Levelone GTL-2691 User Manual

Browse online or download User Manual for Routers Levelone GTL-2691. LevelOne GTL-2691 User Manual [de]

  • Download
  • Add to my manuals
  • Print
  • Page
    / 164
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - GTL-2691

USER GUIDE GTL-2691 20 GE + 4 GE Combo SFP + 2 10G Slots L3Managed Stackable SwitchUser Manual

Page 2

CONTENTS– 10 –Configuring a MAC ACL 365Configuring an ARP ACL 367Binding a Port to an Access Control List 369ARP Inspection 370Configuring Globa

Page 3 - ABOUT THIS GUIDE

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 100 –◆ Diagnostic Code — Software that is run during system boot-up, also known as

Page 4 - APRIL 2013 RELEASE

CHAPTER 31 | Interface CommandsInterface Configuration– 1000 –◆ The 1000BASE-T and 10GBASE-T standard does not support forced mode. Auto-negotiati

Page 5 - CONTENTS

CHAPTER 31 | Interface CommandsInterface Configuration– 1001 –EXAMPLE The following example adds a description to port 4.Console(config)#interface

Page 6 - 5INTERFACE CONFIGURATION 161

CHAPTER 31 | Interface CommandsInterface Configuration– 1002 –media-type This command forces the port type selected for combination ports 21-24. U

Page 7 - 6 VLAN CONFIGURATION 197

CHAPTER 31 | Interface CommandsInterface Configuration– 1003 –◆ When auto-negotiation is enabled the switch will negotiate the best settings for a

Page 8 - 11 QUALITY OF SERVICE 287

CHAPTER 31 | Interface CommandsInterface Configuration– 1004 –speed-duplex This command configures the speed and duplex mode of a given interface

Page 9 - 13 SECURITY MEASURES 309

CHAPTER 31 | Interface CommandsInterface Configuration– 1005 –RELATED COMMANDS negotiation (1002)capabilities (999)switchport mtu This command con

Page 10 - – 10 –

CHAPTER 31 | Interface CommandsInterface Configuration– 1006 –◆ The port MTU size can be displayed with the show show interfaces status command.EX

Page 11 - – 11 –

CHAPTER 31 | Interface CommandsInterface Configuration– 1007 –◆ The rate limits set by this command are also used by automatic storm control when

Page 12 - 15 MULTICAST FILTERING 511

CHAPTER 31 | Interface CommandsInterface Configuration– 1008 –EXAMPLE The following example clears statistics on port 5.Console#clear counters eth

Page 13 - 18 GENERAL IP ROUTING 621

CHAPTER 31 | Interface CommandsInterface Configuration– 1009 –EXAMPLE Console#show interfaces counters ethernet 1/17Ethernet 1/ 1 ===== IF table S

Page 14 - 20 UNICAST ROUTING 649

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 101 –To restore configuration settings from a backup server, enter the following co

Page 15 - 21 MULTICAST ROUTING 705

CHAPTER 31 | Interface CommandsInterface Configuration– 1010 –show interfacesstatusThis command displays the status for an interface.SYNTAX show i

Page 16 - 23 GENERAL COMMANDS 759

CHAPTER 31 | Interface CommandsInterface Configuration– 1011 –show interfacesswitchportThis command displays the administrative and operational st

Page 17 - – 17 –

CHAPTER 31 | Interface CommandsInterface Configuration– 1012 –Table 100: show interfaces switchport - display description Field DescriptionBroadc

Page 18 - – 18 –

CHAPTER 31 | Interface CommandsInterface Configuration– 1013 –show interfacestransceiverThis command displays identifying information for the spec

Page 19 - 25 SNMP COMMANDS 827

CHAPTER 31 | Interface CommandsCable Diagnostics– 1014 – Vcc : 0.00 V Bias Current : 43.11 mA TX Power : 6

Page 20 - 27 FLOW SAMPLING COMMANDS 855

CHAPTER 31 | Interface CommandsCable Diagnostics– 1015 – Cable Short with accuracy 0 meters. Pair A OK, length 1 meters Pair B OK, length 2 me

Page 21 - – 21 –

CHAPTER 31 | Interface CommandsCable Diagnostics– 1016 –EXAMPLE Console#show cable-diagnostics dsp interface ethernet 1/1Cable Diagnostics on inte

Page 22 - – 22 –

– 1017 –32 LINK AGGREGATION COMMANDSPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network conn

Page 23 - ENERAL SECURITY MEASURES 921

CHAPTER 32 | Link Aggregation CommandsManual Configuration Commands– 1018 –◆ All ports in a trunk must be configured in an identical manner, inclu

Page 24 - – 24 –

CHAPTER 32 | Link Aggregation CommandsManual Configuration Commands– 1019 –DEFAULT SETTINGsrc-dst-ipCOMMAND MODEGlobal ConfigurationCOMMAND USAGE◆

Page 25 - 31 INTERFACE COMMANDS 997

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 102 –

Page 26 - ORT MIRRORING COMMANDS 1029

CHAPTER 32 | Link Aggregation CommandsDynamic Configuration Commands– 1020 –channel-group This command adds a port to a trunk. Use the no form to

Page 27 - 34 RATE LIMIT COMMANDS 1039

CHAPTER 32 | Link Aggregation CommandsDynamic Configuration Commands– 1021 –COMMAND USAGE ◆ The ports on both ends of an LACP trunk must be config

Page 28 - PANNING TREE COMMANDS 1061

CHAPTER 32 | Link Aggregation CommandsDynamic Configuration Commands– 1022 –lacp admin-key(Ethernet Interface)This command configures a port'

Page 29 - 39 VLAN COMMANDS 1107

CHAPTER 32 | Link Aggregation CommandsDynamic Configuration Commands– 1023 –lacp port-priority This command configures LACP port priority. Use the

Page 30 - – 30 –

CHAPTER 32 | Link Aggregation CommandsDynamic Configuration Commands– 1024 –lacp system-priority This command configures a port's LACP system

Page 31 - LASS OF SERVICE COMMANDS 1155

CHAPTER 32 | Link Aggregation CommandsTrunk Status Display Commands– 1025 –DEFAULT SETTING 0COMMAND MODE Interface Configuration (Port Channel)COM

Page 32 - – 32 –

CHAPTER 32 | Link Aggregation CommandsTrunk Status Display Commands– 1026 –EXAMPLEConsole#show lacp 1 countersPort Channel: 1---------------------

Page 33 - – 33 –

CHAPTER 32 | Link Aggregation CommandsTrunk Status Display Commands– 1027 –Console#show lacp 1 neighborsPort Channel 1 neighbors------------------

Page 34 - – 34 –

CHAPTER 32 | Link Aggregation CommandsTrunk Status Display Commands– 1028 – Console#show lacp sysidPort Channel System Priority System MAC

Page 35 - 43 LLDP COMMANDS 1285

– 1029 –33 PORT MIRRORING COMMANDSData can be mirrored from a local port on the same switch or from a remote port on another switch for analysis at

Page 36 - 44 CFM COMMANDS 1309

– 103 –SECTION IIWEB CONFIGURATIONThis section describes the basic switch features, along with a detailed description of how to configure each featu

Page 37 - – 37 –

CHAPTER 33 | Port Mirroring CommandsLocal Port Mirroring Commands– 1030 –DEFAULT SETTING ◆ No mirror session is defined. ◆ When enabled for an int

Page 38 - 46 DHCP COMMANDS 1361

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1031 –COMMAND MODE Privileged ExecCOMMAND USAGE This command displays the currently

Page 39 - 48 IP INTERFACE COMMANDS 1391

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1032 –3. Use the rspan destination command to specify the destination port for the t

Page 40 - – 40 –

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1033 –rspan source Use this command to specify the source port and traffic type to b

Page 41 - 49 IP ROUTING COMMANDS 1447

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1034 –rspan destination Use this command to specify the destination port to monitor

Page 42 - – 42 –

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1035 –rspan remote vlan Use this command to specify the RSPAN VLAN, switch role (sou

Page 43 - – 43 –

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1036 –dynamically add port members to an RSPAN VLAN. Also, note that the show vlan c

Page 44 - – 44 –

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1037 –COMMAND MODE Privileged ExecEXAMPLE Console#show rspan sessionRSPAN Session ID

Page 45 - – 45 –

CHAPTER 33 | Port Mirroring CommandsRSPAN Mirroring Commands– 1038 –

Page 46 - SECTION IV APPENDICES 1599

– 1039 –34 RATE LIMIT COMMANDSThis function allows the network manager to control the maximum rate for traffic transmitted or received on an interfa

Page 47 - – 47 –

SECTION II | Web Configuration– 104 –◆ "Multicast Routing" on page 705

Page 48 - – 48 –

CHAPTER 34 | Rate Limit Commands– 1040 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#rate-limit input 64Console(config-if)#RELA

Page 49 - – 49 –

– 1041 –35 AUTOMATIC TRAFFIC CONTROL COMMANDSAutomatic Traffic Control (ATC) configures bounding thresholds for broadcast and multicast storms which

Page 50 - – 50 –

CHAPTER 35 | Automatic Traffic Control Commands– 1042 –USAGE GUIDELINESATC includes storm control for broadcast or multicast traffic. The control

Page 51 - – 51 –

CHAPTER 35 | Automatic Traffic Control Commands– 1043 –expires. When ingress traffic falls below this threshold, ATC sends a Storm Alarm Clear Tra

Page 52 - – 52 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1044 –Threshold Commandsauto-traffic-controlapply-timerThis command sets the ti

Page 53 - – 53 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1045 –seconds - The time at which to release the control response after ingress

Page 54 - – 54 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1046 –EXAMPLE This example enables automatic storm control for broadcast traffi

Page 55 - – 55 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1047 –EXAMPLE This example sets the control response for broadcast traffic on p

Page 56 - – 56 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1048 –EXAMPLE This example sets the clear threshold for automatic storm control

Page 57 - – 57 –

CHAPTER 35 | Automatic Traffic Control CommandsThreshold Commands– 1049 –auto-traffic-controlauto-control-releaseThis command automatically releas

Page 58 - – 58 –

– 105 –3 USING THE WEB INTERFACEThis switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistic

Page 59 - – 59 –

CHAPTER 35 | Automatic Traffic Control CommandsSNMP Trap Commands– 1050 –SNMP Trap Commandssnmp-server enableport-traps atcbroadcast-alarm-clearTh

Page 60 - – 60 –

CHAPTER 35 | Automatic Traffic Control CommandsSNMP Trap Commands– 1051 –snmp-server enableport-traps atcbroadcast-control-applyThis command sends

Page 61 - – 61 –

CHAPTER 35 | Automatic Traffic Control CommandsSNMP Trap Commands– 1052 –snmp-server enableport-traps atcmulticast-alarm-clearThis command sends a

Page 62 - – 62 –

CHAPTER 35 | Automatic Traffic Control CommandsSNMP Trap Commands– 1053 –snmp-server enableport-traps atcmulticast-control-applyThis command sends

Page 63 - – 63 –

CHAPTER 35 | Automatic Traffic Control CommandsATC Display Commands– 1054 –ATC Display Commandsshow auto-traffic-controlThis command shows global

Page 64 - – 64 –

– 1055 –36 ADDRESS TABLE COMMANDSThese commands are used to configure the address table for filtering specified addresses, displaying current entrie

Page 65 - – 65 –

CHAPTER 36 | Address Table Commands– 1056 –EXAMPLE Console(config)#mac-address-table aging-time 100Console(config)#mac-address-tablestaticThis com

Page 66 - – 66 –

CHAPTER 36 | Address Table Commands– 1057 –EXAMPLE Console(config)#mac-address-table static 00-e0-29-94-34-de interface ethernet 1/1 vlan 1 delete

Page 67 - – 67 –

CHAPTER 36 | Address Table Commands– 1058 –COMMAND USAGE ◆ The MAC Address Table contains the MAC addresses associated with each interface. Note t

Page 68 - – 68 –

CHAPTER 36 | Address Table Commands– 1059 –show mac-address-table countThis command shows the number of MAC addresses used and the number of avail

Page 69 - GETTING STARTED

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 106 –forwarding (i.e., enable Admin Edge Port) to improve the switch’s re

Page 70 -

CHAPTER 36 | Address Table Commands– 1060 –

Page 71 - 1 INTRODUCTION

– 1061 –37 SPANNING TREE COMMANDSThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and comman

Page 72 -

CHAPTER 37 | Spanning Tree Commands– 1062 –spanning-tree This command enables the Spanning Tree Algorithm globally for the switch. Use the no form

Page 73

CHAPTER 37 | Spanning Tree Commands– 1063 –EXAMPLE This example shows how to enable the Spanning Tree Algorithm for the switch:Console(config)#spa

Page 74

CHAPTER 37 | Spanning Tree Commands– 1064 –DEFAULT SETTING 2 secondsCOMMAND MODE Global ConfigurationCOMMAND USAGE This command sets the time inte

Page 75

CHAPTER 37 | Spanning Tree Commands– 1065 –RELATED COMMANDSspanning-tree forward-time (1063)spanning-tree hello-time (1063)spanning-tree mode This

Page 76

CHAPTER 37 | Spanning Tree Commands– 1066 – A spanning tree instance can exist only on bridges that have compatible VLAN instance assignments. Be

Page 77

CHAPTER 37 | Spanning Tree Commands– 1067 –spanning-treepriorityThis command configures the spanning tree priority globally for this switch. Use t

Page 78

CHAPTER 37 | Spanning Tree Commands– 1068 –revision (1072)max-hops (1069)spanning-treesystem-bpdu-floodingThis command configures the system to fl

Page 79 - Table 2: System Defaults

CHAPTER 37 | Spanning Tree Commands– 1069 –COMMAND USAGE This command limits the maximum transmission rate for BPDUs.EXAMPLE Console(config)#spann

Page 80

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 107 –CONFIGURATIONOPTIONSConfigurable parameters have a dialog box or a d

Page 81

CHAPTER 37 | Spanning Tree Commands– 1070 –mst priority This command configures the priority of a spanning tree instance. Use the no form to resto

Page 82

CHAPTER 37 | Spanning Tree Commands– 1071 –COMMAND MODE MST ConfigurationCOMMAND USAGE ◆ Use this command to group VLANs into spanning tree instan

Page 83 - INITIAL SWITCH CONFIGURATION

CHAPTER 37 | Spanning Tree Commands– 1072 –EXAMPLE Console(config-mstp)#name R&DConsole(config-mstp)#RELATED COMMANDSrevision (1072)revision T

Page 84 - Connecting to the Switch

CHAPTER 37 | Spanning Tree Commands– 1073 –COMMAND USAGE ◆ This command filters all Bridge Protocol Data Units (BPDUs) received on an interface to

Page 85 - CONNECTIONS

CHAPTER 37 | Spanning Tree Commands– 1074 –be manually re-enabled using the no spanning-tree spanning-disabled command.◆ Before enabling BPDU Guar

Page 86 - STACK OPERATIONS

CHAPTER 37 | Spanning Tree Commands– 1075 – COMMAND MODE Interface Configuration (Ethernet, Port Channel)COMMAND USAGE ◆ This command is used by t

Page 87 - Stack Operations

CHAPTER 37 | Spanning Tree Commands– 1076 –devices such as workstations or servers, retains the current forwarding database to reduce the amount o

Page 88

CHAPTER 37 | Spanning Tree Commands– 1077 –spanning-treeloopback-detectionThis command enables the detection and response to Spanning Tree loopbac

Page 89 - BASIC CONFIGURATION

CHAPTER 37 | Spanning Tree Commands– 1078 –command, the selected interface will be automatically enabled when the shutdown interval has expired.◆

Page 90

CHAPTER 37 | Spanning Tree Commands– 1079 –◆ When configured for manual release mode, then a link down / up event will not release the port from t

Page 91

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 108 –MAIN MENU Using the onboard web agent, you can define system paramet

Page 92

CHAPTER 37 | Spanning Tree Commands– 1080 –shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method

Page 93

CHAPTER 37 | Spanning Tree Commands– 1081 –COMMAND USAGE ◆ This command defines the priority for the use of an interface in the multiple spanning-

Page 94

CHAPTER 37 | Spanning Tree Commands– 1082 –spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no

Page 95

CHAPTER 37 | Spanning Tree Commands– 1083 –COMMAND USAGE ◆ A bridge with a lower bridge identifier (or same identifier and lower MAC address) can

Page 96

CHAPTER 37 | Spanning Tree Commands– 1084 –spanning-treetc-prop-stopThis command stops propagating topology changes on an interface. Use the no fo

Page 97 - MANAGEMENT ACCESS

CHAPTER 37 | Spanning Tree Commands– 1085 –EXAMPLE Console#spanning-tree loopback-detection release ethernet 1/1Console#spanning-treeprotocol-migr

Page 98

CHAPTER 37 | Spanning Tree Commands– 1086 –show spanning-tree This command shows the configuration for the common spanning tree (CST) or for an in

Page 99

CHAPTER 37 | Spanning Tree Commands– 1087 –EXAMPLEThis example shows a full listing of global and interface settings for the spanning tree.Console

Page 100 - Managing System Files

CHAPTER 37 | Spanning Tree Commands– 1088 –This example shows a brief summary of global and interface setting for the spanning tree.Console#show s

Page 101

– 1089 –38 ERPS COMMANDSThe G.8032 recommendation, also referred to as Ethernet Ring Protection Switching (ERPS), can be used to increase the availa

Page 102

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 109 –Configure by Port Range Configures connection settings for a range o

Page 103 - WEB CONFIGURATION

CHAPTER 38 | ERPS Commands– 1090 –Configuration Guidelines for ERPS1. Create an ERPS ring: Create a ring using the erps domain command. The ring n

Page 104 -

CHAPTER 38 | ERPS Commands– 1091 –erps This command enables ERPS on the switch. Use the no form to disable this feature. SYNTAX [no] erpsDEFAULT S

Page 105 - 3 USING THE WEB INTERFACE

CHAPTER 38 | ERPS Commands– 1092 –control-vlan This command specifies a dedicated VLAN used for sending and receiving ERPS protocol messages. Use

Page 106 - Figure 1: Home Page

CHAPTER 38 | ERPS Commands– 1093 –enable This command activates the current ERPS ring. Use the no form to disable the current ring. SYNTAX [no

Page 107

CHAPTER 38 | ERPS Commands– 1094 –COMMAND USAGE The guard timer duration should be greater than the maximum expected forwarding delay for an R-APS

Page 108 - Table 6: Switch Main Menu

CHAPTER 38 | ERPS Commands– 1095 –major-domain This command specifies the ERPS ring used for sending control packets. Use the no form to remove th

Page 109

CHAPTER 38 | ERPS Commands– 1096 –COMMAND USAGE ◆ This parameter is used to ensure that received R-APS PDUs are directed for this ring. A unique l

Page 110

CHAPTER 38 | ERPS Commands– 1097 –more information on how ERPS recovers from a node failure, refer to "Ethernet Ring Protection Switching&quo

Page 111

CHAPTER 38 | ERPS Commands– 1098 –non-erps-dev-protectThis command sends non-standard health-check packets when an owner node enters protection st

Page 112

CHAPTER 38 | ERPS Commands– 1099 –EXAMPLE Console(config-erps)#non-erps-dev-protectConsole(config-erps)#propagate-tc This command enables propagat

Page 113

CONTENTS– 11 –Simple Network Management Protocol 426Configuring Global Settings for SNMP 428Setting the Local Engine ID 429Specifying a Remote E

Page 114

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 110 –Statistics Shows Interface, Etherlike, RMON and Utilization trunk st

Page 115

CHAPTER 38 | ERPS Commands– 1100 –ring-port This command configures a node’s connection to the ring through the east or west interface. Use the no

Page 116

CHAPTER 38 | ERPS Commands– 1101 –rpl owner This command configures a ring node to be the Ring Protection Link (RPL) owner or a non-owner. SYNTAX

Page 117

CHAPTER 38 | ERPS Commands– 1102 –EXAMPLE Console(config-erps)#wtr-timer 10Console(config-erps)#clear erps statistics This command clears statisti

Page 118

CHAPTER 38 | ERPS Commands– 1103 –This example displays detailed information for the specified ERPS ring. Console#show erps domain rd1Domain Nam

Page 119

CHAPTER 38 | ERPS Commands– 1104 –This example displays statistics for the specified ring. Console#show erps statistics domain rdERPS statistics f

Page 120

CHAPTER 38 | ERPS Commands– 1105 –show erps statistics This command displays statistics for ERPS protocol messages for all configured rings, or fo

Page 121

CHAPTER 38 | ERPS Commands– 1106 –

Page 122

– 1107 –39 VLAN COMMANDSA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same ph

Page 123

CHAPTER 39 | VLAN CommandsGVRP and Bridge Extension Commands– 1108 –GVRP AND BRIDGE EXTENSION COMMANDSGARP VLAN Registration Protocol defines a wa

Page 124

CHAPTER 39 | VLAN CommandsGVRP and Bridge Extension Commands– 1109 –garp timer This command sets the values for the join, leave and leaveall timer

Page 125

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 111 –ProtocolConfigure ProtocolAdd Creates a protocol group, specifying s

Page 126

CHAPTER 39 | VLAN CommandsGVRP and Bridge Extension Commands– 1110 –switchportforbidden vlanThis command configures forbidden VLANs. Use the no fo

Page 127

CHAPTER 39 | VLAN CommandsGVRP and Bridge Extension Commands– 1111 –COMMAND USAGE GVRP cannot be enabled for ports set to Access mode using the sw

Page 128

CHAPTER 39 | VLAN CommandsGVRP and Bridge Extension Commands– 1112 –COMMAND MODE Normal Exec, Privileged ExecEXAMPLE Console#show garp timer ether

Page 129 - 4 BASIC MANAGEMENT TASKS

CHAPTER 39 | VLAN CommandsEditing VLAN Groups– 1113 –EDITING VLAN GROUPSvlan database This command enters VLAN database mode. All commands in this

Page 130 - Figure 3: System Information

CHAPTER 39 | VLAN CommandsEditing VLAN Groups– 1114 –vlan This command configures a VLAN. Use the no form to restore the default settings or delet

Page 131

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1115 –EXAMPLE The following example adds a VLAN, using VLAN ID 105 and name RD5. The VLAN i

Page 132

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1116 –COMMAND USAGE ◆ Creating a “normal” VLAN with the vlan command initializes it as a La

Page 133

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1117 –EXAMPLE The following example shows how to restrict the traffic received on port 1 to

Page 134

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1118 –◆ If a VLAN on the forbidden list for an interface is manually added to that interfac

Page 135 - MANAGING SYSTEM FILES

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1119 –switchport mode This command configures the VLAN membership mode for a port. Use the

Page 136 - Figure 7: Copy Firmware

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 112 –Modify Modify priority for an MST instance 258Add Member Adds VLAN m

Page 137

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1120 –switchport nativevlanThis command configures the PVID (i.e., default VLAN ID) for a p

Page 138

CHAPTER 39 | VLAN CommandsConfiguring VLAN Interfaces– 1121 –The following figure shows VLANs 1 and 2 configured on switches A and B, with VLAN tr

Page 139

CHAPTER 39 | VLAN CommandsDisplaying VLAN Information– 1122 –DISPLAYING VLAN INFORMATIONThis section describes commands used to display VLAN infor

Page 140

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1123 –Console#CONFIGURING IEEE 802.1Q TUNNELINGIEEE 802.1Q tunneling (QinQ tunneling)

Page 141 - PARAMETERS

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1124 –7. Configure the QinQ tunnel uplink port to dot1Q-tunnel uplink mode (switchpor

Page 142 - 5. Click Apply

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1125 –switchport dot1q-tunnel modeThis command configures an interface as a QinQ tunn

Page 143 - SETTING THE SYSTEM CLOCK

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1126 –switchport dot1q-tunnel servicematch cvidThis command creates a CVLAN to SPVLAN

Page 144

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1127 –EXAMPLEThis example sets the SVID to 99 in the outer tag for egress packets exi

Page 145

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1128 –7. Verify configuration settings.Console#show dot1q-tunnel service802.1Q Tunnel

Page 146 - Figure 14: Configuring NTP

CHAPTER 39 | VLAN CommandsConfiguring IEEE 802.1Q Tunneling– 1129 –◆ The specified ethertype only applies to ports configured in Uplink mode using

Page 147

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 113 –VoIP Voice over IP 303Configure Global Configures auto-detection of

Page 148

CHAPTER 39 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 1130 –Console#show dot1q-tunnel service 100802.1Q Tunnel Service Subscripti

Page 149

CHAPTER 39 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 1131 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Traffic segmentation

Page 150

CHAPTER 39 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 1132 –traffic-segmentationsessionThis command creates a traffic-segmentatio

Page 151 - CONSOLE PORT SETTINGS

CHAPTER 39 | VLAN CommandsConfiguring Port-based Traffic Segmentation– 1133 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ A port cannot be con

Page 152

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1134 –EXAMPLEThis example enables forwarding of traffic between uplink ports assigned to diff

Page 153 - TELNET SETTINGS

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1135 – To configure private VLANs, follow these steps:1. Use the private-vlan command to desi

Page 154

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1136 –private-vlan Use this command to create a primary or community private VLAN. Use the no

Page 155 - DISPLAYING CPU UTILIZATION

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1137 –private vlanassociationUse this command to associate a primary VLAN with a secondary (i

Page 156 - RENUMBERING THE STACK

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1138 –COMMAND MODE Interface Configuration (Ethernet, Port Channel) COMMAND USAGETo assign a

Page 157 - RESETTING THE SYSTEM

CHAPTER 39 | VLAN CommandsConfiguring Private VLANs– 1139 –switchport private-vlan mappingUse this command to map an interface to a primary VLAN.

Page 158

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 114 –User Accounts 325Add Configures user names, passwords, and access le

Page 159

CHAPTER 39 | VLAN CommandsConfiguring Protocol-based VLANs– 1140 –EXAMPLEConsole#show vlan private-vlanPrimary Secondary Type Interf

Page 160

CHAPTER 39 | VLAN CommandsConfiguring Protocol-based VLANs– 1141 –protocol-vlanprotocol-group(Configuring Groups)This command creates a protocol g

Page 161 - 5 INTERFACE CONFIGURATION

CHAPTER 39 | VLAN CommandsConfiguring Protocol-based VLANs– 1142 –COMMAND MODE Interface Configuration (Ethernet, Port Channel)COMMAND USAGE ◆ Whe

Page 162 - Port Configuration

CHAPTER 39 | VLAN CommandsConfiguring Protocol-based VLANs– 1143 –EXAMPLE This shows protocol group 1 configured for IP over Ethernet:Console#show

Page 163

CHAPTER 39 | VLAN CommandsConfiguring IP Subnet VLANs– 1144 –CONFIGURING IP SUBNET VLANSWhen using IEEE 802.1Q port-based VLAN classification, all

Page 164

CHAPTER 39 | VLAN CommandsConfiguring IP Subnet VLANs– 1145 –is found, the corresponding VLAN ID is assigned to the frame. If no mapping is found,

Page 165

CHAPTER 39 | VLAN CommandsConfiguring MAC Based VLANs– 1146 –CONFIGURING MAC BASED VLANSWhen using IEEE 802.1Q port-based VLAN classification, all

Page 166 - MIRRORING

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1147 –◆ When MAC-based, IP subnet-based, and protocol-based VLANs are supported concurrently, p

Page 167

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1148 –voice vlan This command enables VoIP traffic detection and defines the Voice VLAN ID. Use

Page 168 - Table 7: Port Statistics

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1149 –voice vlan aging This command sets the Voice VLAN ID time out. Use the no form to restore

Page 169

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 115 –Add Rule 352Absolute Sets exact time or time range 352Periodic Sets

Page 170

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1150 –description - User-defined text that identifies the VoIP devices. (Range: 1-32 characters

Page 171

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1151 –COMMAND USAGEWhen auto is selected, you must select the method to use for detecting VoIP

Page 172

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1152 –switchport voicevlan ruleThis command selects a method for detecting VoIP traffic on a po

Page 173

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1153 –COMMAND USAGE◆ Security filtering discards any non-VoIP packets received on the port that

Page 174 - TRUNK CONFIGURATION

CHAPTER 39 | VLAN CommandsConfiguring Voice VLANs– 1154 –Eth 1/10 Disabled Disabled OUI 6 NAConsole#show voice vlan ouiOUI Address

Page 175 - STATIC TRUNK

– 1155 –40 CLASS OF SERVICE COMMANDSThe commands described in this section allow you to specify which data packets have greater precedence when traf

Page 176

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1156 –queue cos-map This command assigns class of service (CoS) values to the p

Page 177

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1157 –RELATED COMMANDS show queue cos-map (1160)queue mode This command sets th

Page 178 - DYNAMIC TRUNK

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1158 –◆ A weight can be assigned to each of the weighted queues (and thereby to

Page 179

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1159 –EXAMPLE The following example shows how to assign round-robin weights of

Page 180

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 116 –Administration 405Log 405System 405Configure Global Stores error mes

Page 181

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1160 –EXAMPLE The following example shows how to set a default priority on port

Page 182

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 2)– 1161 –COMMAND MODE Privileged ExecEXAMPLE Console#show queue mode ethernet 1/1U

Page 183 - Table 8: LACP Port Counters

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1162 –PRIORITY COMMANDS (LAYER 3 AND 4)This section describes commands us

Page 184 - THE LOCAL SIDE

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1163 –map ip port (GlobalConfiguration)This command enables IP port mappi

Page 185 - 4. Click Internal

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1164 –EXAMPLE The following example shows how to enable IP precedence map

Page 186

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1165 –EXAMPLE The following example shows how to map IP DSCP value 1 to C

Page 187

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1166 –map ip precedence(InterfaceConfiguration)This command sets IP prece

Page 188 - 3. Click Apply

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1167 –show map ip dscp This command shows the IP DSCP priority map.SYNTAX

Page 189 - SAMPLING TRAFFIC FLOWS

CHAPTER 40 | Class of Service CommandsPriority Commands (Layer 3 and 4)– 1168 –EXAMPLE The following shows that HTTP traffic has been mapped to Co

Page 190 - CONFIGURING SFLOW

– 1169 –41 QUALITY OF SERVICE COMMANDSThe commands described in this section are used to configure Differentiated Services (DiffServ) classification

Page 191 - TRAFFIC SEGMENTATION

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 117 –Show Community Shows community strings and access mode 439Add SNMPv3

Page 192

CHAPTER 41 | Quality of Service Commands– 1170 –To create a service policy for a specific category of ingress traffic, follow these steps:1. Use t

Page 193

CHAPTER 41 | Quality of Service Commands– 1171 –COMMAND USAGE ◆ First enter this command to designate a class map and enter the Class Map configur

Page 194 - WEB INTERFACE

CHAPTER 41 | Quality of Service Commands– 1172 –match This command defines the criteria used to classify traffic. Use the no form to delete the ma

Page 195 - VLAN TRUNKING

CHAPTER 41 | Quality of Service Commands– 1173 –This example creates a class map call “rd-class#2,” and sets it to match packets marked for IP Pre

Page 196

CHAPTER 41 | Quality of Service Commands– 1174 –COMMAND USAGE ◆ Use the policy-map command to specify the name of the policy map, and then use the

Page 197 - 6 VLAN CONFIGURATION

CHAPTER 41 | Quality of Service Commands– 1175 –◆ Up to 16 classes can be included in a policy map.EXAMPLE This example creates a policy called “r

Page 198 - IEEE 802.1Q VLANs

CHAPTER 41 | Quality of Service Commands– 1176 –◆ Policing is based on a token bucket, where bucket depth (i.e., the maximum burst before the buck

Page 199

CHAPTER 41 | Quality of Service Commands– 1177 –committed-rate - Committed information rate (CIR) in kilobits per second. (Range: 1-1000000 kbps o

Page 200 - Figure 62: Using GVRP

CHAPTER 41 | Quality of Service Commands– 1178 –The token buckets C and E are initially full, that is, the token count Tc(0) = BC and the token co

Page 201

CHAPTER 41 | Quality of Service Commands– 1179 –police trtcm-color This command defines an enforcer for classified traffic based on a two rate thr

Page 202

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 118 –Configure Details Configures ring parameters 468CFM Connectivity Fa

Page 203

CHAPTER 41 | Quality of Service Commands– 1180 –Rate (CIR) and Peak Information Rate (PIR), and their associated burst sizes - Committed Burst Siz

Page 204

CHAPTER 41 | Quality of Service Commands– 1181 –EXAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the pr

Page 205

CHAPTER 41 | Quality of Service Commands– 1182 –EXAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the pr

Page 206

CHAPTER 41 | Quality of Service Commands– 1183 –show class-map This command displays the QoS class maps which define matching criteria used for cl

Page 207

CHAPTER 41 | Quality of Service Commands– 1184 –EXAMPLEConsole#show policy-map Policy Map rd-policyDescription: class rd-class set cos 3 Console#

Page 208 - 4. Click Apply

– 1185 –42 MULTICAST FILTERING COMMANDSThis switch uses IGMP (Internet Group Management Protocol) to check for any attached hosts that want to recei

Page 209

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1186 –IGMP SNOOPINGThis section describes commands used to configure IGMP snooping on the

Page 210 - PRIVATE VLANS

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1187 –ip igmp snooping This command enables IGMP snooping globally on the switch or on a s

Page 211

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1188 –ip igmp snoopingproxy-reportingThis command enables IGMP Snooping with Proxy Reporti

Page 212

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1189 –COMMAND USAGE ◆ IGMP snooping querier is not supported for IGMPv3 snooping (see ip i

Page 213

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 119 –Show Fault Notification Generator Displays configuration settings fo

Page 214

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1190 –ip igmp snoopingrouter-port-expire-timeThis command configures the querier timeout.

Page 215 - IEEE 802.1Q TUNNELING

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1191 –◆ If a topology change notification (TCN) is received, and all the uplink ports are

Page 216

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1192 –tree change occurred. When an upstream multicast router receives this solicitation,

Page 217

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1193 –DEFAULT SETTING 400 seconds COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ When a

Page 218

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1194 –EXAMPLE The following configures the global setting for IGMP snooping to version 1.C

Page 219

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1195 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ By default, general query messages

Page 220

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1196 –EXAMPLE The following shows how to enable immediate leave.Console(config)#ip igmp sn

Page 221

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1197 –DEFAULT SETTING 10 (1 second) COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ When

Page 222

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1198 –◆ Advertisements are sent by routers to advertise that IP multicast forwarding is en

Page 223 - PROTOCOL VLANS

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1199 –To resolve this problem, the source address in proxied IGMP query and report message

Page 224

CONTENTS– 12 –Displaying Fault Notification Settings 508Displaying Continuity Check Errors 50915 MULTICAST FILTERING 511Overview 511IGMP Protoco

Page 225

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 120 –Configure Detail Configure detailed settings, such as advertisement

Page 226

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1200 –downstream hosts, all receivers build an IGMP report for the multicast groups they h

Page 227

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1201 –ip igmp snoopingvlan staticThis command adds a port to a multicast group. Use the no

Page 228

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1202 –COMMAND USAGE This command displays global and VLAN-specific IGMP configuration sett

Page 229

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1203 –igmpsnp - Display only entries learned through IGMP snooping. sort-by-port - Display

Page 230 - CONFIGURING MAC-BASED VLANS

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1204 –COMMAND MODE Privileged ExecEXAMPLE The following shows IGMP protocol statistics inp

Page 231

CHAPTER 42 | Multicast Filtering CommandsIGMP Snooping– 1205 –The following shows IGMP query-related statistics for VLAN 1:Console#show ip igmp sn

Page 232

CHAPTER 42 | Multicast Filtering CommandsStatic Multicast Routing– 1206 –STATIC MULTICAST ROUTINGThis section describes commands used to configure

Page 233 - 7 ADDRESS TABLE SETTINGS

CHAPTER 42 | Multicast Filtering CommandsStatic Multicast Routing– 1207 –EXAMPLE The following shows how to configure port 11 as a multicast route

Page 234 -

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1208 –IGMP FILTERING AND THROTTLINGIn certain switch applications, the adm

Page 235 - SETTING STATIC ADDRESSES

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1209 –COMMAND USAGE◆ IGMP filtering enables you to assign a profile to a s

Page 236 - CHANGING THE AGING TIME

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 121 –Configure Global Enables DHCP snooping globally, MAC-address verific

Page 237

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1210 –permit, deny This command sets the access mode for an IGMP filter pr

Page 238

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1211 –EXAMPLE Console(config)#ip igmp profile 19Console(config-igmp-profil

Page 239

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1212 –DEFAULT SETTING 1024COMMAND MODE Interface Configuration (Ethernet)C

Page 240

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1213 –EXAMPLE Console(config)#interface ethernet 1/1Console(config-if)#ip

Page 241 - 8 SPANNING TREE ALGORITHM

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1214 –EXAMPLE Console(config)#interface ethernet 1/1Console(config-if)#ip

Page 242 - Overview

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1215 –EXAMPLE Console#show ip igmp profileIGMP Profile 19IGMP Profile 50Co

Page 243 - Internal Spanning Tree

CHAPTER 42 | Multicast Filtering CommandsIGMP Filtering and Throttling– 1216 –show ip igmpthrottle interfaceThis command displays the interface se

Page 244

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1217 –COMMAND MODE Privileged ExecCOMMAND USAGE Using this command without specifying an in

Page 245 - CLI REFERENCES

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1218 –ipv6 mld snooping This command enables MLD Snooping globally on the switch. Use the n

Page 246

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1219 –COMMAND USAGE ◆ If enabled, the switch will serve as querier if elected. The querier

Page 247

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 122 –Show Static Multicast Router Displays ports statically configured as

Page 248 - 1. Click Spanning Tree, STA

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1220 –ipv6 mld snoopingquery-max-response-timeThis command configures the maximum response

Page 249

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1221 –EXAMPLE Console(config)#ipv6 mld snooping robustness 2Console(config)#ipv6 mld snoopi

Page 250

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1222 –COMMAND MODEGlobal ConfigurationCOMMAND USAGE◆ When set to “flood,” any received IPv6

Page 251

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1223 –port-channel channel-id (Range: 1-32) DEFAULT SETTING No static multicast router port

Page 252

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1224 –EXAMPLEConsole(config)#ipv6 mld snooping vlan 1 static FF00:0:0:0:0:0:0:10C ethernet

Page 253

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1225 –EXAMPLE The following shows MLD Snooping configuration informationConsole#show ipv6 m

Page 254

CHAPTER 42 | Multicast Filtering CommandsMLD Snooping– 1226 –EXAMPLE The following shows MLD Snooping group mapping information:Console#show ipv6

Page 255

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1227 –MVR FOR IPV4This section describes commands used to configure Multicast VLAN Registra

Page 256

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1228 –mvr This command enables Multicast VLAN Registration (MVR) globally on the switch. Us

Page 257 - Figure 106: STA Port Roles

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1229 –EXAMPLE The following an MVR group address profile to domain 1:Console(config)#mvr do

Page 258

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 123 –Show Current Member Shows multicast addresses associated with the se

Page 259

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1230 –DEFAULT SETTING No profiles are definedCOMMAND MODE Global ConfigurationCOMMAND USAGE

Page 260

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1231 –EXAMPLE This example sets the proxy query interval for MVR proxy switching.Console(co

Page 261

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1232 –EXAMPLE The following example enable MVR proxy switching.Console(config)#mvr proxy-sw

Page 262

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1233 –mvr source-port-mode dynamicThis command configures the switch to only forward multic

Page 263

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1234 –COMMAND MODE Global ConfigurationEXAMPLE Console(config)#mvr domain 1 upstream-source

Page 264

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1235 –mvr immediate-leaveThis command causes the switch to immediately remove an interface

Page 265 - 9 CONGESTION CONTROL

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1236 –mvr type This command configures an interface as an MVR receiver or source port. Use

Page 266 - STORM CONTROL

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1237 –mvr vlan group This command statically binds a multicast group to a port which will r

Page 267

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1238 –show mvr This command shows information about MVR domain settings, including MVR oper

Page 268 - AUTOMATIC TRAFFIC CONTROL

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1239 –show mvrassociated-profileThis command shows the profiles bound the specified domain.

Page 269

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 124 –Show VLAN Statistics Shows statistics for protocol messages and numb

Page 270

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1240 –Console#show mvr members This command shows information about the current number of e

Page 271

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1241 –EXAMPLE The following shows information about the number of multicast forwarding entr

Page 272

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1242 –show mvr profile This command shows all configured MVR profiles.COMMAND MODE Privileg

Page 273

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1243 –EXAMPLE The following shows MVR protocol-related statistics received:Console#show mvr

Page 274

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv4– 1244 –The following shows MVR query-related statistics:Console#show mvr domain 1 statistics

Page 275 - 10 CLASS OF SERVICE

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1245 –MVR FOR IPV6This section describes commands used to configure Multicast VLAN Registra

Page 276 - Layer 2 Queue Settings

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1246 –mvr6 associated-profileThis command binds the MVR group addresses specified in a prof

Page 277

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1247 –EXAMPLE The following example enables MVR for domain 1:Console(config)#mvr6 domain 1C

Page 278

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1248 –mvr6 proxy-query-intervalThis command configures the interval at which the receiver p

Page 279

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1249 –◆ Receiver ports are known as downstream or router interfaces. These interfaces perfo

Page 280

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 125 –Reset Statistics Clears statistics for RIP protocol messages 668OSPF

Page 281 - LAYER 3/4 PRIORITY SETTINGS

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1250 –COMMAND USAGE ◆ This command sets the number of times report messages are sent upstre

Page 282

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1251 –mvr6 upstream-source-ipThis command configures the source IPv6 address assigned to al

Page 283

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1252 –COMMAND MODE Global ConfigurationCOMMAND USAGE MVR source ports can be configured as

Page 284

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1253 –EXAMPLE The following enables immediate leave on a receiver port.Console(config)#inte

Page 285

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1254 –EXAMPLE The following configures one source port and several receiver ports on the sw

Page 286

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1255 –EXAMPLE The following statically assigns a multicast group to a receiver port:Console

Page 287 - 11 QUALITY OF SERVICE

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1256 –show mvr6associated-profileThis command shows the profiles bound the specified domain

Page 288 - CONFIGURING A CLASS MAP

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1257 –COMMAND MODE Privileged ExecEXAMPLE The following displays information about the inte

Page 289

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1258 –EXAMPLE The following shows information about the number of multicast forwarding entr

Page 290

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1259 –show mvr6 profile This command shows all configured MVR profiles.COMMAND MODE Privile

Page 291 - CREATING QOS POLICIES

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 126 –Virtual Link 697Add Configures a virtual link through a transit area

Page 292

CHAPTER 42 | Multicast Filtering CommandsMVR for IPv6– 1260 – Eth 1/ 2 12 15 8 3 5 19 4 VLAN

Page 293

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1261 – Specific Query Sent : 0 Number of Reports Sent : 2 Number of Leaves S

Page 294

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1262 –EXAMPLEConsole(config)#interface vlan 1Console(config-if)#ip igmpConsole(config-if)

Page 295

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1263 –EXAMPLE Console(config)#interface vlan 1Console(config-if)#ip igmp last-member-quer

Page 296

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1264 –ip igmp query-intervalThis command configures the frequency at which host query mes

Page 297

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1265 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE ◆ The robustness value is

Page 298

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1266 –request to join the multicast group will also fail if the next node up the reverse

Page 299

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1267 –If there are Version 1 hosts present for a particular group, the switch will ignore

Page 300

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1268 –COMMAND MODE Privileged ExecCOMMAND USAGE To display information about multicast gr

Page 301

CHAPTER 42 | Multicast Filtering CommandsIGMP (Layer 3)– 1269 –The following shows the information displayed in a detailed listing for a dynamical

Page 302

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 127 – Show Shows the static addresses configured for each RP and the asso

Page 303 - 12 VOIP TRAFFIC CONFIGURATION

CHAPTER 42 | Multicast Filtering CommandsIGMP Proxy Routing– 1270 –show ip igmpinterfaceThis command shows multicast information for the specified

Page 304 - Configuring VoIP Traffic

CHAPTER 42 | Multicast Filtering CommandsIGMP Proxy Routing– 1271 –To enable IGMP proxy service, follow these steps:1. Use the ip multicast-routin

Page 305 - CONFIGURING TELEPHONY OUI

CHAPTER 42 | Multicast Filtering CommandsIGMP Proxy Routing– 1272 –◆ Only one upstream interface is supported on the system.◆ A maximum of 1024 mu

Page 306 - ONFIGURING VOIP TRAFFIC PORTS

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1273 –MLD (LAYER 3)This section describes commands used to configure Layer 3 Multicast Lis

Page 307 - 1. Click Traffic, VoIP

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1274 – Query Interval : 125 sec Query Max Response Time : 10 s

Page 308

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1275 –ipv6 mld max-resp-intervalThis command configures the maximum response time advertis

Page 309 - 13 SECURITY MEASURES

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1276 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE ◆ Multicast routers send ho

Page 310 -

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1277 –the robustness value is set to zero, meaning that this device will not advertise a Q

Page 311

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1278 –EXAMPLE The following example assigns VLAN 1 as a static member of the specified mul

Page 312

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1279 –clear ipv6 mld group This command deletes entries from the MLD cache. SYNTAX clear i

Page 313

CHAPTER 3 | Using the Web InterfaceNavigating the Web Browser Interface– 128 –

Page 314

CHAPTER 42 | Multicast Filtering CommandsMLD (Layer 3)– 1280 –command, and multicast routing must be enabled globally on the system using the ip m

Page 315

CHAPTER 42 | Multicast Filtering CommandsMLD Proxy Routing– 1281 –show ipv6 mldinterfaceThis command shows multicast information for the specified

Page 316

CHAPTER 42 | Multicast Filtering CommandsMLD Proxy Routing– 1282 –To enable MLD proxy service, follow these steps:1. Use the ipv6 multicast-routin

Page 317

CHAPTER 42 | Multicast Filtering CommandsMLD Proxy Routing– 1283 –◆ Only one upstream interface is supported on the system. ◆ MLD and MLD proxy ca

Page 318

CHAPTER 42 | Multicast Filtering CommandsMLD Proxy Routing– 1284 –

Page 319

– 1285 –43 LLDP COMMANDSLink Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast

Page 320

CHAPTER 43 | LLDP Commands– 1286 –lldp basic-tlv system-nameConfigures an LLDP-enabled port to advertise its system nameIClldp dot1-tlv proto-iden

Page 321

CHAPTER 43 | LLDP Commands– 1287 –lldp This command enables LLDP globally on the switch. Use the no form to disable LLDP.SYNTAX[no] lldpDEFAULT SE

Page 322

CHAPTER 43 | LLDP Commands– 1288 –lldp med-fast-start-countThis command specifies the amount of MED Fast Start LLDPDUs to transmit during the acti

Page 323

CHAPTER 43 | LLDP Commands– 1289 –◆ Information about changes in LLDP neighbors that occur between SNMP notifications is not transmitted. Only sta

Page 324

– 129 –4 BASIC MANAGEMENT TASKSThis chapter describes the following topics:◆ Displaying System Information – Provides basic system description, incl

Page 325 - CONFIGURING USER ACCOUNTS

CHAPTER 43 | LLDP Commands– 1290 –COMMAND MODEGlobal ConfigurationCOMMAND USAGEWhen LLDP is re-initialized on a port, all information in the remot

Page 326

CHAPTER 43 | LLDP Commands– 1291 –lldp admin-status This command enables LLDP transmit, receive, or transmit and receive mode on the specified por

Page 327 - WEB AUTHENTICATION

CHAPTER 43 | LLDP Commands– 1292 –enterprise specific or other starting points for the search, such as the Interface or Entity MIB.◆ Since there a

Page 328

CHAPTER 43 | LLDP Commands– 1293 –lldp basic-tlvsystem-capabilitiesThis command configures an LLDP-enabled port to advertise its system capabiliti

Page 329

CHAPTER 43 | LLDP Commands– 1294 –lldp basic-tlvsystem-nameThis command configures an LLDP-enabled port to advertise the system name. Use the no f

Page 330

CHAPTER 43 | LLDP Commands– 1295 –lldp dot1-tlv proto-vidThis command configures an LLDP-enabled port to advertise port related VLAN information.

Page 331 - ” and the

CHAPTER 43 | LLDP Commands– 1296 –lldp dot1-tlv vlan-nameThis command configures an LLDP-enabled port to advertise its VLAN name. Use the no form

Page 332 - NETWORK ACCESS

CHAPTER 43 | LLDP Commands– 1297 –lldp dot3-tlv mac-phyThis command configures an LLDP-enabled port to advertise its MAC and physical layer capabi

Page 333

CHAPTER 43 | LLDP Commands– 1298 –lldp med-locationcivic-addrThis command configures an LLDP-MED-enabled port to advertise its location identifica

Page 334

CHAPTER 43 | LLDP Commands– 1299 –Any number of CA type and value pairs can be specified for the civic address location, as long as the total does

Page 335

CONTENTS– 13 –16 IP CONFIGURATION 573Setting the Switch’s IP Address (IP Version 4) 573Sending DHCP Inform Requests for Additional Information 577

Page 336 - ADDRESS FILTER

CHAPTER 4 | Basic Management TasksDisplaying System Information– 130 –PARAMETERSThese parameters are displayed:◆ System Description – Brief descri

Page 337

CHAPTER 43 | LLDP Commands– 1300 –COMMAND USAGE◆ This option sends out SNMP trap notifications to designated target stations at the interval speci

Page 338 - INFORMATION

CHAPTER 43 | LLDP Commands– 1301 –lldp med-tlv location This command configures an LLDP-MED-enabled port to advertise its location identification

Page 339

CHAPTER 43 | LLDP Commands– 1302 –lldp med-tlvnetwork-policyThis command configures an LLDP-MED-enabled port to advertise its network policy confi

Page 340 - CONFIGURING HTTPS

CHAPTER 43 | LLDP Commands– 1303 –An SNMP agent should therefore periodically check the value of lldpStatsRemTableLastChangeTime to detect any lld

Page 341 - Configuring HTTPS

CHAPTER 43 | LLDP Commands– 1304 –Console#show lldp config detail ethernet 1/1LLDP Port Configuration Detail Port : Eth 1/1 Admin Status : Tx-Rx N

Page 342

CHAPTER 43 | LLDP Commands– 1305 –EXAMPLEConsole#show lldp info local-device LLDP Local System Information Chassis Type : MAC Addr

Page 343 - CONFIGURING THE SECURE SHELL

CHAPTER 43 | LLDP Commands– 1306 –EXAMPLENote that an IP phone or other end-node device which advertises LLDP-MED capabilities must be connected t

Page 344 - – 344 –

CHAPTER 43 | LLDP Commands– 1307 – Power Priority : Unknown Power Value : 0 Watts Inventory :

Page 345

CHAPTER 43 | LLDP Commands– 1308 –Console#show lldp info statistics detail ethernet 1/1 LLDP Port Statistics Detail PortName : Eth 1/1

Page 346

– 1309 –44 CFM COMMANDSConnectivity Fault Management (CFM) is an OAM protocol that includes proactive connectivity monitoring using continuity check

Page 347

CHAPTER 4 | Basic Management TasksDisplaying Switch Hardware/Software Versions– 131 –DISPLAYING SWITCH HARDWARE/SOFTWARE VERSIONS Use the System &

Page 348

CHAPTER 44 | CFM Commands– 1310 –ethernet cfm mep Sets an interface as a domain boundary, defines it as a maintenance end point (MEP), and sets di

Page 349

CHAPTER 44 | CFM Commands– 1311 –Basic Configuration Steps for CFM1. Configure the maintenance domains with the ethernet cfm domain command.2. Con

Page 350

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1312 –5. Enable CFM globally on the switch with the ethernet cfm enable command.6. Enable CFM on

Page 351 - ACCESS CONTROL LISTS

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1313 –EXAMPLEThis example sets the maintenance level for sending AIS messages within the specifi

Page 352 - SETTING A TIME

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1314 –ethernet cfm aisperiodThis command configures the interval at which AIS information is sen

Page 353

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1315 –COMMAND USAGE ◆ For multipoint connectivity, a MEP cannot determine the specific maintenan

Page 354

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1316 –pass, and only if a maintenance end point (MEP) is created at some lower MA Level.none – N

Page 355

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1317 –Also note that while MEPs are active agents which can initiate consistency check messages

Page 356 - NAME AND TYPE

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1318 –ma index name This command creates a maintenance association (MA) within the current maint

Page 357 - Figure 183: Creating an ACL

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1319 –applied to this MA. For a detailed description of the MIP types, refer to the Command Usag

Page 358

CHAPTER 4 | Basic Management TasksConfiguring Support for Jumbo Frames– 132 –WEB INTERFACETo view hardware and software version information.1. Cli

Page 359

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1320 –ethernet cfm mep This command sets an interface as a domain boundary, defines it as a main

Page 360

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1321 –ethernet cfm port-enableThis command enables CFM processing on an interface. Use the no fo

Page 361

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1322 –COMMAND USAGE This command can be used to clear AIS defect entries if a MEP does not exit

Page 362

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1323 –This example shows the configuration status for continuity check and cross-check traps.Con

Page 363

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1324 –DEFAULT SETTING NoneCOMMAND MODE Privileged ExecEXAMPLEThis example shows all configured m

Page 364

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1325 –show ethernet cfmmaintenance-pointslocalThis command displays the maintenance points confi

Page 365

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1326 –show ethernet cfmmaintenance-pointslocal detail mepThis command displays detailed CFM info

Page 366

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1327 –show ethernet cfmmaintenance-pointsremote detailThis command displays detailed CFM informa

Page 367

CHAPTER 44 | CFM CommandsDefining CFM Structures– 1328 –ma-name – Maintenance association name. (Range: 1-44 alphanumeric characters)DEFAULT SETTI

Page 368

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1329 –Continuity Check Operations ethernet cfm cc maintervalThis command sets the transmissi

Page 369

CHAPTER 4 | Basic Management TasksDisplaying Bridge Extension Capabilities– 133 –PARAMETERSThe following parameters are displayed: ◆ Jumbo Frame –

Page 370 - ARP INSPECTION

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1330 –is registered. The interval at which CCMs are issued should therefore be configured to

Page 371 - SETTINGS FOR ARP

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1331 –◆ If a maintenance point receives a CCM with an invalid MEPID or MA level or an MA lev

Page 372

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1332 –EXAMPLEThis example enables SNMP traps for mep-up events.Console(config)#snmp-server e

Page 373

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1333 –DEFAULT SETTING NoneCOMMAND MODE Privileged ExecCOMMAND USAGE Use this command without

Page 374

CHAPTER 44 | CFM CommandsContinuity Check Operations– 1334 –show ethernet cfmerrorsThis command displays the CFM continuity check errors logged on

Page 375

CHAPTER 44 | CFM CommandsCross Check Operations– 1335 –Cross Check Operationsethernet cfm mepcrosscheck start-delayThis command sets the maximum d

Page 376

CHAPTER 44 | CFM CommandsCross Check Operations– 1336 –mep-unknown – Sends a trap if an unconfigured MEP comes up.DEFAULT SETTING All continuity c

Page 377

CHAPTER 44 | CFM CommandsCross Check Operations– 1337 –COMMAND USAGE ◆ Use this command to statically configure remote MEPs that exist inside the

Page 378

CHAPTER 44 | CFM CommandsCross Check Operations– 1338 –These remote MEPs are used in the cross-check operation to verify that all endpoints in the

Page 379 - 1. Click Security, IP Filter

CHAPTER 44 | CFM CommandsLink Trace Operations– 1339 –Link Trace Operationsethernet cfmlinktrace cacheThis command enables caching of CFM data lea

Page 380 - CONFIGURING PORT SECURITY

CHAPTER 4 | Basic Management TasksDisplaying Bridge Extension Capabilities– 134 –◆ VLAN Learning – This switch uses Independent VLAN Learning (IVL

Page 381

CHAPTER 44 | CFM CommandsLink Trace Operations– 1340 –COMMAND MODE Global ConfigurationCOMMAND USAGE Before setting the aging time for cache entri

Page 382

CHAPTER 44 | CFM CommandsLink Trace Operations– 1341 –ethernet cfmlinktraceThis command sends CFM link trace messages to the MAC address of a remo

Page 383

CHAPTER 44 | CFM CommandsLink Trace Operations– 1342 –◆ When using the command line or web interface, the source MEP used by to send a link trace

Page 384

CHAPTER 44 | CFM CommandsLoopback Operations– 1343 –Loopback Operationsethernet cfmloopbackThis command sends CFM loopback messages to a MAC addre

Page 385

CHAPTER 44 | CFM CommandsFault Generator Operations– 1344 –transmit-count – The number of times the loopback message is sent. (Range: 1-100)packet

Page 386

CHAPTER 44 | CFM CommandsFault Generator Operations– 1345 –DEFAULT SETTING 3 secondsCOMMAND MODE CFM Domain ConfigurationCOMMAND USAGE A fault ala

Page 387

CHAPTER 44 | CFM CommandsFault Generator Operations– 1346 –notification generator state machine has been reset, and repeat those steps until the f

Page 388

CHAPTER 44 | CFM CommandsFault Generator Operations– 1347 –mep fault-notifyreset-timeThis command configures the time after a fault alarm has been

Page 389 - Table 22: 802.1X Statistics

CHAPTER 44 | CFM CommandsDelay Measure Operations– 1348 –Delay Measure Operationsethernet cfm delay-measure two-wayThis command sends periodic del

Page 390 - DOS PROTECTION

CHAPTER 44 | CFM CommandsDelay Measure Operations– 1349 –Size: 64 bytesTimeout: 5 secondsCOMMAND MODE Privileged ExecCOMMAND USAGE ◆ Delay measure

Page 391 - IP SOURCE GUARD

CHAPTER 4 | Basic Management TasksManaging System Files– 135 –MANAGING SYSTEM FILESThis section describes how to upgrade the switch operating soft

Page 392 - IP Source Guard

CHAPTER 44 | CFM CommandsDelay Measure Operations– 1350 –

Page 393

– 1351 –45 DOMAIN NAME SERVICE COMMANDSThese commands are used to configure Domain Naming System (DNS) services. Entries can be manually configured

Page 394 - SOURCE GUARD

CHAPTER 45 | Domain Name Service Commands– 1352 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Domain names are added to the end of the list on

Page 395

CHAPTER 45 | Domain Name Service Commands– 1353 –◆ If all name servers are deleted, DNS will automatically be disabled.EXAMPLEThis example enables

Page 396 - DHCP SNOOPING

CHAPTER 45 | Domain Name Service Commands– 1354 –Domain Name List:Name Server List:Console#RELATED COMMANDS ip domain-list (1351)ip name-server (1

Page 397

CHAPTER 45 | Domain Name Service Commands– 1355 –ip name-server This command specifies the address of one or more domain name servers to use for n

Page 398

CHAPTER 45 | Domain Name Service Commands– 1356 –ipv6 host This command creates a static entry in the DNS table that maps a host name to an IPv6 a

Page 399

CHAPTER 45 | Domain Name Service Commands– 1357 –clear host This command deletes dynamic entries from the DNS table.SYNTAX clear host {name | *}na

Page 400

CHAPTER 45 | Domain Name Service Commands– 1358 –show dns cache This command displays entries in the DNS cache.COMMAND MODE Privileged ExecEXAMPLE

Page 401

CHAPTER 45 | Domain Name Service Commands– 1359 –Table 180: show hosts - display description Field DescriptionNo. The entry number for each resou

Page 402

CHAPTER 4 | Basic Management TasksManaging System Files– 136 –NOTE: Up to two copies of the system software (i.e., the runtime firmware) can be st

Page 403

CHAPTER 45 | Domain Name Service Commands– 1360 –

Page 404

– 1361 –46 DHCP COMMANDSThese commands are used to configure Dynamic Host Configuration Protocol (DHCP) client, relay, and server functions. Any VLA

Page 405 - ASIC ADMINISTRATION PROTOCOLS

CHAPTER 46 | DHCP CommandsDHCP Client– 1362 –DEFAULT SETTING Class identifier option enabled, with the name GTL-2691COMMAND MODE Interface Configu

Page 406 - Table 23: Logging Levels

CHAPTER 46 | DHCP CommandsDHCP Client– 1363 –EXAMPLEConsole(config)#interface vlan 2Console(config-if)#ip dhcp client class-id hex 000099669966Con

Page 407

CHAPTER 46 | DHCP CommandsDHCP Client– 1364 –ip dhcp restart client This command submits a BOOTP or DHCP client request.DEFAULT SETTING NoneCOMMAN

Page 408

CHAPTER 46 | DHCP CommandsDHCP Relay– 1365 –DHCP RELAYThis section describes commands used to configure DHCP relay functions for host devices atta

Page 409

CHAPTER 46 | DHCP CommandsDHCP Relay for IPv4– 1366 –RELATED COMMANDSip dhcp restart relay (1366)ip dhcp restart relay This command enables DHCP r

Page 410 - LINK LAYER DISCOVERY PROTOCOL

CHAPTER 46 | DHCP CommandsDHCP Relay for IPv6– 1367 –DHCP Relay for IPv6ipv6 dhcp relaydestinationThis command specifies the destination address o

Page 411 - Transmission Interval

CHAPTER 46 | DHCP CommandsDHCP Server– 1368 –EXAMPLE Console(config)#interface vlan 1Console(config-if)#ipv6 dhcp relay destination 2001:0DB8:3000

Page 412

CHAPTER 46 | DHCP CommandsDHCP Server– 1369 –ip dhcp excluded-addressThis command specifies IP addresses that the DHCP server should not assign to

Page 413

CHAPTER 4 | Basic Management TasksManaging System Files– 137 –SAVING THE RUNNINGCONFIGURATION TO ALOCAL FILEUse the System > File (Copy) page t

Page 414

CHAPTER 46 | DHCP CommandsDHCP Server– 1370 –ip dhcp pool This command configures a DHCP address pool and enter DHCP Pool Configuration mode. Use

Page 415

CHAPTER 46 | DHCP CommandsDHCP Server– 1371 –COMMAND USAGEIf the DHCP server is running, you must restart it to implement any configuration change

Page 416

CHAPTER 46 | DHCP CommandsDHCP Server– 1372 –COMMAND MODE DHCP Pool ConfigurationCOMMAND USAGE ◆ This command identifies a DHCP client to bind to

Page 417

CHAPTER 46 | DHCP CommandsDHCP Server– 1373 –dns-server This command specifies the Domain Name System (DNS) IP servers available to a DHCP client.

Page 418

CHAPTER 46 | DHCP CommandsDHCP Server– 1374 –hardware-address This command specifies the hardware address of a DHCP client. This command is valid

Page 419 - Table 26: Port ID Subtype

CHAPTER 46 | DHCP CommandsDHCP Server– 1375 –COMMAND MODEDHCP Pool ConfigurationUSAGE GUIDELINES ◆ Host addresses must fall within the range speci

Page 420

CHAPTER 46 | DHCP CommandsDHCP Server– 1376 –hours - Specifies the number of hours in the lease. A days value must be supplied before you can conf

Page 421

CHAPTER 46 | DHCP CommandsDHCP Server– 1377 –EXAMPLE Console(config-dhcp)#netbios-name-server 10.1.0.33 10.1.0.34Console(config-dhcp)#RELATED COMM

Page 422

CHAPTER 46 | DHCP CommandsDHCP Server– 1378 –COMMAND MODEDHCP Pool ConfigurationUSAGE GUIDELINES ◆ When a client request is received, the switch f

Page 423

CHAPTER 46 | DHCP CommandsDHCP Server– 1379 –EXAMPLE Console(config-dhcp)#next-server 10.1.0.21Console(config-dhcp)#RELATED COMMANDSbootfile (1371

Page 424

CHAPTER 4 | Basic Management TasksManaging System Files– 138 –If you replaced a file currently used for startup and want to start using the new fi

Page 425

CHAPTER 46 | DHCP CommandsDHCP Server– 1380 –DEFAULT SETTING NoneCOMMAND MODENormal Exec, Privileged ExecEXAMPLEConsole#show ip dhcp binding I

Page 426 - – 426 –

– 1381 –47 VRRP COMMANDSVirtual Router Redundancy Protocol (VRRP) use a virtual IP address to support a primary router and multiple backup routers.

Page 427

CHAPTER 47 | VRRP Commands– 1382 –vrrp authentication This command specifies the key used to authenticate VRRP packets received from other routers

Page 428 - SETTINGS FOR SNMP

CHAPTER 47 | VRRP Commands– 1383 –COMMAND MODE Interface (VLAN)COMMAND USAGE ◆ The interfaces of all routers participating in a virtual router gro

Page 429 - ENGINE ID

CHAPTER 47 | VRRP Commands– 1384 –COMMAND USAGE ◆ If preempt is enabled, and this backup router has a priority higher than the current acting mast

Page 430 - SPECIFYING A REMOTE

CHAPTER 47 | VRRP Commands– 1385 –◆ If the backup preempt function is enabled with the vrrp preempt command, and a backup router with a priority h

Page 431

CHAPTER 47 | VRRP Commands– 1386 –EXAMPLEConsole(config-if)#vrrp 1 timers advertise 5Console(config-if)#clear vrrp interfacecountersThis command c

Page 432 - SETTING SNMPV3

CHAPTER 47 | VRRP Commands– 1387 –COMMAND MODE Privileged ExecCOMMAND USAGE ◆ Use this command without any keywords to display the full listing of

Page 433 - – 433 –

CHAPTER 47 | VRRP Commands– 1388 –This example displays the brief listing of status information for all groups.Console#show vrrp briefInterface

Page 434

CHAPTER 47 | VRRP Commands– 1389 –EXAMPLEThis example displays the full listing of status information for VLAN 1.Console#show vrrp interface vlan

Page 435 - SNMPV3 GROUPS

CHAPTER 4 | Basic Management TasksManaging System Files– 139 –WEB INTERFACETo show the system files:1. Click System, then File. 2. Select Show fro

Page 436

CHAPTER 47 | VRRP Commands– 1390 –show vrrp routercountersThis command displays counters for errors found in VRRP protocol packets.COMMAND MODE Pr

Page 437

– 1391 –48 IP INTERFACE COMMANDS An IP Version 4 and Version 6 address may be used for management access to the switch over the network. Both IPv4 o

Page 438

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1392 –BASIC IPV4CONFIGURATIONThis section describes commands used to configure IP addresses for

Page 439 - ACCESS STRINGS

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1393 –◆ Before any network interfaces are configured on the router, first create a VLAN for each

Page 440 - SNMPV3 USERS

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1394 –ip default-gateway This command specifies the default gateway for destinations not found i

Page 441

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1395 –RELATED COMMANDS ip route (1448)show ip route (1450)ipv6 default-gateway (1408)show ip int

Page 442 - CONFIGURING REMOTE

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1396 –ICMP Statistics:ICMP received 45 input 45 errors

Page 443

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1397 –◆ A trace terminates when the destination responds, when the maximum timeout (TTL) is exce

Page 444 - – 444 –

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1398 –COMMAND MODE Normal Exec, Privileged ExecCOMMAND USAGE ◆ Use the ping command to see if an

Page 445 - MANAGERS

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1399 –ARP CONFIGURATION This section describes commands used to configure the Address Resolution

Page 446

CONTENTS– 14 –Configuring IP Routing Interfaces 624Configuring Local and Remote Interfaces 624Using the Ping Function 625Using the Trace Route Fu

Page 447 - – 447 –

CHAPTER 4 | Basic Management TasksManaging System Files– 140 –indicated here). Enter the file name for other switches described in this manual exa

Page 448

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1400 –EXAMPLEConsole(config)#arp 10.1.0.19 01-02-03-04-05-06Console(config)#RELATED COMMANDS cle

Page 449 - CREATING SNMP

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1401 –ip proxy-arp This command enables proxy Address Resolution Protocol (ARP). Use the no form

Page 450

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1402 –show arp This command displays entries in the Address Resolution Protocol (ARP) cache.COMM

Page 451 - STATISTICS

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1403 –UDP HELPERCONFIGURATIONUser Datagram Protocol (UDP) Helper allows host applications to for

Page 452 - – 452 –

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1404 –EXAMPLEThis example enables forwarding for DHCPv6 UDP packets.Console(config)#ip forward-p

Page 453 - REMOTE MONITORING

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1405 –ip helper-address This command specifies the application server or subnet (indicated by a

Page 454

CHAPTER 48 | IP Interface CommandsIPv4 Interface– 1406 –EXAMPLEThis example indicates that designated UDP broadcast packets are to be forwarded to

Page 455

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1407 –IPV6 INTERFACEThis switch supports the following IPv6 interface commands. Table 195: IPv6

Page 456

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1408 –Interface Address Configuration and Utilitiesipv6 default-gatewayThis command sets an IPv6

Page 457 - CONFIGURING RMON

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1409 –◆ An IPv6 default gateway can only be successfully set when a network interface that direc

Page 458

CHAPTER 4 | Basic Management TasksManaging System Files– 141 –PARAMETERSThe following parameters are displayed: ◆ Automatic Opcode Upgrade – Enabl

Page 459

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1410 –◆ When configuring a global IPv6 address for a static tunnel, the link-local address gener

Page 460

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1411 –ipv6 address eui-64 This command configures an IPv6 address for an interface using an EUI-

Page 461

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1412 –◆ For example, if a device had an EUI-48 address of 28-9F-18-1C-82-35, the global/local bi

Page 462

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1413 –ipv6 addresslink-localThis command configures an IPv6 link-local address for an interface

Page 463

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1414 –FF02::1IPv6 link MTU is 1500 bytesND DAD is enabled, number of DAD attempts: 3.ND retransm

Page 464 - – 464 –

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1415 –Link-local address: FE80::200:E8FF:FE93:82A0/64Global unicast address(es): 2001:DB8:2222

Page 465 - – 465 –

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1416 –◆ IPv6 must be enabled on an interface before the MTU can be set.EXAMPLE The following exa

Page 466 - – 466 –

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1417 –FF02::1IPv6 link MTU is 1280 bytesND DAD is enabled, number of DAD attempts: 2.ND retransm

Page 467 - CONFIGURATION

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1418 –This example displays a brief summary of IPv6 addresses configured on the switch.Console#s

Page 468 - ERPS RING

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1419 –show ipv6 traffic This command displays statistics about IPv6 traffic passing through this

Page 469 - – 469 –

CHAPTER 4 | Basic Management TasksManaging System Files– 142 –ExamplesThe following examples demonstrate the URL syntax for a TFTP server at IP ad

Page 470 - – 470 –

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1420 – 3 neighbor solicit messages neighbor advertisement

Page 471

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1421 –reassembly succeeded The number of IPv6 datagrams successfully reassembled. Note that this

Page 472

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1422 –echo request messages The number of ICMP Echo (request) messages received by the interface

Page 473 - – 473 –

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1423 –clear ipv6 traffic This command resets IPv6 traffic counters.COMMAND MODE Privileged ExecC

Page 474 - CONNECTIVITY FAULT MANAGEMENT

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1424 –size - Number of bytes in a packet. (Range: 0-1500 bytes) The actual packet size will be e

Page 475

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1425 –traceroute6 This command shows the route packets take to the specified destination. SYNTAX

Page 476

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1426 –Hop Packet 1 Packet 2 Packet 3 IPv6 Address--- -------- -------- -------- ----------------

Page 477

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1427 –vlan-id - VLAN ID (Range: 1-4093) hardware-address - The 48-bit MAC layer address for the

Page 478

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1428 –ipv6 nd dadattemptsThis command configures the number of consecutive neighbor solicitation

Page 479

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1429 –EXAMPLE The following configures five neighbor solicitation attempts for addresses configu

Page 480

CHAPTER 4 | Basic Management TasksSetting the System Clock– 143 –Figure 11: Configuring Automatic Code UpgradeIf a new image is found at the spec

Page 481

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1430 –◆ The ipv6 nd other-config-flag command is used to tell hosts that they should use statefu

Page 482

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1431 –EXAMPLE The following tells hosts to use stateful autoconfiguration to obtain other non-ad

Page 483

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1432 –FF02::2FF02::1:FF00:0FF02::1:2FF02::1:FF9C:CA10FF02::1IPv6 link MTU is 1500 bytesND DAD is

Page 484

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1433 –EXAMPLE The following sets the reachable time for a remote node to 1000 milliseconds:Conso

Page 485

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1434 –COMMAND USAGE ◆ Prefixes configured as addresses on an interface using the ipv6 address co

Page 486

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1435 –by the system (33% of the maximum RA interval) and the maximum value set by the ipv6 nd ra

Page 487

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1436 –ipv6 nd rarouter-preferenceThis command configures the default router preference for the r

Page 488

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1437 –EXAMPLE The following suppressed router advertisements on the current interface:Console(co

Page 489

CHAPTER 48 | IP Interface CommandsIPv6 Interface– 1438 –IPv6 Address Age Link-layer Addr State VLANFE80::2E0:CF

Page 490

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1439 –IPV6 TO IPV4 TUNNELSThis switch supports connection between isolated IPv6 nodes over

Page 491

CHAPTER 4 | Basic Management TasksSetting the System Clock– 144 –PARAMETERSThe following parameters are displayed: ◆ Current Time – Shows the curr

Page 492

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1440 –7. Bind the tunnel to a VLAN with the tunnel source vlan command.8. Assign an IPv6 g

Page 493

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1441 –tunnel destination This command sets the IPv4 address of a tunnel destination (or fa

Page 494

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1442 –packets (by ensuring an IPv4 MTU of at least 1300 bytes is used) or by preventing fr

Page 495

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1443 –The 6to4 mechanism is typically implemented almost entirely in routers bordering

Page 496

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1444 –tunnel end-point IPv4 address. This eliminates the need to explicitly configure the

Page 497

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1445 –tunnel ttl This command configures the TTL (Time to Live) value stored in the IPv4 h

Page 498

CHAPTER 48 | IP Interface CommandsIPv6 to IPv4 Tunnels– 1446 –The following example shows the interface status of the configured tunnels. Console#

Page 499

– 1447 –49 IP ROUTING COMMANDSAfter network interfaces are configured for the switch, the paths used to send traffic between different interfaces mu

Page 500

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1448 –IPv4 Commandsip route This command configures static routes. Use the no form t

Page 501

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1449 –◆ If both static and dynamic paths have the same lowest cost, the first route

Page 502

CHAPTER 4 | Basic Management TasksSetting the System Clock– 145 –SETTING THE SNTPPOLLING INTERVALUse the System > Time (Configure General - SNT

Page 503

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1450 –show ip host-route This command displays the interface associated with known r

Page 504

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1451 –COMMAND MODE Privileged ExecCOMMAND USAGE ◆ The FIB contains information requi

Page 505 - REMOTE MEPS

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1452 –Information Base (see Command Usage under the show ip route command).EXAMPLE C

Page 506 - 5. Select a MEP ID

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1453 –IP sent forwards datagrams 5927 requests

Page 507 - TRACE CACHE

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1454 –IPv6 Commandsipv6 route This command configures static IPv6 routes. Use the no

Page 508 - SETTINGS

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1455 –◆ If both static and dynamic paths have the same lowest cost, the first route

Page 509 - CONTINUITY CHECK

CHAPTER 49 | IP Routing CommandsGlobal Routing Configuration– 1456 –COMMAND MODE Privileged ExecCOMMAND USAGE ◆ The FIB contains information requi

Page 510

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1457 –ROUTING INFORMATION PROTOCOL (RIP).Table 204: Routing Information Protoc

Page 511 - 15 MULTICAST FILTERING

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1458 –router rip This command enables Routing Information Protocol (RIP) routi

Page 512 - IGMP PROTOCOL

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1459 –RELATED COMMANDSip route (1448)redistribute (1463)default-metric This co

Page 513 - Figure 290: IGMP Protocol

CHAPTER 4 | Basic Management TasksSetting the System Clock– 146 –CONFIGURING NTP Use the System > Time (Configure General - NTP) page to config

Page 514

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1460 –distance This command defines an administrative distance for external ro

Page 515

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1461 –maximum-prefix This command sets the maximum number of RIP routes allowe

Page 516

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1462 –EXAMPLEConsole(config-router)#neighbor 10.2.0.254Console(config-router)#

Page 517

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1463 –passive-interface This command stops RIP from sending routing updates on

Page 518

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1464 –COMMAND MODE Router ConfigurationCOMMAND USAGE ◆ When a metric value has

Page 519

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1465 –timers basic This command configures the RIP update timer, timeout timer

Page 520

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1466 –version This command specifies a RIP version used globally by the router

Page 521

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1467 –ip rip authenticationmodeThis command specifies the type of authenticati

Page 522

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1468 –ip rip authenticationstringThis command specifies an authentication key

Page 523

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1469 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE ◆ Use this comm

Page 524

CHAPTER 4 | Basic Management TasksSetting the System Clock– 147 –CONFIGURING TIMESERVERSUse the System > Time (Configure Time Server) pages to

Page 525

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1470 –EXAMPLEConsole(config)#interface vlan 1Console(config-if)#ip rip receive

Page 526

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1471 –RELATED COMMANDSversion (1466)ip rip send-packet This command configures

Page 527

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1472 –COMMAND USAGE ◆ Split horizon never propagates routes back to an interfa

Page 528

CHAPTER 49 | IP Routing CommandsRouting Information Protocol (RIP)– 1473 –the RIP routes learned from neighbors and also keep the RIP network inta

Page 529

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1474 –EXAMPLE Console#show ip ripCodes: R - RIP, Rc - RIP connected, Rs - RIP s

Page 530

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1475 –area stub Defines a stubby area that cannot send or receive LSAs RCarea v

Page 531

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1476 –General Configurationrouter ospf This command enables Open Shortest Path

Page 532

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1477 –destination. When disabled, preference is based on type of path (where ty

Page 533

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1478 –◆ The metric for the default external route is used to calculate the path

Page 534

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1479 –router-id This command assigns a unique router ID for this device within

Page 535

CHAPTER 4 | Basic Management TasksSetting the System Clock– 148 –SPECIFYING NTP TIME SERVERSUse the System > Time (Configure Time Server – Add

Page 536

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1480 –timers spf This command configures the delay after receiving a topology c

Page 537

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1481 –EXAMPLEConsole#clear ip ospf processConsole#Route Metrics and Summariesar

Page 538

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1482 –area range This command summarizes the routes advertised by an Area Borde

Page 539

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1483 –auto-cost reference-bandwidthUse this command to calculate the default me

Page 540

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1484 –default-metric This command sets the default metric for external routes i

Page 541

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1485 –redistribute This command redistributes external routing information from

Page 542

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1486 –the cost associated with reaching the advertising ASBR, plus the cost of

Page 543

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1487 –EXAMPLEThis example creates a summary address for all routes contained in

Page 544

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1488 –other areas within the AS for an NSSA ABR, or to areas outside the AS for

Page 545

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1489 –EXAMPLEThis example creates a stub area 10.3.0.0, and assigns all interfa

Page 546

CHAPTER 4 | Basic Management TasksSetting the System Clock– 149 –To show the list of configured NTP time servers:1. Click System, then Time. 2. Se

Page 547

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1490 –EXAMPLEThis example creates a stub area 10.2.0.0, and assigns all interfa

Page 548

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1491 –value must be the same for all routers attached to an autonomous system.

Page 549

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1492 –DEFAULT SETTING area-id: Nonerouter-id: Nonehello-interval: 10 secondsret

Page 550

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1493 –network area This command defines an OSPF area and the interfaces that op

Page 551

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1494 –Interface Configurationip ospfauthenticationThis command specifies the au

Page 552

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1495 –◆ The plain-text authentication-key, or the MD5 key-id and key, must be u

Page 553

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1496 –EXAMPLEThis example sets a password for the specified interface.Console(c

Page 554

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1497 –ip ospf dead-interval This command sets the interval at which hello packe

Page 555

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1498 –ip ospf hello-interval This command specifies the interval between sendin

Page 556

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1499 –DEFAULT SETTING MD5 authentication is disabled.COMMAND USAGE ◆ Before spe

Page 557 - Figure 326: MVR Concept

CONTENTS– 15 –Configuring Stub Settings 682Displaying Information on NSSA and Stub Areas 684Configuring Area Ranges (Route Summarization for ABRs)

Page 558

CHAPTER 4 | Basic Management TasksSetting the System Clock– 150 –Figure 18: Adding an NTP Authentication KeyTo show the list of configured NTP au

Page 559

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1500 –DEFAULT SETTING 1COMMAND USAGE ◆ A designated router (DR) and backup desi

Page 560

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1501 –COMMAND USAGE ◆ A router will resend an LSA to a neighbor if it receives

Page 561

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1502 –EXAMPLEConsole(config)#interface vlan 1Console(config-if)#ip ospf transmi

Page 562

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1503 –EXAMPLEConsole#show ip ospf Routing Process "ospf 1" with ID 19

Page 563

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1504 –show ip ospfborder-routersThis command shows entries in the routing table

Page 564

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1505 –show ip ospfdatabaseThis command shows information about different OSPF L

Page 565

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1506 – Net Link States (Area 0.0.0.0)Link ID ADV Router

Page 566

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1507 –The following shows output when using the external keyword.Console#show i

Page 567

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1508 – External Route Tag: 0Console#The following shows output when usin

Page 568

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1509 –The following shows output when using the router keyword.Console#show ip

Page 569

CHAPTER 4 | Basic Management TasksConsole Port Settings– 151 –◆ Minutes (0-59) – The number of minutes before/after UTC.WEB INTERFACETo set your l

Page 570

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1510 –The following shows output when using the summary keyword.Console#show ip

Page 571

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1511 –show ip ospfinterfaceThis command displays summary information for OSPF i

Page 572

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1512 –show ip ospfneighborThis command displays information about neighboring r

Page 573 - 16 IP CONFIGURATION

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1513 –EXAMPLEConsole#show ip ospf neighbor ID Pri State

Page 574 -

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1514 –IA 172.16.10.0/24 [30] via 10.10.11.50, VLAN2, Area 0.0.0.0E2 192.168.0.0

Page 575

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv2)– 1515 –show ip protocolsospfThis command displays OSPF process parameters.SYNTAX

Page 576

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1516 –OPEN SHORTEST PATH FIRST (OSPFV3). Table 217: Open Shortest Path First Co

Page 577

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1517 –General GuidelinesFollow these basic steps to configure OSPFv3:1. Assign

Page 578

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1518 –COMMAND USAGE ◆ This command is used to enable an OSPFv3 routing process,

Page 579 - INTERFACE SETTINGS

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1519 –DEFAULT SETTING ciscoCOMMAND USAGE ◆ The basic criteria for a router to s

Page 580

CHAPTER 4 | Basic Management TasksConsole Port Settings– 152 –◆ Exec Timeout – Sets the interval that the system waits until user input is detecte

Page 581

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1520 –max-current-dd This command sets the maximum number of neighbors with whi

Page 582

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1521 –COMMAND USAGE ◆ This command sets the router ID for the OSPF process spec

Page 583

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1522 –◆ Using a low value for the holdtime allows the router to switch to a new

Page 584

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1523 –area range This command summarizes the routes advertised by an Area Borde

Page 585

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1524 –default-metric This command sets the default metric for external routes i

Page 586

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1525 –type-value1 - Type 1 external route2 - Type 2 external route (default) -

Page 587 - NEIGHBOR CACHE

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1526 –no-summary - Stops an Area Border Router (ABR) from sending summary link

Page 588

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1527 –area virtual-link This command defines a virtual link. To remove a virtua

Page 589

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1528 –DEFAULT SETTING area-id: Nonerouter-id: Nonehello-interval: 10 secondsret

Page 590

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1529 –COMMAND MODE Interface ConfigurationDEFAULT SETTING NoneCOMMAND USAGE ◆ A

Page 591

CHAPTER 4 | Basic Management TasksTelnet Settings– 153 –Figure 21: Console Port SettingsTELNET SETTINGSUse the System > Telnet menu to configu

Page 592

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1530 –ipv6 router ospf tagareaThis command binds an OSPF area to the selected i

Page 593

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1531 –RELATED COMMANDSrouter ipv6 ospf (1517)router-id (1520)ipv6 router ospf a

Page 594

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1532 –ipv6 ospf dead-intervalThis command sets the interval at which hello pack

Page 595 - 17 IP SERVICES

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1533 –ipv6 ospf hello-intervalThis command specifies the interval between sendi

Page 596 - Domain Name Service

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1534 –COMMAND MODE Interface Configuration (VLAN)DEFAULT SETTING 1COMMAND USAGE

Page 597

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1535 –DEFAULT SETTING 5 secondsCOMMAND USAGE ◆ A router will resend an LSA to a

Page 598

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1536 –receive them. To avoid this problem, use the transmit delay to force the

Page 599

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1537 –Display Informationshow ipv6 ospf This command shows basic information ab

Page 600

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1538 –show ipv6 ospfdatabaseThis command shows information about different OSPF

Page 601

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1539 – AS-external-LSALink State ID ADV Router Age Seq#

Page 602 - CLIENT IDENTIFIER

CHAPTER 4 | Basic Management TasksTelnet Settings– 154 –◆ Exec Timeout – Sets the interval that the system waits until user input is detected. If

Page 603

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1540 –show ipv6 ospfneighborThis command displays information about neighboring

Page 604 - Figure 363: DHCP Server

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1541 –EXAMPLEConsole#show ipv6 ospf neighbor ID Pri State

Page 605

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1542 –C 2001:DB8:2222:7272::/64, VLAN1? FE80::/64, VLAN1 inactiveC FE8

Page 606

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1543 –RELATED COMMANDSarea virtual-link (1527)Hello due The timeout for the nex

Page 607

CHAPTER 49 | IP Routing CommandsOpen Shortest Path First (OSPFv3)– 1544 –

Page 608

– 1545 –50 MULTICAST ROUTING COMMANDSMulticast routers can use various kinds of multicast routing protocols to deliver IP multicast packets across d

Page 609

CHAPTER 50 | Multicast Routing CommandsGeneral Multicast Routing– 1546 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ This command is used to e

Page 610

CHAPTER 50 | Multicast Routing CommandsGeneral Multicast Routing– 1547 –IP Multicast Routing Table Flags: D - Dense, S - Sparse, s - SSM Channel,

Page 611

CHAPTER 50 | Multicast Routing CommandsGeneral Multicast Routing– 1548 –This example lists all entries in the multicast table in summary form:Cons

Page 612

CHAPTER 50 | Multicast Routing CommandsGeneral Multicast Routing– 1549 –EXAMPLE Console(config)#ipv6 multicast-routingConsole(config)#show ipv6 mr

Page 613

CHAPTER 4 | Basic Management TasksDisplaying CPU Utilization– 155 –DISPLAYING CPU UTILIZATIONUse the System > CPU Utilization page to display i

Page 614 - TARGET SERVER OR

CHAPTER 50 | Multicast Routing CommandsGeneral Multicast Routing– 1550 –Table 226: show ip mroute - display descriptionField DescriptionFlagsThe f

Page 615

CHAPTER 50 | Multicast Routing CommandsStatic Multicast Routing– 1551 –This example lists all entries in the multicast table in summary form:Conso

Page 616

CHAPTER 50 | Multicast Routing CommandsStatic Multicast Routing– 1552 –COMMAND USAGE Depending on your network connections, IGMP snooping may not

Page 617 - PPPOEIA INTERFACE

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1553 –PIM MULTICAST ROUTINGThis section describes the PIM commands used for IPv4 and

Page 618

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1554 –Shared Mode Commandsrouter pim This command enables IPv4 Protocol-Independent

Page 619 - SHOWING PPPOE IA

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1555 –EXAMPLEConsole(config)#router pimConsole(config)#exitConsole#show ip pim inter

Page 620

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1556 –determines that there are no group members or downstream routers, or when a pr

Page 621 - 18 GENERAL IP ROUTING

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1557 –COMMAND USAGE The ip pim hello-holdtime should be greater than the value of ip

Page 622 - IP ROUTING AND SWITCHING

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1558 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE The multicast interfa

Page 623 - IP Routing and Switching

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1559 –RELATED COMMANDSip pim override-interval (1559)ip pim propagation-delay (1560)

Page 624

CHAPTER 4 | Basic Management TasksDisplaying Memory Utilization– 156 –DISPLAYING MEMORY UTILIZATIONUse the System > Memory Status page to displ

Page 625 - FUNCTION

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1560 –ip pim propagation-delayThis command configures the propagation delay required

Page 626

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1561 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE ◆ When a router first

Page 627 - ADDRESS RESOLUTION PROTOCOL

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1562 –show ip pimneighborThis command displays information about PIM neighbors.SYNTA

Page 628

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1563 –COMMAND USAGE A graft message is sent by a router to cancel a prune state. Whe

Page 629 - Figure 382: Proxy ARP

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1564 –COMMAND MODE Interface Configuration (VLAN)COMMAND USAGE ◆ The pruned state ti

Page 630

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1565 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ When the ip pim bsr-candidate

Page 631

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1566 –COMMAND MODE Global ConfigurationCOMMAND USAGE This command can be used to rel

Page 632

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1567 –ip pim rp-address This command sets a static address for the Rendezvous Point

Page 633 - Table 36: ARP Statistics

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1568 –EXAMPLEIn the following example, the first PIM-SM command just specifies the R

Page 634

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1569 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ When the ip pim rp-candidate

Page 635 - DISPLAYING THE ROUTING TABLE

CHAPTER 4 | Basic Management TasksResetting the System– 157 –Master unit is taken as the top of the stack and is numbered as unit 1, and all other

Page 636

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1570 –ip pim spt-threshold This command prevents the last-hop PIM router from switch

Page 637 - EQUAL-COST MULTIPATH ROUTING

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1571 –ip pim dr-priority This command sets the priority value for a Designated Route

Page 638

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1572 –Console#ip pim join-prune-intervalThis command sets the join/prune timer. Use

Page 639 - CONFIGURING ROUTER REDUNDANCY

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1573 – Propagation Delay : 500 ms Override Interval : 2500

Page 640 - CONFIGURING VRRP GROUPS

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1574 –State : Elected BSRConsole#show ip pim rpmappingThis command displa

Page 641

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1575 –show ip pim rp-hash This command displays the RP used for the specified multic

Page 642

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1576 –ipv6 pim hello-interval Sets the interval between sending PIM hello messages I

Page 643

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1577 –PIM6 Shared Mode Commandsrouter pim6 This command enables IPv6 Protocol-Indepe

Page 644

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1578 –globally for the router with the router pim6 command, and also enable PIM-DM o

Page 645

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1579 –ipv6 pim hello-holdtimeThis command configures the interval to wait for hello

Page 646 - 3. Click Global Statistics

CHAPTER 4 | Basic Management TasksResetting the System– 158 –PARAMETERSThe following parameters are displayed: System Reload Information◆ Reload S

Page 647

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1580 –EXAMPLEConsole(config-if)#ipv6 pim hello-interval 60Console(config-if)#ipv6 pi

Page 648 - 3. Click Group Statistics

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1581 –COMMAND USAGE ◆ When other downstream routers on the same VLAN are notified th

Page 649 - 20 UNICAST ROUTING

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1582 –Join message back to the upstream router to ensure that the flow is not termin

Page 650

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1583 –ipv6 pim trigger-hello-delayThis command configures the maximum time before tr

Page 651 -

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1584 –EXAMPLEConsole#show ipv6 pim interface vlan 1PIM is enabled.VLAN 1 is up. PIM

Page 652

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1585 –PIM-DM Commandsipv6 pim graft-retry-intervalThis command configures the time t

Page 653

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1586 –ipv6 pim max-graft-retriesThis command configures the maximum number of times

Page 654 - THE ROUTING

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1587 –◆ This command is only effectively for interfaces of first hop, PIM-DM routers

Page 655

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1588 –◆ This router will continue to be the BSR until it receives a bootstrap messag

Page 656

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1589 –EXAMPLEThis example sets the register rate limit to 500 pps. Console(config)#i

Page 657

CHAPTER 4 | Basic Management TasksResetting the System– 159 – Weekly - Day of the week at which to reload. (Range: Sunday ... Saturday) Monthly -

Page 658

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1590 –ipv6 pim rp-address This command sets a static address for the Rendezvous Poin

Page 659 - REDISTRIBUTION

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1591 –EXAMPLEIn the following example, the first PIM-SM command just specifies the R

Page 660

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1592 –candidate RP for the specified group addresses. The IP address of the designat

Page 661

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1593 –ipv6 pim spt-thresholdThis command prevents the last-hop PIM router from switc

Page 662

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1594 –ipv6 pim dr-priority This command sets the priority value for a Designated Rou

Page 663

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1595 –Console#ipv6 pim join-prune-intervalThis command sets the join/prune timer. Us

Page 664

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1596 – Propagation Delay : 500 ms Override Interval : 2500 ms DR Priorit

Page 665

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1597 –State : Elected BSRConsole#show ipv6 pim rpmappingThis command disp

Page 666

CHAPTER 50 | Multicast Routing CommandsPIM Multicast Routing– 1598 –show ipv6 pim rp-hashThis command displays the RP used for the specified multi

Page 667

– 1599 –SECTION IVAPPENDICESThis section provides additional information and includes these items:◆ "Software Specifications" on page 1601

Page 668

CONTENTS– 16 –SECTION III COMMAND LINE INTERFACE 74522 USING THE COMMAND LINE INTERFACE 747Accessing the CLI 747Console Connection 747Telnet Conne

Page 669 - Figure 421: Configuring OSPF

CHAPTER 4 | Basic Management TasksResetting the System– 160 –Figure 27: Restarting the Switch (In)Figure 28: Restarting the Switch (At)Figure 29

Page 670 - Figure 422: OSPF Areas

SECTION IV | Appendices– 1600 –

Page 671

– 1601 –A SOFTWARE SPECIFICATIONSSOFTWARE FEATURESMANAGEMENTAUTHENTICATIONLocal, RADIUS, TACACS+, Port Authentication (802.1X), HTTPS, SSH, Port Sec

Page 672

CHAPTER A | Software SpecificationsSoftware Features– 1602 –VLAN SUPPORT Up to 4093 groups; port-based, protocol-based, tagged (802.1Q),voice VLAN

Page 673

CHAPTER A | Software SpecificationsManagement Features– 1603 –MANAGEMENT FEATURESIN-BAND MANAGEMENT Telnet, web-based HTTP or HTTPS, SNMP manager,

Page 674

CHAPTER A | Software SpecificationsManagement Information Bases– 1604 –IGMPv2 (RFC 2236)IGMPv3 (RFC 3376) - partial supportIGMP Proxy (RFC 4541)IP

Page 675

CHAPTER A | Software SpecificationsManagement Information Bases– 1605 –MIB II (RFC 1213)OSPF MIB (RFC 1850)OSPFv3 MIB (draft-ietf-ospf-ospfv3-mib-

Page 676

CHAPTER A | Software SpecificationsManagement Information Bases– 1606 –

Page 677

– 1607 –B TROUBLESHOOTINGPROBLEMS ACCESSING THE MANAGEMENT INTERFACE Table 239: Troubleshooting ChartSymptom ActionCannot connect using Telnet, web

Page 678

CHAPTER B | TroubleshootingUsing System Logs– 1608 –USING SYSTEM LOGSIf a fault does occur, refer to the Installation Guide to ensure that the pro

Page 679 - Figure 431: OSPF NSSA

– 1609 –C LICENSE INFORMATIONThis product includes copyrighted third-party software subject to the terms of the GNU General Public License (GPL), GN

Page 680

– 161 –5 INTERFACE CONFIGURATIONThis chapter describes the following topics:◆ Port Configuration – Configures connection settings, including auto-ne

Page 681

CHAPTER C | License InformationThe GNU General Public License– 1610 –GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND

Page 682 - Figure 433: OSPF Stub Area

CHAPTER C | License InformationThe GNU General Public License– 1611 –b) Accompany it with a written offer, valid for at least three years, to give

Page 683

CHAPTER C | License InformationThe GNU General Public License– 1612 –9. If the distribution and/or use of the Program is restricted in certain cou

Page 684

– 1613 –GLOSSARYACL Access Control List. ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 685

GLOSSARY– 1614 –DIFFSERV Differentiated Services provides quality of service on large networks by employing a well-defined set of building blocks fr

Page 686

GLOSSARY– 1615 –GMRP Generic Multicast Registration Protocol. GMRP allows network devices to register end stations with multicast groups. GMRP requi

Page 687

GLOSSARY– 1616 –IGMP Internet Group Management Protocol. A protocol through which hosts can register with their local router for multicast services.

Page 688

GLOSSARY– 1617 –LINK AGGREGATION See Port Trunk. LLDP Link Layer Discovery Protocol is used to discover basic information about neighboring devices

Page 689

GLOSSARY– 1618 –OSPF Open Shortest Path First is a link-state routing protocol that functions better over a larger network such as the Internet, as

Page 690

GLOSSARY– 1619 –RIP Routing Information Protocol seeks to find the shortest route to another device by minimizing the distance-vector, or hop count,

Page 691

CHAPTER 5 | Interface ConfigurationPort Configuration– 162 –◆ When using auto-negotiation, the optimal settings will be negotiated between the lin

Page 692

GLOSSARY– 1620 –TELNET Defines a remote communication facility for interfacing to a terminal device over TCP/IP.TFTP Trivial File Transfer Protocol.

Page 693

– 1621 –COMMAND LISTAaaa accounting dot1x 876aaa accounting exec 877aaa accounting update 878aaa authorization exec 879aaa group server 88

Page 694

COMMAND LIST– 1622 –default-information originate 1458default-information originate 1477default-metric 1459default-metric 1484default-metric

Page 695

COMMAND LIST– 1623 –ip domain-name 1353ip forward-protocol udp 1403ip helper 1404ip helper-address 1405ip host 1354ip http port 884ip ht

Page 696

COMMAND LIST– 1624 –ipv6 access-group 985ipv6 address 1409ipv6 address eui-64 1411ipv6 address link-local 1413ipv6 default-gateway 1408ip

Page 697

COMMAND LIST– 1625 –lldp reinit-delay 1289lldp tx-delay 1290logging facility 799logging history 799logging host 800logging on 801logging

Page 698

COMMAND LIST– 1626 –ntp client 813ntp server 814Pparity 792passive-interface 1463passive-interface 1502passive-interface 1536password

Page 699

COMMAND LIST– 1627 –show class-map 1183show cluster 824show cluster candidates 825show cluster members 825show dns 1357show dns cache 13

Page 700

COMMAND LIST– 1628 –show lacp 1025show line 797show lldp config 1303show lldp info local-device 1304show lldp info remote-device 1305show

Page 701 - 2. Click LSDB

COMMAND LIST– 1629 –snmp-server enable traps ethernet cfm cc 1331snmp-server enable traps ethernet cfm crosscheck 1335snmp-server engine-id 83

Page 702

CHAPTER 5 | Interface ConfigurationPort Configuration– 163 –◆ Name – Allows you to label an interface. (Range: 1-64 characters)◆ Admin – Allows yo

Page 703 - 2. Click Neighbor

COMMAND LIST– 1630 –vlan-trunking 1120voice vlan 1148voice vlan aging 1149voice vlan mac-address 1149vrrp authentication 1382vrrp ip 138

Page 704

– 1631 –INDEXNUMERICS802.1Q tunnel 215, 1123access 1125configuration, guidelines 218, 1123configuration, limitations 218, 1124CVID to SVID m

Page 705 - 21 MULTICAST ROUTING

INDEX– 1632 –ignoring superior BPDUs 253, 1082selecting protocol based on message format 254, 1085shut down port on receipt 254, 1073bridge ex

Page 706 -

INDEX– 1633 –information option policy 399, 950information option, enabling 399, 949policy selection 399, 950specifying trusted interfaces 4

Page 707

INDEX– 1634 –Ffault isolation, CFM 474, 1341fault notification generator, CFM 476, 483, 508, 1345, 1347fault notification, CFM 474, 508, 1309,

Page 708

INDEX– 1635 –static multicast routing 519, 1206static port assignment 521, 1206static router interface 514, 1206static router port, configurin

Page 709

INDEX– 1636 –local device information, displaying 416, 1304message attributes 413, 1285message statistics 424, 1307remote information, display

Page 710

INDEX– 1637 –multicast filtering 511, 1185enabling IGMP snooping 515, 1187enabling IGMP snooping per interface 522, 1187enabling MLD snooping

Page 711

INDEX– 1638 –default metric for external routes 674, 1484enabling 1476general settings 673, 676, 1474hello interval 692, 1498interface summa

Page 712 - CONFIGURING PIM FOR IPV4

INDEX– 1639 –triggered hello delay 731, 1583PIMv6-DMglobal configuration 729, 735interface settings 731PIMv6-SM 735bootstrap router 736BSR

Page 713

CHAPTER 5 | Interface ConfigurationPort Configuration– 164 –◆ Speed/Duplex – Allows you to manually set the port speed and duplex mode. (i.e., wit

Page 714

INDEX– 1640 –remote maintenance end point, CFM 477, 486, 492, 501, 504, 505, 1326, 1327, 1332, 1336Remote Monitoring See RMONrename, DiffServ 1

Page 715

INDEX– 1641 –configuring 343, 890downloading public keys for clients 349, 780generating host key pair 347, 895server, configuring 346, 892ti

Page 716

INDEX– 1642 –basic information, displaying 1111configuring port members, by interface 206, 1116–1120configuring port members, VLAN index 205cr

Page 718

GTL-2691E042013/ST-R01

Page 719

CHAPTER 5 | Interface ConfigurationPort Configuration– 165 –WEB INTERFACETo configure port connection parameters:1. Click Interface, Port, General

Page 720

CHAPTER 5 | Interface ConfigurationPort Configuration– 166 –◆ Media Type – Media type used. (Options: Copper-Forced, SFP-Forced, or SFP-Preferred-

Page 721

CHAPTER 5 | Interface ConfigurationPort Configuration– 167 –COMMAND USAGE ◆ Traffic can be mirrored from one or more source ports to one destinati

Page 722

CHAPTER 5 | Interface ConfigurationPort Configuration– 168 –To display the configured mirror sessions:1. Click Interface, Port, Mirror.2. Select S

Page 723

CHAPTER 5 | Interface ConfigurationPort Configuration– 169 –Transmitted Errors The number of outbound packets that could not be transmitted becaus

Page 724

CONTENTS– 17 –System Status 769show access-list tcam-utilization 769show memory 770show process cpu 770show running-config 771show startup-conf

Page 725

CHAPTER 5 | Interface ConfigurationPort Configuration– 170 –Internal MAC Receive ErrorsA count of frames for which reception on a particular inter

Page 726

CHAPTER 5 | Interface ConfigurationPort Configuration– 171 –WEB INTERFACETo show a list of port statistics:1. Click Interface, Port, Statistics.2.

Page 727

CHAPTER 5 | Interface ConfigurationPort Configuration– 172 –Figure 37: Showing Port Statistics (Chart)PERFORMING CABLEDIAGNOSTICSUse the Interfac

Page 728 - CONFIGURING PIMV6 FOR IPV6

CHAPTER 5 | Interface ConfigurationPort Configuration– 173 –◆ The test takes approximately 5 seconds. The switch displays the results of the test

Page 729

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 174 –WEB INTERFACETo test the cable attached to a port:1. Click Interface, Port, Cable Tes

Page 730

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 175 –COMMAND USAGEBesides balancing the load across each port in the trunk, the other port

Page 731

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 176 –However, note that the static trunks on this switch are Cisco EtherChannel compatible

Page 732

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 177 –To add member ports to a static trunk:1. Click Interface, Trunk, Static.2. Select Con

Page 733

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 178 –To display trunk connection parameters:1. Click Interface, Trunk, Static.2. Select Co

Page 734

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 179 –◆ All ports on both ends of an LACP trunk must be configured for full duplex, and aut

Page 735

CONTENTS– 18 –stopbits 796timeout login response 796disconnect 797show line 797Event Logging 798logging facility 799logging history 799logging

Page 736

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 180 –NOTE: Configuring LACP settings for a port only applies to its administrative state,

Page 737

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 181 –Figure 46: Enabling LACP on a PortTo configure LACP parameters for group members:1.

Page 738

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 182 –Figure 48: Showing Members of a Dynamic TrunkTo configure connection parameters for

Page 739

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 183 –Figure 50: Displaying Connection Parameters for Dynamic TrunksDISPLAYING LACPPORT CO

Page 740

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 184 –Figure 51: Displaying LACP Port CountersDISPLAYING LACPSETTINGS AND STATUSFOR THE LO

Page 741

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 185 –WEB INTERFACETo display LACP settings and status for the local side:1. Click Interfac

Page 742

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 186 –DISPLAYING LACPSETTINGS AND STATUSFOR THE REMOTE SIDEUse the Interface > Trunk >

Page 743

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 187 –Figure 53: Displaying LACP Port Remote InformationCONFIGURING LOADBALANCINGUse the I

Page 744

CHAPTER 5 | Interface ConfigurationTrunk Configuration– 188 – Source and Destination IP Address: All traffic with the same source and destination

Page 745 - COMMAND LINE INTERFACE

CHAPTER 5 | Interface ConfigurationSampling Traffic Flows– 189 –Figure 54: Configuring Load BalancingSAMPLING TRAFFIC FLOWSThe flow sampling (sFl

Page 746 -

CONTENTS– 19 –Time Range 817time-range 818absolute 818periodic 819show time-range 820Switch Clustering 820cluster 821cluster commander 822cluste

Page 747 - 22 USING THE COMMAND LINE

CHAPTER 5 | Interface ConfigurationSampling Traffic Flows– 190 –CONFIGURING SFLOWPARAMETERSUse the Interface > sFlow page to set the source and

Page 748 - Accessing the CLI

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 191 –3. Click Apply.Figure 55: Sampling Traffic FlowsTRAFFIC SEGMENTATIONIf tighter secu

Page 749 - ENTERING COMMANDS

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 192 – Blocking – Blocks traffic between uplink ports assigned to different sessions. Forw

Page 750 - Entering Commands

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 193 –CONFIGURING UPLINKAND DOWNLINK PORTSUse the Interface > Traffic Segmentation (Con

Page 751

CHAPTER 5 | Interface ConfigurationTraffic Segmentation– 194 –◆ Interface – Displays a list of ports or trunks. Port – Port Identifier. (Range: 1-

Page 752

CHAPTER 5 | Interface ConfigurationVLAN Trunking– 195 –VLAN TRUNKINGUse the Interface > VLAN Trunking page to allow unknown VLAN groups to pass

Page 753

CHAPTER 5 | Interface ConfigurationVLAN Trunking– 196 –◆ Trunk – Trunk Identifier. (Range: 1-32)◆ VLAN Trunking Status – Enables VLAN trunking on

Page 754

– 197 –6 VLAN CONFIGURATIONThis chapter includes the following topics:◆ IEEE 802.1Q VLANs – Configures static and dynamic VLANs.◆ Private VLANs – Co

Page 755 - Table 41: Keystroke Commands

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 198 –or IP subnets. VLANs inherently provide a high level of network security since traffic must

Page 756 - Table 42: Command Group Index

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 199 –VLAN Classification – When the switch receives a frame, it classifies the frame in one of tw

Page 757

USER MANUALGTL-2691MANAGED 24-PORT L3 STACKABLE GE SWITCHLayer 3 Stackable Gigabit Ethernet Switchwith 20 10/100/1000BASE-T (RJ-45) Ports,4 Gigabit Co

Page 758

CONTENTS– 20 –show nlm oper-status 845show snmp notify-filter 845Additional Trap Commands 845memory 845process cpu 84626 REMOTE MONITORING COM

Page 759 - 23 GENERAL COMMANDS

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 200 –Figure 62: Using GVRPForwarding Tagged/Untagged FramesIf you want to create a small port-ba

Page 760 -

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 201 –about this interface type. This parameter must be enabled before you can assign an IP addres

Page 761

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 202 –To modify the configuration settings for VLAN groups:1. Click VLAN, Static.2. Select Modify

Page 762

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 203 –aware devices. Or configure a port as forbidden to prevent the switch from automatically add

Page 763

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 204 –◆ Ingress Filtering – Determines how to process frames tagged for VLANs for which the ingres

Page 764

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 205 –◆ Trunk Range – Displays a list of ports. (Range: 1-32)NOTE: The PVID, acceptable frame type

Page 765

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 206 –4. Modify the settings for any interface as required. 5. Click Apply.Figure 67: Configuring

Page 766

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 207 –Figure 68: Configuring Static VLAN Members by Interface RangeCONFIGURINGDYNAMIC VLANREGISTR

Page 767 - 24 SYSTEM MANAGEMENT COMMANDS

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 208 – Join – The interval between transmitting requests/queries to participate in a VLAN group. (

Page 768 - Device Designation

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q VLANs– 209 –To configure GVRP status and timers on a port or trunk:1. Click VLAN, Dynamic.2. Select Conf

Page 769 - SYSTEM STATUS

CONTENTS– 21 –radius-server key 870radius-server retransmit 871radius-server timeout 871show radius-server 872TACACS+ Client 872tacacs-server h

Page 770

CHAPTER 6 | VLAN ConfigurationPrivate VLANs– 210 –To show the members of a dynamic VLAN:1. Click VLAN, Dynamic.2. Select Show Dynamic VLAN from th

Page 771

CHAPTER 6 | VLAN ConfigurationPrivate VLANs– 211 –all other traffic through promiscuous ports). Then assign any promiscuous ports to a primary VLA

Page 772

CHAPTER 6 | VLAN ConfigurationPrivate VLANs– 212 –To display a list of private VLANs:1. Click VLAN, Private.2. Select Configure VLAN from the Step

Page 773

CHAPTER 6 | VLAN ConfigurationPrivate VLANs– 213 –5. Select an entry from the Community VLAN list to associate it with the selected primary VLAN.

Page 774

CHAPTER 6 | VLAN ConfigurationPrivate VLANs– 214 –◆ Port – Port Identifier. (Range: 1-26/50)◆ Trunk – Trunk Identifier. (Range: 1-32)◆ Port/Trunk

Page 775

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 215 –Figure 77: Configuring Interfaces for Private VLANsIEEE 802.1Q TUNNELINGIEEE 802.1Q Tun

Page 776 - FRAME SIZE

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 216 –When a double-tagged packet enters another trunk port in an intermediate or core switch

Page 777 - FAN CONTROL

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 217 –3. After packet classification through the switching process, the packet is written to m

Page 778 - FILE MANAGEMENT

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 218 –7. The switch sends the packet to the proper egress port.8. If the egress port is an unt

Page 779

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 219 –6. Configure the QinQ tunnel uplink port to Uplink mode (see "Adding an Interface t

Page 780

CONTENTS– 22 –ip ssh timeout 894delete public-key 894ip ssh crypto host-key generate 895ip ssh crypto zeroize 896ip ssh save host-key 896show i

Page 781

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 220 –Figure 79: Enabling QinQ TunnelingCREATING CVLAN TOSPVLAN MAPPINGENTRIESUse the VLAN &g

Page 782

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 221 –PARAMETERSThese parameters are displayed:◆ Port – Port identifier. (Range: 1-26)◆ Custom

Page 783

CHAPTER 6 | VLAN ConfigurationIEEE 802.1Q Tunneling– 222 –Figure 81: Showing CVLAN to SPVLAN Mapping EntriesThe preceding example sets the SVID t

Page 784

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 223 – Uplink – Configures QinQ tunneling for an uplink port to another device within the service pro

Page 785

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 224 –COMMAND USAGE◆ To configure protocol-based VLANs, follow these steps:1. First configure VLAN gr

Page 786

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 225 –WEB INTERFACETo configure a protocol group:1. Click VLAN, Protocol.2. Select Configure Protocol

Page 787

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 226 –MAPPING PROTOCOLGROUPS TOINTERFACESUse the VLAN > Protocol (Configure Interface - Add) page

Page 788

CHAPTER 6 | VLAN ConfigurationProtocol VLANs– 227 –6. Enter the corresponding VLAN to which the protocol traffic will be forwarded.7. Click Apply.

Page 789

CHAPTER 6 | VLAN ConfigurationConfiguring IP Subnet VLANs– 228 –CONFIGURING IP SUBNET VLANSUse the VLAN > IP Subnet page to configure IP subnet

Page 790 - Console(config-line)#

CHAPTER 6 | VLAN ConfigurationConfiguring IP Subnet VLANs– 229 –WEB INTERFACETo map an IP subnet to a VLAN:1. Click VLAN, IP Subnet.2. Select Add

Page 791 - – 791 –

CONTENTS– 23 –pppoe intermediate-agent vendor-tag strip 917clear pppoe intermediate-agent statistics 917show pppoe intermediate-agent info 918sho

Page 792

CHAPTER 6 | VLAN ConfigurationConfiguring MAC-based VLANs– 230 –CONFIGURING MAC-BASED VLANSUse the VLAN > MAC-Based page to configure VLAN base

Page 793 - – 793 –

CHAPTER 6 | VLAN ConfigurationConfiguring MAC-based VLANs– 231 –6. Click Apply.Figure 89: Configuring MAC-Based VLANsTo show the MAC addresses ma

Page 794 - – 794 –

CHAPTER 6 | VLAN ConfigurationConfiguring MAC-based VLANs– 232 –

Page 795

– 233 –7 ADDRESS TABLE SETTINGSSwitches store the addresses for all known devices. This information is used to pass traffic directly between the inb

Page 796 - – 796 –

CHAPTER 7 | Address Table SettingsConfiguring MAC Address Learning– 234 –◆ Also note that MAC address learning cannot be disabled if any of the fo

Page 797

CHAPTER 7 | Address Table SettingsSetting Static Addresses– 235 –SETTING STATIC ADDRESSESUse the MAC Address > Static page to configure static

Page 798 - EVENT LOGGING

CHAPTER 7 | Address Table SettingsChanging the Aging Time– 236 –4. Click Apply.Figure 92: Configuring Static MAC AddressesTo show the static addr

Page 799 - Table 53: Logging Levels

CHAPTER 7 | Address Table SettingsDisplaying the Dynamic Address Table– 237 –WEB INTERFACETo set the aging time for entries in the dynamic address

Page 800

CHAPTER 7 | Address Table SettingsClearing the Dynamic Address Table– 238 –WEB INTERFACETo show the dynamic address table:1. Click MAC Address, Dy

Page 801

CHAPTER 7 | Address Table SettingsClearing the Dynamic Address Table– 239 –3. Select the method by which to clear the entries (i.e., All, MAC Addr

Page 802

CONTENTS– 24 –web-auth re-authenticate (IP) 944show web-auth 945show web-auth interface 945show web-auth summary 946DHCP Snooping 946ip dhcp sn

Page 803

CHAPTER 7 | Address Table SettingsClearing the Dynamic Address Table– 240 –

Page 804

– 241 –8 SPANNING TREE ALGORITHM This chapter describes the following basic topics:◆ Loopback Detection – Configures detection and response to loopb

Page 805 - SMTP ALERTS

CHAPTER 8 | Spanning Tree AlgorithmOverview– 242 –lowest cost spanning tree, it enables all root ports and designated ports, and disables all othe

Page 806

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Loopback Detection– 243 –An MST Region consists of a group of interconnected bridges that have the

Page 807

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Loopback Detection– 244 –◆ The interface ceases to receive it’s own BPDUs in a forward delay interv

Page 808 - Table 57: Time Commands

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 245 –Figure 100: Configuring Port Loopback DetectionCONFIGURING GLOBAL SE

Page 809 - SNTP Commands

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 246 –MSTP generates a unique spanning tree for each instance. This provide

Page 810

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 247 –spanning tree is disabled globally on the switch or disabled on a spe

Page 811

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 248 –delay is required because every device must receive information about

Page 812 - NTP Commands

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Global Settings for STA– 249 –Figure 101: Configuring Global Settings for STA (STP)Figure 102: Co

Page 813 - Console(config)#

CONTENTS– 25 –Denial of Service Protection 969dos-protection land 969dos-protection tcp-scan 970show dos-protection 97030 ACCESS CONTROL LISTS 9

Page 814 - Console(config)#ntp client

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Global Settings for STA– 250 –Figure 103: Configuring Global Settings for STA (MSTP)DISPLAYING GLOB

Page 815

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 251 –◆ Root Port – The number of the port on this switch that is closes

Page 816 - – 816 –

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 252 –CLI REFERENCES◆ "Spanning Tree Commands" on page 1061PAR

Page 817 - TIME RANGE

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 253 –◆ Admin Link Type – The link type attached to this interface. Poin

Page 818

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for STA– 254 –An interface cannot function as an edge port under the following c

Page 819

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Interface Settings for STA– 255 –5. Click Apply.Figure 105: Configuring Interface Settings for STAD

Page 820 - SWITCH CLUSTERING

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Interface Settings for STA– 256 –The rules defining port status are: A port on a network segment wit

Page 821

CHAPTER 8 | Spanning Tree AlgorithmDisplaying Interface Settings for STA– 257 –Figure 106: STA Port RolesWEB INTERFACETo display interface settin

Page 822

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 258 –CONFIGURING MULTIPLE SPANNING TREESUse the Spanning Tree > MSTP (C

Page 823

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 259 –WEB INTERFACETo create instances for MSTP:1. Click Spanning Tree, MST

Page 824

CONTENTS– 26 –capabilities 999description 1000flowcontrol 1001media-type 1002negotiation 1002shutdown 1003speed-duplex 1004switchport mtu 1005switc

Page 825

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 260 –To modify the priority for an MST instance:1. Click Spanning Tree, MS

Page 826

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Multiple Spanning Trees– 261 –To add additional VLAN groups to an MSTP instance:1. Click Spanning T

Page 827 - 25 SNMP COMMANDS

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 262 –CONFIGURING INTERFACE SETTINGS FOR MSTPUse the Spanning Tree >

Page 828 -

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 263 –The recommended range is listed in Table 12 on page 252. The defa

Page 829 - General SNMP Commands

CHAPTER 8 | Spanning Tree AlgorithmConfiguring Interface Settings for MSTP– 264 –

Page 830

– 265 –9 CONGESTION CONTROLThe switch can set the maximum upload or download data transfer rate for any port. It can also control traffic storms by

Page 831

CHAPTER 9 | Congestion ControlStorm Control– 266 –◆ Rate – Sets the rate limit level. (Range: 64 - 1,000,000 kbits per second for Gigabit Ethernet

Page 832 - SNMP Target Host Commands

CHAPTER 9 | Congestion ControlStorm Control– 267 –◆ When traffic exceeds the threshold specified for broadcast and multicast or unknown unicast tr

Page 833

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 268 –4. Set the required threshold beyond which the switch will start dropping packets.5.

Page 834

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 269 –The key elements of this diagram are described below:◆ Alarm Fire Threshold – The hi

Page 835 - SNMPv3 Commands

CONTENTS– 27 –show port monitor 1030RSPAN Mirroring Commands 1031rspan source 1033rspan destination 1034rspan remote vlan 1035no rspan session

Page 836

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 270 –SETTING THE ATCTIMERSUse the Traffic > Auto Traffic Control (Configure Global) pa

Page 837

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 271 –Figure 120: Configuring ATC TimersCONFIGURING ATCTHRESHOLDS ANDRESPONSESUse the Tra

Page 838

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 272 –◆ Auto Release Control – Automatically stops a traffic control response of rate limi

Page 839

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 273 –WEB INTERFACETo configure the response timers for automatic storm control:1. Click T

Page 840

CHAPTER 9 | Congestion ControlAutomatic Traffic Control– 274 –

Page 841

– 275 –10 CLASS OF SERVICEClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the sw

Page 842

CHAPTER 10 | Class of ServiceLayer 2 Queue Settings– 276 –◆ If the output port is an untagged member of the associated VLAN, these frames are stri

Page 843 - Notification Log Commands

CHAPTER 10 | Class of ServiceLayer 2 Queue Settings– 277 –◆ WRR queuing specifies a relative weight for each queue. WRR uses a predefined relative

Page 844

CHAPTER 10 | Class of ServiceLayer 2 Queue Settings– 278 –WEB INTERFACETo configure the queue mode:1. Click Traffic, Priority, Queue.2. Select the

Page 845 - Additional Trap Commands

CHAPTER 10 | Class of ServiceLayer 2 Queue Settings– 279 –Figure 125: Setting the Queue Mode (Strict and WRR)MAPPING COS VALUESTO EGRESS QUEUESUs

Page 846

CONTENTS– 28 –show mac-address-table aging-time 1058show mac-address-table count 105937 SPANNING TREE COMMANDS 1061spanning-tree 1062spanning-tree

Page 847 - 26 REMOTE MONITORING COMMANDS

CHAPTER 10 | Class of ServiceLayer 2 Queue Settings– 280 –CLI REFERENCES◆ "queue cos-map" on page 1156◆ "show queue cos-map" o

Page 848

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 281 –Figure 126: Mapping CoS Values to Egress QueuesLAYER 3/4 PRIORITY SETTINGSMapping

Page 849

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 282 –COMMAND USAGE◆ The DSCP is six bits wide, allowing coding for up to 64 different fo

Page 850

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 283 –Figure 127: Mapping IP DSCP Priority ValuesMAPPING IPPRECEDENCEUse the Traffic >

Page 851

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 284 –NOTE: IP Precedence settings apply to all interfaces. PARAMETERSThese parameters ar

Page 852

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 285 –COMMAND USAGE ◆ This mapping table is only used if the protocol type of the arrivin

Page 853

CHAPTER 10 | Class of ServiceLayer 3/4 Priority Settings– 286 –To show the TCP/UDP port number to CoS priority map:1. Click Traffic, Priority, IP

Page 854 - – 854 –

– 287 –11 QUALITY OF SERVICE This chapter describes the following tasks required to apply QoS policies:Class Map – Creates a map which identifies a

Page 855 - 27 FLOW SAMPLING COMMANDS

CHAPTER 11 | Quality of ServiceConfiguring a Class Map– 288 –COMMAND USAGETo create a service policy for a specific category or ingress traffic, f

Page 856 -

CHAPTER 11 | Quality of ServiceConfiguring a Class Map– 289 –◆ Description – A brief description of a class map. (Range: 1-64 characters)Add Rule◆

Page 857

CONTENTS– 29 –show spanning-tree 1086show spanning-tree mst configuration 108838 ERPS COMMANDS 1089erps 1091erps domain 1091control-vlan 1092enab

Page 858

CHAPTER 11 | Quality of ServiceConfiguring a Class Map– 290 –To show the configured class maps: 1. Click Traffic, DiffServ.2. Select Configure Cla

Page 859

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 291 –To show the rules for a class map: 1. Click Traffic, DiffServ.2. Select Configure Class

Page 860

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 292 –Policing is based on a token bucket, where bucket depth (that is, the maximum burst bef

Page 861

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 293 – if Te(t)-B ≥ 0, the packets is yellow and Te is decremented by B down to the minimum v

Page 862

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 294 –respectively. The maximum size of the token bucket P is BP and the maximum size of the

Page 863 - 28 AUTHENTICATION COMMANDS

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 295 –Add Rule◆ Policy Name – Name of policy map.◆ Class Name – Name of a class map that defi

Page 864 - USER ACCOUNTS

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 296 – Violate – Specifies whether the traffic that exceeds the maximum rate (CIR) will be dr

Page 865

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 297 – Drop – Drops out of conformance traffic. Violate – Specifies whether the traffic that

Page 866 - AUTHENTICATION SEQUENCE

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 298 – Transmit – Transmits in-conformance traffic without any change to the DSCP service lev

Page 867

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 299 –To show the configured policy maps: 1. Click Traffic, DiffServ.2. Select Configure Poli

Page 868 - RADIUS CLIENT

– 3 –ABOUT THIS GUIDEPURPOSE This guide gives specific information on how to operate and use the management functions of the switch.AUDIENCE The gui

Page 869

CONTENTS– 30 –switchport allowed vlan 1117switchport ingress-filtering 1118switchport mode 1119switchport native vlan 1120vlan-trunking 1120Dis

Page 870

CHAPTER 11 | Quality of ServiceCreating QoS Policies– 300 –Figure 137: Adding Rules to a Policy MapTo show the rules for a policy map: 1. Click T

Page 871

CHAPTER 11 | Quality of ServiceAttaching a Policy Map to a Port– 301 –ATTACHING A POLICY MAP TO A PORTUse the Traffic > DiffServ (Configure Int

Page 872 - TACACS+ CLIENT

CHAPTER 11 | Quality of ServiceAttaching a Policy Map to a Port– 302 –

Page 873

– 303 –12 VOIP TRAFFIC CONFIGURATIONThis chapter covers the following topics:◆ Global Settings – Enables VOIP globally, sets the Voice VLAN, and the

Page 874

CHAPTER 12 | VoIP Traffic ConfigurationConfiguring VoIP Traffic– 304 –CLI REFERENCES◆ "Configuring Voice VLANs" on page 1147PARAMETERSTh

Page 875

CHAPTER 12 | VoIP Traffic ConfigurationConfiguring Telephony OUI– 305 –CONFIGURING TELEPHONY OUIVoIP devices attached to the switch can be identif

Page 876 - Table 73: AAA Commands

CHAPTER 12 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 306 –Figure 141: Configuring an OUI Telephony ListTo show the MAC OUI numb

Page 877

CHAPTER 12 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 307 – Auto – The port will be added as a tagged member to the Voice VLAN wh

Page 878

CHAPTER 12 | VoIP Traffic ConfigurationConfiguring VoIP Traffic Ports– 308 –3. Configure any required changes to the VoIP settings each port.4. Cl

Page 879

– 309 –13 SECURITY MEASURESYou can configure this switch to authenticate users logging into the system for management access using local or remote a

Page 880

CONTENTS– 31 –show mac-vlan 1147Configuring Voice VLANs 1147voice vlan 1148voice vlan aging 1149voice vlan mac-address 1149switchport voice vla

Page 881

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 310 –◆ DHCP Snooping – Filter IP traffic on insecure ports for which the source ad

Page 882

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 311 –3. Define a method name for each service to which you want to apply accountin

Page 883 - WEB SERVER

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 312 – [authentication sequence] – User authentication is performed by up to three

Page 884

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 313 –CLI REFERENCES◆ "RADIUS Client" on page 868◆ "TACACS+ Client&q

Page 885

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 314 – Set Key – Mark this box to set or modify the encryption key. Authentication

Page 886

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 315 –When specifying the priority sequence for a sever, the server index must alre

Page 887 - TELNET SERVER

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 316 –Figure 147: Configuring Remote Authentication Server (TACACS+)To configure t

Page 888

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 317 –To show the RADIUS or TACACS+ server groups used for accounting and authoriza

Page 889 - SECURE SHELL

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 318 –◆ Method Name – Specifies an accounting method for service requests. The “def

Page 890

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 319 –◆ Accounting Type - Displays the accounting service.◆ Interface - Displays th

Page 891

CONTENTS– 32 –police flow 1175police srtcm-color 1176police trtcm-color 1179set 1181service-policy 1182show class-map 1183show policy-map 1183s

Page 892

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 320 –Figure 151: Configuring AAA Accounting MethodsTo show the accounting method

Page 893

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 321 –Figure 153: Configuring AAA Accounting Service for 802.1X ServiceFigure 154:

Page 894

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 322 –To display basic accounting information and statistics recorded for user sess

Page 895

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 323 –other group name refers to a server group configured on the TACACS+ Group Set

Page 896

CHAPTER 13 | Security MeasuresAAA Authorization and Accounting– 324 –To show the authorization method applied to the EXEC service type and the ass

Page 897

CHAPTER 13 | Security MeasuresConfiguring User Accounts– 325 –To display a the configured authorization method and assigned server groups for The

Page 898

CHAPTER 13 | Security MeasuresConfiguring User Accounts– 326 – Plain Password – Plain text unencrypted password. Encrypted Password – Encrypted pa

Page 899 - 802.1X PORT AUTHENTICATION

CHAPTER 13 | Security MeasuresWeb Authentication– 327 –To show user accounts: 1. Click Security, User Accounts.2. Select Show from the Action list

Page 900

CHAPTER 13 | Security MeasuresWeb Authentication– 328 –CONFIGURING GLOBALSETTINGS FOR WEBAUTHENTICATIONUse the Security > Web Authentication (C

Page 901

CHAPTER 13 | Security MeasuresWeb Authentication– 329 –CONFIGURINGINTERFACE SETTINGSFOR WEBAUTHENTICATIONUse the Security > Web Authentication

Page 902

CONTENTS– 33 –IGMP Filtering and Throttling 1208ip igmp filter (Global Configuration) 1208ip igmp profile 1209permit, deny 1210range 1210ip igmp

Page 903

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 330 –Figure 164: Configuring Interface Settings for Web Authentication

Page 904

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 331 –◆ Authenticated MAC addresses are stored as dynamic entries in the

Page 905

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 332 –For example, if the attribute is “service-policy-in=p1;service-pol

Page 906

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 333 –regardless of the 802.1X Operation Mode (Single-Host, Multi-Host,

Page 907

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 334 –PARAMETERSThese parameters are displayed:◆ MAC Authentication Sta

Page 908 - Display Information Commands

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 335 –exempt from authentication on the specified port (as described und

Page 909

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 336 – Link down – Only link down events will trigger the port action. L

Page 910 - MANAGEMENT IP FILTER

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 337 –COMMAND USAGE◆ Specified MAC addresses are exempt from authenticat

Page 911

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 338 –Figure 169: Showing the MAC Address Filter Table for Network Acce

Page 912

CHAPTER 13 | Security MeasuresNetwork Access (MAC Address Authentication)– 339 –WEB INTERFACETo display the authenticated MAC addresses stored in

Page 913 - PPPOE INTERMEDIATE AGENT

CONTENTS– 34 –mvr proxy-query-interval 1230mvr proxy-switching 1231mvr robustness-value 1232mvr source-port-mode dynamic 1233mvr upstream-source

Page 914

CHAPTER 13 | Security MeasuresConfiguring HTTPS– 340 –CONFIGURING HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protoc

Page 915

CHAPTER 13 | Security MeasuresConfiguring HTTPS– 341 –PARAMETERSThese parameters are displayed:◆ HTTPS Status – Allows you to enable/disable the H

Page 916

CHAPTER 13 | Security MeasuresConfiguring HTTPS– 342 –When you have obtained these, place them on your TFTP server and transfer them to the switch

Page 917

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 343 –Figure 172: Downloading the Secure-Site CertificateCONFIGURING THE SECURE SHELL

Page 918

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 344 –To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the

Page 919

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 345 –NOTE: To use SSH with only password authentication, the host public key must stil

Page 920

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 346 –CONFIGURING THESSH SERVERUse the Security > SSH (Configure Global) page to ena

Page 921 - 29 GENERAL SECURITY MEASURES

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 347 –Figure 173: Configuring the SSH ServerGENERATING THEHOST KEY PAIRUse the Securit

Page 922 - PORT SECURITY

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 348 –WEB INTERFACETo generate the SSH host key pair: 1. Click Security, SSH.2. Select

Page 923

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 349 –IMPORTING USERPUBLIC KEYSUse the Security > SSH (Configure User Key - Copy) pa

Page 924

CONTENTS– 35 –ip igmp last-member-query-interval 1262ip igmp max-resp-interval 1263ip igmp query-interval 1264ip igmp robustval 1264ip igmp sta

Page 925

CHAPTER 13 | Security MeasuresConfiguring the Secure Shell– 350 –Figure 176: Copying the SSH User’s Public KeyTo display or clear the SSH user’s

Page 926

CHAPTER 13 | Security MeasuresAccess Control Lists– 351 –ACCESS CONTROL LISTS Access Control Lists (ACL) provide packet filtering for IPv4 frames

Page 927

CHAPTER 13 | Security MeasuresAccess Control Lists– 352 –◆ If no matches are found down to the end of the list, the traffic is denied. For this re

Page 928 - Console(config-if)#

CHAPTER 13 | Security MeasuresAccess Control Lists– 353 –WEB INTERFACETo configure a time range: 1. Click Security, ACL.2. Select Configure Time R

Page 929

CHAPTER 13 | Security MeasuresAccess Control Lists– 354 –6. Fill in the required parameters for the selected mode.7. Click Apply.Figure 180: Add

Page 930

CHAPTER 13 | Security MeasuresAccess Control Lists– 355 –SHOWING TCAMUTILIZATIONUse the Security > ACL (Configure ACL - Show TCAM) page to show

Page 931

CHAPTER 13 | Security MeasuresAccess Control Lists– 356 –SETTING THE ACLNAME AND TYPEUse the Security > ACL (Configure ACL - Add) page to creat

Page 932

CHAPTER 13 | Security MeasuresAccess Control Lists– 357 –Figure 183: Creating an ACLTo show a list of ACLs: 1. Click Security, ACL.2. Select Conf

Page 933 - – 933 –

CHAPTER 13 | Security MeasuresAccess Control Lists– 358 –◆ Source IP Address – Source IP address.◆ Source Subnet Mask – A subnet mask containing f

Page 934

CHAPTER 13 | Security MeasuresAccess Control Lists– 359 –CONFIGURING ANEXTENDED IPV4 ACLUse the Security > ACL (Configure ACL - Add Rule - IP E

Page 935 - – 935 –

CONTENTS– 36 –lldp basic-tlv port-description 1292lldp basic-tlv system-capabilities 1293lldp basic-tlv system-description 1293lldp basic-tlv sys

Page 936

CHAPTER 13 | Security MeasuresAccess Control Lists– 360 –where the equivalent binary bit “1” means to match a bit and “0” means to ignore a bit. T

Page 937

CHAPTER 13 | Security MeasuresAccess Control Lists– 361 –Figure 186: Configuring an Extended IPv4 ACLCONFIGURING ASTANDARD IPV6 ACLUse the Securi

Page 938 - – 938 –

CHAPTER 13 | Security MeasuresAccess Control Lists– 362 –◆ Time Range – Name of a time range.WEB INTERFACETo add rules to a Standard IPv6 ACL: 1.

Page 939

CHAPTER 13 | Security MeasuresAccess Control Lists– 363 –CONFIGURING ANEXTENDED IPV6 ACLUse the Security > ACL (Configure ACL - Add Rule - IPv6

Page 940

CHAPTER 13 | Security MeasuresAccess Control Lists– 364 –◆ Flow Label – A label for packets belonging to a particular traffic “flow” for which the

Page 941

CHAPTER 13 | Security MeasuresAccess Control Lists– 365 –Figure 188: Configuring an Extended IPv6 ACLCONFIGURING A MACACLUse the Security > AC

Page 942

CHAPTER 13 | Security MeasuresAccess Control Lists– 366 –◆ Packet Format – This attribute includes the following packet types: Any – Any Ethernet

Page 943

CHAPTER 13 | Security MeasuresAccess Control Lists– 367 –Figure 189: Configuring a MAC ACLCONFIGURING AN ARPACLUse the Security > ACL (Configu

Page 944

CHAPTER 13 | Security MeasuresAccess Control Lists– 368 –◆ Source/Destination IP Subnet Mask – Subnet mask for source or destination address. (See

Page 945

CHAPTER 13 | Security MeasuresAccess Control Lists– 369 –Figure 190: Configuring a ARP ACLBINDING A PORT TO ANACCESS CONTROLLISTAfter configuring

Page 946

CONTENTS– 37 –show ethernet cfm md 1323show ethernet cfm ma 1324show ethernet cfm maintenance-points local 1325show ethernet cfm maintenance-poin

Page 947

CHAPTER 13 | Security MeasuresARP Inspection– 370 –WEB INTERFACETo bind an ACL to a port: 1. Click Security, ACL.2. Select Configure Interface fro

Page 948

CHAPTER 13 | Security MeasuresARP Inspection– 371 –COMMAND USAGEEnabling & Disabling ARP Inspection◆ ARP Inspection is controlled on a global

Page 949

CHAPTER 13 | Security MeasuresARP Inspection– 372 –with different MAC addresses are classified as invalid and are dropped. IP – Checks the ARP bod

Page 950

CHAPTER 13 | Security MeasuresARP Inspection– 373 – Src-MAC – Validates the source MAC address in the Ethernet header against the sender MAC addre

Page 951

CHAPTER 13 | Security MeasuresARP Inspection– 374 –◆ ARP Inspection uses the DHCP snooping bindings database for the list of valid IP-to-MAC addre

Page 952

CHAPTER 13 | Security MeasuresARP Inspection– 375 –Figure 193: Configuring VLAN Settings for ARP InspectionCONFIGURINGINTERFACE SETTINGSFOR ARP I

Page 953

CHAPTER 13 | Security MeasuresARP Inspection– 376 –3. Specify any untrusted ports which require ARP inspection, and adjust the packet inspection r

Page 954

CHAPTER 13 | Security MeasuresARP Inspection– 377 –WEB INTERFACETo display statistics for ARP Inspection: 1. Click Security, ARP Inspection.2. Sel

Page 955

CHAPTER 13 | Security MeasuresFiltering IP Addresses for Management Access– 378 –WEB INTERFACETo display the ARP Inspection log: 1. Click Security

Page 956

CHAPTER 13 | Security MeasuresFiltering IP Addresses for Management Access– 379 –◆ You can delete an address range just by specifying the start ad

Page 957

CONTENTS– 38 –45 DOMAIN NAME SERVICE COMMANDS 1351ip domain-list 1351ip domain-lookup 1352ip domain-name 1353ip host 1354ip name-server 1355ipv

Page 958

CHAPTER 13 | Security MeasuresConfiguring Port Security– 380 –To show a list of IP addresses authorized for management access: 1. Click Security,

Page 959

CHAPTER 13 | Security MeasuresConfiguring Port Security– 381 –◆ When the port security state is changed from enabled to disabled, all dynamically

Page 960

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 382 –The maximum address count is effective when port security is enabled or

Page 961

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 383 –ports in a network can be centrally controlled from a server, which mea

Page 962

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 384 –◆ Each client that needs to be authenticated must have dot1X client sof

Page 963

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 385 –4. Click ApplyFigure 201: Configuring Global Settings for 802.1X Port

Page 964

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 386 –◆ Control Mode – Sets the authentication mode to one of the following o

Page 965

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 387 –a port, the switch will initiate authentication when the port link stat

Page 966

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 388 –◆ Identifier (Server) – Identifier carried in the most recent EAP Succe

Page 967

CHAPTER 13 | Security MeasuresConfiguring 802.1X Port Authentication– 389 –DISPLAYING 802.1XSTATISTICSUse the Security > Port Authentication (S

Page 968

CONTENTS– 39 –netbios-name-server 1376netbios-node-type 1377network 1377next-server 1378clear ip dhcp binding 1379show ip dhcp binding 1379show ip

Page 969 - DENIAL OF SERVICE PROTECTION

CHAPTER 13 | Security MeasuresDoS Protection– 390 –WEB INTERFACETo display port authenticator statistics for 802.1X: 1. Click Security, Port Authe

Page 970

CHAPTER 13 | Security MeasuresIP Source Guard– 391 –◆ TCP Scan – Configures the switch to protect against the types of DoS attacks described below

Page 971

CHAPTER 13 | Security MeasuresIP Source Guard– 392 –CONFIGURING PORTSFOR IP SOURCEGUARDUse the Security > IP Source Guard > Port Configurati

Page 972

CHAPTER 13 | Security MeasuresIP Source Guard– 393 –PARAMETERSThese parameters are displayed:◆ Filter Type – Configures the switch to filter inbou

Page 973 - 30 ACCESS CONTROL LISTS

CHAPTER 13 | Security MeasuresIP Source Guard– 394 –CONFIGURING STATICBINDINGS FOR IPSOURCE GUARDUse the Security > IP Source Guard > Static

Page 974 - IPv4 ACLs

CHAPTER 13 | Security MeasuresIP Source Guard– 395 –4. Click ApplyFigure 206: Configuring Static Bindings for IP Source GuardTo display static bi

Page 975

CHAPTER 13 | Security MeasuresDHCP Snooping– 396 –◆ IP Address – A valid unicast IP address, including classful types A, B or C.Dynamic Binding Li

Page 976

CHAPTER 13 | Security MeasuresDHCP Snooping– 397 –COMMAND USAGEDHCP Snooping Process◆ Network traffic may be disrupted when malicious DHCP message

Page 977

CHAPTER 13 | Security MeasuresDHCP Snooping– 398 – If a DHCP packet from a client passes the filtering criteria above, it will only be forwarded t

Page 978

CHAPTER 13 | Security MeasuresDHCP Snooping– 399 –DHCP packets, keep the existing information, or replace it with the switch’s relay information.D

Page 979

ABOUT THIS GUIDE– 4 –REVISION HISTORY This section summarizes the changes in each revision of this guide.APRIL 2013 RELEASEThis is the first version

Page 980 - Table 95: IPv4 ACL Commands

CONTENTS– 40 –ip helper 1404ip helper-address 1405show ip helper 1406IPv6 Interface 1407Interface Address Configuration and Utilities 1408ipv6

Page 981

CHAPTER 13 | Security MeasuresDHCP Snooping– 400 –4. Click ApplyFigure 209: Configuring Global Settings for DHCP SnoopingDHCP SNOOPINGVLANCONFIGU

Page 982

CHAPTER 13 | Security MeasuresDHCP Snooping– 401 –WEB INTERFACETo configure global settings for DHCP Snooping: 1. Click Security, IP Source Guard,

Page 983

CHAPTER 13 | Security MeasuresDHCP Snooping– 402 –WEB INTERFACETo configure global settings for DHCP Snooping: 1. Click Security, IP Source Guard,

Page 984

CHAPTER 13 | Security MeasuresDHCP Snooping– 403 –◆ Store – Writes all dynamically learned snooping entries to flash memory. This function can be

Page 985

CHAPTER 13 | Security MeasuresDHCP Snooping– 404 –

Page 986 - Table 96: MAC ACL Commands

– 405 –14 BASIC ADMINISTRATION PROTOCOLSThis chapter describes basic administration tasks including:◆ Event Logging – Sets conditions for logging ev

Page 987

CHAPTER 14 | Basic Administration ProtocolsConfiguring Event Logging– 406 –The System Logs page allows you to configure and limit system messages

Page 988

CHAPTER 14 | Basic Administration ProtocolsConfiguring Event Logging– 407 –3. Enable or disable system logging, set the level of event messages to

Page 989

CHAPTER 14 | Basic Administration ProtocolsConfiguring Event Logging– 408 –REMOTE LOGCONFIGURATIONUse the Administration > Log > Remote page

Page 990

CHAPTER 14 | Basic Administration ProtocolsConfiguring Event Logging– 409 –Figure 215: Configuring Settings for Remote Logging of Error MessagesS

Page 991 - Table 97: ARP ACL Commands

CONTENTS– 41 –tunnel source vlan 1444tunnel ttl 1445show ipv6 tunnel 144549 IP ROUTING COMMANDS 1447Global Routing Configuration 1447IPv4 Comman

Page 992

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 410 –WEB INTERFACETo configure SMTP alert messages: 1. Click Administrat

Page 993

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 411 –SETTING LLDP TIMINGATTRIBUTESUse the Administration > LLDP (Conf

Page 994 - ACL INFORMATION

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 412 –should therefore periodically check the value of lldpStatsRemTableL

Page 995

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 413 –CONFIGURING LLDPINTERFACEATTRIBUTESUse the Administration > LLDP

Page 996

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 414 –Since there are typically a number of different addresses associate

Page 997 - 31 INTERFACE COMMANDS

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 415 – Max Frame Size – The maximum frame size. (See "Configuring Su

Page 998

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 416 –Figure 218: Configuring LLDP Interface AttributesDISPLAYING LLDPLO

Page 999

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 417 –◆ Chassis ID – An octet string indicating the specific identifier f

Page 1000 - Interface Configuration

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 418 –WEB INTERFACETo display LLDP information for the local device: 1. C

Page 1001

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 419 –PARAMETERSThese parameters are displayed:Port◆ Local Port – The loc

Page 1002

CONTENTS– 42 –show ip protocols rip 1473show ip rip 1473Open Shortest Path First (OSPFv2) 1474General Configuration 1476router ospf 1476compati

Page 1003

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 420 –◆ Port Description – A string that indicates the port’s description

Page 1004

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 421 –Port Details – 802.3 Extension Port Information◆ Remote Port Auto-N

Page 1005

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 422 –◆ Remote Power Pairs – “Signal” means that the signal pairs only ar

Page 1006

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 423 –Figure 221: Displaying Remote Device Information for LLDP (Port)

Page 1007

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 424 –Figure 222: Displaying Remote Device Information for LLDP (Port De

Page 1008

CHAPTER 14 | Basic Administration ProtocolsLink Layer Discovery Protocol– 425 –PARAMETERSThese parameters are displayed:General Statistics on Remo

Page 1009

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 426 –Figure 223: Displaying LLDP Device Statistics (General)Figure

Page 1010

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 427 –as well as the traffic passing through its ports. A network ma

Page 1011

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 428 –COMMAND USAGEConfiguring SNMPv1/2c Management AccessTo configu

Page 1012

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 429 –PARAMETERSThese parameters are displayed:◆ Agent Status – Enab

Page 1013

CONTENTS– 43 –show ip ospf database 1505show ip ospf interface 1511show ip ospf neighbor 1512show ip ospf route 1513show ip ospf virtual-links

Page 1014 - Cable Diagnostics

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 430 –ID is deleted or changed, all SNMP users will be cleared. You

Page 1015

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 431 –COMMAND USAGE◆ SNMP passwords are localized using the engine I

Page 1016

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 432 –Figure 228: Showing Remote Engine IDs for SNMPSETTING SNMPV3V

Page 1017 - 32 LINK AGGREGATION COMMANDS

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 433 –3. Select Add View from the Action list.4. Enter a view name a

Page 1018 - Manual Configuration Commands

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 434 –5. Click ApplyFigure 231: Adding an OID Subtree to an SNMP Vi

Page 1019 - DEFAULT SETTING

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 435 –CONFIGURINGSNMPV3 GROUPSUse the Administration > SNMP (Conf

Page 1020

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 436 –Table 29: Supported Notification Messages Model Level Grou

Page 1021

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 437 –Private TrapsswPowerStatusChangeTrap 1.3.6.1.4.1.22426.1.26910

Page 1022 - (Ethernet Interface)

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 438 –WEB INTERFACETo configure an SNMP group:1. Click Administratio

Page 1023

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 439 –SETTING COMMUNITYACCESS STRINGSUse the Administration > SNM

Page 1024 - (Port Channel)

CONTENTS– 44 –show ipv6 ospf route 1541show ipv6 ospf virtual-links 154250 MULTICAST ROUTING COMMANDS 1545General Multicast Routing 1545IPv4 Com

Page 1025 - Trunk Status Display Commands

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 440 –To show the community access strings:1. Click Administration,

Page 1026

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 441 – AuthPriv – SNMP communications use both authentication and en

Page 1027

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 442 –To show local SNMPv3 users:1. Click Administration, SNMP.2. Se

Page 1028

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 443 –◆ Security Level – The following security levels are only used

Page 1029 - 33 PORT MIRRORING COMMANDS

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 444 –Figure 239: Configuring Remote SNMPv3 UsersTo show remote SNM

Page 1030 - Local Port Mirroring Commands

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 445 –SPECIFYING TRAPMANAGERSUse the Administration > SNMP (Confi

Page 1031 - Table 108: RSPAN Commands

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 446 –PARAMETERSThese parameters are displayed:SNMP Version 1◆ IP Ad

Page 1032

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 447 –SNMP Version 3◆ IP Address – IP address of a new management st

Page 1033

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 448 –WEB INTERFACETo configure trap managers:1. Click Administratio

Page 1034

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 449 –Figure 243: Configuring Trap Managers (SNMPv3)To show configu

Page 1035

CONTENTS– 45 –ip pim rp-candidate 1568ip pim spt-threshold 1570ip pim dr-priority 1571ip pim join-prune-interval 1572clear ip pim bsr rp-set

Page 1036

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 450 –COMMAND USAGE◆ Systems that support SNMP often need a mechanis

Page 1037

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 451 –4. Fill in the IP address of a configured trap manager and the

Page 1038

CHAPTER 14 | Basic Administration ProtocolsSimple Network Management Protocol– 452 –◆ Unknown community name – The total number of SNMP messages d

Page 1039 - 34 RATE LIMIT COMMANDS

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 453 –◆ Response PDUs – The total number of SNMP Get-Response PDUs which have been ac

Page 1040 -

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 454 –a trap message to the management agent which can then respond to the event if s

Page 1041 - 35 AUTOMATIC TRAFFIC CONTROL

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 455 –threshold, and again moves back up to the rising threshold. (Range: 1-65535)◆ R

Page 1042 - USAGE GUIDELINES

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 456 –Figure 248: Configuring an RMON AlarmTo show configured RMON alarms:1. Click A

Page 1043 - FUNCTIONAL LIMITATIONS

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 457 –CONFIGURING RMONEVENTSUse the Administration > RMON (Configure Global - Add

Page 1044 - Threshold Commands

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 458 –WEB INTERFACETo configure an RMON event:1. Click Administration, RMON.2. Select

Page 1045

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 459 –Figure 251: Showing Configured RMON EventsCONFIGURING RMONHISTORY SAMPLESUse t

Page 1046

CONTENTS– 46 –show ipv6 pim rp mapping 1597show ipv6 pim rp-hash 1598SECTION IV APPENDICES 1599ASOFTWARE SPECIFICATIONS 1601Software Features 160

Page 1047

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 460 –◆ Owner - Name of the person who created this entry. (Range: 1-127 characters)W

Page 1048

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 461 –Figure 253: Showing Configured RMON History SamplesTo show collected RMON hist

Page 1049

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 462 –CONFIGURING RMONSTATISTICAL SAMPLESUse the Administration > RMON (Configure

Page 1050 - SNMP Trap Commands

CHAPTER 14 | Basic Administration ProtocolsRemote Monitoring– 463 –Figure 255: Configuring an RMON Statistical SampleTo show configured RMON stat

Page 1051

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 464 –Figure 257: Showing Collected RMON Statistical SamplesETHERNE

Page 1052

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 465 –blocking traffic over the RPL. When a ring failure occurs, the

Page 1053

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 466 –Configuration Guidelines for ERPS1. Create an ERPS ring (Confi

Page 1054 - ATC Display Commands

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 467 –◆ Ring ports can not be a member of a dynamic trunk. ◆ Dynamic

Page 1055 - 36 ADDRESS TABLE COMMANDS

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 468 –ERPS RINGCONFIGURATIONUse the Administration > ERPS (Config

Page 1056 -

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 469 –Configure Details◆ Domain Name – Name of a configured ERPS rin

Page 1057

– 47 –FIGURESFigure 1: Home Page 106Figure 2: Front Panel Indicators 107Figure 3: System Information 130Figure 4: General Switch Information 132Figu

Page 1058

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 470 –◆ RPL Owner – Configures a ring node to be the Ring Protection

Page 1059

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 471 –Control VLAN must be tagged. Failure to observe these restrict

Page 1060

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 472 –Figure 260: Creating an ERPS RingTo configure the ERPS parame

Page 1061 - 37 SPANNING TREE COMMANDS

CHAPTER 14 | Basic Administration ProtocolsEthernet Ring Protection Switching– 473 –Figure 262: Creating an ERPS Ring (Secondary Ring)To show the

Page 1062 -

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 474 –CONNECTIVITY FAULT MANAGEMENTConnectivity Fault Management (CFM) is

Page 1063

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 475 –the DSAPs within an MA, and may also include interconnection points

Page 1064

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 476 –distinguished by the domain name, maintenance level, maintenance as

Page 1065 -

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 477 –3. Configure the local maintenance end points (MEPs) which will ser

Page 1066

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 478 –Domains"), Configure MA page (see "Configuring CFM Mainte

Page 1067

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 479 –Continuity Check Errors◆ Connectivity Check Config – Sends a trap i

Page 1068

FIGURES– 48 –Figure 32: Displaying Port Information 166Figure 33: Configuring Local Port Mirroring 166Figure 34: Configuring Local Port Mirroring 16

Page 1069

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 480 –WEB INTERFACETo configure global settings for CFM:1. Click Administ

Page 1070

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 481 –CONFIGURINGINTERFACES FOR CFMCFM processes are enabled by default f

Page 1071

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 482 –CLI REFERENCES◆ "CFM Commands" on page 1309COMMAND USAGEC

Page 1072

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 483 –The MIP creation method defined for an MA (see "Configuring CF

Page 1073

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 484 –PARAMETERSThese parameters are displayed:Creating a Maintenance Dom

Page 1074

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 485 –3. Select Add from the Action list.4. Specify the maintenance domai

Page 1075

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 486 –To configure detailed settings for maintenance domains:1. Click Adm

Page 1076

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 487 –◆ Multiple domains at the same maintenance level cannot have an MA

Page 1077

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 488 –◆ MIP Creation Type – Specifies the CFM protocol’s creation method

Page 1078

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 489 –◆ AIS Transmit Level – Configure the AIS maintenance level in an MA

Page 1079

FIGURES– 49 –Figure 68: Configuring Static VLAN Members by Interface Range 207Figure 69: Configuring Global Status of GVRP 208Figure 70: Configuring

Page 1080

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 490 –Figure 272: Showing Maintenance AssociationsTo configure detailed

Page 1081

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 491 –CONFIGURINGMAINTENANCE ENDPOINTSUse the Administration > CFM (Co

Page 1082

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 492 –6. Click Apply.Figure 274: Configuring Maintenance End PointsTo sh

Page 1083

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 493 –COMMAND USAGE◆ All MEPs that exist on other devices inside a mainte

Page 1084

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 494 –Figure 276: Configuring Remote Maintenance End PointsTo show the c

Page 1085

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 495 –◆ LTMs are sent as multicast CFM frames, and forwarded from MIP to

Page 1086

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 496 –5. Click Apply.6. Check the results in the Link Trace cache (see &q

Page 1087

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 497 –◆ MA Index – MA identifier. (Range: 0-4094)◆ Source MEP ID – The id

Page 1088

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 498 –TRANSMITTING DELAY-MEASURE REQUESTSUse the Administration > CFM

Page 1089 - 38 ERPS COMMANDS

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 499 –◆ Count – The number of times to retry sending the message if no re

Page 1090 -

– 5 –CONTENTSABOUT THIS GUIDE 3CONTENTS 5FIGURES 47TABLES 61SECTION I GETTING STARTED 691INTRODUCTION 71Key Features 71Description of Software Feat

Page 1091

FIGURES– 50 –Figure 104: Displaying Global Settings for STA 251Figure 105: Configuring Interface Settings for STA 255Figure 106: STA Port Roles 257F

Page 1092

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 500 –DISPLAYING LOCALMEPSUse the Administration > CFM > Show Infor

Page 1093

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 501 –DISPLAYING DETAILSFOR LOCAL MEPSUse the Administration > CFM >

Page 1094

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 502 –◆ Suppress Alarm – Shows if the specified MEP is configured to supp

Page 1095

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 503 –DISPLAYING LOCALMIPSUse the Administration > CFM > Show Infor

Page 1096

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 504 –DISPLAYING REMOTEMEPSUse the Administration > CFM > Show Info

Page 1097

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 505 –DISPLAYING DETAILSFOR REMOTE MEPSUse the Administration > CFM &g

Page 1098

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 506 – Down – The interface cannot pass packets. Testing – The interface

Page 1099

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 507 –DISPLAYING THE LINKTRACE CACHEUse the Administration > CFM >

Page 1100

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 508 – EgrVid – The Egress Port can be identified, but the bridge port is

Page 1101

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 509 –◆ Alarm Time – The time a defect must exist before a fault alarm is

Page 1102

FIGURES– 51 –Figure 140: Configuring a Voice VLAN 304Figure 141: Configuring an OUI Telephony List 306Figure 142: Showing an OUI Telephony List 306F

Page 1103

CHAPTER 14 | Basic Administration ProtocolsConnectivity Fault Management– 510 –and some other MA y, at a higher maintenance level, and associated

Page 1104

– 511 –15 MULTICAST FILTERING This chapter describes how to configure the following multicast services:◆ Layer 2 IGMP – Configures snooping and quer

Page 1105

CHAPTER 15 | Multicast FilteringIGMP Protocol– 512 –This switch can use Internet Group Management Protocol (IGMP) to filter multicast traffic. IGM

Page 1106

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 513 –across different subnetworks. Therefore, when PIM routing is enabled for a

Page 1107 - 39 VLAN COMMANDS

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 514 –NOTE: When the switch is configured to use IGMPv3 snooping, the snooping v

Page 1108 -

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 515 –CONFIGURING IGMPSNOOPING AND QUERYPARAMETERSUse the Multicast > IGMP Sn

Page 1109

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 516 –◆ Proxy Reporting Status – Enables IGMP Snooping with Proxy Reporting. (De

Page 1110

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 517 –When the root bridge in a spanning tree receives a TCN for a VLAN where IG

Page 1111

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 518 –◆ IGMP Snooping Version – Sets the protocol version for compatibility with

Page 1112

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 519 –SPECIFYING STATICINTERFACES FOR AMULTICAST ROUTERUse the Multicast > IG

Page 1113 - EDITING VLAN GROUPS

FIGURES– 52 –Figure 176: Copying the SSH User’s Public Key 350Figure 177: Showing the SSH User’s Public Key 350Figure 178: Setting the Name of a Tim

Page 1114

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 520 –To show the static interfaces attached to a multicast router:1. Click Mult

Page 1115 - CONFIGURING VLAN INTERFACES

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 521 –ASSIGNINGINTERFACES TOMULTICAST SERVICESUse the Multicast > IGMP Snoopi

Page 1116

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 522 –Figure 295: Assigning an Interface to a Multicast ServiceTo show the stat

Page 1117

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 523 –and snooping switches from different vendors. In response to this problem,

Page 1118

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 524 –NOTE: MRD messages are flooded to all ports in a VLAN where IGMP snooping

Page 1119

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 525 –◆ Multicast Router Discovery – MRD is used to discover which interfaces ar

Page 1120

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 526 –◆ Last Member Query Interval – The interval to wait for a response to a gr

Page 1121

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 527 –Figure 297: Configuring IGMP Snooping on a VLANTo show the interface sett

Page 1122 - DISPLAYING VLAN INFORMATION

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 528 –PARAMETERSThese parameters are displayed:◆ IGMP Query Drop – Configures an

Page 1123 - Console#

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 529 –◆ Group Address – IP multicast group address with subscribers directly att

Page 1124

FIGURES– 53 –Figure 212: Displaying the Binding Table for DHCP Snooping 403Figure 213: Configuring Settings for System Memory Logs 407Figure 214: Sh

Page 1125

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 530 –◆ Port – Port identifier. (Range: 1-28)◆ Trunk – Trunk identifier. (Range:

Page 1126

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 531 –Output Statistics◆ Report – The number of IGMP membership reports sent fro

Page 1127

CHAPTER 15 | Multicast FilteringLayer 2 IGMP (Snooping and Query)– 532 –Figure 302: Displaying IGMP Snooping Statistics – VLAN To display IGMP

Page 1128

CHAPTER 15 | Multicast FilteringFiltering and Throttling IGMP Groups– 533 –FILTERING AND THROTTLING IGMP GROUPSIn certain switch applications, the

Page 1129

CHAPTER 15 | Multicast FilteringFiltering and Throttling IGMP Groups– 534 –Figure 304: Enabling IGMP Filtering and Throttling $$$CONFIGURING IGMP

Page 1130

CHAPTER 15 | Multicast FilteringFiltering and Throttling IGMP Groups– 535 –WEB INTERFACETo create an IGMP filter profile and set its access mode:1

Page 1131

CHAPTER 15 | Multicast FilteringFiltering and Throttling IGMP Groups– 536 –5. Click Apply.Figure 307: Adding Multicast Groups to an IGMP Filterin

Page 1132

CHAPTER 15 | Multicast FilteringFiltering and Throttling IGMP Groups– 537 –removes an existing group and replaces it with the new multicast group.

Page 1133

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 538 –Figure 309: Configuring IGMP Filtering and Throttling Interface

Page 1134 - CONFIGURING PRIVATE VLANS

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 539 –An IPv6 address must be configured on the VLAN interface from whi

Page 1135

FIGURES– 54 –Figure 248: Configuring an RMON Alarm 456Figure 249: Showing Configured RMON Alarms 456Figure 250: Configuring an RMON Event 458Figure

Page 1136

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 540 –3. Click Apply.Figure 310: Configuring General Settings for MLD

Page 1137

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 541 –Figure 311: Configuring Immediate Leave for MLD SnoopingSPECIFYI

Page 1138

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 542 –Figure 312: Configuring a Static Interface for an IPv6 Multicast

Page 1139

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 543 –ASSIGNINGINTERFACES TO IPV6MULTICAST SERVICESUse the Multicast &g

Page 1140

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 544 –Figure 315: Assigning an Interface to an IPv6 Multicast Service

Page 1141

CHAPTER 15 | Multicast FilteringMLD Snooping (Snooping and Query for IPv6)– 545 –Figure 317: Showing Current Interfaces Assigned to an IPv6 Multi

Page 1142

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 546 –◆ Request List – Sources included on the router’s request l

Page 1143

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 547 –NOTE: Multicast Routing Discovery (MRD) is used to discover

Page 1144 - CONFIGURING IP SUBNET VLANS

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 548 –the proxy devices independent of the multicast routing prot

Page 1145

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 549 –◆ The system periodically checks the multicast route table

Page 1146 - CONFIGURING MAC BASED VLANS

FIGURES– 55 –Figure 284: Showing Information on Remote MEPs 504Figure 285: Showing Detailed Information on Remote MEPs 506Figure 286: Showing the Li

Page 1147 - CONFIGURING VOICE VLANS

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 550 –CONFIGURING IGMPINTERFACEPARAMETERSUse the Multicast > I

Page 1148

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 551 –the QRV field does not contain a declared robustness value,

Page 1149

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 552 –WEB INTERFACETo configure IGMP interface settings:1. Click

Page 1150

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 553 –◆ The switch supports a maximum of 64 static group entries.

Page 1151

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 554 –Figure 323: Showing Static IGMP Groups DISPLAYINGMULTICAST

Page 1152

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 555 –◆ V1 Timer – The time remaining until the switch assumes th

Page 1153

CHAPTER 15 | Multicast FilteringLayer 3 IGMP (Query used with Multicast Routing)– 556 – Forward – Indicates whether or not traffic will be forward

Page 1154

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 557 –MULTICAST VLAN REGISTRATIONMulticast VLAN Registration (MVR) is a protocol that

Page 1155 - 40 CLASS OF SERVICE COMMANDS

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 558 –group to the participating interfaces (see "Assigning Static MVR Multicast

Page 1156 - Priority Commands (Layer 2)

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 559 –WEB INTERFACETo configure global settings for MVR:1. Click Multicast, MVR.2. Sel

Page 1157

FIGURES– 56 –Figure 320: Configuring IGMP Proxy Routing 549Figure 321: Configuring IGMP Interface Settings 552Figure 322: Configuring Static IGMP Gr

Page 1158

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 560 –PARAMETERSThese parameters are displayed:Configure Profile◆ Profile Name – The n

Page 1159

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 561 –To show the configured MVR group address profiles:1. Click Multicast, MVR.2. Sel

Page 1160

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 562 –Figure 331: Showing the MVR Group Address Profiles Assigned to a Domain CONFI

Page 1161

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 563 –remaining subscribers for that multicast group before removing the port from the

Page 1162 - Configuration)

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 564 –WEB INTERFACETo configure interface settings for MVR:1. Click Multicast, MVR.2.

Page 1163 - (Global Configuration)

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 565 –◆ The MVR VLAN cannot be specified as the receiver VLAN for static bindings.PARA

Page 1164 - (Interface

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 566 –4. Select an MVR domain.5. Select the port or trunk for which to display this in

Page 1165

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 567 –WEB INTERFACETo show all MVR groups assigned to a port:1. Click Multicast, MVR.2

Page 1166

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 568 –◆ General Query Sent – The number of general queries sent from this interface.◆

Page 1167

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 569 –WEB INTERFACETo display statistics for MVR query-related messages:1. Click Multi

Page 1168

FIGURES– 57 –Figure 356: Showing the List of Name Servers for DNS 599Figure 357: Configuring Static Entries in the DNS Table 600Figure 358: Showing

Page 1169 - QUALITY OF SERVICE COMMANDS

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 570 –To display MVR protocol-related statistics for a VLAN:1. Click Multicast, MVR.2.

Page 1170

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 571 –To display MVR protocol-related statistics for a port:1. Click Multicast, MVR.2.

Page 1171

CHAPTER 15 | Multicast FilteringMulticast VLAN Registration– 572 –

Page 1172

– 573 –16 IP CONFIGURATIONThis chapter describes how to configure an initial IP interface for management access to the switch over the network. This

Page 1173

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 574 –◆ To enable routing between interfaces defined on this switch an

Page 1174

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 575 –WEB INTERFACETo set a static address for the switch:1. Click IP,

Page 1175

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 4)– 576 –Figure 340: Configuring a Dynamic IPv4 AddressNOTE: The switch

Page 1176

CHAPTER 16 | IP ConfigurationSending DHCP Inform Requests for Additional Information– 577 –Figure 341: Showing the Configured IP Address for an I

Page 1177

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 578 –WEB INTERFACETo send DHCP Inform requests for additional informa

Page 1178

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 579 –CONFIGURING THEIPV6 DEFAULTGATEWAYUse the IP > IPv6 Configura

Page 1179

FIGURES– 58 –Figure 392: Setting the Maximum ECMP Number 638Figure 393: Master Virtual Router with Backup Routers 639Figure 394: Several Virtual Mas

Page 1180 - – 1180 –

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 580 –◆ "DHCP Client" on page 1361COMMAND USAGE◆ The switch

Page 1181

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 581 –◆ ND DAD Attempts – The number of consecutive neighbor solicitat

Page 1182

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 582 – This time limit is included in all router advertisements sent o

Page 1183

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 583 –◆ The switch must always be configured with a link-local address

Page 1184

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 584 – EUI-64 (Extended Universal Identifier) – Configures an IPv6 add

Page 1185 - MULTICAST FILTERING COMMANDS

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 585 –3. Specify the VLAN to configure, select the address type, and t

Page 1186 - IGMP SNOOPING

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 586 –example, FF02::1:FF90:0/104 is the solicited-node multicast addr

Page 1187

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 587 –SHOWING THE IPV6NEIGHBOR CACHEUse the IP > IPv6 Configuration

Page 1188

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 588 –Figure 347: Showing IPv6 NeighborsSHOWING IPV6STATISTICSUse the

Page 1189

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 589 –PARAMETERSThese parameters are displayed:Table 33: Show IPv6 Sta

Page 1190

FIGURES– 59 –Figure 428: Showing General Settings for OSPF 677Figure 429: Adding an NSSA or Stub 678Figure 430: Showing NSSAs or Stubs 679Figure 431

Page 1191

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 590 –IPv6 TransmittedForwards Datagrams The number of output datagram

Page 1192

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 591 –Neighbor Advertisement MessagesThe number of ICMP Neighbor Adver

Page 1193

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 592 –WEB INTERFACETo show the IPv6 statistics:1. Click IP, IPv6 Confi

Page 1194

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 593 –Figure 349: Showing IPv6 Statistics (ICMPv6)Figure 350: Showin

Page 1195

CHAPTER 16 | IP ConfigurationSetting the Switch’s IP Address (IP Version 6)– 594 –SHOWING THE MTUFOR RESPONDINGDESTINATIONSUse the IP > IPv6 Co

Page 1196

– 595 –17 IP SERVICESThis chapter describes the following IP services:◆ DNS – Configures default domain names, identifies servers to use for dynamic

Page 1197

CHAPTER 17 | IP ServicesDomain Name Service– 596 –COMMAND USAGE◆ To enable DNS service on this switch, enable domain lookup status, and configure

Page 1198

CHAPTER 17 | IP ServicesDomain Name Service– 597 –◆ If there is no domain list, the default domain name is used (see "Configuring General DNS

Page 1199

CHAPTER 17 | IP ServicesDomain Name Service– 598 –Figure 354: Showing the List of Domain Names for DNSCONFIGURING A LISTOF NAME SERVERSUse the IP

Page 1200

CHAPTER 17 | IP ServicesDomain Name Service– 599 –Figure 355: Configuring a List of Name Servers for DNSTo show the list name servers:1. Click IP

Page 1201

CONTENTS– 6 –SECTION II WEB CONFIGURATION 1033USING THE WEB INTERFACE 105Connecting to the Web Interface 105Navigating the Web Browser Interface 1

Page 1202

FIGURES– 60 –Figure 464: Configuring a Static Rendezvous Point 723Figure 465: Showing Static Rendezvous Points 723Figure 466: Configuring an RP Cand

Page 1203

CHAPTER 17 | IP ServicesDomain Name Service– 600 –WEB INTERFACETo configure static entries in the DNS table:1. Click IP Service, DNS, Static Host

Page 1204

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 601 –client can try each address in succession, until it establishes a connection wit

Page 1205

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 602 –SPECIFYING A DHCPCLIENT IDENTIFIERUse the IP Service > DHCP > Client page

Page 1206 - STATIC MULTICAST ROUTING

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 603 –CONFIGURING DHCPRELAY SERVICEUse the IP Service > DHCP > Relay page to con

Page 1207

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 604 –Figure 362: Configuring DHCP Relay ServiceCONFIGURING THEDHCP SERVERThis switch

Page 1208 - IGMP FILTERING AND THROTTLING

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 605 –ENABLING THE SERVERUse the IP Service > DHCP > Server (Configure Global) p

Page 1209

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 606 –◆ End IP Address – The last address in a range that the DHCP server should not a

Page 1210

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 607 –CONFIGURING ADDRESS POOLSUse the IP Service > DHCP > Server (Configure Poo

Page 1211

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 608 –◆ Subnet Mask – The bit combination that identifies the network (or subnet) and

Page 1212

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 609 –3. Select Add from the Action list.4. Set the pool Type to Network or Host. 5. E

Page 1213

– 61 –TABLESTable 1: Key Features 71Table 2: System Defaults 79Table 3: Options 60, 66 and 67 Statements 96Table 4: Options 55 and 124 Statements

Page 1214

CHAPTER 17 | IP ServicesDynamic Host Configuration Protocol– 610 –Figure 368: Configuring DHCP Server Address Pools (Host)To show the configured

Page 1215

CHAPTER 17 | IP ServicesForwarding UDP Service Requests– 611 –PARAMETERSThese parameters are displayed:◆ IP Address – IP address assigned to host.

Page 1216

CHAPTER 17 | IP ServicesForwarding UDP Service Requests– 612 –ENABLING THE UDPHELPERUse the IP Service > UDP Helper > General page to enable

Page 1217 - MLD SNOOPING

CHAPTER 17 | IP ServicesForwarding UDP Service Requests– 613 –IEN-116 Name Service port 42NetBIOS Datagram Server port 138NetBIOS Name Server p

Page 1218

CHAPTER 17 | IP ServicesForwarding UDP Service Requests– 614 –SPECIFYING THETARGET SERVER ORSUBNETUse the IP Service > UDP Helper > Address

Page 1219

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 615 –3. Enter the address of the remote server or subnet where UDP request packe

Page 1220

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 616 –COMMAND USAGEWhen PPPoE IA is enabled, the switch inserts a tag identifying

Page 1221

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 617 –Figure 376: Configuring Global Settings for PPPoE Intermediate AgentCONFIG

Page 1222

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 618 – The switch intercepts PPPoE discovery frames from the client and inserts a

Page 1223

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 619 –SHOWING PPPOE IASTATISTICSUse the IP Service > PPPoE Intermediate Agent

Page 1224

TABLES– 62 –Table 32: ShowIPv6 Neighbors - display description 587Table 33: Show IPv6 Statistics - display description 589Table 34: Show MTU - dis

Page 1225

CHAPTER 17 | IP ServicesConfiguring the PPPoE Intermediate Agent– 620 –Figure 378: Showing PPPoE Intermediate Agent Statisticsg

Page 1226

– 621 –18 GENERAL IP ROUTINGThis chapter provides information on network functions including:◆ Ping – Sends ping message to another node on the netw

Page 1227 - MVR FOR IPV4

CHAPTER 18 | General IP RoutingIP Routing and Switching– 622 –Figure 379: Virtual Interfaces and Layer 3 RoutingIP ROUTING AND SWITCHINGIP Switch

Page 1228

CHAPTER 18 | General IP RoutingIP Routing and Switching– 623 –broadcast to get the destination MAC address from the destination node. The IP packe

Page 1229

CHAPTER 18 | General IP RoutingConfiguring IP Routing Interfaces– 624 –ROUTING PROTOCOLS The switch supports both static and dynamic routing.◆ Sta

Page 1230

CHAPTER 18 | General IP RoutingConfiguring IP Routing Interfaces– 625 –unknown destinations, i.e., packets that do not match any routing table ent

Page 1231

CHAPTER 18 | General IP RoutingConfiguring IP Routing Interfaces– 626 –WEB INTERFACETo ping another device on the network:1. Click IP, General, Pi

Page 1232

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 627 –returning an “ICMP port unreachable” message. If the timer goes off before a resp

Page 1233

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 628 –next hop. IP traffic passes along the path to its final destination in this way,

Page 1234

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 629 –Figure 382: Proxy ARPPARAMETERSThese parameters are displayed:◆ Timeout – Sets t

Page 1235

TABLES– 63 –Table 68: User Access Commands 864Table 69: Default Login Settings 865Table 70: Authentication Sequence Commands 866Table 71: RADIUS

Page 1236

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 630 –Figure 383: Configuring General Settings for ARPCONFIGURING STATICARP ADDRESSESF

Page 1237

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 631 –WEB INTERFACETo map an IP address to the corresponding physical address in the AR

Page 1238

CHAPTER 18 | General IP RoutingAddress Resolution Protocol– 632 –DISPLAYING DYNAMICOR LOCAL ARPENTRIESThe ARP cache contains static entries, and e

Page 1239

CHAPTER 18 | General IP RoutingConfiguring Static Routes– 633 –DISPLAYING ARPSTATISTICSUse the IP > ARP (Show Information) page to display stat

Page 1240

CHAPTER 18 | General IP RoutingConfiguring Static Routes– 634 –network topology, so you should only configure a small number of stable routes to e

Page 1241

CHAPTER 18 | General IP RoutingDisplaying the Routing Table– 635 –Figure 389: Configuring Static RoutesTo display static routes:1. Click IP, Rout

Page 1242

CHAPTER 18 | General IP RoutingDisplaying the Routing Table– 636 –network, the routing table is updated, and those changes are immediately reflect

Page 1243

CHAPTER 18 | General IP RoutingEqual-cost Multipath Routing– 637 –Figure 391: Displaying the Routing TableEQUAL-COST MULTIPATH ROUTINGUse the IP

Page 1244

CHAPTER 18 | General IP RoutingEqual-cost Multipath Routing– 638 –◆ The routing table can only have up to 8 equal-cost multipaths for static routi

Page 1245 - MVR FOR IPV6

– 639 –19 CONFIGURING ROUTER REDUNDANCYRouter redundancy protocols use a virtual IP address to support a primary router and multiple backup routers.

Page 1246

TABLES– 64 –Table 104: show lacp neighbors - display description 1027Table 105: show lacp sysid - display description 1028Table 106: Port Mirrorin

Page 1247

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 640 –Figure 395: Several Virtual Master Routers Configured for Mutual Backup a

Page 1248

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 641 –priority. In cases where the configured priority is the same on several gr

Page 1249

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 642 –◆ VLAN – ID of a VLAN configured with an IP interface. (Range: 1-4093; Def

Page 1250

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 643 –◆ Authentication Mode – Authentication mode used to verify VRRP packets re

Page 1251

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 644 –Figure 396: Configuring the VRRP Group IDTo show the configured VRRP grou

Page 1252

CHAPTER 19 | Configuring Router RedundancyConfiguring VRRP Groups– 645 –Figure 398: Setting the Virtual Router Address for a VRRP GroupTo show th

Page 1253

CHAPTER 19 | Configuring Router RedundancyDisplaying VRRP Global Statistics– 646 –Figure 400: Configuring Detailed Settings for a VRRP GroupDISPL

Page 1254

CHAPTER 19 | Configuring Router RedundancyDisplaying VRRP Group Statistics– 647 –Figure 401: Showing Counters for Errors Found in VRRP PacketsDIS

Page 1255

CHAPTER 19 | Configuring Router RedundancyDisplaying VRRP Group Statistics– 648 –WEB INTERFACETo show counters for VRRP protocol events and errors

Page 1256

– 649 –20 UNICAST ROUTINGThis chapter describes how to configure the following unicast routing protocols:RIP – Configures Routing Information Protoc

Page 1257

TABLES– 65 –Table 140: IGMP Snooping Commands 1186Table 141: show ip igmp snooping statistics input - display description 1204Table 142: show ip i

Page 1258

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 650 –To coexist with a network built on multilayer switches, the subnetw

Page 1259

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 651 –versions can take a long time to converge on a new route after the

Page 1260

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 652 –RIP send/receive versions set on the RIP Interface settings screen

Page 1261 - IGMP (LAYER 3)

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 653 –access list that filters networks according to the IP address of th

Page 1262

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 654 –Figure 404: Configuring General Settings for RIPCLEARING ENTRIESFR

Page 1263

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 655 –◆ Clear Route By Network – Clears a specific route based on its IP

Page 1264

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 656 –PARAMETERSThese parameters are displayed:◆ By Address – Adds a netw

Page 1265

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 657 –Figure 407: Showing Network Interfaces Using RIP SPECIFYING PASSIV

Page 1266

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 658 –Figure 408: Specifying a Passive RIP Interface To show the passive

Page 1267

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 659 –3. Add the address of any static neighbors which may not readily to

Page 1268

TABLES– 66 –Table 176: MEP Defect Descriptions 1346Table 177: show fault-notify-generator - display description 1348Table 178: Address Table Comma

Page 1269

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 660 –◆ Metric – Metric assigned to all external routes for the specified

Page 1270 - IGMP PROXY ROUTING

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 661 –Figure 413: Showing External Routes Redistributed into RIP SPECIFY

Page 1271

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 662 –WEB INTERFACETo define an administrative distance for external rout

Page 1272

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 663 –◆ "ip rip authentication mode" on page 1467◆ "ip rip

Page 1273 - MLD (LAYER 3)

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 664 –password. If any incoming protocol messages do not contain the corr

Page 1274

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 665 –◆ Authentication Type – Specifies the type of authentication requir

Page 1275

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 666 –Figure 416: Configuring a Network Interface for RIP To show the ne

Page 1276

CHAPTER 20 | Unicast RoutingConfiguring the Routing Information Protocol– 667 –◆ Rcv Bad Routes – Number of bad routes received.◆ Send Updates – N

Page 1277

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 668 –Figure 419: Showing RIP Peer InformationRESETTING

Page 1278

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 669 –Figure 421: Configuring OSPFCOMMAND USAGE◆ OSPF l

Page 1279

TABLES– 67 –Table 212: show ip ospf database summary - display description 1510Table 213: show ip ospf interface - display description 1511Table 2

Page 1280

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 670 – You can further optimize the exchange of OSPF tra

Page 1281 - MLD PROXY ROUTING

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 671 –CLI REFERENCES◆ "router ospf" on page 14

Page 1282

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 672 –WEB INTERFACETo define an OSPF area and the interf

Page 1283

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 673 –Figure 425: Showing OSPF Process Identifiers CONF

Page 1284

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 674 –◆ Auto Cost – Calculates the cost for an interface

Page 1285 - 43 LLDP COMMANDS

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 675 –◆ Advertise Default Route12 – The router can adver

Page 1286 -

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 676 –Figure 427: Configure General Settings for OSPF D

Page 1287

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 677 –WEB INTERFACETo show administrative settings and s

Page 1288

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 678 –ADDING AN NSSA ORSTUBUse the Routing Protocol >

Page 1289

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 679 –To show the NSSA or stubs added to the specified O

Page 1291

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 680 –CLI REFERENCES◆ "router ospf" on page 14

Page 1292

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 681 –◆ Redistribute – Disable this option when the rout

Page 1293

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 682 –5. Click ApplyFigure 432: Configuring Protocol Se

Page 1294

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 683 –◆ A stub can have multiple ABRs or exit points. Ho

Page 1295

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 684 –Figure 434: Configuring Protocol Settings for a S

Page 1296

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 685 –Figure 435: Displaying Information on NSSA and St

Page 1297

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 686 –PARAMETERSThese parameters are displayed:◆ Process

Page 1298

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 687 –3. Select the process ID.Figure 438: Showing Conf

Page 1299

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 688 –◆ Protocol Type – Specifies the external routing p

Page 1300

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 689 –Figure 440: Importing External Routes To show the

Page 1301

– 69 –SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also de

Page 1302

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 690 –CLI REFERENCES◆ "router ospf" on page 14

Page 1303

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 691 –To show the summary addresses for external routes:

Page 1304

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 692 –◆ IP Address – Address of the interfaces assigned

Page 1305

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 693 –◆ Transmit Delay – Sets the estimated time to send

Page 1306

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 694 –the OSPF header when routing protocol packets are

Page 1307

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 695 –Figure 444: Configuring Settings for All Interfac

Page 1308

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 696 –Figure 445: Configuring Settings for a Specific A

Page 1309 - 44 CFM COMMANDS

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 697 –Figure 447: Showing MD5 Authentication Keys CONFI

Page 1310 -

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 698 –CLI REFERENCES◆ "router ospf" on page 14

Page 1311

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 699 –To show virtual links:1. Click Routing Protocol, O

Page 1312 - Defining CFM Structures

CONTENTS– 7 –Displaying Connection Status 165Configuring Port Mirroring 166Showing Port or Trunk Statistics 168Performing Cable Diagnostics 172T

Page 1313

SECTION I | Getting Started– 70 –

Page 1314

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 700 –Figure 452: Showing MD5 Authentication Keys DISPL

Page 1315

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 701 –CLI REFERENCES◆ "show ip ospf database"

Page 1316

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 702 –Figure 453: Displaying Information in the Link St

Page 1317

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 703 – Attempt – Connection down, but attempting contact

Page 1318

CHAPTER 20 | Unicast RoutingConfiguring the Open Shortest Path First Protocol (Version 2)– 704 –

Page 1319

– 705 –21 MULTICAST ROUTINGThis chapter describes the following multicast routing topics:◆ Enabling Multicast Routing Globally – Describes how to gl

Page 1320

CHAPTER 21 | Multicast RoutingOverview– 706 –PIM-DM is a simple multicast routing protocol that uses flood and prune to build a source-routed mult

Page 1321

CHAPTER 21 | Multicast RoutingOverview– 707 –group addresses. The BSR places information about all of the candidate RPs in subsequent bootstrap me

Page 1322

CHAPTER 21 | Multicast RoutingConfiguring Global Settings for Multicast Routing– 708 –data transmission delays. The switch can also be configured

Page 1323

CHAPTER 21 | Multicast RoutingConfiguring Global Settings for Multicast Routing– 709 –DISPLAYING THEMULTICAST ROUTINGTABLEUse the Multicast > M

Page 1324 - Console#show ethernet cfm ma

– 71 –1 INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching and Layer 3 routing. It includes a management agent that al

Page 1325

CHAPTER 21 | Multicast RoutingConfiguring Global Settings for Multicast Routing– 710 –Show Details◆ Group Address – IP group address for a multica

Page 1326

CHAPTER 21 | Multicast RoutingConfiguring Global Settings for Multicast Routing– 711 – Pruned – This route has been terminated. Registering - A do

Page 1327

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 712 –CONFIGURING PIM FOR IPV4This section describes how to configure PIM-DM and PIM-SM for

Page 1328

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 713 –◆ PIM and IGMP proxy cannot be used at the same time. When an interface is set to use

Page 1329 - Continuity Check Operations

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 714 –Hello messages are sent to neighboring PIM routers from which this device has receive

Page 1330

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 715 –The override interval and the propagation delay are used to calculate the LAN prune d

Page 1331

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 716 –of each router in the tree. This also enables PIM routers to recognize topology chang

Page 1332

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 717 –Figure 459: Configuring PIM Interface Settings (Dense Mode)Figure 460: Configuring

Page 1333

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 718 –DISPLAYING NEIGHBORINFORMATIONUse the Routing Protocol > PIM > Neighbor page to

Page 1334

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 719 –◆ Register Source – Configures the IP source address of a register message to an addr

Page 1335 - Cross Check Operations

CHAPTER 1 | IntroductionDescription of Software Features– 72 –DESCRIPTION OF SOFTWARE FEATURESThe switch provides a wide range of advanced perform

Page 1336

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 720 –Figure 462: Configuring Global Settings for PIM-SMCONFIGURING A BSRCANDIDATEUse the

Page 1337

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 721 –with the same seed hash will be mapped to the same RP. If the mask length is less tha

Page 1338

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 722 –◆ If an IP address is specified that was previously used for an RP, then the older en

Page 1339 - Link Trace Operations

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 723 –Figure 464: Configuring a Static Rendezvous PointTo display static rendezvous points

Page 1340

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 724 –◆ The election process for each group is based on the following criteria: Find all RP

Page 1341

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 725 –Figure 466: Configuring an RP CandidateTo display settings for an RP candidate:1. Cl

Page 1342

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 726 –◆ Priority – Priority value used by this BSR candidate.◆ Hash Mask Length – The numbe

Page 1343 - Loopback Operations

CHAPTER 21 | Multicast RoutingConfiguring PIM for IPv4– 727 –Figure 468: Showing Information About the BSRDISPLAYING RPMAPPINGUse the Routing Pro

Page 1344 - Fault Generator Operations

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 728 –Figure 469: Showing RP MappingCONFIGURING PIMV6 FOR IPV6This section describes how

Page 1345

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 729 –CONFIGURING PIMINTERFACE SETTINGSUse the Routing Protocol > PIM6 > Interface

Page 1346

CHAPTER 1 | IntroductionDescription of Software Features– 73 –CONFIGURATIONBACKUP ANDRESTOREYou can save the current configuration settings to a f

Page 1347

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 730 –◆ Hello Holdtime – Sets the interval to wait for hello messages from a neighboring

Page 1348 - Delay Measure Operations

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 731 –command effectively prompts any downstream neighbors with hosts receiving the flow

Page 1349

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 732 –◆ Max. Graft Retries – The maximum number of times to resend a Graft message if it

Page 1350

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 733 –prune state for this (source, group) pair until the join/prune interval timer expir

Page 1351 - DOMAIN NAME SERVICE COMMANDS

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 734 –Figure 472: Configuring PIMv6 Interface Settings (Sparse Mode)DISPLAYING NEIGHBORI

Page 1352

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 735 –CONFIGURING GLOBALPIM6-SM SETTINGSUse the Routing Protocol > PIM6 > PIM6-SM (

Page 1353

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 736 –WEB INTERFACETo configure global settings for PIM6-SM:1. Click Routing Protocol, PI

Page 1354

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 737 –PARAMETERSThese parameters are displayed:◆ BSR Candidate Status – Configures the sw

Page 1355

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 738 –CONFIGURING A PIM6STATIC RENDEZVOUSPOINTUse the Routing Protocol > PIM6 > PIM

Page 1356

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 739 –3. Specify the static RP to use for a multicast group, or a range of groups by usin

Page 1357

CHAPTER 1 | IntroductionDescription of Software Features– 74 –RATE LIMITING This feature controls the maximum rate for traffic transmitted or rece

Page 1358

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 740 –from the BSR also elects an active RP for each group range using the same election

Page 1359

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 741 –multicast group address and mask indicating the groups for which this router is bid

Page 1360 - – 1360 –

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 742 –◆ Priority – Priority value used by this BSR candidate.◆ Hash Mask Length – The num

Page 1361 - 46 DHCP COMMANDS

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 743 –Figure 480: Showing Information About the PIM6 BSRDISPLAYING RPMAPPINGUse the Rout

Page 1362 - DHCP Client

CHAPTER 21 | Multicast RoutingConfiguring PIMv6 for IPv6– 744 –Figure 481: Showing PIM6 RP Mapping

Page 1363

– 745 –SECTION IIICOMMAND LINE INTERFACEThis section provides a detailed description of the Command Line Interface, along with examples for all of t

Page 1364

SECTION III | Command Line Interface– 746 –◆ "Class of Service Commands" on page 1155◆ "Quality of Service Commands" on page 1

Page 1365 - DHCP RELAY

– 747 –22 USING THE COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).NOTE: You can only access the console i

Page 1366 - DHCP Relay for IPv4

CHAPTER 22 | Using the Command Line InterfaceAccessing the CLI– 748 –TELNET CONNECTION Telnet operates over the IP transport protocol. In this env

Page 1367 - DHCP Relay for IPv6

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 749 –NOTE: You can open up to eight sessions to the device via Telnet or SSH.ENTER

Page 1368 - DHCP SERVER

CHAPTER 1 | IntroductionDescription of Software Features– 75 –This prevents bad frames from entering the network and wasting bandwidth.To avoid dr

Page 1369 - DHCP Server

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 750 –GETTING HELP ONCOMMANDSYou can display a brief description of the help system

Page 1370

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 751 – radius-server RADIUS server information reload Show

Page 1371

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 752 –NEGATING THE EFFECTOF COMMANDSFor many configuration commands you can enter t

Page 1372

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 753 –display the “Console#” command prompt. You can also enter Privileged Exec mod

Page 1373

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 754 –◆ Line Configuration - These commands modify the console port and Telnet conf

Page 1374

CHAPTER 22 | Using the Command Line InterfaceEntering Commands– 755 –For example, you can use the following commands to enter interface configurat

Page 1375

CHAPTER 22 | Using the Command Line InterfaceCLI Command Groups– 756 –CLI COMMAND GROUPSThe system commands can be broken down into the functional

Page 1376

CHAPTER 22 | Using the Command Line InterfaceCLI Command Groups– 757 –The access mode shown in the following tables is indicated by these abbrevia

Page 1377

CHAPTER 22 | Using the Command Line InterfaceCLI Command Groups– 758 –PM (Policy Map Configuration)RC (Router Configuration)VC (VLAN Database Conf

Page 1378

– 759 –23 GENERAL COMMANDSThese commands are used to control the command access mode, configuration mode, and other basic functions.prompt This comm

Page 1379

CHAPTER 1 | IntroductionDescription of Software Features– 76 –◆ Simplify network management for node changes/moves by remotely configuring VLAN me

Page 1380

CHAPTER 23 | General Commands– 760 –EXAMPLE Console(config)#prompt RD2RD2(config)#reload (GlobalConfiguration)This command restarts the system at

Page 1381 - 47 VRRP COMMANDS

CHAPTER 23 | General Commands– 761 –COMMAND USAGE ◆ This command resets the entire system. ◆ Any combination of reload options may be specified. I

Page 1382 -

CHAPTER 23 | General Commands– 762 –EXAMPLE Console>enablePassword: [privileged level password]Console#RELATED COMMANDS disable (764)enable pas

Page 1383

CHAPTER 23 | General Commands– 763 –EXAMPLE In this example, the show history command lists the contents of the command history buffer:Console#sho

Page 1384

CHAPTER 23 | General Commands– 764 –disable This command returns to Normal Exec mode from privileged mode. In normal access mode, you can only dis

Page 1385

CHAPTER 23 | General Commands– 765 –show reload This command displays the current reload settings, and the time at which next scheduled reload wil

Page 1386

CHAPTER 23 | General Commands– 766 –EXAMPLE This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and t

Page 1387

– 767 –24 SYSTEM MANAGEMENT COMMANDSThese commands are used to control system logs, passwords, user names, management options, and display or config

Page 1388

CHAPTER 24 | System Management CommandsDevice Designation– 768 –hostname This command specifies or modifies the host name for this device. Use the

Page 1389

CHAPTER 24 | System Management CommandsSystem Status– 769 –SYSTEM STATUSThis section describes commands used to display system information.show ac

Page 1390

CHAPTER 1 | IntroductionDescription of Software Features– 77 –ETHERNET RINGPROTECTIONSWITCHINGERPS can also be used to increase the availability a

Page 1391 - 48 IP INTERFACE COMMANDS

CHAPTER 24 | System Management CommandsSystem Status– 770 –show memory This command shows memory utilization parameters.COMMAND MODE Normal Exec,

Page 1392 - IPv4 Interface

CHAPTER 24 | System Management CommandsSystem Status– 771 –show running-configThis command displays the configuration information currently in use

Page 1393

CHAPTER 24 | System Management CommandsSystem Status– 772 –!<stackingMac>00_00-00-00-00-00-00_00</stackingMac>!<stackingMac>00_0

Page 1394

CHAPTER 24 | System Management CommandsSystem Status– 773 –◆ This command displays settings for key command modes. Each mode group is separated by

Page 1395

CHAPTER 24 | System Management CommandsSystem Status– 774 –EXAMPLEConsole#show systemSystem Description : GTL-2691 Managed L3 Stackable SwitchSyst

Page 1396

CHAPTER 24 | System Management CommandsSystem Status– 775 – Telnet Server Port: 23 Jumbo Frame: Disabled...show users Shows all a

Page 1397

CHAPTER 24 | System Management CommandsFrame Size– 776 –EXAMPLE Console#show versionUnit 1 Serial Number : S123456 Hardware Version

Page 1398 - RELATED COMMANDS

CHAPTER 24 | System Management CommandsFan Control– 777 –between the two end nodes must be able to accept the extended frame size. And for half-du

Page 1399

CHAPTER 24 | System Management CommandsFile Management– 778 –FILE MANAGEMENTManaging FirmwareFirmware can be uploaded and downloaded to or from an

Page 1400

CHAPTER 24 | System Management CommandsFile Management– 779 –General Commandsboot system This command specifies the file or image used to start up

Page 1401

CHAPTER 1 | IntroductionDescription of Software Features– 78 –ADDRESS RESOLUTIONPROTOCOLThe switch uses ARP and Proxy ARP to convert between IP ad

Page 1402

CHAPTER 24 | System Management CommandsFile Management– 780 –copy This command moves (upload/download) a code image or configuration file between

Page 1403

CHAPTER 24 | System Management CommandsFile Management– 781 –◆ You can use “Factory_Default_Config.cfg” as the source to copy from the factory def

Page 1404

CHAPTER 24 | System Management CommandsFile Management– 782 –The following example shows how to copy the running configuration to a startup file.C

Page 1405

CHAPTER 24 | System Management CommandsFile Management– 783 –This example shows how to copy a file to an FTP server. Console#copy ftp fileFTP serv

Page 1406

CHAPTER 24 | System Management CommandsFile Management– 784 –dir This command displays a list of files in flash memory.SYNTAX dir [unit:] {boot-ro

Page 1407 - IPV6 INTERFACE

CHAPTER 24 | System Management CommandsFile Management– 785 –whichboot This command displays which files were booted when the system powered up.SY

Page 1408

CHAPTER 24 | System Management CommandsFile Management– 786 –1. It will search for a new version of the image at the location specified by upgrade

Page 1409

CHAPTER 24 | System Management CommandsFile Management– 787 –DEFAULT SETTING NoneCOMMAND MODE Global ConfigurationCOMMAND USAGE ◆ This command is

Page 1410

CHAPTER 24 | System Management CommandsLine– 788 –COMMAND MODE Global ConfigurationEXAMPLEThis shows how to specify a TFTP server where new code i

Page 1411

CHAPTER 24 | System Management CommandsLine– 789 –line This command identifies a specific line for configuration, and to process subsequent line c

Page 1412

CHAPTER 1 | IntroductionSystem Defaults– 79 –SYSTEM DEFAULTSThe switch’s system defaults are provided in the configuration file “Factory_Default_C

Page 1413

CHAPTER 24 | System Management CommandsLine– 790 –databits This command sets the number of data bits per character that are interpreted and genera

Page 1414

CHAPTER 24 | System Management CommandsLine– 791 –COMMAND USAGE ◆ If user input is detected within the timeout interval, the session is kept open;

Page 1415

CHAPTER 24 | System Management CommandsLine– 792 –◆ This command controls login authentication via the switch itself. To configure user names and

Page 1416

CHAPTER 24 | System Management CommandsLine– 793 –password This command specifies the password for a line. Use the no form to remove the password.

Page 1417

CHAPTER 24 | System Management CommandsLine– 794 –password-thresh This command sets the password intrusion threshold which limits the number of fa

Page 1418

CHAPTER 24 | System Management CommandsLine– 795 –COMMAND MODE Line Configuration (console only)EXAMPLE To set the silent time to 60 seconds, ente

Page 1419

CHAPTER 24 | System Management CommandsLine– 796 –stopbits This command sets the number of the stop bits transmitted per byte. Use the no form to

Page 1420

CHAPTER 24 | System Management CommandsLine– 797 –EXAMPLE To set the timeout to two minutes, enter this command:Console(config-line)#timeout login

Page 1421

CHAPTER 24 | System Management CommandsEvent Logging– 798 –EXAMPLE To show all lines, enter this command:Console#show line Console Configuration:

Page 1422

CHAPTER 24 | System Management CommandsEvent Logging– 799 –logging facility This command sets the facility type for remote logging of syslog messa

Page 1423

CONTENTS– 8 –7ADDRESS TABLE SETTINGS 233Configuring MAC Address Learning 233Setting Static Addresses 235Changing the Aging Time 236Displaying the

Page 1424

CHAPTER 1 | IntroductionSystem Defaults– 80 –Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledPo rt Trunking St

Page 1425

CHAPTER 24 | System Management CommandsEvent Logging– 800 –DEFAULT SETTING Flash: errors (level 3 - 0)RAM: debugging (level 7 - 0)COMMAND MODE Glo

Page 1426

CHAPTER 24 | System Management CommandsEvent Logging– 801 –EXAMPLE Console(config)#logging host 10.1.0.3Console(config)#logging on This command co

Page 1427

CHAPTER 24 | System Management CommandsEvent Logging– 802 –DEFAULT SETTING DisabledLevel 7COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Using t

Page 1428

CHAPTER 24 | System Management CommandsEvent Logging– 803 –show log This command displays the log messages stored in local memory.SYNTAX show log

Page 1429

CHAPTER 24 | System Management CommandsEvent Logging– 804 –EXAMPLEThe following example shows that system logging is enabled, the message level fo

Page 1430

CHAPTER 24 | System Management CommandsSMTP Alerts– 805 –SMTP ALERTSThese commands configure SMTP event handling, and forwarding of alert messages

Page 1431

CHAPTER 24 | System Management CommandsSMTP Alerts– 806 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ You can specify up to three SMTP servers

Page 1432

CHAPTER 24 | System Management CommandsSMTP Alerts– 807 –EXAMPLEThis example will send email alerts for system errors from level 3 through 0.Conso

Page 1433

CHAPTER 24 | System Management CommandsTime– 808 –COMMAND USAGE You may use an symbolic email address that identifies the switch, or the address o

Page 1434

CHAPTER 24 | System Management CommandsTime– 809 –SNTP Commandssntp client This command enables SNTP client requests for time synchronization from

Page 1435

CHAPTER 1 | IntroductionSystem Defaults– 81 –IP Settings Management. VLAN Any VLAN configured with an IP addressIP Address 192.168.1.1Default Gate

Page 1436

CHAPTER 24 | System Management CommandsTime– 810 –Current Mode: unicastSNTP Status : EnabledSNTP Server 137.92.140.80 0.0.0.0 0.0.0.0Current Serve

Page 1437

CHAPTER 24 | System Management CommandsTime– 811 –DEFAULT SETTING NoneCOMMAND MODE Global ConfigurationCOMMAND USAGE This command specifies time s

Page 1438

CHAPTER 24 | System Management CommandsTime– 812 –NTP Commandsntp authenticate This command enables authentication for NTP client-server communica

Page 1439 - IPV6 TO IPV4 TUNNELS

CHAPTER 24 | System Management CommandsTime– 813 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ The key number specifies a key value in the NTP

Page 1440

CHAPTER 24 | System Management CommandsTime– 814 –◆ This command enables client time requests to time servers specified via the ntp servers comman

Page 1441

CHAPTER 24 | System Management CommandsTime– 815 –EXAMPLE Console(config)#ntp server 192.168.3.20Console(config)#ntp server 192.168.3.21Console(co

Page 1442

CHAPTER 24 | System Management CommandsTime– 816 –minutes - Number of minutes before/after UTC. (Range: 0-59 minutes)before-utc - Sets the local t

Page 1443

CHAPTER 24 | System Management CommandsTime Range– 817 –COMMAND USAGE Note that when SNTP is enabled, the system clock cannot be manually configur

Page 1444

CHAPTER 24 | System Management CommandsTime Range– 818 –time-range This command specifies the name of a time range, and enters time range configur

Page 1445

CHAPTER 24 | System Management CommandsTime Range– 819 –COMMAND MODE Time Range ConfigurationCOMMAND USAGE If a time range is already configured,

Page 1446

CHAPTER 1 | IntroductionSystem Defaults– 82 –

Page 1447 - 49 IP ROUTING COMMANDS

CHAPTER 24 | System Management CommandsSwitch Clustering– 820 –EXAMPLEThis example configures a time range for the periodic occurrence of an event

Page 1448 - Global Routing Configuration

CHAPTER 24 | System Management CommandsSwitch Clustering– 821 –Using Switch Clustering◆ A switch cluster has a primary unit called the “Commander”

Page 1449

CHAPTER 24 | System Management CommandsSwitch Clustering– 822 –IP subnets in the network. Cluster IP addresses are assigned to switches when they

Page 1450

CHAPTER 24 | System Management CommandsSwitch Clustering– 823 –cluster ip-pool This command sets the cluster IP address pool. Use the no form to r

Page 1451

CHAPTER 24 | System Management CommandsSwitch Clustering– 824 –COMMAND MODEGlobal ConfigurationCOMMAND USAGE ◆ The maximum number of cluster Membe

Page 1452

CHAPTER 24 | System Management CommandsSwitch Clustering– 825 –Heartbeat Loss Count : 3 secondsNumber of Members : 1Number of Candidates : 2Con

Page 1453

CHAPTER 24 | System Management CommandsSwitch Clustering– 826 –

Page 1454

– 827 –25 SNMP COMMANDSControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the e

Page 1455

CHAPTER 25 | SNMP Commands– 828 –Notification Log Commandsnlm Enables the specified notification log GCsnmp-server notify-filter Creates a notific

Page 1456

CHAPTER 25 | SNMP CommandsGeneral SNMP Commands– 829 –General SNMP Commandssnmp-server This command enables the SNMPv3 engine and services for all

Page 1457

– 83 –2 INITIAL SWITCH CONFIGURATIONThis chapter includes information on connecting to the switch and basic configuration procedures.CONNECTING TO T

Page 1458

CHAPTER 25 | SNMP CommandsGeneral SNMP Commands– 830 –EXAMPLE Console(config)#snmp-server community alpha rwConsole(config)#snmp-servercontactThis

Page 1459

CHAPTER 25 | SNMP CommandsGeneral SNMP Commands– 831 –EXAMPLE Console(config)#snmp-server location WC-19Console(config)#RELATED COMMANDSsnmp-serve

Page 1460

CHAPTER 25 | SNMP CommandsSNMP Target Host Commands– 832 –SNMP Target Host Commandssnmp-server enabletrapsThis command enables this device to send

Page 1461

CHAPTER 25 | SNMP CommandsSNMP Target Host Commands– 833 –snmp-server host This command specifies the recipient of a Simple Network Management Pro

Page 1462

CHAPTER 25 | SNMP CommandsSNMP Target Host Commands– 834 –enable multiple hosts, you must issue a separate snmp-server host command for each host.

Page 1463

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 835 –EXAMPLE Console(config)#snmp-server host 10.1.19.23 batmanConsole(config)#RELATED COMMANDSsnmp-ser

Page 1464

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 836 –◆ Trailing zeroes need not be entered to uniquely specify a engine ID. In other words, the value “

Page 1465

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 837 –COMMAND USAGE ◆ A group sets the access policy for the assigned users.◆ When authentication is sel

Page 1466

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 838 –DEFAULT SETTING None COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Local users (i.e., the comma

Page 1467

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 839 –snmp-server view This command adds an SNMP view which controls user access to the MIB. Use the no

Page 1468

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 84 –◆ Control port access through IEEE 802.1X security or static address filteri

Page 1469

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 840 –show snmpengine-idThis command shows the SNMP engine ID.COMMAND MODE Privileged ExecEXAMPLEThis ex

Page 1470

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 841 –Write View : No writeview specifiedNotify View : No notifyview specifiedStorage Type : vo

Page 1471

CHAPTER 25 | SNMP CommandsSNMPv3 Commands– 842 –Row Status: activeConsole#show snmp view This command shows information on the SNMP views.COMMAND

Page 1472

CHAPTER 25 | SNMP CommandsNotification Log Commands– 843 –Notification Log Commandsnlm This command enables or disables the specified notification

Page 1473

CHAPTER 25 | SNMP CommandsNotification Log Commands– 844 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ Systems that support SNMP often need a

Page 1474

CHAPTER 25 | SNMP CommandsAdditional Trap Commands– 845 –show nlmoper-statusThis command shows the operational status of configured notification l

Page 1475

CHAPTER 25 | SNMP CommandsAdditional Trap Commands– 846 –COMMAND USAGE Once the rising alarm threshold is exceeded, utilization must drop beneath

Page 1476

– 847 –26 REMOTE MONITORING COMMANDSRemote Monitoring allows a remote device to collect information or respond to specified events on an independent

Page 1477

CHAPTER 26 | Remote Monitoring Commands– 848 –rmon alarm This command sets threshold bounds for a monitored variable. Use the no form to remove an

Page 1478

CHAPTER 26 | Remote Monitoring Commands– 849 –◆ If the current value is less than or equal to the falling threshold, and the last sample value was

Page 1479

CHAPTER 2 | Initial Switch ConfigurationConnecting to the Switch– 85 –3. Make sure the terminal emulation software is set as follows: Select the a

Page 1480

CHAPTER 26 | Remote Monitoring Commands– 850 –◆ The specified events determine the action to take when an alarm triggers this event. The response

Page 1481

CHAPTER 26 | Remote Monitoring Commands– 851 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#rmon collection history 21 buckets 2

Page 1482

CHAPTER 26 | Remote Monitoring Commands– 852 –show rmon alarms This command shows the settings for all configured alarms.COMMAND MODE Privileged E

Page 1483

CHAPTER 26 | Remote Monitoring Commands– 853 –show rmonstatisticsThis command shows the information collected for all configured entries in the st

Page 1484

CHAPTER 26 | Remote Monitoring Commands– 854 –

Page 1485

– 855 –27 FLOW SAMPLING COMMANDS Flow sampling (sFlow) can be used with a remote sFlow Collector to provide an accurate, detailed and real-time over

Page 1486

CHAPTER 27 | Flow Sampling Commands– 856 –COMMAND USAGE Flow sampling must be enabled globally on the switch, as well as for those ports where it

Page 1487

CHAPTER 27 | Flow Sampling Commands– 857 –sflow max-datagram-sizeThis command configures the maximum size of the sFlow datagram payload. Use the n

Page 1488

CHAPTER 27 | Flow Sampling Commands– 858 –sflow owner This command configures the name of the receiver (i.e., sFlow Collector). Use the no form to

Page 1489

CHAPTER 27 | Flow Sampling Commands– 859 –sflow sample This command configures the packet sampling rate. Use the no form to restore the default ra

Page 1490

CHAPTER 2 | Initial Switch ConfigurationStack Operations– 86 –STACK OPERATIONSUp to eight switches can be stacked together as described in the Ins

Page 1491

CHAPTER 27 | Flow Sampling Commands– 860 –sflow timeout This command configures the length of time samples are sent to the Collector before resett

Page 1492

CHAPTER 27 | Flow Sampling Commands– 861 –COMMAND MODE Privileged ExecEXAMPLEConsole#show sflow interface ethernet 1/9 Interface of Ethernet 1/9

Page 1493

CHAPTER 27 | Flow Sampling Commands– 862 –

Page 1494

– 863 –28 AUTHENTICATION COMMANDS You can configure this switch to authenticate users logging into the system for management access using local or r

Page 1495

CHAPTER 28 | Authentication CommandsUser Accounts– 864 –USER ACCOUNTSThe basic commands required for management access are listed in this section.

Page 1496

CHAPTER 28 | Authentication CommandsUser Accounts– 865 –EXAMPLE Console(config)#enable password level 15 0 adminConsole(config)#RELATED COMMANDSen

Page 1497

CHAPTER 28 | Authentication CommandsAuthentication Sequence– 866 –EXAMPLE This example shows how the set the access level and password for a user.

Page 1498

CHAPTER 28 | Authentication CommandsAuthentication Sequence– 867 –◆ RADIUS and TACACS+ logon authentication assigns a specific privilege level for

Page 1499

CHAPTER 28 | Authentication CommandsRADIUS Client– 868 –“authentication login radius tacacs local,” the user name and password on the RADIUS serve

Page 1500

CHAPTER 28 | Authentication CommandsRADIUS Client– 869 –COMMAND MODE Global ConfigurationEXAMPLE Console(config)#radius-server acct-port 181Consol

Page 1501

CHAPTER 2 | Initial Switch ConfigurationStack Operations– 87 –SELECTING THEBACKUP UNITOnce the Master unit finishes booting up, it continues to sy

Page 1502

CHAPTER 28 | Authentication CommandsRADIUS Client– 870 –key - Encryption key used to authenticate logon access for client. Do not use blank spaces

Page 1503

CHAPTER 28 | Authentication CommandsRADIUS Client– 871 –radius-serverretransmitThis command sets the number of retries. Use the no form to restore

Page 1504

CHAPTER 28 | Authentication CommandsTACACS+ Client– 872 –show radius-server This command displays the current settings for the RADIUS server.DEFAU

Page 1505

CHAPTER 28 | Authentication CommandsTACACS+ Client– 873 –tacacs-server host This command specifies the TACACS+ server and other optional parameter

Page 1506

CHAPTER 28 | Authentication CommandsTACACS+ Client– 874 –COMMAND MODE Global ConfigurationEXAMPLE Console(config)#tacacs-server key greenConsole(c

Page 1507

CHAPTER 28 | Authentication CommandsTACACS+ Client– 875 –EXAMPLE Console(config)#tacacs-server retransmit 5Console(config)#tacacs-servertimeoutThi

Page 1508

CHAPTER 28 | Authentication CommandsAAA– 876 –TACACS Server Group:Group Name Member Index------------------------- -------------tac

Page 1509

CHAPTER 28 | Authentication CommandsAAA– 877 –group - Specifies the server group to use.radius - Specifies all RADIUS hosts configure with the rad

Page 1510

CHAPTER 28 | Authentication CommandsAAA– 878 –group - Specifies the server group to use.radius - Specifies all RADIUS hosts configure with the rad

Page 1511

CHAPTER 28 | Authentication CommandsAAA– 879 –◆ Using the command without specifying an interim interval enables updates, but does not change the

Page 1512

CHAPTER 2 | Initial Switch ConfigurationStack Operations– 88 –other units within this VLAN interface, then this IP address will no longer be avail

Page 1513

CHAPTER 28 | Authentication CommandsAAA– 880 –aaa group server Use this command to name a group of security server hosts. To remove a server group

Page 1514

CHAPTER 28 | Authentication CommandsAAA– 881 –EXAMPLE Console(config)#aaa group server radius tpsConsole(config-sg-radius)#server 10.2.68.120Conso

Page 1515

CHAPTER 28 | Authentication CommandsAAA– 882 –EXAMPLE Console(config)#line consoleConsole(config-line)#accounting exec tpsConsole(config-line)#exi

Page 1516

CHAPTER 28 | Authentication CommandsWeb Server– 883 –statistics - Displays accounting records.user-name - Displays accounting records for a specif

Page 1517

CHAPTER 28 | Authentication CommandsWeb Server– 884 –ip http port This command specifies the TCP port number used by the web browser interface. Us

Page 1518

CHAPTER 28 | Authentication CommandsWeb Server– 885 –ip http secure-port This command specifies the UDP port number used for HTTPS connection to t

Page 1519

CHAPTER 28 | Authentication CommandsWeb Server– 886 –COMMAND USAGE ◆ Both HTTP and HTTPS service can be enabled independently on the switch. Howev

Page 1520

CHAPTER 28 | Authentication CommandsTelnet Server– 887 –TELNET SERVERThis section describes commands used to configure Telnet management access to

Page 1521

CHAPTER 28 | Authentication CommandsTelnet Server– 888 –ip telnet port This command specifies the TCP port number used by the Telnet interface. Us

Page 1522

CHAPTER 28 | Authentication CommandsSecure Shell– 889 –show ip telnet This command displays the configuration settings for the Telnet server. COMM

Page 1523

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 89 –running a different image version. For information on downloading firmware, see “

Page 1524

CHAPTER 28 | Authentication CommandsSecure Shell– 890 –Configuration GuidelinesThe SSH server on this switch supports both password and public key

Page 1525

CHAPTER 28 | Authentication CommandsSecure Shell– 891 –4. Set the Optional Parameters – Set other optional parameters, including the authenticatio

Page 1526

CHAPTER 28 | Authentication CommandsSecure Shell– 892 –c. The client sends a signature generated using the private key to the switch.d. When the s

Page 1527

CHAPTER 28 | Authentication CommandsSecure Shell– 893 –COMMAND MODE Global ConfigurationCOMMAND USAGE ◆ The SSH server supports up to eight client

Page 1528

CHAPTER 28 | Authentication CommandsSecure Shell– 894 –ip ssh timeout This command configures the timeout for the SSH server. Use the no form to r

Page 1529

CHAPTER 28 | Authentication CommandsSecure Shell– 895 –EXAMPLE Console#delete public-key admin dsaConsole#ip ssh crypto host-key generateThis comm

Page 1530

CHAPTER 28 | Authentication CommandsSecure Shell– 896 –ip ssh cryptozeroizeThis command clears the host key from memory (i.e. RAM). SYNTAX ip ssh

Page 1531

CHAPTER 28 | Authentication CommandsSecure Shell– 897 –RELATED COMMANDSip ssh crypto host-key generate (895)show ip ssh This command displays the

Page 1532

CHAPTER 28 | Authentication CommandsSecure Shell– 898 –1854900028313416250083487184495220874292122556916656552963281635169640408315547660664151657

Page 1533

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 899 –802.1X PORT AUTHENTICATIONThe switch supports IEEE 802.1X (dot1x) port-based

Page 1534

CONTENTS– 9 –12 VOIP TRAFFIC CONFIGURATION 303Overview 303Configuring VoIP Traffic 303Configuring Telephony OUI 305Configuring VoIP Traffic Ports

Page 1535

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 90 –4. Type “username admin password 0 password,” for the Privileged Exec level, wher

Page 1536

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 900 –General Commandsdot1x default This command sets all configurable dot1x global

Page 1537

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 901 –dot1x system-auth-controlThis command enables IEEE 802.1X port authentication

Page 1538

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 902 –dot1x max-reauth-reqThis command sets the maximum number of times that the sw

Page 1539

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 903 –dot1x operation-modeThis command allows hosts (clients) to connect to an 802.

Page 1540

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 904 –dot1x port-control This command sets the dot1x mode on a port interface. Use

Page 1541

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 905 –EXAMPLEConsole(config)#interface eth 1/2Console(config-if)#dot1x re-authentic

Page 1542

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 906 –EXAMPLEConsole(config)#interface eth 1/2Console(config-if)#dot1x timeout re-a

Page 1543

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 907 –DEFAULT30 secondsCOMMAND MODEInterface ConfigurationEXAMPLEConsole(config)#in

Page 1544

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 908 –Display Information Commandsshow dot1x This command shows general port authen

Page 1545 - 50 MULTICAST ROUTING COMMANDS

CHAPTER 28 | Authentication Commands802.1X Port Authentication– 909 – Reauth Max Retries – Maximum number of reauthentication attempts. Max Reque

Page 1546 - General Multicast Routing

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 91 –◆ Default gateway for the network To assign an IPv4 address to the switch, comple

Page 1547

CHAPTER 28 | Authentication CommandsManagement IP Filter– 910 –802.1X Port Details802.1X Authenticator is enabled on port 1/1...802.1X Authenticat

Page 1548 - IPv6 Commands

CHAPTER 28 | Authentication CommandsManagement IP Filter– 911 –management This command specifies the client IP addresses that are allowed manageme

Page 1549

CHAPTER 28 | Authentication CommandsManagement IP Filter– 912 –show management This command displays the client IP addresses that are allowed mana

Page 1550

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 913 –PPPOE INTERMEDIATE AGENTThis section describes commands used to configure the P

Page 1551

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 914 –port-ID attribute in PPP authentication and AAA accounting requests to a RADIUS

Page 1552

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 915 –pppoe intermediate-agent port-enableThis command enables the PPPoE IA on an int

Page 1553 - PIM MULTICAST ROUTING

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 916 –◆ The switch intercepts PPPoE discovery frames from the client and inserts a un

Page 1554

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 917 –pppoe intermediate-agent vendor-tagstripThis command enables the stripping of v

Page 1555

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 918 –show pppoeintermediate-agentinfoThis command displays configuration settings fo

Page 1556

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 919 –EXAMPLEConsole#show pppoe intermediate-agent statistics interface ethernet 1/1E

Page 1557

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 92 –example, followed by the “link-local” command parameter. Then press <Enter>

Page 1558

CHAPTER 28 | Authentication CommandsPPPoE Intermediate Agent– 920 –

Page 1559

– 921 –29 GENERAL SECURITY MEASURES This switch supports many methods of segregating traffic for clients attached to each of the data ports, and for

Page 1560

CHAPTER 29 | General Security MeasuresPort Security– 922 –PORT SECURITY These commands can be used to enable port security on a port. When MAC add

Page 1561

CHAPTER 29 | General Security MeasuresPort Security– 923 –◆ The mac-learning commands cannot be used if 802.1X Port Authentication has been global

Page 1562

CHAPTER 29 | General Security MeasuresPort Security– 924 –COMMAND USAGE ◆ The default maximum number of MAC addresses allowed on a secure port is

Page 1563

CHAPTER 29 | General Security MeasuresPort Security– 925 –show port security This command displays port security status and the secure address cou

Page 1564

CHAPTER 29 | General Security MeasuresPort Security– 926 –The following example shows the port security settings and number of secure addresses fo

Page 1565

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 927 –NETWORK ACCESS (MAC ADDRESS AUTHENTICATION)Network Access

Page 1566

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 928 –network-accessagingUse this command to enable aging for au

Page 1567

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 929 –COMMAND MODE Global Configuration COMMAND USAGE◆ Specified

Page 1568

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 93 –3. Type “exit” to return to the global configuration mode prompt. Press <Enter

Page 1569

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 930 –network-accessdynamic-qosUse this command to enable the dy

Page 1570

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 931 –EXAMPLE The following example enables the dynamic QoS feat

Page 1571

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 932 –network-accessguest-vlanUse this command to assign all tra

Page 1572

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 933 –network-accesslink-detection link-downUse this command to

Page 1573

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 934 –EXAMPLEConsole(config)#interface ethernet 1/1Console(confi

Page 1574

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 935 –COMMAND MODE Interface Configuration COMMAND USAGE The max

Page 1575

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 936 –◆ When port status changes to down, all MAC addresses are

Page 1576

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 937 –mac-authenticationintrusion-actionUse this command to conf

Page 1577

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 938 –clear network-accessUse this command to clear entries from

Page 1578

CHAPTER 29 | General Security MeasuresNetwork Access (MAC Address Authentication)– 939 –EXAMPLE Console#show network-access interface ethernet 1/1

Page 1579

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 94 –To automatically configure the switch by communicating with BOOTP or DHCP address

Page 1580

CHAPTER 29 | General Security MeasuresWeb Authentication– 940 –00-00-00 to 00-00-01-FF-FF-FF to be displayed. All other MACs would be filtered out

Page 1581

CHAPTER 29 | General Security MeasuresWeb Authentication– 941 –NOTE: RADIUS authentication must be activated and configured for the web authentica

Page 1582

CHAPTER 29 | General Security MeasuresWeb Authentication– 942 –EXAMPLE Console(config)#web-auth login-attempts 2Console(config)#web-auth quiet-per

Page 1583

CHAPTER 29 | General Security MeasuresWeb Authentication– 943 –EXAMPLE Console(config)#web-auth session-timeout 1800Console(config)#web-auth syste

Page 1584

CHAPTER 29 | General Security MeasuresWeb Authentication– 944 –web-auth re-authenticate (Port)This command ends all web authentication sessions co

Page 1585

CHAPTER 29 | General Security MeasuresWeb Authentication– 945 –show web-auth This command displays global web authentication parameters.COMMAND MO

Page 1586

CHAPTER 29 | General Security MeasuresDHCP Snooping– 946 –show web-authsummaryThis command displays a summary of web authentication port parameter

Page 1587

CHAPTER 29 | General Security MeasuresDHCP Snooping– 947 –ip dhcp snooping This command enables DHCP snooping globally. Use the no form to restore

Page 1588

CHAPTER 29 | General Security MeasuresDHCP Snooping– 948 – If the DHCP packet is from a client, such as a DECLINE or RELEASE message, the switch f

Page 1589

CHAPTER 29 | General Security MeasuresDHCP Snooping– 949 –ip dhcp snoopingdatabase flashThis command writes all dynamically learned snooping entri

Page 1590

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 95 –2. Type “ipv6 enable” and press <Enter>.Console(config)#interface vlan 1Con

Page 1591

CHAPTER 29 | General Security MeasuresDHCP Snooping– 950 –just their MAC address. DHCP client-server exchange messages are then forwarded directly

Page 1592

CHAPTER 29 | General Security MeasuresDHCP Snooping– 951 –policy for these packets. The switch can either drop the DHCP packets, keep the existing

Page 1593

CHAPTER 29 | General Security MeasuresDHCP Snooping– 952 –ip dhcp snoopingvlanThis command enables DHCP snooping on the specified VLAN. Use the no

Page 1594

CHAPTER 29 | General Security MeasuresDHCP Snooping– 953 –COMMAND MODEInterface Configuration (Ethernet, Port Channel)COMMAND USAGE ◆ A trusted in

Page 1595

CHAPTER 29 | General Security MeasuresDHCP Snooping– 954 –COMMAND MODEPrivileged ExecEXAMPLEConsole(config)#clear ip dhcp snooping binding 11-22-3

Page 1596

CHAPTER 29 | General Security MeasuresIP Source Guard– 955 –show ip dhcpsnooping bindingThis command shows the DHCP snooping binding table entries

Page 1597

CHAPTER 29 | General Security MeasuresIP Source Guard– 956 –ip source-guardbindingThis command adds a static address to the source-guard binding t

Page 1598

CHAPTER 29 | General Security MeasuresIP Source Guard– 957 –EXAMPLEThis example configures a static source-guard binding on port 5.Console(config)

Page 1599 - APPENDICES

CHAPTER 29 | General Security MeasuresIP Source Guard– 958 –◆ Table entries include a MAC address, IP address, lease time, entry type (Static-IP-S

Page 1600 -

CHAPTER 29 | General Security MeasuresIP Source Guard– 959 –ip source-guardmax-bindingThis command sets the maximum number of entries that can be

Page 1601 - A SOFTWARE SPECIFICATIONS

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 96 –◆ If the switch does not receive a DHCP response prior to completing the bootup p

Page 1602 - Software Features

CHAPTER 29 | General Security MeasuresARP Inspection– 960 –show ip source-guard bindingThis command shows the source guard binding table.SYNTAX sh

Page 1603 - STANDARDS

CHAPTER 29 | General Security MeasuresARP Inspection– 961 –ip arp inspection This command enables ARP Inspection globally on the switch. Use the n

Page 1604 - MANAGEMENT INFORMATION BASES

CHAPTER 29 | General Security MeasuresARP Inspection– 962 –◆ When ARP Inspection is disabled globally, it is still possible to configure ARP Inspe

Page 1605

CHAPTER 29 | General Security MeasuresARP Inspection– 963 –EXAMPLEConsole(config)#ip arp inspection filter sales vlan 1Console(config)#ip arp insp

Page 1606

CHAPTER 29 | General Security MeasuresARP Inspection– 964 –EXAMPLEConsole(config)#ip arp inspection log-buffer logs 1 interval 10Console(config)#i

Page 1607 - B TROUBLESHOOTING

CHAPTER 29 | General Security MeasuresARP Inspection– 965 –ip arp inspectionvlanThis command enables ARP Inspection for a specified VLAN or range

Page 1608 - USING SYSTEM LOGS

CHAPTER 29 | General Security MeasuresARP Inspection– 966 –ip arp inspectionlimitThis command sets a rate limit for the ARP packets received on a

Page 1609 - C LICENSE INFORMATION

CHAPTER 29 | General Security MeasuresARP Inspection– 967 –EXAMPLEConsole(config)#interface ethernet 1/1Console(config-if)#ip arp inspection trust

Page 1610 -

CHAPTER 29 | General Security MeasuresARP Inspection– 968 –show ip arpinspection logThis command shows information about entries stored in the log

Page 1611

CHAPTER 29 | General Security MeasuresDenial of Service Protection– 969 –EXAMPLEConsole#show ip arp inspection vlan 1VLAN ID DAI Status

Page 1612

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 97 – option dynamicProvision.tftp-server-name code 66 = text; option dynamicProvision

Page 1613 - GLOSSARY

CHAPTER 29 | General Security MeasuresDenial of Service Protection– 970 –dos-protection tcp-scanThis command protects against DoS TCP-null-scan at

Page 1614 - DiffServ allocates

CHAPTER 29 | General Security MeasuresDenial of Service Protection– 971 –EXAMPLEConsole#show dos-protectionGlobal DoS Protections: LAND Attack

Page 1615 - – 1615 –

CHAPTER 29 | General Security MeasuresDenial of Service Protection– 972 –

Page 1616 - – 1616 –

– 973 –30 ACCESS CONTROL LISTSAccess Control Lists (ACL) provide packet filtering for IPv4 frames (based on address, protocol, Layer 4 protocol port

Page 1617 - – 1617 –

CHAPTER 30 | Access Control ListsIPv4 ACLs– 974 –access-list ip This command adds an IP access list and enters configuration mode for standard or

Page 1618 - DIUS is a logon

CHAPTER 30 | Access Control ListsIPv4 ACLs– 975 –permit, deny(Standard IP ACL)This command adds a rule to a Standard IPv4 ACL. The rule sets a fil

Page 1619 - CACS+ is a logon

CHAPTER 30 | Access Control ListsIPv4 ACLs– 976 –permit, deny(Extended IPv4 ACL)This command adds a rule to an Extended IPv4 ACL. The rule sets a

Page 1620 - – 1620 –

CHAPTER 30 | Access Control ListsIPv4 ACLs– 977 –port-bitmask – Decimal number representing the port bits to match. (Range: 0-65535)control-flags

Page 1621 - COMMAND LIST

CHAPTER 30 | Access Control ListsIPv4 ACLs– 978 –EXAMPLEThis example accepts any incoming packets if the source address is within subnet 10.7.1.x.

Page 1622 - – 1622 –

CHAPTER 30 | Access Control ListsIPv4 ACLs– 979 –COMMAND USAGE◆ Only one ACL can be bound to a port.◆ If an ACL is already bound to a port and you

Page 1623 - – 1623 –

CHAPTER 2 | Initial Switch ConfigurationBasic Configuration– 98 –◆ private - with read/write access. Authorized management stations are able to bo

Page 1624 - – 1624 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 980 –EXAMPLE Console#show ip access-list standardIP standard access-list david: permit host 10.1.1.21

Page 1625 - – 1625 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 981 –COMMAND MODEGlobal ConfigurationCOMMAND USAGE◆ When you create a new ACL or enter configuration m

Page 1626 - – 1626 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 982 –DEFAULT SETTINGNoneCOMMAND MODEStandard IPv6 ACLCOMMAND USAGENew rules are appended to the end of

Page 1627 - – 1627 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 983 –flow-label – A label for packets belonging to a particular traffic “flow” for which the sender re

Page 1628 - – 1628 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 984 –EXAMPLEThis example accepts any incoming packets if the destination address is 2009:DB9:2229::79/

Page 1629 - – 1629 –

CHAPTER 30 | Access Control ListsIPv6 ACLs– 985 – permit 2009:DB9:2229:5::/64Console#RELATED COMMANDSpermit, deny (Standard IPv6 ACL) (981)permit

Page 1630 - – 1630 –

CHAPTER 30 | Access Control ListsMAC ACLs– 986 –show ipv6 access-groupThis command shows the ports assigned to IPv6 ACLs.COMMAND MODEPrivileged Ex

Page 1631 - NUMERICS

CHAPTER 30 | Access Control ListsMAC ACLs– 987 –COMMAND USAGE◆ When you create a new ACL or enter configuration mode for an existing ACL, use the

Page 1632 - – 1632 –

CHAPTER 30 | Access Control ListsMAC ACLs– 988 –{permit | deny} untagged-eth2{any | host source | source address-bitmask} {any | host destination

Page 1633 - – 1633 –

CHAPTER 30 | Access Control ListsMAC ACLs– 989 –COMMAND MODEMAC ACLCOMMAND USAGE◆ New rules are added to the end of the list.◆ The ethertype optio

Page 1634 - – 1634 –

CHAPTER 2 | Initial Switch ConfigurationManaging System Files– 99 –CONFIGURING ACCESS FOR SNMP VERSION 3 CLIENTSTo configure management access for

Page 1635 - – 1635 –

CHAPTER 30 | Access Control ListsMAC ACLs– 990 –EXAMPLE Console(config)#interface ethernet 1/2Console(config-if)#mac access-group jerry inConsole(

Page 1636 - – 1636 –

CHAPTER 30 | Access Control ListsARP ACLs– 991 –ARP ACLSThe commands in this section configure ACLs based on the IP or MAC address contained in AR

Page 1637 - – 1637 –

CHAPTER 30 | Access Control ListsARP ACLs– 992 –permit, deny(ARP ACL)This command adds a rule to an ARP ACL. The rule filters packets matching a s

Page 1638 - – 1638 –

CHAPTER 30 | Access Control ListsARP ACLs– 993 –EXAMPLE This rule permits packets from any source IP and MAC address to the destination subnet add

Page 1639 - – 1639 –

CHAPTER 30 | Access Control ListsACL Information– 994 –ACL INFORMATIONThis section describes commands used to display ACL information.show access-

Page 1640 - – 1640 –

CHAPTER 30 | Access Control ListsACL Information– 995 –EXAMPLE Console#show access-listIP standard access-list david: permit host 10.1.1.21 perm

Page 1641 - – 1641 –

CHAPTER 30 | Access Control ListsACL Information– 996 –

Page 1642 - – 1642 –

– 997 –31 INTERFACE COMMANDSThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN; or pe

Page 1643

CHAPTER 31 | Interface CommandsInterface Configuration– 998 –Interface Configurationinterface This command configures an interface type and enters

Page 1644 - E042013/ST-R01

CHAPTER 31 | Interface CommandsInterface Configuration– 999 –COMMAND MODE Interface Configuration (Ethernet, Port Channel)COMMAND USAGEThe alias i

Comments to this Manuals

No comments