rrpp enable command to enable the RRPP protocol on the current
switch.
Use the undo rrpp enable command to disable the RRPP protocol on the current
switch.
To enable an RRPP ring of the current switch, you must enable RRPP and the RRPP
ring at the same time.
<SW7750> system-view
[SW7750] undo rrpp enable
timer
undo timer
Parameter hello-value: Time interval in seconds at which the primary port of the master node
sends the health detection packet, in the range of 1 to 10. The default value is 1
second.
fail-value: Timeout time in seconds at which the secondary port of the master
node receives the health detection packet, in the range of 3 to 30. The default
value is 3 seconds.
Description Use the timer command to configure the time values of the Hello timer and Fail
timer in the RRPP domain.
Use the undo timer command to restore the default time values.
The Fail timer value cannot be less than three times the Hello timer value.
Example # Set the time interval at which the primary port of the master node in RRPP
domain 1 sends the health detection packet to 2 seconds, and set the timeout
time for the secondary port of the master node in the RRPP domain 1 to receive
health detection packets to 7 seconds.
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] timer hello-timer 2 fail-timer 7
<SW7750> system-view
[SW7750] rrpp domain 1
[SW7750-rrpp-domain1] undo timer
NETSTREAM CONFIGURATION
90 COMMANDS
n Currently, the LS81VSNP modules installed in Switch 7750s support the Netstream
feature. In this manual, the LS81VSNP module is called I/O Module.
Description Use the display ip netstream cache command to display the Netstream
configuration and status of the Netstream cache on the I/O Module in a specified
slot.
Example # Display information about the Netstream cache of the I/O Module in slot 3.
<SW7750> display ip netstream cache slot 6
IP netstream cache information in slot 6
Stream active timeout(minute) : 30
Stream inactive timeout(second): 60
Active stream entry : 0
Stream entry been counted : 0
Last statistics reset time : none
Field Description
Stream active timeout(minute) : 30 The current active aging time is 15 minutes.
Stream inactive timeout(second): 60 The current inactive aging time is 60 seconds.
Active stream entry : 50 The Netstream cache contains 50 active stream entries.
Stream entry been counted : 0 Netstream has no stream entries.
Last statistics reset time : none The statistics have never been cleared.
Protocol, Total Streams, Packets/sec, Protocol type, total number of streams, packet per
Stream/sec, Packets/stream second, stream per second, and average number of
packets per stream.
1098 CHAPTER 90: NETSTREAM CONFIGURATION COMMANDS
Description Use the display ip netstream export command to display information about
Netstream export packets on the I/O Module in a specified slot.
Example # Display information about Netstream export packets of the I/O Module in slot 6.
<SW7750> display ip netstream export slot 6
IP netstream export information in slot 6
IP netstream is enabled in slot : 3
Version 9 export information:
Stream destination IP(UDP): 10.10.0.10 (30000)
Stream source address: 3.3.3.3
Exported stream number: 16
Exported UDP datagram number(failed number): 16(0)
Field Description
IP netstream export information Information about Netstream export packets on the I/O
in slot 6 Module in slot 6 will be followed.
IP netstream is enabled in slot : 3 Slot number of a module where Netstream is enabled
Version 9 export information: The following is information about version 9 Netstream
export packets
Stream destination IP(UDP): Destination IP address and UDP port number of Netstream
export packets
Not destination address for This information is displayed if you do not configure the
exported packet. destination IP address for Netstream export packets.
Exported stream number: Number of sent stream entries
Exported UDP datagram Number of sent UDP packets (Number of UDP packets
number(failed number): failed in sending)
Version 9 AS aggregation The following is information about version 9 Netstream
information: export packets when AS aggregation is enabled. This
information is not displayed if AS aggregation is not
enabled.
enable
Syntax enable
undo enable
ip netstream aggregation 1099
Parameter None
Description Use the enable command to enable the aggregation mode corresponding to
current aggregation view.
ip netstream aggregation
Parameter as: Specifies the view for AS (autonomous system) aggregation mode. In this
mode, the Netstream streams are classified by: source and destination AS
numbers, outbound interface index.
prefix: Specifies the view for source- and destination-prefix aggregation mode. In
this mode, the Netstream streams are classified by: source and destination AS
numbers, source and destination mask lengths, source and destination prefixes,
and outbound interface index.
1100 CHAPTER 90: NETSTREAM CONFIGURATION COMMANDS
Under the aggregation view, you can enable/disable the aggregation function in
the corresponding mode, and set the source IP address, the destination IP address
and port number for Netstream export packets in version 9 format.
Related commands: enable, ip netstream export host, and ip netstream export source.
Parameter dscp-value: Differentiated services code point (DSCP) value, ranging from 0 to 63,
with 0 as the default value.
Description Use the ip netstream export dscp command to configure the DSCP value of
Netstream export packets. Netstream export packets will be classified by their
DSCP values.
Use the undo ip netstream export dscp command to restore the default DSCP
value.
Parameter ip-address: IP address of the destination host for Netstream export packets, in
dotted decimal notation.
ip netstream export source 1101
udp-port: UDP port number of the destination host for Netstream export packets.
Description Use the ip netstream export host command to configure the IP address and
UDP port number of the destination host for Netstream export packets.
Use the undo ip netstream export host command to restore the default IP
address and port number.
By default:
You can configure different destination IP addresses and port numbers for
different aggregation modes.
Example # Configure the destination IP address and UDP port number for Netstream export
packets to 172.16.105.48 and 50000 respectively.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream export host 172.16.105.48 50000
Description Use the ip netstream export source command to configure the source IP
address of Netstream export packets, which will be used as the source address of
UDP packets.
Use the undo ip netstream export source command to restore the default
setting.
By default, the source IP address is 0.0.0.0, which indicates that the IP address of
the corresponding outbound interface is used as the source IP address.
You can configure different source IP addresses for different aggregation modes.
Parameter version-number: Version number for Netstream export packets. Currently, you can
configure version 5 or version 9.
Description Use the ip netstream export version command to configure the version and
the AS option for Netstream export packets in non-aggregation mode.
Use the undo ip netstream export version command to restore the default
configuration.
Netstream can use three versions of Netstream export packets to send aged
stream entries: version 5, version 8 and version 9. But currently, only version 5 and
version 9 are configurable:
Example # Configure to use version 5 Netstream export packets and use original AS
numbers as the AS numbers for individual IP addresses.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream export version 5 origin-as
Description Use the ip netstream inbound source command to mirror the inbound
packets on an interface module to an I/O Module and enable Netstream, a packet
statistics function.
Use the undo ip netstream inbound source command to stop the mirroring
and disable Netstream.
If the acl keyword is used in the ip netstream inbound source command, the
streams on the interface module that match the ACL will be mirrored onto the I/O
Module, which in turn collect packet statistics.
n With ACL rules, up to 100 streams can be mirrored for Netstream statistics
collection in the system.
Example # Mirror the inbound packets on the module in slot 3 to the I/O Module in slot 6
and enable Netstream.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream inbound source 3 to 6
Description Use the ip netstream outbound source command to mirror the outbound
packets on an interface module to an I/O Module and enable Netstream.
Use the undo ip netstream outbound command to stop the mirroring and
disable Netstream.
1104 CHAPTER 90: NETSTREAM CONFIGURATION COMMANDS
Example # Mirror the outbound packets on the module in slot 3 to the I/O Module in slot 6
and enable Netstream.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream outbound source 3 to 6
Parameter Packets: Threshold for the number of Netstream packets, ranging from 1 to 600,
in packets.
Use the undo ip netstream template refresh command to restore the default
packet threshold.
Example # Set the packet threshold for updating the template to 100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream template refresh 100
Parameter minutes: Active aging time for Netstream entries in minutes, in the range of 5 to
60.
Description Use the ip netstream timeout active command to configure the active aging
time for Netstream entries.
Use the undo ip netstream timeout active command to restore the default
active aging time.
A stream entry will be aged out when the active time of this stream (the time
elapsed since the stream entry was created) exceeds the time limit you set here.
Example # Configure the active aging time for Netstream entries to 60 minutes.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream timeout active 60
Parameter seconds: Inactive aging time for Netstream entries in seconds, in the range of 60
to 600.
Description Use the ip netstream timeout inactive command to configure the inactive
aging time for Netstream entries.
Use the undo ip netstream timeout inactive command to restore the default
inactive aging time.
A stream entry will be aged out when the inactive time of the stream (the time
elapsed since the last packet of the stream passed the switch) exceeds the time
limit you set here.
Example # Configure the inactive aging time for Netstream entries to 150 seconds.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] ip netstream timeout inactive 150
Description Use the reset ip netstream statistics command to clear the Netstream
statistics and output statistics on a specified I/O Module and age out all the stream
entries in the Netstream cache.
n Executing the reset ip netstream statistics command will forcibly age out the
current stream entries in the NP. This forcible aging procedure may take a long
time and stops the creation of any new entry until all current entries are aged out.
Example # Clear the Netstream statistics and age all the stream entries in the Netstream
cache on the I/O Module in slot 6.
<SW7750> reset ip netstream statistics slot 6
POLICY ROUTING CONFIGURATION
91 COMMANDS
n Currently, the LS81VSNP modules installed in Switch 7750s support the policy
routing feature. In this manual, the LS81VSNP module is called I/O Module.
Description Use the display qos-vlan traffic-redirect command to display policy routing
configuration.
Syntax
1 Redirect packets to a specified VLAN interface
rule rule: Specifies a rule in the ACL. The rule argument represents the number of
an ACL rule and ranges from 0 to 127. If rule rule is not provided, all rules in the
specified ACL will be applied.
system-index index: Specifies a system index for the specified ACL rule. The two
parameters are optional. The index argument ranges from 0 to 4,294,967,295.
When an ACL rule is applied, the system automatically assigns a system index to
the rule for search purpose. But you can also manually specify a system index for
an ACL rule when executing these commands. Generally, you are not
recommended to do so.
dscp dscp: Specifies the value of differential services code point. The dscp
argument ranges from 0 to 63 and defaults to 0. Packets can be classified by their
DSCP values.
tos tos: Specifies the value of type of service. The tos argument ranges from 0 to
15 and defaults to 0. Packets can be classified by their ToS values.
c CAUTION:
■ With ACL rules, up to 100 streams can be redirected in the system.
■ Up to 3,000 traffic-redirect inbound ip-group commands can be
configured.
■ Totally up to 3,000 traffic-redirect inbound ip-group and traffic-redirect
outbound ip-group commands can be configured.
Example # Configure to redirect the inbound packets that match ACL 2100 on I/O Module
in slot 5 to 10.13.152.1 (the next hop).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vlan 3
[SW7750-vlan3] traffic-redirect inbound ip-group 2100 next-hop 10.13
.152.1 slot 5
Syntax
1 Redirect packets to a specified VLAN interface
rule rule: Specifies a rule in the ACL. The rule argument represents the number of
an ACL rule and ranges from 0 to 127. If rule rule is not provided, all rules in the
specified ACL will be applied.
system-index index: Specifies a system index for the specified ACL rule. The two
parameters are optional. The index argument ranges from 0 to 4,294,967,295.
When an ACL rule is applied, the system automatically assigns a system index to
the rule for search purpose. But you can also manually specify a system index for
an ACL rule when executing these commands. Generally, you are not
recommended to do so.
dscp dscp: Specifies the value of differential services code point. The dscp
argument ranges from 0 to 63 and defaults to 0. Packets can be classified by their
DSCP values.
tos tos: Specifies the value of type of service. The tos argument ranges from 0 to
15 and defaults to 0. Packets can be classified by their ToS values.
c CAUTION:
■ Up to 100 ACL rule-filtered streams can be redirected in the system.
■ Up to 3,000 traffic-redirect outbound ip-group commands can be
configured.
■ Totally up to 3,000 traffic-redirect inbound ip-group and traffic-redirect
outbound ip-group commands can be configured.
traffic-redirect outbound ip-group 1111
Example # Configure to redirect the outbound packets that match ACL 2100 on the I/O
Module in slot 5 to 10.13.152.2 (the next hop).
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] vlan 3
[SW7750-vlan3] traffic-redirect outbound ip-group 2100 next-hop 10.1
3.152.2 slot 5
1112 CHAPTER 91: POLICY ROUTING CONFIGURATION COMMANDS
TELNET PROTECTION CONFIGURATION
92 COMMANDS
attack-protection
undo attack-protection
Parameter ip-address: Sets special ARP Telnet protection for the specified Layer-3 interface.
Description Use the attack-protection command to set global Telnet protection. After you
execute this command, the system protects all the Layer-3 interfaces in the Up
state.
Use the undo attack-protection ip-address command to cancel the special ARP
Telnet protection.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] attack-protection 192.168.0.1
attack-protection disable-defaultroute
Parameter None
After you enable the NAT function, You cannot configure default-routing Telnet
protection.
attack-protection icmp
Parameter ip-address: Configures to protect ICMP packets for the specified source IP address.
Before enabling ICMP protection, you need to enable ICMP protection, and then
configure global Telnet protection, special ARP Telnet protection, and
default-routing Telnet protection.
Example # Protect ICMP packets addressed from the source IP address 192.168.0.100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] attack-protection icmp 192.168.0.100
attack-protection snmp 1115
attack-protection snmp
Parameter ip-address: Configures to protect SNMP packets for the specified source IP
address.
Before enabling SNMP protection, you need to enable SNMP protection, and then
configure global Telnet protection, special ARP Telnet protection, and
default-routing Telnet protection.
Example # Protect SNMP packets addressed from the source IP address 192.168.0.100.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] attack-protection snmp 192.168.0.100
attack-protection telnet
Parameter ip-address: Configures to protect Telnet packets for the specified source IP
address.
Before enabling Telnet protection, you need to enable Telnet protection, and then
configure global Telnet protection, special ARP Telnet protection, and
default-routing Telnet protection.
Example # Protect Telnet packets addressed from the source IP address 192.168.0.100.
1116 CHAPTER 92: TELNET PROTECTION CONFIGURATION COMMANDS
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] attack-protection telnet 192.168.0.100
SMART LINK CONFIGURATION
93 COMMANDS
Parameter None
Description Use the display smart-link flush command to view the information about how
the Smart Link device processes flush messages.
Example # Display the information about how the Smart Link device processes flush
messages.
<SW7750> display smart-link flush
Flush interface :Ethernet2/0/1
Field Description
Flush interface Interface that receives the latest legal flush
message
Count of flush packets received Total number of flush messages received
Time of last flush packet received Time when the last legal flush message is received
Source MAC of last flush packet received Source MAC address in the last legal flush
message received
Device ID of last flush packet received Bridge MAC address of the device from which the
last legal flush message was received
Control VLAN ID of last flush packet Control VLAN ID in the last legal flush message
received received
n A legal fulsh message refers to the message whose control VLAN ID is consistent
with the receiving control VLAN ID configured on the receiving port.
1118 CHAPTER 93: SMART LINK CONFIGURATION COMMANDS
Description Use the display smart-link group command to display the information about
the specific Smart Link group or all the Smart Link groups.
Field Description
Member Member of the Smart Link group
Role Port role of a Smart Link group member: master or slave.
Status Port status of a Smart Link group member when the link of this member port
is up: active or standby.
Flush-count Number of sent flush messages
Last-flush-time Time when the last flush message is sent. If no flush message is sent, "NA"
will be displayed.
Description Use the flush enable control-vlan command to enable the function of sending
flush messages in the specified control VLAN.
Use the undo flush enable control-vlan command to disable the function of
sending flush messages to the specified control VLAN.
link-aggregation group
Parameter group-id: Link aggregation group ID, in the range of 1 to 384 (only link
aggregation groups configured manually or statically are available).
master: Configures the specified link aggregation group as the master port of the
Smart Link group.
slave: Configures the specified link aggregation group as the slave port of the
Smart Link group.
Use the undo link-aggregation group command to remove the specified link
aggregation group from the current Smart Link group.
n Smart Link and STP cannot be enabled on an Ethernet port at the same time.
Make sure that STP is not enabled on the port of the link aggregation group
before configuring the link aggregation group as a member of the Smart Link
group.
Example # Configure link aggregation group 8 as the slave port of Smart Link group 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] smart-link group 1
[SW7750-smlk-group1] link-aggregation group 8 slave
port
master: Configures the specified port as the master port of the Smart Link group.
slave: Configures the specified port as the slave port of the Smart Link group.
Description Use the port command to configure the specified port as a member of the Smart
Link group.
Use the undo port command to remove the specified port from the Smart Link
group.
n Smart Link and STP cannot be enabled on an Ethernet port at the same time.
Make sure that STP is not enabled on the port of the link aggregation group
before configuring the link aggregation group as a member of the Smart Link
group.
master: Configures the port as the master port of the Smart Link group.
slave: Configures the port as the slave port of the Smart Link group.
Description Use the port smart-link group command to configure the current port as a
member of the Smart Link group.
Use the undo port smart-link group command to remove the current port
from the specified Smart Link group.
configured dynamically cannot serve as a member for a Smart Link group. This
command is not applicable to member ports in a link aggregation group.
n Smart Link and STP cannot be enabled on an Ethernet port at the same time.
Make sure that STP is not enabled on the port of the link aggregation group
before configuring the link aggregation group as a member of the Smart Link
group.
Parameter None
Description Use the reset smart-link packets counter command to clear the flush
message statistics of Smart Link.
■ In system view:
Description Use the smart-link flush enable control-vlan command to enable the
current/specified port to process flush messages received on the specified control
VLAN.
Use the undo smart-link flush enable command to disable the port from
processing flush messages.
■ The command executed in Ethernet port view has effect on the current port
only.
■ The command executed in system view has effect on the specified port only.
If you configure different control VLANs on the same port, only the last one takes
effect.
n The VLAN configured as a control VLAN for sending or receiving flush messages
must exist. You cannot directly remove the control VLAN. When a dynamic VLAN
is configured as a control VLAN for the Smart Link group, this VLAN will become a
static VLAN, and related prompt information is displayed.
Example # Enable Ethernet2/0/4 to process flush messages received from control VLAN 1..
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] interface Ethernet 2/0/4
[SW7750-Ethernet2/0/4] smart-link flush enable control-vlan 1
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] smart-link flush enable control-vlan 1 port Ethernet 2/0/5
to Ethernet 2/0/10
smart-link group
Description Use the smart-link group command to create a Smart Link group and enter
Smart Link group view. If the specified Smart Link group exists, this command
leads you into Smart Link group view directly.
Use the undo smart-link group command to remove the specified Smart Link
group.
smart-link group 1123
After creating a Smart Link group, you must configure member ports for this
Smart Link group.
n Make sure that the Smart Link group has no members before executing the undo
smart-link group command.
Description Use the display monitor-link group command to display Monitor Link group
information.
Field Description
Member Member of the Monitor Link group
Role Role of Monitor Link group member port: UPLINK or DOWNLINK
Status Status of Monitor Link group member port: UP or DOWN
Last-up-time Last time the port is up
Last-down-time Last time the port is down
link-aggregation group
Parameter group-id: Link aggregation group ID, ranging from 1 to 384 (A link aggregation
group can be a manual or static link aggregation group only).
1126 CHAPTER 94: MONITOR LINK CONFIGURATION COMMANDS
uplink: Configures the specified link aggregation group as the uplink port of the
Monitor Link group
downlink: Configures the specified link aggregation group as the downlink port
of the Monitor Link group
Description Use the link-aggregation group command to configure the specified link
aggregation group as a Monitor Link group member.
Use the undo link-aggregation group command to remove the specified link
aggregation group from the current Monitor Link group.
In Monitor Link, a Monitor Link group member can be a single port, a manual or
static link aggregation group, but not a dynamic link aggregation group. Uplink
port can also be a Smart Link group.
Use this command only on the link aggregation groups that are not Smart Link
group members.
n A port or a link aggregation group cannot serve as a member port for two Smart
Link groups. On the other hand, a port or a link aggregation group cannot serve
as a member of a Smart Link group and a Monitor Link group at the same time.
However, a Smart Link group can serve as the uplink member port of a Monitor
Link group.
Example # Configure link aggregation group 8 as the downlink port of the Monitor Link
group.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] monitor-link group 1
[SW7750-mtlk-group1] link-aggregation group 8 downlink
monitor-link group
Description Use the monitor-link group command to create a Monitor Link group and enter
Monitor Link group view.
Use the undo monitor-link group command to remove a Monitor Link group.
After the Monitor Link group is configured, member ports of the Monitor Link
group need to be configured.
port 1127
Related command: port monitor-link group, link-aggregation group, smart-link group, and
port.
n Make sure that the Monitor Link group has no members before executing the
undo monitor-link group command.
port
uplink: Configures the specified port as the uplink port of the Monitor Link group
downlink: Configures the specified port as the downlink port of the Monitor Link
group
Description Use the port command to configure the specified port as a member of the
Monitor Link group.
Use the undo port command to remove the specified port from the current
Monitor Link group.
In Monitor Link, a Monitor Link group member can be a single port, a static link
aggregation group, but not a dynamic link aggregation group. The uplink port of
a Monitor Link group can also be a Smart Link group.
Do not use this command on member ports of a link aggregation group or a Smart
Link group.
n A port or a link aggregation group cannot serve as a member port for two Smart
Link groups. On the other hand, a port or a link aggregation group cannot serve
as a member for a Smart Link group and a Monitor Link group at the same time.
However, a Smart Link group can serve as the uplink member port of a Monitor
Link group.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] monitor-link group 1
[SW7750-mtlk-group1] port Ethernet 2/0/7 downlink
uplink: Configures the port as the uplink port of the specified Monitor Link group
downlink: Configures the port as the downlink port of the specified Monitor Link
group
Description Use the port monitor-link group command to configure the current port as a
member of the specified Monitor Link group.
Use the undo port monitor-link group command to remove the current port
from the specified Monitor Link group.
In Monitor Link, a Monitor Link group member can be a single port, a static link
aggregation group, but not a dynamic link aggregation group. Uplink port can
also be a Smart Link group.
Do not use this command on member ports of a link aggregation group or a Smart
Link group.
n A port or a link aggregation group cannot serve as a member port for two Smart
Link groups. On the other hand, a port or a link aggregation group cannot serve
as a member for a Smart Link group and a Monitor Link group at the same time.
However, a Smart Link group can serve as the uplink member port of a Monitor
Link group.
smart-link group
uplink: Configures the specified Smart Link group as the uplink port of the
Monitor Link group
Description Use the smart-link group command to configure the specified Smart Link group
as the uplink port of the Monitor Link group.
A Smart Link group can belong to only one Monitor Link group and can be
configured only as an uplink port of the Monitor Link group.
Example # Configure Smart Link group 1 as the uplink port of Monitor Link group 1.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] monitor-link group 1
[SW7750-mtlk-group1] smart-link group 1 uplink
1130 CHAPTER 94: MONITOR LINK CONFIGURATION COMMANDS
COMMANDS FOR BOOT ROM
95 UPGRADE WITH APP FILE
Description Use the boot bootrom default command to use the current startup file to
upgrade the Boot ROMs.
Example # Use the current startup file to upgrade the Boot ROMs of all normal I/O Module
modules in position.
<SW7750> boot bootrom default
Parameter file-url: Specifies the Boot ROM file path and file name in the Flash memory.
Description Use the boot bootrom file-url command to use the specified App file to upgrade
the Boot ROMs.
Example # Use the specified App file (abcd.app) to upgrade the Boot ROMs of slot 1 I/O
Module modules in position.
<SW7750> boot bootrom abcd.app slot 1
1132 CHAPTER 95: COMMANDS FOR BOOT ROM UPGRADE WITH APP FILE
Parameter file-url: Specifies the Boot ROM file path and file name in the Flash memory.
Description Use the boot boot-loader primary command to specify the primary startup file
at next booting.
Example # Specify the App file abcd.app as the primary startup file for next booting and
use it to upgrade the Boot ROMs.
<SW7750> boot boot-loader primary abcd.app
INTER-CARD LINK STATE ADJUSTMENT
96 CONFIGURATION COMMANDS
set inlink
Parameter auto: Sets the inter-card links are established in the auto negotiation mode.
fix: Sets the inter-card links are established the fix mode.
Description Use the set inlink command to set the mode in which inter-card links are
established. By default, inter-card links are established in the auto negotiation
mode.
monitor inner-channel
Description Use the monitor inner-channel command to enable the function of monitoring
internal channels.
An internal channel refers to the interface channel between the Fabric and the
service modules. The Fabric sends handshake packets to each service module every
second. After receiving the handshake packets, the service modules reports the
result to the Fabric. In this case, the Fabric knows that the service modules are
operating normally. Through this process, the Fabric can judge whether each
service module in the device operates normally.
Switch 7750s support this feature. Through this feature, you can monitor internal
channels.
You can also set the maximum number of times the Fabric fails to receive
handshake packets. If the number of times the Fabric fails to receive handshake
packets exceeds the upper limit, the switch resets the processing chip
automatically. When the Fabric receives handshake packets, it resets the counter
automatically.
You can also set whether to restart the service module or the switch when the
number of times the Fabric fails to receive handshake packets exceeds the upper
limit.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] monitor inner-channel
monitor inner-channel
Description Use the monitor inner-channel upper-limit command to set the maximum
number of times of monitoring internal channels.
An internal channel refers to the interface channel between the Fabric and the
service modules. The Fabric sends handshake packets to each service module every
second. After receiving the handshake packets, the service modules reports the
result to the Fabric. In this case, the Fabric knows that the service modules are
operating normally. Through this process, the Fabric can judge whether each
service module in the device operates normally.
Switch 7750s support this feature. Through this feature, you can monitor internal
channels.
You can also set the maximum number of times the Fabric fails to receive
handshake packets. If the number of times the Fabric fails to receive handshake
packets exceeds the upper limit, the switch resets the processing chip
automatically. When the Fabric receives handshake packets, it resets the counter
automatically.
monitor slot
Parameter slot-id: Slot ID. The value range depends on the products (Switch 7754: 0 to 3;
Switch 7757: 0 to 6; Switch 7758: 0 to 7).
Description Use the monitor slot enable command to enable switch chip auto-reset.
Use the monitor slot disable command to disable switch chip auto-reset.
By default, switch chips cannot be reset automatically when the internal channel
handshake fails.
In actual application, a switch may fail to process services normally due to internal
channel block or because the switch chip is busy.
Switch 7750s support the function of resetting switch chips automatically. In case
that the function of monitoring internal channels is enabled, when the internal
channel handshake between a module and the backplane fails, the switch resets
the switch chip automatically to resume the corresponding module.
When the function of resetting switch chips is disabled, even if the switch finds
that the internal channel handshake fails, it cannot reset the switch chip
automatically.
cpu-usage-threshold
Parameter value: Upper limit of the CPU usage threshold, ranging from 1 to 99.
slot-id: Slot ID. The value range depends on the products (Switch 7754: 0 to 3;
Switch 7757: 0 to 6; Switch 7758: 0 to 7).
Switch 7750 Ethernet switches support CPU usage threshold configuration. When
the CPU usage exceeds the configured threshold, the switch sends trap messages
and log messages, according to which the network administrator can modify the
switch configuration.
Switch 7750 Ethernet switches also support configuration of the CPU usage
threshold of the specified module. You can specify slot slot-number to configure
the CPU usage threshold of the specified module. When the CPU usage of the
module in the specified slot exceeds the configured threshold, the switch sends
trap messages and log messages to the network administrator.
If you set CPU thresholds for both all the modules and the specified module, the
CPU threshold of the specified module is determined by the latter one. For
example, if you set the CPU usage threshold of all the modules to 88 and set that
of the module in slot 2 to 77, the CPU usage threshold of the module in slot 2 is
77.
Example # Enable CPU usage threshold configuration on the module in slot 2 and set the
upper limit to 88.
<SW7750> system-view
System View: return to User View with Ctrl+Z.
[SW7750] cpu-usage-threshold 88 slot 2
1140 CHAPTER 99: CPU USAGE THRESHOLD CONFIGURATION COMMAND