Dell PowerConnect 3424 Cli Reference Manual

Dell PowerConnect 3424 Cli Reference Manual

Command line interface (cli) guide (.htm)
Hide thumbs Also See for PowerConnect 3424:
Table of Contents

Advertisement

Dell™ PowerConnect™ 3400 Series

CLI Reference Guide

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerConnect 3424

  • Page 1: Cli Reference Guide

    Dell™ PowerConnect™ 3400 Series CLI Reference Guide w w w . d e l l . c o m | s u p p o r t . d e l l . c o m...
  • Page 2 Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and PowerConnect are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
  • Page 3: Table Of Contents

    Contents Command Groups Introduction ........Command Groups .
  • Page 4 Spanning Tree Commands ......SSH Commands ....... . . Syslog Commands .
  • Page 5 Starting the CLI ........Editing Features ....... . . Setup Wizard .
  • Page 6 set enable-password active ......show passwords configuration ......show users login-history .
  • Page 7 show bridge address-table count ..... . . show bridge multicast address-table ..... show bridge multicast filtering .
  • Page 8 delete ........delete startup-config .
  • Page 9 set interface active ......show interfaces advertise ......show interfaces configuration .
  • Page 10 ip igmp snooping mrouter-time-out ..... . ip igmp snooping leave-time-out ..... . . show ip igmp snooping mrouter .
  • Page 11 show lacp ethernet ......show lacp port-channel ......15 Line Commands line .
  • Page 12 17 Management ACL management access-list ......permit (Management) ......deny (Management) .
  • Page 13 power inline powered-device ......power inline priority ......power inline usage-threshold .
  • Page 14 24 RMON Commands show rmon statistics ......rmon collection history ......show rmon collection history .
  • Page 15 show snmp ........show snmp engineid .
  • Page 16 instance (mst) ....... . . name (mst) ........revision (mst) .
  • Page 17 logging console ....... . logging buffered ....... . logging buffered size .
  • Page 18 show version ........asset-tag ........show system id .
  • Page 19 32 VLAN Commands vlan database ....... . . vlan ........interface vlan .
  • Page 20 33 Web Server ip http server ........ip http port .
  • Page 21 show dot1x statistics ......ADVANCED FEATURES ......dot1x auth-not-req .
  • Page 22: Contents

    Contents...
  • Page 23: Command Groups

    Command Groups Introduction The Command Language Interface (CLI) is a network management application operated through an ASCII terminal without the use of a Graphical User Interface (GUI) driven software application. By directly entering commands, you achieve greater configuration flexibility. The CLI is a basic command-line interpreter similar to the UNIX C shell.
  • Page 24 Ethernet Configuration Configures all port configuration options for, example ports, storm control, and auto-negotiation. GVRP Configures and displays GVRP configuration and information. IGMP Snooping Configures IGMP snooping and displays IGMP configuration and IGMP information. IP Addressing Configures and manages IP addresses on the device. LACP Configures and displays LACP information.
  • Page 25: Aaa Commands

    AAA Commands Command Group Description Access Mode aaa authentication login Defines login authentication. Global Configuration aaa authentication enable Defines authentication method lists for accessing higher Global privilege levels. Configuration login authentication Specifies the login authentication method list for a Line remote telnet or console.
  • Page 26: Acl Commands

    set line active Reactivates a locked line. Privileged EXEC set enable-password active Reactivates a locked local password. Privileged EXEC show passwords Displays information about password management. Privileged EXEC configuration show users login-history Displays information about the login history of users. Privileged EXEC show users accounts Displays information about the local user database.
  • Page 27 clear bridge Removes any learned entries from the forwarding Privileged EXEC database. port security Disables new address learning/forwarding on an Interface interface. Configuration port security mode Configures the port security learning mode. Interface Configuration port security max Configures the maximum number of addresses that Interface may be learned on the port while the port is in port Configuration...
  • Page 28: Clock Commands

    Clock Commands Command Group Description Access Mode clock set Manually sets the system clock. Privileged EXEC clock source Configures an external time source for the system Global clock. Configuration clock timezone Sets the time zone for display purposes. Global Configuration clock summer-time Configures the system to automatically switch to Global...
  • Page 29: Configuration And Image Files Commands

    Configuration and Image Files Commands Command Group Description Access Mode copy Copies files from a source to a destination. Privileged EXEC delete Deletes a file from a Flash memory device. Privileged EXEC delete startup-config Deletes the startup-config file. Privileged EXEC Displays a list of files on a flash file system.
  • Page 30 description Adds a description to an interface. Interface Configuration duplex Configures the full/half duplex operation of a given Interface Ethernet interface when not using auto-negotiation. Configuration speed Configures the speed of a given Ethernet interface Interface when not using auto-negotiation. Configuration negotiation Enables auto-negotiation operation for the speed...
  • Page 31: Gvrp Commands

    GVRP Commands Command Group Description Mode gvrp enable (Global) Enables GVRP globally. Global Configuration gvrp enable (Interface) Enables GVRP on an interface. Interface Configuration garp timer Adjusts the GARP application join, leave, and Interface leaveall GARP timer values. Configuration gvrp vlan-creation-forbid Enables or disables dynamic VLAN creation.
  • Page 32: Ip Addressing

    show ip igmp snooping Displays multicast groups learned by IGMP User EXEC groups snooping. IP Addressing Command Group Description Access Mode ip address Sets an IP address. Interface Configuration ip address dhcp Acquires an IP address on an interface from the Interface DHCP server.
  • Page 33: Lacp Commands

    LACP Commands Command Group Description Access Mode lacp system-priority Configures the system LACP priority. Global Configuration lacp port-priority Configures the priority value for physical ports. Interface Configuration lacp timeout Assigns an administrative LACP timeout. Interface Configuration show lacp ethernet Displays LACP information for Ethernet ports. Privileged EXEC show lacp port-channel Displays LACP information for a port-channel.
  • Page 34: Lldp Commands

    LLDP Commands Command Group Description Access Mode lldp enable (global) Enables Link Layer Discovery Protocol. Global configuration lldp enable (interface) Enables Link Layer Discovery Protocol (LLDP) on an Interface interface. configuration (Ethernet) lldp timer Specifies how often the software sends Link Layer Global Discovery Protocol (LLDP) updates.
  • Page 35: Line Commands

    Line Commands Command Group Description Access Mode line Identifies a specific line for configuration and enters Global the line configuration command mode. Configuration speed Configures the baud rate of the line. Line Configuration autobaud Configures the line for automatic baud rate Line detection (autobaud).
  • Page 36: Phy Diagnostics Commands

    PHY Diagnostics Commands Command Group Description Access Mode test copper-port tdr Diagnoses with TDR (Time Domain Reflectometry) Privileged EXEC technology the quality and characteristics of a copper cable attached to a port. show copper-ports tdr Displays the last TDR (Time Domain User EXEC Reflectometry) tests on specified ports.
  • Page 37: Power-Over-Ethernet Commands

    Power-over-Ethernet Commands Command Group Description Access Mode power inline Configures the administrative mode of the inline Interface power on an interface. Configuration power inline powered- Adds a description of the powered device type Interface device attached to the interface. Configuration power inline priority Displays port monitoring status.
  • Page 38: Radius Commands

    Radius Commands Command Group Description Access Mode radius-server host Specifies a RADIUS server host. Global Configuration radius-server key Sets the authentication and encryption key for all Global RADIUS communications between the device and Configuration the RADIUS daemon. radius-server Specifies the number of times the software searches Global retransmit the list of RADIUS server hosts.
  • Page 39: Snmp Commands

    SNMP Commands Command Group Description Access Mode snmp-server Sets up the community access string to permit Global community access to SNMP protocol. Configuration snmp-server view Creates and modifies view entries. Global Configuration snmp-server group Configures a new SNMP group or a table that maps Global SNMP users to SNMP views.
  • Page 40: Spanning Tree Commands

    Spanning Tree Commands Command Group Description Access Mode spanning-tree Enables spanning tree functionality. Global Configuration spanning-tree mode Configures the spanning tree protocol. Global Configuration spanning-tree forward- Configures the spanning tree bridge forward time. Global time Configuration spanning-tree hello- Configures the spanning tree bridge Hello Time. Global time Configuration...
  • Page 41: Ssh Commands

    spanning-tree mst cost Configures the path cost for multiple spanning tree Interface (MST) calculations. Configuration spanning-tree mst Enables configuring an MST region by entering the Global configuration Multiple Spanning Tree (MST) mode. Configuration instance (mst) Maps VLANs to the MST instance. MST Configuration name (mst) Defines the configuration name.
  • Page 42: Syslog Commands

    show crypto key Displays the SSH public keys stored on the device. Privileged EXEC mypubkey show crypto key Displays SSH public keys stored on the device. Privileged EXEC pubkey-chain ssh crypto slogin key Generates DSA key pairs for secure login to a remote Global generate dsa access server.
  • Page 43: System Management Commands

    show syslog-servers Displays the syslog servers settings. Privileged EXEC System Management Commands Command Group Description Access Mode ping Sends ICMP echo request packets to another node User EXEC on the network. traceroute Discovers the routes that packets will actually take User EXEC when traveling to their destination.
  • Page 44: Tacacs Commands

    TACACS Commands Command Group Description Mode tacacs-server host Specifies a TACACS+ host. Global Configuration tacacs-server key Sets the authentication encryption key used for all Global TACACS+ communications between the device and Configuration the TACACS+ daemon. tacacs-server source-ip Specifies the source IP address that will be used for the Global communication with TACACS+ servers.
  • Page 45: Vlan Commands

    VLAN Commands Command Group Description Access Mode vlan database Enters the VLAN database configuration mode. Global Configuration vlan Creates a VLAN. VLAN Database interface vlan Enters the interface configuration (VLAN) mode. Global Configuration interface range vlan Enters the interface configuration mode to configure Global multiple VLANs.
  • Page 46: Web Server Commands

    switchport general Discards untagged frames at ingress. Interface acceptable-frame-type Configuration tagged-only switchport forbidden Forbids adding specific VLANs to a port. Interface vlan Configuration switchport customer Sets the port’s VLAN when the interface is in customer Interface vlan mode. Configuration ip internal-usage-vlan Reserves a VLAN as the internal usage VLAN of an Interface interface.
  • Page 47: 802.1X Commands

    show ip http Displays the HTTP server configuration. Privileged EXEC show ip https Displays the HTTPS server configuration. Privileged EXEC show crypto certificate Displays the SSL certificates of the device. Privileged EXEC mycertificate 802.1x Commands Command Description Access Mode aaa authentication Specifies one or more authentication, authorization, Global dot1x...
  • Page 48 show dot1x users Displays active 802.1x authenticated users. Privileged EXEC show dot1x statistics Displays 802.1x statistics for the specified interface. Privileged EXEC dot1x auth-not-req Enables unauthorized users access to that VLAN. Interface (VLAN) Configuration dot1x multiple-hosts Allows multiple hosts (clients) on an 802.1x- Interface authorized port, that has the dot1x port-control Configuration...
  • Page 49: Command Modes

    Command Modes GC (Global Configuration) Mode Command Description aaa authentication enable Defines authentication method lists for accessing higher privilege levels. aaa authentication login Defines login authentication. aaa authentication dot1x Specifies one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1x. aaa logging Enables logging AAA login events.
  • Page 50 enable password Sets a local password to control access to normal and privilege levels. Ends the current configuration session and returns to the previous command mode. file-system logging Enables logging file system events. gvrp enable (Global) Enables GVRP globally. hostname Specifies or modifies the device host name.
  • Page 51 ip ssh server Enables the device to be configured from a SSH server. lacp system-priority Configures the system LACP priority. line Identifies a specific line for configuration and enters the line configuration command mode. logging Logs messages to a syslog server. logging buffered Limits syslog messages displayed from an internal buffer based on severity.
  • Page 52 radius-server host Specifies a RADIUS server host. radius-server key Sets the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. radius-server retransmit Specifies the number of times the software searches the list of RADIUS server hosts. radius-server source-ip Specifies the source IP address used for communication with RADIUS servers.
  • Page 53: Ic (Interface Configuration) Mode

    spanning-tree bpdu Defines BPDU handling when spanning tree is disabled on an interface spanning-tree forward-time Configures the spanning tree bridge forward time. spanning-tree hello-time Configures the spanning tree bridge Hello Time. spanning-tree max-age Configures the spanning tree bridge maximum age. spanning-tree mode Configures the spanning tree protocol.
  • Page 54 dot1x guest-vlan Defines a guest VLAN. dot1x guest-vlan enable Enables unauthorized users on the interface to access the guest VLAN. dot1x max-req Sets the maximum number of times that the device sends an EAP - request/identity frame to the client, before restarting the authentication process.
  • Page 55 mdix Enables automatic crossover on a given interface. name Configures a name to a VLAN. negotiation Enables auto-negotiation operation for the speed and duplex parameters of a given interface. power inline Configures the administrative mode of the inline power on an interface.
  • Page 56: Lc (Line Configuration) Mode

    spanning-tree link-type Overrides the default link-type setting. spanning-tree mst cost Configures the path cost for multiple spanning tree (MST) calculations. spanning-tree mst port- Configures the priority of a port. priority spanning-tree portfast Enables PortFast mode. spanning-tree port-priority Configures port priority. speed Configures the speed of a given Ethernet interface when not using auto-negotiation.
  • Page 57: Mc (Mst Configuration) Mode

    MC (MST Configuration) Mode Command Description abort (mst) Exits the MST region configuration mode without applying configuration changes. exit (mst) Exits the MST region configuration mode and applies all configuration changes. instance (mst) Maps VLANs to the MST instance. name (mst) Defines the configuration name.
  • Page 58 delete Deletes a file from a Flash memory device. delete startup-config Deletes the startup-config file. Displays a list of files on a flash file system. dot1x re-authenticate Manually initiates a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. exit Closes an active terminal session by logging off the device.
  • Page 59 show dot1x users Displays 802.1x users for the device. show dot1x statistics Displays 802.1x statistics for the specified interface. show fiber-ports optical- Displays the optical transceiver diagnostics transceiver show hosts Displays the default domain name, a list of name server hosts, the static and the cached list of host names and addresses.
  • Page 60: Sp (Ssh Public Key) Mode

    show snmp views Displays the configuration of SNMP views. show spanning-tree Displays spanning tree configuration. show startup-config Displays the startup configuration file contents. show syslog-servers Displays the syslog servers settings. show tacacs Displays configuration and statistics for a TACACS+ servers. show users accounts Displays information about the local user database.
  • Page 61 show gvrp error-statistics Displays GVRP error statistics. clear gvrp statistics Displays GVRP statistics. show history Lists the commands entered in the current session. show ip igmp snooping Enables automatic learning of multicast switch ports in the context mrouter of a specific VLAN. show ip igmp snooping Displays multicast groups learned by IGMP snooping.
  • Page 62: Vc (Vlan Configuration) Mode

    terminal history Enables the command history function for the current terminal session. terminal history size Configures the command history buffer size for the current terminal session. VC (VLAN Configuration) Mode Command Description bridge address Adds a static MAC-layer station source address to the bridge table. bridge multicast address Registers MAC-layer multicast addresses to the bridge table, and adds static ports to the group.
  • Page 63: Using The Cli

    Using the CLI This chapter describes how to start using the CLI and describes the command editing features to assist in using the CLI. CLI Command Modes Introduction To assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes.
  • Page 64: User Exec Mode

    When starting a session, the initial mode is the User EXEC mode. Only a limited subset of commands are available in the User EXEC mode. This level is reserved for tasks that do not change the configuration. To enter the next level, the Privileged EXEC mode, a password is required.
  • Page 65: Privileged Exec Mode

    The user-level prompt consists of the device host name followed by the angle bracket (>). Console> The default host name is Console unless it was changed using the hostname command in the Global Configuration mode. Privileged EXEC Mode Privileged access is password protected to prevent unauthorized use because, many of the privileged commands set operating system parameters.
  • Page 66: Global Configuration Mode

    Global Configuration Mode Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific interface. The configure Privileged EXEC mode command is used to enter the Global Configuration mode. To enter the Global Configuration mode, at the Privileged EXEC mode prompt enter the command configure and press <Enter>.
  • Page 67: Starting The Cli

    • Ethernet — Contains commands to manage port configuration. The interface ethernet Global Configuration mode command is used to enter the Interface Configuration mode to configure an Ethernet type interface. • Port Channel — Contains commands to configure port-channels, for example, assigning ports to a port-channel.
  • Page 68: Editing Features

    Service Pack 2 or later is installed.With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service packs. For more information, see Dell™ PowerConnect™ 3400 Series User's Guide. 2 Enter the following commands to begin the configuration procedure: Console> enable...
  • Page 69: Setup Wizard

    To assist in using the CLI, there is an assortment of editing features. The following features are described: • Terminal Command Buffer • Command Completion • Keyboard Shortcuts Copying and Pasting Text Up to 100 lines of text (i.e., commands) can be copied and pasted into the device. NOTE: This editing features are for Telnet only.
  • Page 70: Negating The Effect Of Commands

    There is a standard default number of commands that are stored in the buffer. The standard number of 10 commands can be increased to 216. By configuring 0, the effect is the same as disabling the history buffer system. For information about the command syntax for configuring the command history buffer, see history size.
  • Page 71: Cli Command Conventions

    CLI Command Conventions When entering commands there are certain command entry standards that apply to all commands. The following table describes the command conventions. Convention Description In a command line, square brackets indicate an optional entry. In a command line, curly brackets indicate a selection of compulsory parameters separated by the | character.
  • Page 72 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Using the CLI...
  • Page 73: Aaa Commands

    AAA Commands aaa authentication login The aaa authentication login Global Configuration mode command defines login authentication. To return to the default configuration, use the no form of this command. Syntax aaa authentication login {default | list-name} method1 [method2...] no aaa authentication login {default | list-name} •...
  • Page 74: Aaa Authentication Enable

    User Guidelines • The default and optional list names created with the aaa authentication login command are used with the login authentication command. • Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence.
  • Page 75: Login Authentication

    radius Uses the list of all RADIUS servers for authentication. Uses username $enabx$., where x is the privilege level. tacacs Uses the list of all TACACS+ servers for authentication. Uses username "$enabx$." where x is the privilege level. Default Configuration If the default list is not set, only the enable password is checked.
  • Page 76: Enable Authentication

    Syntax login authentication {default | list-name} no login authentication • default — Uses the default list created with the aaa authentication login command. • list-name — Uses the indicated list created with the aaa authentication login command. Default Configuration Uses the default set with the command aaa authentication login. Command Mode Line Configuration mode User Guidelines...
  • Page 77: Ip Http Authentication

    Command Mode Line Configuration mode User Guidelines There are no user guidelines for this command. Example The following example specifies the default authentication method when accessing a higher privilege level from a console. Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for HTTP server users.
  • Page 78: Ip Https Authentication

    User Guidelines • The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. Example The following example configures the HTTP authentication.
  • Page 79: Show Authentication Methods

    Example The following example configures HTTPS authentication. Console(config)# ip https authentication radius local show authentication methods The show authentication methods Privileged EXEC mode command displays information about the authentication methods. Syntax show authentication methods Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines...
  • Page 80: Password

    Line Login Method List Enable Method List -------------- ----------------- ------------------ Console Default Default Telnet Default Default Default Default http : Local https : Local dot1x console# password The password Line Configuration mode command specifies a password on a line. To remove the password, use the no form of this command.
  • Page 81: Enable Password

    enable password The enable password Global Configuration mode command sets a local password to control access to user and privilege levels. To remove the password requirement, use the no form of this command. Syntax enable password [level level] password [encrypted] no enable password [level level] •...
  • Page 82: Passwords Min-Length

    Default Configuration No user is defined. Command Mode Global Configuration mode User Guidelines • User account can be created without a password. Example The following example configures user bob with password lee and user level 15 to the system. Console(config)# username bob password lee level 15 passwords min-length The passwords min-length Global Configuration mode command sets the minimum length required for passwords in the local database.
  • Page 83: Passwords Aging

    Example The following example configures a minimum length of 8 characters required for passwords in the local database. Console(config)# passwords min-length 8 passwords aging The passwords aging Global Configuration mode command sets the expiration time of username and enable passwords. To remove the password expiration time, use the no form of this command.
  • Page 84: Passwords Aging

    Example The following example sets the expiration time of the level 15 enable password to 180 days. Console (config)# passwords aging enable-password 15 180 password-aging The password-aging Line Configuration mode command configures the expiration time of line passwords in the local database. To return to the default configuration, use the no form of this command.
  • Page 85: Passwords History

    passwords history The passwords history Global Configuration mode command sets the number of required password changes before a password in the local database can be reused. To remove this requirement, use the no form of this command. Syntax passwords history number no passwords history •...
  • Page 86: Passwords Lockout

    Syntax passwords history hold-time days no passwords hold-time • days—Number of days a password is relevant for tracking its password history (Range: 1-product specific). Default Configuration Not enabled. Command Mode Global Configuration mode User Guidelines Relevant to local user passwords, line passwords, and enable passwords. Passwords are not deleted from the history database when they are no longer relevant for tracking purposes.
  • Page 87: Aaa Login-History File

    User Guidelines • Relevant to local user passwords, line passwords, and enable passwords. • The user account can still access the local console. • A different administrator, with privilege level 15, can release a locked account by using the set username active command.
  • Page 88: Set Username Active

    set username active The set username active Privileged EXEC mode command reactivates a locked user account. Syntax set username name active • name—Name of the user (Range: 1-20 characters). Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines •...
  • Page 89: Set Enable-Password Active

    User Guidelines There are no user guidelines for this command. Example The following example reactivates the line for a virtual terminal for remote console access. Console# set line telnet active set enable-password active The set enable-password active Privileged EXEC mode command reactivates a locked enable password.
  • Page 90 Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays information about password management in the local database. Console# show passwords configuration Minimal length: 8 History: 10 History hold time: 365 days Lock-out: Disabled Enable Passwords Level...
  • Page 91: Show Users Login-History

    The following table describes significant fields shown above. Field Description Minimal length Minimum length required for passwords in the local database. History Number of required passwords changes before a password in the local database can be reused. History hold time Period of time that a password is relevant for tracking password history.
  • Page 92: Show Users Accounts

    Example The following example displays the login history of users. Console# show users login-history Login Time Username Protocol Location -------------- -------- -------- -------- Jan 18 2004 23:58:17 Robert HTTP 172.16.1.8 Jan 19 2004 07:59:23 Robert HTTP 172.16.0.8 Jan 19 2004 08:23:48 Serial Jan 19 2004 08:29:29 Robert...
  • Page 93 Example The following example displays the local users configured with access to the system. Console# show users accounts Username Privilege Password Password Lockout Aging Expiry date -------- --------- -------- ----------- ------- Jan 21 2005 Admin Jan 21 2005 The following table describes significant fields shown above. Field Description Username...
  • Page 94 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY AAA Commands...
  • Page 95: Acl Commands

    ACL Commands mac access-list The mac access-list Global Configuration mode command creates Layer 2 ACLs. To delete an ACL, use the no form of this command. Syntax mac access-list name no mac access-list name • name—Specifies the name of the ACL. Default Configuration The default for all ACLs is permit all.
  • Page 96: Service-Acl

    Default Configuration This command has no default configuration. Command Mode MAC-Access List Configuration mode User Guidelines • MAC BPDU packets cannot be denied. • Each MAC address in the ACL is a ACE (Access Control Element) and can only be removed by deleting the ACL using the no mac access-list Global Configuration mode command or the Web-based interface.
  • Page 97: Show Access-Lists

    Example The following example, binds (services) an ACL to VLAN 2. Console(config)# interface vlan 2 Console(config-if)# service-acl input macl-1 show access-lists The show access-lists Privileged EXEC mode command displays access control lists (ACLs) defined on the device. Syntax show access-lists [name] •...
  • Page 98 Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example displays an ACLs applied on the device interfaces: Console# show interfaces access-lists Interface Input ACL --------- ----------...
  • Page 99: Address Table Commands

    Address Table Commands bridge address The bridge address Interface Configuration (VLAN) mode command adds a MAC-layer station source address to the bridge table. To delete the MAC address, use the no form of this command. Syntax bridge address mac-address {ethernet interface | port-channel port-channel-number} [permanent | delete-on-reset | delete-on-timeout | secure] no bridge address [mac-address] •...
  • Page 100: Bridge Multicast Filtering

    Example The following example adds a permanent static MAC-layer station source address 3aa2.64b3.a245 on port 1/e16 to the bridge table. Console(config)# interface vlan 2 Console(config-if)# bridge address 3aa2.64b3.a245 ethernet 1/e16 permanent bridge multicast filtering The bridge multicast filtering Global Configuration mode command enables filtering multicast addresses.
  • Page 101: Bridge Multicast Address

    bridge multicast address The bridge multicast address Interface Configuration (VLAN) mode command registers a MAC-layer multicast address in the bridge table and statically adds ports to the group. To unregister the MAC address, use the no form of this command. Syntax bridge multicast address {mac-multicast-address | ip-multicast-address} bridge multicast address {mac-multicast-address | ip-multicast-address} [add | remove]...
  • Page 102: Bridge Multicast Forbidden Address

    The following example registers the MAC address and adds ports statically. Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 01:00:5e:02:02:03 add ethernet 1/e1-e9, 2/e2 bridge multicast forbidden address The bridge multicast forbidden address Interface Configuration (VLAN) mode command forbids adding a specific multicast address to specific ports. Use the no form of this command to return to the default configuration.
  • Page 103: Bridge Multicast Forward-All

    Examples In this example, MAC address 0100.5e02.0203 is forbidden on port 2/e9 within VLAN 8. Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 0100.5e.02.0203 Console(config-if)# bridge multicast forbidden address 0100.5e02.0203 add ethernet 2/e9 bridge multicast forward-all The bridge multicast forward-all Interface Configuration (VLAN) mode command enables forwarding all multicast packets on a port.
  • Page 104: Bridge Multicast Forbidden Forward-All

    Example In this example, all multicast packets on port 1/e8 are forwarded. Console(config)# interface vlan 2 Console(config-if)# bridge multicast forward-all add ethernet 1/e8 bridge multicast forbidden forward-all The bridge multicast forbidden forward-all Interface Configuration (VLAN) mode command forbids a port to be a forward-all-multicast port. To restore the default configuration, use the no form of this command.
  • Page 105: Bridge Aging-Time

    Example In this example, forwarding all multicast packets to 1/e1 with VLAN 2 is forbidden. Console(config)# interface vlan 2 Console(config-if)# bridge multicast forbidden forward-all add ethernet 1/e1 bridge aging-time The bridge aging-time Global Configuration mode command sets the address table aging time. To restore the default configuration, use the no form of this command.
  • Page 106: Port Security

    Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example In this example, the bridge tables are cleared. Console# clear bridge port security The port security Interface Configuration mode command locks the port, thereby, blocking unknown traffic and preventing the port from learning new addresses.
  • Page 107: Port Security Mode

    Example In this example, port 1/e1 forwards all packets without learning addresses of packets from unknown sources and sends traps every 100 seconds if a packet with an unknown source address is received. Console(config)# interface ethernet 1/e1 Console(config-if)# port security forward trap 100 port security mode The port security mode Interface Configuration mode command configures the port security mode.
  • Page 108: Port Security Max

    port security max The port security max Interface Configuration (Ethernet, port-channel) mode command configures the maximum number of addresses that can be learned on the port while the port is in port security mode. To return to the default configuration, use the no form of this command. Syntax port security max max-addr no port security max...
  • Page 109: Show Bridge Address-Table

    Default Configuration No addresses are defined. Command Mode Interface configuration (Ethernet, port-channel) mode; cannot be configured for a range of interfaces (range context). User Guidelines • The command enables adding secure MAC addresses to a routed port in port security mode. •...
  • Page 110: Show Bridge Address-Table Static

    User Guidelines • Internal usage VLANs (VLANs that are automatically allocated on ports with a defined Layer 3 interface) are presented in the VLAN column by a port number and not by a VLAN ID. • "Special" MAC addresses that were not statically defined or dynamically learned are displayed in the MAC address table.
  • Page 111: Show Bridge Address-Table Count

    User Guidelines There are no user guidelines for this command. Example In this example, all static entries in the bridge-forwarding database are displayed. Console# show bridge address-table static Aging time is 300 sec vlan mac address port type ---- ----------------- ---- ----------------- 00:60:70:4C:73:FF...
  • Page 112: Show Bridge Multicast Address-Table

    Example In this example, the number of addresses present in all VLANs are displayed. Console# show bridge address-table count Capacity: 8192 Free: 8083 Used: 109 Secure addresses: 2 Static addresses: 1 Dynamic addresses: 97 Internal addresses: 9 show bridge multicast address-table The show bridge multicast address-table Privileged EXEC mode command displays multicast MAC address or IP address table information.
  • Page 113 Example In this example, multicast MAC address and IP address table information is displayed. Console# show bridge multicast address-table Vlan MAC Address Type Ports ---- -------------- ------- ---------- 01:00:5e:02:02:03 static 1/e1, 2/e2 01:00:5e:02:02:08 static 1/e1-e8 00:00:5e:02:02:08 dynamic 1/e9-e11 Forbidden ports for multicast addresses: Vlan MAC Address Ports...
  • Page 114: Show Bridge Multicast Filtering

    show bridge multicast filtering The show bridge multicast filtering Privileged EXEC mode command displays the multicast filtering configuration. Syntax show bridge multicast filtering vlan-id • vlan-id — VLAN ID value. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 115: Show Ports Security

    show ports security The show ports security Privileged EXEC mode command displays the port-lock status. Syntax show ports security [ethernet interface | port-channel port-channel-number] • interface — A valid Ethernet port. • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration.
  • Page 116: Show Ports Security Addresses

    The following tables describes the fields shown above. Field Description Port Port number Status Locked/Unlocked Learning Learning mode Action Action on violation Maximum Maximum addresses that can be associated on this port in Static Learning mode or in Dynamic Learning mode Trap Indicates if traps are sent in case of a violation Frequency...
  • Page 117 Example In this example, dynamic addresses in currently locked ports are displayed. Console# show ports security addresses Port Status Learning Current Maximum ---- -------- -------- ------- ------- 1/e1 Disabled Lock 1/e2 Disabled Lock 1/e3 Enabled Max-addresses 1/e4 Port is a member in port-channel ch1 1/e5 Disabled Lock...
  • Page 118 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Address Table Commands...
  • Page 119: Clock

    Clock clock set The clock set Privileged EXEC mode command manually sets the system clock. Syntax clock set hh:mm:ss day month year clock set hh:mm:ss month day year • hh:mm:ss — Current time in hours (military format), minutes, and seconds (hh: 0 - 23, mm: 0 - 59, ss: 0 - 59).
  • Page 120: Clock Timezone

    Syntax clock source {sntp} no clock source • sntp — SNTP servers Default Configuration No external clock source Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Examples The following example configures an external time source for the system clock. Console(config)# clock source sntp clock timezone The clock timezone Global Configuration mode command sets the time zone for display...
  • Page 121: Clock Summer-Time

    User Guidelines • The system internally keeps time in UTC, so this command is used only for display purposes and when the time is manually set. Examples The following example sets the timezone to 6 hours difference from UTC. Console(config) clock timezone -6 zone CST clock summer-time The clock summer-time Global Configuration mode command configures the system to...
  • Page 122 • hh:mm — Time in military format, in hours and minutes. (Range: hh: 0 - 23, mm:0 - 59) • offset — Number of minutes to add during summer time. (Range: 1 - 1440) • acronym — The acronym of the time zone to be displayed when summer time is in effect. (Range: Up to 4 characters) Default Configuration Summer time is disabled.
  • Page 123: Sntp Authentication-Key

    sntp authentication-key The sntp authentication-key Global Configuration mode command defines an authentication key for Simple Network Time Protocol (SNTP). To remove the authentication key for SNTP , use the no form of this command. Syntax sntp authentication-key number md5 value no sntp authentication-key number •...
  • Page 124: Sntp Trusted-Key

    User Guidelines • The command is relevant for both unicast and broadcast. Examples The following example defines the authentication key for SNTP and grants authentication. Console(config)# sntp authentication-key 8 md5 ClkKey Console(config)# sntp trusted-key 8 Console(config)# sntp authenticate sntp trusted-key The sntp trusted-key Global Configuration mode command authenticates the identity of a system to which Simple Network Time Protocol (SNTP) will synchronize.
  • Page 125: Sntp Client Poll Timer

    sntp client poll timer The sntp client poll timer Global Configuration mode command sets the polling time for the Simple Network Time Protocol (SNTP) client. To return to default configuration, use the no form of this command. Syntax sntp client poll timer seconds no sntp client poll timer •...
  • Page 126: Sntp Anycast Client Enable

    User Guidelines • Use the sntp client enable (Interface) Interface Configuration mode command to enable the SNTP client on a specific interface. Examples The following example enables the SNTP broadcast clients. Console(config)# sntp broadcast client enable sntp anycast client enable The sntp anycast client enable Global Configuration mode command enables SNTP anycast client.
  • Page 127: Sntp Unicast Client Enable

    Syntax sntp client enable no sntp client enable Default Configuration The SNTP client is disabled on an interface. Command Mode Interface configuration (Ethernet, port-channel, VLAN) mode User Guidelines • Use the sntp broadcast client enable Global Configuration mode command to enable broadcast clients globally.
  • Page 128: Sntp Unicast Client Poll

    User Guidelines • Use the sntp server Global Configuration mode command to define SNTP servers. Examples The following example enables the device to use the Simple Network Time Protocol (SNTP) to request and accept SNTP traffic from servers. Console(config)# sntp unicast client enable sntp unicast client poll The sntp unicast client poll Global Configuration mode command enables polling for the Simple Network Time Protocol (SNTP) predefined unicast servers.
  • Page 129: Sntp Server

    sntp server The sntp server Global Configuration mode command configures the device to use the Simple Network Time Protocol (SNTP) to request and accept SNTP traffic from a specified server. To remove a server from the list of SNTP servers, use the no form of this command. Syntax sntp server {ip-address | hostname}[poll] [key keyid] no sntp server {ip address | hostname}...
  • Page 130: Show Clock

    show clock The show clock User EXEC mode command displays the time and date from the system clock. Syntax show clock [detail] • detail — Shows timezone and summertime configuration. Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines •...
  • Page 131: Show Sntp Configuration

    Example The following example displays the time and date from the system clock. Console> show clock 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Console> show clock detail 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Time zone: Acronym is PST Offset is UTC-8 Summertime:...
  • Page 132: Show Sntp Status

    User Guidelines There are no user guidelines for this command. Examples The following example displays the current SNTP configuration of the device. Console# show sntp configuration Polling interval: 7200 seconds MD5 Authentication keys: 8, 9 Authentication is required for synchronization. Trusted Keys: 8, 9 Unicast Clients: Enabled Unicast Clients Polling: Enabled...
  • Page 133 Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example shows the status of the SNTP . Console# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993) Unicast servers: Server Status...
  • Page 134 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Clock...
  • Page 135: Configuration And Image Files

    Configuration and Image Files copy The copy Privileged EXEC mode command copies files from a source to a destination. Syntax copy source-url destination-url • source-url — The source file location URL or reserved keyword of the source file to be copied.
  • Page 136 unit://member/ Boot file on one of the units. To copy from the master to all units, specify * in the boot member field. null: Null destination for copies or files. A remote file can be copied to null to determine its size. backup-config Represents the backup configuration file.This is a user-defined name for up to four backup configuration files.
  • Page 137 Copying a Configuration File from a Server to the Running Configuration File To load a configuration file from a network server to the running configuration file of the device, enter the copy source-url running-config command. The commands in the loaded configuration file are added to those in the running configuration file as if the commands were typed in the command-line interface (CLI).
  • Page 138: Delete

    Example The following example copies system image file1 from the TFTP server 172.16.101.101 to a non-active image file. console# copy tftp://172.16.101.101/file1 image Accessing file 'file1' on 172.16.101.101... Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss] delete The delete Privileged EXEC mode command deletes a file from a flash memory device.
  • Page 139: Delete Startup-Config

    Examples The following example deletes file test from flash memory. Console# delete flash:test Delete flash:test? [confirm] delete startup-config The delete startup-config Privileged EXEC mode command deletes the startup-config file. Syntax delete startup-config Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines...
  • Page 140: More

    Examples The following example displays files in the flash directory Console# dir Directory of flash: File Name Permission Size Modification Date Modification Time --------- ---------- ---- ----------------- ----------------- Image-1 4325376 01-Jun-2003 01:04:21 Image-2 4325376 01-Jun-2003 21:28:10 aaafile.prv 131072 01-Jun-2003 01:01:19 sshkeys.prv 262144 01-Jun-2003...
  • Page 141 The following table displays keywords and URL prefixes: Keyword Source or Destination flash: Source or destination URL for flash memory. It is the default in case a URL is specified without a prefix. running-config Represents the current running configuration file. startup-config Represents the startup configuration file.
  • Page 142: Rename

    Example The following example displays the contents of file configuration.bak. Console# more configuration.bak interface range ethernet 1/e(1-4) duplex half exit interface range ethernet 2/g(1-4) switchport mode general exit vlan database vlan 2 exit interface range ethernet 2/g(1-4) switchport general allowed vlan add 2 exit interface range ethernet 1/e(1-4) no negotiation...
  • Page 143: Boot System

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines • *.sys and *.prv files cannot be renamed. Examples The following example renames the configuration backup file. Console# rename configuration.bak m-config.bak boot system The boot system Privileged EXEC mode command specifies the system image that the device loads at startup.
  • Page 144: Show Running-Config

    show running-config The show running-config Privileged EXEC mode command displays the contents of the currently running configuration file. Syntax show running-config Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines • This command displays the factory default settings at the end of the running configuration file contents.
  • Page 145: Show Startup-Config

    show startup-config The show startup-config Privileged EXEC mode command displays the contents of the startup configuration file. Syntax show startup-config Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example displays the contents of the running configuration file.
  • Page 146: Show Bootvar

    show bootvar The show bootvar Privileged EXEC mode command displays the active system image file that is loaded by the device at startup. Syntax show bootvar [unit unit] • unit — Specifies the unit number. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines...
  • Page 147: Dhcp Filtering

    DHCP Filtering ip dhcp filtering vlan Use the ip dhcp filtering vlan global configuration command to enable filtering of DHCP requests on a VLAN. Use the no form of this command to disable DHCP requests filtering on a VLAN . Syntax ip dhcp filtering vlan vlan-id no ip dhcp filtering vlan vlan-id...
  • Page 148: Show Ip Dhcp Filtering

    Command Mode Interface configuration (Ethernet, Port-channel) User Guidelines • Configure as “trusted”, ports that are connected to a DHCP server or to other switches or routers. • Configure as “untrusted”, ports that are connected to DHCP clients. • The software would flood DHCP requests to trusted ports only. Example The following example configures a port as trusted for DHCP filtering purposes.
  • Page 149 Example The following example displays the DHCP filtering configuration. Console# show ip dhcp filtering DHCP filtering is configured on following VLANs: 2,3 Interface Trusted ----------- ------------ 1/e1 yes 1/e2 yes D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY DHCP Filtering...
  • Page 150 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY DHCP Filtering...
  • Page 151: Ethernet Configuration Commands

    Ethernet Configuration Commands interface ethernet The interface ethernet Global Configuration mode command enters the interface configuration mode to configure an Ethernet type interface. Syntax interface ethernet interface • interface — Valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines...
  • Page 152: Shutdown

    Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines • Commands under the interface range context are executed independently on each active interface in the range. If the command returns an error on one of the active interfaces, it does not stop executing commands on other active interfaces.
  • Page 153: Description

    The following example restarts the disabled Ethernet port. Console(config)# interface ethernet 1/e5 Console(config-if)# no shutdown description The description Interface Configuration (Ethernet, port-channel) mode command adds a description to an interface. To remove the description, use the no form of this command. Syntax description string no description...
  • Page 154: Speed

    speed The speed Interface Configuration (Ethernet, port-channel) mode command configures the speed of a given Ethernet interface when not using auto-negotiation. To restore the default configuration, use the no form of this command. Syntax speed {10 | 100 | 1000} no speed •...
  • Page 155: Duplex

    duplex The duplex Interface Configuration (Ethernet) mode command configures the full/half duplex operation of a given Ethernet interface when not using auto-negotiation. To restore the default configuration, use the no form of this command. Syntax duplex {half | full} no duplex •...
  • Page 156: Negotiation

    negotiation The negotiation Interface Configuration (Ethernet, port-channel) mode command enables auto-negotiation operation for the speed and duplex parameters of a given interface. To disable auto-negotiation, use the no form of this command. Syntax negotiation [capability1 [capability2…capability5]] no negotiation • capability — Specifies the capabilities to advertise. (Possible values: 10h, 10f, 100h,100f, 1000f) Default Configuration Auto-negotiation is enabled.
  • Page 157: Mdix

    Default Configuration Flow control is off. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines • Negotiation should be enabled for flow control auto. Example In the following example, flow control is enabled on port 1/e5. Console(config)# interface ethernet 1/e5 Console(config-if)# flowcontrol on mdix The mdix Interface Configuration (Ethernet) mode command enables cable crossover on a...
  • Page 158: Back-Pressure

    Example In the following example, automatic crossover is enabled on port 1/e5. Console(config)# interface ethernet 1/e5 Console(config-if)# mdix auto back-pressure The back-pressure Interface Configuration (Ethernet) mode command enables back pressure on a given interface. To disable back pressure, use the no form of this command. Syntax back-pressure no back-pressure...
  • Page 159: Set Interface Active

    Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Example In the following example, the counters for interface 1/e1 are cleared. Console> clear counters ethernet 1/e1 set interface active The set interface active Privileged EXEC mode command reactivates an interface that was shutdown.
  • Page 160: Show Interfaces Advertise

    Syntax show interfaces advertise [ethernet interface | port-channel port-channel-number ] interface — Valid Ethernet port. (Full syntax: unit/port) • • port-channel-number — Valid port-channel number. Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 161 Examples The following examples display autonegotiation information. Console# show interfaces advertise Port Type Operational Link Advertisement ---- ----------- ------- ------------------------------ 1/e1 100M-Copper Enabled 1/e2 100M-Copper Enabled 1/e3 100M-Copper Enabled 1/e4 100M-Copper Enabled 1/e5 100M-Copper Enabled 100f, 100h, 10f, 10h 1/e6 100M-Copper Enabled 1/e7...
  • Page 162: Show Interfaces Configuration

    show interfaces configuration The show interfaces configuration Privileged EXEC mode command displays the configuration for all configured interfaces. Syntax show interfaces configuration [ethernet interface | port-channel port-channel-number ] • interface — Valid Ethernet port. (Full syntax: unit/port) • port-channel-number — Valid port-channel number. Default Configuration This command has no default configuration.
  • Page 163: Show Interfaces Status

    1/e11 100M-Copper Full Enabled Disabled Auto 1/e12 100M-Copper Full Enabled Disabled Auto 1/e13 100M-Copper Full Enabled Disabled Auto 1/e14 100M-Copper Full Enabled Disabled Auto 1/e15 100M-Copper Full Enabled Disabled Auto 1/e16 100M-Copper Full Enabled Disabled Auto 1/e17 100M-Copper Full Enabled Disabled Auto 1/e18...
  • Page 164 Example The following example displays the status of all configured interfaces: Console# show interfaces status Port Type Duplex Speed Flow Link Back Mdix Ctrl State Pressure Mode ---- ----------- ------ ----- ------- ---- ----- -------- ---- 1/e1 100M-Copper Down 1/e2 100M-Copper Down 1/e3...
  • Page 165: Show Interfaces Description

    show interfaces description The show interfaces description Privileged EXEC mode command displays the description for all configured interfaces. Syntax show interfaces description [ethernet interface | port-channel port-channel-number] • interface — Valid Ethernet port. (Full syntax: unit/port) • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration.
  • Page 166: Show Interfaces Counters

    show interfaces counters The show interfaces counters User EXEC mode command displays traffic seen by the physical interface. Syntax show interfaces counters [ethernet interface | port-channel port-channel-number] • interface — A valid Ethernet port. (Full syntax: unit/port) • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration.
  • Page 167 InOctets InUcastPkts InMcastPkts InBcastPkts -------- ---------- ----------- ----------- 27889 OutOctets OutUcastPkts OutMcastPkts OutBcastPkts --------- ------------ ------------ ------------ 23739 The following example displays counters for Ethernet port 1/e1. Console# show interfaces counters ethernet 1/e1 Port InOctets InUcastPkts InMcastPkts InBcastPkts ------ ----------- -------------- ----------- -----------...
  • Page 168: Port Storm-Control Include-Multicast

    The following table describes the fields shown in the display: Field Description InOctets Counted received octets. InUcastPkts Counted received unicast packets. InMcastPkts Counted received multicast packets. InBcastPkts Counted received broadcast packets. OutOctets Counted transmitted octets. OutUcastPkts Counted transmitted unicast packets. OutMcastPkts Counted transmitted multicast packets.
  • Page 169: Port Storm-Control Broadcast Enable

    Command Modes Interface Configuration (Ethernet) mode User Guidelines • To control multicasts storms, use the port storm-control broadcast enable and port storm- control broadcast rate commands. Example The following example enables counting broadcast and multicast packets on Ethernet port 2/e3. Console(config)# interface ethernet 2/e3 Console(config-if)# port storm-control include-multicast port storm-control broadcast enable...
  • Page 170: Port Storm-Control Broadcast Rate

    port storm-control broadcast rate The port storm-control broadcast rate Interface Configuration (Ethernet) mode command configures the maximum broadcast rate. To return to the default configuration, use the no form of this command. Syntax port storm-control broadcast rate rate no port storm-control broadcast rate •...
  • Page 171 Syntax show ports storm-control [interface] interface — A valid Ethernet port. (Full syntax: unit/port) • Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the storm control configuration. Console# show ports storm-control Port State...
  • Page 172 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Ethernet Configuration Commands...
  • Page 173: Gvrp Commands

    GVRP Commands gvrp enable (Global) GARP VLAN Registration Protocol (GVRP) is an industry-standard protocol designed to propagate VLAN information from device to device. With GVRP , a single device is manually configured with all desired VLANs for the network, and all other devices on the network learn these VLANs dynamically.
  • Page 174: Garp Timer

    Syntax gvrp enable no gvrp enable Default Configuration GVRP is disabled on all interfaces. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN.
  • Page 175: Gvrp Vlan-Creation-Forbid

    Command Mode Interface configuration (Ethernet, port-channel) mode User Guidelines • The following relationship must be maintained between the timers: – Leave time must be greater than or equal to three times the join time. – Leave-all time must be greater than the leave time. •...
  • Page 176: Gvrp Registration-Forbid

    Example The following example disables dynamic VLAN creation on Ethernet port 1/e6. console(config)# interface ethernet 1/e6 console(config-if)# gvrp vlan-creation-forbid gvrp registration-forbid The gvrp registration-forbid Interface Configuration (Ethernet, port-channel) mode command deregisters all dynamic VLANs on a port and prevents VLAN creation or registration on the port. To allow dynamic registration of VLANs on a port, use the no form of this command.
  • Page 177: Show Gvrp Configuration

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example clears all GVRP statistical information on Ethernet port 1/e6. console# clear gvrp statistics ethernet 1/e6 show gvrp configuration The show gvrp configuration User EXEC mode command displays GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation is enabled,...
  • Page 178: Show Gvrp Statistics

    Example The following example displays GVRP configuration information: Console> show gvrp configuration GVRP Feature is currently enabled on the device. Timers (milliseconds) Port(s) Status Registration Dynamic VLAN Join Leave Leave All Creation ------ ------- ------------ ----------- ---- ----- --------- 2/e1 Enabled Normal Enabled...
  • Page 179: Show Gvrp Error-Statistics

    Example The following example shows GVRP statistical information: Console> show gvrp statistics GVRP Statistics: Legend: Join Empty Received rJIn: Join In Received rEmp : Empty Received rLIn: Leave In Received Leave Empty Received rLA : Leave All Received Join Empty Sent sJIn: Join In Sent sEmp :...
  • Page 180 Example The following example displays GVRP statistical information. Console> show gvrp error-statistics GVRP Error Statistics: Legend: INVPROT : Invalid Protocol INVALEN : Invalid Attribute Length INVATYP : Invalid Attribute INVEVENT: Invalid Event Type INVAVAL : Invalid Attribute Value Port INVPROT INVATYP INVAVAL INVALEN INVEVENT D E L L C O N F I D E N T I A L –...
  • Page 181: Igmp Snooping Commands

    IGMP Snooping Commands ip igmp snooping (Global) The ip igmp snooping Global Configuration mode command enables Internet Group Management Protocol (IGMP) snooping. To disable IGMP snooping, use the no form of this command. Syntax ip igmp snooping no ip igmp snooping Default Configuration IGMP snooping is disabled.
  • Page 182: Ip Igmp Snooping Mrouter Learn-Pim-Dvmrp

    Default Configuration IGMP snooping is disabled. Command Mode Interface Configuration (VLAN) mode User Guidelines • IGMP snooping can only be enabled on static VLANs. It must not be enabled on Private VLANs or their community VLANs. Example The following example enables IGMP snooping on VLAN 2. Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping ip igmp snooping mrouter learn-pim-dvmrp...
  • Page 183: Ip Igmp Snooping Host-Time-Out

    Example The following example enables automatic learning of multicast router ports on VLAN 2. Console(config) # interface vlan 2 Console(config-if)# ip igmp snooping mrouter learn-pim-dvmrp ip igmp snooping host-time-out The ip igmp snooping host-time-out Interface Configuration (VLAN) mode command configures the host-time-out. If an IGMP report for a multicast group was not received for a host-time-out period from a specific port, this port is deleted from the member list of that multicast group.
  • Page 184: Ip Igmp Snooping Leave-Time-Out

    Syntax ip igmp snooping mrouter-time-out time-out no ip igmp snooping mrouter-time-out • time-out — Multicast router timeout in seconds (Range: 1 - 2147483647) Default Configuration The default value is 300 seconds. Command Mode Interface Configuration (VLAN) mode User Guidelines There are no user guidelines for this command. Example The following example configures the multicast router timeout to 200 seconds.
  • Page 185: Show Ip Igmp Snooping Mrouter

    Command Mode Interface Configuration (VLAN) mode User Guidelines • The leave timeout should be set greater than the maximum time that a host is allowed to respond to an IGMP query. • Use immediate leave only where there is just one host connected to a port. Example The following example configures the host leave-time-out to 60 seconds.
  • Page 186: Show Ip Igmp Snooping Interface

    Example The following example displays multicast router interfaces in VLAN 1000. Console> show ip igmp snooping mrouter interface 1000 VLAN Ports ---- ----- 1000 1/e1 Detected multicast routers that are forbidden statically: VLAN Ports ---- ----- 1000 1/e19 show ip igmp snooping interface The show ip igmp snooping interface User EXEC mode command displays IGMP snooping configuration.
  • Page 187: Show Ip Igmp Snooping Groups

    Example The following example displays IGMP snooping information on VLAN 1000. Console> show ip igmp snooping interface 1000 IGMP Snooping is globaly enabled IGMP Snooping is enabled on VLAN 1000 IGMP host timeout is 300 sec IGMP Immediate leave is disabled. IGMP leave timeout is 10 sec IGMP mrouter timeout is 200 sec Automatic learning of multicast router ports is enabled show ip igmp snooping groups...
  • Page 188 Example The following example shows IGMP snooping information on multicast groups. Console> show ip igmp snooping groups Vlan IP Address Querier Ports ---- ------------------ -------- ------------ 224-239.130|2.2.3 1/e1, 2/e2 224-239.130|2.2.8 1/e9-e11 IGMP Reporters that are forbidden statically: --------------------------------------------- Vlan IP Address Ports ---- ------------------...
  • Page 189: Ip Addressing Commands

    IP Addressing Commands ip address The ip address Interface Configuration (Ethernet, VLAN, port-channel) mode command sets an IP address. To remove an IP address, use the no form of this command. Syntax ip address ip-address {mask | prefix-length} no ip address [ip-address] •...
  • Page 190: Ip Address Dhcp

    ip address dhcp The ip address dhcp Interface Configuration (Ethernet, VLAN, port-channel) mode command acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. To deconfigure an acquired IP address, use the no form of this command. Syntax ip address dhcp [hostname host-name] no ip address dhcp...
  • Page 191: Ip Default-Gateway

    Example The following example acquires an IP address for Ethernet port 1/e16 from DHCP . Console(config)# interface ethernet 1/e16 Console(config-if)# ip address dhcp ip default-gateway The ip default-gateway Global Configuration mode command defines a default gateway (router). To return to the default configuration, use the no form of this command. Syntax ip default-gateway ip-address no ip default-gateway...
  • Page 192: Arp

    Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Example The following example the displays the configured IP interfaces and their types. Console# show ip interface Gateway IP Address Type Activity status...
  • Page 193: Arp Timeout

    Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines • The software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware addresses. Because most hosts support dynamic resolution, static ARP cache entries do not generally have to be specified.
  • Page 194: Clear Arp-Cache

    Example The following example configures the ARP timeout to 12000 seconds. Console(config)# arp timeout 12000 clear arp-cache The clear arp-cache Privileged EXEC mode command deletes all dynamic entries from the ARP cache. Syntax clear arp-cache Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines...
  • Page 195: Ip Domain-Lookup

    Example The following example displays entries in the ARP table. Console# show arp ARP timeout: 80000 Seconds Interface IP address HW address Status --------- ---------- ----------------- ------- 1/e1 10.7.1.102 00:10:B5:04:DB:4B Dynamic 2/e2 10.7.1.135 00:50:22:00:2A:A4 Static ip domain-lookup The ip domain-lookup Global Configuration mode command enables the IP Domain Naming System (DNS)-based host name-to-address translation.
  • Page 196: Ip Domain-Name

    Static entries are read first, followed by DHCP entries and DNS-protocol entries. Examples The following example defines default domain name dell.com. Console(config)# ip domain-name dell.com ip name-server The ip name-server Global Configuration mode command defines the available name servers.
  • Page 197: Ip Host

    The following example defines a static host name-to-address mapping in the host cache. Console(config)# ip host accounting.dell.com 176.10.23.1 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY...
  • Page 198: Clear Host

    clear host The clear host Privileged EXEC mode command deletes entries from the host name-to-address cache. Syntax clear host {name | *} • name — Specifies the host entry to be removed. (Range: 1-158 characters • * — Removes all entries. Default Configuration This command has no default configuration.
  • Page 199: Show Hosts

    User Guidelines • This command deletes the host name-to-address mapping temporarily until the next renewal of the IP address. Examples The following example deletes all entries from the host name-to-address mapping. Console# clear host dhcp * show hosts The show hosts Privileged EXEC mode command displays the default domain name; a list of name server hosts;...
  • Page 200 Configured host name-to-address mapping: Host Addresses ---- --------- accounting.gm.com 176.16.8.8 176.16.8.9 (DHCP) Cache: TTL(Hours) Host Total Elapsed Type Addresses ---- ----- ------- ------ --------- www.stanford.edu 171.64.14.203 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY IP Addressing Commands...
  • Page 201: Lacp Commands

    LACP Commands lacp system-priority The lacp system-priority Global Configuration mode command configures the system priority. To return to the default configuration, use the no form of this command. Syntax lacp system-priority value no lacp system-priority • value — Specifies system priority value. (Range: 1 - 65535) Default Configuration The default system priority is 1.
  • Page 202: Lacp Timeout

    Default Configuration The default port priority is 1. Command Mode Interface Configuration (Ethernet) mode User Guidelines There are no user guidelines for this command. Example The following example defines the priority of Ethernet port 1/e6 as 247. Console(config)# interface ethernet 1/e6 Console(config-if)# lacp port-priority 247 lacp timeout The lacp timeout Interface Configuration (Ethernet) mode command assigns an administrative...
  • Page 203: Show Lacp Ethernet

    show lacp ethernet The show lacp ethernet Privileged EXEC mode command displays LACP information for Ethernet ports. Syntax show lacp ethernet interface [parameters | statistics | protocol-state] • interface — Valid Ethernet port. (Full syntax: unit/port) • parameters — Link aggregation parameter information. •...
  • Page 204 port Admin timeout: LONG port Oper timeout: LONG LACP Activity: ACTIVE Aggregation: AGGREGATABLE synchronization: FALSE collecting: FALSE distributing: FALSE expired: FALSE Partner system priority: system mac addr: 00:00:00:00:00:00 port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Oper timeout: LONG...
  • Page 205: Show Lacp Port-Channel

    Port 1/e1 LACP Protocol State: LACP State Machines: Receive FSM: Port Disabled State Mux FSM: Detached State Periodic Tx FSM: No Periodic State Control Variables: BEGIN: FALSE LACP_Enabled: TRUE Ready_N: FALSE Selected: UNSELECTED Port_moved: FALSE NNT: FALSE Port_enabled: FALSE Timer counters: periodic tx timer: current while timer: wait while timer:...
  • Page 206 Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays LACP information about port-channel 1. Console# show lacp port-channel Port-Channel 1: Port Type 1000 Ethernet Actor System Priority: MAC Address: 00:02:85:0E:1C:00 Admin Key: Oper Key:...
  • Page 207: Line Commands

    Line Commands line The line Global Configuration mode command identifies a specific line for configuration and enters the Line Configuration command mode. Syntax line {console | telnet | ssh} • console — Console terminal line. • telnet — Virtual terminal for remote console access (Telnet). •...
  • Page 208: Autobaud

    Syntax speed bps no speed • bps—Baud rate in bits per second (bps). Possible values are 2400, 9600, 19200, 38400, 57600 and 115200. Default Configuration The default speed is 9600 bps. Command Mode Line Configuration (console) mode User Guidelines • This command is available only on the line console.
  • Page 209: Exec-Timeout

    User Guidelines • This command is available only on the line console. • To start communication using Autobaud, press <Enter> twice. This configuration applies only to the current session. Examples The following example enables autobaud. Console(config)# line console Console(config-line)# autobaud exec-timeout The exec-timeout Line Configuration mode command sets the interval that the system waits until user input is detected.
  • Page 210: History

    history The history Line Configuration mode command enables the command history function. To disable the command history function, use the no form of this command. Syntax history no history Default Configuration The command history function is enabled. Command Mode Line Configuration mode User Guidelines •...
  • Page 211: Terminal History

    Command Mode Line Configuration mode User Guidelines This command configures the command history buffer size for a particular line. To configure the command history buffer size for the current terminal session, use the terminal history size User EXEC mode command. Example The following example changes the command history buffer size to 100 entries for a particular line.
  • Page 212: Terminal History Size

    terminal history size The terminal history size User EXEC command configures the command history buffer size for the current terminal session. To reset the command history buffer size to the default setting, use the no form of this command. Syntax terminal history size number-of-commands no terminal history size •...
  • Page 213 Default Configuration If the line is not specified, the default value is console. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example displays the line configuration. Console> show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600...
  • Page 214 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Line Commands...
  • Page 215: Lldp Commands

    LLDP Commands lldp enable (global) To enable Link Layer Discovery Protocol (LLDP), use the lldp enable command in global configuration mode. To disable LLDP, use the no form of this command. Syntax lldp enable no lldp enable Default Configuration The command is enabled. Command Mode Global configuration User Guidlines...
  • Page 216: Lldp Timer

    Command Modes Interface configuration (Ethernet) User Guidelines • LLDP manages LAG ports individually. LLDP sends separate advertisements on each port in a LAG. LLDP data received through LAG ports is stored individually per port. • LLDP operation on a port is not dependent on STP state of a port. I.e. LLDP frames are sent and received on blocked ports.
  • Page 217: Lldp Hold-Multiplier

    Examples The following example specifies how often the software sends Link Layer Discovery Protocol (LLDP) updates. Console (config) # lldp timer lldp hold-multiplier To specify the amount of time, the receiving device should hold a Link Layer Discovery Protocol (LLDP) packet before discarding it. Use the lldp hold-multiplier command in global configuration mode.
  • Page 218: Lldp Tx-Delay

    Syntax lldp reinit-delay seconds no lldp reinit-delay • seconds — Specifies the minimum time in seconds an LLDP port will wait before reinitializing LLDP transmission. (Range 1-10 seconds). Default Configuraiton The default value is 2 seconds. Command Modes Global configuration User Guidelines There are no user guidelines for this command.
  • Page 219: Lldp Optional-Tlv

    Usage Guidelines • It is recommended that the TxDelay would be less than 0.25 of the LLDP timer interval. Examples The following example specifies the delay between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. Console (config) # lldp tx-delay 7 lldp optional-tlv To specify which optional TLVs from the basic set should be transmitted, use the lldp optional-tlv...
  • Page 220: Clear Lldp Rx

    Syntax lldp management-address ip-address no management-address ip ip-address — Specifies the management address to advertise. • Default Configuration No IP address is advertised. Command Modes Interface configuration (Ethernet) User Guidelines • Each port can advertise one IP address. • Only static IP addresses can be advertised. Example The following example specifies management address that would be advertised from an interface.
  • Page 221: Show Lldp Configuration

    show lldp configuration To display the Link Layer Discovery Protocol (LLDP) configuration, use the show lldp configuration command in privileged EXEC mode. Syntax show lldp configuration [ethernet interface] • Interface — Ethernet port Command Modes Privileged EXEC User Guidelines There are no user guidelines for this command. Example The following example displays the Link Layer Discovery Protocol (LLDP) configuration.
  • Page 222: Show Lldp Neighbors

    Command Modes Privileged EXEC User Guidelines There are no user guidelines for this command. Example The following example displays the Link Layer Discovery Protocol (LLDP) information that is advertised from a specific port. Switch# show lldp local ethernet g1 Device ID: 0060.704C.73FF Port ID: 1 Capabilities: Bridge System Name: ts-7800-1...
  • Page 223 Switch# show lldp neighbors Port Device ID Port Hold System Time Capabilities Name 0060.704C.73FE ts-7800-2 0060.704C.73FD ts-7800-2 0060.704C.73F C B, R ts-7900-1 ts-7900-2 0060.704C.73FB Switch# show lldp neighbors ethernet g1 Device ID: 0060.704C.73FE Port ID: 1 Hold Time: 117 Capabilities: B System Name: ts-7800-2 System description: Port description:...
  • Page 224 LLDP Commands...
  • Page 225: Management Acl

    Management ACL management access-list The management access-list Global Configuration mode command configures a management access list and enters the Management Access-list Configuration command mode. To delete an access list, use the no form of this command. Syntax management access-list name no management access-list name •...
  • Page 226: Permit (Management)

    Examples The following example creates a management access list called mlist, configures management Ethernet interfaces 1/e1 and 2/e9 and makes the new access list the active list. Console(config)# management access-list mlist Console(config-macl)# permit ethernet 1/e1 Console(config-macl)# permit ethernet 2/e9 Console(config-macl)# exit Console(config)# management access-class mlist The following example creates a management access list called mlist, configures all interfaces to be management interfaces except Ethernet interfaces 1/e1 and 2/e9 and makes the new access...
  • Page 227: Deny (Management)

    • prefix-length — Number of bits that comprise the source IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0 - 32) • service — Service type. Possible values: telnet, ssh, http, https and snmp. Default Configuration If no permit rule is defined, the default is set to deny.
  • Page 228: Management Access-Class

    Default Configuration This command has no default configuration. Command Mode Management Access-list Configuration mode User Guidelines • Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is defined on the appropriate interface. • The system supports up to 128 management access rules. Example The following example denies all ports in the access list called mlist.
  • Page 229: Show Management Access-List

    Example The following example configures an access list called mlist as the management access list. Console(config)# management access-class mlist show management access-list The show management access-list Privileged EXEC mode command displays management access-lists. Syntax show management access-list [name] • name — Specifies the name of a management access list. (Range: 1 - 32 characters) Default Configuration This command has no default configuration.
  • Page 230: Show Management Access-Class

    show management access-class The show management access-class Privileged EXEC mode command displays the active management access list. Syntax show management access-class Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays information about the active management access list.
  • Page 231: Phy Diagnostics Commands

    PHY Diagnostics Commands test copper-port tdr The test copper-port tdr Privileged EXEC mode command uses Time Domain Reflectometry (TDR) technology to diagnose the quality and characteristics of a copper cable attached to a port. Syntax test copper-port tdr interface • interface —...
  • Page 232: Show Copper-Ports Cable-Length

    show copper-ports tdr [interface] • interface — A valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines • The maximum length of the cable for the TDR test is 120 meter. Example The following example displays information on the last TDR test performed on all copper ports.
  • Page 233: Show Fiber-Ports Optical-Transceiver

    User Guidelines • The port must be active and working in 100M or 1000M mode. Example The following example displays the estimated copper cable length attached to all ports. Console> show copper-ports cable-length Port Length [meters] ---- --------------------- 1/e1 < 50 1/e2 Copper not active 1/e3...
  • Page 234 Examples The following examples display the optical transceiver diagnostics. Console# show fiber-ports optical-transceiver Power Port Temp Voltage Current Output Input TX Fault LOS ---- ---- ------- ------- ------ ----- ------- 1/g1 1/g2 1/g3 Copper Temp – Internally measured transceiver temperature. Voltage - Internally measured supply voltage.
  • Page 235: Port Channel Commands

    Port Channel Commands interface port-channel The interface port-channel Global Configuration mode command enters the interface configuration mode to configure a specific port-channel. Syntax interface port-channel port-channel-number • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines...
  • Page 236: Channel-Group

    Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines • Commands under the interface range context are executed independently on each interface in the range. Example The following example groups port-channels 1, 2 and 6 to receive the same command. Console(config)# interface range port-channel 1-2,6 channel-group The channel-group Interface Configuration (Ethernet) mode command associates a port with a...
  • Page 237: Show Interfaces Port-Channel

    Example The following example forces port 1/e1 to join port-channel 1 without an LACP operation. Console(config)# interface ethernet 1/e1 Console(config-if)# channel-group 1 mode on show interfaces port-channel The show interfaces port-channel Privileged EXEC mode command displays port-channel information. Syntax show interfaces port-channel [port-channel-number] •...
  • Page 238 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Port Channel Commands...
  • Page 239: Port Monitor Commands

    Port Monitor Commands port monitor The port monitor Interface Configuration Ethernet mode command starts a port monitoring session. To stop a port monitoring session, use the no form of this command. Syntax port monitor src-interface [rx | tx] no port monitor src-interface •...
  • Page 240: Port Monitor Vlan-Tagging

    Example The following example copies traffic on port 1/e8 (source port) to port 1/e1 (destination port). Console(config)# interface ethernet 1/e1 Console(config-if)# port monitor 1/e8 port monitor vlan-tagging The port monitor vlan-tagging Interface Configuration (Ethernet) mode command transmits tagged ingress mirrored packets. To transmit untagged ingress mirrored packets, use the no form of this command.
  • Page 241 Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Example The following example shows how the port monitoring status is displayed. Console> show ports monitor Source Port Destination Port Type Status VLAN Tagging ----------- ---------------- ----- -------...
  • Page 242 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Port Monitor Commands...
  • Page 243: Power Over Ethernet Commands

    Power over Ethernet Commands power inline The port inline Interface Configuration (Ethernet) mode command configures the administrative mode of inline power on an interface. Syntax power inline {auto | never} • auto—Enables the device discovery protocol and, if found, supplies power to the device. •...
  • Page 244: Power Inline Powered-Device

    power inline powered-device The power inline powered-device Interface Configuration (Ethernet) mode command adds a comment or description of the powered device type to enable the user to remember what is attached to the interface. To remove the description, use the no form of this command. Syntax power inline powered-device pd-type no power inline powered-device...
  • Page 245: Power Inline Usage-Threshold

    Default Configuration The default setting is low priority. Command Mode Interface Configuration (Ethernet) mode User Guidelines • An unlimited number of ports can be configured as critical, high or low. • As power becomes unavailable, critical and high ports continue to receive power at the expense of low ports.
  • Page 246: Power Inline Traps Enable

    Example The following example configures the power usage threshold for which alarms are sent to 80%. Console(config)# power inline usage-threshold 80 power inline traps enable The power inline traps enable Global Configuration mode command enables inline power traps. To disable inline power traps, use the no form of this command. Syntax power inline traps enable no power inline traps...
  • Page 247: Show Power Inline

    Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays information about inline power. Console> show power inline Power: On Nominal Power: 150 Watt Consumed Power: 120 Watts (80%) Usage Threshold: 95% Traps: Enabled Port Powered Device...
  • Page 248 Console> show power inline ethernet 1/e1 Port Powered Device State Priority Status Classification [w] ---- ---------------- ----- -------- ------ ----------------- 1/e1 IP Phone Model A Auto High 0.44 - 12.95 Overload Counter: 1 Short Counter: 0 Denied Counter: 0 Absent Counter: 0 Invalid Signature Counter: 0 The following table describes the significant fields shown in the example: Field...
  • Page 249 Status Describes the inline power operational status of the port. Can be: On, Off, Test-Fail, Testing, Searching or Fault. Classification The power consumption range of the powered device. Can be: 0.44 – 12.95, 0.44 – 3.84, 3.84 – 6.49 or 6.49 – 12.95. Overload Counter Counts the number of overload conditions that has been detected.
  • Page 250 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Power over Ethernet Commands...
  • Page 251: Qos Commands

    QoS Commands The qos Global Configuration mode command enables quality of service (QoS) on the device. To disable QoS on the device, use the no form of this command. Syntax no qos Default Configuration QoS is disabled on the device. Command Mode Global Configuration mode User Guidelines...
  • Page 252: Priority-Queue Out Num-Of-Queues

    User Guidelines There are no user guidelines for this command. Example The following example displays QoS attributes when QoS is disabled on the device. Console> show qos Qos: disable Trust: dscp priority-queue out num-of-queues The priority-queue out num-of-queues Global Configuration mode command configures the number of expedite queues.
  • Page 253: Show Qos Interface

    show qos interface The show qos interface User EXEC mode command displays interface QoS information. Syntax show qos interface [ethernet interface-number | vlan vlan-id | port-channel number] [queueing] • interface-number — Valid Ethernet port number. • vlan-id— Valid VLAN ID. •...
  • Page 254: Wrr-Queue Cos-Map

    Cos-queue map: wrr-queue cos-map The wrr-queue cos-map Global Configuration mode command maps Class of Service (CoS) values to a specific egress queue. To return to the default configuration, use the no form of this command. Syntax wrr-queue cos-map queue-id cos1...cos8 no wrr-queue cos-map [queue-id] •...
  • Page 255: Qos Map Dscp-Queue

    Example The following example maps CoS 7 to queue 2. Console(config)# wrr-queue cos-map 2 7 qos map dscp-queue The qos map dscp-queue Global Configuration mode command modifies the DSCP to CoS map. To return to the default map, use the no form of this command. Syntax qos map dscp-queue dscp-list to queue-id no qos map dscp-queue...
  • Page 256: Qos Trust (Interface)

    • cos — Indicates that ingress packets are classified with packet CoS values. Untagged packets are classified with the default port CoS value. • dscp — Indicates that ingress packets are classified with packet DSCP values. Default Configuration CoS is the default trust mode. Command Mode Global Configuration mode User Guidelines...
  • Page 257: Qos Cos

    User Guidelines There are no user guidelines for this command. Example The following example configures Ethernet port 1/e15 to the default trust state. console(config)# interface ethernet 1/e15 console(config-if) qos trust qos cos The qos cos Interface Configuration (Ethernet, Port-channel) mode command defines the default CoS value of a port.
  • Page 258: Show Qos Map

    show qos map The show qos map User EXEC mode command displays all QoS maps. Syntax show qos map [dscp-queue] • dscp-queue — Indicates the DSCP to queue map. Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 259: Radius Commands

    Radius Commands radius-server host The radius-server host Global Configuration mode command specifies a RADIUS server host. To delete the specified RADIUS host, use the no form of this command. Syntax radius-server host {ip-address | hostname} [auth-port auth-port-number] [timeout timeout] [retransmit retries] [deadtime deadtime] [key key-string] [source source] [priority priority] [usage type] no radius-server host {ip-address | hostname} •...
  • Page 260: Radius-Server Key

    Default Configuration No RADIUS server host is specified. The port number for authentication requests is 1812. The usage type is all. Command Mode Global Configuration mode User Guidelines • To specify multiple hosts, multiple radius-server host commands can be used. •...
  • Page 261: Radius-Server Retransmit

    Example The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. Console(config)# radius-server key dell-server radius-server retransmit The radius-server retransmit Global Configuration mode command specifies the number of times the software searches the list of RADIUS server hosts. To reset the default configuration, use the no form of this command.
  • Page 262: Radius-Server Timeout

    Syntax radius-server source-ip source no radius-source-ip source • source — Specifies a valid source IP address. Default Configuration The source IP address is the IP address of the outgoing IP interface. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example configures the source IP address used for communication with RADIUS servers to 10.1.1.1.
  • Page 263: Radius-Server Deadtime

    Example The following example configures the timeout interval to 5 seconds. Console(config)# radius-server timeout 5 radius-server deadtime The radius-server deadtime Global Configuration mode command improves RADIUS response time when servers are unavailable. The command is used to cause the unavailable servers to be skipped.
  • Page 264 Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example displays RADIUS server settings. Console# show radius-servers Port TimeOut Retransmit DeadTime Source Priority Usage address Auth --------- ---- ------- ---------- ------ -------- -------- ----- 172.16.1.1 1645 Global...
  • Page 265: Show Rmon Statistics

    RMON Commands show rmon statistics The show rmon statistics User EXEC mode command displays RMON Ethernet statistics. Syntax show rmon statistics {ethernet interface number | port-channel port-channel-number} • interface number — Valid Ethernet port. • port-channel-number — Valid port-channel number. Default Configuration This command has no default configuration.
  • Page 266: Rmon Commands

    The following table describes significant fields shown above: Field Description Octets The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). Packets The total number of packets (including bad packets, broadcast packets, and multicast packets) received.
  • Page 267: Rmon Collection History

    512 to 1023 Octets The total number of packets (including bad packets) received that are between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). 1024 to 1518 Octets The total number of packets (including bad packets) received that are between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).
  • Page 268: Show Rmon Collection History

    show rmon collection history The show rmon collection history User EXEC mode command displays the requested RMON history group statistics. Syntax show rmon collection history [ethernet interface | port-channel port-channel-number] • interface — Valid Ethernet port. (Full syntax: unit/port) • port-channel-number —...
  • Page 269: Show Rmon History

    show rmon history The show rmon history User EXEC mode command displays RMON Ethernet history statistics. Syntax show rmon history index {throughput | errors | other} [period seconds] • index — Specifies the requested set of samples. (Range: 1 - 65535) •...
  • Page 270 Console> show rmon history 1 errors Sample Set: 1 Owner: Me Interface: 1/e1 Interval: 1800 Requested samples: 50 Granted samples: 50 Maximum table size: 500 (800 after reset) Time CRC Align Undersize Oversize Fragments Jabbers ---------- --------- --------- -------- --------- ------- Jan 18 2002 21:57:00...
  • Page 271: Rmon Alarm

    Multicast The number of good packets received during this sampling interval that were directed to a multicast address. This number does not include packets addressed to the broadcast address. Util The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent.
  • Page 272 Syntax rmon alarm index variable interval rthreshold fthreshold revent fevent [type type] [startup direction] [owner name] no rmon alarm index • index — Specifies the alarm index. (Range: 1-65535) • variable — Specifies the object identifier of the particular variable to be sampled. •...
  • Page 273: Show Rmon Alarm-Table

    • Rising threshold event index — 10 • Falling threshold event index — 20 Console(config)# rmon alarm 1000 dell 360000 1000000 1000000 10 20 show rmon alarm-table The show rmon alarm-table User EXEC mode command displays the alarms table. Syntax...
  • Page 274: Show Rmon Alarm

    The following table describes significant fields shown above: Field Description Index An index that uniquely identifies the entry. Monitored variable OID. Owner The entity that configured this entry. show rmon alarm The show rmon alarm User EXEC mode command displays alarm configuration. Syntax show rmon alarm number •...
  • Page 275 Example The following example displays RMON 1 alarms. Console> show rmon alarm 1 Alarm 1 ------- OID: 1.3.6.1.2.1.2.2.1.10.1 Last sample Value: 878128 Interval: 30 Sample Type: delta Startup Alarm: rising Rising Threshold: 8700000 Falling Threshold: 78 Rising Event: 1 Falling Event: 1 Owner: CLI The following table describes the significant fields shown in the display: Field...
  • Page 276: Rmon Event

    Startup Alarm The alarm that may be sent when this entry is first set. If the first sample is greater than or equal to the rising threshold, and startup alarm is equal to rising or rising and falling, then a single rising alarm is generated. If the first sample is less than or equal to the falling threshold, and startup alarm is equal falling or rising and falling, then a single falling alarm is generated.
  • Page 277: Show Rmon Events

    User Guidelines • If log is specified as the notification type, an entry is made in the log table for each event. If trap is specified, an SNMP trap is sent to one or more management stations. Example The following example configures an event identified as index 10 and for which the device generates a notification in the log table.
  • Page 278: Show Rmon Log

    The following table describes significant fields shown above: Field Description Index An index that uniquely identifies the event. Description A comment describing this event. Type The type of notification that the device generates about this event. Can have the following values: none, log, trap, log-trap. In the case of log, an entry is made in the log table for each event.
  • Page 279: Rmon Table-Size

    Example The following example displays the RMON log table. Console> show rmon log Maximum table size: 500 Event Description Time ------- -------------- --------- Errors Jan 18 2002 23:48:19 Errors Jan 18 2002 23:58:17 High Broadcast Jan 18 2002 23:59:48 Console> show rmon log Maximum table size: 500 (800 after reset) Event Description...
  • Page 280 Default Configuration History table size is 270. Log table size is 200. Command Mode Global Configuration mode User Guidelines • The configured table size takes effect after the device is rebooted. Example The following example configures the maximum RMON history table sizes to 100 entries. Console(config)# rmon table-size history 100 D E L L C O N F I D E N T I A L –...
  • Page 281: Snmp Commands

    SNMP Commands snmp-server community The snmp-server community Global Configuration mode command configures the community access string to permit access to the SNMP protocol. To remove the specified community string, use the no form of this command. Syntax snmp-server community community [ro | rw | su] [ip-address][view view-name] snmp-server community-group community group-name [ip-address] no snmp-server community community [ip-address] •...
  • Page 282: Snmp-Server View

    – An internal security name is generated. – The internal security name for SNMPv1 and SNMPv2 security models is mapped to an internal group name. – The internal group name for SNMPv1 and SNMPv2 security models is mapped to a view- name (read-view and notify-view always, and for rw for write-view also) •...
  • Page 283 Default Configuration No view entry exists. Command Mode Global Configuration mode User Guidelines • This command can be entered multiple times for the same view record. • The number of views is limited to 64 including pre-configured views. • No check is made to determine that a MIB node corresponds to the "starting portion" of the OID until the first wildcard.
  • Page 284: Snmp-Server Group

    Examples The following example creates a view that includes all objects in the MIB-II system group except for sysServices (System 7) and all objects for interface 1 in the MIB-II interface group. Console(config)# snmp-server view user-view system included Console(config)# snmp-server view user-view system.7 excluded Console(config)# snmp-server view user-view ifEntry.*.1 included snmp-server group The snmp-server group Global Configuration mode command configures a new Simple...
  • Page 285: Snmp-Server User

    Default Configuration No group entry exists. Command Mode Global Configuration mode User Guidelines The index of the group name table is comprised of Group Name, Security Model, and Security Level. Different views for the same group can be defined with different security levels.
  • Page 286 • auth-md5 password—Indicates the HMAC-MD5-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters) • auth-sha password—Indicates the HMAC-SHA-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters) •...
  • Page 287: Snmp-Server Engineid Local

    snmp-server engineID local The snmp-server engineID local Global Configuration mode command specifies the Simple Network Management Protocol (SNMP) engineID on the local device. To remove the configured engine ID, use the no form of this command. Syntax snmp-server engineID local {engineid-string | default} no snmp-server engineID local •...
  • Page 288: Snmp-Server Enable Traps

    • Changing the value of the engine ID has the following important side-effect. A user's password (entered on the command line) is converted to an MD5 or SHA security digest. This digest is based on both the password and the local engine ID. The user’s command line password is then destroyed, as required by RFC 2274.
  • Page 289: Snmp-Server Filter

    snmp-server filter The snmp-server filter Global Configuration mode command creates or updates a Simple Network Management Protocol (SNMP) server filter entry. To remove the specified SNMP server filter entry, use the no form of this command. Syntax snmp-server filter filter-name oid-tree {included | excluded} no snmp-server filter filter-name [oid-tree] •...
  • Page 290: Snmp-Server Host

    snmp-server host The snmp-server host Global Configuration mode command specifies the recipient of Simple Network Management Protocol Version 1 or Version 2 notifications. To remove the specified host, use the no form of this command. Syntax snmp-server host {ip-address | hostname} community-string [traps | informs] [1 | 2] [udp- port port] [filter filtername] [timeout seconds] [retries retries] no snmp-server host {ip-address | hostname} [traps | informs] ip-address—Specifies the IP address of the host (targeted recipient).
  • Page 291: Snmp-Server V3-Host

    User Guidelines • When configuring an SNMPv1 or SNMPv2 notification recipient, a notification view for that recipient is automatically generated for all the MIB. • When configuring an SNMPv1 notification recipient, the Inform option cannot be selected. • If a trap and inform are defined on the same target, and an inform was sent, the trap is not sent.
  • Page 292: Snmp-Server Trap Authentication

    • seconds—Specifies the number of seconds to wait for an acknowledgment before resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-300) • retries—Specifies the maximum number of times to resend an inform request, when a response is not received for a generated message. If unspecified, the default maximum number of retries is 3.
  • Page 293: Snmp-Server Contact

    Examples The following example enables SNMP failed authentication traps. Console(config)# snmp-server trap authentication snmp-server contact The snmp-server contact Global Configuration mode command configures the system contact (sysContact) string. To remove system contact information, use the no form of the command. Syntax snmp-server contact text no snmp-server contact...
  • Page 294: Snmp-Server Set

    Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines Do not include spaces in the text string or place text that includes spaces inside quotation marks. Example The following example defines the device location as New_York. Console(config)# snmp-server location New_York snmp-server set The snmp-server set Global Configuration mode command defines the SNMP MIB value.
  • Page 295: Show Snmp

    Examples The following example configures the scalar MIB sysName with the value dell. Console(config)# snmp-server set sysName sysname dell show snmp The show snmp Privileged EXEC mode command displays the SNMP status. Syntax show snmp Default Configuration This command has no default configuration.
  • Page 296 Community-string Group name IP address ---------------- ---------- ---------- public user-group Traps are enabled. Authentication trap is enabled. Version 1,2 notifications Target Address Type Community Version Filter Retries Port Name -------------- ----- --------- ------- ---- ------ ------- 192.122.173.42 Trap public Inform public 192.122.173.42 Version 3 notifications Security...
  • Page 297: Show Snmp Engineid

    show snmp engineid The show snmp engineID Privileged EXEC mode command displays the ID of the local Simple Network Management Protocol (SNMP) engine. Syntax show snmp engineID Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 298: Show Snmp Groups

    Example The following example displays the configuration of views. Console# show snmp views Name OID Tree Type ----------- ----------------------- --------- user-view 1.3.6.1.2.1.1 Included user-view 1.3.6.1.2.1.1.7 Excluded user-view 1.3.6.1.2.1.2.2.1.*.1 Included show snmp groups The show snmp groups Privileged EXEC mode command displays the configuration of groups. Syntax show snmp groups [groupname] •...
  • Page 299: Show Snmp Groups

    Example The following example displays the configuration of views. Console# show snmp groups Name Security Views Model Level Read Write Notify -------------- ----- ----- ------- ------- ------- user-group priv Default "" "" managers-group priv Default Default "" managers-group priv Default ""...
  • Page 300: Show Snmp Filters

    show snmp filters The show snmp filters Privileged EXEC mode command displays the configuration of filters. Syntax show snmp filters [filtername] • filtername—Specifies the name of the filter. (Range: 1-30) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 301: Show Snmp Users

    show snmp users The show snmp users Privileged EXEC mode command displays the configuration of users. Syntax show snmp users [username] • username—Specifies the name of the user. (Range: 1-30) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 302 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY SNMP Commands...
  • Page 303: Spanning-Tree Commands

    Spanning-Tree Commands spanning-tree The spanning-tree Global Configuration mode command enables spanning-tree functionality. To disable spanning-tree functionality, use the no form of this command. Syntax spanning-tree no spanning-tree Default Configuration Spanning-tree is enabled. Command Modes Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example enables spanning-tree functionality.
  • Page 304: Spanning-Tree Forward-Time

    Default Configuration STP is enabled. Command Modes Global Configuration mode User Guidelines • In RSTP mode, the device uses STP when the neighbor device uses STP. • In MSTP mode, the device uses RSTP when the neighbor device uses RSTP and uses STP when the neighbor device uses STP.
  • Page 305: Spanning-Tree Hello-Time

    Example The following example configures the spanning tree bridge forwarding time to 25 seconds. Console(config)# spanning-tree forward-time 25 spanning-tree hello-time The spanning-tree hello-time Global Configuration mode command configures the spanning tree bridge hello time, which is how often the device broadcasts Spanning Tree BPDUs to other devices.To return to the default configuration, use the no form of this command.
  • Page 306: Spanning-Tree Priority

    Default Configuration The default maximum age for IEEE Spanning Tree Protocol (STP) is 20 seconds. Command Modes Global Configuration mode User Guidelines • When configuring the maximum age, the following relationships should be kept: – 2*(Forward-Time - 1) >= Max-Age –...
  • Page 307: Spanning-Tree Disable

    spanning-tree disable The spanning-tree disable Interface Configuration mode command disables spanning tree on a specific port. To enable spanning tree on a port, use the no form of this command. Syntax spanning-tree disable no spanning-tree disable Default Configuration Spanning tree is enabled on all ports. Command Modes Interface Configuration (Ethernet, port-channel) mode User Guidelines...
  • Page 308: Spanning-Tree Port-Priority

    Default Configuration Default path cost is determined by port speed and path cost method (long or short) as shown below: Interface Long Short Port-channel 20,000 Gigabit Ethernet (1000 Mbps) 20,000 Fast Ethernet (100 Mbps) 200,000 Ethernet (10 Mbps) 2,000,000 Command Modes Interface Configuration (Ethernet, port-channel) mode User Guidelines •...
  • Page 309: Spanning-Tree Portfast

    User Guidelines There are no user guidelines for this command. Example The following example configures the spanning priority on Ethernet port 1/e15 to 96. Console(config)# interface ethernet 1/e15 Console(config-if)# spanning-tree port-priority 96 spanning-tree portfast The spanning-tree portfast Interface Configuration mode command enables PortFast mode. In PortFast mode, the interface is immediately put into the forwarding state upon linkup without waiting for the standard forward time delay.
  • Page 310: Spanning-Tree Link-Type

    spanning-tree link-type The spanning-tree link-type Interface Configuration mode command overrides the default link- type setting determined by the duplex mode of the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. To return to the default configuration, use the no form of this command.
  • Page 311: Spanning-Tree Bpdu

    Default Configuration Short path cost method. Command Mode Global Configuration mode User Guidelines • This command applies to all spanning tree instances on the device. • The cost is set using the spanning-tree cost command. Example The following example sets the default path cost method to long. Console(config)# spanning-tree pathcost method long spanning-tree bpdu The spanning-tree bpdu Global Configuration mode command defines BPDU handling when...
  • Page 312: Clear Spanning-Tree Detected-Protocols

    clear spanning-tree detected-protocols The clear spanning-tree detected-protocols Privileged EXEC mode command enables the user to set the switches back to RSTP mode without rebooting the device. Syntax clear spanning-tree detected-protocols [ethernet interface | port-channel port-channel- number] • interface — A valid Ethernet port. •...
  • Page 313: Spanning-Tree Mst Max-Hops

    Command Mode Global Configuration mode User Guidelines • The device with the lowest priority is selected as the root of the spanning tree. Example The following example configures the spanning tree priority of instance 1 to 4096. Console(config)# spanning-tree mst 1 priority 4096 spanning-tree mst max-hops The spanning-tree mst max-hops Global Configuration mode command configures the number of hops in an MST region before the BDPU is discarded and the port information is aged out.
  • Page 314: Spanning-Tree Mst Port-Priority

    spanning-tree mst port-priority The spanning-tree mst port-priority Interface Configuration mode command configures port priority for the specified MST instance. To return to the default configuration, use the no form of this command. Syntax spanning-tree mst instance-id port-priority priority no spanning-tree mst instance-id port-priority •...
  • Page 315: Spanning-Tree Mst Configuration

    Default Configuration Default path cost is determined by port speed and path cost method (long or short) as shown below: Interface Long Short Port-channel 20,000 Gigabit Ethernet (1000 Mbps) 20,000 Fast Ethernet (100 Mbps) 200,000 Ethernet (10 Mbps) 2,000,000 Command Modes Interface Configuration (Ethernet, port-channel) mode User Guidelines There are no user guidelines for this command.
  • Page 316: Instance (Mst)

    Example The following example configures an MST region. Console(config)# spanning-tree mst configuration Console(config-mst) # instance 1 add vlan 10-20 Console(config-mst) # name region1 Console(config-mst) # revision 1 instance (mst) The instance MST Configuration mode command maps VLANS to an MST instance. Syntax instance instance-id {add | remove} vlan vlan-range •...
  • Page 317: Name (Mst)

    name (mst) The name MST Configuration mode command defines the MST region name. To return to the default setting, use the no form of this command. Syntax name string no name • string—MST configuration name. Case-sensitive (Range: 1-32 characters). Default Configuration The default name is a bridge ID.
  • Page 318: Show (Mst)

    User Guidelines There are no user guidelines for this command. Example The following example sets the configuration revision to 1. Console(config)# spanning-tree mst configuration Console(config-mst)# revision 1 show (mst) The show MST Configuration mode command displays the current or pending MST region configuration.
  • Page 319: Exit (Mst)

    Example The following example displays a pending MST region configuration. Console(config-mst)# show pending Pending MST configuration Name: Region1 Revision: 1 Instance Vlans Mapped State -------- ------------ ----- 1-9,21-4094 Enabled 10-20 Enabled exit (mst) The exit MST Configuration mode command exits the MST configuration mode and applies all configuration changes.
  • Page 320: Abort (Mst)

    abort (mst) The abort MST Configuration mode command exits the MST configuration mode without applying the configuration changes. Syntax abort Default Configuration This command has no default configuration. Command Mode MST Configuration mode User Guidelines There are no user guidelines for this command. Example The following example exits the MST configuration mode without saving changes.
  • Page 321 Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example displays spanning-tree information. Console# show spanning-tree Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 32768...
  • Page 322 1/e4 Enabled 128.4 20000 ALTN Shared (STP) 1/e5 Enabled 128.5 20000 Console# show spanning-tree Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 36864 Address 00:02:4b:29:7a:00 This switch is the root. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interfaces Name...
  • Page 323 Console# show spanning-tree Spanning tree disabled (BPDU filtering) mode RSTP Default port cost method: long Root ID Priority Address Path Cost Root Port Hello Time N/A Max Age N/A Forward Delay N/A Bridge ID Priority 36864 Address 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interfaces...
  • Page 324 Console# show spanning-tree active Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 36864 Address 00:02:4b:29:7a:00...
  • Page 325 Console# show spanning-tree blockedports Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 36864 Address 00:02:4b:29:7a:00...
  • Page 326 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 36864 Address 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Number of topology changes 2 last change occurred 2d18h ago Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15...
  • Page 327 Port 3 (1/e3) disabled State: N/A Role: N/A Port id: 128.3 Port cost: 20000 Type: N/A (configured: auto) Port Fast: N/A (configured:no) Designated bridge Priority: N/A Address: N/A Designated port id: N/A Designated path cost: N/A Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A Port 4 (1/e4) enabled State: Blocking...
  • Page 328 Console# show spanning-tree ethernet 1/e1 Port 1 (1/e1) enabled State: Forwarding Role: Root Port id: 128.1 Port cost: 20000 Type: P2p (configured: auto) RSTP Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:01:42:97:e0:00 Designated port id: 128.25 Designated path cost: 0 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Console# show spanning-tree mst-configuration...
  • Page 329 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec IST Master ID Priority 32768 Address 00:02:4b:29:7a:00 This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops Interfaces Name State Prio.Nbr...
  • Page 330 Interfaces Name State Prio.Nbr Cost Role PortFast Type ---- ------- -------- ----- ---- -------- ---------- 1/e1 Enabled 128.1 20000 Boun P2p Bound (RSTP) 1/e2 Enabled 128.2 20000 Boun Shared Bound (STP) 1/e3 Enabled 128.3 20000 Altn 1/e4 Enabled 128.4 20000 Desg Console# show spanning-tree detail Spanning tree enabled mode MSTP...
  • Page 331 Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15 Port 1 (1/e1) enabled State: Forwarding Role: Root Port id: 128.1 Port cost: 20000 Type: P2p (configured: auto) Boundary RSTP Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:01:42:97:e0:00 Designated port id: 128.25...
  • Page 332 Port 4 (1/e4) enabled State: Forwarding Role: Designated Port id: 128.4 Port cost: 20000 Type: Shared (configured: auto) Internal Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:02:4b:29:7a:00 Designated port id: 128.2 Designated path cost: 20000 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 ###### MST 1 Vlans Mapped: 10-20 Root ID...
  • Page 333 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Port 2 (1/e2) enabled State: Forwarding Role: Designated Port id: 128.2 Port cost: 20000 Type: Shared (configured: auto) Boundary STP Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:02:4b:29:7a:00 Designated port id: 128.2 Designated path cost: 20000...
  • Page 334 Console# show spanning-tree Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec IST Master ID Priority...
  • Page 335: Spanning-Tree Guard Root

    ###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority 32768 Address 00:01:42:97:e0:00 This switch is root for CST and IST master. Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops spanning-tree guard root Use the spanning-tree guard root interface configuration command to enable root guard on all the spanning tree instances on that interface.
  • Page 336 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Spanning-Tree Commands...
  • Page 337: Ssh Commands

    SSH Commands ip ssh port The ip ssh port Global Configuration mode command specifies the port to be used by the SSH server. To return to the default configuration, use the no form of this command. Syntax ip ssh port port-number no ip ssh port •...
  • Page 338: Crypto Key Generate Dsa

    Default Configuration Device configuration from a SSH server is enabled. Command Mode Global Configuration mode User Guidelines • If encryption keys are not generated, the SSH server is in standby until the keys are generated. To generate SSH server keys, use the crypto key generate dsa, and crypto key generate rsa Global Configuration mode commands.
  • Page 339: Crypto Key Generate Rsa

    Example The following example generates DSA key pairs. Console(config)# crypto key generate dsa crypto key generate rsa The crypto key generate rsa Global Configuration mode command generates RSA key pairs. Syntax crypto key generate rsa Default Configuration RSA key pairs do not exist. Command Mode Global Configuration mode User Guidelines...
  • Page 340: Crypto Key Pubkey-Chain Ssh

    Syntax ip ssh pubkey-auth no ip ssh pubkey-auth Default Configuration Public Key authentication for incoming SSH sessions is disabled. Command Mode Global Configuration mode User Guidelines AAA authentication is independent Example The following example enables public key authentication for incoming SSH sessions. Console(config)# ip ssh pubkey-auth crypto key pubkey-chain ssh The crypto key pubkey-chain ssh Global Configuration mode command enters the SSH Public...
  • Page 341: User-Key

    Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob Console(config-pubkey-key)# key-string rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+...
  • Page 342: Key-String

    Default Configuration No SSH public keys exist. Command Mode SSH Public Key-string Configuration mode User Guidelines Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key. Example The following example enables manually configuring an SSH public key for SSH public key- chain bob.
  • Page 343 User Guidelines • Use the key-string SSH Public Key-string Configuration mode command to specify which SSH public key is to be interactively configured next. To complete the command, you must enter a row with no characters. • Use the key-string row SSH Public Key-string Configuration mode command to specify the SSH public key row by row.
  • Page 344: Show Ip Ssh

    show ip ssh The show ip ssh Privileged EXEC mode command displays the SSH server configuration. Syntax show ip ssh Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the SSH server configuration.
  • Page 345: Show Crypto Key Mypubkey

    show crypto key mypubkey The show crypto key mypubkey Privileged EXEC mode command displays the SSH public keys on the device. Syntax show crypto key mypubkey [rsa | dsa] • rsa — Indicates the RSA key. • dsa — Indicates the DSA key. Default Configuration This command has no default configuration.
  • Page 346: Show Crypto Key Pubkey-Chain Ssh

    show crypto key pubkey-chain ssh The show crypto key pubkey-chain ssh Privileged EXEC mode command displays SSH public keys stored on the device. Syntax show crypto key pubkey-chain ssh [username username] [fingerprint {bubble-babble | hex}] • username — Specifies the remote SSH client username. •...
  • Page 347: Crypto Slogin Key Generate Dsa

    crypto slogin key generate dsa The crypto slogin key generate dsa Global Configuration mode command generates DSA key pairs for secure login to remote access servers. Syntax crypto slogin key generate dsa Default Configuration DSA key pairs do not exist. Command Mode Global Configuration mode User Guidelines...
  • Page 348: Show Crypto Slogin Key Mypubkey

    Command Mode Global Configuration mode User Guidelines • Use this command to generate RSA key pairs Secure Copy. • RSA keys are generated in pairs: one public RSA key and one private RSA key. If the device already has Slogin RSA keys, a warning and prompt to replace the existing keys with new keys are displayed.
  • Page 349 Example The following example displays the secure login public RSA keys of the device Console# show crypto slogin key mypubkey rsa RSA key data: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2 BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768 Fingerprint(Hex):...
  • Page 350 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY SSH Commands...
  • Page 351: Syslog Commands

    Syslog Commands logging on The logging on Global Configuration mode command controls error message logging. This command sends debug or error messages to a logging process, which logs messages to designated locations asynchronously to the process that generated the messages. To disable the logging process, use the no form of this command.
  • Page 352: Logging Console

    Syntax logging {ip-address | hostname} [port port] [severity level] [facility facility] [description text] no logging {ip-address | hostname} • ip-address — IP address or URL of the host to be used as a syslog server. • hostname — Specifies the host name of the syslog server. (Range: 1-158 characters) •...
  • Page 353: Logging Buffered

    Syntax logging console level no logging console • level — Specifies the severity level of logged messages displayed on the console. Possible values: emergencies, alerts, critical, errors, warnings, notifications, informational, debugging. Default Configuration The default severity level is informational. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command.
  • Page 354: Logging Buffered Size

    User Guidelines • All the syslog messages are logged to the internal buffer. This command limits the messages displayed to the user. Example The following example limits syslog messages displayed from an internal buffer based on severity level debugging. Console(config)# logging buffered debugging logging buffered size The logging buffered size Global Configuration mode command changes the number of syslog messages stored in the internal buffer.
  • Page 355: Clear Logging

    clear logging The clear logging Privileged EXEC mode command clears messages from the internal logging buffer. Syntax clear logging Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example clears messages from the internal logging buffer.
  • Page 356: Clear Logging File

    User Guidelines There are no user guidelines for this command. Example The following example limits syslog messages sent to the logging file based on severity level alerts. Console(config)# logging file alerts clear logging file The clear logging file Privileged EXEC mode command clears messages from the logging file. Syntax clear logging file Default Configuration...
  • Page 357: File-System Logging

    Default Configuration Logging AAA login events is enabled. Command Mode Global Configuration mode User Guidelines Other types of AAA events are not subject to this command. Example The following example enables logging messages related to AAA login events. Console(config)# aaa logging login file-system logging The file-system logging Global Configuration mode command enables logging file system events in the syslog.
  • Page 358: Management Logging

    management logging The management logging global configuration command enables logging management access list (ACL) events in the syslog. To disable logging management access list events, use the no form of this command. Syntax management logging deny no management logging deny •...
  • Page 359 Example The following example displays the state of logging and the syslog messages stored in the internal buffer. Console# show logging Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity). Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max.
  • Page 360: Show Logging File

    Buffer log: 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console...
  • Page 361 User Guidelines There are no user guidelines for this command. Example The following example displays the logging state and the syslog messages stored in the logging file. Console# show logging file Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity).
  • Page 362: Show Syslog-Servers

    Buffer log: 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console...
  • Page 363 User Guidelines There are no user guidelines for this command. Example The following example displays the settings of the syslog servers. Console# show syslog-servers Device Configuration IP address Port Severity Facility Description ------------ ---- ------------- -------- ----------- 192.180.2.27 Informational local7 192.180.2.28 Warning local7...
  • Page 364 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Syslog Commands...
  • Page 365: System Management

    System Management ping The ping User EXEC mode command sends ICMP echo request packets to another node on the network. Syntax ping {ip-address | hostname }[size packet_size] [count packet_count] [timeout time_out] • ip-address — IP address to ping. • hostname — Host name to ping. (Range: 1-158 characters) •...
  • Page 366 Examples The following example displays pinging results: Console> ping 10.1.1.1 Pinging 10.1.1.1 with 64 bytes of data: 64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms 64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms ----10.1.1.1 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11...
  • Page 367: Traceroute

    traceroute The traceroute User EXEC mode command discovers routes that packets actually take when traveling to their destination. Syntax traceroute {ip-address |hostname }[size packet_size] [ttl max-ttl] [count packet_count] [timeout time_out] [source ip-address] [tos tos] • ip-address — IP address of the destination host. •...
  • Page 368 • The traceroute command sends out one probe at a time. Each outgoing packet may result in one or two error messages. A "time exceeded" error message indicates that an intermediate router has seen and discarded the probe. A "destination unreachable" error message indicates that the destination node has received the probe and discarded it because it could not deliver the packet.
  • Page 369: Telnet

    The following table describes significant fields shown above. Field Description Indicates the sequence number of the device in the path to the host. i2-gateway.stanford.edu Host name of this device. 192.68.191.83 IP address of this device. 1 msec 1 msec 1 msec Round-trip time for each probe sent.
  • Page 370 Default Configuration The default port is the Telnet port (decimal23) on the host. Command Mode User EXEC mode User Guidelines • Telnet software supports special Telnet commands in the form of Telnet sequences that map generic terminal control functions to operating system-specific functions. To enter a Telnet sequence, press the escape sequence keys (Ctrl-shift-6) followed by a Telnet command character.
  • Page 371 Keywords Table Options Description /echo Enables local echo. /quiet Prevents onscreen display of all messages from the software. /source-interface Specifies the source interface. /stream Turns on stream processing, which enables a raw TCP stream with no Telnet control sequences. A stream connection does not process Telnet options and can be appropriate for connections to ports running UNIX-to-UNIX Copy Program (UUCP) and other non-Telnet protocols.
  • Page 372: Resume

    pim-auto-rp PIM Auto-RP pop2 Post Office Protocol v2 pop3 Post Office Protocol v3 smtp Simple Mail Transport Protocol sunrpc Sun Remote Procedure Call syslog Syslog tacacs TAC Access Control System talk Talk telnet Telnet time Time uucp Unix-to-Unix Copy Program whois Nickname World Wide Web...
  • Page 373: Reload

    User Guidelines There are no user guidelines for this command. Examples The following command switches to open Telnet session number 1. Console> resume 1 reload The reload Privileged EXEC mode command reloads the operating system. Syntax reload Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines...
  • Page 374: Hostname

    User Guidelines There are no user guidelines for this command. Example The following example specifies the device host name. Console(config)# hostname Dell Dell(config)# stack master The stack master Global Configuration mode command enables forcing the selection of a stack master. To return to the default configuration, use the no form of this command.
  • Page 375: Stack Reload

    User Guidelines • The following algorithm is used to select a unit as the master: – If only one master-enabled unit is in the stack (1 or 2), it becomes the master. – If a unit configured as a forced master, it becomes the master. If a forced master unit is removed from a stack and placed in a different stack with another forced master unit, both are considered to be forced, and the election criteria continue as follows:...
  • Page 376: Stack Display-Order

    stack display-order The stack display-order Global Configuration mode command configures the order of the units in the display. To return to the default configuration, use the no form of this command. Syntax stack display-order top unit bottom unit no stack display-order •...
  • Page 377 User Guidelines There are no user guidelines for this command. Example The following example displays stack status. Console> show stack Unit Address Software Master Uplink Downlink Status ---- ----------------- -------- ------ ------ -------- ------ 00:00:b0:87:12:11 1.0.0.0 Enabled Slave 00:00:b0:87:12:13 1.0.0.0 Enabled Master 00:00:b0:87:12:14 1.0.0.0...
  • Page 378: Show Users

    Console> show stack 1 Unit 1: MAC address: 00:00:b0:87:12:11 Master: Forced. Product: PowerCOnnect34xx. Software: 1.0.0.0 Status: Master Active image: image-1. Selected for next boot: image-2. show users The show users User EXEC mode command displays information about the active users. Syntax show users Default Configuration...
  • Page 379: Show Sessions

    show sessions The show sessions User EXEC mode command lists open Telnet sessions. Syntax show sessions Default Configuration There is no default configuration for this command. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command. Examples The following example lists open Telnet sessions.
  • Page 380: Show System

    User Guidelines There are no user guidelines for this command. Example The following example displays the system information. Console> show system Unit Type ---- ----------------- PowerConnect 3424 Unit Main Power Supply Redundant Power Supply ---- ----------------- ---------------------- Unit Fan1 Fan2...
  • Page 381: Show Version

    show version The show version User EXEC mode command displays system version information. Syntax show version [unit unit] • unit— Specifies the number of the unit. (Range: 1-6) Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 382: Show System Id

    Syntax asset-tag [unit unit] tag no asset-tag [unit unit] • unit— Specifies the number of the unit. (Range: 1-6) • tag — Specifies the asset tag of the device. (Range: 1- 16 characters) Default Configuration No asset tag is defined. The default unit number is that of the master unit Command Mode Global Configuration mode...
  • Page 383: Service Cpu-Utilization

    Example The following example displays system service and asset tag information. Console> show system id Service Tag: 89788978 Serial number: 8936589782 Asset tag: 7843678957 Unit Service tag Serial number Asset tag ---- ----------- ------------ --------- 89788978 893659782 7843678957 34254675 3216523877 5621987728 service cpu-utilization The service cpu-utilization Global Configuration mode command enables measuring CPU...
  • Page 384: Show Cpu Utilization

    show cpu utilization The show cpu utilization Privileged EXEC mode command displays display information about CPU utilization. Syntax show cpu utilization Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode User Guidelines • Use the service cpu-utilization Global Configuration mode command to enable measuring CPU utilization.
  • Page 385: Tacacs+ Commands

    TACACS+ Commands tacacs-server host The tacacs-server host Global Configuration mode command specifies a TACACS+ host. To delete the specified name or address, use the no form of this command. Syntax tacacs-server host {ip-address | hostname} [single-connection] [port port-number] [timeout timeout] [key key-string] [source source] [priority priority] no tacacs-server host {ip-address | hostname} •...
  • Page 386: Tacacs-Server Key

    The following example sets the authentication encryption key. Console(config)# tacacs-server key dell-s D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY...
  • Page 387: Tacacs-Server Timeout

    tacacs-server timeout The tacacs-server timeout Global Configuration mode command sets the interval during which the device waits for a TACACS+ server to reply. To return to the default configuration, use the no form of this command. Syntax tacacs-server timeout timeout no tacacs-server timeout •...
  • Page 388: Show Tacacs

    User Guidelines There are no user guidelines for this command. Examples The following example specifies the source IP address. Console(config)# tacacs-server source-ip 172.16.8.1 show tacacs The show tacacs Privileged EXEC mode command displays configuration and statistical information about a TACACS+ server. Syntax show tacacs [ip-address] •...
  • Page 389 Global values ------------- TimeOut: 3 Device Configuration --------------------- Source IP: 172.16.8.1 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY TACACS+ Commands...
  • Page 390 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY TACACS+ Commands...
  • Page 391: User Interface

    User Interface enable The enable User EXEC mode command enters the Privileged EXEC mode. Syntax enable [privilege-level] • privilege-level — Privilege level to enter the system. (Range: 1 - 15) Default Configuration The default privilege level is 15. Command Mode User EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 392: Login

    Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example returns to Users EXEC mode. Console# disable Console> login The login User EXEC mode command changes a login username. Syntax login Default Configuration This command has no default configuration.
  • Page 393: Configure

    configure The configure Privileged EXEC mode command enters the Global Configuration mode. Syntax configure Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example enters Global Configuration mode. Console# configure Console(config)# exit (Configuration)
  • Page 394: Exit

    Example The following example changes the configuration mode from Interface Configuration mode to Privileged EXEC mode. Console(config-if)# exit Console(config)# exit Console# exit The exit Privileged/User EXEC mode command closes an active terminal session by logging off the device. Syntax exit Default Configuration This command has no default configuration.
  • Page 395: End

    The end command ends the current configuration session and returns to the Privileged EXEC mode. Syntax Default Configuration This command has no default configuration. Command Mode All configuration modes. User Guidelines There are no user guidelines for this command. Example The following example changes from Global Configuration mode to Privileged EXEC mode Console(config)# end Console#...
  • Page 396: Terminal Datadump

    Example The following example describes the help system Console# help Help may be requested at any point in a command by entering a question mark '?'. If nothing matches the currently entered incomplete command, the help list is empty. This indicates that for a query at this point, there is no command matching the current input.
  • Page 397: Show History

    Example This example dumps all output immediately after entering a show command. Console> terminal datadump show history The show history User EXEC mode command lists the commands entered in the current session. Syntax show history Default Configuration This command has no default configuration. Command Mode User EXEC mode User Guidelines...
  • Page 398: Show Privilege

    show privilege The show privilege Privileged/User EXEC mode command displays the current privilege level. Syntax show privilege Default Configuration This command has no default configuration. Command Mode Privileged and User EXEC modes User Guidelines There are no user guidelines for this command. Example The following example displays the current privilege level for the Privileged EXEC mode.
  • Page 399: Vlan Commands

    VLAN Commands vlan database The vlan database Global Configuration mode command enters the VLAN Configuration mode. Syntax vlan database Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example enters the VLAN database mode.
  • Page 400: Interface Vlan

    Default Configuration This command has no default configuration. Command Mode VLAN Configuration mode User Guidelines There are no user guidelines for this command. Example The following example VLAN number 1972 is created. Console(config)# vlan database Console(config-vlan)# vlan 1972 interface vlan The interface vlan Global Configuration mode command enters the Interface Configuration (VLAN) mode.
  • Page 401: Interface Range Vlan

    interface range vlan The interface range vlan Global Configuration mode command enables simultaneously configuring multiple VLANs. Syntax interface range vlan {vlan-range | all} • vlan-range — Specifies a list of VLAN IDs to be added. Separate non-consecutive VLAN IDs with a comma and no spaces; a hyphen designates a range of IDs. •...
  • Page 402: Private-Vlan Primary

    Default Configuration No name is defined. Command Mode Interface Configuration (VLAN) mode. Cannot be configured for a range of interfaces (range context). User Guidelines There are no user guidelines for this command. Example The following example gives VLAN number 19 the name Marketing. Console(config)# interface vlan 19 Console(config-if)# name Marketing private-vlan primary...
  • Page 403: Private-Vlan Isolated

    Example This example configures VLAN 200 as the primary private VLAN. Console# config Console(config)# vlan database Console(config-vlan)# vlan 200 Console(config-vlan)# exit Console(config)# interface vlan 200 Console(config-if)# private-vlan primary private-vlan isolated The private-vlan isolated Interface Configuration mode command configures the isolated VLAN of the PVLAN.
  • Page 404: Private-Vlan Community

    Example This example configures VLAN 20 as the isolated VLAN of primary private VLAN 200. Console# config Console(config)# vlan database Console(config-vlan)# vlan 200 Console(config-vlan)# exit Console(config)# interface vlan 200 Console(config-if)# private-vlan primary Console(config-if)# private-vlan isolated 20 private-vlan community The private-vlan community Interface Configuration mode command associates the primary VLAN with the community VLANs.
  • Page 405: Switchport Mode

    Example This example associates primary private VLAN 200 with community private VLAN 2. Console# config Console(config)# vlan database Console(config-vlan)# vlan 200 Console(config-vlan)# exit Console(config)# interface vlan 200 Console(config-if)# private-vlan community add 2 switchport mode The switchport mode Interface Configuration mode command configures the VLAN membership mode of a port.
  • Page 406: Switchport Access Vlan

    Example The following example configures Ethernet port 1/e16 as an untagged layer 2 VLAN port. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport mode access switchport access vlan The switchport access vlan Interface Configuration mode command configures the VLAN ID when the interface is in access mode. To return to the default configuration, use the no form of this command.
  • Page 407: Switchport Private-Vlan

    switchport private-vlan The switchport private-vlan Interface Configuration command configures private-vlan port VLANs. To return to the default configuration, use the no form of this command. Syntax switchport private-vlan promiscuous pvlan no switchport private-vlan promiscuous switchport private-vlan isolated pvlan no switchport private-vlan isolated switchport private-vlan community cvlan no switchport private-vlan community •...
  • Page 408: Show Vlan Private-Vlan

    Example This example configures private VLAN 200 as the primary private VLAN and associates it with promiscuous private VLAN Ethernet port 1/e10. Console# config Console(config)# vlan database Console(config-vlan)# vlan 200 Console(config-vlan)# exit Console(config)# interface vlan 200 Console(config-if)# private-vlan primary Console(config-if)# exit Console(config)# interface ethernet 1/e10 Console(config-if)# switchport private-vlan promiscuous 200 show vlan private-vlan...
  • Page 409 Example The following example displays information about specific private VLANs. Console# show vlan private-vlan Primary Isolated Community ------- -------- --------- 102, 103 202, 203 Console# show vlan private-vlan primary 100 Primary VLAN: 100 Isolated VLAN: 101 Community VLANs: 102, 103 Promiscuous ports: 1/e19, 2/e19 Isolated ports: 1/e1-e8, 2/e1-e8 Community...
  • Page 410: Switchport Trunk Allowed Vlan

    switchport trunk allowed vlan The switchport trunk allowed vlan Interface Configuration mode command adds or removes VLANs to or from a trunk port. Syntax switchport trunk allowed vlan {add vlan-list | remove vlan-list } • add vlan-list — List of VLAN IDs to be added. Separate non-consecutive VLAN IDs with a comma and no spaces.
  • Page 411: Switchport General Allowed Vlan

    Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines • The command adds the port as a member in the VLAN. If the port is already a member in the VLAN (not as a native), it should be first removed from the VLAN. Example The following example configures VLAN number 123 as the native VLAN when Ethernet port 1/e16 is in trunk mode.
  • Page 412: Switchport General Pvid

    User Guidelines • This command enables changing the egress rule (e.g., from tagged to untagged) without first removing the VLAN from the list. Example The following example adds VLANs 2, 5, and 6 to the allowed list of Ethernet port 1/e16 . Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general allowed vlan add 2,5-6 tagged...
  • Page 413: Switchport General Ingress-Filtering Disable

    switchport general ingress-filtering disable The switchport general ingress-filtering disable Interface Configuration mode command disables port ingress filtering. To return to the default configuration, use the no form of this command. Syntax switchport general ingress-filtering disable no switchport general ingress-filtering disable Default Configuration Ingress filtering is enabled.
  • Page 414: Switchport Forbidden Vlan

    User Guidelines There are no user guidelines for this command. Example The following example configures Ethernet port 1/e16 to discard untagged frames at ingress. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general acceptable-frame-type tagged-only switchport forbidden vlan The switchport forbidden vlan Interface Configuration mode command forbids adding specific VLANs to a port.
  • Page 415: Switchport Customer Vlan

    switchport customer vlan Use the switchport customer vlan interface configuration command set the port’s VLAN when the interface is in customer mode. Use the no form of this command to revert to default. Syntax switchport customer vlan vlan-id no switchport customer vlan vlan-id —...
  • Page 416: Mac-To-Vlan

    Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines • An internal usage VLAN is required when an IP interface is configured on an Ethernet port or port-channel. • This command enables the user to configure the internal usage VLAN of a port. If an internal usage VLAN is not configured and the user wants to configure an IP interface, an unused VLAN is selected by the software.
  • Page 417: Show Vlan Mac-To-Vlan

    User Guidelines • The associated VLAN cannot be the default VLAN. • Up to 256 MAC addresses can be mapped to a VLAN. • A MAC can be mapped to only one VLAN. If the same MAC is mapped to more than one VLAN, it is effectively mapped only according to the last mapping.
  • Page 418: Show Vlan

    0060.704c.73ff 0060.708c.73ff deny show vlan The show vlan Privileged EXEC mode command displays VLAN information. Syntax show vlan [id vlan-id | name vlan-name ] • vlan-id — specifies a VLAN ID • vlan-name — Specifies a VLAN name string. (Range: 1 - 32 characters) Default Configuration This command has no default configuration.
  • Page 419: Show Vlan Internal Usage

    show vlan internal usage The show vlan internal usage Privileged EXEC mode command displays a list of VLANs used internally by the device. Syntax show vlan internal usage Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command.
  • Page 420 Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the switchport configuration for Ethernet port 1/e1. Console# show interface switchport ethernet 1/e1 Port 1/e1: VLAN Membership mode: General Operating parameters: PVID: 1 (default) Ingress Filtering: Enabled Acceptable Frame Type: All...
  • Page 421 Port is statically configured to: Vlan Name Egress rule ---- ------- ----------- default untagged VLAN011 tagged IPv6 VLAN untagged VLAN0072 untagged Forbidden VLANS: VLAN Name ---- ---- Console# show interface switchport ethernet 1/e2 Port 1/e2: VLAN Membership mode: General Operating parameters: PVID: 4095 (discard vlan) Ingress Filtering: Enabled Acceptable Frame Type: All...
  • Page 422 Port is statically configured to: Vlan Name Egress rule ---- ------------ ----------- VLAN0072 untagged IP Telephony tagged Forbidden VLANS: VLAN Name ---- ---- Port 2/e19 VLAN Membership mode: Private-VLAN Community Primary VLAN: 2921 Community VLAN: 2922 Console# show interfaces switchport ethernet 2/e19 Port 2/e19: VLAN Membership mode: Private-VLAN Community Operating parameters:...
  • Page 423 Port is member in: Vlan Name Egress rule Type ---- ------------ ----------- ------ 2921 Primary A untagged Static 2922 Community A1 untagged Static Static configuration: PVID: 2922 Ingress Filtering: Enabled Acceptable Frame Type: Untagged GVRP status: Disabled D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY VLAN Commands...
  • Page 424 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY VLAN Commands...
  • Page 425: Web Server

    Web Server ip http server The ip http server Global Configuration mode command enables configuring the device from a browser. To disable this function, use the no form of this command. Syntax ip http server no ip http server Default Configuration HTTP server is enabled.
  • Page 426: Ip Https Server

    Default Configuration The default port number is 80. Command Mode Global Configuration mode User Guidelines • Specifying 0 as the port number effectively disables HTTP access to the device. Example The following example configures the http port number to 100. Console(config)# ip http port 100 ip https server The ip https server Global Configuration mode command enables configuring the device from a...
  • Page 427: Ip Https Port

    ip https port The ip https port Global Configuration mode command specifies the TCP port used by the server to configure the device through the Web browser. To return to the default configuration, use the no form of this command. Syntax ip https port port-number no ip https port...
  • Page 428: Crypto Certificate Request

    • location — Specifies the location or city name. (Range: 1 - 64) • state — Specifies the state or province name. (Range: 1 - 64) • country — Specifies the country name. (Range: 2 - 2) • days — Specifies number of days certification is valid. (Range: 30 - 3650) Default Configuration The Certificate and SSL’s RSA key pairs do not exist.
  • Page 429 • common- name — Specifies the fully qualified URL or IP address of the device. (Range: 1- 64) • organization-unit — Specifies the organization-unit or department name. (Range: 1- 64) • organization — Specifies the organization name. (Range: 1- 64) •...
  • Page 430: Crypto Certificate Import

    Examples The following example generates and displays a certificate request for HTTPS. Console# crypto certificate 1 request -----BEGIN CERTIFICATE REQUEST----- MIwTCCASoCAQAwYjELMAkGA1UEBhMCUFAxCzAJBgNVBAgTAkNDMQswCQYDVQQH EwRDEMMAoGA1UEChMDZGxkMQwwCgYDVQQLEwNkbGQxCzAJBgNVBAMTAmxkMRAw DgKoZIhvcNAQkBFgFsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8ecwQ HdML0831i0fh/F0MV/Kib6Sz5p+3nUUenbfHp/igVPmFM+1nbqTDekb2ymCu6K aKvEbVLF9F2LmM7VPjDBb9bb4jnxkvwW/wzDLvW2rsy5NPmH1QVl+8Ubx3GyCm /oW93BSOFwxwEsP58kf+sPYPy+/8wwmoNtDwIDAQABoB8wHQYJKoZIhvcNAQkH MRDjEyMwgICCAgICAICAgIMA0GCSqGSIb3DQEBBAUAA4GBAGb8UgIx7rB05m+2 m5ZZPhIwl8ARSPXwhVdJexFjbnmvcacqjPG8pIiRV6LkxryGF2bVU3jKEipcZa g+uNpyTkDt3ZVU72pjz/fa8TF0n3 -----END CERTIFICATE REQUEST----- CN= router.gm.com 0= General Motors C= US crypto certificate import The crypto certificate import Global Configuration mode command imports a certificate signed by the Certification Authority for HTTPS.
  • Page 431 User Guidelines • Use this command to enter an external certificate (signed by Certification Authority) to the device. To end the session, enter an empty line. • The imported certificate must be based on a certificate request created by the crypto certificate request Privileged EXEC mode command.
  • Page 432: Ip Https Certificate

    ip https certificate The ip https certificate Global Configuration mode command configures the active certificate for HTTPS. To return to the default configuration, use the no form of this command. Syntax ip https certificate number no ip https certificate • number —...
  • Page 433: Show Ip Http

    Example The following example displays the certificate. Console# show crypto certificate mycertificate 1 -----BEGIN CERTIFICATE----- dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----- Issued by: www.verisign.com Valid from: Jan 1 02:44:50 2003 GMT Valid to: Dec 31 02:44:50 2004 GMT Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788 show ip http...
  • Page 434: Show Ip Https

    Example The following example displays the HTTP server configuration. Console# show ip http HTTP server enabled. Port: 80 show ip https The show ip https Privileged EXEC mode command displays the HTTPS server configuration. Syntax show ip https Default Configuration This command has no default configuration.
  • Page 435 Certificate 2 is inactive Valid From: Jan 1 02:44:50 2004 GMT Valid to: Dec 31 02:44:50 2005 GMT Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: 1873B936 88DC3411 BC8932EF 782134BA D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Web Server...
  • Page 436 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY Web Server...
  • Page 437: Aaa Authentication Dot1X

    802.1x Commands aaa authentication dot1x The aaa authentication dot1x Global Configuration mode command specifies one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1X. To return to the default configuration, use the no form of this command. Syntax aaa authentication dot1x default method1 [method2...] no aaa authentication dot1x default...
  • Page 438: Dot1X System-Auth-Control

    Examples The following example uses the aaa authentication dot1x default command with no authentication. Console(config)# aaa authentication dot1x default none dot1x system-auth-control The dot1x system-auth-control Global Configuration mode command enables 802.1x globally. To return to the default configuration, use the no form of this command. Syntax dot1x system-auth-control no dot1x system-auth-control...
  • Page 439: Dot1X Re-Authentication

    Syntax dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control • auto — Enables 802.1X authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1X authentication exchange between the port and the client. •...
  • Page 440: Dot1X Timeout Re-Authperiod

    Syntax dot1x re-authentication no dot1x re-authentication Default Configuration Periodic re-authentication is disabled. Command Mode Interface Configuration (Ethernet) User Guidelines There are no user guidelines for this command. Examples The following example enables periodic re-authentication of the client. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x re-authentication dot1x timeout re-authperiod The dot1x timeout re-authperiod Interface Configuration mode command sets the number of...
  • Page 441: Dot1X Re-Authenticate

    Examples The following example sets the number of seconds between re-authentication attempts, to 300. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout re-authperiod 300 dot1x re-authenticate The dot1x re-authenticate Privileged EXEC mode command manually initiates a re- authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. Syntax dot1x re-authenticate [ethernet interface] •...
  • Page 442: Dot1X Timeout Tx-Period

    Syntax dot1x timeout quiet-period seconds no dot1x timeout quiet-period • seconds — Specifies the time in seconds that the device remains in the quiet state following a failed authentication exchange with the client. (Range: 0 - 65535 seconds) Default Configuration Quiet period is 60 seconds.
  • Page 443: Dot1X Max-Req

    Default Configuration Timeout period is 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines • The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers Examples The following command sets the number of seconds that the device waits for a response to an...
  • Page 444: Dot1X Timeout Supp-Timeout

    Examples The following example sets the number of times that the device sends an EAP-request/identity frame to 6 . Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x max-req 6 dot1x timeout supp-timeout The dot1x timeout supp-timeout Interface Configuration mode command sets the time for the retransmission of an Extensible Authentication Protocol (EAP)-request frame to the client.
  • Page 445: Show Dot1X

    Syntax dot1x timeout server-timeout seconds no dot1x timeout server-timeout • seconds — Time in seconds that the device waits for a response from the authentication server. (Range: 1-65535 seconds) Default Configuration The timeout period is 30 seconds. Command Mode Interface configuration (Ethernet) mode User Guidelines •...
  • Page 446: Show Dot1X

    Example The following example displays the status of 802.1X-enabled Ethernet ports. Console# show dot1x 802.1x is enabled Port Admin Mode Oper Mode Reauth Reauth Username Control Period ---- ---------- --------- ------- ------ -------- 1/e1 Auto Authorized 3600 1/e2 Auto Authorized 3600 John 1/e3...
  • Page 447 Authentication Method: Remote Termination Cause: Supplicant logoff Authenticator State Machine State: HELD Backend State Machine State: IDLE Authentication success: 9 Authentication fails: 1 The following table describes significant fields shown above: Field Description Port The port number. Admin mode The port admin mode. Possible values: Force-auth, Force-unauth, Auto. Oper mode The port oper mode.
  • Page 448: Show Dot1X Users

    Authentication Method The authentication method used to establish the session. Termination Cause The reason for the session termination. State The current value of the Authenticator PAE state machine and of the Backend state machine. Authentication success The number of times the state machine received a Success message from the Authentication Server.
  • Page 449: Show Dot1X Statistics

    Console# show dot1x users username Bob Username: Bob Port Username Session Time Auth Method MAC Address ----- -------- ------------ ----------- -------------- 1/e1 1d:03:08.58 Remote 0008:3b79:8787 The following table describes significant fields shown above: Field Description Port The port number. Username The username representing the identity of the Supplicant.
  • Page 450 Examples The following example displays 802.1X statistics for the specified interface. Console# show dot1x statistics ethernet 1/e1 EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 12 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3 EapolReqFramesTx: 6 InvalidEapolFramesRx: 0 EapLengthErrorFramesRx: 0 LastEapolFrameVersion: 1 LastEapolFrameSource: 00:08:78:32:98:78 The following table describes the significant fields shown in the display: Field Description...
  • Page 451: Advanced Features

    EapolReqFramesTx The number of EAP Request frames (other than Rq/Id frames) that have been transmitted by this Authenticator. InvalidEapolFramesRx The number of EAPOL frames that have been received by this Authenticator in which the frame type is not recognized. EapLengthErrorFramesRx The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid.
  • Page 452: Dot1X Multiple-Hosts

    dot1x multiple-hosts The dot1x multiple-hosts Interface Configuration mode command enables multiple hosts (clients) on an 802.1X-authorized port, where the authorization state of the port is set to auto. To return to the default configuration, use the no form of this command. Syntax dot1x multiple-hosts no dot1x multiple-hosts...
  • Page 453: Dot1X Guest-Vlan

    • discard-shutdown — Discards frames with source addresses that are not the supplicant address. The port is also shut down. • trap — Indicates that SNMP traps are sent. • seconds — Specifies the minimum amount of time in seconds between consecutive traps. (Range: 1- 1000000 Default Configuration Frames with source addresses that are not the supplicant address are discarded.
  • Page 454: Dot1X Guest-Vlan Enable

    User Guidelines • Use the dot1x guest-vlan enable Interface Configuration mode command to enable unauthorized users on an interface to access the guest VLAN. • If the guest VLAN is defined and enabled, the port automatically joins the guest VLAN when the port is unauthorized and leaves it when the port becomes authorized.
  • Page 455: Show Dot1X Advanced

    Example The following example enables unauthorized users on Ethernet port 1/e1 to access the guest VLAN. Console# configure Console(config)# interface ethernet 1/e1 Console(config-if)# dot1x guest-vlan enable show dot1x advanced The show dot1x advanced Privileged EXEC mode command displays 802.1X advanced features for the device or specified interface.
  • Page 456 Console# show dot1x advanced ethernet 1/e1 Interface Multiple Hosts Guest VLAN --------- -------------- ---------- 1/e1 Disabled Enabled Single host parameters Violation action: Discard Trap: Enabled Trap frequency: 100 Status: Single-host locked Violations since last trap: 9 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 3 / 0 6 – F O R P R O O F O N LY 802.1x Commands...

Table of Contents