HP Gbe2c Switch CLI Guide
HP Gbe2c Switch CLI Guide
Legal notices
2004, 2006 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft, Windows, and Windows NT are U.S. registered trademarks of Microsoft Corporation.
SunOS and Solaris are trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Cisco is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Part number: 418118-003a
Third edition: December 2006
Contents
Command line interface
Introduction ............................................................................................................................................. 9
Additional references ............................................................................................................................... 9
Connecting to the switch ........................................................................................................................... 9
Establishing a console connection ......................................................................................................... 9
Setting an IP address ......................................................................................................................... 10
Establishing a Telnet connection.......................................................................................................... 10
Establishing an SSH connection .......................................................................................................... 10
Accessing the switch .............................................................................................................................. 11
Idle timeout ........................................................................................................................................... 12
Typographical conventions...................................................................................................................... 13
Menu basics
Introduction ........................................................................................................................................... 14
Main Menu ........................................................................................................................................... 14
Menu summary ...................................................................................................................................... 14
Global commands.................................................................................................................................. 15
Command line history and editing............................................................................................................ 16
Command line interface shortcuts............................................................................................................. 17
Command stacking ........................................................................................................................... 17
Command abbreviation ..................................................................................................................... 17
Tab completion ................................................................................................................................. 17
First-time configuration
Introduction ........................................................................................................................................... 18
Configuring Simple Network Management Protocol support ................................................................... 18
Setting passwords .................................................................................................................................. 19
Changing the default administrator password ....................................................................................... 19
Changing the default user password.................................................................................................... 20
Changing the default operator password ............................................................................................. 21
Information Menu
Introduction ........................................................................................................................................... 22
Menu overview...................................................................................................................................... 22
System Information Menu ........................................................................................................................ 23
SNMPv3 Information Menu ..................................................................................................................... 23
SNMPv3 USM User Table information ...................................................................................................... 24
SNMPv3 View Table information ............................................................................................................. 25
SNMPv3 Access Table information........................................................................................................... 25
SNMPv3 Group Table information ........................................................................................................... 26
SNMPv3 Community Table information..................................................................................................... 26
SNMPv3 Target Address Table information ............................................................................................... 27
SNMPv3 Target Parameters Table information ........................................................................................... 27
SNMPv3 Notify Table information............................................................................................................ 28
SNMPv3 dump ...................................................................................................................................... 29
System information................................................................................................................................. 30
Show last 100 syslog messages............................................................................................................... 31
System user information .......................................................................................................................... 31
Layer 2 information ................................................................................................................................ 32
FDB information menu ............................................................................................................................ 33
Show all FDB information ................................................................................................................... 34
Link Aggregation Control Protocol information ........................................................................................... 34
LACP dump ........................................................................................................................................... 35
802.1x information ................................................................................................................................ 36
Spanning Tree information ...................................................................................................................... 37
Command line interface 3
Statistics Menu
Introduction ........................................................................................................................................... 61
Menu information .................................................................................................................................. 61
Port Statistics Menu ................................................................................................................................ 62
802.1x statistics ............................................................................................................................... 63
Bridging statistics .............................................................................................................................. 64
Ethernet statistics ............................................................................................................................... 65
Interface statistics .............................................................................................................................. 67
Internet Protocol (IP) statistics .............................................................................................................. 68
Link statistics..................................................................................................................................... 68
Port RMON statistics.......................................................................................................................... 69
Layer 2 statistics..................................................................................................................................... 70
FDB statistics .................................................................................................................................... 70
LACP statistics........................................................................................................................................ 71
Layer 3 statistics..................................................................................................................................... 71
GEA Layer 3 statistics menu ............................................................................................................... 72
GEA Layer 3 statistics ........................................................................................................................ 72
IP statistics........................................................................................................................................ 72
Route statistics .................................................................................................................................. 73
ARP statistics .................................................................................................................................... 73
DNS statistics ................................................................................................................................... 74
Command line interface 4
Configuration Menu
Introduction ........................................................................................................................................... 88
Menu information .................................................................................................................................. 88
Viewing, applying, reverting, and saving changes ..................................................................................... 89
Viewing pending changes....................................................................................................................... 89
Applying pending changes ..................................................................................................................... 89
Reverting changes.................................................................................................................................. 89
Saving the configuration ......................................................................................................................... 89
Reminders ............................................................................................................................................. 90
System configuration .............................................................................................................................. 90
System host log configuration ............................................................................................................. 91
Secure Shell Server configuration ........................................................................................................ 92
RADIUS server configuration............................................................................................................... 93
TACACS+ server configuration ........................................................................................................... 94
NTP server configuration.................................................................................................................... 96
System SNMP configuration ............................................................................................................... 96
SNMPv3 configuration ...................................................................................................................... 97
User Security Model configuration....................................................................................................... 98
SNMPv3 View configuration .............................................................................................................. 99
View-based Access Control Model configuration ................................................................................. 100
SNMPv3 Group configuration .......................................................................................................... 100
SNMPv3 Community Table configuration ........................................................................................... 101
SNMPv3 Target Address Table configuration...................................................................................... 102
SNMPv3 Target Parameters Table configuration.................................................................................. 102
SNMPv3 Notify Table configuration .................................................................................................. 103
System Access configuration............................................................................................................. 104
Management Networks configuration ................................................................................................ 104
User Access Control configuration ..................................................................................................... 105
User ID configuration....................................................................................................................... 105
HTTPS Access configuration.............................................................................................................. 106
Port configuration................................................................................................................................. 106
Temporarily disabling a port ............................................................................................................ 108
Port link configuration ...................................................................................................................... 108
Port ACL/QoS configuration............................................................................................................. 109
Layer 2 configuration ........................................................................................................................... 109
802.1x configuration ........................................................................................................................... 109
802.1x Global configuration................................................................................................................. 110
Command line interface 5
Operations Menu
Maintenance Menu
Introduction ......................................................................................................................................... 166
Menu information ................................................................................................................................ 166
System maintenance options............................................................................................................. 167
Forwarding Database options........................................................................................................... 167
Debugging options.......................................................................................................................... 168
ARP cache options .......................................................................................................................... 168
IP Route Manipulation options........................................................................................................... 169
IGMP Multicast Group options .......................................................................................................... 169
IGMP Snooping options ................................................................................................................... 170
IGMP Mrouter options ..................................................................................................................... 170
Uuencode flash dump ...................................................................................................................... 171
FTP/TFTP system dump put ............................................................................................................... 171
Clearing dump information............................................................................................................... 171
Panic command .............................................................................................................................. 172
Unscheduled system dumps ................................................................................................................... 172
Index
Command line interface 7
Built-in, text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management software such
as HP Systems Insight Manager
A browser-based management interface for interactive network access through the Web browser
The command line interface provides a direct method for collecting switch information and performing switch
configuration. Using a basic terminal, you can view information and statistics about the switch, and perform any
necessary configuration.
This chapter explains how to access the AOS CLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are
available at http://www.hp.com/go/bladesystem/documentation.
HP GbE2c Ethernet Blade Switch for c-Class BladeSystem ISCLI Reference Guide
HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Browser-based Interface Reference Guide
HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Quick Setup Instructions
A null modem cable with a female DB-9 connector (See the HP GbE2c Ethernet Blade Switch for c-Class
BladeSystem User Guide for more information.)
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
below
Value
Baud Rate
9600
Data Bits
Parity None
Stop Bits
Flow Control
None
Connect the terminal to the console port using the null modem cable.
2.
3.
Press the Enter key a few times on the terminal to establish the connection.
4.
You will be required to enter a password for access to the switch. (For more information, see the Setting
passwords section in the First-time configuration chapter.)
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address set for the
switch. The switch can get its IP address in one of the following ways:
Using a Dynamic Host Control Protocol (DHCP) serverWhen the /cfg/sys/dhcp command is
enabled, the management interface (interface 256) requests its IP address from a DHCP server. The default
value for the /cfg/sys/dhcp command is enabled.
Configuring manuallyIf the network does not support DHCP, you must configure the management
interface (interface 256) with an IP address. If you want to access the switch from a remote network, you
also must configure the management gateway (gateway 4).
Using a Bootstrap Protocol (BOOTP) serverBy default, the management interface is set up to request its IP
address from a BOOTP server. If you have a BOOTP server on the network, add the Media Access Control
(MAC) address of the switch to the BOOTP configuration file located on the BOOTP server. The MAC
address can be found in the System Information menu (See the System information section in the
Information Menu chapter.) If you are using a DHCP server that also does BOOTP, you do not have to
configure the MAC address.
Configuring manuallyIf the network does not support BOOTP, you must configure the management port
with an IP address.
The supported SSH encryption and authentication methods are listed below.
Server Host AuthenticationClient RSA authenticates the switch in the beginning of every connection
Key ExchangeRSA
Encryption:
AES256-CBC
AES192-CBC
AES128-CBC
3DES-CBC
3DES
ARCFOUR
User AuthenticationLocal password authentication; Remote Authentication Dial-in User Service (RADIUS)
NOTE: The switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from
version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client
software to use protocol SSH version 1 or version 2.
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the
command line interface to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the ssh command,
followed by the user account name and the switch IP address:
>> # ssh <user>@<GbE2c Ethernet Blade Switch IP address>
You will then be prompted to enter your password.
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the prompt, enter
yes to continue.
UserUser interaction with the switch is completely passive; nothing can be changed on the switch. Users may
display information that has no security or privacy implications, such as switch statistics and current operational
state information.
OperatorOperators can only effect temporary changes on the switch. These changes will be lost when the
switch is rebooted/reset. Operators have access to the switch management features used for daily switch
operations. Because any changes an operator makes are undone by a reset of the switch, operators cannot
severely impact switch operation, but do have access to the Maintenance menu.
AdministratorOnly administrators can make permanent changes to the switch configuration, changes that are
persistent across a reboot/reset of the switch. Administrators can access switch functions to configure and
troubleshoot problems on the switch. Because administrators can also make temporary (operator-level) changes
as well, they must be aware of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are connected
to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The password entered
determines the access level. The default user names/password for each access level is listed in the following table.
NOTE: It is recommended that you change default switch passwords after initial configuration and as regularly
as required under your network security policies. For more information, see the Setting passwords section in
the First-time configuration chapter.
Command line interface 11
User
The user has no direct responsibility for switch management. He or she can view all
switch status information and statistics, but cannot make any configuration changes to the
switch. The user account is enabled by default, and the default password is user.
Oper
The operator manages all functions of the switch. The operator can reset ports or the
entire switch. By default, the operator account is disabled and has no password.
Admin
The super user administrator has complete access to all menus, information, and
configuration commands on the switch, including the ability to change both the user and
administrator passwords. The admin account is enabled by default, and the default
password is admin.
NOTE: With the exception of the admin user, setting the password to an empty value can disable access to
each user level.
Once you enter the administrator password and it is verified, you are given complete access to the switch.
After logging in, the Main Menu of the CLI is displayed. See the Menu basics chapter for a summary of the Main
Menu options.
[Main Menu]
info
stats
cfg
oper
boot
maint
diff
apply
save
revert
exit
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
>> Main#
Idle timeout
By default, the switch will disconnect the console, Telnet, or SSH session after five minutes of inactivity. This function is
controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. For information on changing this
parameter, see the System configuration section in the Configuration Menu chapter.
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 3 Typographic conventions
Typeface or symbol
Meaning
Example
AaBbCc123
Main#
AaBbCc123
Main# sys
<AaBbCc123>
host# ls [-a]
[ ]
Menu basics
Introduction
The AOS CLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for
performing all levels of switch configuration.
To make the CLI easy to use, the various commands have been logically grouped into a series of menus and
submenus. Each menu displays a list of commands and/or submenus that are available, along with a summary of
what each command will do. Below each menu is a prompt where you can enter any command appropriate to the
current menu.
This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that commonly are
available from all the menus within the CLI.
Main Menu
The Main Menu displays after a successful connection and login. The following table shows the Main Menu for the
administrator login. Some features are not available under the user login.
[Main Menu]
info
stats
cfg
oper
boot
maint
diff
apply
save
revert
exit
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
Menu summary
The Main Menu displays the following submenus:
Information Menu
The Information Menu provides submenus for displaying information about the current status of the switch: from
basic system settings to VLANs, and more.
Statistics Menu
This menu provides submenus for displaying switch performance statistics. Included are port, IP, ICMP, TCP,
UDP, SNMP, routing, ARP, and DNS.
Configuration Menu
This menu is available only from an administrator login. It includes submenus for configuring every aspect of the
switch. Changes to configuration are not active until explicitly applied. Changes can be saved to non-volatile
memory (NVRAM).
Maintenance Menu
This menu is used for debugging purposes, enabling you to generate a technical support dump of the critical
state information in the switch, and to clear entries in the Forwarding Database and the Address Resolution
Protocol (ARP) and routing tables. This menu is available only from an administrator and operator login.
Menu basics 14
Global commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful for obtaining
online Help, navigating through menus, and for applying and saving configuration changes.
For help on a specific command, type help. The following screen displays:
Global Commands: [can be issued from any menu]
help
up
print
lines
verbose
exit
diff
apply
save
ping
traceroute
telnet
pushd
popd
who
pwd
quit
revert
history
Action
? command or help
Provides usage information about a specific command on the current menu. When used
without the command parameter, a summary of the global commands is displayed.
. or print
.. or up
If placed at the beginning of a command, displays the Main Menu. Otherwise, this is used
to separate multiple commands placed on the same line.
lines
Sets the number of lines (n) that display on the screen at one time. The default is 24 lines.
When used without a value, the current setting is displayed.
diff
Shows any pending configuration changes that have not been applied.
diff flash displays all pending configuration changes that have been applied but not
saved to flash memory (NVRAM), as well as those that have not been applied.
apply
save
Saves the active configuration to backup, and saves the current configuration as active.
save n saves the current configuration as active, without saving the active configuration
to backup.
revert
exit or quit
ping
Identifies the route used for station-to-station connectivity across the network. The format is:
Menu basics 15
Action
verbose n
telnet
This command is used to Telnet out of the switch. The format is:
pushd
popd
who
Description
history
!!
!n
<Ctrl-p> or
Up arrow key
Recalls the previous command from the history list. This can be used multiple times to work
backward through the last ten commands. The recalled command can be entered as is, or
edited using the options below.
<Ctrl-n> or
Down arrow key
Recalls the next command from the history list. This can be used multiple times to work forward
through the last ten commands. The recalled command can be entered as is, or edited using the
options below.
<Ctrl-a>
<Ctrl-e>
<Ctrl-b> or
Left arrow key
<Ctrl-f> or
Right arrow key
<Backspace> or Delete
key
<Ctrl-d>
<Ctrl-k>
Erases all characters from the cursor position to the end of the command line.
<Ctrl-l>
<Ctrl-u>
Other keys
..
Menu basics 16
Command stacking
As a shortcut, you can type multiple commands on a single line, separated by forward slashes (/). You can connect
as many commands as required to access the menu option that you want.
For example, the keyboard shortcut to access the Simple Network Management Protocol (SNMP) Configuration Menu
from the Main# prompt is:
Main# cfg/sys/ssnmp/name
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others in
the same menu or submenu.
For example, the command shown above could also be entered as:
Main# c/sys/ssn/n
Tab completion
By entering the first letter of a command at any menu prompt and pressing the Tab key, the CLI will display all
commands or options in that menu that begin with that letter. Entering additional letters will further refine the list of
commands or options displayed.
If only one command fits the input text when the Tab key is pressed, that command will be supplied on the command
line, waiting to be entered. If the Tab key is pressed without any input on the command line, the currently active menu
displays.
Menu basics 17
First-time configuration
Introduction
This chapter describes how to perform first-time configuration and how to change system passwords.
To begin first-time configuration of the switch, perform the following steps.
1.
Connect to the switch console. After connecting, the login prompt displays.
GbE2c Ethernet Blade Switch for HP c-Class Blade System.
Copyright(C)2006 Hewlett-Packard Development Company, L.P.
Password:
2.
Information Menu
Statistics Menu
Configuration Menu
Operations Command Menu
Boot Options Menu
Maintenance Menu
Show pending config changes [global command]
Apply pending config changes [global command]
Save updated config to FLASH [global command]
Revert pending or applied changes [global command]
Exit [global command, always available]
>> Main#
3.
From the Main Menu, enter the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr
- Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg
- Backup current configuration to FTP/TFTP server
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
2.
Set SNMP read or write community string. By default, they are public and private respectively:
>> # /cfg/sys/ssnmp/rcomm|wcomm
3.
4.
Apply and save configuration if you are not configuring the switch with Telnet support. Otherwise apply and
save after the performing the Optional Setup for Telnet Support steps.
First-time configuration 18
Setting passwords
HP recommends that you change all passwords after initial configuration and as regularly as required under the
network security policies. See the Accessing the switch section in the Command line interface chapter for a
description of the user access levels.
To change the user, operator, or administrator password, you must log in using the administrator password.
Passwords cannot be modified from the user or operator command mode.
NOTE: If you forget your administrator password, call HP technical support for help using the password fix-up
mode.
2.
From the Main Menu, use the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr
- Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg
- Backup current configuration to FTP/TFTP server
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
First-time configuration 19
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
The System Menu is displayed.
[System Menu]
syslog
- Syslog Menu
sshd
- SSH Server Menu
radius
- RADIUS Authentication Menu
tacacs+ - TACACS+ Authentication Menu
ntp
- NTP Server Menu
ssnmp
- System SNMP Menu
access
- System Access Menu
date
- Set system date
time
- Set system time
timezone - Set system timezone (daylight savings)
idle
- Set timeout for idle CLI sessions
notice
- Set login notice
bannr
- Set login banner
hprompt - Enable/disable display hostname (sysName) in CLI prompt
bootp
- Enable/disable use of BOOTP
dhcp
- Enable/disable use of DHCP on Mgmt interface
reminders - Enable/disable Reminders
cur
- Display current system-wide parameters
4.
5.
NOTE: If you forget your administrator password, call your technical support representative for help using the
password fix-up mode.
6.
7.
8.
2.
From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4.
System# access/user/usrpw
5.
6.
7.
8.
2.
From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4.
5.
6.
7.
8.
First-time configuration 21
Information Menu
Introduction
You can view configuration information for the switch in the user, operator, and administrator command modes. This
chapter discusses how to use the CLI to display switch information.
Menu overview
Command: /info
[Information Menu]
sys
- System Information Menu
l2
- Layer 2 Information Menu
l3
- Layer 3 Information Menu
qos
- QoS Menu
acl
- Show ACL information
rmon
- Show RMON information
link
- Show link status
port
- Show port information
geaport - Show system port and gea port mapping
ufd
- Show Uplink Failure Detection information
dump
- Dump all information
The following table describes the Information Menu options.
Table 6 Information Menu options
Command
Usage
sys
l2
l3
qos
acl
rmon
link
port
geaport
ufd
dump
Dumps all switch information available from the Information Menu (10K or more, depending on
your configuration).
If you want to capture dump data to a file, set your communication software on your workstation to
capture session data prior to issuing the dump commands.
Information Menu
22
Usage
snmpv3
general
log
user
dump
Dumps all switch information available from the Information Menu (10K or more, depending on your
configuration).
access control
Information Menu
23
Usage
usm
view
Displays information about view name, subtrees, mask and type of view.
access
group
Displays information about the group that includes the security model, user name, and
group name.
comm
taddr
tparam
notify
dump
Protocol
-------------------------------HMAC_MD5, DES PRIVACY
HMAC_SHA, DES PRIVACY
NO AUTH, NO PRIVACY
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of
messages. This security model makes use of a defined set of user identities displayed in the USM user table. The USM
user table contains information like:
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
Description
User Name
This is a string that represents the name of the user that you can use to access the switch.
Protocol
This indicates whether messages sent on behalf of this user are protected from disclosure using a
privacy protocol. GbE2c software supports DES algorithm for privacy. The software also supports
two authentication algorithms: MD5 and HMAC-SHA.
Information Menu
24
Subtree
------------------ ----------------------------
Mask
Type
-------------
--------
iso
included
v1v2only
included
v1v2only
1.3.6.1.6.3.15
excluded
v1v2only
1.3.6.1.6.3.16
excluded
v1v2only
1.3.6.1.6.3.18
excluded
The user can control and restrict the access allowed to a group to only a subset of the management information in the
management domain that the group can access within each context by specifying the groups rights in terms of a
particular MIB view for security reasons.
The following table describes the SNMPv3 View Table information.
Table 10 View Table parameters
Field
Description
View Name
Subtree
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances
which have a common Object Identifier prefix to their names.
Mask
Type
Displays whether a family of view subtrees is included or excluded from the MIB view.
Model
------snmpv1
usm
Level
-----------noAuthNoPriv
authPriv
Match
-----exact
exact
ReadV
WriteV
--------- -------iso
iso
iso
iso
NotifyV
------v1v2only
iso
Information Menu
25
Description
Group Name
Prefix
Model
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example,
noAuthNoPriv, authNoPriv, or auth-Priv.
Match
Displays the match for the contextName. The options are: exact and prefix.
ReadV
Displays the MIB view to which this entry authorizes the read access.
WriteV
Displays the MIB view to which this entry authorizes the write access.
NotifyV
Displays the Notify view to which this entry authorizes the notify access.
User Name
----------------------------v1v2only
adminmd5
adminsha
Group Name
------------------------------v1v2grp
admingrp
admingrp
A group is a combination of security model and security name that defines the access rights assigned to all the
security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 12 Group Table parameters
Field
Description
Sec Model
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
User Name
Group Name
Information Menu
26
Description
Index
Name
User Name
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a command
responder application accepts management requests and to which a command responder
application sends an SNMP trap.
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry.
Transport Addr
Port
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified entry
contains SNMP parameters to be used when generating messages to be sent to this transport
address.
Information Menu
27
The following table describes the SNMPv3 Target Parameters Table information.
Table 15 Target Parameters Table
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this
entry.
User Name
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Sec Model
Displays the security model used when generating SNMP messages using this entry. The system
may choose to return an inconsistentValue error if an attempt is made to set this variable to a
value for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
Description
Name
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
Tag
This represents a single tag value which is used to select entries in the
snmpTargetAddrTable. Any entry in the snmpTargetAddrTable that contains a tag
value equal to the value of this entry is selected. If this entry contains a value of zero length, no
entries are selected.
Information Menu
28
SNMPv3 dump
Command: /info/sys/snmpv3/dump
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00
usmUser Table:
User Name
Protocol
-------------------------------- -------------------------------admin
NO AUTH, NO PRIVACY
adminmd5
HMAC_MD5, DES PRIVACY
adminsha
HMAC_SHA, DES PRIVACY
v1v2only
NO AUTH, NO PRIVACY
vacmAccess Table:
Group Name Prefix Model
---------- ------ ------admin
usm
v1v2grp
snmpv1
admingrp
usm
Level
-----------noAuthNoPriv
noAuthNoPriv
authPriv
Match
-----exact
exact
exact
ReadV
------org
org
org
vacmViewTreeFamily Table:
View Name
Subtree
Mask
-------------------- --------------- -----------org
1.3
v1v2only
1.3
v1v2only
1.3.6.1.6.3.15
v1v2only
1.3.6.1.6.3.16
v1v2only
1.3.6.1.6.3.18
vacmSecurityToGroup Table:
Sec Model
User Name
---------- ------------------------------snmpv1
v1v2only
usm
admin
usm
adminsha
WriteV
-------org
org
org
NotifyV
-----org
v1v2only
org
Type
-------------included
included
excluded
excluded
excluded
Group Name
----------------------v1v2grp
admin
admingrp
snmpCommunity Table:
Index
Name
User Name
Tag
---------- ---------- -------------------- ---------snmpNotify Table:
Name
Tag
-------------------- -------------------snmpTargetAddr Table:
Name
Transport Addr Port Taglist
Params
---------- --------------- ---- ---------- --------------snmpTargetParams Table:
Name
MP Model User Name
Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
Information Menu
29
System information
Command: /info/sys/gen
System Information at 6:56:22 Thu Jan 11, 2006
Time zone: America/US/Pacific
GbE2c Ethernet Blade Switch for HP c-Class Blade System
sysName:
sysLocation:
RackId: Default RUID
RackName: Default Rack Name
EnclosureSerialNumber: -noneEnclosureName: Default Chassis Name
BayNumber: 1
Switch is up 0 days, 14 hours, 56 minutes and 22 seconds.
Last boot: 17:25:38 Mon Jan 8, 2006 (software reset)
MAC address: 00:10:00:01:00:01
IP (If 1) address: 10.14.4.16
Revision:
Switch Serial No:
Hardware Part No:
Spare Part No:
Software Version 2.0.0 (FLASH image2), active configuration.
System information includes:
Information Menu
30
Time
---17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:41
17:25:42
17:25:42
17:25:42
17:25:42
17:25:42
17:25:42
Severity level
----------------NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
NOTICE
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
system:
Message
------link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
link up on
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
port
1
8
7
12
11
14
13
16
15
17
20
22
23
21
4
3
6
5
10
9
Each message contains a date and time field and has a severity level associated with it. One of eight different
prefixes is used to indicate the condition:
Information Menu
31
Usage
user
oper
admin
Displays the status of configured user IDs. To configure new user IDs, use the
/cfg/sys/access/user/uid command.
Layer 2 information
Command: /info/l2
[Layer 2 Menu]
fdb
lacp
8021x
stp
cist
trunk
vlan
gen
dump
-
Usage
fdb
lacp
8021x
stp
cist
Information Menu
32
Usage
trunk
When trunk groups are configured, you can view the state of each port in
the various trunk groups.
vlan
gen
dump
Dumps all switch information available from the Layer 2 menu (10K or more,
depending on your configuration).
If you want to capture dump data to a file, set your communication software
on your workstation to capture session data prior to issuing the dump
commands.
Displays a single database entry by its MAC address. You are prompted
to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx. (For
example: 08:00:20:12:34:56)
You can also enter the MAC address using the format: xxxxxxxxxxxx.
(For example: 080020123456)
vlan <1-4095>
state unknown|ignore|
forward|flood|trunk|ifmac
dump
Information Menu
33
/info/l2/fdb/dump
MAC address
----------------00:02:01:00:00:00
00:02:01:00:00:01
00:02:01:00:00:02
00:02:01:00:00:03
00:02:01:00:00:04
00:02:01:00:00:05
00:02:01:00:00:06
00:02:01:00:00:07
00:02:01:00:00:08
00:02:01:00:00:09
00:02:01:00:00:0a
00:02:01:00:00:0b
00:02:01:00:00:0c
VLAN
---300
300
300
300
300
300
300
300
300
300
300
300
300
Port
----
Trnk
---1
23
23
23
23
23
23
23
23
23
23
23
23
State
----TRK
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking (TRK)
state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the MAC
address has not yet been learned by the switch, but has only been seen as a destination address. When an address
is in the unknown state, no outbound port is indicated.
The following table describes the Link Aggregation Control Protocol Menu options.
Table 20 LACP information
Command
Usage
aggr
port
dump
Information Menu
34
LACP dump
Command: /info/l2/lacp/dump
>> LACP# dump
port lacp
adminkey
operkey
selected
prio
attached trunk
aggr
---------------------------------------------------------------------1 off
1
1
n
32768
--2 off
2
2
n
32768
--3 off
3
3
n
32768
--4 off
4
4
n
32768
--5 off
5
5
n
32768
--6 off
6
6
n
32768
--7 off
7
7
n
32768
--8 off
8
8
n
32768
--
LACP dump includes the following information for each port in the GbE2c:
selectedIndicates whether the port has been selected to be part of a Link Aggregation Group.
Information Menu
35
802.1x information
Command: /info/l2/8021x
System capability : Authenticator
System status
: disabled
Protocol version : 1
Authenticator
Backend
Port
Auth Mode
Auth Status
PAE State
Auth State
---- ------------ ------------ -------------- ---------1
force-auth
unauthorized initialize
initialize
2
force-auth
unauthorized initialize
initialize
3
force-auth
unauthorized initialize
initialize
4
force-auth
unauthorized initialize
initialize
5
force-auth
unauthorized initialize
initialize
6
force-auth
unauthorized initialize
initialize
7
force-auth
unauthorized initialize
initialize
8
force-auth
unauthorized initialize
initialize
9
force-auth
unauthorized initialize
initialize
10
force-auth
unauthorized initialize
initialize
11
force-auth
unauthorized initialize
initialize
12
force-auth
unauthorized initialize
initialize
13
force-auth
unauthorized initialize
initialize
14
force-auth
unauthorized initialize
initialize
15
force-auth
unauthorized initialize
initialize
16
force-auth
unauthorized initialize
initialize
*17
force-auth
unauthorized initialize
initialize
*18
force-auth
unauthorized initialize
initialize
19
force-auth
unauthorized initialize
initialize
20
force-auth
unauthorized initialize
initialize
*21
force-auth
unauthorized initialize
initialize
22
force-auth
unauthorized initialize
initialize
*23
force-auth
unauthorized initialize
initialize
*24
force-auth
unauthorized initialize
initialize
-----------------------------------------------------------------* - Port down or disabled
Information Menu
36
Description
Port
Auth Mode
Auth Status
Priority
32768
Priority
-------0
0
0
Cost
---0
0
0
Path-Cost
8
Hello
2
Port
20
MaxAge
20
FastFwd
-------n
n
n
FwdDel
15
State
Designated Bridge
Des Port
------------------------------ ------FORWARDING *
FORWARDING *
FORWARDING *
Information Menu
37
The switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). If RSTP/MSTP is turned on, see the Rapid
Spanning Tree information section for Spanning Tree Group information. In addition to seeing if STP is enabled or
disabled, you can view the following STP bridge information:
Path-Cost
Port
Hello interval
Forwarding delay
Aging time
Cost
State
Designated bridge
Designated port
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current
root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port
has to wait before it changes from learning state to forwarding state. If the bridge is not
the root bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the Forwarding
Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single segment,
the port with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment.
Generally speaking, the faster the port, the lower the path cost.
State
The State field shows the current state of the port. The State field can be one of the
following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Information Menu
38
Description
Designated port
The port ID of the port on the Designated Bridge to which this port is connected. This
information includes the port priority (hex) and the port number (hex).
Prio
---0
0
0
0
0
0
0
0
0
0
0
0
Priority
32768
Cost
---0
0
0
0
0
0
0
0
0
0
0
0
Path-Cost
0
Hello
9
MaxAge
20
Aging
300
State Role
Designated Bridge
Des Port
------ ---- --------------------- -------DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DSB
DISC
FWD
DESG 8000-00:00:01:00:19:00
8017
FWD
DESG 8000-00:00:01:00:19:00
8018
Type
----
P2P2,Edge
P2P
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE 802.1s
Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RSTP bridge
information for the Spanning Tree Group:
Path-Cost
Port
Hello interval
Forwarding delay
Aging time
Cost
State
Role
Link type
Information Menu
39
The following table describes the STP parameters in RSTP or MSTP mode.
Table 23 Rapid Spanning Tree parameter descriptions
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost between
bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current root.
Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP root
bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the
root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without
receiving a configuration bridge protocol data unit before it reconfigures the STP network. If
the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has
to wait before it changes from learning state to forwarding state. If the bridge is not the root
bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits without
receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated port. In
a network topology that has multiple bridge ports connected to a single segment, the port with
the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment.
Generally speaking, the faster the port, the lower the path cost. A setting of zero (0) indicates
that the cost will be set to the appropriate default after the link speed has been autonegotiated.
State
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of the
following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master
(MAST), or Unknown (UNK).
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information includes
the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected.
Type
Type of link connected to the port, and whether the port is an edge port. Link type values are
AUTO, P2P, or SHARED.
MSTP: The Type field appears in /info/cist.
Information Menu
40
Path-Cost
11
Port
1
MaxAge
20
FwdDel
15
Priority
32768
MaxAge
20
FwdDel
15
Hops
20
In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the following
CIST bridge information:
CIST root
Priority
Forwarding delay
Hops
Cost
State
Role
Hello interval
Description
CIST Root
Shows information about the root bridge for the Common Internal Spanning Tree
(CIST). Values on this row of information refer to the CIST root.
Shows information about the root bridge for this MSTP region. Values on this row of
information refer to the regional root.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the
STP root bridge.
Information Menu
41
Description
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge
waits without receiving a configuration bridge protocol data unit before it
reconfigures the STP network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge
port has to wait before it changes from learning state to forwarding state.
Hops
Shows the maximum number of bridge hops allowed before a packet is dropped.
Priority (port)
The port priority parameter helps determine which bridge port becomes the
designated port. In a network topology that has multiple bridge ports connected to a
single segment, the port with the lowest port priority becomes the designated port for
the segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A setting of
zero (0) indicates that the cost will be set to the appropriate default after the link
speed has been auto-negotiated.
State
Shows the current state of the port. The state field can be one of the following:
Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of
the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP),
Master (MAST), or Unknown (UNK).
Designated Bridge
Designated Port
The port ID of the port on the Designated Bridge to which this port is connected.
Information includes the port priority (hex) and the port number (hex).
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge
uses the root bridge hello value.
Type
Type of link connected to the port, and whether the port is an edge port. Link type
values are AUTO, P2P, or SHARED.
Information Menu
42
VLAN information
Command: /info/l2/vlan
VLAN
---1
2
7
11
14
15
16
17
18
19
20
21
22
24
300
4000
4095
Name
Status
-------------------------------- -----Default VLAN
ena
pc03p
ena
pc07f
ena
pc04u
ena
8600-14
ena
8600-15
ena
8600-16
ena
8600-17
ena
35k-1
ena
35k-2
ena
35k-3
ena
35k-4
ena
pc07z
ena
redlan
ena
ixiaTraffic
ena
bpsports
ena
Mgmt VLAN
dis
Ports
---------------4 5
2
7
11
14
15
16
17
18
19
20
21
22
24
1 12 13 23
3-6 8-10
empty
This information display includes all configured VLANs and all member ports that have an active link state.
VLAN information includes:
VLAN Number
VLAN Name
Status
Description
Layer 3 information
Command: /info/l3
[Layer 3 Menu]
route
arp
ospf
rip
ip
igmp
vrrp
dump
-
Information Menu
43
Usage
route
Displays the IP Routing Menu. Using the options of this menu, the system displays the following for
each configured or learned route:
Route destination IP address, subnet mask, and gateway address
Type of route
Tag indicating origin of route
Metric for RIP tagged routes, specifying the number of hops to the destination (1-15 hops, or
16 for infinite hops)
The IP interface that the route uses
arp
*ospf
*rip
ip
igmp
*vrrp
dump
Dumps all switch information available from the Layer 3 Menu (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication software on your workstation
to capture session data prior to issuing the dump commands.
* indicates menus that are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Route information
Command: /info/l3/route
[IP Routing Menu]
find
- Show
gw
- Show
type
- Show
tag
- Show
if
- Show
dump
- Show
Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch.
Table 27 Route Information menu options
Command
Usage
gw <IP address>
type indirect|direct|local|
broadcast|martian|multicast
tag fixed|static|addr|rip|ospf|
broadcast|martian|multicast
if <IP address>
dump
Information Menu
44
best
Mask
--------------255.0.0.0
255.255.255.255
255.255.255.255
255.0.0.0
255.255.255.255
255.255.255.255
255.0.0.0
255.0.0.0
255.255.255.0
255.255.255.255
224.0.0.0
255.255.255.255
Gateway
--------------11.0.0.1
11.0.0.1
11.255.255.255
12.0.0.1
12.0.0.1
12.255.255.255
11.0.0.2
47.133.88.1
47.133.88.46
172.30.52.223
0.0.0.0
0.0.0.0
Type
--------direct
local
broadcast
direct
local
broadcast
indirect
indirect
direct
broadcast
martian
multicast
Tag
--------fixed
addr
broadcast
fixed
addr
broadcast
ospf
static
fixed
broadcast
martian
addr
Metr If
---- -211
211
211
12
12
12
2
211
24
24
2
Description
indirect
direct
local
broadcast
martian
multicast
Description
fixed
static
addr
rip
ospf
broadcast
martian
Information Menu
45
ARP information
Command: /info/arp
[Address Resolution Protocol Menu]
find
- Show a single ARP entry by IP address
port
- Show ARP entries on a single port
vlan
- Show ARP entries on a single VLAN
dump
- Show all ARP entries
addr
- Show ARP address list
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address status
flags, VLAN, and port for the address, and port referencing information.
The following table describes the Address Resolution Protocol Menu options.
Table 30 ARP information
Command
Usage
vlan <1-4095>
dump
addr
Displays the ARP address list: IP address, IP mask, MAC address, and VLAN flags.
MAC address
----------------00:50:8b:b2:32:cb
00:0e:7f:25:89:b5
00:0f:6a:ed:46:00
VLAN
---1
1
1
Port
---18
17
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
Table 31 ARP dump flag parameters
Flag
Description
Unresolved ARP entry. The MAC address has not been learned.
IP mask
--------------255.255.255.255
255.255.255.255
255.255.255.255
MAC address
VLAN Flags
----------------- ---- ----00:70:cf:03:20:04
P
00:70:cf:03:20:06
1
00:70:cf:03:20:05
1
Information Menu
46
OSPF information
Command: /info/l3/ospf
[OSPF Information Menu]
general - Show general information
aindex
- Show area(s) information
if
- Show interface(s) information
virtual - Show details of virtual links
nbr
- Show neighbor(s) information
dbase
- Database Menu
sumaddr - Show summary address list
nsumadd - Show NSSA summary address list
routes
- Show OSPF routes
dump
- Show OSPF information
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the OSPF Menu options.
Table 32 OSPF information
Command
Usage
general
aindex <0-2>
if <1-256>
virtual
dbase
sumaddr <0-2>
nsumadd <0-2>
routes
dump
Information Menu
47
48
Command
Usage
dbsumm
nssa <adv-rtr (A.B.C.D)>| <link_state_id Displays the NSSA (type 7) LSAs with detailed information of
(A.B.C.D)>|<self>
each field of the LSAs. The usage of this command is the same
as the usage of the command asbrsum.
self
summ <adv-rtr (A.B.C.D)>| <link_state_id Displays the network summary (type 3) LSAs with detailed
(A.B.C.D)>|<self>
information of each field of the LSAs.
The usage of this command is the same as the usage of the
command asbrsum.
all
Information Menu
49
Usage
routes
dump <0-255>
Information Menu
50
IP information
Command: /info/l3/ip
Interface information:
1: 47.80.23.243
255.255.254.0
47.80.23.255,
up
Interface number
IP address
IP mask
IP broadcast address
Operational status
IP forwarding settings
Group Menu]
Show IGMP Snooping Multicast Router Port information
Show a single group by IP group address
Show groups on a single vlan
Show groups on a single port
Show groups on a single trunk
Show all groups
The following table describes the commands used to display information about IGMP groups learned by the switch.
Table 35 IGMP Multicast Group menu options
Information Menu
51
Command
Usage
mrouter
vlan <1-4095>
trunk <1-12>
dump
Usage
vlan <1-4095>
dump
VRRP information
Virtual Router Redundancy Protocol (VRRP) support on GbE2c provides redundancy between routers in a LAN. This is
accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable
routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and
assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume
routing authority and take control of the virtual router IP address.
NOTE: VRRP commands are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Command: /info/l3/vrrp
VRRP information:
Interface number
Ownership status
owner identifies the preferred master virtual router. A virtual router is the owner when the IP address of the
virtual router and its IP interface are the same.
renter identifies virtual routers which are not owned by this device
Priority value. During the election process, the virtual router with the highest priority becomes master.
Activity status
Information Menu
52
init identifies that the virtual router is waiting for a startup event. Once it receives a startup event, it
transitions to master if its priority is 255, (the IP address owner), or transitions to backup if it is not the IP
address owner.
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same IP address
as a proxy IP address. The use of virtual proxy routers enables redundant switches to share the same IP address,
minimizing the number of unique IP addresses that must be configured.
QoS information
Command: /info/qos
[QoS Menu]
8021p
The following table describes the commands used to display Quality of Service (QoS) information.
Table 37 QoS menu options
Command
Usage
8021p
802.1p information
Command: /info/qos/8021p
Current priority to COS queue information:
Priority COSq Weight
-------- ---- -----0
0
1
1
0
1
2
0
1
3
0
1
4
1
2
5
1
2
6
1
2
7
1
2
Current port priority information:
Port
Priority COSq Weight
----- -------- ---- -----1
0
0
1
2
0
0
1
3
0
0
1
4
0
0
1
23
0
0
1
24
0
0
1
The following table describes the IEEE 802.1p priority to COS queue information.
Table 38 802.1p Priority to COS Queue information
Field
Description
Priority
Cosq
Weight
The following table describes the IEEE 802.1p port priority information.
Table 39 802.1p Port Priority information
Field
Description
Information Menu
53
Description
Port
Priority
Cosq
Weight
ACL information
Command: /info/acl
Current ACL information:
-----------------------Filter 1 profile:
Ethernet
- VID
: 1/0xfff
Actions
: Set COS to 0
Filter 2 profile:
Ethernet
- VID
: 1/0xfff
Actions
: Permit
No ACL groups configured.
Access Control List (ACL) information provides configuration parameters for each Access Control List. It also shows
which ACLs are included in each ACL Group.
Usage
hist
alarm
event
dump
Information Menu
54
/info/rmon/hist
IFOID
-----------------------------1.3.6.1.2.1.2.2.1.1.24
1.3.6.1.2.1.2.2.1.1.24
1.3.6.1.2.1.2.2.1.1.18
1.3.6.1.2.1.2.2.1.1.19
1.3.6.1.2.1.2.2.1.1.24
Interval
-------30
30
30
30
1800
Rbnum
----5
5
5
5
5
Gbnum
----5
5
5
5
5
Usage
Index
IFOID
Interval
Displays the time interval for each for each sampling bucket.
Rbnum
Displays the number of requested buckets, which is the number of data slots into which data is to be
saved.
Gbnum
Displays the number of granted buckets that may hold sampled data.
Information Menu
55
/info/rmon/alarm
Interval
-------30
900
300
1800
1800
1800
1800
1800
1800
1800
1800
Type
---abs
abs
abs
abs
abs
abs
abs
abs
abs
abs
abs
rLimit
-------10
0
10
10
10
10
10
10
10
10
10
fLimit
-------0
10
20
0
0
0
0
0
0
0
0
Index
----1
2
3
4
5
8
10
11
15
18
100
OID
-----------------------------1.3.6.1.2.1.2.2.1.10.257
1.3.6.1.2.1.2.2.1.11.258
1.3.6.1.2.1.2.2.1.12.259
1.3.6.1.2.1.2.2.1.13.260
1.3.6.1.2.1.2.2.1.14.261
1.3.6.1.2.1.2.2.1.10.280
1.3.6.1.2.1.2.2.1.15.262
1.3.6.1.2.1.2.2.1.16.263
1.3.6.1.2.1.2.2.1.19.266
1.3.6.1.2.1.2.2.1.10.279
1.3.6.1.2.1.2.2.1.17.264
rEvtIdx
------1
0
0
1
1
1
1
1
1
1
1
fEvtIdx
------0
2
0
0
0
0
0
0
0
0
0
last value
---------0
0
0
0
0
56344540
0
0
0
0
0
Index
Interval
Displays the time interval over which data is sampled and compared with the rising and falling
thresholds.
Type
Displays the method of sampling the selected variable and calculating the value to be compared
against the thresholds, as follows:
abs: absolute value, the value of the selected variable is compared directly with the thresholds at
the end of the sampling interval.
delta: delta value, the value of the selected variable at the last sample is subtracted from the current
value, and the difference compared with the thresholds.
rLimit
fLimit
rEvtIdx
Displays the rising alarm event index that is triggered when a rising threshold is crossed.
fEvtIdx
Displays the falling alarm event index that is triggered when a falling threshold is crossed.
Last value
OID
/info/rmon/event
Information Menu
56
Type
---both
none
log
trap
both
both
both
both
both
Last Sent
---------------0D: 0H: 1M:20S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
0D: 0H: 0M: 0S
Description
--------------------------------Event_1
Event_2
Event_3
Event_4
Log and trap event for Link Down
Log and trap event for Link Up
Send log and trap for icmpInMsg
Send log and trap for icmpInEchos
Event_100
Usage
Index
Type
Displays the type of notification provided for this event, as follows: none, log, trap, both.
Last Sent
Displays the time that passed since the last switch reboot, when the most recent event was triggered.
This value is cleared when the switch reboots.
Description
Information Menu
57
Use this command to display link status information about each port on a switch, including:
Port number
Port information
Command: /info/port
Port Tag RMON PVID
NAME
---- --- ---- ---- -------------1
n
d
1 Downlink1
2
n
d
1 Downlink2
3
n
d
1 Downlink3
4
n
d
1 Downlink4
5
n
d
1 Downlink5
6
n
d
1 Downlink6
7
n
d
1 Downlink7
8
n
d
1 Downlink8
9
n
d
1 Downlink9
10
n
d
1 Downlink10
11
n
d
1 Downlink11
12
n
d
1 Downlink12
13
n
d
1 Downlink13
14
n
d
1 Downlink14
15
n
d
1 Downlink15
16
n
d
1 Downlink16
17
n
d
1 Xconnect1
18
n
d
1 Xconnect2
19
n
d
4095 Mgmt
20
n
d
1 Uplink1
21
n
d
1 Uplink2
22
n
d
1 Uplink3
23
n
d
1 Uplink4
24
n
d
1 Uplink5
VLAN(s)
------------------------------1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4095
1
1
1
1
1
Port number
Port name
VLAN membership
Information Menu
58
GEA Port(0-based)
----------------1
2
4
7
8
12
13
14
0
3
5
6
9
10
11
15
16
17
18
19
23
22
21
20
GEA Unit
--------0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
This display correlates the logical port number to the GEA unit on which each port resides.
Link Status
----------down
Information Menu
59
Information dump
Command: /info/dump
Use the dump command to dump all switch information available from the Information Menu (10K or more,
depending on your configuration). This data is useful for tuning and debugging switch performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture session
data prior to issuing the dump commands.
Information Menu
60
Statistics Menu
Introduction
You can view switch performance statistics in the user, operator, and administrator command modes. This chapter
discusses how to use the CLI to display switch statistics.
Menu information
Command: /stats
[Statistics Menu]
port
- Port Stats Menu
l2
- Layer 2 Stats Menu
l3
- Layer 3 Stats Menu
mp
- MP-specific Stats Menu
acl
- ACL Stats Menu
snmp
- Show SNMP stats
ntp
- Show NTP stats
ufd
- Show Uplink Failure Detection stats
clrmp
- Clear all MP related stats
dump
- Dump all stats
The following table describes the Statistics Menu options.
Table 44 Statistics Menu options
Command
Usage
Displays the Port Statistics Menu for the specified port. Use this command to display traffic
statistics on a port-by-port basis. Traffic statistics are included in SNMP Management
Information Base (MIB) objects.
l2
l3
mp
Displays the Management Processor Statistics Menu. Use this command to view information
on how switch management processes and resources are currently being allocated.
acl
snmp
ntp <clear>
ufd <clear>
clrmp
dump
Dumps all switch statistics. Use this command to gather data for tuning and debugging
switch performance. If you want to capture dump data to a file, set your communication
software on your workstation to capture session data prior to issuing the dump command.
Statistics Menu 61
Usage
8021x
brg
ether
if
ip
link
rmon
clear
Statistics Menu 62
802.1x statistics
Command: /stats/port <port number>/8021x
Authenticator Statistics:
eapolFramesRx
=
eapolFramesTx
=
eapolStartFramesRx
=
eapolLogoffFramesRx
=
eapolRespIdFramesRx
=
eapolRespFramesRx
=
eapolReqIdFramesTx
=
eapolReqFramesTx
=
invalidEapolFramesRx
=
eapLengthErrorFramesRx =
lastEapolFrameVersion =
lastEapolFrameSource
=
0
0
0
0
0
0
0
0
0
0
0
00:00:00:00:00:00
Authenticator Diagnostics:
authEntersConnecting
authEapLogoffsWhileConnecting
authEntersAuthenticating
authSuccessesWhileAuthenticating
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
authEapStartsWhileAuthenticating
authEapLogoffWhileAuthenticating
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
backendAccessChallenges
backendOtherRequestsToSupplicant
backendNonNakResponsesFromSupplicant
backendAuthSuccesses
backendAuthFails
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
The following table describes the 802.1x authenticator diagnostics for a selected port:
Table 46 802.1x statistics for port
Statistics
Description
Authenticator Diagnostics
authEntersConnecting
authEapLogoffsWhileConnecting
authEntersAuthenticating
authSuccessesWhile
Authenticating
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
Statistics Menu 63
Description
authEapStartsWhileAuthenticating Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Start message
being received from the Supplicant.
authEapLogoffWhileAuthenticating Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Logoff
message being received from the Supplicant.
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
Total number of times that the state machine sends an initial AccessRequest packet to the Authentication server. Indicates that the
Authenticator attempted communication with the Authentication Server.
backendAccessChallenges
Total number of times that the state machine receives an initial AccessChallenge packet from the Authentication server. Indicates that the
Authentication Server has communication with the Authenticator.
backendOtherRequestsToSupplicant Total number of times that the state machine sends an EAP-Request packet
(other than an Identity, Notification, Failure, or Success message) to the
Supplicant. Indicates that the Authenticator chose an EAP-method.
backendNonNakResponsesFrom
Supplicant
Total number of times that the state machine receives a response from the
Supplicant to an initial EAP-Request, and the response is something other
than EAP-NAK. Indicates that the Supplicant can respond to the
Authenticators chosen EAP-method.
backendAuthSuccesses
Total number of times that the state machine receives an Accept message
from the Authentication Server. Indicates that the Supplicant has
successfully authenticated to the Authentication Server.
backendAuthFails
Total number of times that the state machine receives a Reject message
from the Authentication Server. Indicates that the Supplicant has not
authenticated to the Authentication Server.
Bridging statistics
Command: /stats/port <port number>/brg
Bridging statistics for port 1:
dot1PortInFrames:
dot1PortOutFrames:
dot1PortInDiscards:
dot1TpLearnedEntryDiscards:
dot1StpPortForwardTransitions:
63242584
63277826
0
0
0
Statistics Menu 64
The following table describes the bridging statistics for a selected port:
Table 47 Bridging statistics for port
Statistics
Description
dot1PortInFrames
The number of frames that have been received by this port from its segment.
A frame received on the interface corresponding to this port is counted by this
object, if and only if, it is for a protocol being processed by the local bridging
function, including bridge management frames.
dot1PortOutFrames
The number of frames that have been transmitted by this port to its segment.
A frame transmitted on the interface corresponding to this port is counted by
this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
dot1PortInDiscards
Count of valid frames received which were discarded (that is, filtered) by the
forwarding process.
dot1TpLearnedEntryDiscards
The total number of Forwarding Database entries, which have been or would
have been learned, but have been discarded due to a lack of space to store
them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is
regularly becoming full (a condition which has adverse performance effects
on the sub network).
If this counter has a significant value but is not presently increasing, it
indicates that the problem has been occurring but is not persistent.
dot1StpPortForwardTransitions
The number of times this port has transitioned from the Learning state to the
Forwarding state.
Ethernet statistics
Command: /stats/port <port number>/ether
Ethernet statistics for port 1:
dot3StatsAlignmentErrors:
dot3StatsFCSErrors:
dot3StatsSingleCollisionFrames:
dot3StatsMultipleCollisionFrames:
dot3StatsLateCollisions:
dot3StatsExcessiveCollisions:
dot3StatsInternalMacTransmitErrors:
dot3StatsFrameTooLongs:
dot3StatsInternalMacReceiveErrors:
0
0
0
0
0
0
NA
0
0
The following table describes the Ethernet statistics for a selected port:
Table 48 Ethernet statistics for port
Statistics
Description
dot3StatsAlignmentErrors
Statistics Menu 65
Description
dot3StatsFCSErrors
dot3StatsSingleCollisionFrames
dot3StatsMultipleCollisionFrames
dot3StatsLateCollisions
dot3StatsExcessiveCollisions
dot3StatsInternalMacTransmitErrors
dot3StatsFrameTooLongs
Statistics Menu 66
Description
dot3StatsInternalMacReceiveErrors
Interface statistics
Command: /stats/port <port number>/if
Interface statistics for port 1:
ifHCIn Counters
Octets:
51697080313
UcastPkts:
65356399
BroadcastPkts:
0
MulticastPkts:
0
Discards:
0
Errors:
0
ifHCOut Counters
51721056808
65385714
6516
0
0
21187
The following table describes the interface (IF) statistics for a selected port:
Table 49 Interface statistics for port
Statistics
Description
OctetsIfHCIn
The total number of octets received on the interface, including framing characters.
UcastPktsIfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which were not
addressed to a multicast or broadcast address at this sublayer.
BroadcastPktsIfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which were
addressed to a broadcast address at this sublayer.
MulticastPktsIfHCIn
The total number of packets, delivered by this sublayer. These are the packets that
higher-level protocols requested to be transmitted, and which were addressed to a
multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
DiscardsIfHCIn
The number of inbound packets which were chosen to be discarded even though no
errors were detected to prevent their being delivered to a higher-layer protocol. One
possible reason for discarding such a packet could be to free up buffer space.
ErrorsIfHCIn
For packet-oriented interfaces, the number of inbound packets that contained errors
preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound transmission
units that contained errors preventing them from being deliverable to a higher-layer
protocol.
OctetsIfHCOut
The total number of octets transmitted out of the interface, including framing characters.
UcastPktsIfHCOut
The total number of packets that higher-level protocols requested to be transmitted, and
which were not addressed to a multicast or broadcast address at this sublayer,
including those that were discarded or not sent.
BroadcastPktsIfHCOut
The total number of packets that higher-level protocols requested to be transmitted, and
which were addressed to a broadcast address at this sublayer, including those that
were discarded or not sent. This object is a 64-bit version of ifOutBroadcastPkts.
Statistics Menu 67
Description
MulticastPktsIfHCOut
The total number of packets that higher-level protocols requested to be transmitted, and
which were addressed to a multicast address at this sublayer, including those that were
discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This
object is a 64-bit version of ifOutMulticastPkts.
DiscardsIfHCOut
The number of outbound packets that were chosen to be discarded even though no
errors had been detected to prevent their being transmitted. One possible reason for
discarding such a packet could be to free up buffer space.
ErrorsIfHCOut
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound transmission
units that could not be transmitted because of errors.
Description
ipInReceives
The total number of input datagrams received from interfaces, including those received in
error.
ipInHeaderError
The number of input datagrams discarded because the IP address in their IP header's
destination field was not a valid address to be received at this entity (the switch).
ipInDiscards
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (for example, for lack of buffer space). Note
that this counter does not include any datagrams discarded while awaiting re-assembly.
Link statistics
Command: /stats/port <port number>/link
Link statistics for port 1:
linkStateChange:
The following table describes the link statistics for a selected port:
Table 51 Link statistics for port
Statistic
Description
linkStateChange
Statistics Menu 68
NA
0
0
0
0
0
0
0
NA
0
0
0
0
0
0
0
0
The following table describes the Remote Monitoring (RMON) statistics of the selected port:
Table 52 RMON statistics
Statistic
Description
etherStatsDropEvents
The total number of packets received that were dropped because of system
resource constraints.
etherStatsOctets
The total number of octets of data (including those in bad packets) received
on the network (excluding framing bits but including FCS octets).
etherStatsPkts
The total number of packets (including bad packets, broadcast packets, and
multicast packets) received.
etherStatsBroadcastPkts
The total number of good packets received that were directed to the
broadcast address.
etherStatsMulticastPkts
The total number of good packets received that were directed to a multicast
address.
etherStatsCRCAlignErrors
The total number of packets received that had a length (excluding framing
bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but
had either a bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error).
etherStatsUndersizePkts
The total number of packets received that were less than 64 octets long
(excluding framing bits but including FCS octets) and were otherwise well
formed.
etherStatsOversizePkts
The total number of packets received that were longer than 1518 octets
(excluding framing bits but including FCS octets) and were otherwise well
formed.
etherStatsFragments
The total number of packets received that were less than 64 octets in length
(excluding framing bits but including FCS octets) and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error)
or a bad FCS with a non-integral number of octets (Alignment Error).
etherStatsJabbers
The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error)
or a bad FCS with a non-integral number of octets (Alignment Error). Jabber
is defined as the condition where any packet exceeds 20 ms. The allowed
range to detect jabber is between 20 ms and 150 ms.
etherStatsCollisions
The best estimate of the total number of collisions on this Ethernet segment.
Statistics Menu 69
Description
etherStatsPkts64
Octets
The total number of packets (including bad packets) received that were less
than or equal to 64 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts65to127
Octets
The total number of packets (including bad packets) received that were
greater than 64 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts128to255
Octets
The total number of packets (including bad packets) received that were
greater than 127 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts256to511
Octets
The total number of packets (including bad packets) received that were
greater than 255 octets in length (excluding framing bits but including
FCSoctets).
etherStatsPkts512to1023
Octets
The total number of packets (including bad packets) received that were
greater than 511 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts1024to1518
Octets
The total number of packets (including bad packets) received that were
greater than 1023 octets in length (excluding framing bits but including FCS
octets).
Layer 2 statistics
Command: /stats/l2
[Layer 2 Statistics Menu]
fdb
- Show FDB stats
lacp
- Show LACP stats
The following table describes the Layer 2 Statistics Menu options.
Table 53 Layer 2 Statistics Menu options
Command
Usage
fdb
lacp
FDB statistics
Command: /stats/l2/fdb
FDB statistics:
current:
91
hiwat:
91
This menu option enables you to display statistics regarding the use of the forwarding database, including the number
of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
Table 54 Forwarding Database statistics
Statistic
Description
current
hiwat
Highest number of entries recorded at any given time in the Forwarding Database.
Statistics Menu 70
LACP statistics
Command: /stats/l2/lacp <port number>
Valid LACPDUs received
Valid Marker PDUs received
Valid Marker Rsp PDUs received
Unknown version/TLV type
Illegal subtype received
LACPDUs transmitted
Marker PDUs transmitted
Marker Rsp PDUs transmitted
0
0
0
0
0
0
0
0
Layer 3 statistics
Command: /stats/l3
[Layer 3 Statistics Menu]
geal3
- GEA Layer 3 Stats Menu
ip
- Show IP stats
route
- Show route stats
arp
- Show ARP stats
dns
- Show DNS stats
icmp
- Show ICMP stats
tcp
- Show TCP stats
udp
- Show UDP stats
igmp
- Show IGMP stats
ospf
- OSPF stats
vrrp
- Show VRRP stats
rip
- Show RIP stats
clrigmp - Clear IGMP stats
ipclear - Clear IP stats
dump
- Dump layer 3 stats
The following table describes the Layer 3 Statistics Menu options.
Table 55 Layer 3 Statistics Menu options
Command
Usage
geal3
ip
Displays IP statistics.
route
arp <clear>
dns
icmp
tcp
udp
igmp
*ospf
*vrrp
When virtual routers are configured, you can display the following
Advertisements received (vrrpInAdvers)
Advertisements transmitted (vrrpOutAdvers)
Advertisements received, but ignored (vrrpBadAdvers)
*rip
clrigmp <1-4095>|all
Statistics Menu 71
Usage
ipclear
dump
* indicates menus that are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Usage
l3bucket
Dump
: 4096
: 9
4097
31
255
24
IP statistics
Command: /stats/l3/ip
IP statistics:
ipInReceives: 36475
ipInAddrErrors: 905
ipInUnknownProtos: 0
ipInDelivers: 4103
ipOutDiscards: 0
ipDefaultTTL: 255
ipInHdrErrors: 0
ipInDiscards: 0
ipOutRequests: 30974
Description
ipInReceives
The total number of input datagrams received from interfaces, including those received in
error.
ipInHdrErrors
The number of input datagrams discarded due to errors in their IP headers, including bad
checksums, version number mismatch, other format errors, time-to-live exceeded, errors
discovered in processing their IP options, and so on.
Statistics Menu 72
Table 57 IP statistics
Statistics
Description
ipInAddrErrors
The number of input datagrams discarded because the IP address in their IP header
destination field was not a valid address to be received at this switch. This count includes
invalid addresses (for example, 0.0.0.0) and addresses of unsupported classes (for
example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this
counter includes datagrams discarded because the destination address was not a local
address.
ipInUnknownProtos
The number of locally addressed datagrams received successfully but discarded because
of an unknown or unsupported protocol.
ipInDiscards
The number of input IP datagrams for which no problems were encountered to prevent
their continued processing, but which were discarded (for example, for lack of buffer
space).
This counter does not include any datagrams discarded while awaiting re-assembly.
ipInDelivers
ipOutRequests
The total number of IP datagrams that local IP user-protocols (including ICMP) supplied to
IP in requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
ipOutDiscards
The number of output IP datagrams for which no problem was encountered to prevent
their transmission to their destination, but which were discarded (for example, for lack of
buffer space).
This counter would include datagrams counted in ipForwDatagrams if any such packets
met this (discretionary) discard criterion.
ipDefaultTTL
The default value inserted into the Time-To-Live (TTL) field of the IP header of datagrams
originated at this switch, whenever a TTL value is not supplied by the transport layer
protocol.
Route statistics
Command: /stats/l3/route
Route statistics:
ipRoutesCur:
ipRoutesMax:
7
4096
ipRoutesHighWater:
Description
ipRoutesCur
ipRoutesMax
ipRoutesHighWater
ARP statistics
Command: /stats/l3/arp
ARP statistics:
arpEntriesCur:
arpEntriesHighWater:
Statistics Menu 73
The following table describes the Address Resolution Protocol (ARP) statistics:
Table 59 ARP statistics
Statistic
Description
arpEntriesCur
arpEntriesHighWater
The highest number of ARP entries ever recorded in the ARP table.
DNS statistics
Command: /stats/l3/dns
DNS statistics:
dnsInRequests:
dnsBadRequests:
0
0
dnsOutRequests:
The following table describes the Domain Name System (DNS) statistics:
Table 60 DNS statistics
Statistic
Description
dnsInRequests
The total number of DNS request packets that have been received.
dnsOutRequests
The total number of DNS response packets that have been transmitted.
dnsBadRequests
The total number of DNS request packets received that were dropped.
ICMP statistics
Command: /stats/l3/icmp
ICMP statistics:
icmpInMsgs:
icmpInDestUnreachs:
icmpInParmProbs:
icmpInRedirects:
icmpInEchoReps:
icmpInTimestampReps:
icmpInAddrMaskReps:
icmpOutErrors:
icmpOutTimeExcds:
icmpOutSrcQuenchs:
icmpOutEchos:
icmpOutTimestamps:
icmpOutAddrMasks:
245802
41
0
0
244350
0
0
0
0
0
253777
0
0
icmpInErrors:
icmpInTimeExcds:
icmpInSrcQuenchs:
icmpInEchos:
icmpInTimestamps:
icmpInAddrMasks:
icmpOutMsgs:
icmpOutDestUnreachs:
icmpOutParmProbs:
icmpOutRedirects:
icmpOutEchoReps:
icmpOutTimestampReps:
icmpOutAddrMaskReps:
1393
0
0
18
0
0
253810
15
0
0
18
0
0
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
Table 61 ICMP statistics
Statistics
Description
icmpInMsgs
The total number of ICMP messages which the switch received. Note that this
counter includes all those counted by icmpInErrors.
icmpInErrors
The number of ICMP messages which the switch received but determined as
having ICMP specific errors (for example bad ICMP checksums and bad length).
icmpInDestUnreachs
icmpInTimeExcds
icmpInParmProbs
icmpInSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages received.
icmpInRedirects
icmpInEchos
icmpInEchoReps
Statistics Menu 74
Description
icmpInTimestamps
icmpInTimestampReps
icmpInAddrMasks
icmpInAddrMaskReps
icmpOutMsgs
The total number of ICMP messages which this switch attempted to send. Note that
this counter includes all those counted by icmpOutErrors.
icmpOutErrors
The number of ICMP messages that this switch did not send due to problems
discovered within ICMP such as a lack of buffer. This value should not include
errors discovered outside the ICMP layer such as the inability of IP to route the
resultant datagram. In some implementations there may be no types of errors that
contribute to this counter's value.
icmpOutDestUnreachs
icmpOutTimeExcds
icmpOutParmProbs
icmpOutSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data)
messages sent.
icmpOutRedirects
icmpOutEchos
icmpOutEchoReps
icmpOutTimestamps
icmpOutTimestampReps
icmpOutAddrMasks
icmpOutAddrMaskReps
TCP statistics
Command: /stats/l3/tcp
TCP statistics:
tcpRtoAlgorithm:
tcpRtoMax:
tcpActiveOpens:
tcpAttemptFails:
tcpInSegs:
tcpRetransSegs:
tcpCurBuff:
tcpOutRsts:
4
240000
252214
528
756401
0
0
417
tcpRtoMin:
tcpMaxConn:
tcpPassiveOpens:
tcpEstabResets:
tcpOutSegs:
tcpInErrs:
tcpCurConn:
0
512
7
4
756655
0
3
The following table describes the Transmission Control Protocol (TCP) statistics:
Table 62 TCP statistics
Statistics
Description
tcpRtoAlgorithm
The algorithm used to determine the timeout value used for retransmitting
unacknowledged octets.
tcpRtoMin
The minimum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon
the algorithm used to determine the retransmission timeout. In particular, when the
timeout algorithm is rsre(3), an object of this type has the semantics of the LBOUND
quantity described in Request For Comments (RFC) 793.
Statistics Menu 75
Description
tcpRtoMax
The maximum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon
the algorithm used to determine the retransmission timeout. In particular, when the
timeout algorithm is rsre(3), an object of this type has the semantics of the UBOUND
quantity described in RFC 793.
tcpMaxConn
The limit on the total number of TCP connections the switch can support. In entities
where the maximum number of connections is dynamic, this object should contain the
value -1.
tcpActiveOpens
The number of times TCP connections have made a direct transition to the SYN-SENT
state from the CLOSED state.
tcpPassiveOpens
The number of times TCP connections have made a direct transition to the SYN-RCVD
state from the LISTEN state.
tcpAttemptFails
The number of times TCP connections have made a direct transition to the CLOSED state
from either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP
connections have made a direct transition to the LISTEN state from the SYN-RCVD state.
tcpEstabResets
The number of times TCP connections have made a direct transition to the CLOSED state
from either the ESTABLISHED state or the CLOSE- WAIT state.
tcpInSegs
The total number of segments received, including those received in error. This count
includes segments received on currently established connections.
tcpOutSegs
The total number of segments sent, including those on current connections but excluding
those containing only retransmitted octets.
tcpRetransSegs
The total number of segments retransmitted, that is, the number of TCP segments
transmitted containing one or more previously transmitted octets.
tcpInErrs
The total number of segments received in error (for example, bad TCP checksums).
tcpCurBuff
The total number of outstanding memory allocations from heap by TCP protocol stack.
tcpCurConn
The total number of outstanding TCP sessions that are currently opened.
tcpOutRsts
The number of TCP segments sent containing the reset (RST) flag.
UDP statistics
Command: /stats/l3/udp
UDP statistics:
udpInDatagrams:
udpInErrors:
54
0
udpOutDatagrams:
udpNoPorts:
43
1578077
The following table describes the User Datagram Protocol (UDP) statistics:
Table 63 UDP statistics
Statistics
Description
udpInDatagrams
udpOutDatagrams
udpInErrors
The number of received UDP datagrams that could not be delivered for reasons other
than the lack of an application at the destination port.
udpNoPorts
The total number of received UDP datagrams for which there was no application at the
destination port.
Statistics Menu 76
Description
rxIgmpValidPkts
rxIgmpInvalidPkts
rxIgmpGenQueries
rxIgmpGrpSpecificQueries
rxIgmpLeaves
rxIgmpReports
txIgmpReports
txIgmpGrpSpecificQueries
txIgmpLeaves
Usage
general
aindex <0-2>
if <1-255>
Statistics Menu 77
Rx
-------0
23
4
3
7
9
2
0
2
2
2
2
0
0
2
0
0
1
Tx
-------0
518
12
1
7
7
Intf change Stats:
up
4
down 2
loop 0
unloop 0
wait timer 2
backup 0
nbr change 5
514
1028
0
0
0
0
0
Description
Rx Tx stats:
Rx Pkts
The sum total of all OSPF packets received on all OSPF areas and interfaces.
Tx Pkts
The sum total of all OSPF packets transmitted on all OSPF areas and interfaces.
Rx Hello
The sum total of all Hello packets received on all OSPF areas and interfaces.
Tx Hello
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.
Rx Database
The sum total of all Database Description packets received on all OSPF areas and
interfaces.
Tx Database
The sum total of all Database Description packets transmitted on all OSPF areas and
interfaces.
Rx ls Requests
The sum total of all Link State Request packets received on all OSPF
areas and interfaces.
Tx ls Requests
The sum total of all Link State Request packets transmitted on all OSPF areas and
interfaces.
Rx ls Acks
The sum total of all Link State Acknowledgement packets received on all OSPF areas
and interfaces.
Tx ls Acks
The sum total of all Link State Acknowledgement packets transmitted on all OSPF
areas and interfaces.
Rx ls Updates
The sum total of all Link State Update packets received on all OSPF areas and
interfaces.
Statistics Menu 78
Description
Tx ls Updates
The sum total of all Link State Update packets transmitted on all OSPF areas and
interfaces.
The sum total of all Hello packets received from neighbors on all OSPF areas and
interfaces.
Start
The sum total number of neighbors in this state (that is, an indication that Hello
packets should now be sent to the neighbor at intervals of HelloInterval
seconds) across all OSPF areas and interfaces.
n2way
adjoint ok
negotiation done
The sum total number of neighbors in this state wherein the Master/slave relationship
has been negotiated, and sequence numbers have been exchanged, across all OSPF
areas and interfaces.
exchange done
The sum total number of neighbors in this state (that is, in an adjacency's final state)
having transmitted a full sequence of Database Description packets, across all OSPF
areas and interfaces.
bad requests
The sum total number of Link State Requests which have been received for a link state
advertisement not contained in the database across all interfaces and OSPF areas.
bad sequence
The sum total number of Database Description packets which have been received
that either:
Has an unexpected DD sequence number
Unexpectedly has the init bit set
Has an options field differing from the last Options field received in a Database
Description packet.
Any of these conditions indicate that some error has occurred during adjacency
establishment for all OSPF areas and interfaces.
loading done
The sum total number of link state updates received for all out-of-date portions of the
database across all OSPF areas and interfaces.
n1way
The sum total number of Hello packets received from neighbors, in which this router is
not mentioned across all OSPF interfaces and areas.
rst_ad
The sum total number of times the Neighbor adjacency has been reset across all
OPSF areas and interfaces.
down
The total number of Neighboring routers down (that is, in the initial state of a
neighbor conversation) across all OSPF areas and interfaces.
down
loop
The sum total of interfaces no longer connected to the attached network across all
OSPF areas and interfaces.
unloop
The sum total number of interfaces, connected to the attached network in all OSPF
areas.
wait timer
The sum total number of times the Wait Timer has been fired, indicating the end of
the waiting period that is required before electing a (Backup) Designated Router
across all OSPF areas and interfaces.
backup
The sum total number of Backup Designated Routers on the attached network for all
OSPF areas and interfaces.
nbr change
The sum total number of changes in the set of bidirectional neighbors associated with
any interface across all OSPF areas.
Statistics Menu 79
Description
Timers Kickoff:
hello
The sum total number of times the Hello timer has been fired (which triggers the
send of a Hello packet) across all OPSF areas and interfaces.
retransmit
The sum total number of times the Retransmit timer has been fired across all OPSF
areas and interfaces.
lsa lock
The sum total number of times the Link State Advertisement (LSA) lock timer has been
fired across all OSPF areas and interfaces.
lsa ack
The sum total number of times the LSA Ack timer has been fired across all OSPF
areas and interfaces.
dbage
The total number of times the data base age (Dbage) has been fired.
summary
The total number of times the Summary timer has been fired.
ase export
The total number of times the Autonomous System Export (ASE) timer has been fired.
VRRP statistics
Virtual Router Redundancy Protocol (VRRP) support on the GbE2c provides redundancy between routers in a LAN.
This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRPcapable routing device.
One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of
the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority
and take control of the virtual router IP address.
When virtual routers are configured, you can display the following protocol statistics for VRRP:
NOTE: VRRP commands are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Command: /stats/l3/vrrp
>> Layer 3 Statistics# vrrp
VRRP statistics:
vrrpInAdvers:
0
vrrpOutAdvers:
0
vrrpBadVersion:
0
vrrpBadAddress:
0
vrrpBadPassword:
0
vrrpBadAdvers:
vrrpBadVrid:
vrrpBadData:
vrrpBadInterval:
0
0
0
Description
vrrpInAdvers
vrrpOutAdvers
vrrpBadVersion
The total number of VRRP advertisements that had a bad version number.
vrrpBadAddress
vrrpBadPassword
vrrpBadAdvers
vrrpBadVrid
The total number of VRRP advertisements that had a bad virtual router ID.
vrrpBadData
Statistics Menu 80
Description
vrrpBadInterval
RIP statistics
NOTE: RIP commands are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Command: /stats/l3/rip
RIP ALL STATS INFORMATION:
RIP packets received = 12
RIP packets sent = 75
RIP request received = 0
RIP response received = 12
RIP request sent = 3
RIP response sent = 72
RIP route timeout = 0
RIP bad size packet received = 0
RIP bad version received = 0
RIP bad zeros received = 0
RIP bad src port received = 0
RIP bad src IP received = 0
RIP packets from self received = 0
Usage
pkt
tcb
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.
ucb
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use.
cpu
Packet statistics
Command: /stats/mp/pkt
Packet counts:
allocs:
mediums:
jumbos:
smalls:
failures:
36692
0
0
0
0
frees:
mediums hi-watermark:
jumbos hi-watermark:
smalls hi-watermark:
36692
3
0
2
Statistics Menu 81
Example statistic
allocs
Total number of packet allocations from the packet buffer pool by the TCP/IP protocol stack.
frees
Total number of times the packet buffers are freed (released) to the packet buffer pool by the
TCP/IP protocol stack.
mediums
Total number of packet allocations with size between 128 to 1536 bytes from the packet buffer
pool by the TCP/IP protocol stack.
mediums hi-watermark
The highest number of packet allocation with size between 128 to 1536 bytes from the packet
buffer pool by the TCP/IP protocol stack.
jumbos
Total number of packet allocations with more than 1536 bytes from the packet buffer pool by
the TCP/IP protocol stack.
jumbos hi-watermark
The highest number of packet allocation with more than 1536 bytes from the packet buffer pool
by the TCP/IP protocol stack.
smalls
Total number of packet allocations with size less than 128 bytes from the packet buffer pool by
the TCP/IP protocol stack.
smalls hi-watermark
The highest number of packet allocation with size less than 128 bytes from the packet buffer
pool by the TCP/IP protocol stack.
failures
Total number of packet allocation failures from the packet buffer pool by the TCP/IP protocol
stack.
TCP statistics
Command: /stats/mp/tcb
All TCP allocated control blocks:
10ad41e8: 0.0.0.0
0 <=> 0.0.0.0
10ad5790: 47.81.27.5
1171 <=> 47.80.23.243
80
23
listen
established
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown in this
example:
Table 70 TCP statistics
Description
Example statistic
Memory
10ad41e8/10ad5790
Destination IP address
0.0.0.0/47.81.27.5
Destination port
0/1171
Source IP
0.0.0.0/47.80.23.243
Source port
80/23
State
listen/established
Statistics Menu 82
UDP statistics
Command: /stats/mp/ucb
All UDP allocated control blocks:
161: listen
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in this example:
Table 71 UDP statistics
Description
Example Statistic
Control block
161
State
listen
CPU statistics
Command: /stats/mp/cpu
CPU utilization:
cpuUtil1Second:
cpuUtil4Seconds:
cpuUtil64Seconds:
8%
9%
8%
The following table describes the management port CPU utilization statistics:
Table 72 CPU statistics
Statistics
Description
cpuUtil1Second
cpuUtil4Seconds
cpuUtil64Seconds
The following table describes the Access Control List (ACL) Statistics menu options:
Table 73 ACL statistics menu options
Command
Usage
acl <1-762>
dump
clracl
ACL statistics
Command: /stats/acl/dump
Statistics Menu 83
SNMP statistics
Command: /stats/snmp
SNMP statistics:
snmpInPkts:
snmpInBadC'tyNames:
snmpInASNParseErrs:
snmpOutPkts:
snmpInTooBigs:
snmpInBadValues:
snmpInGenErrs:
snmpInTotalSetVars:
snmpInGetNexts:
snmpInGetResponses:
snmpOutTooBigs:
snmpOutBadValues:
snmpOutGenErrs:
snmpOutGetNexts:
snmpOutGetResponses:
snmpSilentDrops:
54
0
0
54
0
0
0
0
52
0
0
0
0
0
54
0
snmpInBadVersions:
snmpInBadC'tyUses:
snmpEnableAuthTraps:
snmpInBadTypes:
snmpInNoSuchNames:
snmpInReadOnlys:
snmpInTotalReqVars:
snmpInGetRequests:
snmpInSetRequests:
snmpInTraps:
snmpOutNoSuchNames:
snmpOutReadOnlys:
snmpOutGetRequests:
snmpOutSetRequests:
snmpOutTraps:
snmpProxyDrops:
0
0
0
0
0
0
105
2
0
0
2
0
0
0
0
0
The following table describes the Simple Network Management Protocol (SNMP) statistics:
Table 74 SNMP statistics
Statistics
Description
snmpInPkts
The total number of messages delivered to the SNMP entity from the transport
service.
snmpInBadVersions
The total number of SNMP messages, which were delivered to the SNMP protocol
entity and were for an unsupported SNMP version.
snmpInBadC'tyNames
The total number of SNMP messages delivered to the SNMP entity that used an
SNMP community name not known to the switch.
snmpInBadC'tyUses
The total number of SNMP messages delivered to the SNMP protocol entity that
represented an SNMP operation which was not allowed by the SNMP community
named in the message.
snmpInASNParseErrs
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic Encoding
Rules), errors encountered by the SNMP protocol entity when decoding SNMP
messages received.
The Open Systems Interconnection (OSI) method of specifying abstract objects is
called ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of
rules for representing such objects as strings of ones and zeros is called the BER
(Basic Encoding Rules, defined in X.209).
ASN.1 is a flexible notation that allows one to define a variety of data types, from
simple types such as integers and bit strings to structured types such as sets and
sequences.
BER describes how to represent or encode values of each ASN.1 type as a string of
eight-bit octets.
snmpEnableAuthTraps
snmpOutPkts
The total number of SNMP messages which were passed from the SNMP protocol
entity to the transport service.
snmpInBadTypes
snmpInTooBigs
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is too big.
snmpInNoSuchNames
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is
noSuchName.
snmpInBadValues
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the
SNMP protocol entity and for which the value of the error-status field is badValue.
Statistics Menu 84
Description
snmpInReadOnlys
The total number of valid SNMP Protocol Data Units (PDUs), which were delivered
to the SNMP protocol entity and for which the value of the error-status field is readonly.
It should be noted that it is a protocol error to generate an SNMP PDU, which
contains the value read-only in the error-status field. As such, this object is provided
as a means of detecting incorrect implementations of the SNMP.
snmpInGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were delivered to the
SNMP protocol entity and for which the value of the error-status field is genErr.
snmpInTotalReqVars
The total number of MIB objects which have been retrieved successfully by the
SNMP protocol entity as a result of receiving valid SNMP Get-Request and Get-Next
Protocol Data Units (PDUs).
snmpInTotalSetVars
The total number of MIB objects, which have been altered successfully by the SNMP
protocol entity as a result of receiving valid SNMP Set-Request Protocol Data Units
(PDUs).
snmpInGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
snmpInGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpInGetResponses
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
snmpInTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpOutTooBigs
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is too big.
snmpOutNoSuchNames
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status is
noSuchName.
snmpOutBadValues
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is
badValue.
snmpOutReadOnlys
Not in use.
snmpOutGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were generated by
the SNMP protocol entity and for which the value of the error-status field is genErr.
snmpOutGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
snmpOutGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpOutSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpOutGetResponses
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
snmpOutTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
snmpSilentDrops
Statistics Menu 85
Description
snmpProxyDrops
NTP statistics
Command: /stats/ntp
NTP statistics:
Primary Server:
Requests Sent:
Responses Received:
Updates:
Secondary Server:
Requests Sent:
Responses Received:
Updates:
17
17
1
0
0
0
Description
Primary Server
Requests Sent: The total number of NTP requests the switch sent to the primary NTP
server to synchronize time.
Responses Received: The total number of NTP responses received from the primary
NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the primary NTP server.
Secondary Server
Requests Sent: The total number of NTP requests the switch sent to the secondary NTP
server to synchronize time.
Responses Received: The total number of NTP responses received from the secondary
NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the secondary NTP server.
Last update of time on the switch based on either primary or secondary NTP response
received.
The time stamp showing the time when the switch was last updated.
The switch system time when the command /stats/ntp was issued.
Statistics Menu 86
The following table describes the Uplink Failure Detection (UFD) statistics:
Table 76 Uplink Failure Detection statistics
Statistic
Description
The total numbers of times that link failures were detected on the
uplink ports in the Link to Monitor group.
Number of times LtM link in Blocking The total number of times that Spanning Tree Blocking state was
State
detected on the uplink ports in the Link to Monitor group.
Number of times LtD got auto
disabled
The total numbers of times that downlink ports in the Link to Disable
group were automatically disabled because of a failure in the Link
to Monitor group.
Statistics dump
Command: /stats/dump
Use the dump command to dump all switch statistics available from the Statistics Menu (40K or more, depending on
your configuration). This data can be used to tune or debug switch performance.
If you want to capture dump data to a file, set your communication software on your workstation to capture session
data prior to issuing the dump commands.
Statistics Menu 87
Configuration Menu
Introduction
The Configuration Menu is only available from an administrator login. It includes submenus for configuring every
aspect of the switch. Changes to configuration are not active until explicitly applied. Changes can be saved to nonvolatile memory (NVRAM).
Menu information
Command: /cfg
[Configuration Menu]
sys
- System-wide Parameter Menu
port
- Port Menu
l2
- Layer 2 Menu
l3
- Layer 3 Menu
qos
- QOS Menu
acl
- Access Control List Menu
rmon
- RMON Menu
pmirr
- Port Mirroring Menu
ufd
- Uplink Failure Detection Menu
dump
- Dump current configuration to script file
ptcfg
- Backup current configuration to FTP/TFTP server
gtcfg
- Restore current configuration from FTP/TFTP server
cur
- Display current configuration
The following table describes the Configuration Menu options.
Table 77 Configuration Menu options
Command
Usage
sys
l2
l3
qos
acl
rmon
pmirr
ufd
dump
cur
Configuration Menu 88
Revert to restore configuration parameters set with the last apply command
Reverting changes
The revert command removes configuration changes that have been made, but not applied. Enter revert apply to
remove all changes that have not been saved:
# revert
You can view all pending configuration changes that have been applied but not saved to flash memory using the diff
flash command. It is a global command that can be executed from any prompt.
For instructions on selecting the configuration to run at the next system reset, see the Selecting a configuration block
section in the Boot Options Menu chapter.
Reminders
CLI reminders prompt users to complete configuration tasks that require multiple steps. The default setting for CLI
reminders is enabled. Use the following command to disable CLI reminders: /cfg/sys/reminders dis
The following is an example of a configuration task performed with CLI reminders enabled.
>> Layer 2# vlan 5
VLAN number 5 with name "VLAN 5" created.
Reminder: VLAN 5 needs to be enabled.
>> VLAN 5# add 9
Port 9 is an UNTAGGED port and its current PVID is 1.
Confirm changing PVID from 1 to 5 [y/n]: y
Current ports for VLAN 5:
empty
System configuration
Command: /cfg/sys
[System Menu]
syslog
sshd
radius
tacacs+
ntp
ssnmp
access
date
time
timezone
idle
notice
bannr
hprompt
bootp
dhcp
reminders
cur
Syslog Menu
SSH Server Menu
RADIUS Authentication Menu
TACACS+ Authentication Menu
NTP Server Menu
System SNMP Menu
System Access Menu
Set system date
Set system time
Set system timezone (daylight savings)
Set timeout for idle CLI sessions
Set login notice
Set login banner
Enable/disable display hostname (sysName) in CLI prompt
Enable/disable use of BOOTP
Enable/disable use of DHCP on Mgmt interface
Enable/disable Reminders
Display current system-wide parameters
This menu provides configuration of switch management parameters such as user and administrator privilege mode
passwords, browser-based management settings, and management access list.
The following table describes the System Configuration Menu options.
Table 78 System Configuration Menu options
Command
Usage
syslog
sshd
radius
tacacs+
ntp
ssnmp
access
Configuration Menu 90
Usage
date
time
timezone
Configures the time zone where the switch resides. You are prompted
to select your location (continent, country, region) by the timezone
wizard. Once a region is selected, the switch updates the time to
reflect local changes to Daylight Savings Time, etc.
idle <1-60>
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The default
is 5 minutes.
This setting affects both the console port and Telnet port.
hprompt disable|enable
bootp disable|enable
dhcp disable|enable
reminders disable|enable
cur
Description
sever <1-7>
Sets the severity level of the first syslog host displayed. The
default is 7, which means log all the severity levels.
Configuration Menu 91
Description
sever2 <1-7>
Sets the severity level of the second syslog host displayed. The
default is 7, which means log all the severity levels.
facil <1-7>
This option sets the facility level of the first syslog host
displayed. The range is 0-7. The default is 0.
facil2 <1-7>
This option sets the facility level of the second syslog host
displayed. The range is 0-7. The default is 0.
console disable|enable
cur
Telnet traffic on the network is not secure. This menu enables Secure Shell (SSH) access from any SSH client. The SSH
program securely logs into another computer over a network and executes commands in a secure environment. All
data using SSH is encrypted.
Secure Shell can be configured on the switch using the console port only. The menu options do not display if you
access the switch using Telnet or the Browser-based Interface (BBI).
NOTE: See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for information on
SSH.
Configuration Menu 92
Description
intrval <0-24>
Defines interval for auto-generating the RSA server key. The switch will
auto-generate the RSA server key at the interval defined in this command.
The value of zero (0) means the RSA server key auto-generation is
disabled. If the switch has been busy performing any other key generation
and the assigned time of interval expires, the RSA server will skip
generating the key.
scpadm
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another.
In the switch, SCP is used to download and upload the switch configuration
using secure channels.
hkeygen
Generates the RSA host keys manually. The switch creates this key
automatically while configuring the switch with Secure Shell (SSH). But you
can generate the key manually by using this command if you need to
overwrite the key for security reasons. The command will take effect
immediately without executing the apply command.
skeygen
Generates the RSA server key. The switch creates this key automatically
while configuring the switch with Secure Shell (SSH). You can generate the
key manually by using this command if you need to overwrite the key for
security reasons. The command will take effect immediately without
executing the apply command.
ena
dis
Disables the SCP apply and save. This is the default for SCP.
on
off
Disables the SSH server. This is the default for the SSH server.
cur
Menu]
Set primary RADIUS server address
Set secondary RADIUS server address
Set primary RADIUS server secret
Set secondary RADIUS server secret
Set RADIUS port
Set RADIUS server retries
Set RADIUS server timeout
Enable/disable RADIUS backdoor for telnet/ssh/http/https
Enable/disable RADIUS secure backdoor for telnet/ssh/http/https
Turn RADIUS authentication ON
Turn RADIUS authentication OFF
Display current RADIUS configuration
NOTE: See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for information on
RADIUS.
Configuration Menu 93
The following table describes the RADIUS Server Configuration Menu options.
Table 81 RADIUS Server Configuration Menu options
Command
Description
This is the shared secret between the switch and the RADIUS server(s).
This is the secondary shared secret between the switch and the RADIUS
server(s).
retries <1-3>
timeout <1-10>
telnet enable|disable
secbd enable|disable
Enables or disables the RADIUS back door using secure password for
telnet/SSH/ HTTP/HTTPS. This command does not apply when backdoor
(telnet) is enabled.
on
off
cur
IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting via the
console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
noradius and the administrator password even if the backdoor (telnet) or secure backdoor (secbd) are
disabled.
If Telnet backdoor is enabled (telnet ena), type in noradius as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this even if RADIUS servers are
available.
If secure backdoor is enabled (secbd ena), type in noradius as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this only if RADIUS servers are not
available.
Configuration Menu 94
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a remote
access server to forward a user's logon password to an authentication server to determine whether access can be
allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service (RADIUS) protocols are more
secure than the TACACS encryption protocol. TACACS+ is described in RFC 1492.
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol (TCP) whereas
RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication and authorization in a user
profile, whereas TACACS+ separates the two operations.
TACACS+ offers the following advantages over RADIUS as the authentication device:
The following table describes the TACACS+ Server Configuration Menu options.
Table 82 TACACS+ Server Configuration Menu options
Command
Description
This is the shared secret between the switch and the TACACS+ server(s).
This is the secondary shared secret between the switch and the TACACS+
server(s).
Enter the number of the TCP port to be configured, between 1 - 65000. The
default is 49.
retries <1-3>
timeout <4-15>
telnet enable|disable
Enables or disables the TACACS+ back door for telnet. The telnet command
also applies to SSH/SCP connections and the Browser-based Interface (BBI). This
command does not apply when secure backdoor (secbd) is enabled.
secbd enable|disable
Enables or disables the TACACS+ back door using secure password for
telnet/SSH/ HTTP/HTTPS. This command does not apply when backdoor
(telnet) is enabled.
cmap enable|disable
usermap <0-15>
user|oper|admin|none
on
off
cur
IMPORTANT: If TACACS+ is enabled, you must login using TACACS+ authentication when connecting via the
console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
notacacs and the administrator password even if the backdoor (telnet) or secure backdoor (secbd) are
disabled.
If Telnet backdoor is enabled (telnet ena), type in notacacs as a backdoor to bypass TACACS+
checking, and use the administrator password to log into the switch. The switch allows this even if TACACS+
servers are available.
If secure backdoor is enabled (secbd ena), type in notacacs as a backdoor to bypass TACACS+ checking,
and use the administrator password to log into the switch. The switch allows this only if TACACS+ servers are
not available.
Configuration Menu 95
Description
Configures the IP addresses of the primary NTP server to which you want to
synchronize the switch clock.
Configures the IP addresses of the secondary NTP server to which you want to
synchronize the switch clock.
intrval <1-44640>
Specifies the interval, that is, how often, in minutes (1-44640), to resynchronize the
switch clock with the NTP server. The default is 1440 minutes.
tzone <hh:mm>
Configures the NTP time zone offset from Greenwich Mean Time (GMT), in hours
and minutes. The offset format is HH:MM
dlight disable|enable
Disables or enables daylight saving time in the system clock. When enabled, the
switch will add an extra hour to the system clock so that it is consistent with the local
clock. By default, this option is disabled.
on
off
cur
SNMPv3 Menu
Set SNMP "sysName"
Set SNMP "sysLocation"
Set SNMP "sysContact"
Set SNMP read community string
Set SNMP write community string
Set timeout for the SNMP state machine
Enable/disable SNMP "sysAuthenTrap"
Enable/disable SNMP link up/down trap
Enable/disable SNMP Uplink Failure Detection trap
Display current SNMP configuration
The switch software supports SNMP-based network management. In SNMP model of network management, a
management station (client/manager) accesses a set of variables known as MIBs (Management Information Base)
provided by the managed device (agent). If you are running an SNMP network management station on your network,
you can manage the switch using the following standard SNMP MIBs:
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP messages.
Each SNMP message sent to the agent contains a list of management objects to retrieve or to modify.
Configuration Menu 96
System name
System location
System contact
The following table describes the System SNMP Configuration Menu options.
Table 84 System SNMP Configuration Menu options
Command
Description
snmpv3
Configures the name for the system. The name can have a maximum of 64 characters.
Configures the name of the system location. The location can have a maximum of 64
characters.
Configures the name of the system contact. The contact can have a maximum of 64
characters.
rcomm <1-32 characters> Configures the SNMP read community string. The read community string controls SNMP
get access to the switch. It can have a maximum of 32 characters. The default read
community string is public.
wcomm <1-32 characters> Configures the SNMP write community string. The write community string controls SNMP
set and get access to the switch. It can have a maximum of 32 characters. The
default write community string is private.
timeout <1-30>
Sets the timeout value for the SNMP state machine. The range is 1-30 minutes. The
default value is 5 minutes.
auth disable|enable
Enables or disables the use of the system authentication trap facility. The default setting
is disabled.
linkt <port>
[disable|enable]
Enables or disables the sending of SNMP link up and link down traps. The default
setting is enabled.
ufd
Enables or disables the sending of Uplink Failure Detection traps. The default setting is
disabled.
cur
SNMPv3 configuration
Command: /cfg/sys/ssnmp/snmpv3
[SNMPv3 Menu]
usm
view
access
group
comm
taddr
tparam
notify
v1v2
cur
Configuration Menu 97
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
access control
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.
The following table describes the SNMPv3 Configuration Menu options.
Table 85 SNMPv3 Configuration Menu options
Command
Description
usm <1-16>
Configures a user security model (USM) entry for an authorized user. You can also
configure this entry through SNMP. The range is 1-16.
view <1-128>
access <1-32>
Configures access rights. The View-based Access Control Model defines a set of services
that an application can use for checking access rights of the user. You need access
control when you have to process retrieval or modification request from an SNMP entity.
The range is 1-32.
group <1-16>
Configures an SNMP group. A group maps the user name to the access group names
and their access rights needed to access SNMP management objects. A group defines
the access rights assigned to all names that belong to a particular group. The range is 116.
comm <1-16>
Configures a community table entry. The community table contains objects for mapping
community strings and version-independent SNMP message parameters.
The range is 1-16.
taddr <1-16>
Configures the destination address and user security levels for outgoing notifications. This
is also called the transport endpoint. The range is 1-16.
tparam <1-16>
notify <1-16>
v1v2 disable|enable
Enables or disables the access to SNMP version 1 and version 2. This command is
enabled by default.
cur
1 Menu]
Set USM user name
Set authentication protocol
Set authentication password
Set privacy protocol
Set privacy password
Delete usmUser entry
Display current usmUser configuration
You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the
knowledge of applicable attributes of a user.
This menu helps you create a user security model entry for an authorized user. You need to provide a security name
to create the USM entry.
The following table describes the User Security Model Configuration Menu options.
Configuration Menu 98
Description
name <1-32
characters>
Configures a string up to 32 characters long that represents the name of the user. This is the
login name that you need in order to access the switch.
auth md5|sha|none
authpw
Configures your password for authentication. If you selected an authentication algorithm using
the above command, you need to provide a password; otherwise you will get an error
message during validation.
priv des|none
Configures the type of privacy protocol on the switch. The privacy protocol protects messages
from disclosure. The options are des (CBC-DES Symmetric Encryption Protocol) or none. If
you specify des as the privacy protocol, then be sure that you have selected one of the
authentication protocols (MD5 or HMAC-SHA-96). If you select none as the authentication
protocol, you will get an error message.
privpw
del
cur
Description
Defines the bit mask, which in combination with the corresponding tree defines
a family of view subtrees. The mask can have a maximum of 32 characters.
type included|excluded
del
cur
Configuration Menu 99
Description
name <1-32
characters>
model
usm|snmpv1|snmpv2
level
Defines the minimum level of security required to gain access rights. The level
noAuthNoPriv|authNo noAuthNoPriv means that the SNMP message will be sent without authentication and
Priv|authPriv
without using a privacy protocol. The level authNoPriv means that the SNMP message
will be sent with authentication but without using a privacy protocol. The authPriv means
that the SNMP message will be sent both with authentication and using a privacy protocol.
rview <1-32
characters>
Defines a 32 character long read view name that allows you read access to a particular MIB
view. If the value is empty or if there is no active MIB view having this value then no access is
granted.
wview <1-32
characters>
Defines a 32 character long write view name that allows you write access to the MIB view. If
the value is empty or if there is no active MIB view having this value then no access is
granted.
nview <1-32
characters>
Defines a 32 character long notify view name that allows you notify access to the MIB view.
del
cur
The following table describes the SNMPv3 Group Configuration Menu options.
Table 89 SNMPv3 Group Configuration Menu options
Command
Description
model
usm|snmpv1|snmpv2
uname <1-32
characters>
gname <1-32
characters>
del
cur
Description
index <1-32
characters>
Configures the unique index value of a row in this table. The index can have a maximum of
32 characters.
name <1-32
characters>
uname <1-32
characters>
Defines a readable 32 character string that represents the corresponding value of an SNMP
community name in a security model.
tag <1-255
characters>
Configures a tag of up to 255 characters maximum. This tag specifies a set of transport
endpoints to which a command responder application sends an SNMP trap.
del
cur
Description
name <1-32
characters>
Configures the locally arbitrary, but unique identifier, target address name associated with
this entry.
addr <transport
address ip>
Configures a transport address IP that can be used in the generation of SNMP traps.
port <transport
address port>
Configures a transport address port that can be used in the generation of SNMP traps.
taglist <1-255
characters>
Configures a list of tags (up to 255 characters maximum) that are used to select target
addresses for a particular operation.
pname <1-32
characters>
del
cur
The following table describes the SNMPv3 Target Parameters Table Configuration Menu options.
Table 92 SNMPv3 Target Parameters Table Configuration Menu options
Command
Description
name <1-32
characters>
Configures the locally arbitrary, but unique identifier that is associated with this entry.
mpmodel
Configures the message processing model that is used to generate SNMP messages.
snmpv1|snmpv2c|snmp
v3
model
usm|snmpv1|snmpv2
Selects the security model to be used when generating the SNMP messages.
uname <1-32
characters>
Defines the name that identifies the user in the USM table, on whose behalf the SNMP
messages are generated using this entry.
level
Selects the level of security to be used when generating the SNMP messages using this entry.
noAuthNoPriv|authNo The level noAuthNoPriv means that the SNMP message will be sent without authentication and without using a privacy protocol. The level authNoPriv means that the SNMP
Priv|authPriv
message will be sent with authentication but without using a privacy protocol. The
authPriv means that the SNMP message will be sent both with authentication and using a
privacy protocol.
del
cur
Description
name <1-32
characters>
Defines a locally arbitrary but unique identifier associated with this SNMP notify entry.
tag <1-255
characters>
Defines a tag of 255 characters maximum that contains a tag value which is used to select
entries in the Target Address Table. Any entry in the snmpTargetAddrTable, that
matches the value of this tag, is selected.
del
cur
Description
mgmt
user
http disable|enable Enables or disables HTTP (Web) access to the Browser-based Interface. It is enabled by
default.
https
Sets the switch port used for serving switch Web content. The default is HTTP port 80.
snmp disable|readonly|read-write
Sets an optional telnet server port number for cases where the server listens for telnet sessions
on a non-standard port.
Sets an optional telnet server port number for cases where the server listens for TFTP sessions
on a non-standard port.
cur
Description
cur
Description
uid <1-10>
eject <1-10>
usrpw <1-128 characters> Sets the user (user) password (maximum 128 characters). The user has no direct
responsibility for switch management. He or she can view switch status information
and statistics, but cannot make any configuration changes.
Sets the operator (oper) password (maximum 128 characters). The operator
manages all functions of the switch. He or she can view all switch information and
statistics and can reset ports or the entire switch.
admpw <1-128 characters> Sets the administrator (admin) password (maximum 128 characters). The super user
administrator has complete access to all menus, information, and configuration
commands on the switch, including the ability to change both the user and
administrator passwords.
Displays the current user status.
cur
User ID configuration
Command: /cfg/sys/access/user/uid
[User ID 1
cos
name
pswd
ena
dis
del
cur
Menu]
- Set class of service
- Set user name
- Set user password
- Enable user ID
- Disable user ID
- Delete user ID
- Display current user configuration
Description
cos
<user|oper|admin>
name <1-8
characters>
pswd <1-128
characters>
ena
dis
del
cur
The following table describes the HTTPS Access Configuration Menu options.
Table 98 HTTPS Access Configuration Menu options
Command
Description
access enable|disable
Enables or disables BBI access (Web access) using HTTPS. The default value is
disabled.
generate
Allows you to generate a certificate to connect to the SSL to be used during the key
exchange. A default certificate is created when HTTPS is enabled for the first time. The
user can create a new certificate defining the information that they want to be used in
the various fields. For example:
Country Name (2 letter code) [ ]: CA
State or Province Name (full name) [ ]: Ontario
Locality Name (for example, city) [ ]: Ottawa
Organization Name (for example, company) [ ]: Hewlett-Packard
Organizational Unit Name (for example, section) [ ]: ProLiant
Common Name (for example, users name) [ ]: Mr Smith
Email (for example, email address) [ ]: [email protected]
You must confirm if you want to generate the certificate. It takes approximately
30 seconds to generate the certificate. Then the switch restarts SSL agent.
certSave
Allows the client, or the Web browser, to accept the certificate and save the certificate
to Flash to be used when the switch is rebooted.
cur
Port configuration
Command:
[Port 1 Menu]
gig
- Gig Phy Menu
aclqos
- Acl/Qos Configuration Menu
8021ppri - Set default 802.1p priority
pvid
- Set default port VLAN id
name
- Set port name
rmon
- Enable/Disable RMON for port
tag
- Enable/disable VLAN tagging for port
tagpvid - Enable/disable tagging on pvid
media
- Current media copper/fiber
fiber
- Set fiber
copper
- Set copper
automedia - Set Auto
brate
- Set BroadCast Threshold
mrate
- Set MultiCast Threshold
drate
- Set Dest. Lookup Fail Threshold
ena
- Enable port
dis
- Disable port
cur
- Display current port configuration
This menu enables you to configure settings for individual switch ports. This command is enabled by default.
NOTE: Port 19 is reserved for switch management.
The following table describes the Port Configuration Menu options.
Configuration Menu 106
Description
gig
aclqos
8021ppri
pvid <1-4095>
Sets the default VLAN number which will be used to forward frames
which are not VLAN tagged. The default number is 1.
Note: VLAN 4095 is reserved for switch management.
Sets a name for the port (maximum 64 characters). The assigned port
name displays next to the port number on some information and statistics
screens.
rmon enable|disable
tag enable|disable
tagpvid enable|disable
Disables or enables VLAN tag persistence. When disabled, the VLAN tag
is removed from packets whose VLAN tag matches the port PVID. The
default value is enabled.
*media
auto
This option is only available on uplink ports.
This option applies only to the GbE2c Layer 2/3 Ethernet Blade Switch.
*fiber
*copper
*automedia
brate <0-262143>|dis
Limits the number of broadcast packets per second to the specified value.
If disabled (dis), the port forwards all broadcast packets.
mrate <0-262143>|dis
Limits the number of multicast packets per second to the specified value. If
disabled (dis), the port forwards all multicast packets.
drate <0-262143>|dis
Limits the number of unknown unicast packets per second to the specified
value. If disabled (dis), the port forwards all unknown unicast packets.
ena
dis
cur
* indicates commands that are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Menu]
- Set link speed
- Set full or half duplex mode
- Set flow control
- Set auto negotiation
- Display current gig link configuration
Use these menu options to set port parameters for the port link.
Link menu options are described in the following table and display on the Gigabit port configuration menus for the
switch. Using these configuration menus, you can set port parameters such as speed, duplex, flow control, and
negotiation mode for the port link.
The following table describes the Gigabit Link Configuration Menu options.
Table 100 Gigabit Link Configuration Menu options
Command
Description
speed 10|100|1000|any
Sets the link speed. Not all options are valid on all ports. The choices include:
10 Mb/s
100 Mb/s
1000 Mb/s
any, for automatic detection (default)
Note: Ports 1-18 are set to 1000 Mb/s, and cannot be changed.
mode full|half|any
Sets the operating mode. Not all options are valid on all ports. The choices
include:
Full-duplex
Half-duplex
Any, for automatic detection (default)
Note: Ports 1-18 are set to full duplex, and cannot be changed.
fctl rx|tx|both|none
auto on|off
cur
Description
cur
Layer 2 configuration
Command: /cfg/l2
[Layer 2 Menu]
8021x
mrst
stp
fdb
trunk
thash
lacp
vlan
upfast
update
cur
-
802.1x Menu
Multiple Spanning Tree/Rapid Spanning Tree Menu
Spanning Tree Menu
FDB Menu
Trunk Group Menu
IP Trunk Hash Menu
Link Aggregation Control Protocol Menu
VLAN Menu
Enable/disable Uplink Fast
UplinkFast station update rate
Display current layer 2 parameters
Description
8021x
mrst
Displays the Rapid Spanning Tree/Multiple Spanning Tree Protocol Configuration Menu.
stp
fdb
trunk <1-12>
Displays the Trunk Group Configuration Menu for the selected trunk (1-12).
thash
lacp
vlan <1-4095>
upfast enable|disable Enables or disables Fast Uplink Convergence, which provides rapid Spanning Tree
convergence to an upstream switch during failover.
Note: When enabled, this feature increases bridge priorities to 65500 for all STGs and
path cost by 3000 for all external STP ports.
update <10-200>
cur
802.1x configuration
Command: /cfg/l2/8021x
Configuration Menu 109
Description
global
ena
dis
cur
Description
mode forceunauth|auto|force-auth
qtperiod <0-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAPRequest/ Identity frame to the supplicant (client) after an authentication failure
in the previous round of authentication. The default value is 60 seconds.
txperiod <1-65535>
suptmout <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response packet
from the supplicant (client) before retransmitting the EAP-Request packet to the
authentication server. The default value is 30 seconds.
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits for a response from the Radius
server before declaring an authentication timeout. The default value is 30
seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicants (clients) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout (default is 3 seconds).
Description
maxreq <1-10>
raperiod <1-604800>
reauth on|off
default
cur
Description
mode forceunauth|auto|force-auth
qtperiod <0-65535>
Sets the time, in seconds, the authenticator waits before transmitting an EAPRequest/ Identity frame to the supplicant (client) after an authentication failure
in the previous round of authentication. The default value is 60 seconds.
txperiod <1-65535>
suptmout <1-65535>
Sets the time, in seconds, the authenticator waits for an EAP-Response packet
from the supplicant (client) before retransmitting the EAP-Request packet to the
authentication server. The default value is 30 seconds.
svrtmout <1-65535>
Sets the time, in seconds, the authenticator waits for a response from the
RADIUS server before declaring an authentication timeout. The default value is
30 seconds.
The time interval between transmissions of the RADIUS Access-Request packet
containing the supplicants (clients) EAP-Response packet is determined by the
current setting of /cfg/sys/radius/timeout (default is 3 seconds).
maxreq <1-10>
Description
raperiod <1-604800>
reauth on|off
default
cur
Description
cist
Configures a name for the MSTP region. All devices within a MSTP region must
have the same region name.
rev <0-65535>
Configures the revision level for the MSTP region. The revision level is used as a
numerical identifier for the region. All devices within a MSTP region must have the
same revision level number. The range is 0-65535.
maxhop <4-60>
Configures the maximum number of bridge hops a packet may to traverse before
it is dropped. The range is from 4 to 60 hops. The default is 20.
mode rstp|mstp
Selects either Rapid Spanning Tree mode (rstp) or Multiple Spanning Tree mode
(mstp). The default mode is RSTP.
on
off
cur
NOTE:
IEEE 802.1w standard-based RSTP implementation runs on one STG (i.e. same as one spanning tree
instance) only. As a result, if rstp mode is selected under the /cfg/mrst/mode command, then only a
single RSTP instance (default for STG 1) is supported for all VLANs, including the Default VLAN 1.
If multiple spanning tree instances are required, then select mstp mode so that multiple VLANs are
handled by multiple spanning tree instances, as specified by IEEE 802.1s standard-based MSTP
implementation.
IEEE 802.1s MSTP supports rapid convergence using IEEE 802.1w RSTP.
PVST+ does not support rapid convergence in current versions.
NOTE:
The following configurations are unsupported:
HP PVST+ (default Spanning Tree setting) is NOT interoperable with Cisco Rapid PVST+.
HP MSTP/RSTP (with mode set to either mstp or rstp) is NOT interoperable with Cisco Rapid PVST+.
Description
brg
add <1-4095>
Adds VLANs to the CIST. Enter one VLAN per line, and press Enter to add the VLANs.
default
cur
Priority (0-65535)
Max Age (6-40 secs)
Forward Delay (4-30 secs)
CIST bridge parameters
CIST bridge parameters are used only when the switch is in MSTP mode. CIST parameters do not affect operation of
STP/PVST.
The following table describes the commands used to configure CIST Bridge Configuration Menu options parameters.
Table 108 CIST Bridge Configuration Menu options
Command
Description
prior <0-65535>
Configures the CIST bridge priority. The bridge priority parameter controls which bridge on
the network is the MSTP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other
switches and bridges on your network. The lower the value, the higher the bridge priority.
The range is 0 to 65535, and the default is 32768.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
mxage <6-40>
Configures the CIST bridge maximum age. The maximum age parameter specifies the
maximum time the bridge waits without receiving a configuration bridge protocol data unit
before it reconfigures the MSTP network. The range is 6 to 40 seconds, and the default is 20
seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
fwd <4-30>
Configures the CIST bridge forward delay parameter. The forward delay parameter
specifies the amount of time that a bridge port has to wait before it changes from the
listening state to the learning state and from the learning state to the forwarding state. The
range is 4 to 30 seconds, and the default is 15 seconds.
This command does not apply to RSTP. See the "Bridge Spanning Tree configuration"
section for more information.
cur
1
-
Menu]
Set port Priority (0-240)
Set port Path Cost (1-200000000)
Set CIST port Hello Time (1-10 secs)
Set MSTP link type (auto, p2p, or shared; default: auto)
Enables or disables this port as an edge port
Turn port's Spanning Tree ON
Turn port's Spanning Tree OFF
Display current port Spanning Tree parameters
CIST port parameters are used to modify MRST operation on an individual port basis. CIST parameters do not affect
operation of STP/PVST.
For each port, CIST is turned on by default. Port parameters include:
Port priority
Link type
Edge
On and off
Configuration Menu 114
Description
prior <0-240>
Configures the CIST port priority. The port priority helps determine which bridge port
becomes the designated port. In a network topology that has multiple bridge ports
connected to a single segment, the port with the lowest port priority becomes the
designated port for the segment. The range is 0 to 240, in steps of 16 (0, 16, 32...),
and the default is 128.
cost <1-200000000>
Configures the CIST port path cost. The port path cost is used to help determine the
designated port for a segment. Generally speaking, the faster the port, the lower the
path cost. The default is 20000 for Gigabit ports.
hello <1-10>
Configures the CIST port Hello time. The Hello time specifies how often the root
bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is
not the root bridge uses the root bridge Hello value. The range is 1 to 10 seconds,
and the default is 2 seconds.
link auto|p2p|shared
edge disable|enable
Enables or disables this port as an edge port. An edge port is not connected to a
bridge, and can begin forwarding traffic as soon as the link is up. Configure server
ports as edge ports (enabled). This command is disabled by default.
on
off
cur
The following table describes the Spanning Tree Configuration Menu options.
Table 110 Spanning Tree Configuration Menu options
Command
Description
brg
add <1-4095>
remove <1-4095>
Breaks the association between a VLAN and a spanning tree and requires an
external VLAN ID as a parameter.
clear
on
off
default
cur
Bridge priority
Forwarding delay
The following table describes the Bridge Spanning Tree Configuration Menu options.
Table 111 Bridge Spanning Tree Configuration Menu options
Command
Description
prior <0-65535>
Configures the bridge priority. The bridge priority parameter controls which bridge on the
network is the STP root bridge.
To make this switch the root bridge, configure the bridge priority lower than all other switches
and bridges on your network. The lower the value, the higher the bridge priority. The range is 0
to 65535, and the default is 32768.
RSTP/MSTP: The range is 0 to 61440, in steps of 4096 (0, 4096, 8192...), and the default is
32768.
This command does not apply to MSTP. See the Common Internal Spanning Tree configuration
section for more information.
hello <1-10>
Configures the bridge hello time. The hello time specifies how often the root bridge transmits a
configuration bridge protocol data unit (BPDU).
Any bridge that is not the root bridge uses the root bridge hello value. The range is 1 to 10
seconds, and the default is 2 seconds.
This command does not apply to MSTP. See the Common Internal Spanning Tree configuration
section for more information.
Description
mxage <6-40>
Configures the bridge maximum age. The maximum age parameter specifies the maximum time
the bridge waits without receiving a configuration bridge protocol data unit before it
reconfigures the STP network. The range is 6 to 40 seconds, and the default is 20 seconds.
This command does not apply to MSTP. See the Common Internal Spanning Tree configuration
section for more information.
fwd <4-30>
Configures the bridge forward delay parameter. The forward delay parameter specifies the
amount of time that a bridge port has to wait before it changes from the listening state to the
learning state and from the learning state to the forwarding state. The range is 4 to 30 seconds,
and the default is 15 seconds.
This command does not apply to MSTP. See the Common Internal Spanning Tree configuration
section for more information.
cur
When configuring STP bridge parameters, the following formulas must be used:
Port priority
The following table describes the Spanning Tree Port Configuration Menu options.
Table 112 Spanning Tree Port Configuration Menu options
Command
Description
prior <0-255>
Configures the port priority. The port priority helps determine which bridge port
becomes the designated port.
In a network topology that has multiple bridge ports connected to a single segment,
the port with the lowest port priority becomes the designated port for the segment.
The range is 0 to 255, and the default is 128.
RSTP/MSTP: The range is 0 to 240, in steps of 16 (0, 16, 32...) and the default is
128.
cost <1-200000000>
Configures the port path cost. The port path cost is used to help determine the
designated port for a segment. Generally speaking, the faster the port, the lower the
path cost.
The range is 1 to 65535. The default is 10 for 100Mb/s ports, and 1 for Gigabit
ports. A value of 0 indicates that the default cost will be computed for an autonegotiated link speed.
RSTP/MSTP: The range is 1 200000000, and the default it 20000 for Gigabit
ports.
Description
link auto|p2p|shared
edge disable|enable
Enables or disables this port as an edge port. An edge port is not connected to a
bridge, and can begin forwarding traffic as soon as the link is up. Configure server
ports as edge ports (enabled).
This command only applies when RSTP is turned on. See the Common Internal
Spanning Tree configuration section for more information.
fastfwd disable|enable
on
off
cur
The following table describes the Forwarding Database Configuration Menu options.
Table 113 FDB Configuration Menu options
Command
Description
static
aging <0-65535>
Configures the aging value for FDB entries. The default value is 300.
cur
The following table describes the Static FDB Configuration Menu options.
Table 114 Static FDB Configuration Menu options
Command
Description
cur
Trunk configuration
Command: /cfg/l2/trunk <1-12>
[Trunk group 1 Menu]
add
- Add port to trunk group
rem
- Remove port from trunk group
ena
- Enable trunk group
dis
- Disable trunk group
del
- Delete trunk group
cur
- Display current Trunk Group configuration
Trunk groups can provide super-bandwidth connections between switches or other trunk capable devices. A trunk is a
group of ports that act together, combining their bandwidth to create a single, larger port. Up to 12 trunk groups can
be configured on the switch, with the following restrictions.
Any physical switch port can belong to no more than one trunk group.
All ports in a trunk must have the same configuration for speed, flow control, and auto negotiation.
Trunking from other devices must comply with Cisco EtherChannel technology.
By default, port 17 and port 18 are trunked to support an internal switch-to-switch crosslink trunk. By default,
ports 17 and 18 are disabled.
NOTE: See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for
information on how to use port trunks.
The following table describes the Trunk Group Configuration Menu options.
Table 115 Trunk Group Configuration Menu options
Command
Description
ena
dis
del
cur
Description
set
cur
Trunk hash parameters are set globally for the GbE2c. You can enable one or two parameters, to configure any of
the following valid combinations:
The following table describes the IP Trunk Hash Configuration Menu options.
Table 117 IP Trunk Hash Set Menu options
Command
Description
smac enable|disable
dmac enable|disable
sip enable|disable
dip enable|disable
cur
Description
sysprio <1-65535>
Defines the priority value (1 through 65535) for the switch. Lower
numbers provide higher priority. The default value is 32768.
timeout short|long
Defines the timeout period before invalidating LACP data from a remote
partner. Choose short (3 seconds) or long (90 seconds). The default
value is long.
Note: HP recommends that you use a timeout value of long, to reduce
LACPDU processing. If your switchs CPU utilization rate remains at 100%
for periods of 90 seconds or more, consider using static trunks instead of
LACP.
cur
Description
mode off|active|passive
prio <1-65535>
Sets the priority value for the selected port. Lower numbers provide higher
priority. Default is 128.
adminkey <1-65535>
Set the admin key for this port. Only ports with the same admin key and oper
key (operational state generated internally) can form a LACP trunk group.
cur
VLAN configuration
Command: /cfg/l2/vlan <1-4095>
[VLAN 1 Menu]
name
stg
add
rem
def
ena
dis
del
cur
The commands in this menu configure VLAN attributes, change the status of the VLAN, delete the VLAN, and change
the port membership of the VLAN.
By default, the VLAN menu option is disabled except VLAN 1, which is always enabled. The GbE2c supports a
maximum of 1,000 VLANs. VLAN 4095 is reserved for switch management.
NOTE: See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for information on
VLANs.
The following table describes the VLAN Configuration Menu options.
Table 120 VLAN Configuration Menu options
Command
Description
Assigns a name to the VLAN or changes the existing name. The default
VLAN name is the first one.
stg <1-32>
Defines which ports are members of this VLAN. Every port must be a
member of at least one VLAN. By default, it defines ports to VLAN 1.
ena
dis
del
cur
IMPORTANT: All ports must belong to at least one VLAN. Any port which is removed from a VLAN and which
is not a member of any other VLAN is automatically added to default VLAN #1. You cannot remove a port
from VLAN #1 if the port has no membership in any other VLAN. Also, you cannot add a port to more than
one VLAN unless the port has VLAN tagging turned on. See the tag command, in the Port configuration
section earlier in this chapter.
Layer 3 configuration
Command: /cfg/l3
[Layer 3 Menu]
if
gw
route
arp
frwd
nwf
rmap
rip
ospf
igmp
dns
bootp
vrrp
cur
-
Interface Menu
Default Gateway Menu
Static Route Menu
ARP Menu
Forwarding Menu
Network Filters Menu
Route Map Menu
Routing Information Protocol Menu
Open Shortest Path First (OSPF) Menu
IGMP Menu
Domain Name System Menu
Bootstrap Protocol Relay Menu
Virtual Router Redundancy Protocol Menu
Display current IP configuration
Description
if <1-256>
gw <1-4>
*route
arp
Description
*frwd
*nwf <1-256>
*rmap <1-32>
*rip
*ospf
igmp
dns
*bootp
*vrrp
cur
* indicates menus that are available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
IP interface configuration
Command: /cfg/l3/if <1-256>
[IP Interface
addr
mask
vlan
ena
dis
del
cur
1
-
Menu]
Set IP address
Set subnet mask
Set VLAN number
Enable IP interface
Disable IP interface
Delete IP interface
Display current interface configuration
The switch can be configured with up to 256 IP interfaces. Each IP interface represents the switch on an IP subnet on
your network. The IP Interface option is disabled by default.
The following table describes the IP Interface Configuration Menu options.
Table 122 IP Interface Configuration Menu options
Command
Description
Configures the IP address of the switch interface, using dotted decimal notation. For
example, 192.2.14.101
Configures the IP subnet address mask for the interface using dotted decimal
notation. For example, 255.255.255.0
vlan <1-4095>
Configures the VLAN number for this interface. Each interface can belong to one
VLAN, though any VLAN can have multiple IP interfaces in it.
ena
dis
del
cur
NOTE: If you enter an IP address for interface 1, you are prompted to change the BOOTP setting.
Description
Configures the IP address of the default IP gateway using dotted decimal notation. For
example, 192.4.17.44
intr <0-60>
The switch pings the default gateway to verify that it is up. The intr option sets the time
between health checks. The range is from 0 to 60 seconds. The default is 2 seconds.
retry <1-120>
Sets the number of failed health check attempts required before declaring this default
gateway inoperative. The range is from 1 to 120 attempts. The default is 8 attempts.
arp disable|enable
Enables or disables Address Resolution Protocol (ARP) health checks. This command is
disabled by default.
ena
dis
del
cur
Description
Removes a static route. The destination address of the route to remove must be
specified using dotted decimal notation.
cur
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves a physical
address from an IP address. ARP queries machines on the local network for their physical addresses. ARP also
maintains IP to physical address pairs in its cache memory. In any IP communication, the ARP cache is consulted to
see if the IP address of the computer or the router is present in the ARP cache. Then the corresponding physical
address is used to send a packet.
The following table describes the ARP Configuration Menu options.
Table 125 ARP Configuration Menu options
Command
Description
rearp <2-120>
Defines re-ARP period in minutes. You can set this duration between two and 120 minutes.
cur
IP Forwarding configuration
Command: /cfg/l3/frwd
[IP Forwarding Menu]
dirbr
- Enable/disable forwarding directed broadcasts
on
- Globally turn IP Forwarding ON
off
- Globally turn IP Forwarding OFF
cur
- Display current IP Forwarding configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the IP Forwarding Configuration Menu options.
Table 126 IP Forwarding Configuration Menu options
Command
Description
dirbr disable|enable
on
off
cur
The following table describes the Network Filter Configuration Menu options.
Table 127 Network Filter Configuration Menu options
Command
Description
Sets the starting IP address for this filter. The default address is 0.0.0.0
Sets the IP subnet mask that is used with /cfg/l3/nwf/addr to define the
range of IP addresses that will be accepted by the peer when the filter is
enabled. The default value is 0.0.0.0
enable
disable
delete
current
1
-
Menu]
Access List number
AS Filter Menu
Set as-path prepend of the matched route
Set local-preference of the matched route
Set metric of the matched route
Set OSPF metric-type of the matched route
Set the precedence of this route map
Set weight of the matched route
Enable route map
Disable route map
Delete route map
Display current route map configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Routing maps control and modify routing information. The map number (1-32) represents the routing map you wish to
configure.
The following table describes the Route Map Configuration Menu options.
Table 128 Route Map Configuration Menu options
Command
Description
alist <1-8>
aspath <1-8>
ap <AS number> [<AS number>] [<AS Sets the AS path preference of the matched route. One to three path
number>]|none
preferences can be configured.
lp <0-4294967294>|none
Sets the local preference of the matched route, which affects both
inbound and outbound directions. The path with the higher preference is
preferred.
metric <0-4294967294>|none
type 1|2|none
prec <1-256>
Sets the precedence of the route map. The smaller the value, the higher
the precedence. Default value is 10.
weight <0-65534>|none
Description
enable
disable
delete
cur
1 Menu]
Network Filter number
Metric
Set Network Filter action
Enable Access List
Disable Access List
Delete Access List
Display current Access List configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The route map number (1-32) and the access list number (1-8) represent the IP access list you wish to configure. The
following table describes the IP Access List Configuration Menu options.
Table 129 IP Access List Configuration Menu options
Command
Description
nwf <1-256>
metric <1-4294967294>|none
action permit|deny
enable
disable
delete
cur
The rmap number (1-32) and the path number (1-8) represent the AS path you wish to configure. The following table
describes the Autonomous System Path Configuration Menu options.
Table 130 Autonomous System Path Configuration Menu options
Command
Description
as <1-65535>
action permit|deny
enable
disable
delete
cur
Description
if <1-256>
update <1-120>
Configures the time interval for sending for RIP table updates, in seconds.
The default value is 30 seconds.
redist
on
off
cur
Description
version 1|2|both
supply disable|enable
When enabled, the switch supplies routes to other routers. This command is
enabled by default.
listen disable|enable
When enabled, the switch learns routes from other routers. This command is
enabled by default.
poison disable|enable
When enabled, the switch uses split horizon with poisoned reverse. When
disabled, the switch uses only split horizon. The default value is disabled.
split disable|enable
trigg disable|enable
mcast disable|enable
default disable|enable
When enabled, the switch accepts RIP default routes from other routers, but
gives them lower priority than configured default gateways. When disabled,
the switch rejects RIP default routes. The default value is disabled.
metric <1-15>
Configures the route metric, which indicates the relative distance to the
destination. The default value is 1.
auth none|password
key
enable
disable
cur
Description
Adds selected routing maps to the RIP route redistribution list. To add all the 32
route maps, enter all. To add specific route maps, enter routing map numbers
one per line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of the
redistribution protocol matched by the route maps in the route redistribution list
will be redistributed.
Removes the route map from the RIP route redistribution list.
Removes routing maps from the list. To remove all 32 route maps, enter all.
To remove specific route maps, enter routing map numbers one per line, NULL
at end.
export <1-15>|none
Exports the routes of this protocol in which the metric and metric type are
specified. To remove a previous configuration and stop exporting the routes of
the protocol, enter none.
cur
The following table describes the Open Shortest Path First Menu options.
Table 134 OSPF Configuration Menu options
Command
Description
aindex <0-2>
Displays the area index menu. This area index does not represent the
actual OSPF area number.
range <1-16>
if <1-256>
virt <1-3>
Displays the Virtual Links menu used to configure OSPF for a Virtual
Link.
host <1-128>
Displays the menu for configuring OSPF for the host routes. Up to 128
host routes can be configured. Host routes are used for advertising
network device IP addresses to external networks to perform server load
balancing within OSPF. It also makes Area Border Route (ABR) load
sharing and ABR failover possible.
redist <fixed|static|rip>
lsdb <0-2000>
Sets the link state database limit. Enter 0 (zero) for no limit.
on
Enables OSPF.
off
Disables OSPF.
cur
The following table describes the Area Index Configuration Menu options.
Table 135 OSPF Area Index Configuration Menu options
Command
Description
type transit|stub|nssa
Defines the type of area. For example, when a virtual link has to be
established with the backbone, the area type must be defined as
transit.
Transit area: allows area summary information to be
exchanged between routing devices. Any area that is not a stub
area or NSSA is considered to be transit area.
Stub area: is an area where external routing information is not
distributed. Typically, a stub area is connected to only one other
area.
NSSA: Not-So-Stubby Area (NSSA) is similar to stub area with
additional capabilities. For example, routes originating from
within the NSSA can be propagated to adjacent transit and
backbone areas. External routes from outside the Autonomous
System (AS) can be advertised within the NSSA but are not
distributed into other areas.
metric <1-65535>
auth none|password|md5
spf <0-255>
Sets time interval between two successive SPF (shortest path first)
calculations of the shortest path tree using the Dijkstras algorithm.
enable
disable
delete
cur
Range 1 Menu]
- Set IP address
- Set IP mask
- Set area index
- Enable/disable hide range
- Enable range
- Disable range
- Delete range
- Display current OSPF summary range configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the OSPF Summary Range Configuration Menu options.
Table 136 OSPF Summary Range Configuration Menu options
Command
Description
aindex <0-2>
hide disable|enable
enable
disable
delete
cur
1 Menu]
Set area index
Set interface router priority
Set interface cost
Set hello interval in seconds
Set dead interval in seconds
Set transit delay in seconds
Set retransmit interval in seconds
Set authentication key
Set MD5 key ID
Enable interface
Disable interface
Delete interface
Display current OSPF interface configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the OSPF Interface Configuration Menu options.
Table 137 OSPF Interface Configuration Menu options
Command
Description
aindex <0-2>
prio <0-255>
cost <1-65535>
Configures cost set for the selected pathpreferred or backup. Usually the cost
is inversely proportional to the bandwidth of the interface. Low cost indicates
high bandwidth.
hello <1-65535>
Configures the interval in seconds between the hello packets for the
interfaces.
dead <1-65535>
trans <1-3600>
retra <1-3600>
mdkey <1-255>|none
enable
Description
disable
delete
cur
Link 1 Menu]
- Set area index
- Set hello interval in seconds
- Set dead interval in seconds
- Set transit delay in seconds
- Set retransmit interval in seconds
- Set router ID of virtual neighbor
- Set authentication key
- Set MD5 key ID
- Enable interface
- Disable interface
- Delete interface
- Display current OSPF interface configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the OSPF Virtual Link Configuration Menu options.
Table 138 OSPF Virtual Link Configuration Menu options
Command
Description
aindex <0-2>
hello <1-65535>
dead <1-65535>
trans <1-3600>
retra <1-3600>
key <password>
Configures the password (up to eight characters) for each virtual link.
Default is none.
mdkey <1-255>|none
enable
disable
delete
cur
Description
Configures the base IP address for the host entry. For example,
100.10.1.1
aindex <0-2>
cost <1-65535>
enable
disable
delete
cur
Description
Adds selected routing maps to the rmap list. To add all the 32 route maps,
enter all. To add specific route maps, enter routing map numbers one per
line, NULL at the end.
This option adds a route map to the route redistribution list. The routes of the
redistribution protocol matched by the route maps in the route redistribution list
will be redistributed.
Exports the routes of this protocol as external OSPF AS-external LSAs in which
the metric and metric type are specified. To remove a previous configuration
and stop exporting the routes of the protocol, enter none.
cur
1
-
Menu]
Set authentication key
Delete key
Display current MD5 key configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The following table describes the OSPF MD5 Key Configuration Menu options.
Table 141 OSPF MD5 Key Configuration Menu options
Command
Description
key
delete
cur
IGMP configuration
Command: /cfg/l3/igmp
[IGMP Menu]
snoop
mrouter
igmpflt
on
off
cur
IGMP Snooping allows the switch to forward multicast traffic only to those ports that request it. IGMP Snooping
prevents multicast traffic from being flooded to all ports. The switch learns which server hosts are interested in
receiving multicast traffic, and forwards it only to ports connected to those servers.
The following table describes the IGMP Menu options.
Table 142 IGMP Snoop Menu options
Command
Description
snoop
mrouter
igmpflt
on
off
cur
Description
timeout <1-255>
Sets the Maximum Response Time (MRT) for IGMP hosts. MRT is one of the
parameters used to determine the age out period of the IGMP hosts.
Increasing the timeout increases the age out period.
The range is from 1 to 255 seconds. The default is 10 seconds
mrto <1-600>
Configures the age-out period for the IGMP Mrouters in the Mrouter table. If
the switch does not receive a General Query from the Mrouter for mrto
seconds, the switch removes the multicast router from its Mrouter table.
The range is from 1 to 600 seconds. The default is 255 seconds.
qintrval <1-600>
Sets the IGMP router query interval. The range is 1-600 seconds. The default
value is 125.
robust <2-10>
Configures the IGMP Robustness variable, which allows you to tune the
switch for expected packet loss on the subnet. If the subnet is expected to be
lossy (high rate of packet loss), then increase the value. The default value is
2.
aggr disable|enable
Configures the source IP address used as a proxy for IGMP Group Specific
Queries.
add <1-4095>
rem <1-4095>
clear
fastlv <1-4095> disable|enable Enables or disables FastLeave processing. FastLeave allows the switch to
immediately remove a port from the IGMP port list, if the host sends a Leave
message, and the proper conditions are met. This command is disabled by
default.
ena
dis
cur
The following table describes the Static Multicast Router Configuration Menu options.
NOTE: When you configure a static multicast router on a VLAN, the process of learning multicast routers is
disabled for that VLAN.
Table 144 IGMP Static Multicast Router Menu
Command
Description
NOTE:
remove <port number> <1-4095> <1-2> Removes a static multicast router from the selected port/VLAN
combination.
Displays the current IGMP Static Multicast Router parameters.
cur
Description
filter <1-16>
ena
dis
cur
Description
action allow|deny
ena
dis
del
cur
Description
filt enable|disable
add <1-16>
rem <1-16>
cur
Description
Sets the IP address for your primary DNS server. Use dotted
decimal notation. For example, 192.4.17.41
cur
Description
on
off
cur
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
Virtual Router Redundancy Protocol (VRRP) support on the GbE2c provides redundancy between routers in a LAN.
This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRPcapable routing device. One of the virtual routers is then elected as the master, based on a number of priority
criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual
routers will assume routing authority and take control of the virtual router IP address.
By default, VRRP is disabled. For more information on VRRP, see the High Availability chapter in the HP GbE2c
Ethernet Blade Switch for c-Class BladeSystem Application Guide.
The following table describes the VRRP Configuration Menu options.
Table 150 VRRP Configuration Menu options
Command
Description
vr <1-255>
Displays the VRRP Virtual Router Menu. This menu is used for configuring up to
255 virtual routers on this switch.
group
Displays the VRRP virtual router group menu, used to combine all virtual routers
together as one logical entity. Group options must be configured when using
two or more GbE2c in a hot-standby failover configuration where only one
switch is active at any given time.
if <1-256>
track
Displays the VRRP Tracking Menu. This menu is used for weighting the criteria
used when modifying priority levels in the master router election process.
on
off
cur
Router 1 Menu]
- Priority Tracking Menu
- Set virtual router ID
- Set IP address
- Set interface number
- Set renter priority
- Set advertisement interval
- Enable/disable preemption
- Enable virtual router
- Disable virtual router
- Delete virtual router
- Display current VRRP virtual router configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
This menu is used for configuring virtual routers for this switch. A virtual router is defined by its virtual router ID and
an IP address. On each VRRP-capable routing device participating in redundancy for this virtual router, a virtual
router will be configured to share the same virtual router ID and IP address.
Configuration Menu 141
Description
track
Displays the VRRP Priority Tracking Menu for this virtual router. Tracking is a
proprietary extension to VRRP, used for modifying the standard priority system
used for electing the master router.
vrid <1-255>
Defines the virtual router ID. This is used in conjunction with addr (below) to
define a virtual router on this switch. To create a pool of VRRP-enabled routing
devices which can provide redundancy to each other, each participating VRRP
device must be configured with the same virtual router: one that shares the
same vrid and addr combination.
The vrid for standard virtual routers (where the virtual router IP address is not
the same as any virtual server) can be any integer between 1 and 255. The
default value is 1.
All vrid values must be unique within the VLAN to which the virtual routers IP
interface belongs.
Defines the IP address for this virtual router using dotted decimal notation. This
is used in conjunction with the vrid (above) to configure the same virtual
router on each participating VRRP device. The default address is 0.0.0.0
if <1-256>
Selects a switch IP interface. If the IP interface has the same IP address as the
addr option above, this switch is considered the owner of the defined virtual
router. An owner has a special priority of 255 (highest) and will always
assume the role of master router, even if it must preempt another virtual router
which has assumed master routing authority. This preemption occurs even if the
preem option below is disabled. The default value is 1.
prio <1-254>
Defines the election priority bias for this virtual server. This can be any integer
between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual routers IP address (addr) is the same as
the one used by the IP interface, the priority for this virtual router will
automatically be set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/track or
/cfg/l3/vrrp/vr #/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default value is 1.
preem disable|enable
ena
dis
del
cur
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
This menu is used for modifying the priority system used when electing the master router from a pool of virtual routers.
Various tracking criteria can be used to bias the election results. Each time one of the tracking criteria is met, the
priority level for the virtual router is increased by an amount defined through the VRRP Tracking Menu.
Criteria are tracked dynamically, continuously updating virtual router priority levels when enabled. If the virtual router
preemption option is enabled, this virtual router can assume master routing authority when its priority level rises
above that of the current master.
Some tracking criteria (vrs, ifs, and ports below) apply to standard virtual routers, otherwise called virtual
interface routers. A virtual server router is defined as any virtual router whose IP address (addr) is the same as any
configured virtual server IP address.
The following table describes the Virtual Router Priority Tracking Configuration Menu options.
Table 152 Virtual Router Priority Tracking Configuration Menu options
Command
Description
vrs disable|enable
When enabled, the priority for this virtual router will be increased for each
virtual router in master mode on this switch. This is useful for making sure that
traffic for any particular client/server pairing are handled by the same switch,
increasing routing and load balancing efficiency. This command is disabled by
default.
ifs disable|enable
When enabled, the priority for this virtual router will be increased for each
other IP interface active on this switch. An IP interface is considered active
when there is at least one active port on the same VLAN. This helps elect the
virtual routers with the most available routes as the master. This command is
disabled by default.
ports disable|enable
When enabled, the priority for this virtual router will be increased for each
active port on the same VLAN. A port is considered active if it has a link and
is forwarding traffic. This helps elect the virtual routers with the most available
ports as the master. This command is disabled by default.
cur
Displays the current configuration for priority tracking for this virtual router.
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
The Virtual Router Group menu is used for associating all virtual routers into a single logical virtual router, which
forces all virtual routers on the switch to either be master or backup as a group. A virtual router is defined by its
Configuration Menu 143
virtual router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this virtual
router, a virtual router will be configured to share the same virtual router ID and IP address.
The following table describes the Virtual Router Group Configuration Menu options.
Table 153 Virtual Router Group Configuration Menu options
Command
Description
track
Displays the VRRP Priority Tracking Menu for the virtual router group. Tracking
is a proprietary extension to VRRP, used for modifying the standard priority
system used for electing the master router.
vrid <1-255>
if <1-256>
prio <1-254>
Defines the election priority bias for this virtual router group. This can be any
integer between 1 and 254. The default value is 100.
During the master router election process, the routing device with the highest
virtual router priority number wins. If there is a tie, the device with the highest IP
interface address wins. If this virtual routers IP address (addr) is the same as
the one used by the IP interface, the priority for this virtual router will
automatically be set to 255 (highest).
When priority tracking is used (/cfg/l3/vrrp/track or
/cfg/l3/vrrp/vr #/track), this base priority value can be modified
according to a number of performance and operational criteria.
adver <1-255>
Defines the time interval between VRRP master advertisements. This can be any
integer between 1 and 255 seconds. The default is 1.
preem disable|enable
ena
dis
del
cur
Displays the current configuration information for the virtual router group.
NOTE: If Virtual Router Group Tracking is enabled, then the tracking option will be available only under group
option. The tracking setting for the other individual virtual routers will be ignored.
The following table describes the Virtual Router Group Priority Tracking Configuration Menu options.
Table 154 Virtual Router Group Priority Tracking Configuration Menu options
Command
Description
ifs disable|enable
When enabled, the priority for this virtual router will be increased for each
other IP interface active on this switch. An IP interface is considered active
when there is at least one active port on the same VLAN. This helps elect the
virtual routers with the most available routes as the master. This command is
disabled by default.
ports disable|enable
When enabled, the priority for this virtual router will be increased for each
active port on the same VLAN. A port is considered active if it has a link and
is forwarding traffic. This helps elect the virtual routers with the most available
ports as the master. This command is disabled by default.
cur
Displays the current configuration for priority tracking for this virtual router.
1 Menu]
Set authentication types
Set plain-text password
Delete interface
Display current VRRP interface configuration
NOTE: This menu is available only on the GbE2c Layer 2/3 Ethernet Blade Switch.
This menu is used for configuring VRRP authentication parameters for the IP interfaces used with the virtual routers.
The interface-number (1 to 255) represents the IP interface on which authentication parameters must be configured.
The following table describes the VRRP Interface Configuration Menu options.
Table 155 VRRP Interface Configuration Menu options
Command
Description
auth none|password
Defines the type of authentication that will be used: none (no authentication),
or password (password authentication).
passw <password>
Defines a plain text password up to eight characters long. This password will
be added to each VRRP packet transmitted by this interface when password
authentication is chosen (see auth above).
del
cur
NOTE: These priority tracking options only define increment values. These options do not affect the VRRP
master router election process until options under the VRRP Virtual Router Priority Tracking Menu are enabled.
The following table describes the VRRP Tracking Configuration Menu options.
Table 156 VRRP Tracking Configuration Menu options
Command
Description
vrs <0-254>
Defines the priority increment value (0 through 254) for virtual routers in master
mode detected on this switch. The default value is 2.
ifs <0-254>
Defines the priority increment value (0 through 254) for active IP interfaces
detected on this switch. The default value is 2.
ports <0-254>
Defines the priority increment value (0 through 254) for active ports on the
virtual routers VLAN. The default value is 2.
cur
- 802.1p Menu
Use the Quality of Service (QoS) menus to configure the IEEE 802.1p priority value of incoming packets. This allows
you to differentiate between various types of traffic, and provide different priority levels. The following table describes
the QoS Configuration Menu options.
Table 157 QoS Configuration Menu options
Command
Description
8021p
Description
Maps the 802.1p priority of to the Class of Service queue (COSq) priority.
Enter the 802.1p priority value (0-7); followed by the Class of Service queue
(0-1) that handles the matching traffic.
Configures the weight of the selected Class of Service queue (COSq). Enter the
queue number (0-1), followed by the scheduling weight (0-15).
cur
[ACL Menu]
acl
group
cur
Use this menu to create Access Control Lists (ACLs) and ACL Groups. ACLs define matching criteria used for IP
filtering and Quality of Service functions.
The following table describes the Access Control Configuration Menu options.
Table 159 Access Control Configuration Menu options
Command
Description
acl <1-762>
group <1-762>
cur
These menus allow you to define filtering criteria for each Access Control List (ACL). The following table describes the
ACL Configuration Menu options.
Table 160 ACL Configuration Menu options
Command
Description
ethernet
ipv4
tcpudp
meter
re-mark
pktfmt
action permit|deny|setprio <0-7> Configures a filter action for packets that match the ACL definitions. You
can choose to permit (pass) or deny (drop) packets, or set the 802.1p
priority for the packets.
stats e|d
Enables or disables the statistics collection for the Access Control List.
reset
Resets the ACL parameters to their default values and removes the ACL
from all ports to which it is assigned.
cur
Description
Defines the source MAC address and MAC mask for this ACL.
For example:
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc
Defines the destination MAC address and MAC mask for this
ACL. For example:
00:60:cf:40:56:00 ff:ff:ff:ff:ff:fc
etype ARP|IP|IPv6|MPLS|RARP|any|0xXXXX
pri <0-7>
reset
cur
Description
Defines a source IP address for the ACL. If defined, traffic with this source IP
address will match this ACL. Specify an IP address in dotted decimal notation.
For example, 100.10.1.1
Defines a destination IP address for the ACL. If defined, traffic with this
destination IP address will match this ACL. For example, 100.10.1.2
Description
proto <0-255>
Defines an IP protocol for the ACL. If defined, traffic from the specified protocol
matches this filter. Specify the protocol number. Listed below are some of the
well-known protocols.
Number Name
1
icmp
2
igmp
6
tcp
17
udp
89
ospf
112
vrrp
tos <0-255>
Defines a Type of Service value for the ACL. For more information on ToS, see
RFC 1340 and 1349.
reset
Resets the IPv4 parameters for the ACL to their default values.
cur
Description
Defines a source port for the ACL. If defined, traffic with the specified TCP or
UDP source port will match this ACL. Specify the port number. Listed below are
some of the well-known ports:
Number
Name
20
ftp-data
21
ftp
22
ssh
23
telnet
25
smtp
37
time
42
name
43
whois
53
domain
69
tftp
70
gopher
79
finger
80
http
dport <1-65535>
Defines a destination port for the ACL. If defined, traffic with the specified TCP
or UDP destination port will match this ACL. Specify the port number, just as
with sport above.
reset
Resets the TCP/UDP parameters for the ACL to their default values.
cur
This menu defines the metering profile for the selected ACL.
Table 164 ACL Meter Configuration Menu options
Command
Description
cir <64-1000000>
Configures the committed rate, in Kilobits per second. The committed rate must
be a multiple of 64.
mbsize <32-4096>
Configures the maximum burst size, in Kilobits. Enter one of the following
values for mbsize: 32, 64, 128, 256, 512, 1024, 2048, 4096
enable e|d
dpass drop|pass
reset
cur
In Profile Menu
Out Profile Menu
Reset re-mark settings
Display current settings
You can choose to re-mark IP header data for the selected ACL. You can configure different remark values, based on
whether packets fall within the ACL Metering profile, or out of the ACL Metering profile.
Table 165 ACL Re-mark Configuration Menu options
Command
Description
inprof
outprof
reset
cur
Description
up1p
updscp <0-63>
Sets the DiffServ Code Point (DSCP) of In-Profile packets to the selected value.
reset
cur
Description
value <0-7>
Defines 802.1p value. The value is the priority bits information in the packet
structure.
utosp enable|disable
reset
cur
Description
updscp <0-63>
Sets the DiffServ Code Point (DSCP) of Out-of-Profile packets to the selected
value. The switch sets the DSCP value on Out-of-Profile packets.
reset
Resets the update DSCP parameters for Out-of-Profile packets to their default
values.
cur
Description
ethfmt eth2|snap|llc
tagfmt none|tagged
reset
Resets Packet Format parameters for the ACL to their default values.
cur
Description
rem acl<1-762>
cur
Remote Monitoring (RMON) allows you to monitor traffic flowing through the switch. The RMON MIB is described in
RFC 1757.
Description
hist
event
alarm
cur
1
-
Menu]
Set interface MIB object to monitor
Set the number of requested buckets
Set polling interval
Set owner for the RMON group of statistics
Delete this history and restore defaults
Display current history configuration
Description
Configures the interface MIB Object Identifier. The IFOID must correspond to the
standard interface OID, as follows: 1.3.6.1.2.1.2.2.1.1.x
The interface OID can have a maximum of 127 characters.
rbnum <1-65535>
Configures the requested number of buckets, which is the number of discrete time
intervals over which data is to be saved.
The range is from 1 to 65535. The default is 30.
NOTE:
intrval <1-3600>
Configures the time interval over which the data is sampled for each bucket.
The range is from 1 to 3600 seconds. The default value is 1800 seconds.
Enter a text string that identifies the person or entity that uses this history index.
The owner can have a maximum of 127 characters.
delete
cur
Menu]
- Set description for the event
- Set event type
- Set owner for the event
- Delete this event and restore defaults
- Display current event configuration
Description
type none|log|trap|both
Selects the type of notification provided for this event. For log events, an entry is
made in the log table and sent to the configured syslog host. For trap events, an
SNMP trap is sent to the management station (/cfg/snmp/trap).
Enter a text string that identifies the person or entity that uses this event index.
The owner can have a maximum of 127 characters.
delete
cur
Menu]
- Set MIB oid datasource to monitor
- Set alarm interval
- Set sample type
- Set startup alarm type
- Set rising threshold
- Set falling threshold
- Set event index to fire on rising threshold crossing
- Set event index to fire on falling threshold crossing
- Set owner for the alarm
- Delete this alarm and restore defaults
- Display current alarm configuration
The Alarm RMON group can track rising or falling values for a MIB object. The MIB object must be a counter, gauge,
integer, or time interval. Each alarm index must correspond to an event index that triggers once the alarm threshold is
crossed.
The following table describes the RMON Alarm Menu options.
Table 174 RMON Alarm Menu options
Command
Description
intrval <1-65535>
Configures the time interval over which data is sampled and compared
with the rising and falling thresholds.
The range is from 1 to 65535 seconds. The default is 1800 seconds.
Description
sample abs|delta
almtype rising|falling|either
Configures the rising threshold for the sampled statistic. When the current
sampled value is greater than or equal to this threshold, and the value at
the last sampling interval was less than this threshold, a single event is
generated.
Configures the falling threshold for the sampled statistic. When the current
sampled value is less than or equal to this threshold, and the value at the
last sampling interval was greater than this threshold, a single event is
generated.
revtidx <0-65535>
Configures the rising alarm event index that is triggered when a rising
threshold is crossed.
The range is from 0 to 65535. The default value is 0.
fevtidx <0-65535>
Configures the falling alarm event index that is triggered when a falling
threshold is crossed.
The range is from 0 to 65535. The default value is 0.
Enter a text string that identifies the person or entity that uses this alarm
index.
The owner can have a maximum of 127 characters.
delete
cur
Port mirroring
Command: /cfg/pmirr
[Port Mirroring
mirror monport cur
-
Menu]
Enable/Disable Mirroring
Monitoring Port based PM Menu
Display All Mirrored and Monitoring Ports
The Port Mirroring Configuration Menu is used to configure, enable, and disable the monitored port. When enabled,
network packets being sent and/or received on a target port are duplicated and sent to a monitor port. By attaching
a network analyzer to the monitor port, you can collect detailed information about your network performance and
usage. Port mirroring is disabled by default.
NOTE: See the Troubleshooting tools appendix in the HP GbE2c Ethernet Blade Switch for c-Class
BladeSystem Application Guide for information on how to use port mirroring.
The following table describes the Port Mirroring Configuration Menu options.
Table 175 Port Mirroring Configuration Menu options
Command
Description
mirror disable|enable
cur
The following table describes the port-based Port Mirroring Configuration Menu options.
Table 176 Port Mirroring Configuration Menu options
Command
Description
Adds the port to be mirrored. This command also allows you to enter the
direction of the traffic. It is necessary to specify the direction because:
If the source port of the frame matches the mirrored port and the
mirrored direction is ingress or both (ingress and egress), the frame
is sent to the mirrored port.
If the destination port of the frame matches the mirrored port and
the mirrored direction is egress or both, the frame is sent to the
monitoring port.
delete
cur
Description
fdp
on
off
cur
Use these commands to configure a Failure Detection Pair, which consists of one Link to Monitor (LtM) and one Link to
Disable (LtD). When the switch detects a failure on the LtM, it automatically disables the ports in the LtD.
The following table describes the Failure Detection Pair (FDP) configuration Menu options.
Table 178 Failure Detection Pair Configuration Menu options
Command
Description
ltm
ltd
ena
dis
current
to Monitor Menu]
- Add port to Link to Monitor
- Remove port from Link to Monitor
- Add trunk to Link to Monitor
- Remove trunk from Link to Monitor
- Display current LtM configuration
The following table describes the Link to Monitor (LtM) Menu options. The LtM can consist of only one uplink port
(ports 20-24) or a single trunk containing only uplink ports.
Table 179 Link to Monitor Menu options
Command
Description
Adds a port to the LtM. Only uplink ports (20-24) are allowed in the LtM.
addtrnk <1-12>
Adds a trunk group to the LtM. The LtM trunk group can contain only uplink ports
(20-24).
remtrnk <1-12>
cur
to Disable Menu]
- Add port to Link to Disable
- Remove port from Link to Disable
- Add trunk to Link to Disable
- Remove trunk from Link to Disable
- Display current LtD configuration
The following table describes the Link to Disable (LtD) Menu options. The LtD can consist of any mix of downlink ports
(ports 1-16) and trunk groups that contain only downlink ports.
Table 180 Link to Disable Menu options
Command
Description
Adds a port to the current LtD group. Only downlink ports (1-16) are allowed in the LtD.
addtrunk <1-12>
Adds a trunk group to the current LtD group. LtD trunk groups can contain only downlink
ports (1-16).
remtrunk <1-12>
cur
Dump
Command: /cfg/dump
The dump program writes the current switch configuration to the terminal screen. To start the dump program, at the
Configuration# prompt, enter:
Configuration# dump
The configuration is displayed with parameters that have been changed from the default values. The screen display
can be captured, edited, and placed in a script file, which can be used to configure other switches. Paste the
configuration commands from the script file at the command line prompt of the switch. The active configuration can
also be saved or loaded via FTP/TFTP.
Where <FTP/TFTP server> is the FTP/TFTP server IP address or hostname and <filename> is the name of the target
script configuration file.
NOTE: The switch supports three configuration files: active, backup, and factory. See the Selecting a
configuration block section in the Boot Options Menu chapter for information on how to set which
configuration file to use upon boot up.
Operations Menu
Introduction
Operations-level commands are used for making immediate and temporary changes to switch configuration. The
Operations Menu is used for bringing ports temporarily in and out of service. This menu is available only from an
administrator and operator login.
Menu information
Command: /oper
[Operations Menu]
port
- Operational Port Menu
vrrp
- Operational Virtual Router Redundancy Menu
passwd
- Change current user password
clrlog
- Clear syslog messages
ntpreq
- Send NTP request
The following table describes the Operations Menu options.
Table 181 Operations Menu options
Command
Description
*vrrp
Displays the Operational Virtual Router Redundancy Menu. VRRP is available only on
the GbE2c Layer 2/3 Ethernet Blade Switch.
passwd <1-128
characters>
Allows the user to change the password. You need to enter the current password in
use for validation.
clrlog
ntpreq
Description
8021x
rmon disable|enable
Enables or disables Remote Monitoring for the port. RMON must be enabled for any
RMON configurations to function.
ena
Temporarily enables the port. The port will be returned to its configured operation mode
when the switch is reset.
NOTE:
This command does not enable a port that has been disabled by an ekeying mismatch error.
dis
Temporarily disables the port. The port will be returned to its configured operation mode
when the switch is reset.
cur
Operations Menu
160
Description
reset
Re-initializes the 802.1x access-control parameters for the port. The following actions take
place, depending on the 802.1x port configuration:
force unauth - the port is placed in unauthorized state, and traffic is blocked.
auto - the port is placed in unauthorized state, then authentication is initiated.
force auth - the port is placed in authorized state, and authentication is not
required.
reauth
Re-authenticates the supplicant (client) attached to the port. This command only applies if
the ports 802.1x mode is configured as auto.
Description
back <1-255>
Forces the specified master virtual router on this switch into backup mode. This is generally
used for passing master control back to a preferred switch once the preferred switch has
been returned to service after a failure. When this command is executed, the current master
gives up control and initiates a new election by temporarily advertising its own priority
level as 0 (lowest). After the new election, the virtual router forced into backup mode by
this command will resume master control in the following cases:
This switch owns the virtual router (the IP addresses of the virtual router and its IP
interface are the same)
This switchs virtual router has a higher priority and preemption is enabled.
There are no other virtual routers available to take master control.
Operations Menu
161
Selecting a switch software image to be used when the switch is next reset.
Menu information
Command: /boot
[Boot Options
image
conf
mode
prompt
gtimg
ptimg
reset
cur
Menu]
- Select software image to use on next boot
- Select config block to use on next boot
- Select CLI mode to use on next boot
- Prompt for selectable boot mode
- Download new software image via FTP/TFTP
- Upload selected software image via FTP/TFTP
- Reset switch [WARNING: Restarts Spanning Tree]
- Display current boot options
Each of the Boot Options Menu commands is discussed in greater detail in the following sections.
Downloading the new image from the FTP/TFTP server to the switch
Selecting the new software image to be loaded into switch memory the next time the switch is reset
The image or boot software loaded on a FTP or TFTP server on your network
NOTE: The DNS parameters must be configured if specifying hostnames. See the Domain name system
configuration section in the Configuration Menu chapter.
When the above requirements are met, use the following procedure to download the new software to your GbE2c
Ethernet Blade Switch.
1.
2.
Enter the name of the GbE2c Ethernet Blade Switch software to be replaced:
Enter name of switch software image to be replaced
["image1"/"image2"/"boot"]: <image>
3.
4.
5.
6.
7.
8.
If you are loading an image from which you are not currently booted, the system prompts you to change the
image.
image2 currently contains Software Version 2.0.0
that was downloaded at 15:46:36 Wed Apr 23, 2006.
New download will replace image2 with file "2.0.1_OS.img"
from TFTP server 192.168.2.4.
Confirm download operation [y/n]: y
Invoking TFTP over port 69...
Starting download...
File appears valid
Download in
progress....................................................
Image download complete (1333953 bytes)
Writing to flash...This takes about 90 seconds. Please wait
Write complete (1333953 bytes), now verifying FLASH...
Verification of new image2 in FLASH successful.
image2 now contains Software Version 2.0.1
Switch is currently set to boot software image1.
Do you want to change that to the new image2? [y/n] y
Next boot will use new software image2.
2.
Enter the name of the image you want the switch to use upon the next boot. The system informs you of which
image is currently set to be loaded at the next reset, and prompts you to enter a new choice:
Currently set to use switch software "image1" on next reset.
Specify new image to use on next reset ["image1"/"image2"]:
2.
The system prompts you for information. Enter the desired image:
Enter name of switch software image to be uploaded
["image1"|"image2"|"boot"]: <image> <hostname or server-IP-addr>
<server-filename>
3.
4.
Enter the name of the file into which the image will be uploaded on the FTP or TFTP server:
Enter name of file on FTP/TFTP server: <filename>
5.
6.
7.
The system then requests confirmation of what you have entered. To have the file uploaded, enter y.
image2 currently contains Software Version 2.0.0
Upload will transfer image2 (1889411 bytes) to file "test"
on TFTP server 192.1.1.1.
Confirm upload operation [y/n]: y
2.
Enter the name of the configuration block you want the switch to use.
The system indicates which configuration block is currently set to be loaded at the next reset, and prompts you
to enter a new choice:
Currently set to use active configuration block on next reset.
Specify new block to use ["active"/"backup"/"factory"]:
Maintenance Menu
Introduction
The Maintenance Menu is used for debugging purposes, enabling you to generate a technical support dump of the
critical state information in the switch, and to clear entries in the Forwarding Database and the Address Resolution
Protocol (ARP) and routing tables. This menu is available only from an administrator and operator login.
Menu information
Command: /maint
[Maintenance
sys
fdb
debug
arp
route
igmp
uudmp
ptdmp
cldmp
panic
tsdmp
pttsdmp
Menu]
- System Maintenance Menu
- Forwarding Database Manipulation Menu
- Debugging Menu
- ARP Cache Manipulation Menu
- IP Route Manipulation Menu
- IGMP Multicast Group Menu
- Uuencode FLASH dump
- Upload FLASH dump via FTP/TFTP
- Clear FLASH dump
- Dump state information to FLASH and reboot
- Tech support dump
- Upload tech support dump via FTP/TFTP
Dump information contains internal switch state data that is written to flash memory on the switch after any one of the
following occurs:
The switch administrator forces a switch panic. The panic option, found in the Maintenance Menu, causes the
switch to dump state information to flash memory, and then causes the switch to reboot.
The switch administrator enters the switch reset key combination (Ctrl-Shift-6) on a device that is attached
to the console port.
Usage
sys
fdb
debug
arp
route
igmp
uudmp
ptdmp
cldmp
panic
tsdmp
pttsdmp
Usage
Usage
Displays a single database entry by its MAC address. You are prompted to
enter the MAC address of the device. Enter the MAC address using one of
the following:
xx:xx:xx:xx:xx:xx format (for example: 08:00:20:12:34:56)
xxxxxxxxxxxx format (for example: 080020123456).
vlan <1-4095>
dump
clear
Clears the entire Forwarding Database from switch memory, then adds the
static entries to the Forwarding Database.
Debugging options
Command: /maint/debug
[Miscellaneous Debug Menu]
tbuf
- Show MP trace buffer
snap
- Show MP snap (or post-mortem) trace buffer
clrcfg - Clear all flash configs
The Miscellaneous Debug Menu displays trace buffer information about events that can be helpful in understanding
switch operation. You can view the following information using the Debug Menu:
If the switch resets for any reason, the management processor (MP) trace buffer is saved into the snap trace buffer
area. The output from these commands can be interpreted by HP technical support.
The following table describes the Miscellaneous Debug Menu options:
Table 188 Miscellaneous Debug Menu options
Command
Usage
tbuf
Displays the management processor trace buffer. Header information similar to the following is shown:
MP trace buffer at 13:28:15 Fri May 25, 2002; mask: 0x2ffdf748
The buffer information is displayed after the header.
snap
Displays the management processor snap (or post-mortem) trace buffer. This buffer contains information
traced at the time that a reset occurred.
clrcfg
Deletes all flash configuration blocks. The next time the switch is rebooted, it returns to the factory default
settings.
Usage
vlan <1-4095>
addr
dump
clear
NOTE: To display all ARP entries currently held in the switch, or a portion according to one of the options
listed on the menu above (find, port, vlan, dump), see the ARP information section of the Information Menu
chapter.
Usage
gw <IP address>
type
Shows routes of a single type.
indirect|direct|local|broadcast|martian|
multicast
tag fixed|static|addr|rip|ospf|
broadcast|martian
if <1-256>
dump
clear
Group Menu]
IGMP Snooping Menu
IGMP Multicast Router Port Menu
Clear group and mrouter tables
The following table describes the IGMP Multicast Group Maintenance Menu options.
Table 191 IGMP Multicast Group Menu options
Command
Usage
snoop
mrouter
clear
Group Menu]
Show a single group by IP group address
Show groups on a single vlan
Show groups on a single port
Show groups on a single trunk
Show all groups
Clear group tables
The following table describes the IGMP Snoop Maintenance Menu options.
Table 192 IGMP Snooping Menu options
Command
Usage
vlan <1-4094>
dump
clear
Routers Menu]
Show all multicast router ports on a single vlan
Show all multicast router ports
Clear multicast router port table
The following table describes the IGMP Multicast Routers Maintenance Menu options.
Table 193 IGMP Multicast Group Menu options
Command
Usage
vlan <1-4094>
dump
clear
Type the FTP/TFTP server IP address or hostname as <server>, and the target dump file as <filename>.
Panic command
Command: /maint/panic
The panic command causes the switch to immediately dump state information to flash memory and automatically
reboot.
To select panic, at the Maintenance# prompt, enter:
>> Maintenance# panic
A FLASH dump already exists.
Confirm replacing existing dump and reboot [y/n]:
Enter y to confirm the command:
Confirm dump and reboot [y/n]: y
A list of messages is displayed:
Starting system dump...done.
Reboot at 11:54:08 Wednesday October 30, 2006...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rebooted because of console PANIC command.
Booting complete
Index
8
802.1x information, 36
802.1x statistics, 63
A
abbreviating commands, 17
access control, user, 102
active configuration block, 89, 164
active switch configuration: gtcfg,
159; ptcfg, 158; restoring, 159
Address Resolution Protocol (ARP):
address list, 168
Address Resolution Protocol (ARP)
Menu, 46
aging: STP information, 38, 40
apply command, 15, 89
auto-negotiation: enable/disable on
port, 108; flow control
configuration, 108
autonomous system filter action, 128
B
backup configuration block, 89, 164
banner (system option), 91
Boot Options Menu, 162
bootstrap protocol (BOOTP): obtain
the IP address, 10
bridge maximum age parameter:
configuration, 117; information, 38,
40, 42
bridge parameter menu, for STP, 113
bridge priority, 38
Bridge Protocol Data Unit (BPDU), 38,
40, 42
bridge Spanning Tree parameters,
116
C
capture dump information to a file,
171
clear: ARP entries, 168; dump
information, 171
commands: abbreviations, 17; global
commands, 15; shortcuts, 17; tab
completion, 17
Common Internal Spanning Tree
information, 41
configuration: apply changes, 89;
default gateway interval, for health
checks, 124; default gateway IP
address, 124; dump command,
158; flow control, 108; Gigabit
Ethernet, 107; operating mode,
108; port link speed, 108; port
H
health checks: default gateway
interval, retries, 124; retry, number
of failed health checks, 124
hello, STP information, 38, 40, 42
history command, 16
LACP statistics, 71
Layer 2 information, 32
Layer 2 statistics, 70
Layer 3 information, 43
Layer 3 statistics, 71
LEARNING (port state), 38, 40, 42
lines command, 15
Link Aggregation Control Protocol
information, 34
link speed, configuration, 108
link status: command, 58; display
setting, 22; duplex mode, 22, 58;
port speed, 22, 58
log, syslog messages, 92
login notice, 91
G
gig (Port Menu option), 107
Gigabit Ethernet Physical Link, 107
Gigabit Ethernet, configuration, 107
global commands, 15
Greenwich Mean Time (GMT), 96
gtcfg (TFTP load command), 159
M
Main Menu, 14
Maintenance Menu, 166
management processor (MP): trace
buffer, 168
mask, IP interface subnet address, 123
Index 17 3
N
Network Time Protocol (NTP):
synchronization, 96; time zone, 96
null modem cable, 9
O
online help, 15
operating mode, configuration, 108
Operations-level port 802.1x options,
161
Operations-level port options, 160
Operations-level VRRP options, 161
ospf: area index, 131; interface, 131;
Not-So-Stubby Area, 132; stub area,
132; transit area, 132
OSPF configuration, 130
OSPF information, 47
P
panic: command, 172; switch, 166
passwords, defaults, 19
ping command, 15
popd command, 16
port configuration, 106
Port Menu: configuration options, 108,
109; Gigabit Ethernet (gig)
configuration, 107
port mirroring, configuration, 155
port number, 58
port speed, 22, 58
port statistics, 62
port trunking configuration, 119
ports: disable (temporarily), 108;
information, 58; membership of the
VLAN, 43; priority, 38, 40, 42; STP
port priority, 117
preemption: assuming VRRP master
routing authority, 143
priority (STP port option), 117
prisrv, primary radius server, 94
ptcfg (TFTP save command), 158
pushd command, 16
pwd command, 15
Q
quiet (screen display option), 16
R
Rapid Spanning Tree and Multiple
Spanning Tree information, 39
read community string (SNMP option),
97
reboot, 166, 172
retries, radius server, 94
retry, health checks for default
gateway, 124
revert apply command, 15, 89
revert command, 15, 89
RMON: alarm information, 56; event
information, 57; history information,
55
RMON configuration: alarm, 154;
event, 154; history, 153
RMON Information Menu, 54
poisoned reverse, as used with split
horizon: poisoned reverse, 129
Routing Information Protocol (RIP):
version 1 parameters, 128, 129
split horizon: split horizon, 129
S
save command, 15, 89, 164
save n command, 15
secret, radius server, 94
secsrv, secondary radius server, 94
Secure Shell (SSH): encryption and
authentication methods, 11
Secure Shell Server (SSHD) Menu, 92
Setup utility: introduction, 18; start, 18
shortcuts, 17
Simple Network Management Protocol
(SNMP): optional setup, 18
snap traces, buffer, 168
SNMP: set and get access, 97
SNMPv3 Access Table information, 25
SNMPv3 Community Table
information, 26
SNMPv3 dump, 29
SNMPv3 Group Table information, 26
SNMPv3 Information Menu, 23
SNMPv3 Notify Table information, 28
SNMPv3 Target Address Table
information, 27
SNMPv3 Target Parameters Table
information, 27
SNMPv3 USM User Table information,
24
SNMPv3 View Table information, 25
software: image, 162
Spanning Tree Protocol (STP): bridge
parameters, 116; information, 38;
port cost option, 118; port priority
option, 117; root bridge, 116;
switch reset effect, 165; with trunk
groups, 42
sshport, 92
starting switch setup, 18
state (STP information), 38, 40, 42
statistics dump, 87
Statistics Menu, 61
subnet address mask configuration, IP
subnet address, 123
subnets: IP interface, 123
switch: reset, 165
syslog: display messages, 31
system: date and time, 23, 24, 25,
26, 27, 28, 32, 44, 70;
information, 30, 59
System Configuration Menu, 90
System Information Menu, 23
system options: login banner, 91;
tnport, 91
T
tab completion, 17
TCP statistics, 82
Telnet: requirements, 10
telnet command, 16
timeout, radius server, 94
timeouts, idle connection, 12
tnport, system option, 91
trace buffer, 168
traceroute command, 15
Tracking: VRRP; tracking, 142
transmit flow control, 108
Trivial File Transfer Protocol (TFTP):
PUT and GET commands, 158; use
for updating switch software image,
162
typographical conventions, 13
tzone, 96
U
UCB statistics, 83
UDP statistics, 76
unscheduled system dump, 172
upgrade, switch software, 162
user access control configuration, 102
user access levels, 11
uuencode flash dump, 171
V
verbose n command, 16
view pending configuration changes,
89
virtual router: description, 142;
tracking criteria, 143
virtual router group: VRRP priority
tracking, 144
Virtual Router Redundancy Protocol
(VRRP): password, authentication;
VRRP authentication, 145; group
options (prio); virtual router; priority,
144; priority election for the virtual
router, 142
virtual routers: increasing priority level
of, 143; master preemption (preem);
Index 17 4
Index 17 5