Xstack PDF
Xstack PDF
Xstack PDF
Table of Contents
Chapter 1 Using Command Line Interface............................................................................................. 1
Chapter 2 Basic Command List ............................................................................................................. 8
Chapter 3 802.1Q VLAN Command List .............................................................................................. 23
Chapter 4 802.1X Command List ......................................................................................................... 38
Chapter 5 Access Authentication Control Command List .................................................................... 62
Chapter 6 Access Control List (ACL) Command List ......................................................................... 103
Chapter 7 Access Control List (ACL) Egress Command List (RI and EI Mode Only) ....................... 123
Chapter 8 Address Resolution Protocol (ARP) Command List.......................................................... 142
Chapter 9 ARP Spoofing Prevention Command List ......................................................................... 147
Chapter 10 Asymmetric VLAN Command List ..................................................................................... 149
Chapter 11 Auto-Configuration Command List .................................................................................... 151
Chapter 12 Basic Commands Command List ...................................................................................... 153
Chapter 13 BPDU Attack Protection Command List ............................................................................ 170
Chapter 14 Cable Diagnostics Command List ..................................................................................... 175
Chapter 15 Command Logging Command List.................................................................................... 178
Chapter 16 Compound Authentication Command List ........................................................................ 181
Chapter 17 Configuration Command List............................................................................................. 192
Chapter 18 Configuration Trap Command List .................................................................................... 197
Chapter 19 Connectivity Fault Management (CFM) Command List (RI and EI Mode Only) ............... 199
Chapter 20 Connectivity Fault Management (CFM) Extension Command List (RI and EI Mode Only)
........................................................................................................................................... 227
Chapter 21 CPU Interface Filtering Command List ............................................................................. 231
Chapter 22 Debug Software Command List ........................................................................................ 242
Chapter 23 Denial-of-Service (DoS) Attack Prevention Command List .............................................. 284
Chapter 24 DHCP Local Relay Command List .................................................................................... 288
Chapter 25 DHCP Relay Command List.............................................................................................. 292
Chapter 26 DHCP Server Command List (RI Mode Only) ................................................................... 311
Chapter 27 DHCP Server Screening Command List ........................................................................... 330
Chapter 28 DHCPv6 Relay Command List .......................................................................................... 334
Chapter 29 Digital Diagnostic Monitoring (DDM) Command List (RI and EI Mode Only).................... 340
Chapter 30 Distance Vector Multicast Routing Protocol (DVMRP) Command List (RI Mode Only) ... 347
Chapter 31 D-Link License management System (DLMS) Command List ......................................... 354
Chapter 32 D-Link Unidirectional Link Detection (DULD) Command List (RI and EI Mode Only) ...... 356
Chapter 33 Energy Efficient Ethernet (EEE) Command List ............................................................... 358
Chapter 34 Ethernet Ring Protection Switching (ERPS) Command List (RI and EI Mode Only) ........ 360
Chapter 35 FDB Command List ........................................................................................................... 370
Chapter 36 Filter Command List .......................................................................................................... 380
Chapter 37 Flash File System (FFS) Command List ........................................................................... 383
Chapter 38 Gratuitous ARP Command List ......................................................................................... 394
Chapter 39 Internet Group Management Protocol (IGMP) Command List (RI Mode Only) ................ 400
Chapter 40 IGMP Proxy Command List (RI Mode Only) ..................................................................... 408
Chapter 41 IGMP Snooping Command List......................................................................................... 413
Chapter 42 IP-MAC-Port Binding (IMPB) Command List (RI and EI Mode Only) ............................... 437
Chapter 43 IP Multicast (IPMC) Command List (RI Mode Only) ......................................................... 460
Chapter 44 IP Route Filter Command List (RI Mode Only) ................................................................. 462
Chapter 45 IP Tunnel Command List (RI Mode Only) ......................................................................... 469
Chapter 46 IPv6 Neighbor Discover Command List ............................................................................ 477
Chapter 47 IPv6 Route Command List (RI and EI Mode Only) ........................................................... 484
Chapter 48 Japanese Web-Based Access Control (JWAC) Command List ....................................... 487
Chapter 49 Jumbo Frame Command List ............................................................................................ 511
Chapter 50 Layer 2 Protocol Tunneling (L2PT) Command List ........................................................... 513
Chapter 51 Link Aggregation Command List ....................................................................................... 517
Chapter 52 Link Layer Discovery Protocol (LLDP) Command List ...................................................... 524
Chapter 53 Loopback Detection (LBD) Command List ........................................................................ 550
Chapter 54 Loopback Interface Command List ................................................................................... 556
Chapter 55 MAC Notification Command List ....................................................................................... 559
Chapter 56 MAC-based Access Control Command List ...................................................................... 564
Chapter 57 MAC-based VLAN Command List..................................................................................... 581
Chapter 58 MD5 Configuration Command List (RI Mode Only) .......................................................... 584
Chapter 59 Mirror Command List ......................................................................................................... 587
Chapter 60 Multicast Listener Discovery Protocol (MLD) Command List (RI Mode Only) .................. 592
Chapter 61 MLD Proxy Command List (RI Mode Only) ....................................................................... 595
Chapter 62 MLD Snooping Command List .......................................................................................... 600
Chapter 63 MSTP debug enhancement Command List ...................................................................... 620
Chapter 64 Multicast Filter Command List ........................................................................................... 627
Chapter 65 Multicast VLAN Command List ......................................................................................... 638
Chapter 66 Network Load Balancing (NLB) Command List ................................................................ 652
Chapter 67 Network Monitoring Command List ................................................................................... 658
Chapter 68 OAM Command List (RI and EI Mode Only) ..................................................................... 665
Chapter 69 Open Shortest Path First (OSPF) Version 2 Command List (RI Mode Only) ................... 673
II
Chapter 70 OSPF Version 3 Command List (RI Mode Only) .............................................................. 694
Chapter 71 Password Recovery Command List .................................................................................. 713
Chapter 72 Peripherals Command List ................................................................................................ 716
Chapter 73 Ping Command List ........................................................................................................... 722
Chapter 74 Policy Route Command List (RI Mode Only) .................................................................... 725
Chapter 75 Port Security Command List ............................................................................................. 728
Chapter 76 Power over Ethernet (PoE) Command List ....................................................................... 736
Chapter 77 Power Saving Command List ............................................................................................ 741
Chapter 78 PPPoE Circuit ID Insertions Command List (RI and EI Mode Only) ................................. 747
Chapter 79 Protocol Independent Multicast (PIM) Command List (RI Mode Only) ............................. 751
Chapter 80 PIM for IPv6 Command List (RI Mode Only) ..................................................................... 769
Chapter 81 Protocol VLAN Command List .......................................................................................... 788
Chapter 82 QinQ Command List (RI and EI Mode Only) ..................................................................... 794
Chapter 83 Quality of Service (QoS) Command List ........................................................................... 802
Chapter 84 Remote Switched Port ANalyzer (RSPAN) Command List............................................... 819
Chapter 85 Routing Information Protocol (RIP) Command List (RI Mode Only) ................................. 825
Chapter 86 RIPng Command List (RI Mode Only)............................................................................... 830
Chapter 87 Routing Command List ...................................................................................................... 836
Chapter 88 RPC PortMapper Command List....................................................................................... 852
Chapter 89 Safeguard Engine Command List ..................................................................................... 854
Chapter 90 SD Card Management Command List .............................................................................. 856
Chapter 91 Secure Shell (SSH) Command List ................................................................................... 863
Chapter 92 Secure Sockets Layer (SSL) Command List .................................................................... 874
Chapter 93 Spanning Tree Protocol (STP) Command List .................................................................. 881
Chapter 94 Surveillance VLAN Command List .................................................................................... 894
Chapter 95 sFlow Command List (RI and EI Mode Only) .................................................................... 900
Chapter 96 Show Technical Support Command List ........................................................................... 912
Chapter 97 Simple Mail Transfer Protocol (SMTP) Command List ..................................................... 915
Chapter 98 Simple Network Management Protocol (SNMP) Command List ...................................... 920
Chapter 99 Single IP Management Command List ............................................................................. 949
Chapter 100 Stacking Command List (EI and SI Mode Only) ............................................................... 959
Chapter 101 Static Multicast Route Command List (RI Mode Only) ...................................................... 967
Chapter 102 Syslog and Trap Source-interface Command List ............................................................ 970
Chapter 103 System Log Command List ............................................................................................... 974
Chapter 104 System Severity Command List ........................................................................................ 986
Chapter 105 Telnet Client Command List .............................................................................................. 988
III
IV
DGS-3120-24TC:admin#
There is no initial username or password. Just press the Enter key twice to display the CLI input
cursor − DGS-3120-24TC:admin# . This is the command line where all commands are input.
default IP address is 10.90.90.90. You can change the default Switch IP address to meet the
specification of your networking address scheme.
The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be
changed, and can be found on the initial boot console screen – shown below.
The Switch’s MAC address can also be found in the Web management program on the Switch
Information (Basic Settings) window on the Configuration menu.
The IP address for the Switch must be set before it can be managed with the Web-based manager.
The Switch IP address can be automatically set using BOOTP or DHCP protocols, in which case
the actual address assigned to the Switch must be known.
Starting at the command line prompt, enter the commands config ipif System ipaddress
xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy. Where the x’s represent the IP address to be assigned to the
IP interface named System and the y’s represent the corresponding subnet mask.
Alternatively, you can enter config ipif System ipaddress xxx.xxx.xxx.xxx/z. Where the x’s
represent the IP address to be assigned to the IP interface named System and the z represents
the corresponding number of subnets in CIDR notation.
The IP interface named System on the Switch can be assigned an IP address and subnet mask
which can then be used to connect a management station to the Switch’s Telnet or Web-based
management agent.
Success.
DGS-3120-24TC:admin#
In the above example, the Switch was assigned an IP address of 10.24.22.100 with a subnet mask
of 255.0.0.0. The system message Success indicates that the command was executed
successfully. The Switch can now be configured and managed via Telnet, SNMP MIB browser and
the CLI or via the Web-based management agent using the above IP address to connect to the
Switch.
There are a number of helpful features included in the CLI. Entering the ? command will display a
list of all of the top-level commands.
..
?
cable_diag ports
cd
cfm linktrace
cfm lock md
cfm loopback
change drive
clear
clear address_binding dhcp_snoop binding_entry ports
clear address_binding nd_snoop binding_entry ports
clear arptable
clear attack_log
clear cfm pkt_cnt
clear counters
clear dhcp binding
clear dhcp conflict_ip
clear ethernet_oam ports
clear fdb
clear igmp_snooping statistics counter
clear jwac auth_state
clear log
CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All
When entering a command without its required parameters, the CLI will prompt you with a Next
possible completions: message.
DGS-3120-24TC:admin#config account
Command: config account
Next possible completions:
<username 15>
DGS-3120-24TC:admin#
In this case, the command config account was entered with the parameter <username 15>. The
CLI will then prompt to enter the <username 15> with the message, Next possible completions:.
Every command in the CLI has this feature, and complex commands have several layers of
parameter prompting.
In addition, after typing any given command plus one space, users can see all of the next possible
sub-commands, in sequential order, by repeatedly pressing the Tab key.
To re-enter the previous command at the command prompt, press the up arrow cursor key. The
previous command will appear at the command prompt.
DGS-3120-24TC:admin#config account
Command: config account
Next possible completions:
<username 15>
DGS-3120-24TC:admin#config account
In the above example, the command config account was entered without the required parameter
<username 15>, the CLI returned the Next possible completions: <username 15> prompt. The
up arrow cursor control key was pressed to re-enter the previous command (config account) at
the command prompt. Now the appropriate username can be entered and the config account
command re-executed.
All commands in the CLI function in this way. In addition, the syntax of the help prompts are the
same as presented in this manual − angle brackets < > indicate a numerical value or character
string, braces { } indicate optional parameters or a choice of parameters, and brackets [ ] indicate
required parameters.
If a command is entered that is unrecognized by the CLI, the top-level commands will be displayed
under the Available commands: prompt.
DGS-3120-24TC:admin#the
Available commands:
.. ? cable_diag cd
cfm change clear config
copy create debug del
delete dir disable download
enable erase execute format
install login logout md
move no ping ping6
rd reboot reconfig rename
reset save show smtp
telnet traceroute traceroute6 upload
DGS-3120-24TC:admin#
The top-level commands consist of commands such as show or config. Most of these commands
require one or more parameters to narrow the top-level command. This is equivalent to show what?
or config what? Where the what? is the next parameter.
For example, entering the show command with no additional parameters, the CLI will then display
all of the possible next parameters.
DGS-3120-24TC:admin#show
Command: show
Next possible completions:
802.1p 802.1x aaa access_profile
account accounting acct_client address_binding
arp_spoofing_prevention arpentry asymmetric_vlan
attack_log auth_client auth_diagnostics
auth_session_statistics auth_statistics authen
DGS-3120-24TC:admin#
In the above example, all of the possible next parameters for the show command are displayed. At
the next command prompt, the up arrow was used to re-enter the show command, followed by the
account parameter. The CLI then displays the user accounts configured on the Switch.
angle brackets < > Encloses a variable or value. Users must specify the variable or value.
For example, in the syntax
config command_history <value 1-40>
users must enter how many entries for <value 1-40> when entering the
command. DO NOT TYPE THE ANGLE BRACKETS.
square brackets [ ] Encloses a required value or list of required arguments. Only one value or
argument must be specified. For example, in the syntax
create account [admin | operator | power_user | user] <username 15>
{encrypt [plain_text | sha_1] <password>}
users must specify either the admin, operator, power_user or user-level
account when entering the command. DO NOT TYPE THE SQUARE
BRACKETS.
vertical bar | Separates mutually exclusive items in a list. For example, in the syntax
reset {[config | system]} {force_agree}
users must specify either the community or trap receiver in the command.
DO NOT TYPE THE VERTICAL BAR.
braces { } Encloses an optional value or a list of optional arguments. One or more
values or arguments can be specified. For example, in the syntax
reset {[config | system]} {force_agree}
users may choose configure or system in the command. DO NOT TYPE
THE BRACES.
parentheses ( ) Indicates at least one or more of the values or arguments in the preceding
syntax enclosed by braces must be specified. For example, in the syntax
config bpdu_protection ports [<portlist> | all] {state [enable | disable] |
mode [drop | block | shutdown]}(1)
users have the option to specify hops or time or both of them. The "(1)"
following the set of braces indicates at least one argument or value within
the braces must be specified. DO NOT TYPE THE PARENTHESES.
ipif <ipif_name 12> 12 means the maximum length of the IP interface name.
metric <value 1-31> 1-31 means the legal range of the metric value.
The screen display pauses when the show command output reaches the end of the page.
In the above example, all of the possible next parameters for the show command are displayed. At
the next command prompt, the up arrow was used to re-enter the show command, followed by the
account parameter. The CLI then displays the user accounts configured on the Switch.
Format
show session
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the password encryption:
DGS-3120-24TC:admin#show session
Command: show session
Total Entries: 1
Format
show serial_port
Parameters
None.
Restrictions
None.
Example
To display the serial port setting:
DGS-3120-24TC:admin# show serial_port
Command: show serial_port
DGS-3120-24TC:admin#
Format
config serial_port {baud_rate [9600 | 19200 | 38400 | 115200] | auto_logout [never |
2_minutes | 5_minutes | 10_minutes | 15_minutes]}
Parameters
baud_rate - (Optional) The serial bit rate that will be used to communicate with the management
host. The default baud rate is 115200.
9600 - Specify the serial bit rate to be 9600.
19200 - Specify the serial bit rate to be 19200.
38400 - Specify the serial bit rate to be 38400.
115200 - Specify the serial bit rate to be 115200.
auto_logout - (Optional) The auto logout time out setting:
never - Never timeout.
2_minutes - When idle over 2 minutes, the device will auto logout.
5_minutes - When idle over 5 minutes, the device will auto logout.
10_minutes - When idle over 10 minutes, the device will auto logout.
15_minutes - When idle over 15 minutes, the device will auto logout.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure baud rate:
DGS-3120-24TC:admin# config serial_port baud_rate 9600
Command: config serial_port baud_rate 9600
Success.
DGS-3120-24TC:admin#
Format
enable clipaging
Parameters
None.
10
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable pausing of the screen display when show command output reaches the end of the page:
DGS-3120-24TC:admin# enable clipaging
Command: enable clipaging
Success.
DGS-3120-24TC:admin#
Format
disable clipaging
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable pausing of the screen display when show command output reaches the end of the page:
DGS-3120-24TC:admin# disable clipaging
Command: disable clipaging
Success.
DGS-3120-24TC:admin#
2-6 login
Description
This command is used to allow user login to the Switch.
11
Format
login
Parameters
None.
Restrictions
None.
Example
To login the Switch with a user name dlink:
DGS-3120-24TC:admin# login
Command: login
UserName:dlink
PassWord:****
DGS-3120-24TC:admin#
2-7 logout
Description
This command is used to logout the facility.
Format
logout
Parameters
None.
Restrictions
None.
Example
To logout current user:
12
DGS-3120-24TC:admin# logout
Command: logout
**********
* Logout *
**********
Press any key to login...
2-8 ?
Description
This command is used to display the usage description for all commands in the cuurent login
account level or the specific one.
Format
?
Parameters
None.
Restrictions
None.
Example
To get “ping” command usage, descriptions:
DGS-3120-24TC:admin#? ping
Command: ? ping
Command: ping
Usage: <ipaddr> { times <value 1-255> | timeout <sec 1-99>}
Description: Used to test the connectivity between network devices.
DGS-3120-24TC:admin#
13
2-9 clear
Description
The command is used to clear screen.
Format
clear
Parameters
None.
Restrictions
None.
Example
To clear screen:
DGS-3120-24TC:admin# clear
Command: clear
DGS-3120-24TC:admin#
Format
show command_history
Parameters
None.
Restrictions
None.
Example
To display command history:
14
DGS-3120-24TC:admin#show command_history
Command: show command_history
? ping
login
show serial_port
show session
? config bpdu_protection ports
? reset
? create account
? create ipif
show
the
?
DGS-3120-24TC:admin#
Format
config command_history <value 1-40>
Parameters
<value 1-40> - Enter the number of commands that the Switch can recall. This value must be
between 1 and 40.
Restrictions
None.
Example
To configure the number of command history:
DGS-3120-24TC:admin# config command_history 25
Command: config command_history 25
Success.
DGS-3120-24TC:admin#
Format
config greeting_message {default}
Parameters
default - (Optional) Adding this parameter to the “config greeting_message” command will return
the greeting message (banner) to its original factory default entry.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To edit the banner:
DGS-3120-24TC:admin#config greeting_message
Command: config greeting_message
================================================================================
Format
show greeting_message
16
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To display greeting message:
DGS-3120-24TC:admin#show greeting_ message
Command: show greeting_message
================================================================================
DGS-3120-24TC Gigabit Ethernet Switch
Command Line Interface
================================================================================
DGS-3120-24TC:admin#
When users issue the “reset” command, the current command prompt will remain in tact. Yet,
issuing the “reset system” will return the command prompt to its original factory default value.
Format
config command_prompt [<string 16> | username | default]
Parameters
<string 16> - Enter the new command prompt string of no more than 16 characters.
username - Enter this command to set the login username as the command prompt.
default - Enter this command to return the command prompt to its original factory default value.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To edit the command prompt:
DGS-3120-24TC:admin#config command_prompt Prompt#
Command: config command_prompt Prompt#
Success.
Prompt#:admin#
Format
config terminal width [default | <value 80-200>]
Parameters
default - The default setting of terminal width. The default value is 80.
<value 80-200> - The terminal width which will be configured. The width is between 80 and 200
characters.
18
Restrictions
None.
Example
To configure the current terminal width:
DGS-3120-24TC:admin# config terminal width 120
Command: config terminal width 120
Success.
DGS-3120-24TC:admin#
Format
show terminal width
Parameters
None.
Restrictions
None.
Example
To display the configuration of current terminal width:
DGS-3120-24TC:admin#show terminal width
Command: show terminal width
DGS-3120-24TC:admin#
19
Format
config ports [<portlist> | all ] {medium_type [fiber | copper]} {speed [auto | 10_half | 10_full |
100_half | 100_full | 1000_full {[master | slave]}] | flow_control [enable | disable] | learning
[enable | disable] | state [enable | disable] | mdix [auto | normal | cross] | [description <desc
1-32> | clear_description]}
Parameters
<portlist> - Enter a list of ports used here.
all - Specify that all the ports will be used for this configuration.
medium_type - (Optional) Specify the medium type while the configure ports are combo ports
fiber - Specify that the medium type will be set to fiber.
copper - Specify that the medium type will be set to copper.
speed - (Optional) Specify the port speed of the specified ports .
auto - Set port speed to auto negotiation.
10_half - Set port speed to 10_half.
10_full - Set port speed to 10_full.
100_half - Set port speed to 100_half.
100_full - Set port speed to 100_full._
1000_full - 1000_full set port speed to 1000_full. While set port speed to 1000_full,user
should specify master or slave mode for 1000 base TX interface, and leave the 1000_full
without any master or slave setting for other interface.
master - Specify that the port(s) will be set to master.
slave - Specify that the port(s) will be set to slave.
flow_control - (Optional) You can turn on or turn off flow control on one or more ports. By set
flow_control to enable or disable.
enable - Specify that the flow control option will be enabled.
disable - Specify that the flow control option will be disabled.
learning - (Optional) You can turn on or turn off MAC address learning on one or more ports.
enable - Specify that the learning option will be enabled.
disable - Specify that the learning option will be disabled.
state - (Optional) Enables or disables the specified port. If the specificed ports are in error-
disabled status , configure their state to enable will recover these ports from disabled to
enable state.
enable - Specify that the port state will be enabled.
disable - Specify that the port state will be disabled.
mdix - (Optional) MDIX mode can be specified as auto, normal, and cross. If set to normal state,
the port is in MDIX mode and can be connected to PC NIC using a straight cale. If set to cross
state, the port is in mdi mode, and can be connected to a port (in mdix mode) on another
switch thru a straight cabe.
auto - Specify that the MDIX mode for the port will be set to auto.
normal - Specify that the MDIX mode for the port will be set to normal.
cross - Specify that the MDIX mode for the port will be set to cross.
description - (Optional) Specify the description of the port interface.
<desc 1-32> - Enter the port interface description here. This value can be up to 32 characters
long.
clear_description - (Optional) Specify that the description field will be cleared.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the ports:
20
Success.
DGS-3120-24TC:admin#
Format
show ports {<portlist>} {[description | err_disabled | details | media_type]}
Parameters
ports - Specify a range of ports to be displayed.
<portlist> - (Optional) Enter the list of ports to be configured here.
description - (Optional) Indicates if port description will be included in the display .
err_disabled - (Optional) Indicates if ports are disabled by some reasons will be displayed.
details - (Optional) Displays the port details.
media_type - (Optional) Displays port transceiver type.
Restrictions
None.
Example
To display the port details:
21
Port : 1:1
--------------------
Port Status : Link Down
Description :
HardWare Type : Gigabits Ethernet
MAC Address : 00-01-02-03-04-10
Bandwidth : 1000000Kbit
Auto-Negotiation : Enabled
Duplex Mode : Full Duplex
Flow Control : Disabled
MDI : Auto
Address Learning : Enabled
Last Clear of Counter : 0 hours 10 mins ago
BPDU Hardware Filtering Mode: Disabled
Queuing Strategy : FIFO
TX Load : 0/100, 0 bits/sec, 0
packets/sec
RX Load : 0/100, 0 bits/sec, 0
packets/sec
22
Format
create vlan <vlan_name 32> tag <vlanid 2-4094> {type [1q_vlan | private_vlan]}
{advertisement}
Parameters
vlan - The name of the VLAN to be created.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
tag - The VLAN ID of the VLAN to be created.
<vlanid 2-4094> - Enter the VLAN ID here. The VLAN ID value must be between 2 and 4094.
type - (Optional) Specify the type of VLAN here.
1q_vlan - (Optional) Specify that the type of VLAN used is based on the 802.1Q standard.
private_vlan – (Optional) Specify that the private VLAN type will be used.
advertisement - (Optional) Specify the VLAN as being able to be advertised out.
23
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a VLAN with name “v2” and VLAN ID 2:
DGS-3120-24TC:admin# create vlan v2 tag 2 type 1q_vlan advertisement
Command: create vlan v2 tag 2 type 1q_vlan advertisement
Success.
DGS-3120-24TC:admin#
Format
create vlan vlanid <vidlist> {type [1q_vlan | private_vlan]} {advertisement}
Parameters
vlanid - The VLAN ID list to be created.
<vidlist> - Enter the VLAN ID list here.
type - (Optional) Specify the type of VLAN to be created.
1q_vlan - (Optional) Specify that the VLAN created will be a 1Q VLAN.
private_vlan – (Optional) Specify that the private VLAN type will be used.
advertisement - (Optional) Specify the VLAN as being able to be advertised out.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create some VLANs using VLAN ID:
DGS-3120-24TC:admin# create vlan vlanid 10-30
Command: create vlan vlanid 10-30
Success.
DGS-3120-24TC:admin#
24
Format
delete vlan <vlan_name 32>
Parameters
vlan - The VLAN name of the VLAN to be deleted.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To remove a vlan v1:
DGS-3120-24TC:admin# delete vlan v1
Command: delete vlan v1
Success.
DGS-3120-24TC:admin#
Format
delete vlan vlanid <vidlist>
Parameters
vlanid - The VLAN ID list to be deleted.
<vidlist> - Enter the VLAN ID list here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
25
Example
To remove VLANs from 10-30:
DGS-3120-24TC:admin# delete vlan vlanid 10-30
Command: delete vlan vlanid 10-30
Success.
DGS-3120-24TC:admin#
Format
config vlan <vlan_name 32> {[add [tagged | untagged | forbidden] | delete] <portlist> |
advertisement [enable | disable]}(1)
Parameters
<vlan_name 32> - Enter the VLAN name you want to add ports to. This name can be up to 32
characters long.
add - (Optional) Specify to add tagged, untagged or forbidden ports to the VLAN.
tagged - Specify the additional ports as tagged.
untagged - Specify the additional ports as untagged.
forbidden - Specify the additional ports as forbidden.
delete - (Optional) Specify to delete ports from the VLAN.
<portlist> - (Optional) Enter the list of ports used for the configuration here.
advertisement - (Optional) Specify the GVRP state of this VLAN.
enable - Specify to enable advertisement for this VLAN.
disable - Specify to disable advertisement for this VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add 4 through 8 of unit 2 as tagged ports to the VLAN v1:
DGS-3120-24TC:admin# config vlan v1 add tagged 2:4-2:8
Command: config vlan v1 add tagged 2:4-2:8
Success.
DGS-3120-24TC:admin#
26
Format
config vlan vlanid <vidlist> {[add [tagged | untagged | forbidden] | delete] <portlist> |
advertisement [enable | disable] | name <vlan_name 32>}(1)
Parameters
<vidlist> - Enter a list of VLAN IDs to configure.
add - (Optional) Specify to add tagged, untagged or forbidden ports to the VLAN.
tagged - Specify the additional ports as tagged.
untagged - Specify the additional ports as untagged.
forbidden - Specify the additional ports as forbidden.
delete - (Optional) Specify to delete ports from the VLAN.
<portlist> - (Optional) Enter the list of ports used for the configuration here.
advertisement - (Optional) Specify the GVRP state of this VLAN.
enable - Specify to enable advertisement for this VLAN.
disable - Specify to disable advertisement for this VLAN.
name - (Optional) The new name of the VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add 4 through 8 of unit 2 as tagged ports to the VLAN ID from 10-20:
DGS-3120-24TC:admin# config vlan vlanid 10-20 add tagged 2:4-2:8
Command: config vlan vlanid 10-20 add tagged 2:4-2:8
Success.
DGS-3120-24TC:admin#
Format
config port_vlan [<portlist> | all] {gvrp_state [enable | disable] | ingress_checking [enable |
disable] | acceptable_frame [tagged_only | admit_all] | pvid <vlanid 1-4094>}(1)
27
Parameters
<portlist> - A range of ports for which you want ingress checking. The port list is specified by
listing the lowest switch number and the beginning port number on that switch, separated by a
colon. Then highest switch number, and the highest port number of the range (also separated
by a colon) are specified. The beginning and end of the port list range are separated by a
dash. For example, 1:3 would specify switch number 1, port 3. 2:4 specifies switch number 2,
port 4. 1:3-2:4 specifies all of the ports between switch 1, port 3 and switch 2, port 4 − in
numerical order.
all - Specify that all the port will be used for this configuration.
gvrp_state - (Optional) Enabled or disables GVRP for the ports specified in the port list.
enable - Specify that GVRP for the specified ports will be enabled.
disable - Specify that GVRP for the specified ports will be disabled.
ingress_checking - (Optional) Enables or disables ingress checking for the specified portlist.
enable - Specify that ingress checking will be enabled for the specified portlist.
disable - Specify that ingress checking will be disabled for the specified portlist.
acceptable_frame - (Optional) The type of frame will be accepted by the port. There are two
types:
tagged_only - Only tagged packets can be accepted by this port.
admit_all - All packets can be accepted.
pvid - (Optional) Specify the PVID of the ports.
<vlanid 1-4094> - Enter the VLAN ID here. The VLAN ID value must be between 1 and 4094.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To sets the ingress checking status, the sending and receiving GVRP information:
DGS-3120-24TC:admin# config port_vlan 1:1-1:5 gvrp_state enable
ingress_checking enable acceptable_frame tagged_only pvid 2
Command: config port_vlan 1:1-1:5 gvrp_state enable ingress_checking enable
acceptable_frame tagged_only pvid 2
Success
DGS-3120-24TC:admin#
Format
show vlan {<vlan_name 32>}
Parameters
<vlan_name 32> - (Optional) Enter the VLAN name to be displayed. The VLAN name can be up
to 32 characters long.
28
Restrictions
None.
Example
To display VLAN settings:
DGS-3120-24TC:admin#show vlan
Command: show vlan
DGS-3120-24TC:admin#
Format
show vlan ports {<portlist>}
Parameters
<portlist> - (Optional) Enter the list of ports for which the VLAN information will be displayed.
Restrictions
None.
Example
To display the VLAN configuration for port 6 of unit 1:
29
DGS-3120-24TC:admin#
Format
show vlan vlanid <vidlist>
Parameters
<vidlist> - Enter the VLAN ID to be displayed.
Restrictions
None.
Example
To display the VLAN configuration for VLAN ID 1:
DGS-3120-24TC:admin# show vlan vlanid 1
Command: show vlan vlanid 1
Total Entries : 1
DGS-3120-24TC:admin#
30
Format
show port_vlan {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed. (UnitID:port number).
If no parameter specified, system will display all ports gvrp information.
Restrictions
None.
Example
To display 802.1Q port setting:
DGS-3120-24TC:admin# show port_vlan
Command: show port_vlan
31
Format
enable pvid auto_assign
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the auto-assign PVID:
DGS-3120-24TC:admin# enable pvid auto_assign
Command: enable pvid auto_assign
Success.
DGS-3120-24TC:admin#
Format
disable pvid auto_assign
Parameters
None.
32
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the auto-assign PVID:
DGS-3120-24TC:admin# disable pvid auto_assign
Command: disable pvid auto_assign
Success.
DGS-3120-24TC:admin#
Format
show pvid auto_assign
Parameters
None.
Restrictions
None.
Example
To display PVID auto-assignment state:
DGS-3120-24TC:admin#show pvid auto_assign
Command: show pvid auto_assign
DGS-3120-24TC:admin#
33
Format
config gvrp [timer [join | leave | leaveall] < value 100-100000> | nni_bpdu_addr [dot1d |
dot1ad]]
Parameters
timer - Specify that the GVRP timer parameter will be configured.
join - (Optional) Specify the Join time will be set.
leave - (Optional) Specify the Leave time will be set.
leaveall - (Optional) Specify the LeaveAll time will be set.
<value 100-100000> - Enter the time used here. This value must be between 100 and 100000.
nni_bpdu_addr - Used to determine the BPDU protocol address for GVRP in service provide
site. It can use 802.1d GVRP address, 802.1ad service provider GVRP address or a user
defined multicast address.
dot1d - Specify that the NNI BPDU protocol address value will be set to Dot1d.
dot1ad - Specify that the NNI BPDU protocol address value will be set to Dot1ad.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the Join time to 200 milliseconds:
DGS-3120-24TC:admin# config gvrp timer join 200
Command: config gvrp timer join 200
Success.
DGS-3120-24TC:admin#
Format
show gvrp
Parameters
None.
Restrictions
None.
34
Example
To display the global setting of GVRP:
DGS-3120-24TC:admin#show gvrp
Command: show gvrp
DGS-3120-24TC:admin#
Format
enable gvrp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the generic VLAN Registration Protocol (GVRP):
DGS-3120-24TC:admin# enable gvrp
Command: enable gvrp
Success.
DGS-3120-24TC:admin#
Format
disable gvrp
35
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the Generic VLAN Registration Protocol (GVRP):
DGS-3120-24TC:admin# disable gvrp
Command: disable gvrp
Success.
DGS-3120-24TC:admin#
Format
config private_vlan [<vlan_name 32> | vid <vlanid 2-4094>] [add [isolated | community] |
remove] [<vlan_name 32> | vlanid <vidlist>]
Parameters
<vlan_name 32> - Specify the name of the private VLAN.
vid - Specify the VLAN ID of the private VLAN.
<vlanid 2-4094> - Enter the VLAN ID used here. This value must be between 2 and 4094.
add - Specify that a secondary VLAN will be added to the private VLAN.
isolated - Specify the secondary VLAN as isolated VLAN.
community - Specify the secondary VLAN as community VLAN.
remove - Specify that a secondary VLAN will be removed from the private VLAN.
<vlan_name 32> - Specify the secondary VLAN name used. This name can be up to 32
characters long.
vlanid - A range of secondary VLAN to add or remove to the private VLAN.
<vidlist> - Enter the secondary VLAN ID used here.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To associate secondary vlan to private vlan p1:
36
Success.
DGS-3120-24TC:admin#
Format
show private_vlan {[<vlan_name 32> | vlanid<vidlist>]}
Parameters
<vlan_name 32> - (Optional) Specify the name of the private VLAN or its secondary VLAN. This
name can be up to 32 characters long.
vlanid - (Optional) Specify the VLAN ID of the private VLAN or its secondary VLAN.
<vidlist> - Enter the VLAN ID used here.
Restrictions
None.
Example
To display private VLAN settings:
DGS-3120-24TC:admin# show private_vlan
Command: show private_vlan
DGS-3120-24TC:admin#
37
Format
enable 802.1x
38
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Used to enable the 802.1X function:
DGS-3120-24TC:admin# enable 802.1x
Command: enable 802.1x
Success.
DGS-3120-24TC:admin#
Format
disable 802.1x
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the 802.1X function:
DGS-3120-24TC:admin# disable 802.1x
Command: disable 802.1x
Success.
DGS-3120-24TC:admin#
Format
create 802.1x user <username 15>
Parameters
<username 15> - Enter the username to be added. This value can be up to 15 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a 802.1x user “test”:
DGS-3120-24TC:admin#create 802.1x user test
Command: create 802.1x user test
DGS-3120-24TC:admin#
Format
delete 802.1x user <username 15>
Parameters
<username 15> - Enter the username to be deleted. This value can be up to 15 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete user “test”:
40
Success.
DGS-3120-24TC:admin#
Format
show 802.1x user
Parameters
None.
Restrictions
None.
Example
To display the 802.1X user information:
DGS-3120-24TC:admin#show 802.1x user
Command: show 802.1x user
Current Accounts:
Username Password
--------------- ---------------
test test
Total Entries:1
DGS-3120-24TC:admin#
Format
config 802.1x auth_protocol [local | radius_eap]
41
Parameters
local - Specify the authentication protocol as local.
radius_eap - Specify the authentication protocol as RADIUS EAP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the 802.1X authentication protocol to RADIUS EAP:
DGS-3120-24TC:admin# config 802.1x auth_protocol radius_eap
Command: config 802.1x auth_protocol radius_eap
Success.
DGS-3120-24TC:admin#
Format
config 802.1x fwd_pdu system [enable | disable]
Parameters
enable - Enable the forwarding of EAPOL PDU.
disable - Disable the forwarding of EAPOL PDU.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure forwarding of EAPOL PDU system state enable:
42
Success.
DGS-3120-24TC:admin#
Format
config 802.1x fwd_pdu ports [<portlist> | all] [enable | disable]
Parameters
<portlist> - Enter the list of ports used for the configuration.
all - Specify that all the ports will be used.
enable - Enable forwarding EAPOL PDU receive on the ports.
disable - Disable forwarding EAPOL PDU receive on the ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure 802.1X fwd_pdu for ports:
DGS-3120-24TC:admin#config 802.1x fwd_pdu ports 1:1-1:2 enable
Command: config 802.1x fwd_pdu ports 1:1-1:2 enable
Success.
DGS-3120-24TC:admin#
43
Format
config 802.1x authorization attributes radius [enable | disable]
Parameters
radius - If specified to enable, the authorization attributes (for example VLAN, 802.1p default
priority, and ACL) assigned by the RADUIS server will be accepted if the global authorization
status is enabled. The default state is enabled.
enable - Specify to enable the authorization attributes.
disable - Specify to disable the authorization attributes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
The following example will disable to accept the authorized data assigned from the RADIUS server:
DGS-3120-24TC:admin#config 802.1x authorization attributes radius disable
Command: config 802.1x authorization attributes radius disable
Success.
DGS-3120-24TC:admin#
Format
show 802.1x {[auth_state | auth_configuration] ports {<portlist>}}
Parameters
auth_state - (Optional) Used to display 802.1X authentication state machine of some or all ports
auth_configuration - (Optional) Used to display 802.1X configurations of some or all ports.
port - (Optional) Specify a range of ports to be displayed. If no port is specified, all ports will be
displayed.
<portlist> - Enter the list of ports used for the configuration here.
If no parameter is specified, the 802.1X system configurations will be displayed.
Restrictions
None.
Example
To display the 802.1X port level configurations:
44
Format
config 802.1x capability ports [<portlist> | all] [authenticator | none]
Parameters
ports - Specify a range of ports to be configured.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify all ports to be configured.
authenticator - The port that wishes to enforce authentication before allowing access to services
that are accessible via that port adopts the authenticator role.
none - Disable authentication on the specified ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
45
Example
To configure the port capability:
DGS-3120-24TC:admin# config 802.1x capability ports 1:1-1:10 authenticator
Command: config 802.1x capability ports 1:1-1:10 authenticator
Success.
DGS-3120-24TC:admin#
Format
config 802.1x max_users [<value 1–448> | no_limit]
Parameters
<value 1-448> - Enter the maximum number of users. This value must be between 1 and 448.
no_limit – Specify that the maximum user limit will be set to 448.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure 802.1X number of users to be limited to 200:
DGS-3120-24TC:admin#config 802.1x max_users 200
Command: config 802.1x max_users 200
Success.
DGS-3120-24TC:admin#
46
Format
config 802.1x auth_parameter ports [<portlist> | all] [default | {direction [both | in] |
port_control [force_unauth | auto | force_auth] | quiet_period <sec 0-65535> | tx_period
<sec 1-65535> | supp_timeout <sec 1-65535> | server_timeout <sec 1-65535> | max_req
<value 1-10> | reauth_period <sec 1-65535> | max_users [<value 1-448> | no_limit] |
enable_reauth [enable | disable]}(1)]
Parameters
ports - Specify a range of ports to be configured.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all the ports will be used.
default - Sets all parameter to be default value.
direction - (Optional) Sets the direction of access control.
both - For bidirectional access control.
in - For unidirectional access control.
port_control - (Optional) You can force a specific port to be unconditionally authorized or
unauthorized by setting the parameter of port_control to be force_authorized or
force_unauthorized. Besides, the controlled port will reflect the outcome of authentication if
port_control is auto.
force_unauth - Force a specific port to be unconditionally unauthorized.
auto - The controlled port will reflect the outcome of authentication.
force_auth - Force a specific port to be unconditionally authorized.
quiet_period - (Optional) It is the initialization value of the quietWhile timer. The default value is
60 seconds and can be any value among 0 to 65535.
<sec 0-65535> - Enter the quiet period value here. This value must be between 0 and 65535
seconds.
tx_period - (Optional) It is the initialization value of the transmit timer period. The default value is
30 seconds and can be any integer value among 1 to 65535.
<sec 1-65535> - Enter the tx period value here. This value must be between 1 and 65535
seconds.
supp_timeout - (Optional) The initialization value of the aWhile timer when timing out the
supplicant. Its default value is 30 seconds and can be any integer value among 1 to 65535.
<sec 1-65535> - Enter the supplicant timeout value here. This value must be between 1 and
65535 seconds.
server_timeout - (Optional) The initialization value of the aWhile timer when timing out the
authentication server. Its default value is 30 seconds and can be any integer value among 1 to
65535.
<sec 1-65535> - Enter the server timeout value here. This value must be between 1 and
65535 seconds.
max_req - (Optional) The maximum number of times that the authentication PAE state machine
will retransmit an EAP Request packet to the supplicant. Its default value is 2 and can be any
integer number among 1 to 10.
<value 1-10> - Enter the maximum required value here. This value must be between 1 and
10.
reauth_period - (Optional) It’s a nonzero number of seconds, which is used to be the re-
authentication timer. The default value is 3600.
<sec 1-65535> - Enter the re-authentication period value here. This value must be between 1
and 65535 seconds.
enable_reauth - (Optional) You can enable or disable the re-authentication mechanism for a
specific port.
enable - Specify to enable the re-authentication mechanism for a specific port.
disable - Specify to disable the re-authentication mechanism for a specific port.
max_users - (Optional) Specify per port maximum number of users. The default value is 16.
<value 1-448> - Enter the maximum users value here. This value must be between 1 and
448.
no_limit - Specify that no limit is enforced on the maximum users used.
47
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the parameters that control the operation of the authenticator associated with a port:
DGS-3120-24TC:admin# config 802.1x auth_parameter ports 1:1-1:20 direction
both
Command: config 802.1x auth_parameter ports 1:1-1:20 direction both
Success.
DGS-3120-24TC:admin#
Format
config 802.1x auth_mode [port_based | mac_based]
Parameters
port_based - Configure the authentication as port based mode.
mac_based - Configure the authentication as MAC based mode.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the authentication mode:
DGS-3120-24TC:admin# config 802.1x auth_mode port_based
Command: config 802.1x auth_mode port_based
Success.
DGS-3120-24TC:admin#
48
Format
config 802.1x init [port_based ports [<portlist> | all] | mac_based ports [<portlist> | all]
{mac_address <macaddr>}]
Parameters
port_based ports- Configure the authentication as port based mode.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all ports will be used.
mac_based ports - Configure the authentication as MAC based mode.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all ports will be used.
mac_address - (Optional) Specify the MAC address of client.
<macaddr> - Enter the MAC address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To initialize the authentication state machine of some or all:
DGS-3120-24TC:admin# config 802.1x init port_based ports all
Command: config 802.1x init port_based ports all
Success.
DGS-3120-24TC:admin#
Format
config 802.1x reauth [port_based ports [<portlist> | all] | mac_based ports [<portlist> | all]
{mac_address <macaddr>}]
Parameters
port_based ports - Configure the authentication as port based mode.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all ports will be used.
mac_based ports - Configure the authentication as MAC based mode.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all ports will be used.
mac_address - (Optional) Specify the MAC address of client.
<macaddr> - Enter the MAC address used here.
49
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To re-authenticate the device connected to the port:
DGS-3120-24TC:admin# config 802.1x reauth port_based ports all
Command: config 802.1x reauth port_based ports all
Success.
DGS-3120-24TC:admin#
Format
create 802.1x guest_vlan <vlan_name 32>
Parameters
<vlan_name 32> - Specify the VLAN to be guest VLAN. The VLAN name can be up to 32
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a VLAN named “guestVLAN” as 802.1X guest VLAN:
DGS-3120-24TC:admin# create 802.1x guest_vlan guestVLAN
Command: create 802.1x guest_vlan guestVLAN
Success.
DGS-3120-24TC:admin#
50
Format
delete 802.1x guest_vlan <vlan_name 32>
Parameters
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the guest VLAN named “guestVLAN”:
DGS-3120-24TC:admin# delete 802.1x guest_vlan guestVLAN
Command: delete 802.1x guest_vlan guestVLAN
Success.
DGS-3120-24TC:admin#
Format
config 802.1x guest_vlan ports [<portlist> | all] state [enable | disable]
Parameters
ports - A range of ports enable or disable guest VLAN function.
<portlist> - Enter the list of ports used for the configuration here.
all - Specify that all the port will be included in this configuration.
state - Specify the guest VLAN port state of the configured ports.
enable - Specify to join the guest VLAN.
disable - Specify to be removed from the guest VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable from port 1:2 to 1:8 to configure 802.1X guest VLAN:
51
Success.
DGS-3120-24TC:admin#
Format
show 802.1x guest_vlan
Parameters
None.
Restrictions
None.
Example
To show 802.1X guest VLAN on the Switch:
DGS-3120-24TC:admin#show 802.1x guest_vlan
Command: show 802.1x guest_vlan
DGS-3120-24TC:admin#
52
Format
config radius add <server_index 1-3> [<server_ip> | <ipv6addr>] [key <password 32> |
encryption_key <password 56>] [default | {auth_port <udp_port_number 1-65535 > |
acct_port <udp_port_number 1-65535 > | timeout <sec 1-255> | retransmit<int 1-20>}]
Parameters
<server_index 1-3> - Enter the RADIUS server index. This value must be between 1 and 3.
<server_ip> - Enter the IP address of the RADIUS server here.
<ipv6addr> - Enter the IPv6 address of the RADIUS server here. (EI Mode Only)
key - The key pre-negotiated between switch and the RADIUS server. It is used to encrypt user’s
authentication data before being transmitted over internet. The maximum length of the key is
32.
<password 32> - Enter the password here. The password can be up to 32 characters long.
encryption_key - The key pre-negotiated between the Switch and the RADIUS server. It is used
to encrypt user’s authentication data before being transmitted over the Internet. The maximum
length of the key is 32.
<password 56> - The encrypted key string. The maximum length of the plain text key is 56
bytes. The encryption algorithm is based on DES.
default - Sets the authentication UDP port number to 1812 accounting UDP port number to 1813,
timeout to 5 seconds and retransmit to 2.
auth_port - (Optional) Specify the UDP port number which is used to transmit RADIUS
authentication data between the Switch and the RADIUS server. The range is 1 to 65535.
<udp_port_number 1-65535> - Enter the authentication port number here. This value must
be between 1 and 65535.
acct_port - (Optional) Specify the UDP port number which is used to transmit RADIUS
accounting statistics between the Switch and the RADIUS server. The range is 1 to 65535.
<udp_port_number 1-65535> - Enter the accounting port number here. This value must be
between 1 and 65535.
timeout - (Optional) The time in second for waiting server reply. The default value is 5 seconds.
<sec 1-255> - Enter the timeout value here. This value must be between 1 and 255 seconds.
retransmit - (Optional) The count for re-transmitting. The default value is 2.
<int 1-20> - Enter the re-transmit value here. This value must be between 1 and 20.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a new RADIUS server:
DGS-3120-24TC:admin# config radius add 1 10.48.74.121 key dlink default
Command: config radius add 1 10.48.74.121 key dlink default
Success.
DGS-3120-24TC:admin#
53
Format
config radius delete <server_index 1-3>
Parameters
<server_index 1-3> - Specify to delete a RADIUS server.Enter the RADIUS server index.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a radius server:
DGS-3120-24TC:admin# config radius delete 1
Command: config radius delete 1
Success.
DGS-3120-24TC:admin#
Format
config radius <server_index 1-3> {ipaddress [<server_ip> | <ipv6addr>] | [key <password
32> | encryption_key <password 56>] | auth_port [<udp_port_number 1-65535 > | default] |
acct_port [<udp_port_number 1-65535> | default] | timeout [<sec 1-255> | default] |
retransmit [<int 1-20> | default]}
Parameters
<server_index 1-3> - Enter the RADIUS server index here. This value must be between 1 and 3.
ipaddress - (Optional) The IP address of the RADIUS server.
<server_ip> - Enter the RADIUS server IP address here.
<ipv6addr> - Enter the RADIUS server IPv6 address used here. (EI Mode Only)
key - (Optional) The key pre-negotiated between switch and RADIUS server. It is used to encrypt
user’s authentication data before being transmitted over internet. The maximum length of the
key is 32.
<password 32> - Enter the key here. The key can be up to 32 characters long.
encryption_key - The key pre-negotiated between the Switch and the RADIUS server. It is used
to encrypt user’s authentication data before being transmitted over the Internet. The maximum
length of the key is 32.
<password 56> - The encrypted key string. The maximum length of the plain text key is 56
bytes. The encryption algorithm is based on DES.
auth_port - (Optional) Specify the UDP port number which is used to transmit RADIUS
authentication data between the Switch and the RADIUS server. The range is 1 to 65535. The
default value is 1812.
54
<udp_port_number 1-65535> - Enter the authentication port number here. This value must
be between 1 and 65535.
default - Specify that the default port number will be used.
acct_port - (Optional) Specify the UDP port number which is used to transmit RADIUS
accounting statistics between the Switch and the RADIUS server. The range is 1 to 65535.
The default value is 1813.
<udp_port_number 1-65535> - Enter the accounting port number here. This value must be
between 1 and 65535.
default - Specify that the default port number will be used.
timeout - (Optional) The time in second for waiting server reply. The default value is 5 seconds.
<sec 1-255> - Enter the timeout value here. This value must be between 1 and 255 seconds.
default - Specify that the default timeout value will be used.
retransmit - (Optional) The count for re-transmitting. The default value is 2.
<int 1-20> - Enter the re-transmit value here. This value must be between 1 and 20.
default - Specify that the default re-transmit value will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a radius server:
DGS-3120-24TC:admin# config radius 1 auth_port 60
Command: config radius 1 auth_port 60
Success.
DGS-3120-24TC:admin#
Format
show radius
Parameters
None.
Restrictions
None.
Example
To display RADIUS server configurations:
55
Index 1
IP Address : 172.18.211.71
Auth-Port : 1812
Acct-Port : 1813
Timeout : 5 sec
Retransmit : 2
Key : 1234567
Index 2
IP Address : 172.18.211.108
Auth-Port : 1812
Acct-Port : 1813
Timeout : 5 sec
Retransmit : 2
Key : adfdslkfjefiefdkgjdassdwtgjk6y1w
Total Entries : 2
DGS-3120-24TC:admin#
Format
show auth_statistics {ports <portlist>}
Parameters
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - Enter the list of ports that will be displayed here.
Restrictions
None.
Example
To display authenticator statistics information for port 1:
56
EapolFramesRx 0
EapolFramesTx 9
EapolStartFramesRx 0
EapolReqIdFramesTx 6
EapolLogoffFramesRx 0
EapolReqFramesTx 0
EapolRespIdFramesRx 0
EapolRespFramesRx 0
InvalidEapolFramesRx 0
EapLengthErrorFramesRx 0
LastEapolFrameVersion 0
LastEapolFrameSource 00-00-00-00-00-00
Format
show auth_diagnostics {ports <portlist>}
Parameters
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - Enter the list of ports that will be displayed here.
Restrictions
None.
Example
To display authenticator diagnostics information for port 1:
57
EntersConnecting 11
EapLogoffsWhileConnecting 0
EntersAuthenticating 0
SuccessWhileAuthenticating 0
TimeoutsWhileAuthenticating 0
FailWhileAuthenticating 0
ReauthsWhileAuthenticating 0
EapStartsWhileAuthenticating 0
EapLogoffWhileAuthenticating 0
ReauthsWhileAuthenticated 0
EapStartsWhileAuthenticated 0
EapLogoffWhileAuthenticated 0
BackendResponses 0
BackendAccessChallenges 0
BackendOtherRequestsToSupplicant 0
BackendNonNakResponsesFromSupplicant 0
BackendAuthSuccesses 0
BackendAuthFails 0
Format
show auth_session_statistics {ports <portlist>}
Parameters
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - Enter the list of ports that will be displayed here.
Restrictions
None.
Example
To display authenticator session statistics information for port 1:
58
SessionOctetsRx 0
SessionOctetsTx 0
SessionFramesRx 0
SessionFramesTx 0
SessionId
SessionAuthenticMethod Remote Authentication Server
SessionTime 0
SessionTerminateCause SupplicantLogoff
SessionUserName
Format
show auth_client
Parameters
None.
Restrictions
None.
Example
To display authentication client information:
59
DGS-3120-24TC:admin#show auth_client
Command: show auth_client
radiusAuthClient ==>
radiusAuthClientInvalidServerAddresses 0
radiusAuthClientIdentifier D-Link
radiusAuthServerEntry ==>
radiusAuthServerIndex :3
radiusAuthServerAddress 0.0.0.0
radiusAuthClientServerPortNumber 0
radiusAuthClientRoundTripTime 0
radiusAuthClientAccessRequests 0
radiusAuthClientAccessRetransmissions 0
radiusAuthClientAccessAccepts 0
radiusAuthClientAccessRejects 0
radiusAuthClientAccessChallenges 0
radiusAuthClientMalformedAccessResponses 0
radiusAuthClientBadAuthenticators 0
radiusAuthClientPendingRequests 0
radiusAuthClientTimeouts 0
radiusAuthClientUnknownTypes 0
radiusAuthClientPacketsDropped 0
Format
show acct_client
Parameters
None.
Restrictions
None.
Example
To display information of RADIUS accounting client:
60
DGS-3120-24TC:admin#show acct_client
Command: show acct_client
radiusAcctClient ==>
radiusAcctClientInvalidServerAddresses 0
radiusAcctClientIdentifier D-Link
radiusAuthServerEntry ==>
radiusAccServerIndex : 1
radiusAccServerAddress 0.0.0.0
radiusAccClientServerPortNumber 0
radiusAccClientRoundTripTime 0
radiusAccClientRequests 0
radiusAccClientRetransmissions 0
radiusAccClientResponses 0
radiusAccClientMalformedResponses 0
radiusAccClientBadAuthenticators 0
radiusAccClientPendingRequests 0
radiusAccClientTimeouts 0
radiusAccClientUnknownTypes 0
radiusAccClientPacketsDropped 0
61
62
create radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
config radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
delete aaa server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+| radius]
show aaa server_host
create tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
config tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
create xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
config xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
create tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
config tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
enable aaa_server_password_encryption
disable aaa_server_password_encryption
show aaa
config accounting service [network | shell | system] state [enable {[radius_only |
method_list_name <string 15> | default_method_list]} | disable]
show accounting service
Format
enable authen_policy_encryption
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the authentication policy encryption:
63
DGS-3120-24TC:admin#enable authen_policy_encryption
Command: enable authen_policy_encryption
Success.
DGS-3120-24TC:admin#
Format
disable authen_policy_encryption
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the authentication policy encryption:
DGS-3120-24TC:admin#disable authen_policy_encryption
Command: disable authen_policy_encryption
Success.
DGS-3120-24TC:admin#
Format
enable password encryption
64
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the password encryption:
DGS-3120-24TC:admin#enable password encryption
Command: enable password encryption
Success.
DGS-3120-24TC:admin#
Format
disable password encryption
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the password encryption:
DGS-3120-24TC:admin#disable password encryption
Command: disable password encryption
Success.
DGS-3120-24TC:admin#
65
Format
enable authen_policy
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable system access authentication policy:
DGS-3120-24TC:admin# enable authen_policy
Command: enable authen_policy
Success.
DGS-3120-24TC:admin#
Format
disable authen_policy
Parameters
None.
66
Restrictions
Only Administrator-level users can issue this command.
Example
To disable system access authentication policy:
DGS-3120-24TC:admin# disable authen_policy
Command: disable authen_policy
Success.
DGS-3120-24TC:admin#
Format
show authen_policy
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To display system access authentication policy:
DGS-3120-24TC:admin#show authen_policy
Command: show authen_policy
DGS-3120-24TC:admin#
67
Format
create authen_login method_list_name <string 15>
Parameters
<string 15> - The user-defined method list name. This value can be up to 15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined method list for user login:
DGS-3120-24TC:admin# create authen_login method_list_name login_list_1
Command: create authen_login method_list_name login_list_1
Success.
DGS-3120-24TC:admin#
Format
config authen_login [default | method_list_name <string 15>] method {tacacs | xtacacs |
tacacs+ | radius | server_group <string 15> | local | none}
Parameters
default - The default method list of authentication methods.
method_list_name - The user-defined method list of authentication methods.
<string 15> - Enter the method list name here. This value can be up to 15 characters long.
method - Specify the authentication method used.
68
Restrictions
Only Administrator-level users can issue this command.
Example
To configure a user-defined method list for user login:
DGS-3120-24TC:admin# config authen_login method_list_name login_list_1 method
tacacs+ tacacs local
Command: config authen_login method_list_name login_list_1 method tacacs+
tacacs local
Success.
DGS-3120-24TC:admin#
Format
delete authen_login method_list_name <string 15>
Parameters
<string 15> - The user-defined method list name. This value can be up to 15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a user-defined method list for user login:
DGS-3120-24TC:admin# delete authen_login method_list_name login_list_1
Command: delete authen_login method_list_name login_list_1
Success.
DGS-3120-24TC:admin#
69
Format
show authen_login [default | method_list_name <string 15> | all]
Parameters
default - Display default user-defined method list for user login.
method_list_name - Display the specific user-defined method list for user login.
<string 15> - Enter the method list name here. This value can be up to 15 characters long.
all - Display all method lists for user login.
Restrictions
Only Administrator-level users can issue this command.
Example
To display a user-defined method list for user login:
DGS-3120-24TC:admin# show authen_login method_list_name login_list_1
Command: show authen_login method_list_name login_list_1
DGS-3120-24TC:admin#
Format
create authen_enable method_list_name <string 15>
Parameters
<string 15> - The user-defined method list name. This value can be up to 15 characters long.
70
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined method list for promoting user's privilege to Admin level:
DGS-3120-24TC:admin# create authen_enable method_list_name enable_list_1
Command: create authen_enable method_list_name enable_list_1
Success.
DGS-3120-24TC:admin#
Format
config authen_enable [default | method_list_name <string 15>] method {tacacs | xtacacs |
tacacs+ | radius | server_group <string 15> | local _enable | none}
Parameters
default - The default method list of authentication methods.
method_list_name - The user-defined method list of authentication methods.
<string 15> Enter the method list name here. This value can be up to 15 characters long.
method - Specify the authentication method used.
tacacs - (Optional) Authentication by the built-in server group “tacacs”.
xtacacs - (Optional) Authentication by the built-in server group “xtacacs”.
tacacs+ - (Optional) Authentication by the built-in server group “tacacs+”.
radius - (Optional) Authentication by the built-in server group “radius”.
server_group - (Optional) Authentication by the user-defined server group.
<string 15> - Enter the server group name here. This value can be up to 15 characters
long.
local_enable - (Optional) Authentication by local enable password in device.
none - (Optional) No authentication.
Restrictions
Only Administrator-level users can issue this command.
71
Example
To configure a user-defined method list for promoting user's privilege to Admin level:
DGS-3120-24TC:admin# config authen_enable method_list_name enable_list_1 method
tacacs+ tacacs local_enable
Command: config authen_enable method_list_name enable_list_1 method tacacs+
tacacs local_enable
Success.
DGS-3120-24TC:admin#
Format
delete authen_enable method_list_name <string 15>
Parameters
<string 15> - The user-defined method list name. This value can be up to 15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a user-defined method list for promoting user's privilege to Admin level:
DGS-3120-24TC:admin# delete authen_enable method_list_name enable_list_1
Command: delete authen_enable method_list_name enable_list_1
Success.
DGS-3120-24TC:admin#
72
Format
show authen_enable [default | method_list_name <string 15> | all]
Parameters
default - Display default user-defined method list for promoting user's privilege to Admin level.
method_list_name - Display the specific user-defined method list for promoting user's privilege
to Admin level.
<string 15> - Enter the method list name here. This value can be up to 15 characters long.
all - Display all method lists for promoting user's privilege to Admin level.
Restrictions
Only Administrator-level users can issue this command.
Example
To display all method lists for promoting user's privilege to Admin level:
DGS-3120-24TC:admin#show authen_enable method_list_name enable_list_1
Command: show authen_enable method_list_name enable_list_1
DGS-3120-24TC:admin#
Format
config authen application [console | telnet | ssh | http | all] [login | enable] [default |
method_list_name <string 15>]
Parameters
console - Application: console.
telnet - Application: telnet.
ssh - Application: SSH.
http - Application: web.
all - Application: console, telnet, SSH, and web.
login - Select the method list of authentication methods for user login.
enable - Select the method list of authentication methods for promoting user's privilege to Admin
level.
default - Default method list.
method_list_name - The user-defined method list name.
<string> - Enter the method list name here. This value can be up to 15 characters long.
73
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the login method list for telnet:
DGS-3120-24TC:admin# config authen application telnet login method_list_name
login_list_1
Command: config authen application telnet login method_list_name login_list_1
Success.
DGS-3120-24TC:admin#
Format
show authen application
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the login/enable method list for all applications:
DGS-3120-24TC:admin# show authen application
Command: show authen application
DGS-3120-24TC:admin#
74
Format
create authen server_group <string 15>
Parameters
<string 15> - The user-defined server group name. This value can be up to 15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined authentication server group:
DGS-3120-24TC:admin# create authen server_group mix_1
Command: create authen server_group mix_1
Success.
DGS-3120-24TC:admin#
Format
config authen server_group [tacacs | xtacacs | tacacs+ | radius | <string 15>] [add | delete]
server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius]
Parameters
server_group - User-defined server group.
tacacs - Built-in server group “tacacs”.
xtacacs - Built-in server group “xtacacs”.
tacacs+ - Built-in server group “tacacs+”.
radius - Built-in server group “radius”.
<string 15> - Enter the server group name here. This value can be up to 15 characters long.
75
Restrictions
Only Administrator-level users can issue this command.
Example
To add an authentication server host to an server group:
DGS-3120-24TC:admin# config authen server_group mix_1 add server_host
10.1.1.222 protocol tacacs+
Command: config authen server_group mix_1 add server_host 10.1.1.222 protocol
tacacs+
Success.
DGS-3120-24TC:admin#
Format
delete authen server_group <string 15>
Parameters
<string 15> - The user-defined server group name. This value can be up to 15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a user-defined authentication server group:
76
Success.
DGS-3120-24TC:admin#
Format
show authen server_group {<string 15>}
Parameters
<string 15> - (Optional) The built-in or user-defined server group name. This value can be up to
15 characters long.
Restrictions
Only Administrator-level users can issue this command.
Example
To display all authentication server groups:
DGS-3120-24TC:admin# show authen server_group
Command: show authen server_group
Total Entries : 5
DGS-3120-24TC:admin#
77
services can be run on the same physical host. The maximum supported number of server hosts is
16.
Format
create authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius] {port <int
1-65535> | [key [<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int
1-255> | retransmit <int 1-20>}
Parameters
<ipaddr> - Enter the server host IP address.
protocol - Specify the host's authentication protocol.
tacacs - Server host’s authentication protocol.
xtacacs - Server host’s authentication protocol.
tacacs+ - Server host’s authentication protocol.
radius - Server host’s authentication protocol.
port - (Optional) The port number of authentication protocol for server host. Default value for
TACACS/XTACACS/TACACS+ is 49. Default value for RADIUS is 1812.
<int 1-65535> - Enter the authentication protocol port number here. This value must be
between 1 and 65535.
key - (Optional) The key for TACACS+ and RADIUS authentication. If the value is null, no
encryption will apply. This value is meaningless for TACACS and XTACACS.
<key_string 254> - Enter the TACACS+ or the RADIUS key here. This key can be up to 254
characters long.
none - No encryption for TACACS+ and RADIUS authentication. This value is meaningless
for TACACS and XTACACS.
encryption_key - (Optional) Specify the encryption key string for TACACS+ and RADIUS
authentication.
<key_string 344> - Enter the encryption key string.
timeout - (Optional) The time in second for waiting server reply. Default value is 5 seconds.
<int 1-255> - Enter the timeout value here. This value must be between 1 and 255 seconds.
retransmit - (Optional) The count for re-transmit. This value is meaningless for TACACS+.
Default value is 2.
<int 1-20> - Enter the re-transmit value here. This value must be between 1 and 20.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a TACACS+ authentication server host, its listening port number is 15555 and timeout
value is 10 seconds:
DGS-3120-24TC:admin#create authen server_host 10.1.1.222 protocol tacacs+ port
15555 timeout 10
Command: create authen server_host 10.1.1.222 protocol tacacs+ port 15555
timeout 10
DGS-3120-24TC:admin#
78
Format
config authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius] {port <int
1-65535> | [key [<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int
1-255> | retransmit <int 1-20>}
Parameters
<ipaddr> - Enter the server host IP address.
protocol - Specify the server host's authentication protocol.
tacacs - Server host’s authentication protocol.
xtacacs - Server host’s authentication protocol.
tacacs+ - Server host’s authentication protocol.
radius - Server host’s authentication protocol.
port - (Optional) The port number of authentication protocol for server host. Default value for
TACACS/XTACACS/TACACS+ is 49. Default value for RADIUS is 1812.
<int 1-65535> - Enter the port number here. This value must be between 1 and 65535.
key - (Optional) The key for TACACS+ and RADIUS authentication. If the value is null, no
encryption will apply. This value is meaningless for TACACS and XTACACS.
<key_string 254> - Enter the TACACS+ key here. This value can be up to 254 characters
long.
none - No encryption for TACACS+ and RADIUS authentication. This value is meaningless
for TACACS and XTACACS.
encryption_key - (Optional) Specify the encryption key string for TACACS+ and RADIUS
authentication.
<key_string 344> - Enter the encryption key string.
timeout - (Optional) The time in second for waiting server reply. Default value is 5 seconds.
<int 1-255> - Enter the timeout value here. This value must be between 1 and 255 seconds.
retransmit - (Optional) The count for re-transmit. This value is meaningless for TACACS+.
Default value is 2.
<int 1-20> - Enter the re-transmit value here. This value must be between 1 and 20.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure a TACACS+ authentication server host’s key value:
DGS-3120-24TC:admin#config authen server_host 10.1.1.222 protocol tacacs+ key
"This is a secret."
Command: config authen server_host 10.1.1.222 protocol tacacs+ key "This is a
secret."
Success.
DGS-3120-24TC:admin#
79
Format
delete authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius]
Parameters
<ipaddr> - Enter the server host's IP address.
protocol - Specify that server host's authentication protocol.
tacacs - Server host’s authentication protocol.
xtacacs - Server host’s authentication protocol.
tacacs+ - Server host’s authentication protocol.
radius - Server host’s authentication protocol.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete an authentication server host:
DGS-3120-24TC:admin# delete authen server_host 10.1.1.222 protocol tacacs+
Command: delete authen server_host 10.1.1.222 protocol tacacs+
Success.
DGS-3120-24TC:admin#
Format
show authen server_host
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
80
Example
To display all authentication server hosts:
DGS-3120-24TC:admin#show authen server_host
Command: show authen server_host
Total Entries : 1
DGS-3120-24TC:admin#
Format
config authen parameter response_timeout <int 0-255>
Parameters
<int 0-255> - The amount of time for user input on console or telnet or SSH. 0 means there is no
time out. This value must be between 0 and 255. Default value is 30 seconds.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the amount of time waiting or user input to be 60 seconds:
DGS-3120-24TC:admin# config authen parameter response_timeout 60
Command: config authen parameter response_timeout 60
Success.
DGS-3120-24TC:admin#
81
Format
config authen parameter attempt <int 1-255>
Parameters
<int 1-255> - The amount of attempts for user's trying to login or promote the privilege on console
or telnet or SSH. This value must be between 1 and 255. Default value is 3.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the maximum attempts for user's trying to login or promote the privilege to be 9:
DGS-3120-24TC:admin# config authen parameter attempt 9
Command: config authen parameter attempt 9
Success.
DGS-3120-24TC:admin#
Format
show authen parameter
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the parameters of authentication:
82
DGS-3120-24TC:admin#
Format
enable admin
Parameters
None.
Restrictions
None.
Example
To enable administrator lever privilege:
DGS-3120-24TC:oper#enable admin
Command: enable admin
PassWord:*****
Success.
DGS-3120-24TC:admin#
system will prompt the user to input the password interactively. For this case, the user can only
input the plain text password. If the password is present in the command, the user can select to
input the password in the plain text form or in the encrypted form. The encryption algorithm is
based on SHA-I.
Format
config admin local_enable {encrypt [plain_text | sha_1] <password>}
Parameters
encrypt - (Optional) Specify the password form.
plain_text - Specify the password in plain text form.
sha_1 - Specify the password in SHA-1 encrypted form.
<password> - (Optional) The password for promoting the privilege level. The length for a
password in plain-text form and SHA-1 encrypted form are different.
plain-text: Passwords can be from a minimum of 0 to a maximum of 15 characters.
SHA-1: The length of Encrypted passwords is fixed to 35 bytes longand the password is case-
sensitive.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the administrator password:
DGS-3120-24TC:admin#config admin local_enable
Command: config admin local_enable
DGS-3120-24TC:admin#
Format
create aaa server_group <string 15>
84
Parameters
<string 15> - Specify the user-defined server group name.
Restrictions
Only Administrator level can issue this command.
Example
To create a user-defined AAA server group called “mix_1”:
DGS-3120-24TC:admin#create aaa server_group mix_1
Command: create aaa server_group mix_1
Success.
DGS-3120-24TC:admin#
Format
config aaa server_group [tacacs | xtacacs | tacacs+ | radius | group_name <string 15>] [add
| delete] server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+| radius]
Parameters
tacacs - Specify the built-in TACACS server group.
xtacacs - Specify the built-in XTACACS server group.
tacacs+ - Specify the built-in TACACS+ server group.
radius - Specify the built-in RADIUS server group.
group_name - Specify a user-defined server group.
<string 15> - Enter the name of the server group.
add - Add a server host to the server group.
delete - Remove a server host to the server group.
server_host - Specify the server host.
<ipaddr> - Enter the IP address of the server host.
protocol - Specify the server host protocol.
tacacs - Specify the server host using TACACS protocol.
xtacacs - Specify the server host using XTACACS protocol.
tacacs+ - Specify the server host using TACACS+ protocol.
radius - Specify the server host using RADIUS protocol.
Restrictions
Only Administrator level can issue this command.
85
Example
To add an AAA server host with an IP address of 10.1.1.222 to server group “mix_1”, specifying
the TACACS+ protocol:
DGS-3120-24TC:admin# config aaa server_group group_name mix_1 add server_host
10.1.1.222 protocol tacacs+
Command: config aaa server_group group_name mix_1 add server_host 10.1.1.222
protocol tacacs+
Success.
DGS-3120-24TC:admin#
Format
delete aaa server_group <string 15>
Parameters
<string 15> - Specify the server group name to be deleted.
Restrictions
Only Administrator level can issue this command.
Example
To delete a user-defined AAA server group called “mix_1”:
DGS-3120-24TC:admin#delete aaa server_group mix_1
Command: delete aaa server_group mix_1
Success.
DGS-3120-24TC:admin#
Format
show aaa server_group {<string 15>}
86
Parameters
<string 15> - (Optional) Specify the built-in or user-defined server group name.
Restrictions
Only Administrator level can issue this command.
Example
To display all AAA server groups:
DGS-3120-24TC:admin#show aaa server_group
Command: show aaa server_group
Total Entries : 5
DGS-3120-24TC:admin#
Format
create accounting method_list_name <string 15>
Parameters
<string 15> - Specify the built-in or user-defined method list.
Restrictions
Only Administrator level can issue this command.
87
Example
To a user-defined accounting method list called “shell_acct”:
DGS-3120-24TC:admin#create accounting method_list_name shell_acct
Command: create accounting method_list_name shell_acct
Success.
DGS-3120-24TC:admin#
Format
config accounting [default | method_list_name <string 15>] method {tacacs+ | radius |
server_group <string 15> | none}
Parameters
default - Specify the default method list of accounting methods.
method_list_name - Specify the user-defined method list of accounting methods.
<string 15> - Enter the name of the method list.
method - Specify the protocol.
tacacs+ - Specify the built-in TACACS+ server group.
radius – Specify the built-in RADIUS server group.
server_group - Specify the user-defined server group. If the group contains TACACS and
XTACACS server, it will be skipped in accounting.
<string 15> - Enter the name of server group.
none - Specify no accounting.
Restrictions
Only Administrator level can issue this command.
Example
To configure a user-defined method list called “shell_acct”, that specifies a sequence of the built-in
TACACS+ server group, followed by the RADIUS server group for accounting service on the
Switch:
DGS-3120-24TC:admin#config accounting method_list_name shell_acct method
tacacs+ radius
Command: config accounting method_list_name shell_acct method tacacs+ radius
Success.
DGS-3120-24TC:admin#
88
Format
delete accounting method_list_name <string 15>
Parameters
<string 15> - Specify the built-in or user-defined method list.
Restrictions
Only Administrator level can issue this command.
Example
To delete the user-defined accounting method list called “shell_acct” from switch:
DGS-3120-24TC:admin#delete accounting method_list_name shell_acct
Command: delete accounting method_list_name shell_acct
Success.
DGS-3120-24TC:admin#
Format
show accounting [default | method_list_name <string 15> | all]
Parameters
default - Display the user-defined list of default accounting methods.
method_list_name - Specify the user-defined list of specific accounting methods.
<string 15> - Enter the name of the method list.
all - Display all accounting method lists on the Switch.
Restrictions
Only Administrator level can issue this command.
89
Example
To display the user-defined accounting method list called “shell_acct”:
DGS-3120-24TC:admin#show accounting method_list_name shell_acct
Command: show accounting method_list_name shell_acct
DGS-3120-24TC:admin#
Format
config accounting service command {administrator | operator | power_user | user}
[method_list_name <string> | none]
Parameters
administrator - Accounting service for all administrator level commands.
operator - Accounting service for all operator level commands.
power_user - Accounting service for all power-user level commands.
user - Accounting service for all user level commands.
method_list_name - Specify accounting service by the AAA user-defined method list specified
by the “create accounting method_list_name <string 15>” command.
<string> - Enter the name of the method list.
none - Disable AAA command accounting services by specified command level.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable AAA accounting methodlist “shell_acct” to configure accounting shell state:
DGS-3120-24TC:admin#config accounting service shell state enable
method_list_name shell_acct
Command: config accounting service shell state enable method_list_name
shell_acct
Success.
DGS-3120-24TC:admin#
90
Format
create radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
auth_port - (Optional) Specify the port of the RADIUS authentication.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 1812.
acct_port - (Optional) Specify the port of the RAIDUS accounting.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 1813.
key - (Optional) Specify the key for RADIUS.
<key_string 254> - Enter the plain text key string for RADIUS.
none - No encryption for RADIUS.
encryption_key - (Optional) The encrypted form key string for RADIUS. The encryption
algorithm is based on DES.
<key_string 344> - Etner the string with maximum 344 characters.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To create an RADIUS server host:
DGS-3120-24TC:admin#create radius server_host 10.1.1.222 auth_port 15555
timeout 10
Command: create radius server_host 10.1.1.222 auth_port 15555 timeout 10
Success.
DGS-3120-24TC:admin#
91
Format
config radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
auth_port - (Optional) Specify the port of the RADIUS authentication.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 1812.
acct_port - (Optional) Specify the port of the RAIDUS accounting.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 1813.
key - (Optional) Specify the key for RADIUS.
<key_string 254> - Enter the plain text key string for RADIUS.
none - No encryption for RADIUS.
encryption_key - (Optional) The encrypted form key string for RADIUS. The encryption
algorithm is based on DES.
<key_string 344> - Etner the string with maximum 344 characters.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To configure the RADIUS server host:
DGS-3120-24TC:admin#config radius server_host 10.1.1.222 key "abc123"
Command: config radius server_host 10.1.1.222 key "abc123"
Success.
DGS-3120-24TC:admin#
Format
delete aaa server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+| radius]
Parameters
<ipaddr> - Enter the IP address of the server host.
protocol – Specify the protocol.
tacacs – Specify TACACS server host.
92
Restrictions
Only Administrator level can issue this command.
Example
To tacacs | xtacacs | tacacs+| delete an AAA server host, with an IP address of 10.1.1.222, that is
running the TACACS+ protocol:
DGS-3120-24TC:admin#delete aaa server_host 10.1.1.222 protocol tacacs+
Command: delete aaa server_host 10.1.1.222 protocol tacacs+
Success.
DGS-3120-24TC:admin#
Format
show aaa server_host
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display all AAA server hosts:
93
Total Entries : 1
DGS-3120-24TC:admin#
Format
create tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit
<int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the TACACS server host.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To create a TACACS server host:
DGS-3120-24TC:admin#create tacacs server_host 10.1.1.223 port 15555 timeout 10
Command: create tacacs server_host 10.1.1.223 port 15555 timeout 10
Success.
DGS-3120-24TC:admin#
94
Format
config tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit
<int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the TACACS server host.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To configure the TACACS server host:
DGS-3120-24TC:admin#config tacacs server_host 10.1.1.223 retransmit 5
Command: config tacacs server_host 10.1.1.223 retransmit 5
Success.
DGS-3120-24TC:admin#
Format
create xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit
<int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the XTACACS server host.
95
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To create a XTACACS server host:
DGS-3120-24TC:admin#create xtacacs server_host 10.1.1.224 port 15555 timeout 10
Command: create xtacacs server_host 10.1.1.224 port 15555 timeout 10
Success.
DGS-3120-24TC:admin#
Format
config xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit
<int 1-20>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the XTACACS server host.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
retransmit - (Optional) Specify the count for re-transmissions.
<int 1-20> - Enter the value between 1 and 20. The default value is 2.
Restrictions
Only Administrator level can issue this command.
Example
To configure the XTACACS server host:
96
Success.
DGS-3120-24TC:admin#
Format
create tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the TACACS+ server host.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
key - (Optional) Specify the key for TACACS+.
<key_string 254> - Enter the plain text key string for TACACS+.
none - No encryption for RADIUS.
encryption_key - (Optional) The encrypted form key string for TACACS+. The encryption
algorithm is based on DES.
<key_string 344> - Etner the string with maximum 344 characters.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
Restrictions
Only Administrator level can issue this command.
Example
To create a TACACS+ server host:
DGS-3120-24TC:admin#create tacacs+ server_host 10.1.1.211 port 15555 timeout 10
key "abc123"
Command: create tacacs+ server_host 10.1.1.211 port 15555 timeout 10 key
"abc123"
Success.
DGS-3120-24TC:admin#
97
Format
config tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
Parameters
<ipaddr> - Enter the IP address of the server host.
port - (Optional) The port number of the TACACS+ server host.
<int 1-65535> - Enter the value between 1 and 65535. The default value is 49.
key - (Optional) Specify the key for TACACS+.
<key_string 254> - Enter the plain text key string for TACACS+.
none - No encryption for RADIUS.
encryption_key - (Optional) The encrypted form key string for TACACS+. The encryption
algorithm is based on DES.
<key_string 344> - Etner the string with maximum 344 characters.
timeout - (Optional) Specify the time in second to wait for the server to reply.
<int 1-255> - Enter the value between 1 and 255. The default value is 5.
Restrictions
Only Administrator level can issue this command.
Example
To configure the TACACS+ server host:
DGS-3120-24TC:admin#config tacacs+ server_host 10.1.1.211 key "abcd123"
Command: config tacacs+ server_host 10.1.1.211 key "abcd123"
Success.
DGS-3120-24TC:admin#
Format
enable aaa_server_password_encryption
Parameters
None.
98
Restrictions
Only Administrator level can issue this command.
Example
To enable AAA server password encryption:
DGS-3120-24TC:admin#enable aaa_server_password_encryption
Command: enable aaa_server_password_encryption
Success.
DGS-3120-24TC:admin#
Format
disable aaa_server_password_encryption
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To disable AAA server password encryption:
DGS-3120-24TC:admin#disable aaa_server_password_encryption
Command: disable aaa_server_password_encryption
Success.
DGS-3120-24TC:admin#
99
Format
show aaa
Parameters
None.
Restrictions
None.
Example
To display AAA global configuration:
DGS-3120-24TC:admin#show aaa
Command: show aaa
DGS-3120-24TC:admin#
Format
config accounting service [network | shell | system] state [enable {[radius_only |
method_list_name <string 15> | default_method_list]} | disable]
Parameters
network - Accounting service for 802.1X, JWAC and WAC port access control. By default, the
service is disabled.
shell - Accounting service for shell events: When user logs on or out the Switch (via the console,
Telnet, or SSH) and timeout occurs, accounting information will be collected and sent to
100
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Enable it to configure accounting shell state:
DGS-3120-24TC:admin# config accounting service shell state enable
Command: config accounting service shell state enable
Success.
DGS-3120-24TC:admin#
Format
show accounting service
Parameters
None.
Restrictions
None.
Example
To show information of RADIUS accounting services:
101
Accounting Service
-------------------
Network : Enabled
Shell : Enabled
System : Enabled
DGS-3120-24TC:admin#
102
103
config time_range <range_name 32> [hours start_time <time hh:mm:ss> end_time <time
hh:mm:ss> weekdays <daylist> | delete]
show time_range
show current_config access_profile
Format
create access_profile profile_id <value 1-6> profile_name <name 1-32> [ethernet {vlan
{<hex 0x0-0x0fff>} | source_mac <macmask 000000000000-ffffffffffff> | destination_mac
<macmask 000000000000-ffffffffffff> | 802.1p | ethernet_type} | ip {vlan {<hex 0x0-0x0fff>} |
source_ip_mask <netmask> | destination_ip_mask <netmask> | dscp | [icmp {type | code } |
igmp {type} | tcp {src_port_mask <hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff> |
flag_mask [all | {urg | ack | psh | rst | syn | fin}]} | udp {src_port_mask <hex 0x0-0xffff> |
dst_port_mask <hex 0x0-0xffff>} | protocol_id_mask <hex 0x0-0xff> {user_define_mask
<hex 0x0-0xffffffff>}]} | packet_content_mask {offset_chunk_1 <value 0-31> <hex 0x0-
0xffffffff> | offset_chunk_2 <value 0-31> <hex 0x0-0xffffffff> | offset_chunk_3 <value 0-31>
<hex 0x0-0xffffffff> | offset_chunk_4 <value 0-31> <hex 0x0-0xffffffff>} | ipv6 {class |
flowlabel | source_ipv6_mask <ipv6mask> | destination_ipv6_mask <ipv6mask> | [tcp
{src_port_mask <hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff>} | udp {src_port_mask
<hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff> } | icmp {type | code}]}]
Parameters
profile_id - Specify the index of the access list profile.
<value 1-6> - Enter the profile ID here. This value must be between 1 and 6. A lower value
denotes a higher priority.
profile_name - The name of the profile must be specified. The maximum length is 32 characters.
<name 1-32> - Enter the profile name here.
ethernet - Specify this is an ethernet mask.
vlan - (Optional) Specify a VLAN mask. Only the last 12 bits of the mask will be considered.
<hex 0x0-0x0fff> - Enter the VLAN mask value here.
source_mac - (Optional) Specify the source MAC mask.
<macmask> - Enter the source MAC address used here.
destination_mac - (Optional) Specify the destination MAC mask.
<macmask> - Enter the destination MAC address used here.
802.1p - (Optional) Specify the 802.1p priority tag mask.
ethernet_type - (Optional) Specify the Ethernet type mask.
ip - Specify this is a IPv4 mask.
vlan - (Optional) Specify a VLAN mask. Only the last 12 bits of the mask will be considered.
<hex 0x0-0x0fff> -Enter the VLAN mask value here.
source_ip_mask - (Optional) Specify a source IP address mask.
<netmask> - Enter the source IP address mask here.
destination_ip_mask - (Optional) Specify a destination IP address mask.
<netmask> - Enter the destination IP address mask here.
104
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an access profile:
DGS-3120-24TC:admin# create access_profile profile_id 1 profile_name t1
ethernet vlan source_mac 00-00-00-00-00-01 destination_mac 00-00-00-00-00-02
802.1p ethernet_type
Command: create access_profile profile_id 1 profile_name 1 ethernet vlan
source_mac 00-00-00-00-00-01 destination_mac 00-00-00-00-00-02 802.1p
ethernet_type
Success.
Success.
Success.
DGS-3120-24TC:admin#
Format
delete access_profile [profile_id <value 1-6> | profile_name <name 1-32> | all]
Parameters
profile_id - Specify the index of the access list profile.
<value 1-6> - Enter the profile ID value here. This value must be between 1 and 6.
profile_name - Specify the name of the profile. The maximum length is 32 characters.
106
<name 1-32> - Enter the profile name here. This value must be between 1 and 32.
all - Specify that the whole access list profile will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the access list rule with a profile ID of 10:
DGS-3120-24TC:admin# delete access_profile profile_id 10
Command: delete access_profile profile_id 10
Success.
DGS-3120-24TC:admin#
Format
config access_profile [profile_id <value 1-6> | profile_name <name 1-32>] [add access_id
[auto_assign | <value 1-256>] [ethernet {[vlan <vlan_name 32> | vlan_id <vlanid 1-4094>]
{mask <hex 0x0-0x0fff>} | source_mac <macaddr> {mask <macmask>} | destination_mac
<macaddr> {mask <macmask>} | 802.1p <value 0-7> | ethernet_type <hex 0x0-0xffff>} | ip
{[vlan <vlan_name 32> | vlan_id <vlanid 1-4094>] {mask <hex 0x0-0x0fff>} | source_ip
<ipaddr> {mask <netmask>} | destination_ip <ipaddr> {mask <netmask>} | dscp <value 0-
63> | [icmp {type <value 0-255> | code <value 0-255>} | igmp {type <value 0-255>} | tcp
{src_port <value 0-65535> {mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask <hex
0x0-0xffff>} | flag [all | {urg | ack | psh | rst | syn | fin}]} | udp {src_port <value 0-65535>
{mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask <hex 0x0-0xffff>}} | protocol_id
<value 0-255> {user_define <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>}}]} |
packet_content {offset_chunk_1 <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>} |
offset_chunk_2 <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>} | offset_chunk_3 <hex 0x0-
0xffffffff> {mask <hex 0x0-0xffffffff>} | offset_chunk_4 <hex 0x0-0xffffffff> {mask <hex 0x0-
0xffffffff>}} | ipv6 {class <value 0-255> | flowlabel <hex 0x0-0xfffff> | source_ipv6 <ipv6addr>
{mask <ipv6mask>} | destination_ipv6 <ipv6addr> {mask <ipv6mask>} | [tcp {src_port
<value 0-65535> {mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask <hex0x0-0xffff>}}
| udp {src_port <value 0-65535> {mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask
<hex 0x0-0xffff>}} | icmp {type <value 0-255> | code <value 0-255>}]}] [port [<portlist> | all] |
vlan_based [vlan <vlan_name 32> | vlan_id <vlanid 1-4094>]] [permit {priority <value 0-7>
{replace_priority} | [replace_dscp_with <value 0-63> | replace_tos_precedence_with <value
0-7>] | counter [enable | disable]} | mirror {group_id <value 1-4>} | deny] {time_range
<range_name 32>} | delete access_id <value 1-256>]
107
Parameters
profile_id - Specify the index of the access list profile.
<value 1-6> - Enter the profile ID value here. This value must be between 1 and 6. A lower
value denotes a higher priority.
profile_name - Specify the name of the profile.
<name 1-32> - Enter the profile name here. This name can be up to 32 characters long.
add access_id - Specify to add the access ID. The value is from 1 to 256, but the supported
maximum number of entries depends on the project. If the auto_assign option is selected, the
access ID is automatically assigned, when adding multiple ports.
auto_assign - Specify that the access ID will automatically be assigned.
<value 1-256> - Enter the access ID used here. This value must be between 1 and 256. A
lower value denotes a higher priority.
ethernet - Specify to configure the ethernet access profile.
vlan - (Optional) Specify the VLAN name.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32
characters long.
vlan_id - (Optional) Specify the VLAN ID used.
<vlanid 1-4094> - Enter the VLAN ID used here. This value must be between 1 and 4094.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0x0fff> - Enter the mask value here.
source_mac - (Optional) Specify the source MAC address.
<macaddr> - Enter the source MAC address used for this configuration here.
mask - (Optional) Specify an additional mask parameter that can be configured.
<macmask> - Enter the source MAC mask used here.
destination_mac - (Optional) Specify the destination MAC address.
<macaddr> - Enter the destination MAC address used for this configuration here.
mask - (Optional) Specify an additional mask parameter that can be configured.
<macmask> - Enter the destination MAC mask here.
802.1p - (Optional) Specify the value of the 802.1p priority tag. The priority tag ranges from 1
to 7.
<value 0-7> - Enter the 802.1p priority tag value here.
ethernet_type - (Optional) Specify the Ethernet type.
<hex 0x0-0xffff> - Enter the Ethernet type mask here.
ip - Specify to configure the IP access profile.
vlan - (Optional) Specify a VLAN name.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32
characters long.
vlan_id - (Optional) Specify that VLAN ID used.
<vlanid 1-4094> - Enter the VLAN ID used here. This value must be between 1 and 4094.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0x0fff> - Enter the mask value here.
source_ip - (Optional) Specify an IP source address.
<ipaddr> - Enter the source IP address used for this configuration here.
mask - (Optional) Specify an additional mask parameter that can be configured.
<netmask> - Enter the source netmask used here.
destination_ip - (Optional) Specify an IP destination address.
<ipaddr> - Enter the destination IP address used for this configuration here.
mask - (Optional) Specify an additional mask parameter that can be configured.
<netmask> - Enter the destination netmask used here.
dscp - (Optional) Specify the value of DSCP. The DSCP value ranges from 0 to 63.
<value> - Enter the DSCP value here.
icmp - (Optional) Specify to configure the ICMP parameters.
type - (Optional) Specify that the rule will apply to the ICMP Type traffic value.
<value 0-255> - Enter the ICMP type traffic value here. This value must be between 0
and 255.
code - Specify that the rule will apply to the ICMP Code traffic value.
<value 0-255> - Enter the ICMP code traffic value here. This value must be between 0
108
and 255.
igmp - (Optional) Specify to configure the IGMP parameters.
type - (Optional) Specify that the rule will apply to the IGMP Type traffic value.
<value 0-255> - Enter the IGMP type traffic value here. This value must be between 0
and 255.
tcp - (Optional) Specify to configure the TCP parameters.
src_port - (Optional) Specify that the rule will apply to a range of TCP source ports.
<value 0-65535> - Enter the TCP source port value here. This value must be between
0 and 65535.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the source port mask here.
dst_port - (Optional) Specify that the rule will apply to a range of TCP destination ports.
<value 0-65535> - Enter the TCP destination port value here. This value must be
between 0 and 65535.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the destination port mask here.
flag - (Optional) Specify the TCP flag fields.
all - Specify that all the TCP flags will be used in this configuration.
urg - (Optional) Specify that the TCP flag field will be set to 'urg'.
ack - (Optional) Specify that the TCP flag field will be set to 'ack'.
psh - (Optional) Specify that the TCP flag field will be set to 'psh'.
rst - (Optional) Specify that the TCP flag field will be set to 'rst'.
syn - (Optional) Specify that the TCP flag field will be set to 'syn'.
fin - (Optional) Specify that the TCP flag field will be set to 'fin'.
udp - (Optional) Specify to configure the UDP parameters.
src_port - (Optional) Specify the UDP source port range.
<value 0-65535> - Enter the UDP source port value here. This value must be between
0 and 65535.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the source port mask here.
dst_port - (Optional) Specify the UDP destination port range.
<value 0-65535> - Enter the UDP destination port value here. This value must be
between 0 and 65535.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the destination port mask here.
protocol_id - (Optional) Specify that the rule will apply to the value of IP protocol ID traffic.
<value 0-255> - Enter the protocol ID used here.
user_define - (Optional) Specify that the rule will apply to the IP protocol ID and that the
mask options behind the IP header , which has a length of 20 bytes.
<hex 0x0-0xffffffff> - Enter the user-defined mask value here.
mask - (Optional) Specify an additional mask parameter that can be configured.
<hex 0x0-0xffffffff> - Enter the mask value here.
packet_content - A maximum of 11 offsets can be specified. Each offset defines 2 bytes of data
which is identified as a single UDF field. The offset reference is also configurable. It can be
defined to start at the end of the tag, the end of the ether type or the end of the IP header. To
qualify the fields before the end of the tag, the destination address, source address, and the
VLAN tags are also included
offset_chunk_1 – (Optional) Specify the value of the packet bytes to be matched. Offset
chunk 1 will be used.
<hex 0x0-0xffffffff> - Enter the offset chunk 1 mask here.
offset_chunk_2 - (Optional) Specify the value of the packet bytes to be matched. Offset
chunk 2 will be used.
<hex 0x0-0xffffffff> - Enter the offset chunk 2 mask here.
offset_chunk_3 - (Optional) Specify the value of the packet bytes to be matched. Offset
chunk 3 will be used.
<hex 0x0-0xffffffff> - Enter the offset chunk 3 mask here.
offset_chunk_4 - (Optional) Specify the value of the packet bytes to be matched. Offset
chunk 4 will be used.
<hex 0x0-0xffffffff> - Enter the offset chunk 4 mask here.
ipv6 - Specify that the rule applies to IPv6 fields.
109
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a rule entry for a packet content mask profile (option 3):
DGS-3120-24TC:admin# config access_profile profile_id 5 add access_id
auto_assign packet_content offset5 0xF0 port all deny
Command: config access_profile profile_id 5 add access_id auto_assign
packet_content offset5 0xF0 port all deny
Success.
DGS-3120-24TC:admin#
Format
show access_profile {[profile_id <value 1-6> | profile_name <name 1-32>]}
Parameters
profile_id - (Optional) Specify the index of the access list profile.
<value 1-6> - Enter the profile ID used here. This value must be between 1 and 6. A lower
value denotes a higher priority.
profile_name - (Optional) Specify the name of the profile.
111
<name 1-32> - Enter the profile name used here. This name can be up to 32 characters long.
Restrictions
None.
Example
To display the current access list table:
DGS-3120-24TC:admin#show access_profile
Command: show access_profile
==============================================================================
Profile ID: 1 Profile name: EtherACL Type: Ethernet
MASK on
VLAN : 0xFFF
802.1p
Ethernet Type
Match on
VLAN ID : 1
802.1p : 0
Ethernet Type : 0xFFFE
Action:
Permit
==============================================================================
==============================================================================
Profile ID: 2 Profile name: IPv4ACL Type: IPv4
MASK on
VLAN : 0xFFF
DSCP
ICMP
112
Match on
VLAN ID : 1
DSCP : 0
Action:
Permit
==============================================================================
==============================================================================
Profile ID: 3 Profile name: IPv6ACL Type: IPv6
MASK on
Class
TCP
Match on
Class : 0
Action:
Permit
==============================================================================
==============================================================================
Profile ID: 4 Profile name: PCACL Type: User Defined
MASK on
offset_chunk_1 : 0 value : 0x00000000
offset_chunk_2 : 1 value : 0x00000000
offset_chunk_3 : 2 value : 0x00000000
offset_chunk_4 : 3 value : 0x00000000
Match on
offset_chunk_1 : 0 value : 0x0000FFEE Mask : 0x0000FFEE
Action:
Permit
Priority : 1
Replace DSCP : 1
==============================================================================
113
DGS-3120-24TC:admin#
The following example displays an access profile that supports an entry mask for each rule:
DGS-3120-24TC:admin# show access_profile profile_id 2
Command: show access_profile profile_id 2
DGS-3120-24TC:admin#
The following example displays the packet content mask profile for the profile with an ID of 5:
114
MASK on
offset_chunk_1 : 3 value : 0x0000FFFF
offset_chunk_2 : 5 value : 0x0000FF00
offset_chunk_3 : 14 value : 0xFFFF0000
offset_chunk_4 : 16 value : 0xFF000000
Match on
offset_chunk_1 : 3 value : 0x000086DD
offset_chunk_2 : 5 value : 0x00003A00
offset_chunk_3 : 14 value : 0x86000000
Action:
Deny
DGS-3120-24TC:admin#
115
The replace DSCP action can be performed on packets that conform (GREEN) and packets that
do not conform (YELLOW and RED). If drop YELLOW/RED is selected, the action to replace the
DSCP will not take effect.
Format
config flow_meter [profile_id <value 1-6> | profile_name <name 1-32>] access_id <value 1-
256> [rate [<value 0-1048576>] {burst_size [<value 0-131072>]} rate_exceed [drop_packet |
remark_dscp <value 0-63>] | tr_tcm cir <value 0-1048576> {cbs <value 0-131072>} pir <value
0-1048576> {pbs <value 0-131072>} {[color_blind | color_aware]} {conform [permit |
replace_dscp <value 0-63>] {counter [enable | disable]}} exceed [permit {replace_dscp
<value 0-63>} | drop] {counter [enable |disable]} violate [permit {replace_dscp <value 0-63>}
| drop] {counter [enable |disable]} | sr_tcm cir <value 0-1048576> cbs <value 0-131072> ebs
<value 0-131072> {[color_blind | color_aware]} {conform [permit | replace_dscp <value 0-
63>] {counter [enable |disable]}} exceed [permit {replace_dscp <value 0-63>} | drop]
{counter [enable |disable]} violate [permit {replace_dscp <value 0-63>} | drop] {counter
[enable |disable]} | delete]
Parameters
profile_id - Specify the profile ID.
<value 1-6> - Enter the profile ID here. This value must be between 1 and 6. A lower value
denotes a higher priority.
profile_name - Specify the name of the profile. The maximum length is 32 characters.
<name 1-32> - Enter the profile name used here.
access_id - Specify the access ID.
<value 1-256> - Enter the access ID used here. This value must be between 1 and 256. A
lower value denotes a higher priority.
rate - This specifies the rate for single rate two color mode. Specify the committed bandwidth in
Kbps for the flow. The value m and n are determined by the project.
<value 0-1048576> - Enter the rate for single rate two color mode here. This value must be
between 0 and 1048576.
burst_size - (Optional) This specifies the burst size for the single rate two color mode. The unit is
Kbytes.
<value 0-131072> - Enter the burst size value here. This value must be between 0 and
131072.
rate_exceed - This specifies the action for packets that exceeds the committed rate in single
rate, two color mode.
drop_packet - Drop the packet immediately.
remark_dscp - Mark the packet with a specified DSCP. The packet is set to have a high drop
precedence.
<value 0-63> - Enter the remark DSCP value here. This value must be between 0 and 63.
tr_tcm - Specify the “two rate three color mode”.
cir - Specify the Committed Information Rate. The unit is in Kbps. CIR should always be equal
or less than PIR.
<value 0-1048576> - Enter the commited information rate value here. This value must be
between 0 and 1048576.
cbs - (Optional) Specify the “Committed Burst Size”. The unit is Kbytes. That is to say, 1
means 1Kbytes. This parameter is an optional parameter. The default value is 4*1024.
<value 0-1048576> - Enter the commited burst size value here. This value must be
between 0 and 1048576.
pir - Specify the “Peak Information Rate”. The unit is in Kbps. PIR should always be equal to
or greater than CIR.
<value 0-1048576> - Enter the peak information rate value here. This value must be
between 0 and 1048576.
pbs - (Optional) Specify the “Peak Burst Size”. The unit is in Kbytes. This parameter is an
116
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a “two rate, three color” flow meter:
DGS-3120-24TC:admin#config flow_meter profile_id 1 access_id 1 tr_tcm cir 1000
cbs 2000 pir 2000 pbs 2000 color_blind conform permit counter enable exceed
permit replace_dscp 60 counter enable violate drop
Command: config flow_meter profile_id 1 access_id 1 tr_tcm cir 1000 cbs 2000
pir 2000 pbs 2000 color_blind conform permit counter enable exceed permit
replace_dscp 60 counter enable violate drop
Success.
DGS-3120-24TC:admin#
Format
show flow_meter {[profile_id <value 1-6> | profile_name <name 1-32>] {access_id <value 1-
256>}}
118
Parameters
profile_id - (Optional) Specify the profile ID.
<value 1-6> - Enter the profile ID used here. This value must be between 1 and 6. A lower
value denotes a higher priority.
profile_name - (Optional) Specify the name of the profile. The maximum length is 32 characters.
<name 1-32> - Enter the profile name used here.
access_id - (Optional) Specify the access ID.
<value 1-256> - Enter the access ID used here. This value must be between 1 and 256. A
lower value denotes a higher priority.
Restrictions
None.
Example
To display the flow metering configuration:
DGS-3120-24TC:admin# show flow_meter
Command: show flow_meter
DGS-3120-24TC:admin#
Format
config time_range <range_name 32> [hours start_time <time hh:mm:ss> end_time <time
hh:mm:ss> weekdays <daylist> | delete]
Parameters
time_range - Specify the name of the time range settings.
<range_name 32> - Enter the time range name used here. This name can be up to 32
characters long.
119
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a time range named “1” that starts every Monday at 01:01:01am and ends at
02:02:02am:
DGS-3120-24TC:admin# config time_range 1 hours start_time 1:1:1 end_time 2:2:2
weekdays mon
Command: config time_range 1 hours start_time 1:1:1 end_time 2:2:2 weekdays mon
Success.
Success.
DGS-3120-24TC:admin#
Format
show time_range
Parameters
None.
120
Restrictions
None.
Example
To display the current time range settings:
DGS-3120-24TC:admin# show time_range
Command: show time_range
DGS-3120-24TC:admin#
Format
show current_config access_profile
Parameters
None.
Restrictions
None.
Example
To display the ACL part of the current configuration:
121
#-------------------------------------------------------------------
# ACL
#-------------------------------------------------------------------
DGS-3120-24TC:admin#
122
123
Format
create egress_access_profile profile_id <value 1-4> profile_name <name 1-32> [ethernet
{vlan {<hex 0x0-0x0fff>} | source_mac <macmask 000000000000-ffffffffffff> |
destination_mac <macmask 000000000000-ffffffffffff> | 802.1p | ethernet_type} | ip {vlan
{<hex 0x0-0x0fff>} | source_ip_mask <netmask> | destination_ip_mask <netmask> | dscp |
[icmp {type | code} | igmp {type} | tcp {src_port_mask <hex 0x0-0xffff> | dst_port_mask
<hex 0x0-0xffff> | flag_mask [all | {urg | ack | psh | rst | syn | fin}]} | udp {src_port_mask
<hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff>} | protocol_id_mask <hex 0x0-0xff>
{user_define_mask <hex 0x0-0xffffffff>}]} | ipv6 {class | source_ipv6_mask <ipv6mask> |
destination_ipv6_mask <ipv6mask> | [tcp {src_port_mask <hex 0x0-0xffff> | dst_port_mask
<hex 0x0-0xffff>} | udp {src_port_mask <hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff>} |
icmp {type | code}]}]
Parameters
profile_id - Specify the index of the egress access list profile.
<value 1-4> - Enter the profile ID used here. This value must be between 1 and 4. A lower
value denotes a higher priority.
profile_name - The name of the profile must be specified. The maximum length is 32 characters.
<name 1-32> - Enter the profile name used here. This name can be up to 32 characters long.
ethernet - Specify this is an Ethernet mask.
vlan - (Optional) Specify a VLAN mask.
<hex 0x0-0x0fff> - Enter the VLAN mask used here.
source_mac - (Optional) Specify the source MAC mask.
<macmask> - Enter the source MAC mask used here.
destination_mac - (Optional) Specify the destination MAC mask.
<macmask> - Enter the destination MAC mask used here.
802.1p - (Optional) Specify 802.1p priority tag mask.
ethernet_type - (Optional) Specify the Ethernet type mask.
ip - Specify this is an IPv4 mask.
vlan - (Optional) Specify a VLAN mask.
<hex 0x0-0x0fff> - Enter the VLAN mask used here.
source_ip_mask - (Optional) Specify a source IP address mask.
<netmask> - Enter the source network mask used here.
destination_ip_mask - (Optional) Specify a destination IP address mask.
<netmask> - Enter the destination network mask used here.
dscp - (Optional) Specify the DSCP mask.
icmp - (Optional) Specify that the rule applies to ICMP traffic.
type - Specify the type of ICMP traffic.
code - Specify the code of ICMP traffic.
igmp - (Optional) Specify that the rule applies to IGMP traffic.
type - Specify the type of IGMP traffic.
tcp - (Optional) Specify that the rule applies to TCP traffic.
src_port_mask - Specify the TCP source port mask.
<hex 0x0-0xffff> - Enter the TCP source port mask value here.
124
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an egress access list profile with the name “eap-eth-bc” and assign the profile ID to be 1:
DGS-3120-24TC:admin# create egress_access_profile profile_id 1 profile_name
eap-eth-bc ethernet source_mac FF-FF-FF-FF-FF-FF
Command: create egress_access_profile profile_id 1 profile_name eap-eth-bc
ethernet source_mac FF-FF-FF-FF-FF-FF
DGS-3120-24TC:admin#
125
Format
delete egress_access_profile [profile_id <value 1-4> | profile_name <name 1-32> | all]
Parameters
profile_id - Specify the index of the egress access list profile.
<value 1-4> - Enter the profile ID used here. This value must be between 1 and 4.
profile_name - Specify the name of the profile. The maximum length is 32 characters.
<name 1-32> - Enter the profile name used here. This name can be up to 32 characters long.
all - Specify that the whole egress access list profile will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete egress access list profile ID 1:
DGS-3120-24TC:admin# delete egress_access_profile profile_id 1
Command: delete egress_access_profile profile_id 1
Success.
DGS-3120-24TC:admin#
Format
config egress_access_profile [profile_id <value 1-4> | profile_name <name 1-32>] [add
access_id [auto_assign | <value 1-128>] [ethernet {[vlan <vlan_name 32> | vlan_id <vlanid
1-4094>] {mask <hex 0x0-0x0fff>} | source_mac <macaddr> {mask <macmask>} |
destination_mac <macaddr> {mask <macmask>} | 802.1p <value 0-7> | ethernet_type <hex
0x0-0xffff>} | ip {[vlan <vlan_name 32> | vlan_id <vlanid 1-4094>] {mask <hex 0x0-0x0fff>} |
source_ip <ipaddr> {mask <netmask>} | destination_ip <ipaddr> {mask <netmask>} | dscp
<value 0-63> | [icmp {type <value 0-255> | code <value 0-255>} | igmp {type <value 0-255>} |
tcp {src_port <value 0-65535> {mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask
<hex 0x0-0xffff>} | flag [all | {urg | ack | psh | rst | syn | fin}]} | udp {src_port <value 0-65535>
{mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask <hex 0x0-0xffff>}} | protocol_id
<value 0-255> {user_define <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>}}]} | ipv6 {class
126
Parameters
profile_id - Specify the index of the egress access list profile.
<value 1-4> - Enter the profile ID used here. This value must be between 1 and 4. A lower
value denotes a higher priority.
profile_name - Specify the name of the profile.
<name 1-32> - Enter the profile name here. This name can be up to 32 characters long.
add - Specify to add a profile or rule.
access_id - Specify the index of the access list entry. If the auto_assign option is selected, the
access ID is automatically assigned.
auto assign - Specify that the access ID will be configured automatically.
<value 1-128> - Enter the access ID used here. This value must be between 1 and 128.
ethernet - Specify an Ethernet egress ACL rule.
vlan - (Optional) Specify the VLAN name.
<vlan_name 32> - Enter the VLAN name used for this configuration here. This name can be
up to 32 characters long.
vlanid - Specify a VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID used for this congfiguration here. This value must be
between 1 and 4094.
source_mac - (Optional) Specify the source MAC address.
<macaddr> - Enter the source MAC address used here.
mask - Specify that source MAC mask used.
<macmask> - Enter the source MAC mask value here.
destination_mac - Specify the destination MAC address.
<macaddr> - Enter the destination MAC address used here.
mask - Specify that destination MAC mask used.
<macmask> - Enter the destination MAC mask value here.
802.1p - (Optional) Specify the value of the 802.1p priority tag. The priority tag ranges from 1 to
7.
<value 0-7> - Enter the 802.1p priority tag used here.
ethernet_type - (Optional) Specify the Ethernet type.
<hex 0x0-0xffff> - Enter the Ethernet type mask used here.
ip - Specify an IP egress ACL rule.
vlan - (Optional) Specify the VLAN name.
<vlan_name 32> - Enter the VLAN name used for this configuration here. This name can be
up to 32 characters long.
vlanid - Specify a VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID used for this congfiguration here. This value must be
between 1 and 4094.
mask - (Optional) Specify the mask used.
<hex 0x0-x0fff> - Enter the mask value used here.
source_ip - (Optional) Specify an IP source address.
<ipaddr> - Enter the source IP address used here.
mask - Specify the source IP address used here.
<netmask> - Enter the source network mask here.
destination_ip - (Optional) Specify an IP destination address.
<ipaddr> - Enter the destination IP address used here.
mask - Specify the destination IP address used here.
127
128
129
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a port-base egress access rule that when the packet go out switch which match the
specified source IP, DSCP and destination IP field, it will not be dropped:
DGS-3120-24TC:admin# config egress_access_profile profile_id 2 add access_id
auto_assign ip source_ip 10.0.0.1 dscp 25 destination_ip 10.90.90.90 port_group
id 1 permit
Command: config egress_access_profile profile_id 2 add access_id auto_assign ip
source_ip 10.0.0.1 dscp 25 destination_ip 10.90.90.90 port_group id 1 permit
Success.
DGS-3120-24TC:admin#
To configure a vlan-base egress access rule that when the packet go out switch which match the
specified source MAC field, it will be dropped:
DGS-3120-24TC:admin# config egress_access_profile profile_id 2 add access_id 1
ethernet source_mac 11-22-33-44-55-66 vlan_based vlan_id 1 deny
Command: config egress_access_profile profile_id 2 add access_id 1 ethernet
source_mac 11-22-33-44-55-66 vlan_based vlan_id 1 deny
Success.
DGS-3120-24TC:admin#
Format
show egress_access_profile {[profile_id <value 1-4> | profile_name <name 1-32>]}
130
Parameters
profile_id - (Optional) Specify the index of the egress access list profile.
<value 1-4> - Enter the profile ID here. This value must be between 1 and 4. A lower value
denotes a higher priority.
profile_name - (Optional) Specify the name of the profile. The maximum length is 32 characters.
<name 1-32> - Enter the profile name here. This name can be up to 32 characters long.
If no parameter is specified, will show the all egress access profile.
Restrictions
None.
Example
To display current egress access list table:
DGS-3120-24TC:admin#show egress_access_profile
Command: show egress_access_profile
================================================================================
Profile ID: 1 Profile name: EthernetACL Type: Ethernet
MASK on
VLAN : 0xFFF
802.1p
Match on
802.1p : 0
Action:
Permit
================================================================================
================================================================================
Profile ID: 2 Profile name: IPv4 Type: IPv4
MASK on
DSCP
ICMP
--------------------------------------------------------------------------------
Rule ID : 1 (auto assign) Ports: 1:3
Match on
DSCP : 3
Action:
Permit
================================================================================
================================================================================
Profile ID: 3 Profile name: IPv6 Type: IPv6
MASK on
Class
Match on
Class : 10
Action:
Permit
================================================================================
DGS-3120-24TC:admin#
The following example displays an egress access profile that supports an entry mask for each rule:
132
================================================================================
Profile ID: 1 Profile name: EthernetACL Type: Ethernet
MASK on
VLAN : 0xFFF
802.1p
Match on
802.1p : 0
Action:
Permit
================================================================================
DGS-3120-24TC:admin#
Format
show current_config egress_access_profile
Parameters
None.
Restrictions
None.
Example
To display current configuration of egress access list table:
133
#-------------------------------------------------------------------------------
# Egress ACL
#-------------------------------------------------------------------------------
DGS-3120-24TC:admin#
Format
config egress_flow_meter [profile_id <value 1-4> | profile_name <name 1-32>] access_id
<value 1-128> [rate <value 0-1048576> {burst_size <value 0-131072>} rate_exceed
[drop_packet | remark_dscp <value 0-63>] | tr_tcm cir <value 0-1048576> {cbs <value 0-
131072>} pir <value 0-1048576> {pbs <value 0-131072>} {[color_blind | color_aware]}
{conform [permit | replace_dscp <value 0-63>] {counter [enable |disable]}} exceed [permit
{replace_dscp <value 0-63>} | drop] {counter [enable | disable]} violate [permit
{replace_dscp <value 0-63>} | drop] {counter [enable | disable]} |sr_tcm cir <value 0-
1048576> cbs <value 0-131072> ebs <value 0-131072> {[color_blind | color_aware]}
{conform [permit | replace_dscp <value 0-63>] {counter [enable | disable]}} exceed [permit
{replace_dscp <value 0-63>} | drop] {counter [enable | disable]} violate [permit
{replace_dscp <value 0-63>} | drop] {counter [enable | disable]} | delete]
Parameters
profile_id - Specify the profile ID.
<value 1-4> - Enter the profile ID used here. This value must be between 1 and 4. A lower
value denotes a higher priority.
profile_name - Specify the name of the profile. The maximum length is 32 characters.
<name> - Enter the profile name used here.
access_id - Specify the access ID.
<value 1-128> - Enter the access ID used here. This value must be between 1 and 128. A
134
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a “two rates three color” flow meter:
136
Success.
DGS-3120-24TC:admin#
Format
show egress_flow_meter {[profile_id <value 1-4> | profile_name <name 1-32>] {access_id
<value 1-128>}}
Parameters
profile_id - (Optional) Specify the index of access list profile.
<value 1-4> - Enter the profile ID used here. This value must be between 1 and 4. A lower
value denotes a higher priority.
profile_name - (Optional) Specify the name of the profile.
<name 1-32> - Enter the profile name used here. This name can be up to 32 characters long.
access_id - (Optional) Specify the access ID.
<value 1-128> - Enter the access ID used here. This value must be between 1 and 128. A
lower value denotes a higher priority.
Restrictions
None.
Example
To display current egress flow meter table:
137
DGS-3120-24TC:admin#show egress_flow_meter
Command: show egress_flow_meter
Total Entries: 2
DGS-3120-24TC:admin#
Format
create port_group id <value 1-64> name <name 16>
Parameters
id - Specify the port group ID.
<value 1-64> - Enter the port group ID here. This value must be between 1 and 64.
name - Specify the port group name.
<name 16> - Enter the port group name here. This name can be up to 16 characters long.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create a port group:
138
Success.
DGS-3120-24TC:admin#
Format
config port_group [id <value 1-64> | name <name 16 >] [add | delete] [<portlist> |all]
Parameters
id - Specify the port group ID.
<value 1-64> - Enter the port group ID used here. This value must be between 1 and 64.
name - Specify the port group name.
<name 16> - Enter the port group name here. This name can be up to 16 characters long.
add - Add a port list to this port group.
delete - Delete a port list from this port group.
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Add port list “1-3” to the port group which ID is “2”:
DGS-3120-24TC:admin# config port_group id 2 add 1:1-1:3
Command: config port_group id 2 add 1:1-1:3
Success.
DGS-3120-24TC:admin#
Format
delete port_group [id <value 1-64> | name <name 16>]
139
Parameters
id - Specify the port group ID.
<value 1-64> - Enter the port group ID used here. This value must be between 1 and 64.
name - Specify the port group name.
<name 16> - Enter the port group name here. This name can be up to 16 characters long.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete the port group which ID is “2”:
DGS-3120-24TC:admin# delete port_group id 2
Command: delete port_group id 2
Success.
DGS-3120-24TC:admin#
Format
show port_group {id<value 1-64> | name<name 16>}
Parameters
id - (Optional) Specify the port group ID.
<value 1-64> - Enter the port group ID used here. This value must be between 1 and 64.
name - (Optional) Specify the port group name.
<name 16> - Enter the port group name here. This name can be up to 16 characters long.
If not specified parameter, will show all the port group.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To show all the port group information:
140
DGS-3120-24TC:admin#show port_group
Command: show port_group
Total Entries :1
DGS-3120-24TC:admin#
141
Format
create arpentry <ipaddr> <macaddr>
Parameters
<ipaddr> - The IP address of the end node or station.
<macaddr> - The MAC address corresponding to the IP address above.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static ARP entry for the IP address 10.48.74.121 and MAC address 00-50-BA-00-07-
36:
DGS-3120-24TC:admin# create arpentry 10.48.74.121 00-50-BA-00-07-36
Command: create arpentry 10.48.74.121 00-50-BA-00-07-36
Success.
DGS-3120-24TC:admin#
Format
delete arpentry [<ipaddr> | all]
Parameters
<ipaddr> - The IP address of the end node or station.
all - Delete all ARP entries.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an entry of IP address 10.48.74.121 from the ARP table:
DGS-3120-24TC:admin# delete arpentry 10.48.74.121
Command: delete arpentry 10.48.74.121
Success.
DGS-3120-24TC:admin#
Format
config arpentry <ipaddr> <macaddr>
Parameters
<ipaddr> - The IP address of the end node or station.
<macaddr> - The MAC address corresponding to the IP address above.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a static ARP entry, whose IP address is 10.48.74.121, set its MAC address to 00-50-
BA-00-07-37:
143
Success.
DGS-3120-24TC:admin#
Format
config arp_aging time <min 0-65535>
Parameters
<min 0-65535>- Enter the ARP age-out time, in minutes. This value must be between 0 and
65535 minutes.The default value is 20.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure ARP aging time to 30 minutes:
DGS-3120-24TC:admin# config arp_aging time 30
Command: config arp_aging time 30
Success.
DGS-3120-24TC:admin#
Format
clear arptable
Parameters
None.
144
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear the ARP table:
DGS-3120-24TC:admin# clear arptable
Command: clear arptable
Success.
DGS-3120-24TC:admin#
Format
show arpentry {ipif <ipif_name 12> | ipaddress <ipaddr> | static | mac_address <macaddr>}
Parameters
ipif - (Optional) The name of the IP interface the end node or station for which the ARP table
entry was made, resides on.
<ipif_name 12> - Enter the IP interface name here. This value can be up to 12 characters
long.
ipaddress - (Optional) The IP address of the end node or station.
<ipaddr> - Enter the IP address here.
static - (Optional) Display the static entries in the ARP table.
mac_address - (Optional) Displays the ARP entry by MAC address.
<macaddr> - Enter the MAC address here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To display the ARP table:
145
Total Entries: 6
DGS-3120-24TC:admin#
146
Format
config arp_spoofing_prevention [add gateway_ip <ipaddr> gateway_mac <macaddr> ports
[<portlist> | all] | delete gateway_ip <ipaddr>]
Parameters
add - Specify to add an ARP spoofing prevention entry.
gateway_ip - Specify a gateway IP address to be configured.
<ipaddr> - Enter the IP address used for this configuration here.
gateway_mac - Specify a gateway MAC address to be configured.
<macaddr> - Enter the MAC address used for this configuration here.
ports - Specify a range of ports to be configured.
<portlist> - Enter a list of ports used for the configuration here.
all - Specify all of ports to be configured.
delete - Specify to delete an ARP spoofing prevention entry.
gateway_ip - Specify a gateway ip to be configured.
<ipaddr> - Enter the IP address used for this configuration here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the ARP spoofing prevention entry:
147
Success.
DGS-3120-24TC:admin#
Format
show arp_spoofing_prevention
Parameters
None.
Restrictions
None.
Example
To display the ARP spoofing prevention entries:
DGS-3120-24TC:admin#show arp_spoofing_prevention
Command: show arp_spoofing_prevention
Total Entries: 1
DGS-3120-24TC:admin#
148
Format
enable asymmetric_vlan
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable asymmetric VLANs:
DGS-3120-24TC:admin# enable asymmetric_vlan
Command: enable asymmetric_vlan
Success.
DGS-3120-24TC:admin#
Format
disable asymmetric_vlan
149
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable asymmetric VLANs:
DGS-3120-24TC:admin# disable asymmetric_vlan
Command: disable asymmetric_vlan
Success.
DGS-3120-24TC:admin#
Format
show asymmetric_vlan
Parameters
None.
Restrictions
None.
Example
To display the asymmetric VLAN state currently set on the Switch:
DGS-3120-24TC:admin# show asymmetric_vlan
Command: show asymmetric_vlan
DGS-3120-24TC:admin#
150
Chapter 11 Auto-Configuration
Command List
enable autoconfig
disable autoconfig
show autoconfig
Format
enable autoconfig
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable autoconfig:
DGS-3120-24TC:admin# enable autoconfig
Command: enable autoconfig
Success.
DGS-3120-24TC:admin#
151
Format
disable autoconfig
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable autoconfig:
DGS-3120-24TC:admin# disable autoconfig
Command: disable autoconfig
Success.
DGS-3120-24TC:admin#
Format
show autoconfig
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To show autoconfig status:
DGS-3120-24TC:admin# show autoconfig
Command: show autoconfig
DGS-3120-24TC:admin#
152
Format
create account [admin | operator | power_user | user] <username 15> {encrypt [plain_text |
sha_1] <password>}
Parameters
admin - Specify the name of the admin account.
operator - Specify the name for a operator user account.
power_user – Specify the name for a Power-user account.
user - Specify the name of the user account.
<username 15> - Enter the username used here. This name can be up to 15 characters long.
153
Restrictions
Only Administrator-level users can issue this command.
Example
To create the admin-level user “dlink”:
DGS-3120-24TC:admin# create account admin dlink
Command: create account admin dlink
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
config account <username> {encrypt [plain_text | sha_1] <password>}
154
Parameters
<username> - Enter the user name of the account that has been defined.
encrypt - (Optional) Specify that the password will be encrypted.
plain_text - Select to specify the password in plain text form.
sha_1 - Select to specify the password in the SHA-I enacrpted form.
<password> - The password for the user account. The length for of password in plain-text
form and in encrypted form are different. For the plain-text form, passwords must have a
minimum of 0 character and can have a maximum of 15 characters. For the encrypted
form password, the length is fixed to 35 bytes long. The assword is case-sensitive.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the user password of “dlink” account:
DGS-3120-24TC:admin# config account dlink
Command: config account dlink
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show account
Parameters
None.
155
Restrictions
Only Administrator-level users can issue this command.
Example
To display the accounts that have been created:
DGS-3120-24TC:admin#show account
Command: show account
Current Accounts:
Username Access Level
--------------- ------------
admin Admin
oper Operator
power Power_user
user User
Total Entries : 4
DGS-3120-24TC:admin#
Format
delete account <username>
Parameters
<username> - Name of the user who will be deleted.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete the user account “System”:
DGS-3120-24TC:admin# delete account System
Command: delete account System
Success.
DGS-3120-24TC:admin#
156
Format
show switch
Parameters
None.
Restrictions
None.
Example
The following is an example for display of the Switch information.
DGS-3120-24TC:admin#show switch
Command: show switch
157
Format
enable telnet {<tcp_port_number 1-65535>}
Parameters
<tcp_port_number 1-65535> - (Optional) The TCP port number. TCP ports are numbered
between 1 and 65535. The “well-known” TCP port for the TELNET protocol is 23.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable TELNET and configure port number:
DGS-3120-24TC:admin# enable telnet 23
Command: enable telnet 23
Success.
DGS-3120-24TC:admin#
Format
disable telnet
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
158
Example
To disable TELNET:
DGS-3120-24TC:admin# disable telnet
Command: disable telnet
Success.
DGS-3120-24TC:admin#
Format
enable web {<tcp_port_number 1-65535>}
Parameters
<tcp_port_number 1-65535> - (Optional) The TCP port number. TCP ports are numbered
between 1 and 65535. The “well-known” TCP port for the WEB protocol is 80.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable HTTP and configure port number:
DGS-3120-24TC:admin#enable web 80
Command: enable web 80
DGS-3120-24TC:admin#
Format
disable web
159
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable HTTP:
DGS-3120-24TC:admin# disable web
Command: disable web
Success.
DGS-3120-24TC:admin#
12-10 reboot
Description
This command is used to restart the Switch.
Format
reboot {force_agree}
Parameters
force_agree - (Optional) When force_agree is specified, the reboot command will be executed
immediatedly without further confirmation.
Restrictions
Only Administrator-level users can issue this command.
Example
To reboot the Switch:
DGS-3120-24TC:admin# reboot
Command: reboot
160
12-11 reset
Description
This command is used to provide reset functions. The configuration setting will be reset to the
default setting. For the “save system” command, the device will store the reset setting in the
NVRAM and then reboot the system.
The configuration settings include enable/disable of clipaging, greeting message, and command
prompt will also be reset by all the reset commands.
There is one exception, the “reset” command will not reset IP address configured on the system
IPIF and the default gateway setting.
Format
reset {[config | system]} {force_agree}
Parameters
config - (Optional) If you specify the ‘config’ keyword , all parameters are reset to default
settings. But device will not do save neither reboot.
system - (Optional) If you specify the ‘system’ keyword, all parameters are reset to default
settings. Then the Switch will do factory reset, save and reboot.
force_agree - (Optional) When force_agree is specified, the reset command will be executed
immediatedly without further confirmation.
Restrictions
Only Administrator-level users can issue this command.
Example
To reset the Switch:
DGS-3120-24TC:admin#reset system
Command: reset system
Format
config firmware image {unit <unit_id>} <pathname> boot_up
Parameters
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to the
master unit.
<unit_id> - Specify the single stack unit to apply command.
<pathname>- Specify a firmware file on the device file system.
boot_up - Specify the firmware as the boot up firmware.
Restrictions
Only Administrator level can issue this command.
Example
To configure c:/DGS3120_Run_2_00_010.had as the boot up image for unit 2:
DGS-3120-24TC:admin# config firmware image unit 2 c:/DGS3120_Run_2_00_010.had
boot_up
Command: config firmware image unit 2 c:/DGS3120_Run_2_00_010.had boot_up
Success.
DGS-3120-24TC:admin#
Format
create ipif <ipif_name 12> {<network_address>} <vlan_name 32> {secondary | state [enable
| disable] | proxy_arp [enable | disable] {local [enable | disable]}}
Parameters
ipif - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
<network_address> - (Optional) Specify the IPv4 networkaddress (xxx.xxx.xxx/xx). It specifies a
host address and length of network mask.
<vlan_name 32> - Enter the VLAN name used here. This name can be up to 32 characters long.
secondary - (Optional) Specify the IPv4 secondary interface to be created.
state - (Optional) Specify the state of the IP interface.
enable - Specify that the IP interface state will be enabled.
disable - Specify that the IP interface state will be disabled.
proxy_arp - (Optional) Enable or disable of proxy ARP function. It is for IPv4 function. Default:
Disabled. (RI and EI Mode Only)
162
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IP interface:
DGS-3120-24TC:admin#create ipif Inter2 192.168.16.1/24 default state enable
secondary
Command: create ipif Inter2 192.168.16.1/24 default state enable secondary
Success.
DGS-3120-24TC:admin#
Format
config ipif <ipif_name 12> [{ipaddress <network_address> | vlan <vlan_name 32> | state
[enable | disable]} | proxy_arp [enable | disable] {local [enable | disable]} | bootp | dhcp |
ipv6 [ipv6address <ipv6networkaddr> | state [enable | disable]] | ipv4 state [enable | disable]
| dhcpv6_client [enable | disable] | ip_directed_broadcast [enable | disable] | dhcp_option12
[hostname <hostname 63> | clear_hostname | state [enable | disable]]]
Parameters
ipif - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
ipaddress - (Optional) Configures a network on an ipif. The address should specify a host
address and length of network mask. Since an ipif can have only one IPv4 address, the new
configured address will overwrite the original one.
<network_address> - Enter the network address used here.
vlan - (Optional) Specify the name of the VLAN here.
<vlan_name 32> - Enter the VLAN name used here. This name can be up to 32 characters
long.
state - (Optional) Enable or disable the state of the interface.
enable - Enable the state of the interface.
163
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an interface’s IPv4 network address:
164
Success.
DGS-3120-24TC:admin#
Format
delete ipif [<ipif_name 12> {ipv6address <ipv6networkaddr>} | all]
Parameters
ipif - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
ipv6address – (Optional) Specify the IPv6 network address. The address should specify a host
address and length of network prefix. There can be multiple V6 addresses defined on an
interface.
<ipv6networkaddr> - Enter the IPv6 address used here.
all – Specify that all the IP interfaces will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an IP interface:
DGS-3120-24TC:admin#delete ipif newone
Command: delete ipif newone
Success.
DGS-3120-24TC:admin#
Format
enable ipif [<ipif_name 12> | all]
165
Parameters
ipif_name - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
all – Specify that all the IP interfaces will be enabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable an IP interface:
DGS-3120-24TC:admin#enable ipif newone
Command: enable ipif newone
Success.
DGS-3120-24TC:admin#
Format
disable ipif [<ipif_name 12> | all]
Parameters
ipif_name - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
all – Specify that all the IP interfaces will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable an IP interface:
DGS-3120-24TC:admin#disable ipif newone
Command: disable ipif newone
Success.
DGS-3120-24TC:admin#
166
Format
show ipif {<ipif_name 12>}
Parameters
ipif_name - Specify the name of the IP interface.
<ipif_name 12> - (Optional) Enter the IP interface name used here. This name can be up to
12 characters long.
Restrictions
None.
Example
To display an IP interface:
DGS-3120-24TC:admin#show ipif
Command: show ipif
IP Interface : System
VLAN Name : default
Interface Admin State : Enabled
IPv4 Address : 10.90.90.90/8 (Manual) Primary
Proxy ARP : Disabled (Local : Disabled)
IP Directed Broadcast : Disabled
IPv4 State : Enabled
DHCPv6 Client State : Disabled
IPv6 State : Enabled
DHCP Option12 State : Disabled
DHCP Option12 Host Name :
Total Entries: 1
DGS-3120-24TC:admin#
167
processing will be disabled. By enable this automatic configuration, the link local address will be
automatically configured and IPv6 processing will be started.
Format
enable ipif_ipv6_link_local_auto [<ipif_name 12> | all]
Parameters
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12 characters
long.
all - Specify that all the IP interfaces will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the IP interface for IPv6 link local automatic:
DGS-3120-24TC:admin#enable ipif_ipv6_link_local_auto newone
Command: enable ipif_ipv6_link_local_auto newone
Success.
DGS-3120-24TC:admin#
Format
disable ipif_ipv6_link_local_auto [<ipif_name 12> | all]
Parameters
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12 characters
long.
all - Specify that all the IP interfaces will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the IP interface for IPv6 link local automatic:
168
Success.
DGS-3120-24TC:admin#
Format
show ipif_ipv6_link_local_auto {<ipif_name 12>}
Parameters
<ipif_name 12> - (Optional) Enter the Ip interface name used here. This name can be up to 12
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
T o display the link local address automatic configuration state.
DGS-3120-24TC:admin#show ipif_ipv6_link_local_auto
Command: show ipif_ipv6_link_local_auto
DGS-3120-24TC:admin#
169
Format
config bpdu_protection ports [<portlist> | all ] {state [enable | disable] | mode [ drop | block |
shutdown]}(1)
Parameters
<portlist> - Specified a range of ports to be configured (port number).
all – Specified that all the port will be configured.
state – (Optional) Specified the BPDU protection state. The default state is disable
enable – Specify to enable BPDU protection.
disable – Specify to disable BPDU protection.
mode – (Optional) Specifiy the BPDU protection mode. The default mode is shutdown
drop - Drop all received BPDU packets when the port enters under_attack state.
block - Drop all packets (include BPDU and normal packets) when the port enters
under_attack state.
shutdown - Shut down the port when the port enters under_attack state.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
170
Example
To set the port state enable and drop mode:
DGS-3120-24TC:admin#config bpdu_protection ports 1:1 state enable mode drop
Command: config bpdu_protection ports 1:1 state enable mode drop
Success.
DGS-3120-24TC:admin#
Format
config bpdu_protection recovery_timer [<sec 60-1000000> | infinite]
Parameters
recovery_timer - Specified the bpdu_protection Auto-Recovery recovery_timer. The default
value of recovery_timer is 60.
<sec 60 –1000000> - The timer (in seconds) used by the Auto-Recovery mechanism to
recover the port. The valid range is 60 to 1000000.
infinite - The port will not be auto recovered.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the bpdu_protection recovery_timer to 120 seconds for the entire switch:
DGS-3120-24TC:admin#config bpdu_protection recovery_timer 120
Command: config bpdu_protection recovery_timer 120
Success.
DGS-3120-24TC:admin#
171
Format
config bpdu_protection [trap | log] [none | attack_detected | attack_cleared | both]
Parameters
trap - To specify the trap state.
log - To specify the log state.
none - Neither attack_detected nor attack_cleared is trapped or logged.
attack_detected - Events will be logged or trapped when the BPDU attacks is detected.
attack_cleared - Events will be logged or trapped when the BPDU attacks is cleared.
both - The events of attack_detected and attack_cleared shall be trapped or logged.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config the bpdu_protection trap state as both for the entire switch:
DGS-3120-24TC:admin#config bpdu_protection trap both
Command: config bpdu_protection trap both
Success.
DGS-3120-24TC:admin#
Format
enable bpdu_protection
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable bpdu_protection function globally for the entire switch:
172
DGS-3120-24TC:admin#enable bpdu_protection
Command: enable bpdu_protection
Success.
DGS-3120-24TC:admin#
Format
disable bpdu_protection
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable bpdu_protection function globally for the entire switch:
DGS-3120-24TC:admin#disable bpdu_protection
Command: disable bpdu_protection
Success.
DGS-3120-24TC:admin#
Format
show bpdu_protection {ports {<portlist>}}
Parameters
ports - Specified a range of ports to be configured.
<portlist> - Enter the portlist here.
173
Restrictions
None.
Example
To show the bpdu_protection for the entire switch:
DGS-3120-24TC:admin#show bpdu_protection
Command: show bpdu_protection
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
174
When a port is in link-up status, the test will obtain the distance of the cable. Since the status is
link-up, the cable will not have the short or open problem. But the test may still detect the crosstalk
problem.
When a port is in link-down status, the link-down may be caused by many factors.
1. When the port has a normal cable connection, but the remote partner is powered off, the
cable diagnosis can still diagnose the health of the cable as if the remote partner is
powered on.
2. When the port does not have any cable connection, the result of the test will indicate no
cable.
3. The test will detect the type of error and the position where the error occurs.
175
• When the link partner is powered down with errors, this command can detect whether
the error is open, short, or crosstalk. In this case this command can also detect the
distance of the error.
• When there is no link partner with no errors, this command can detect the cable length.
• When there is no link partner with errors, this command can detect whether the error is
open, short, or crosstalk. In this case this command can also detect the distance of the
error.
• When there is no link partner with errors, this command can detect whether the error is open,
short, or crosstalk. In this case this command can also detect the distance of the error.
Note: This test is only for copper cable. The fiber port is not tested. For the combo ports, only the
copper media will be tested.
The cable diagnosis does not support on the Pair 1 and 4 if the link partner is FE port.
If the link partner is FE port, the target port's link will be down after the test.
Format
cable_diag ports [<portlist> | all]
Parameters
<portlist> - Enter a list of ports used for the configuration here.
all – Specify that all the ports will be used for this configuration.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Test the cable on port 1, 11, and 12:
176
DGS-3120-24TC:admin#
177
Format
enable command logging
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the command logging function:
DGS-3120-24TC:admin# enable command logging
Command: enable command logging
Success.
DGS-3120-24TC:admin#
178
Format
disable command logging
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the command logging:
DGS-3120-24TC:admin# disable command logging
Command: disable command logging
Success.
DGS-3120-24TC:admin#
Format
show command logging
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To show the command logging configuration status:
DGS-3120-24TC:admin# show command logging
Command: show command logging
DGS-3120-24TC:admin#
179
180
Format
create authentication guest_vlan [vlan <vlan_name 32> | vlanid <vlanid 1-4094>]
Parameters
vlan - Specify the guest VLAN by VLAN name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify the guest VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This ID must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To assign a static VLAN to be guest VLAN:
181
Success.
DGS-3120-24TC:admin#
Format
delete authentication guest_vlan [vlan <vlan_name 32> | vlanid <vlanid 1-4094>]
Parameters
vlan - Specify the guest VLAN by VLAN name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify the guest VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This ID must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete guest VLAN configuration:
DGS-3120-24TC:admin# delete authentication guest_vlan vlan guestVLAN
Command: delete authentication guest_vlan vlan guestVLAN
Success.
DGS-3120-24TC:admin#
Format
config authentication guest_vlan [vlan <vlan_name 32> | vlanid <vlanid 1-4094>] [add |
delete] ports [<portlist> | all]
182
Parameters
vlan - Assigned a VLAN as guest VLAN. The VLAN must be an existed static VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Assigned a VLAN as guest VLAN. The VLAN must be an existed static VLAN.
<vlanid 1-4094> - Enter the VLAN ID here. This ID must be between 1 and 4094.
add - Specify to add port list to the guest VLAN.
delete - Specify to delete port list from the guest VLAN.
ports - Specify the configured port(s).
<portlist> - Enter the list of ports to be configured here.
all - Specify all ports on the Switch.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure security port(s) as specified guest VLAN member:
DGS-3120-24TC:admin#config authentication guest_vlan vlan guestVLAN add ports
all
Command: config authentication guest_vlan vlan guestVLAN add ports all
Success.
DGS-3120-24TC:admin#
Format
config authentication ports [<portlist> | all] {auth_mode [port_based | host_based {vlanid
<vid_list> state [enable | disable]}] | multi_authen_methods [none | any | dot1x_impb |
impb_jwac | impb_wac | mac_impb| mac_jwac]}(1)
Parameters
<portlist> - Enter the list of ports to be configured here.
all - Specify all ports on the Switch.
auth_mode - (Optional) Specify the authentication mode used.
port_based - If one of the attached hosts passes the authentication, all hosts on the same
port will be granted to access network. If the user fails to authorize, this port will keep trying
the next authentication
host_based - Every user can be authenticated individually. v2.01 and later, can authenticate
client on specific authentication VLAN(s) only for WAC.
vlanid - (Optional) Specific authentication VLAN(s). This is useful when different VLANs on
the Switch have different authentication requirements.
<vidlist> - Enter the VLAN ID list here.
state - (Optional) Specify the VID list's authentication state.
enable - Assign the specified VID list as authentication VLAN(s).
183
disable - Remove the specified VID list from authentication VLAN(s). If "vlanid" is not
specified, or all VLANs is disabled, means do not care which VLAN the client comes
from, the client will be authenticated if the client's MAC(not care the VLAN) is not
authenticated. After the client is authenticated, the client will not be re-authenticated
when received from other VLANs. All VLANs are disabled by default.
Note: When port’s authorization mode is changed to port-based, previously authentication
VLAN(s) on this port will be clear.
multi_authen_methods - (Optional) Specify the method for compound authentication. (EI Mode
Only)
none - Compound authentication is not enabled.
any - If any one of the authentication method (802.1X, MAC-based Access Control, WAC or
JWAC) passes, then pass.
dot1x_impb – 802.1X will be verified first, and then IMPB will be verified. Both authentications
need to be passed.
impb_jwac - JWAC will be verified first, and then IMPB will be verified. Both authentications
need to be passed.
impb_wac - WAC will be verified first, and then IMPB will be verified. Both authentications
need to be passed.
mac_impb - MAC will be verified first, and then IMPB will be verified. Both authentications
need to be passed.
mac_jwac - MAC will be verified first, and then JWAC will be verified. Both authentications
need to be passed.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
The following example sets the compound authentication method of all ports to any:
DGS-3120-24TC:admin# config authentication ports all multi_authen_methods any
Command: config authentication ports all multi_authen_methods any
Success.
DGS-3120-24TC:admin#
Format
config authentication mac_format {case [lowercase | uppercase] | delimiter {[hyphen | colon
| dot | none] | number [1 | 2 | 5]}(1)}(1)
Parameters
case - (Optional) Specify the leter format.
lowercase - User lowercase letters, e.g. aabbccddeeff.
uppercase - Use uppercase letters, e.g. AABBCCDDEEFF.
184
delimiter - (Optional)Specify whether to use delimiter and number of delimiters for MAC address.
hyphen - (Optional) Use “-” when specifying MAC address, e.g. aa-bb-cc-dd-ee-ff.
colon - (Optional) Use “:” when specifying MAC address, e.g. aa:bb:cc:dd:ee:ff.
dot - (Optional) Use “.”when specifying MAC address, e.g. aa.bb.cc.dd.ee.ff.
none - (Optional) Do not use any delimiter when specifying MAC address, e.g. aabbccddeeff.
number - (Optional)Specify the number of delimiters.
1 - Use one delimiter, e.g. aabbcc-ddeeff.
2 - Use two delimiters, e.g. aabb-ccdd-eeff.
5 - Use five delimiters, e.g. aa-bb-cc-dd-ee-ff.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MAC address format to IEFT style:
DGS-3120-24TC:admin#config authentication mac_format case uppercase delimiter
hyphen number 5
Command: config authentication mac_format case uppercase delimiter hyphen number
5
Success.
DGS-3120-24TC:admin#
Format
show authentication guest_vlan
Parameters
None.
Restrictions
None.
Example
This example displays the guest VLAN setting:
185
Total Entries: 1
DGS-3120-24TC:admin#
Format
show authentication ports {<portlist>}
Parameters
<portlist> - Enter a list of ports to be displayed.
If not specify the port list, displays compound authentication setting of all ports.
Restrictions
None.
Example
This example displays authentication setting for all ports:
186
Format
enable authorization attributes
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
This example sets authorization global state enabled:
187
Success.
DGS-3120-24TC:admin#
Format
disable authorization attributes
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
This example sets authorization global state disabled:
DGS-3120-24TC:admin# disable authorization attributes
Command: disable authorization attributes
Success.
DGS-3120-24TC:admin#
Format
show authorization
Parameters
None.
188
Restrictions
None.
Example
This example displays authorization status:
DGS-3120-24TC:admin#show authorization
Command: show authorization
DGS-3120-24TC:admin#
Format
config authentication server failover [local | permit | block]
Parameters
local - Use local DB to authenticate the client.
permit - The client is always regarded as authenticated.
block - Block the client (Default setting).
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Set authentication server auth fail over state:
DGS-3120-24TC:admin# config authentication server failover local
Command: config authentication server failover local
Success.
DGS-3120-24TC:admin#
189
Format
show authentication
Parameters
None.
Restrictions
None.
Example
To show authentication global configuration:
DGS-3120-24TC:admin#show authentication
Command: show authentication
DGS-3120-24TC:admin#
Format
show authentication mac_format
Parameters
None.
Restrictions
None.
Example
To display the authentication MAC format settings:
190
Case : Uppercase
Delimiter : Hyphen
Delimiter Number : 5
DGS-3120-24TC:admin#
191
The output stream of the configuration data can be filtered by the expression specified at the end
of the command. The expression can contain up to three multiple filter evaluations. A filter
evaluation begins with a filter type (include, exclude, and begin), followed by up to three filter
strings (ex: “stp”). A filter string is enclosed by symbol ". The following describes the meaning of
the each filter type.
include: includes lines that contain the specified filter string.
exclude: excludes lines that contain the specified filter string
begin: The first line that contains the specified filter string will be the first line of the output.
The relationship of multiple filter strings following the same filter type is OR. That is, one line is
qualified if one of specified filter strings is matched.
If more than one filter evaluation is specified; the output of filtered by the former evaluation will be
used as the input of the latter evaluation.
Format
show config [effective | modified | current_config | boot_up | information| file <pathname>]
{[include | exclude | begin] <filter_string 80> {<filter_string 80> {<filter_string 80>}} {[include
| exclude | begin] <filter_string 80> {<filter_string 80> {<filter_string 80>}} {[include |
exclude | begin] <filter_string80> {<filter_string 80> {<filter_string 80>}}}}}
Parameters
effective - Show only commands which affects the behavior of the device. For example, if STP is
disabled, then for STP configuration, only “STP is disabled” is displayed. All other lower level
192
setting regarding STP is not displayed. The lower level setting will only be displayed when the
higher level setting is enabled.
Note: This parameter is only for the current configuration.
modified - Show only the commands which are not from the ‘reset’ default setting.
Note:This parameter is only for the current configuration.
current_config - Specify the current configuration.
boot_up - Specify the list of the bootup configuration.
file - Specify that the unit can display the specified configuration file.
<pathname 64> - The pathname specifies an absolute pathname on the device file system. If
pathname is not specified, the boot up configuration is implied. This name can be up to 64
characters long.
include - (Optional) Include lines that contain the specified filter string.
exclude - (Optional) Exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol ". Thus, the filter string itself cannot
contain the “character. The filter string is case sensitive. This value can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be up
to 80 characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be
up to 80 characters long.
include - (Optional) Include lines that contain the specified filter string.
exclude - (Optional) Exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol ". Thus, the filter string itself cannot
contain the “character. The filter string is case sensitive. This value can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be up
to 80 characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be
up to 80 characters long.
include - (Optional) Include lines that contain the specified filter string.
exclude - (Optional) Exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol ". Thus, the filter string itself cannot
contain the “character. The filter string is case sensitive. This value can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be up
to 80 characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol ". Thus, the filter string
itself cannot contain the “character. The filter string is case sensitive. This value can be
up to 80 characters long.
Restrictions
Only Administrator-level users can issue this command.
193
Example
The following example illustrates how the special filters ‘modified’ and .’effective’ affect the
configuration display:
DGS-3120-24TC:admin# show config modified
Command:show config modified
enable loopdetect
enable ssl
config ipif System vlan default ipaddress 192.168.3.4/8 state enable
create arpentry 10.1.1.1 00-00-00-00-00-01
enable loopdetect
config loopdetect recover_timer 60
config loopdetect interval 10
config loopdetect port 1-28 state disabled
disable sim
disable stp
disable ssh
Output truncated...
DGS-3120-24TC:admin#
Format
config configuration {unit <unit_id>} <pathname> [boot_up | active]
Parameters
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to the
master unit.
<unit_id> - Enter the unit ID here.
<pathname> - Specify a configuration file on the device file system.
boot_up - (Optional) Specify it as a boot up file.
active - (Optional) Specify to apply the configuration.
Restrictions
Only Administrator-level users can issue this command.
194
Example
To configure the Switch’s configuration file as boot up:
DGS-3120-24TC:admin#config configuration config.cfg boot_up
Command: config configuration config.cfg boot_up
Success.
DGS-3120-24TC:admin#
17-3 save
Description
This command is used to save the current configuration to a file. This command is required to be
supported regardless of whether file system is supported or whether multiple configuration files are
supported. The configuration will only save to the master unit. For projects that support multiple
configurations, the configuration ID or configuration file name can be specified. If the configuration
ID or configuration file name is not specified, the next boot up configuration is implied.
Format
save {[config <pathname> | log | all]}
Parameters
config - (Optional) Specify to save the configuration to a file.
<pathname> - The pathname specifies the absolute pathname on the device file system. If
pathname is not specified, it refers to the boot up configuration file.
log - (Optional) Specify to save the log.
all - (Optional) Specify to save the configuration and the log.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To save the configuration:
DGS-3120-24TC:admin#save config c:/3120.cfg
Command: save config c:/3120.cfg
DGS-3120-24TC:admin#
195
Format
show boot_file
Parameters
None.
Restrictions
None.
Example
To display the boot file:
DGS-3120-24TC:admin#show boot_file
Command: show boot_file
DGS-3120-24TC:admin#
196
Format
config configuration trap {save [enable | disable] | upload [enable | disable] | download
[enable | disable]}
Parameters
save - (Optional) Enable or disable sending the trap by the SNMP agent when the configuration
is saved in NVRAM.
enable - Send the trap by the SNMP agent when the configuration is saved in NVRAM.
disable - No trap will be send.
upload - (Optional) Enable or disable sending the trap by the SNMP agent when successfully
uploading configuration.
enable - Send the trap by the SNMP agent when successfully uploading configuration.
disable - No trap will be send.
download - (Optional) Enable or disable sending the trap by the SNMP agent when successfully
downloading configuration.
enable - Send the trap by the SNMP agent when successfully downloading configuration.
disable - No trap will be send.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the trap of a configuration saving completed:
DGS-3120-24TC:admin#config configuration trap save enable
Command: config configuration trap save enable
Success.
DGS-3120-24TC:admin#
197
198
199
Format
create cfm md <string 22> {md_index <uint 1-4294967295>} level <int 0-7>
Parameters
<string 22> - Enter the maintenance domain name. This name can be up to 22 characters long.
md_index - (Optional) Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must be
between 1 and 7294967295.
level - Specify the maintenance domain level.
<int 0-7> - Enter the maintenance domain level here. This value must be between 0 and 7.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a maintenance domain called “op_domain” and assign a maintenance domain level of
“2”:
DGS-3120-24TC:admin# create cfm md op_domain level 2
Command: create cfm md op_domain level 2
Success.
DGS-3120-24TC:admin#
Format
config cfm md [<string 22> | md_index <uint 1-4294967295>] {mip [none | auto | explicit] |
sender_id [none | chassis | manage | chassis_manage]}
200
Parameters
<string 22> - Enter the maintenance domain name. This name can be up to 22 characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must be
between 1 and 4294967295.
mip - (Optional) This is the control creations of MIPs.
none - Do not create MIPs. This is the default value.
auto - MIPs can always be created on any ports in this MD, if that port is not configured with
an MEP of this MD. For the intermediate switch in an MA, the setting must be automatic in
order for the MIPs to be created on this device.
explicit - MIPs can be created on any ports in this MD, only if the next existent lower level has
an MEP configured on that port, and that port is not configured with an MEP of this MD.
sender_id - (Optional) This is the control transmission of the sender ID TLV.
none - Do not transmit the sender ID TLV. This is the default value.
chassis - Transmit the sender ID TLV with the chassis ID information.
manage - Transmit the sender ID TLV with the managed address information.
chassis_manage - Transmit sender ID TLV with chassis ID information and manage address
information.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maintenance domain called “op_domain” and specify the explicit option for
creating MIPs:
DGS-3120-24TC:admin# config cfm md op_domain mip explicit
Command: config cfm md op_domain mip explicit
Success.
DGS-3120-24TC:admin#
Format
create cfm ma <string 22> {ma_index <uint 1-4294967295>} md [<string 22> | md_index
<uint 1-4294967295>]
Parameters
<string 22> - Enter the maintenance association name. This name can be up to 22 characters
long.
ma_index - (Optional) Specify the maintenance association index.
201
<uint 1-4294967295> - Enter the maintenance association index value here. This value must
be between 1 and 4294967295.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
be between 1 and 4294967295.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create a maintenance association called “ma” and assign it to the maintenance domain
“op_domain”:
DGS-3120-24TC:admin# create cfm ma op1 md op_domain
Command: create cfm ma op1 md op_domain
Success.
DGS-3120-24TC:admin#
Format
config cfm ma [<string 22> | ma_index <uint 1-4294967295>] md [<string 22> | md_index
<uint 1-4294967295>] {vlanid <vlanid 1-4094> | mip [none | auto | explicit | defer] | sender_id
[none | chassis | manage | chassis_manage | defer] | ccm_interval [100ms | 1sec | 10sec |
1min | 10min] | mepid_list [add | delete] <mepid_list 1-8191>}
Parameters
<string 22> - Enter the maintenance association name. This name can be up to 22 characters
long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value must
be between 1 and 4294967295.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
202
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a CFM MA:
DGS-3120-24TC:admin# config cfm ma op1 md op_domain vlanid 1 ccm_interval 1sec
Command: config cfm ma op1 md op_domain vlanid 1 ccm_interval 1sec
Success.
DGS-3120-24TC:admin#
203
Format
create cfm mep <string 32> mepid <int 1-8191> md [<string 22> | md_index <uint 1-
4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>] direction [inward | outward]
port <port>
Parameters
<string 32> - Enter the MEP name used. It is unique among all MEPs configured on the
device.This name can be up to 32 characters long.
mepid - Specify the MEP ID. It should be configured in the MA’s MEPID list.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
be between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name used here. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
direction - This is the MEP direction.
inward - Specify the inward facing (up) MEP.
outward - Specify the outward facing (down) MEP.
port - Specify the port number. This port should be a member of the MA’s associated VLAN.
<port> - Enter the port number used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a CFM MEP:
DGS-3120-24TC:admin#create cfm mep mep1 mepid 1 md op_domain ma op1 direction
inward port 2
Command: create cfm mep mep1 mepid 1 md op_domain ma op1 direction inward port
1:2
Success.
DGS-3120-24TC:admin#
If multiple types of the fault occur on an MEP, only the fault with the highest priority will be alarmed.
Format
config cfm mep [mepname <string 32> | mepid <int 1-8191> md [<string 22> | md_index
<uint 1-4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>]] {state [enable |
disable] | ccm [enable | disable] | pdu_priority <int 0-7> | fault_alarm [all | mac_status |
remote_ccm | error_ccm | xcon_ccm | none] | alarm_time <centisecond 250 -1000> |
alarm_reset_time <centisecond 250-1000>}
Parameters
mepname - Specify the MEP name.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
mepid - Specify the MEP ID.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value
must be between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name used here. This name can be up to
22 characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
state - (Optional) This is the MEP administrative state.
enable - Specify that the MEP will be enabled.
disable - Specify that the MEP will be disabled. This is the default value.
ccm - (Optional) This is the CCM transmission state.
enable - Specify that the CCM transmission will be enabled.
disable - Specify that the CCM transmission will be disabled. This is the default value.
pdu_priority - (Optional) The 802.1p priority is set in the CCMs and the LTMs messages
transmitted by the MEP. The default value is 7.
<int 0-7> - Enter the PDU priority value here. This value must be between 0 and 7.
fault_alarm - (Optional) This is the control types of the fault alarms sent by the MEP.
all - All types of fault alarms will be sent.
mac_status - Only the fault alarms whose priority is equal to or higher than “Some Remote
MEP MAC Status Errors” are sent.
remote_ccm - Only the fault alarms whose priority is equal to or higher than “Some Remote
MEPs Down” are sent.
error_ccm - Only the fault alarms whose priority is equal to or higher than “Error CCM
Received” are sent.
xcon_ccm - Only the fault alarms whose priority is equal to or higher than “Cross-connect
CCM Received” are sent.
none - No fault alarm is sent. This is the default value.
alarm_time - (Optional) This is the time that a defect must exceed before the fault alarm can be
sent. The unit is centisecond, the range is 250-1000. The default value is 250.
205
<centisecond 250-1000> - Enter the alarm time value here. This value must be between 250
and 1000 centiseconds.
alarm_reset_time - (Optional) This is the dormant duration time before a defect is triggered
before the fault can be re-alarmed. The unit is centisecond, the range is 250-1000. The default
value is 1000.
<centisecond 250-1000> - Enter the alarm reset time value here. This value must be
between 250 and 1000 centiseconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a CFM MEP:
DGS-3120-24TC:admin# config cfm mep mepname mep1 state enable ccm enable
Command: config cfm mep mepname mep1 state enable ccm enable
Success.
DGS-3120-24TC:admin#
Format
delete cfm mep [mepname <string 32> | mepid <int 1-8191> md [<string 22> | md_index
<uint 1-4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>]]
Parameters
mepname - Specify the MEP name.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
mepid - Specify the MEP ID.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value
must be between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name used here. This name can be up to
22 characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
206
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a CFM MEP:
DGS-3120-24TC:admin# delete cfm mep mepname mep1
Command: delete cfm mep mepname mep1
Success.
DGS-3120-24TC:admin#
Format
delete cfm ma [<string 22> | ma_index <uint 1-4294967295>] md [<string 22> | md_index
<uint 1-4294967295>]
Parameters
<string 22> - Enter the maintenance association name. This name can be up to 22 characters
long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value must
be between 1 and 4294967295.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value
must be between 1 and 4294967295.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a CFM MA:
207
Success.
DGS-3120-24TC:admin#
Format
delete cfm md [<string 22> | md_index <uint 1-4294967295>]
Parameters
<string 22> - Enter the maintenance domain name. This name can be up to 22 characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must be
between 1 and 4294967295.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a CFM MD:
DGS-3120-24TC:admin# delete cfm md op_domain
Command: delete cfm md op_domain
Success.
DGS-3120-24TC:admin#
Format
enable cfm
208
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the CFM globally:
DGS-3120-24TC:admin# enable cfm
Command: enable cfm
Success.
DGS-3120-24TC:admin#
Format
disable cfm
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the CFM globally:
DGS-3120-24TC:admin# disable cfm
Command: disable cfm
Success.
DGS-3120-24TC:admin#
209
Format
config cfm ports <portlist> state [enable | disable]
Parameters
<portlist> - Enter the list of ports used for this configuration here.
state - Specify that the the CFM function will be enabled or disabled.
enable - Specify that the the CFM function will be enabled.
disable - Specify that the the CFM function will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the CFM ports:
DGS-3120-24TC:admin#config cfm ports 1:2-1:5 state enable
Command: config cfm ports 1:2-1:5 state enable
Success.
DGS-3120-24TC:admin#
Format
show cfm ports <portlist>
Parameters
<portlist> - Enter the list of logical ports.
210
Restrictions
None.
Example
To show the CFM ports:
DGS-3120-24TC:admin#show cfm ports 1:3-1:6
Command: show cfm ports 1:3-1:6
Port State
----- --------
1:3 Enabled
1:4 Enabled
1:5 Enabled
1:6 Disabled
DGS-3120-24TC:admin#
Format
show cfm {[md [<string 22> | md_index <uint 1-4294967295>] {ma [<string 22> | ma_index
<uint 1-4294967295>] {mepid <int 1-8191>}} | mepname <string 32>]}
Parameters
md - (Optional) Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - (Optional) Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
be between 1 and 4294967295.
ma - (Optional) Specify the maintenance association name.
<string 22> - Enter the maintenance association name used here. This name can be up to
22 characters long.
ma_index - (Optional) Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
mepid - (Optional) Specify the MEP ID.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and
8191.
mepname - (Optional) Specify the MEP name.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
211
Restrictions
None.
Example
To show the CFM configuration:
DGS-3120-24TC:admin#show cfm
Command: show cfm
MD Index : 1
MD Name : op_domain
MD Level : 2
MIP Creation: Explicit
SenderID TLV: None
MA Index : 1
MA Name : op1
MA VID : 1
MIP Creation: Defer
CCM Interval: 1 second
SenderID TLV: Defer
MEPID List : 1
Name : mep1
MEPID : 1
212
Port : 1:2
Direction : Inward
CFM Port Status : Enabled
MAC Address : 00-01-02-03-04-02
MEP State : Enabled
CCM State : Enabled
PDU Priority : 7
Fault Alarm : Disabled
Alarm Time : 250 centisecond((1/100)s)
Alarm Reset Time : 1000 centisecond((1/100)s)
Highest Fault : Some Remote MEP Down
AIS State : Disabled
AIS Period : 1 Second
AIS Client Level : Invalid
AIS Status : Not Detected
LCK State : Disabled
LCK Period : 1 Second
LCK Client Level : Invalid
LCK Status : Not Detected
Out-of-Sequence CCMs: 0 received
Cross-connect CCMs : 0 received
Error CCMs : 0 received
Normal CCMs : 0 received
Port Status CCMs : 0 received
If Status CCMs : 0 received
CCMs transmitted : 71
In-order LBRs : 0 received
Out-of-order LBRs : 0 received
Next LTM Trans ID : 0
Unexpected LTRs : 0 received
LBMs Transmitted : 0
AIS PDUs : 0 received
AIS PDUs Transmitted: 0
LCK PDUs : 0 received
LCK PDUs Transmitted: 0
Remote
MEPID MAC Address Status RDI PortSt IfSt LCK Detect Time
------ ----------------- ------ --- ------- ---------- --- -------------------
2 FF-FF-FF-FF-FF-FF FAILED No No No No 2011-07-13 12:00:00
DGS-3120-24TC:admin#
213
Format
show cfm fault {md [<string 22> | md_index <uint 1-4294967295>] {ma [<string 22> |
ma_index <uint 1-4294967295>]}}
Parameters
md - (Optional) Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name used here. This name can be up to 22
characters long.
md_index - (Optional) Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
be between 1 and 4294967295.
ma - (Optional) Specify the maintenance association name.
<string 22> - Enter the maintenance association name used here. This name can be up to
22 characters long.
ma_index - (Optional) Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
Restrictions
None.
Example
To show the CFM faults:
DGS-3120-24TC:admin# show cfm fault
Command: show cfm fault
DGS-3120-24TC:admin#
Format
show cfm port <port> {level <int 0-7> | direction [inward | outward] | vlanid <vlanid 1-4094>}
Parameters
<port> - Enter the port number used here.
level - (Optional) Specify the MD Level. If not specified, all levels are shown.
<int 0-7> - Enter the MD level value here. This value must be between 0 and 7.
direction - (Optional) Specify the MEP direction.
inward - Specify that the MEP direction will be inward facing.
214
Restrictions
None.
Example
To show the MEPs and MIPs created on a port:
DGS-3120-24TC:admin# show cfm port 1
Command: show cfm port 1
DGS-3120-24TC:admin#
Format
cfm loopback <macaddr> [mepname <string 32> | mepid <int 1-8191> md [<string 22> |
md_index <uint 1-4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>]] {num <int
1-65535> | [length <int 0-1500> | pattern <string 1500>] | pdu_priority <int 0-7>}
Parameters
<macaddr> - Enter the destination MAC address here.
mepname - Specify the MEP name used.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
mepid - Specify the MEP ID used.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name her. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value
must be between 1 and 4294967295.
ma - Specify the maintenance association name.
215
<string 22> - Enter the maintenance association name her. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
num - (Optional) Number of LBMs to be sent. The default value is 4.
<int 1-65535> - Enter the number of LBMs to be sent here. This value must be between 1 and
65535.
length - (Optional) The payload length of the LBM to be sent. The default is 0.
<int 0-1500> - Enter the payload length here. This value must be between 0 and 1500.
pattern - (Optional) An arbitrary amount of data to be included in a Data TLV, along with an
indication whether the Data TLV is to be included.
<string 1500> - Enter the pattern used here. This value can be up to 1500 characters long.
pdu_priority - (Optional) The 802.1p priority to be set in the transmitted LBMs. If not specified, it
uses the same priority as CCMs and LTMs sent by the MA.
<int 0-7> - Enter the PDU priority value here. This value must be between 0 and 7.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To transmit a LBM:
DGS-3120-24TC:admin# cfm loopback 00-01-02-03-04-05 mepname mep1
Command: cfm loopback 00-01-02-03-04-05 mepname mep1
DGS-3120-24TC:admin#
Format
cfm linktrace <macaddr> [mepname <string 32> | mepid <int 1-8191> md [<string 22> |
md_index <uint 1-4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>]] {ttl <int 2-
255> | pdu_priority <int 0-7>}
Parameters
<macaddr> - Specify the destination MAC address.
mepname - Specify the MEP name used.
216
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
mepid - Specify the MEP ID used.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name her. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value can
be between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name her. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
can be between 1 and 4294967295.
ttl - (Optional) Specify the link trace message TTL value. The default value is 64.
<int 2-255> - Enter the link trace message TTL value here. This value must be between 2 and
255.
pdu_priority - (Optional) The 802.1p priority to be set in the transmitted LTM. If not specified, it
uses the same priority as CCMs sent by the MA.
<int 0-7> - Enter the PDU priority value here. This value must be between 0 and 7.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To transmit an LTM:
DGS-3120-24TC:admin# cfm linktrace 00-01-02-03-04-05 mepname mep1
Command: cfm linktrace 00-01-02-03-04-05 mepname mep1
Transaction ID: 26
Success.
DGS-3120-24TC:admin#
Format
show cfm linktrace [mepname <string 32> | mepid <int 1-8191> md [<string 22> | md_index
<uint 1-4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>]] {trans_id <uint>}
Parameters
mepname - Specify the MEP name used.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
mepid - Specify the MEP ID used.
217
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name her. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value
must between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name her. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must between 1 and 4294967295.
trans_id - (Optional) Specify the identifier of the transaction displayed.
<uint> - Enter the transaction ID used here.
Restrictions
None.
Example
To show the link trace reply when the "all MPs reply LTRs" function is enabled:
DGS-3120-24TC:admin# show cfm linktrace mepname mep1 trans_id 26
Command: show cfm linktrace mepname mep1 trans_id 26
Transaction ID: 26
From MEP mep1 to 00-11-22-33-44-55
Start Time 2008-01-01 12:00:00
DGS-3120-24TC:admin#
To show the link trace reply when the "all MPs reply LTRs" function is disabled:
218
Transaction ID: 26
From MEP mep1 to 00-11-22-33-44-55
Start Time 2008-01-01 12:00:00
Hop MEPID Ingress MAC Address Egress MAC Address Forwarded Relay Action
--- ----- ------------------- ------------------- --------- ------------
1 - 00-22-33-44-55-66 00-22-33-44-55-67 Yes FDB
2 - 00-33-44-55-66-77 00-33-44-55-66-78 Yes MPDB
3 X 00-44-55-66-77-88 00-11-22-33-44-55 No Hit
DGS-3120-24TC:admin#
Format
delete cfm linktrace {[md [<string 22> | md_index <uint 1-4294967295>] {ma [<string 22> |
ma_index <uint 1-4294967295>] {mepid <int 1-8191>}} | mepname <string 32>]}
Parameters
md - (Optional) Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name her. This name can be up to 22 characters
long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
be between 1 and 4294967295.
ma - (Optional) Specify the maintenance association name.
<string 22> - Enter the maintenance association name her. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must be between 1 and 4294967295.
mepid - (Optional) Specify the MEP ID used.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
mepname - (Optional) Specify the MEP name used.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
219
Example
To delete the CFM link trace reply:
DGS-3120-24TC:admin# delete cfm linktrace mepname mep1
Command: delete cfm linktrace mepname mep1
Success.
DGS-3120-24TC:admin#
Format
show cfm mipccm
Parameters
None.
Restrictions
None.
Example
To show MIP CCM database entries:
DGS-3120-24TC:admin# show cfm mipccm
Command: show cfm mipccm
Total: 2
DGS-3120-24TC:admin#
220
Format
config cfm mp_ltr_all [enable | disable]
Parameters
enable - Specify that the MP's reply to the LTR function will be set to all.
disable - Disable sending the all MPs replay LTRs function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the "all MPs reply LTRs" function:
DGS-3120-24TC:admin# config cfm mp_ltr_all enable
Command: config cfm mp_ltr_all enable
Success.
DGS-3120-24TC:admin#
Format
show cfm mp_ltr_all
Parameters
None.
Restrictions
None.
Example
To show the configuration of the "all MPs reply LTRs" function:
DGS-3120-24TC:admin# show cfm mp_ltr_all
Command: show cfm mp_ltr_all
DGS-3120-24TC:admin#
221
Format
show cfm remote_mep [mepname <string 32> | md [<string 22> | md_index <uint 1-
4294967295>] ma [<string 22> | ma_index <uint 1-4294967295>] mepid <int 1-8191>]
remote_mepid <int 1-8191>
Parameters
mepname - Specify the MEP name used.
<string 32> - Enter the MEP name used here. This name can be up to 32 characters long.
md Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name her. This name can be up to 22 characters
long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
between 1 and 4294967295.
ma Specify the maintenance association name.
<string 22> - Enter the maintenance association name her. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must between 1 and 4294967295.
mepid - Specify the MEP ID used.
<int 1-8191> - Enter the MEP ID used here. This value must be between 1 and 8191.
remote_mepid - Specify the Remote MEP ID used.
<int 1-8191> - Enter the remote MEP ID used here. This value must be between 1 and 8191.
Restrictions
None.
Example
To show the CFM Remote MEP information:
222
Remote MEPID : 2
MAC Address : 00-11-22-33-44-02
Status : OK
RDI : Yes
Port State : Blocked
Interface Status : Down
Last CCM Serial Number : 1000
Sender Chassis ID : 00-11-22-33-44-00
Sender Management Address: SNMP-UDP-IPv4 10.90.90.90:161
Detect Time : 2008-01-01 12:00:00
DGS-3120-24TC:admin#
Format
show cfm pkt_cnt {[ports <portlist> {[rx | tx]} | [rx | tx] | ccm]}
Parameters
ports - (Optional) Specify the port counters to show. If not specified, all ports will be shown.
<portlist> - Enter the list of ports used for this configuration here.
rx - (Optional) Specify to display the RX counter.
tx - (Optional) Specify to display the TX counter. If not specified, both of them will be shown.
rx - (Optional) Specify to display the RX counter.
tx - (Optional) Specify to display the TX counter. If not specified, both of them will be shown.
ccm - (Optional) Specify the CCM RX counters.
Restrictions
None.
Example
To show the CFM packet’s RX/TX counters:
DGS-3120-24TC:admin# show cfm pkt_cnt
Command: show cfm pkt_cnt
CFM RX Statistics
-----------------------------------------------------------------------------
Port AllPkt CCM LBR LBM LTR LTM VidDrop OpcoDrop
----- -------- -------- -------- -------- -------- -------- -------- --------
all 204 204 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0
223
2 204 204 0 0 0 0 0 0
3 0 0 0 0 0 0 0 0
4 0 0 0 0 0 0 0 0
5 0 0 0 0 0 0 0 0
6 0 0 0 0 0 0 0 0
7 0 0 0 0 0 0 0 0
8 0 0 0 0 0 0 0 0
9 0 0 0 0 0 0 0 0
10 0 0 0 0 0 0 0 0
11 0 0 0 0 0 0 0 0
12 0 0 0 0 0 0 0 0
CFM TX Statistics
-----------------------------------------------------------
Port AllPkt CCM LBR LBM LTR LTM
----- -------- -------- -------- -------- -------- --------
all 3988 3984 0 0 0 4
1 0 0 0 0 0 0
2 204 204 0 0 0 4
3 578 578 0 0 0 0
4 578 578 0 0 0 0
5 578 578 0 0 0 0
6 578 578 0 0 0 0
7 578 578 0 0 0 0
8 578 578 0 0 0 0
9 578 578 0 0 0 0
10 578 578 0 0 0 0
11 578 578 0 0 0 0
12 578 578 0 0 0 0
CCM RX counters:
XCON = Cross-connect CCMs
Error = Error CCMs
Normal = Normal CCMs
DGS-3120-24TC:admin#
Format
clear cfm pkt_cnt {[ports <portlist> {[rx | tx]} | [rx | tx] | ccm]}
Parameters
ports - (Optional) The ports which require need the counters clearing. If not specified, all ports
will be cleared.
<portlist> - Enter the list of ports used for this configuration here.
rx - (Optional) Specify to clear the RX counter.
tx - (Optional) Specify to clear the TX counter. If not specified, both of them will be cleared.
rx - (Optional) Specify to clear the RX counter.
tx - (Optional) Specify to clear the TX counter. If not specified, both of them will be cleared.
ccm - (Optional) Specify the CCM RX counters.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear the CFM packet’s RX/TX counters:
DGS-3120-24TC:admin# clear cfm pkt_cnt
Command: clear cfm pkt_cnt
Success.
Success.
DGS-3120-24TC:admin#
Format
config cfm trap [ais | lock] state [enable | disable]
Parameters
ais - Specify the AIS trap status to be configured. If the trap status of AIS is enabled, a trap will
be sent out when an ETH-AIS event occurs or clears.
lock - Specify the LCK trap status that to be configured. If the trap status of LCK is enabled, a
trap will be sent out wnen an ETH-LCK event occurs or clears.
state – Specify the state of the CFM trap.
225
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Success.
DGS-3120-24TC:admin#
226
Format
config cfm ais md [<string 22> | md_index <uint 1-4294967295>] ma [<string 22> | ma_index
<uint 1-4294967295>] mepid <int 1-8191> {period [1sec | 1min] | level <int 0-7> | state
[enable | disable]}
Parameters
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name here. This name can be up to 22
characters long.
md_index – (Optional) Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name here. This name can be up to 22
characters long.
ma_index – (Optional) Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must between 1 and 4294967295.
mepid - The MEP ID in the MD which sends AIS frame.
227
<int 1-8191> - Enter the MEP ID value here. This value must be between 1 and 8191.
period - (Optional) The transmitting interval of AIS PDU. The default period is 1 second.
1sec - Specify that the transmitting interval will be set to 1 second.
1min - Specify that the transmitting interval will be set to 1 minute.
level - (Optional) The client level ID to which the MEP sends AIS PDU. The default client MD
level is MD level at which the most immediate client layer MIPs and MEPs exist.
<int 0-7> - Enter the client level ID here. This value must be between 0 and 7.
state - (Optional) Specify to enable or disable the AIS function.
enable - Specify that the AIS function will be enabled.
disable - Specify that the AIS function will be disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the AIS function enabled and client level is 5:
DGS-3120-24TC:admin# config cfm ais md op-domain ma op-ma mepid 1 state enable
level 5
Command: config cfm ais md op-domain ma op-ma mepid 1 state enable level 5
Success.
DGS-3120-24TC:admin#
Format
config cfm lock md [<string 22> | md_index <uint 1-4294967295>] ma [<string 22> |
ma_index <uint 1-4294967295>] mepid <int 1-8191> {period [1sec | 1min] | level <int 0-7> |
state [enable | disable]}
Parameters
md - Specify the maintenance domain name.
<string 22> - Enter the maintenance domain name here. This name can be up to 22
characters long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name here. This name can be up to 22
228
characters long.
ma_index - Specify the maintenance association index.
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must between 1 and 4294967295.
mepid - The MEP ID in the MD which sends LCK frame.
<int 1-8191> - Enter the MEP ID value here. This value must be between 1 and 8191.
period - (Optional) The transmitting interval of LCK PDU. The default period is 1 second.
1sec - Specify that the transmitting interval will be set to 1 second.
1min - Specify that the transmitting interval will be set to 1 minute.
level - (Optional) The client level ID to which the MEP sends LCK PDU. The default client MD
level is MD level at which the most immediate client layer MIPs and MEPs exist.
<int 0-7> - Enter the client level ID here. This value must be between 0 and 7.
state - (Optional) Specify to enable or disable the LCK function.
enable - Specify that the LCK function will be enabled.
disable - Specify that the LCK function will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the LCK function enabled and client level is 5:
DGS-3120-24TC:admin# config cfm lock md op-domain ma op-ma mepid 1 state enable
level 5
Command: config cfm lock md op-domain ma op-ma mepid 1 state enable level 5
Success.
DGS-3120-24TC:admin#
Format
cfm lock md [<string 22> | md_index <uint 1-4294967295>] ma [<string 22> | ma_index <uint
1-4294967295>] mepid <int 1-8191> remote_mepid <int 1-8191> action [start | stop]
Parameters
<string 22> - Enter the maintenance domain name here. This name can be up to 22 characters
long.
md_index - Specify the maintenance domain index.
<uint 1-4294967295> - Enter the maintenance domain index value here. This value must
between 1 and 4294967295.
ma - Specify the maintenance association name.
<string 22> - Enter the maintenance association name here. This name can be up to 22
characters long.
ma_index - Specify the maintenance association index.
229
<uint 1-4294967295> - Enter the maintenance association index value here. This value
must between 1 and 4294967295.
mepid - The MEP ID in the MD which sends LCK frame.
<int 1-8191> - Enter the MEP ID value here. This value must be between 1 and 8191.
remote_mepid - The peer MEP is the target of management action.
<int 1-8191> - Enter the remote MEP ID used here. This value must be between 1 and 8191.
action - Specify to start or to stop the management lock function.
start - Specify to start the management lock function.
stop - Specify to stop the management lock function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To start management lock:
DGS-3120-24TC:admin# cfm lock md op-domain ma op-ma mepid 1 remote_mepid 2
action start
Command: cfm lock md op-domain ma op-ma mepid 1 remote_mepid 2 action start
Success.
DGS-3120-24TC:admin#
230
Format
create cpu access_profile profile_id <value 1-5> [ethernet {vlan | source_mac <macmask
000000000000-ffffffffffff> | destination_mac <macmask 000000000000-ffffffffffff> | 802.1p |
ethernet_type} | ip {vlan | source_ip_mask <netmask> | destination_ip_mask <netmask> |
dscp | [icmp {type | code } | igmp {type} | tcp {src_port_mask <hex 0x0-0xffff> |
dst_port_mask <hex 0x0-0xffff> | flag_mask [all | {urg | ack | psh | rst | syn | fin}]} | udp
{src_port_mask <hex 0x0-0xffff> | dst_port_mask <hex 0x0-0xffff>} | protocol_id_mask <hex
0x0-0xff> {user_define_mask <hex 0x0-0xffffffff>} ]} | packet_content_mask {offset_0-15
231
Parameters
profile_id - Specify the profile ID used here.
<value 1-5> - Enter the profile ID value here. This value must be between 1 and 5.
ethernet - Specify that the profile type will be Ethernet.
vlan - (Optional) Specify a VLAN mask.
source_mac - (Optional) Specify the source MAC mask.
<macmask> - Enter the source MAC mask here.
destination_mac - (Optional) Specify the destination mac mask.
<macmask> - Enter the destination MAC mask here.
802.1p - (Optional) Specify 802.1p priority tag mask.
ethernet_type - (Optional) Specify the ethernet type mask.
ip - Specify that the profile type will be IP.
vlan - (Optional) Specify a VLAN mask.
source_ip_mask - (Optional) Specify an IP source submask.
<netmask> - Enter the IP source submask here.
destination_ip_mask - Specify an IP destination submask.
<netmask> - Enter the IP destination submask here.
dscp - Specify the DSCP mask.
icmp - Specify that the rule applies to ICMP traffic.
type - (Optional) Specify that the rule applies to ICMP type traffic.
code - (Optional) Specify that the rule applies to ICMP code traffic.
igmp - Specify that the rule applies to IGMP traffic.
type - (Optional) Specify that the rule applies to IGMP type traffic.
tcp - Specify that the rule applies to TCP traffic.
src_port_mask - (Optional) Specify the TCP source port mask.
<hex 0x0-0xffff> - Enter the source TCP port mask here.
dst_port_mask - (Optional) Specify the TCP destination port mask.
<hex 0x0-0xffff> - Enter the destination TCP port mask here.
flag_mask - (Optional) Specify the TCP flag field mask.
all - Specify that the TCP flag field mask will be set to all.
urg - Specify that the TCP flag field mask will be set to urg.
ack - Specify that the TCP flag field mask will be set to ack.
psh - Specify that the TCP flag field mask will be set to psh.
rst - Specify that the TCP flag field mask will be set to rst.
syn - Specify that the TCP flag field mask will be set to syn.
fin - Specify that the TCP flag field mask will be set to fin.
udp - Specify that the rule applies to UDP traffic.
src_port_mask - (Optional) Specify the UDP source port mask.
<hex 0x0-0xffff> - Enter the source UDP port mask here.
dst_port_mask - (Optional) Specify the UDP destination port mask.
<hex 0x0-0xffff> - Enter the destination UDP port mask here.
protocod_id_mask - Specify that the rule applies to the IP protocol ID traffic.
<0x0-0xff> - Enter the IP protocol ID mask here.
user_define_mask - (Optional) Specify that the rule applies to the IP protocol ID and the mask
options behind the IP header length is 20 bytes.
<hex 0x0-0xffffffff> - Enter the user-defined IP protocol ID mask here.
packet_content_mask - Specify the frame content mask, there are 5 offsets in maximum could
be configure. Each offset presents 16 bytes, the range of mask of frame is 80 bytes (5 offsets)
in the first eighty bytes of frame.
offset_0-15 - (Optional) Specify that the mask pattern offset of the frame will be between 0
232
and 15.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 0 and 15 here.
offset_16-31 - (Optional) Specify that the mask pattern offset of the frame will be between 16
and 31.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 16 and 31 here.
offset_32-47 - (Optional) Specify that the mask pattern offset of the frame will be between 32
and 47.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 32 and 47 here.
offset_48-63 - (Optional) Specify that the mask pattern offset of the frame will be between 48
and 63.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 48 and 63 here.
offset_64-79 - (Optional) Specify that the mask pattern offset of the frame will be between 64
and 79.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 64 and 79 here.
ipv6 - Specify IPv6 filtering mask.
class - (Optional) Specify the IPv6 class.
flowlabel - (Optional) Specify the IPv6 flowlabel.
source_ipv6_mask - (Optional) Specify an IPv6 source submask.
<ipv6mask> - Enter the IPv6 source submask here.
destination_ipv6_mask - (Optional) Specify an IPv6 destination submask.
<ipv6mask> - Enter the IPv6 destination submask here.
tcp - (Optional) Specify that the rule applies to TCP traffic.
src_port_mask - Specify an IPv6 Layer 4 TCP source port mask.
<hex 0x0-0xffff> - Enter the TCP source port mask value here.
des_port_mask - Specify an IPv6 Layer 4 TCP destination port mask.
<hex 0x0-0xffff> - Enter the TCP destination port mask value here.
udp - (Optional) Specify that the rule applies to UDP traffic.
src_port_mask - Specify the UDP source port mask.
<hex 0x0-0xffff> - Enter the UDP source port mask value here.
dst_port_mask - Specify the UDP destination port mask.
<hex 0x0-0xffff> - Enter the UDP destination port mask value here.
icmp - (Optional) Specify a mask for ICMP filtering.
type - Specify the inclusion of the ICMP type field in the mask.
code - Specify the inclusion of the ICMP code field in the mask.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create CPU access list rules:
233
Success.
Success.
DGS-3120-24TC:admin#
Format
delete cpu access_profile [profile_id <value 1-5> | all]
Parameters
profile_id - Specify the index of access list profile.
<value 1-5> - Enter the profile ID value here. This value must be between 1 and 5.
all – Specify that al the access list profiles will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete CPU access list rules:
DGS-3120-24TC:admin# delete cpu access_profile profile_id 1
Command: delete cpu access_profile profile_id 1
Success.
DGS-3120-24TC:admin#
234
Format
config cpu access_profile profile_id <value 1-5> [add access_id [auto_assign | <value 1-
100>] [ethernet {[vlan <vlan_name 32> | vlan_id <vlanid 1-4094>] | source_mac <macaddr> |
destination_mac <macaddr> | 802.1p <value 0-7> | ethernet_type <hex 0x0-0xffff>} | ip {[vlan
<vlan_name 32> | vlan_id <vlanid 1-4094>] | source_ip <ipaddr> | destination_ip <ipaddr> |
dscp <value 0-63> | [icmp {type <value 0-255> | code <value 0-255>} | igmp {type <value 0-
255>} | tcp {src_port <value 0-65535> | dst_port <value 0-65535> | flag [all | {urg | ack | psh |
rst | syn | fin}]} |udp {src_port <value 0-65535> | dst_port <value 0-65535>} | protocol_id
<value 0-255> {user_define <hex 0x0-0xffffffff>}]} | packet_content {offset_0-15 <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_16-31 <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_32-47 <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_48-63 <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> | offset_64-79 <hex 0x0-
0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff> <hex 0x0-0xffffffff>} | ipv6 {class <value 0-
255> | flowlabel <hex 0x0-0xfffff> | source_ipv6 <ipv6addr> | destination_ipv6 <ipv6addr>}]
port [<portlist> | all] [permit | deny] {time_range <range_name 32>} | delete access_id
<value 1-100>]
Parameters
profile_id - Specify the index of access list profile.
<value 1-5> - Enter the profile ID value here. This value must be between 1 and 5.
access_id - Specify the index of access list entry. The range of this value is 1-100.
<value 1-100> - Enter the access ID here. This value must be between 1 and 100.
ethernet - Specify that the profile type will be Ethernet.
vlan - (Optional) Specify the VLAN name used.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32 characters
long.
vlan_id - (Optional) Specify the VLAN ID used.
<vid> - Enter the VLAN ID used here.
mask - (Optional) Specify the mask used.
<hex 0x0-0x0fff> - Specify the mask used.
source_mac - (Optional) Specify the source MAC address.
<macaddr> - Enter the source MAC address used for this configuration here.
mask - (Optional) Specify the mask used.
<hex 0x0-0x0fff> - Specify the mask used.
destination_mac - (Optional) Specify the destination MAC.
<macaddr> - Enter the destination MAC address used for this configuration here.
mask - (Optional) Specify the mask used.
<hex 0x0-0x0fff> - Specify the mask used.
802.1p - (Optional) Specify the value of 802.1p priority tag.
<value 0-7> - Enter the 802.1p priority tag value here. This value must be between 0 and 7.
ethernet_type - (Optional) Specify the Ethernet type.
<hex 0x0-0xffff> - Enter the Ethernet type value here.
ip - Specify that the profile type will be IP.
vlan - (Optional) Specify the VLAN name used.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32 characters
long.
vlan_id - (Optional) Specify the VLAN ID used.
<vid> - Enter the VLAN ID used here.
source_ip - (Optional) Specify an IP source address.
<ipaddr> - Enter the source IP address used for this configuration here.
mask - (Optional) Specify the mask.
<netmask> - Specify the mask.
235
236
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 16 and 31 here.
offset_32-47 - (Optional) Specify that the mask pattern offset of the frame will be between 32
and 47.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 32 and 47 here.
offset_48-63 - (Optional) Specify that the mask pattern offset of the frame will be between 48
and 63.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 48 and 63 here.
offset_64-79 - (Optional) Specify that the mask pattern offset of the frame will be between 64
and 79.
<hex 0x0-0xffffffff> - Enter the mask pattern offset of the frame between 64 and 79 here.
ipv6 - Specify the rule applies to IPv6 fields.
class - (Optional) Specify the value of IPv6 class.
<value 0-255> - Enter the IPv6 class value here. This value must be between 0 and 255.
flowlabel - (Optional) Specify the value of IPv6 flowlabel.
<hex 0x0-0xffff> - Enter the IPv6 flowlabel here.
source_ipv6 - (Optional) Specify the value of IPv6 source address.
<ipv6addr> - Enter the IPv6 source address used for this configuration here.
mask - (Optional) Specify the mask.
<ipv6mask> - Specify the mask.
destination_ipv6 - (Optional) Specify the value of IPv6 destination address.
<ipv6addr> - Enter the IPv6 destination address used for this configuration here.
mask - (Optional) Specify the mask.
<ipv6mask> - Specify the mask.
tcp - (Optional) Specify to configure the TCP parameters.
src_port - Specify the value of the IPv6 Layer 4 TCP source port.
<value 0-65535> - Enter the TCP source port value here. This value must be between 0
and 65535.
mask - Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the TCP source port mask value here.
dst_port - (Optional) Specify the value of the IPv6 Layer 4 TCP destination port.
<value 0-65535> - Enter the TCP destination port value here. This value must be between
0 and 65535.
mask - Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the TCP destination port mask value here.
udp - (Optional) Specify to configure the UDP parameters.
src_port - Specify the value of the IPv6 Layer 4 UDP source port.
<value 0-65535> - Enter the UDP source port value here. This value must be between 0
and 65535.
mask - Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the UDP source port mask value here.
dst_port - Specify the value of the IPv6 Layer 4 UDP destination port.
<value 0-65535> - Enter the UDP destination port value here. This value must be between
0 and 65535.
mask - Specify an additional mask parameter that can be configured.
<hex 0x0-0xffff> - Enter the UDP destination port mask value here.
icmp - (Optional) Specify to configure the ICMP parameters used.
type - Specify that the rule applies to the value of ICMP type traffic.
<value 0-255> - Enter the ICMP type traffic value here. This value must be between 0 and
255.
code - Specify that the rule applies to the value of ICMP code traffic.
<value 0-255> - Enter the ICMP code traffic value here. This value must be between 0 and
255.
port - Specify the list of ports to be included in this configuration.
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
permit - Specify the packets that match the access profile are permit by the Switch.
deny - Specify the packets that match the access profile are filtered by the Switch.
time_range - (Optional) Specify name of this time range entry.
<range_name> - Enter the time range here.
237
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure CPU access list entry:
DGS-3120-24TC:admin# config cpu access_profile profile_id 1 add access_id 1 ip
vlan default source_ip 20.2.2.3 destination_ip 10.1.1.252 dscp 3 icmp type 11
code 32 port 1 deny
Command: config cpu access_profile profile_id 1 add access_id 1 ip vlan default
source_ip 20.2.2.3 destination_ip 10.1.1.252 dscp 3 icmp type 11 code 32 port 1
deny
Success.
DGS-3120-24TC:admin#
Format
enable cpu_interface_filtering
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable cpu_interface_filtering:
DGS-3120-24TC:admin# enable cpu_interface_filtering
Command: enable cpu_interface_filtering
Success.
DGS-3120-24TC:admin#
238
Format
disable cpu_interface_filtering
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable cpu_interface_filtering:
DGS-3120-24TC:admin# disable cpu_interface_filtering
Command: disable cpu_interface_filtering
Success.
DGS-3120-24TC:admin#
Format
show cpu access_profile {profile_id <value 1-5>}
Parameters
profile_id - (Optional) Specify the index of access list profile.
<value 1-5> - Enter the profile ID used here. This value must be between 1 and 5.
Restrictions
None.
Example
To display current cpu access list table:
239
================================================================================
Profile ID: 1 Type: IPv6
MASK on
Source IPv6 Addr : FFFF:FFFF:FFFF::
Match on
Source IPv6 : 2103:16:16::
Action:
Deny
================================================================================
================================================================================
Profile ID: 2 Type: IPv4
MASK on
Source IP : 255.255.0.0
Match on
Source IP : 172.18.0.0
Action:
Deny
================================================================================
================================================================================
Profile ID: 3 Type: Ethernet
MASK on
240
Match on
Source MAC : 00-00-22-B0-61-51
Action:
Deny
================================================================================
================================================================================
Profile ID: 4 Type: User Defined
MASK on
Offset 0-15 : 0xFFF000FF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF
Offset 16-31 : 0xFFFFFFFF 0xFFFFFFFF 0xFF00FFFF 0xFFFFFFFF
Offset 32-47 : 0xFFFFFFFF 0xFFFFFFFF 0x000FFFFF 0xFFFFFFFF
Offset 48-63 : 0xFFFFFFFF 0xFFFFFFFF 0xFFFFF000 0xFFFFFFFF
Offset 64-79 : 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0xFFFFF000
DGS-3120-24TC:admin#
241
242
Format
debug error_log [dump | clear | upload_toTFTP <ipaddr> <path_filename 64>]
Parameters
dump - Display the debug message of the debug log.
clear - Clear the debug log.
upload_toTFTP - Upload the debug log to a TFTP server specified by IP address.
<ipaddr> - Specify the IPv4 address of the TFTP server.
<path_filename 64> - The pathname specifies the DOS pathname on the TFTP server. It can
be a relative pathname or an absolute pathname. This value can be up to 64 characters
long.
Restrictions
Only Administrator-level users can issue this command.
Example
To dump the error log:
243
**************************************************************************
# debug log: 1
# level: fatal
# clock: 10000ms
# time : 2009/03/11 13:00:00
Success.
DGS-3120-24TC:admin#
Connecting to server................Done.
Upload error log ..................Done.
DGS-3120-24TC:admin#
Format
debug show error_reboot state
244
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the error reboot status:
DGS-3120-24TC:admin#debug show error_reboot state
Command: debug show error_reboot state
DGS-3120-24TC:admin#
Note: When selecting to output to the debug buffer and there are debug messages in process, the
system’s memory pool will be used as the debug buffer. Then, the functions which will be
used in the system’s memory pool resources may fail to excute these commands
successfully. Use the “debug buffer clear” command to release the system’s memroy pool
resources manually.
Format
debug buffer [utilization | dump | clear | upload_toTFTP <ipaddr> <path_filename 64>]
Parameters
utilization - Display the debug buffer’s state.
dump - Display the debug message in the debug buffer.
clear - Clear the debug buffer.
upload_toTFTP - Upload the debug buffer to a TFTP server specified by IP address.
<ipaddr> - Specify the IPv4 address of the TFTP server.
<path_filename 64> - The pathname specifies the DOS pathname on the TFTP server. It can
be a relative pathname or an absolute pathname. This value can be up to 64 characters
long.
Restrictions
Only Administrator level can issue this command.
245
Example
To show the debug buffer’s state:
DGS-3120-24TC:admin# debug buffer utilization
Command: debug buffer utilization
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
Note: When selecting to output to the debug buffer and there are debug messages in process, the
system’s memory pool will be used as the debug buffer. Then, the functions which will be
used in the system’s memory pool resources may fail to excute these commands
successfully. Use the “debug buffer clear” command to release the system’s memroy pool
resources manually.
Format
debug output [module <module_list> | all] [buffer | console]
246
Parameters
module - Specify the module list.
<module_list> - Enter the module list here.
all - Control output method of all modules.
buffer - Direct the debug message of the module output to debug buffer(default).
console - Direct the debug message of the module output to local console.
Restrictions
Only Administrator-level users can issue this command.
Example
To set all module debug message outputs to local console:
DGS-3120-24TC:admin# debug output all console
Command: debug output all console
Success.
DGS-3120-24TC:admin#
Format
debug config error_reboot [enable | disable]
Parameters
enable – If enabled, the Switch will reboot when a fatal error happens.
disable – If disabled the Switch will not reboot when a fatal error happens, system will hang-up
for debug and enter the debug shell mode for debug.
Restrictions
Only Administrator-level users can issue this command.
Example
To set the Switch to not need a reboot when a fatal error occurs:
247
Success.
DGS-3120-24TC:admin#
Format
debug config state [enable | disable]
Parameters
enable - Enable the debug state.
disable - Disable the debug state.
Restrictions
Only Administrator-level users can issue this command.
Example
To set the debug state to disabled:
DGS-3120-24TC:admin# debug config state disable
Command: debug config state disable
Success.
DGS-3120-24TC:admin#
Format
debug clear cpu port counter [<portlist> | all]
Parameters
<portlist> - Specify a range of ports.
all - Specify all ports.
248
Restrictions
Only Administrator-level users can issue this command.
Example
To clear cpu port counter of all ports:
DGS-3120-24TC:admin#debug clear cpu port counter all
Command: debug clear cpu port counter all
Success.
DGS-3120-24TC:admin#
Format
debug show cpu port counter [<portlist> | all] [by_cos | by_reason | by_protocol [L2 | ARP |
IPv4 [ICMP | TCP | UDP | multicast-protocol | unicast-protocol | all] | IPv6 [ICMP | TCP | UDP
| OSPFV3 | all] | STACK] | by_priority]
Parameters
<portlist> - Specify a range of ports.
all - Specify all ports.
by_cos - Display by Cos.
by_reason - Display by reason.
by_protocol - Display by protocol types.
L2 - Display by L2 protocol.
ARP - Display by ARP protocol.
IPv4 - Display by IPv4 protocol.
ICMP - Display by ICMP.
TCP - Display by TCP.
UDP - Display by UDP.
multicast-protocol - Display by multicast protocol.
unicast-protocol - Display by unicast protocol
all - Display by all IPv4 protocols.
IPv6 - Display by IPv6 protocol
ICMP - Display by ICMP.
TCP - Display by TCP.
UDP - Display by UDP.
OSPFV3 - Display by OSPFv3.
all - Display by all IPv6 protocol.
STACK - Display by stacking.
by_priority - Display by priority.
Restrictions
Only Administrator-level users can issue this command.
249
Example
To show debug cpu port counter by CoS on port 1:1 and 1:2:
DGS-3120-24TC:admin#debug show cpu port counter 1:1-1:2 by_cos
Command: debug show cpu port counter 1:1-1:2 by_cos
Ports:1
CoS 0 rx:0 tx:0
1 rx:0 tx:0
2 rx:0 tx:0
3 rx:0 tx:0
4 rx:0 tx:0
5 rx:0 tx:0
6 rx:0 tx:0
7 rx:0 tx:0
unknown rx:0 tx:0
total rx:0 tx:0
Ports:2
CoS 0 rx:0 tx:0
1 rx:0 tx:0
2 rx:0 tx:0
3 rx:0 tx:0
4 rx:0 tx:0
5 rx:0 tx:0
6 rx:0 tx:0
7 rx:0 tx:0
unknown rx:0 tx:0
total rx:0 tx:0
DGS-3120-24TC:admin#
Format
debug show jwac auth_info
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
250
Example
To display debug information of JWAC:
DGS-3120-24TC:admin#debug show jwac auth_info
Command: debug show jwac auth_info
No Host
Ports AUTH Info: (_jwac_db_nodes)
port mac state last_bytes authing_cnt authed_cnt
----- ------------------ -------- ---------- ----------- -----------
Format
debug show status {module <module_list>}
Parameters
module – (Optional) Specify the module to be displayed.
<module_list> - enter the module to be displayed.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the all modules’ debug state:
251
MSTP : Disabled
IMPB : Disabled
DHCPv6_CLIENT : Disabled
DHCPv6_RELAY : Disabled
ERPS : Disabled
DGS-3120-24TC:admin#
Format
debug dhcpv6_client state enable
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enabled the DHCPv6 client debug function:
DGS-3120-24TC:admin#debug dhcpv6_client state enable
Command: debug dhcpv6_client state enable
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_client state disable
252
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disabled the DHCPv6 client debug function:
DGS-3120-24TC:admin#debug dhcpv6_client state disable
Command: debug dhcpv6_client state disable
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_client output [buffer | console]
Parameters
buffer - Let the debug message output to buffer.
console - Let the debug message output to console.
Restrictions
Only Administrator-level users can issue this command.
Example
To set debug information to output to console:
DGS-3120-24TC:admin#debug dhcpv6_client output console
Command: debug dhcpv6_client output console
Success.
DGS-3120-24TC:admin#
253
Format
debug dhcpv6_client packet [all | receiving | sending] state [enable | disable]
Parameters
all - Set packet receiving and sending debug flags.
receiving - Set packet receiving debug flag.
sending - Set packet sending debug flag.
state - Specify the state of the designated flags.
enable - Enable the designated flags.
disable - Disable the designated flags.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable DHCPv6client packet sending debug flags:
DGS-3120-24TC:admin#debug dhcpv6_client packet sending state enable
Command: debug dhcpv6_client packet sending state enable
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_relay state enable
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
254
Example
To enabled the DHCPv6 relay debug function:
DGS-3120-24TC:admin#debug dhcpv6_relay state enable
Command: debug dhcpv6_relay state enable
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_relay state disable
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable DHCPv6 relay debug functions:
DGS-3120-24TC:admin#debug dhcpv6_relay state disable
Command: debug dhcpv6_relay state disable
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_relay output [buffer | console]
255
Parameters
buffer - Let the debug message output to buffer.
console - Let the debug message output to console.
Restrictions
Only Administrator-level users can issue this command.
Example
To set debug information to output to a console:
DGS-3120-24TC:admin#debug dhcpv6_relay output console
Command: debug dhcpv6_relay output console
Success.
DGS-3120-24TC:admin#
Format
debug dhcpv6_relay packet [all | receiving | sending] state [enable | disable]
Parameters
all - Set packet receiving and sending debug flags.
receiving - Set packet receiving debug flag.
sending - Set packet sending debug flag.
state - Specify the state of the designated flags.
enable - Enable the designated flags.
disable - Disable the designated flags.
Restrictions
Only Administrator-level users can issue this command.
Example
To enabled the DHCPv6 relay packet sending debug:
DGS-3120-24TC:admin#debug dhcpv6_relay packet sending state enable
Command: debug dhcpv6_relay packet sending state enable
Success.
DGS-3120-24TC:admin#
256
Format
debug dhcpv6_relay hop_count state [enable | disable]
Parameters
enable - Specify to enable the hop count state.
disable - Specify to disable the hop count state.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable debug information flag about the hop count:
DGS-3120-24TC:admin#debug dhcpv6_relay hop_count state enable
Command: debug dhcpv6_relay hop_count state enable
Success.
DGS-3120-24TC:admin#
Format
debug address_binding [event | dhcp | all] state [enable | disable]
Parameters
event - To print out the debug messages when IMPB module receives ARP/IP packets.
dhcp - To print out the debug messages when the IMPB module receives the DHCP packets.
all - Print out all debug messages.
state - This parameter configures the IMPB debug state to be enabled or disabled.
enable - Specify that the state will be enabled.
disable - Specify that the state will be disabled.
257
Restrictions
Only Administrator level can issue this command.
Example
To print out all debug IMPB messages:
DGS-3120-24TC:admin# debug address_binding all state enable
Command: debug address_binding all state enable
Success.
DGS-3120-24TC:admin#
Format
debug ripng state enable
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To enable RIPng debug globally:
DGS-3120-24TC:admin#debug ripng state enable
Command: debug ripng state enable
Success.
DGS-3120-24TC:admin#
Format
debug ripng state disable
258
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To disable RIPng debug globally:
DGS-3120-24TC:admin#debug ripng state disable
Command: debug ripng state disable
Success.
DGS-3120-24TC:admin#
Format
debug ripng show flag
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To show the current RIPng debug flag setting:
DGS-3120-24TC:admin#debug ripng show flag
Command: debug ripng show flag
DGS-3120-24TC:admin#
259
Format
debug ripng flag [{interface | packet [all | rx | tx ] | route} | all] state [enable | disable]
Parameters
interface - (Optional) The state of the RIPng interface debug. The default setting is disabled.
packet - (Optional) Specify the type of packets with debug flags.
all - Set all packets with debug flags.
rx - Set inbound packets with debug flag.
tx - Set outbound packets with debug flag.
route - (Optional) The state of the RIPng route debug. The default setting is disabled.
all - Specify to configure all debug flags.
state - Specify the designated flag status.
enable - Enable the designated flags
disable - Disable designated flags.
Restrictions
Only Administrator level can issue this command.
Example
To enable the ripng interface debug:
DGS-3120-24TC:admin#debug ripng flag interface state enable
Command: debug ripng flag interface state enable
Success.
DGS-3120-24TC:admin#
Format
no debug address_binding
Parameters
None.
260
Restrictions
Only Administrator level can issue this command.
Example
To stop IMPB debug: starting when the IMPB module receives an ARP/IP or DHCP packet:
DGS-3120-24TC:admin# no debug address_binding
Command: no debug address_binding
Success.
DGS-3120-24TC:admin#
Format
debug show address_binding binding_state_table [nd_snooping | dhcpv6_snooping]
Parameters
nd_snooping – Display the ND Snooping binding state table.
dhcpv6_snooping – Display the DHCPv6 binding state table.
Restrictions
Only Administrator level can issue this command.
Example
To display the DHCPv6 snooping binding state of entries in BST:
DGS-3120-24TC:admin#debug show address_binding binding_state_table
dhcpv6_snooping
Command: debug show address_binding binding_state_table dhcpv6_snooping
Total entries : 2
DGS-3120-24TC:admin#
261
Format
debug ospf [neighbor_state_change | interface_state_change {dr_bdr_selection} | lsa {all |
originating | installing | receiving | flooding} (1) | packet {all | receiving | sending} (1) |
retransmission | spf {all | intra | inter | extern} (1) | timer | virtual_link | route | redistribution]
state [enable | disable]
Parameters
neighbor_state_change - The state of the OSPF neighbor state change debug.
interface_state_change - The state of the OSPF interface state change debug.
dr_bdr_selection - (Optional) Specify to include or exclude debug information for DR/BDR
selection.
lsa - Specify the state of the designated debug flag.
all - Specify to set all LSA debug flags.
originating - Specify to set LSA originating debug flag.
installing - Specify to set LSA installing debug flag.
receiving - Specify to set LSA receiving debug flag.
flooding - Specify to set LSA flooding debug flag.
packet - Specify the state of the designated debug flag.
all - Specify to set all packet debug flags.
receiving - Specify to set packet receiving debug flag.
sending - Specify to set packet sending debug flag.
retransmission - Specify the state of the OSPF retransmission debug flag.
spf - Specify the state of the designated debug flag.
all - Specify to set all SPF debug flags.
intra - Specify to set intra-area SPF debug flag.
inter - Specify to set inter-area SPF debug flag.
extern - Specify to set AS external SPF debug flag.
timer - Specify the state of the OSPF timer debug flag.
virtual_link - Specify the state of the OSPF virtual link debug flag.
route - Specify the state of OSPF route debug flag.
redistribution - Specify the state of the OSPF redistribution debug flag.
state - Specify to set the configured OSPF debug flag’s state.
enable - Specify that the configured OSPF debug flag’s state will be enabled.
disable - Specify that the configured OSPF debug flag’s state will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable OSPF neighbor state change debug:
262
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
263
Format
debug ospf clear counter {packet | neighbor | spf}
Parameters
packet - (Optional) Specify to reset the OSPF packet counter.
neighbor - (Optional) Specify to reset the OSPF neighbor event counter.
spf - (Optional) Specify to reset the OSPF SPF event counter.
If the parameter is not specified, all OSPF counters will be cleared.
Restrictions
Only Administrator level can issue this command.
Example
To clear all OSPF statistic counters:
DGS-3120-24TC:admin#debug ospf clear counter
Command: debug ospf clear counter
Success.
DGS-3120-24TC:admin#
Format
debug ospf log state [enable | disable]
Parameters
enable - Specify that the OSPF debug log state will be enabled.
disable - Specify that the OSPF debug log state will be disabled.
Restrictions
Only Administrator level can issue this command.
264
Example
To enable the OSPF debug log:
DGS-3120-24TC:admin#debug ospf log state enable
Command: debug ospf log state enable
Success.
DGS-3120-24TC:admin#
Format
debug ospf show counter {packet | neighbor | spf}
Parameters
packet - (Optional) Specify to display the OSPF packet counter.
neighbor - (Optional) Specify to display the OSPF neighbor event counter.
spf - (Optional) Specify to display the OSPF SPF event counter.
If the parameter is not specified, all OSPF counters will be displayed.
Restrictions
Only Administrator level can issue this command.
Example
To show all OSPF statistic counters:
265
Packet Sending:
Total : 59
Hello : 59
DD : 0
LSR : 0
LSU : 0
LSAck : 0
Neighbor State:
Change : 0
SeqMismatch : 0
SPF Calculation:
Intra : 0
Inter : 0
Extern : 0
DGS-3120-24TC:admin#
Format
debug ospf show detail external_link
Parameters
None.
Restrictions
Only Administrator level can issue this command.
266
Example
To display all AS external LSAs with detail information:
DGS-3120-24TC:admin#debug ospf show detail external_link
Command: debug ospf show detail external_link
===========
AREA 0.0.0.0:
AS-External LSA:
Link-State ID: 192.168.205.0
Advertising Router: 1.1.1.1
LS Age: 10 Seconds
Options: 0x2
.... ...0 = 0 Bit Isn't Set
.... ..1. = E: ExternalRoutingCapability
.... .0.. = MC: NOT Multicast Capable
.... 0... = N/P: NSSA Bit
...0 .... = EA: Not Support Rcv And Fwd EA_LSA
..0. .... = DC: Not Support Handling Of Demand Circuits
.0.. .... = O: O Bit Isn't Set
0... .... = 7 Bit Isn't Set
LS Sequence Number: 0x80000001
Length: 36
Netmask: 255.255.255.0
Metric: 20
Forwarding Address: 10.90.90.101
External Route Tag: 0
Internal Field:
Del_flag: 0x0 I_ref_count: 0 Seq: 0x80000001 Csum: 0xd08e
Rxtime: 384 Txtime: 0 Orgage: 0
Current Time: 394
DGS-3120-24TC:admin#
Format
debug ospf show detail net_link
Parameters
None.
267
Restrictions
Only Administrator level can issue this command.
Example
To display all Network LSAs with detail information:
DGS-3120-24TC:admin#debug ospf show detail net_link
Command: debug ospf show detail net_link
===========
AREA 0.0.0.0:
Network LSA:
Link-State ID: 10.90.90.123
Netmask: 255.0.0.0
Advertising Router: 10.90.90.91
LS Age: 109 Seconds
Options: 0x2
.... ...0 = 0 Bit Isn't Set
.... ..1. = E: ExternalRoutingCapability
.... .0.. = MC: NOT Multicast Capable
.... 0... = N/P: NSSA Bit
...0 .... = EA: Not Support Rcv And Fwd EA_LSA
..0. .... = DC: Not Support Handling Of Demand Circuits
.0.. .... = O: O Bit Isn't Set
0... .... = 7 Bit Isn't Set
LS Sequence Number: 0x80000001
Length: 32
Attached Router: 10.90.90.91
Attached Router: 1.1.1.1
Internal Field:
Del_flag: 0x0 I_ref_count: 0 Seq: 0x80000001 Csum: 0x4e99
Rxtime: 4 Txtime: 4 Orgage: 1
Current Time: 112
DGS-3120-24TC:admin#
Format
debug ospf show detail rt_link
Parameters
None.
268
Restrictions
Only Administrator level can issue this command.
Example
To display all Router LSAs with detail information:
DGS-3120-24TC:admin#debug ospf show detail rt_link
Command: debug ospf show detail rt_link
===========
AREA 0.0.0.0:
Router LSA:
Link-State ID: 1.1.1.1
Advertising Router: 1.1.1.1
LS Age: 10 Seconds
Options: 0x2
.... ...0 = 0 Bit Isn't Set
.... ..1. = E: ExternalRoutingCapability
.... .0.. = MC: NOT Multicast Capable
.... 0... = N/P: NSSA Bit
...0 .... = EA: Not Support Rcv And Fwd EA_LSA
..0. .... = DC: Not Support Handling Of Demand Circuits
.0.. .... = O: O Bit Isn't Set
0... .... = 7 Bit Isn't Set
LS Sequence Number: 0x80000002
Length: 36
Flags: 0x0
.... ...0 = B: Not Area Border Router
.... ..0. = E: Not AS Boundary Router
.... .0.. = V: Not Virtual Link Endpoint
Number Of Links: 1
Type: Transit ID: 10.90.90.123 Data: 10.90.90.91 Metric: 1
Internal Field:
Del_flag: 0x0 I_ref_count: 0 Seq: 0x80000002 Csum: 0xd81d
Rxtime: 5 Txtime: 0 Orgage: 0
Current Time: 15
DGS-3120-24TC:admin#
Format
debug ospf show detail summary_link
269
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display all Summary LSAs with detail information:
DGS-3120-24TC:admin#debug ospf show detail summary_link
Command: debug ospf show detail summary_link
===========
AREA 0.0.0.0:
Summary LSA:
Link-State ID: 20.1.1.0
Advertising Router: 10.90.90.91
LS Age: 10 Seconds
Options: 0x2
.... ...0 = 0 Bit Isn't Set
.... ..1. = E: ExternalRoutingCapability
.... .0.. = MC: NOT Multicast Capable
.... 0... = N/P: NSSA Bit
...0 .... = EA: Not Support Rcv And Fwd EA_LSA
..0. .... = DC: Not Support Handling Of Demand Circuits
.0.. .... = O: O Bit Isn't Set
0... .... = 7 Bit Isn't Set
LS Sequence Number: 0x80000001
Length: 28
Netmask: 255.255.255.0
Metric: 1
Internal Field:
Del_flag: 0x0 I_ref_count: 0 Seq: 0x80000001 Csum: 0x8f9c
Rxtime: 246 Txtime: 246 Orgage: 1
Current Time: 255
DGS-3120-24TC:admin#
270
Format
debug ospf show detail type7_link
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display all type-7 LSAs with detail information:
DGS-3120-24TC:admin#debug ospf show detail type7_link
Command: debug ospf show detail type7_link
===========
AREA 0.0.0.1:
NSSA-External LSA:
Link-State ID: 0.0.0.0
Advertising Router: 10.90.90.91
LS Age: 855 Seconds
Options: 0x2
.... ...0 = 0 Bit Isn't Set
.... ..1. = E: ExternalRoutingCapability
.... .0.. = MC: NOT Multicast Capable
.... 0... = N/P: NSSA Bit
...0 .... = EA: Not Support Rcv And Fwd EA_LSA
..0. .... = DC: Not Support Handling Of Demand Circuits
.0.. .... = O: O Bit Isn't Set
0... .... = 7 Bit Isn't Set
LS Sequence Number: 0x80000002
Length: 36
Netmask: 0.0.0.0
Metric: 0
Forwarding Address: 0.0.0.0
External Route Tag: 0
Internal Field:
Del_flag: 0x0 I_ref_count: 0 Seq: 0x80000002 Csum: 0x77be
Rxtime: 2301 Txtime: 0 Orgage: 0
Current Time: 3156
DGS-3120-24TC:admin#
271
Format
debug ospf show flag
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the current OSPF debug flag’s settings:
DGS-3120-24TC:admin#debug ospf show flag
Command: debug ospf show flag
DGS-3120-24TC:admin#
272
Format
debug ospf show log state
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the OSPF debug log state:
DGS-3120-24TC:admin#debug ospf show log state
Command: debug ospf show log state
DGS-3120-24TC:admin#
Format
debug ospf show redistribution
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the current OSPF redistribution list:
273
DGS-3120-24TC:admin#
Format
debug ospf show request_list
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the current OSPF request list:
274
Area 0.0.0.0:
Circuit: 1.1.1.1
Neighbor: 90.2.0.1 IP: 1.1.1.2
LSID: 192.194.134.0 RTID: 90.2.0.1
LSID: 192.194.135.0 RTID: 90.2.0.1
LSID: 192.194.136.0 RTID: 90.2.0.1
LSID: 192.194.137.0 RTID: 90.2.0.1
LSID: 192.194.138.0 RTID: 90.2.0.1
DGS-3120-24TC:admin#
Format
debug ospf show summary_list
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the current OSPF summary list:
275
Area 0.0.0.0:
Circuit: 1.1.1.1
Neighbor: 90.2.0.1 IP: 1.1.1.2
LSID: 1.1.1.1 RTID: 1.1.1.1
Circuit: 2.2.2.1
Circuit: 10.1.1.6
DGS-3120-24TC:admin#
Format
debug ospf state [enable | disable]
Parameters
enable - Specify that the OSPF debug global state will be enabled.
disable - Specify that the OSPF debug global state will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable the OSPF debug global state:
DGS-3120-24TC:admin#debug ospf state enable
Command: debug ospf state enable
Success.
DGS-3120-24TC:admin#
276
Format
debug vrrp [vr_state_change | packet [all | {receiving | sending}(1)] | mac_addr_update |
interface_change | timers] state [enable | disable]
Parameters
vr_state_change - Specify the VRRP virtual router state change debug flag.
packet - Specify to set the VRRP packet flags.
all - Sets VRRP all packet debug flags.
receiving - Set the VRRP packet receiving flag.
sending - Set the VRRP packet sending flag.
mac_addr_update - Specify the VRRP MAC address update debug flag.
interface_change - Specify the VRRP interface state change debug flag.
timers - Specify the state of the VRRP timers debug flag.
state - Specify the state of the configured VRRP debug flag.
enable - Specify that the configured VRRP debug flag will be enabled.
disable - Specify that the configured VRRP debug flag will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable the VRRP virtual router state change debug flag:
DGS-3120-24TC:admin#debug vrrp vr_state_change state enable
Command: debug vrrp vr_state_change state enable
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
277
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
debug vrrp clear counter
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To clear VRRP statistic counters:
DGS-3120-24TC:admin#debug vrrp clear counter
Command: debug vrrp clear counter
Success.
DGS-3120-24TC:admin#
278
Format
debug vrrp log state [enable | disable]
Parameters
enable - Specify that the VRRP debug log state will be enabled.
disable - Specify that the VRRP debug log state will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable the VRRP debug log state:
DGS-3120-24TC:admin#debug vrrp log state enable
Command: debug vrrp log state enable
Success.
DGS-3120-24TC:admin#
Format
debug vrrp show counter
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display VRRP statistic counters:
279
DGS-3120-24TC:admin#
Format
debug vrrp show flag
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display VRRP debug flag settings:
DGS-3120-24TC:admin#debug vrrp show flag
Command: debug vrrp show flag
DGS-3120-24TC:admin#
280
Format
debug vrrp show log state
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To display the VRRP debug log state:
DGS-3120-24TC:admin#debug vrrp show log state
Command: debug vrrp show log state
DGS-3120-24TC:admin#
Format
debug vrrp state [enable | disable]
Parameters
enable - Specify that the VRRP debug state will be enabled.
disable - Specify that the VRRP debug state will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable the VRRP debug state:
281
Success.
DGS-3120-24TC:admin#
Format
debug pim ssm
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To enable the PIM-SSM debug function:
DGS-3120-24TC:admin#debug pim ssm
Command: debug pim ssm
Success.
DGS-3120-24TC:admin#
Once the PIM-SSM debug enabled, the debug information maybe outputted.
DGS-3120-24TC:admin#PIM_SSM, 29 Oct 2012 11:04:12 IGMP v1/v2 Report for group
232.1.1.0 from 192.168.121.1 on n121, ignored.
Output truncated...
Format
no debug pim ssm
282
Parameters
None.
Restrictions
Only Administrator level can issue this command.
Example
To disable the PIM-SSM debug function:
DGS-3120-24TC:admin#no debug pim ssm
Command: no debug pim ssm
Success.
DGS-3120-24TC:admin#
283
Format
config dos_prevention dos_type [{land_attack | blat_attack | tcp_null_scan | tcp_xmasscan
| tcp_synfin | tcp_syn_srcport_less_1024 | ping_death_attack | tcp_tiny_frag_attack}(1) | all]
{action [drop] | state [enable | disable]}(1)
Parameters
land_attack - Specify the type of DoS attack as land attack.
blat_attack - Specify the type of DoS attack as blat attack.
tcp_null_scan - Specify the type of DoS attack as TCP null scan.
tcp_xmasscan - Specify the type of DoS attack as TCP xmasscan.
tcp_synfin - Specify the type of DoS attack as TCP synfin.
tcp_syn_srcport_less_1024 - Specify the type of DoS attack as tcp_syn_srcport_less_1024.
ping_death_attack - Specify the type of DoS attack as ping_death_attack.
tcp_tiny_frag_attack - Specify the type of DoS attack as tcp_tiny_frag_attack.
all - Specify all types of DoS attack.
action - When the DoS prevention is enabled, the following action can be taken.
drop - Drop DoS attack packets.
state - Specify the DoS attack prevention state.
enable - Enable the DoS attack prevention.
disable - Disable the DoS attack prevention.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure land attack and blat attack prevention, the action is drop:
284
Success.
DGS-3120-24TC:admin#
Format
show dos_prevention {land_attack | blat_attack | tcp_null_scan | tcp_xmasscan | tcp_synfin
| tcp_syn_srcport_less_1024 | ping_death_attack | tcp_tiny_frag_attack}
Parameters
land_attack - (Optional) Specify the type of DoS attack as land attack.
blat_attack - (Optional) Specify the type of DoS attack as blat attack.
tcp_null_scan - (Optional) Specify the type of DoS attack as TCP null scan.
tcp_xmasscan - (Optional) Specify the type of DoS attack as TCP xmasscan.
tcp_synfin - (Optional) Specify the type of DoS attack as TCP synfin.
tcp_syn_srcport_less_1024 - (Optional) Specify the type of DoS attack as
tcp_syn_srcport_less_1024.
ping_death_attack - (Optional) Specify the type of DoS attack as ping_death_attack.
tcp_tiny_frag_attack - (Optional) Specify the type of DoS attack as tcp_tiny_frag_attack.
Restrictions
None.
Example
To display DoS prevention information:
285
DGS-3120-24TC:admin#show dos_prevention
Command: show dos_prevention
Format
config dos_prevention trap [enable | disable]
Parameters
enable - Specify to enable DoS prevention trap state.
disable - Specify to disable DoS prevention trap state.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable DoS prevention trap state:
286
Success.
DGS-3120-24TC:admin#
Format
config dos_prevention log [enable | disable]
Parameters
enable - Specify to enable DoS prevention log state.
disable - Specify to disable DoS prevention log state.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable DoS prevention log state:
DGS-3120-24TC:admin#config dos_prevention log enable
Command: config dos_prevention log enable
Success.
DGS-3120-24TC:admin#
287
Format
config dhcp_local_relay vlan <vlan_name 32> state [enable | disable]
Parameters
<vlan_name 32> - Specify the VLAN name that the DHCP local relay function will be enabled.
This name can be up to 32 characters long.
state - Enable or disable DHCP local relay for specified vlan.
enable - Specify that the DHCP local relay function will be enabled.
disable - Specify that the DHCP local relay function will be disabled.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable DHCP local relay for default VLAN:
DGS-3120-24TC:admin# config dhcp_local_relay vlan default state enable
Command: config dhcp_local_relay vlan default state enable
Success.
DGS-3120-24TC:admin#
288
Format
config dhcp_local_relay vlan vlanid <vlan_id 1-4094> state [enable | disable]
Parameters
vlanid - Specify the VLAN ID that the DHCP local relay function will be enabled.
<vlan_id 1-4094> - Enter the VLAN ID used here.
state - Enable or disable DHCP local relay for specified VLAN.
enable - Specify that the DHCP local relay function will be enabled.
disable - Specify that the DHCP local relay function will be disabled.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable DHCP local relay for default VLAN:
DGS-3120-24TC:admin# config dhcp_local_relay vlan vlanid 1 state enable
Command: config dhcp_local_relay vlan vlanid 1 state enable
Success.
DGS-3120-24TC:admin#
Format
enable dhcp_local_relay
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
289
Example
To enable the DHCP local relay function:
DGS-3120-24TC:admin# enable dhcp_local_relay
Command: enable dhcp_local_relay
Success.
DGS-3120-24TC:admin#
Format
disable dhcp_local_relay
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the DHCP local relay function:
DGS-3120-24TC:admin# disable dhcp_local_relay
Command: disable dhcp_local_relay
Success.
DGS-3120-24TC:admin#
Format
show dhcp_local_relay
Parameters
None.
290
Restrictions
None.
Example
To display local dhcp relay status:
DGS-3120-24TC:admin# show dhcp_local_relay
Command: show dhcp_local_relay
DGS-3120-24TC:admin#
291
Format
config dhcp_relay {hops <int 1-16> | time <sec 0-65535>}
Parameters
hops - (Optional) Specify the maximum number of relay hops that the DHCP/BOOTP packets
can cross. The range is 1 to 16. The default value is 4. The DHCP packet will be dropped
when the relay hop count in the received packet is equal to or greater than this setting.
<int 1-16> - Enter the maximum number of relay hops here. This value must be between 1
and 16.
time - (Optional) The time field in the DHCP packet must be equal to or greater than this setting
to be relayed by the router. The default value is 0.
<sec 0-65535> - Enter the relay time here. This value must be between 0 and 65535 seconds.
292
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCP relay hops and time parameters:
DGS-3120-24TC:admin# config dhcp_relay hops 4 time 2
Command: config dhcp_relay hops 4 time 2
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay add ipif <ipif_name 12> <ipaddr>
Parameters
ipif_name - The name of the IP interface which contains the IP address below.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
<ipaddr> - The DHCP/BOOTP server IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a DHCP/BOOTP server to the relay table:
DGS-3120-24TC:admin# config dhcp_relay add ipif System 10.43.21.12
Command: config dhcp_relay add ipif System 10.43.21.12
Success.
DGS-3120-24TC:admin#
interface level, then the configuration at the interface level has higher priority. In this case, the
DHCP server configured on the VLAN will not be used to forward the DHCP packets.
Format
config dhcp_relay add vlanid <vlan_id_list> <ipaddr>
Parameters
vlanid - Specify the VLAN ID list used for this configuration.
<vlan_id_list> - Enter the VLAN ID list used for this configuration here.
<ipaddr> - Enter the DHCP/BOOTP server IP address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a DHCP/BOOTP server 10.43.21.12 to VLAN 1 to 10:
DGS-3120-24TC:admin# config dhcp_relay add vlanid 1-10 10.43.21.12
Command: config dhcp_relay add vlanid 1-10 10.43.21.12
Success.
DGS-3120-24TC:admin#
294
DGS-3120-24TC:admin#show dhcp_relay
Command: show dhcp_relay
DGS-3120-24TC:admin#
Format
config dhcp_relay delete ipif <ipif_name 12> <ipaddr>
Parameters
ipif - The name of the IP interface which contains the IP address below.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
<ipaddr> - The DHCP/BOOTP server IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a DHCP/BOOTP server to the relay table:
295
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay delete vlanid <vlan_id_list> <ipaddr>
Parameters
vlanid - Specify the VLAN ID list used for this configuration.
<vlan_id_list> - Enter the VLAN ID list used for this configuration here.
<ipaddr> - Enter the DHCP/BOOTP server IP address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a DHCP/BOOTP server 10.43.21.12 from VLAN 2 and VLAN 3:
DGS-3120-24TC:admin# config dhcp_relay delete vlanid 2-3 10.43.21.12
Command: config dhcp_relay delete vlanid 2-3 10.43.21.12
Success.
DGS-3120-24TC:admin#
Format
enable dhcp_relay
296
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the DHCP relay function.
DGS-3120-24TC:admin# enable dhcp_relay
Command: enable dhcp_relay
Success.
DGS-3120-24TC:admin#
Format
disable dhcp_relay
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the DHCP relay function:
DGS-3120-24TC:admin# disable dhcp_relay
Command: disable dhcp_relay
Success.
DGS-3120-24TC:admin#
Format
show dhcp_relay {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the IP interface name.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
If no parameter is specified , the system will display all DHCP relay configuration.
Restrictions
None.
Example
To display DHCP relay configuration:
DGS-3120-24TC:admin#show dhcp_relay ipif System
Command: show dhcp_relay ipif System
DGS-3120-24TC:admin#
298
If the relay servers are not determined either by option 60 or option 61, then per IPIF configured
servers will be used to determine the relay servers.
Format
config dhcp_relay option_60 state [enable | disable]
Parameters
state - Specify that the DHCP relay function should use the option 60 rule to relay the DHCP
packets.
enable - Specify that the option 60 rule will be enabled.
disable - Specify that the option 60 rule will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the state of dhcp_relay option 60:
DGS-3120-24TC:admin# config dhcp_relay option_60 state enable
Command: config dhcp_relay option_60 state enable
Success
DGS-3120-24TC:admin#
Format
config dhcp_relay option_60 add string <multiword 255> relay <ipaddr> [exact-match |
partial-match]
Parameters
string - Specify the string used.
<multiword 255> - Enter the string value here. This value can be up to 255 characters long.
relay - Specify a relay server IP address.
<ipaddr> - Enter the IP address used for this configuration here.
exact-match - The option 60 string in the packet must full match with the specified string.
partial-match - The option 60 string in the packet only need partial match with the specified
string.
299
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCP relay option 60 option:
DGS-3120-24TC:admin# config dhcp_relay option_60 add string "abc" relay
10.90.90.1 exact-match
Command: config dhcp_relay option_60 add string "abc" relay 10.90.90.1 exact-
match
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay option_60 default [relay <ipaddr> | mode [drop | relay]]
Parameters
relay - Specify the IP address used for the DHCP relay forward function.
<ipaddr> - Enter the IP address used for this configuration here.
mode - Specify the DHCP relay option 60 mode.
drop - Specify to drop the packet that has no matching option 60 rules.
relay - The packet will be relayed based on the relay rules.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
300
Example
To configure the DHCP relay option 60 default drop option:
DGS-3120-24TC:admin#config dhcp_relay option_60 default mode drop
Command: config dhcp_relay option_60 default mode drop
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay option_60 delete [string <multiword 255> {relay <ipaddr>} | ipaddress
<ipaddr> | all | default {<ipaddr>}]
Parameters
string - Delete all the entries whose string is equal to the string of specified if ipaddress is not
specified
<multiword 255> - Enter the DHCP option 60 string to be removed here. This value can be
up to 255 characters long.
relay - (Optional) Delete one entry, whose string and IP address are equal to the string and IP
address specified by the user.
<ipaddr> - Enter the IP address used for this configuration here.
ipaddress - Delete all the entry whose ipaddress is equal to the specified ipaddress.
<ipaddr> - Enter the IP address used for this configuration here.
all - Delete all the entry. Default relay servers are excluded.
default - Delete the default relay ipaddress that is specified by the user.
<ipaddr> - (Optional) Enter the IP address used for this configuration here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the DHCP relay option 60 string called ‘abc’:
DGS-3120-24TC:admin# delete dhcp_relay option_60 string "abc" relay 10.90.90.1
Command: delete dhcp_relay option_60 string "abc" relay 10.90.90.1
Success
DGS-3120-24TC:admin#
301
Format
show dhcp_relay option_60 {[string <multiword 255> | ipaddress <ipaddr> | default]}
Parameters
string - (Optional) Show the entry which’s string equal the string of specified.
<multiword 255> - Enter the entry's string value here. This value can be up to 255 characters
long.
ipadddress - (Optional) Show the entry whose IP address equal the specified ipaddress.
<ipaddr> - Enter the IP address here.
default - (Optional) Show the defaut behaviour of DHCP relay option 60.
If no parameter is specified then all the DHCP option 60 entries will be displayed.
Restrictions
None.
Example
To show DHCP option 60 information:
DGS-3120-24TC:admin#show dhcp_relay option_60
Command: show dhcp_relay option_60
Default Servers:
Matching Rules:
Total Entries : 1
DGS-3120-24TC:admin#
302
If the relay servers are determined based on option 60 or option 61, then per IPIF configured
servers will be ignored.
If the relay servers are not determined either by option 60 or option 61, then per IPIF configured
servers will be used to determine the relay servers.
Format
config dhcp_relay option_61 state [enable | disable]
Parameters
state - Specify whether the DHCP relay option 61 is enabled or disabled.
enable - Enables the function DHCP relay use option 61 ruler to relay DHCP packet.
disable - Disables the function DHCP relay use option 61 ruler to relay DHCP packet.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the state of dhcp_relay option 61:
DGS-3120-24TC:admin# config dhcp_relay option_61 state enable
Command: config dhcp_relay option_61 state enable
Success
DGS-3120-24TC:admin#
Format
config dhcp_relay option_61 add [mac_address <macaddr> | string <desc_long 255>] [relay
<ipaddr> | drop]
Parameters
mac_address - The client’s client-ID which is the hardware address of client.
<macaddr> - Enter the client's MAC address here.
string - The client’s client-ID, which is specified by administrator.
<desc_long 255> - Enter the client's description here. This value can be up to 255 characters
303
long.
relay - Specify to relay the packet to a IP address.
<ipaddr> - Enter the IP address used for this configuration here.
drop - Specify to drop the packet.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCP relay option 61 function:
DGS-3120-24TC:admin# config dhcp_relay option_61 add mac_address 00-11-22-33-
44-55 drop
Command: config dhcp_relay option_61 add mac_address 00-11-22-33-44-55 drop
Success
DGS-3120-24TC:admin#
Format
config dhcp_relay option_61 default [relay <ipaddr> | drop]
Parameters
relay - Specify to relay the packet that has no option matching 61 matching rules to an IP
address.
<ipaddr> - Enter the IP address used for this configuration here.
drop - Specify to drop the packet that have no option 61 matching rules.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCP relay option 61 function:
DGS-3120-24TC:admin# config dhcp_relay option_61 default drop
Command: config dhcp_relay option_61 default drop
Success
DGS-3120-24TC:admin#
304
Format
config dhcp_relay option_61 delete [mac_address <macaddr> | string <desc_long 255> | all]
Parameters
mac_address - The entry with the specified MAC address will be deleted.
<macaddr> - Enter the MAC address here.
string - The entry with the specified string will be deleted.
<desc_long 255> - Enter the string value here. This value can be up to 255 characters long.
all - All rules excluding the default rule will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To remove a DHCP relay option 61 entry:
DGS-3120-24TC:admin# config dhcp_relay option_61 delete mac_address 00-11-22-
33-44-55
Command: config dhcp_relay option_61 delete mac_address 00-11-22-33-44-55
Success
DGS-3120-24TC:admin#
Format
show dhcp_relay option_61
Parameters
None.
Restrictions
None.
305
Example
To display DHCP relay rulers for option 61:
DGS-3120-24TC:admin# show dhcp_relay option_61
Command: show dhcp_relay option_61
Matching Rules:
Total Entries: 3
DGS-3120-24TC:admin#
Format
config dhcp_relay option_82 check [enable | disable]
Parameters
enable - When the state is enabled, the DHCP packet will be inserted with the option 82 field
before being relayed to server. The DHCP packet will be processed based on the behavior
defined in check and policy setting.
disable - When the state is disabled, the DHCP packet will be relayed directly to server without
further check and processing on the packet. The default setting is disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable DHCP relay option 82 check:
DGS-3120-24TC:admin#config dhcp_relay option_82 check disable
Command: config dhcp_relay option_82 check disable
Success.
DGS-3120-24TC:admin#
306
Format
config dhcp_relay option_82 circuit_id [default | user_define <desc 32> | vendor1 | vendor2
| vendor4]
Parameters
default - If configure to default, the circuit_id use the original format:
a. b. c. d. e. f. g.
1 0x6 0 4 VLAN Module ID Port ID
1 byte 1 byte 1 byte 1 byte 2 bytes 1 byte 1 byte
a. Sub-option type (1 means circuit ID)
b. Length, it should be 6.
c. Circuit ID’s sub-option, it should be 0.
d. Sub-option’s length, it should be 4
e. VLAN ID (S-VID)
f. Module ID, for standalone switch, it is 0; for stacking switch, it is the box ID that
assigned by stacking.
g. Port ID: port number of each box.
user_define - Use user-defined string as the circuit ID.
a. b. c. d. e.
2 n+2 1 n user define
1 byte 1 byte 1 byte 1 byte Max. 32 bytes
<desc 32> - Enter the user-defined ID. Space is allowed in the string.
vendor1 - If configure to vendor1, the circuit ID uses the following format to communicate with
Alcatel-Lucent’s server:
a. b. c. d. e. f. g. h. i. j.
1 0x10 0 6 VLAN Slot ID Port ID 1 6 MAC
1 1 1 1 2 2 2 1 1 2
byte byte byte byte bytes bytes bytes byte byte bytes
a. Sub-option type (1 means circuit ID)
b. Length
c. Circuit ID’s sub-option’s first tag, it should be 0.
d. First tag’s length, it should be 6
e. VLAN ID
f. Slot ID, for standalone switch, it is 1; for stacking switch, it is the box ID that assigned
by stacking.
g. Port ID: port number of each box
h. Circuit ID’s sub-option’s second tag, it should be 1.
i. Second tag’s length, it should be 6.
j. MAC address: System’s MAC address
vendor2 - If configure to vendor2, the circuit ID uses the following format:
a. b. c.
1 n Port number
1 byte 1 byte N bytes
a. Sub-option type, 1 indicates this is the Circuit ID.
b. Length: length of value
c. Value: Character string. The incoming port number of DHCP client packet, start with
character “p”. Ex: p02 means port 2. (No Circuit ID sub-option type, directly fill the
value.) For stacking port(1~768), The format of port 129(port 1 of box3) is p129.
307
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the ciruit ID as vendor 2:
DGS-3120-24TC:admin#config dhcp_relay option_82 circuit_id vendor2
Command: config dhcp_relay option_82 circuit_id vendor2
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay option_82 policy [replace | drop | keep]
Parameters
replace - Replace the existing option 82 field in the packet. The Switch will use it's own Option 82
value to replace the old Option 82 value in the packet.
drop - Discard if the packet has the option 82 field. If the packet from the client side contains an
Option 82 value, the packet will be dropped. If the packet from the client side doesn’t contain
an Option 82 value, it inserts it's own Option 82 value into the packet.
keep - Retain the existing option 82 field in the packet. If the packet from the client side contains
an Option 82 value, it keeps the old Option 82 value. If the packet from the client side doesn’t
contain an Option 82 value, it inserts it's own Option 82 value into the packet.
308
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure DHCP relay option 82 policy:
DGS-3120-24TC:admin#config dhcp_relay option_82 policy replace
Command: config dhcp_relay option_82 policy replace
Success.
DGS-3120-24TC:admin#
Format
config dhcp_relay option_82 remote_id [default | user_define <desc 32>]
Parameters
default - Use the Switch’s system MAC address as remote ID.
user_define - Use the user-defined string as remote ID. The space character is allowed in the
string.
<desc 32> - Enter the user defined description here. This value can be up to 32 characters
long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the content in Remote ID sub-option:
DGS-3120-24TC:admin#config dhcp_relay option_82 remote_id user_define "D-Link
L2
Switch"
Command: config dhcp_relay option_82 remote_id user_define "D-Link L2 Switch"
Success.
DGS-3120-24TC:admin#
309
Format
config dhcp_relay option_82 state [enable | disable]
Parameters
enable - When the state is enabled, the DHCP packet will be inserted with the option 82 field
before being relayed to server. The DHCP packet will be processed based on the behaviour
defined in check and policy setting.
disable - When the state is disabled, the DHCP packet will be relayed directly to server without
further check and processing on the packet. The default setting is disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable DHCP relay option 82 state:
DGS-3120-24TC:admin#config dhcp_relay option_82 state enable
Command: config dhcp_relay option_82 state enable
Success.
DGS-3120-24TC:admin#
310
Format
create dhcp excluded_address begin_address <ipaddr> end_address <ipaddr>
Parameters
begin_address - Specify the starting address of the IP address range.
<ipaddr> - Specify the starting address of the IP address range.
end_address - Specify the ending address of the IP address range.
311
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To specify the IP address that DHCP server should not assign to clients:
DGS-3120-24TC:admin#create dhcp excluded_address begin_address 10.10.10.1
end_address 10.10.10.10
Command: create dhcp excluded_address begin_address 10.10.10.1 end_address
10.10.10.10
Success.
DGS-3120-24TC:admin#
Format
delete dhcp excluded_address [begin_address <ipaddr> end_address <ipaddr> | all]
Parameters
begin_address - Specify the starting address of the IP address range.
<ipaddr> - Specify the starting address of the IP address range.
end_address - Specify the ending address of the IP address range.
<ipaddr> - Specify the ending address of the IP address range.
all - Specify to delete all IP addresses.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a DHCP server exclude address:
DGS-3120-24TC:admin#delete dhcp excluded_address begin_address 10.10.10.1
end_address 10.10.10.10
Command: delete dhcp excluded_address begin_address 10.10.10.1 end_address
10.10.10.10
Success.
DGS-3120-24TC:admin#
312
Format
show dhcp excluded_address
Parameters
None.
Restrictions
None.
Example
To display the DHCP server excluded addresses:
GS-3120-24TC:admin#show dhcp excluded_address
Command: show dhcp excluded_address
Total Entries: 1
DGS-3120-24TC:admin#
Format
create dhcp pool <pool_name 12>
Parameters
<pool_name 12> - Specify the name of the DHCP pool.
313
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a DHCP pool:
DGS-3120-24TC:admin#create dhcp pool dhcppool01
Command: create dhcp pool dhcppool01
Success.
DGS-3120-24TC:admin#
Format
delete dhcp pool [<pool_name 12> | all]
Parameters
<pool_name 12> - Specify the name of the DHCP pool.
all - Specify to delete all the DHCP pools.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a DHCP pool:
DGS-3120-24TC:admin#delete dhcp pool dhcppool01
Command: delete dhcp pool dhcppool01
Success.
DGS-3120-24TC:admin#
314
a request from the client, the server will automatically find a pool to allocate the address. If the
request is relayed to the server by the intermediate device, the server will match the gateway IP
address carried in the packet against the network of each DHCP pool. The pool which has the
longest match will be selected. If the request packet is not through relay, then the server will match
the IP address of the IPIF that received the request packet against the network of each DHCP pool.
Format
config dhcp pool network_addr <pool_name 12> <network_address>
Parameters
<pool_name 12> - Specify the DHCP pool name.
<network_address> - Specify the IP address that the DHCP server may assign to clients.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the address range of the DHCP address pool:
DGS-3120-24TC:admin#config dhcp pool network_addr dhcppool01 10.10.10.0/24
Command: config dhcp pool network_addr dhcppool01 10.10.10.0/24
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool domain_name <pool_name 12> {<domain_name 64>}
Parameters
<pool_name 12> - Specify the DHCP pool name.
<domain_name 64> - (Optional) Specify the domain name of the client.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
315
Example
To configure the domain name option of the DHCP pool:
DGS-3120-24TC:admin#config dhcp pool domain_name dhcppool01 nba.com
Command: config dhcp pool domain_name dhcppool01 nba.com
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool dns_server <pool_name 12> {< ipaddr> {< ipaddr> {< ipaddr>}}}
Parameters
<pool_name 12> - Specify the DHCP pooll name.
<ipaddr> - (Optional) Specify the IP address of the DNS server. Up to three IP addresses can be
specified on one command line.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DNS server’s IP address:
DGS-3120-24TC:admin#config dhcp pool dns_server dhcppool01 10.10.10.1
Command: config dhcp pool dns_server dhcppool01 10.10.10.1
Success.
DGS-3120-24TC:admin#
316
Windows Internet Naming Service (WINS) is a name resolution service that Microsoft DHCP
clients use to correlate host names to IP addresses within a general grouping of networks. If a
NetBIOS name server is not specified, the NetBIOS name server information will not be provided
to the client. If this command is input twice for the same pool, the second command will overwrite
the first command.
Format
config dhcp pool netbios_name_server <pool_name 12> {< ipaddr> {< ipaddr> {< ipaddr>}}}
Parameters
<pool_name 12> - Specify the DHCP pool name.
<ipaddr> - (Optional) Specify the IP address of the WINS server. Up to three IP addresses can
be specified on one command line.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a WINS server IP address:
DGS-3120-24TC:admin#config dhcp pool netbios_name_server dhcppool01 10.10.10.1
Command: config dhcp pool netbios_name_server dhcppool01 10.10.10.1
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool netbios_node_type <pool_name 12> [broadcast | peer_to_peer | mixed |
hybrid]
Parameters
<pool_name 12> - Specify the DHCP pool name.
broadcast - Specify the NetBIOS node type for Microsoft DHCP clients as broadcast.
peer_to_peer - Specify the NetBIOS node type for Microsoft DHCP clients as peer_to_peer.
mixed - Specify the NetBIOS node type for Microsoft DHCP clients as mixed.
hybrid - Specify the NetBIOS node type for Microsoft DHCP clients as hybrid.
317
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the NetBIOS node type:
DGS-3120-24TC:admin#config dhcp pool netbios_node_type dhcppool01 hybrid
Command: config dhcp pool netbios_node_type dhcppool01 hybrid
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool default_router <pool_name 12> {< ipaddr> {< ipaddr> {< ipaddr>}}}
Parameters
<pool_name 12> - Specify the DHCP pool name.
<ipaddr> - (Optional) Specify the IP address of the default router. Up to three IP addresses can
be specified on one command line.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the default router:
DGS-3120-24TC:admin#config dhcp pool default_router dhcppool01 10.10.10.1
Command: config dhcp pool default_router dhcppool01 10.10.10.1
Success.
DGS-3120-24TC:admin#
318
Format
config dhcp pool lease <pool_name 12> [<day 0-365> <hour 0-23> <minute 0-59> | infinite]
Parameters
<pool_name 12> - Specify the DHCP pool’s name.
<day 0-365> - Specify the number of days of the lease.
<hour 0-23> - Specify the number of hours of the lease.
<minute 0-59> - Specify the number of minutes of the lease.
infinite - Specify a lease of unlimited duration.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the lease of a pool:
DGS-3120-24TC:admin#config dhcp pool lease dhcppool01 infinite
Command: config dhcp pool lease dhcppool01 infinite
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool boot_file <pool_name 12> {<file_name 64>}
319
Parameters
<pool_name 12> - Specify the DHCP pool name.
<file_name 64> - (Optional) Specify the file name of the boot image.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the boot file:
DGS-3120-24TC:admin#config dhcp pool boot_file dhcppool01 boot.had
Command: config dhcp pool boot_file dhcppool01 boot.had
Success.
DGS-3120-24TC:admin#
Format
config dhcp pool next_server <pool_name 12> {<ipaddr>}
Parameters
<pool_name 12> - Specify the DHCP pool name.
<ipaddr> - (Optional) Specify the IP address of the next server.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the next server:
DGS-3120-24TC:admin#config dhcp pool next_server dhcppool01 192.168.0.1
Command: config dhcp pool next_server dhcppool01 192.168.0.1
Success.
DGS-3120-24TC:admin#
320
Format
config dhcp ping_packets <number 0-10>
Parameters
<number 0-10> - Specify the number of ping packets. 0 means there is no ping test. The default
value is 2.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure ping packets:
DGS-3120-24TC:admin#config dhcp ping_packets 4
Command: config dhcp ping_packets 4
Success.
DGS-3120-24TC:admin#
Format
config dhcp ping_timeout <millisecond 10-2000>
Parameters
<millisecond 10-2000> - Specify the amount of time the DHCP server must wait before timing
out a ping packet. The default value is 100.
321
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the time out value for ping packets:
DGS-3120-24TC:admin#config dhcp ping_timeout 500
Command: config dhcp ping_timeout 500
Success.
DGS-3120-24TC:admin#
Format
create dhcp pool manual_binding <pool_name 12> < ipaddr> hardware_address <macaddr>
{type [ethernet | ieee802]}
Parameters
<pool_name 12> - Specify the DHCP pool name.
<ipaddr> - Specify the IP address which will be assigned to a specified client.
hardware_address - Specify the hardware MAC address.
<macaddr> - Enter the MAC address here.
type - (Optional) Specify the DHCP pool manual binding type.
ethernet - Specify Ethernet type.
ieee802 -Specify IEEE802 type.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure manual bindings:
322
Success.
DGS-3120-24TC:admin#
Format
delete dhcp pool manual_binding <pool_name 12> [<ipaddr> | all]
Parameters
<pool_name 12> - Specify the DHCP pool name.
<ipaddr> - Specify the IP address which will be assigned to a specified client.
all - Specify to delete all IP addresses.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete DHCP server manual binding:
DGS-3120-24TC:admin#delete dhcp pool manual_binding dhcppool01 10.10.10.1
Command: delete dhcp pool manual_binding dhcppool01 10.10.10.1
Success.
DGS-3120-24TC:admin#
Format
clear dhcp binding [<pool_name 12> [<ipaddr> | all] | all]
323
Parameters
<pool_name 12> - Specify the DHCP pool name to clear.
<ipaddr> - Specify the IP address to clear.
all - Specify to clear all IP addresses.
all - Specify to clear all DHCP pool names and IP addresses.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear dynamic binding entries in the pool named “engineering”:
DGS-3120-24TC:admin#clear dhcp binding dhcppool01 10.20.3.4
Command: clear dhcp binding dhcppool01 10.20.3.4
Success.
DGS-3120-24TC:admin#
Format
show dhcp binding {<pool_name 12>}
Parameters
<pool_name 12> - (Optional) Specify a DHCP pool name.
Restrictions
None.
Example
To display dynamic binding entries for “engineering”:
DGS-3120-24TC:admin#show dhcp binding engineering
Command: show dhcp binding engineering
324
Total Entries: 4
DGS-3120-24TC:admin#
Format
show dhcp pool {<pool_name 12>}
Parameters
<pool_name 12> - (Optional) Specify the DHCP pool name.
Restrictions
None.
Example
To display the current DHCP pool information for “engineering”:
DGS-3120-24TC:admin#show dhcp pool engineering
Command: show dhcp pool engineering
DGS-3120-24TC:admin#
325
Format
show dhcp pool manual_binding {<pool_name 12>}
Parameters
<pool_name 12> - (Optional) Specify the DHCP pool name.
Restrictions
None.
Example
To display the configured manual binding entries:
DGS-3120-24TC:admin#show dhcp pool manual_binding
Command: show dhcp pool manual_binding
Total Entries: 1
DGS-3120-24TC:admin#
Format
enable dhcp_server
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
326
Example
To enable DHCP server:
DGS-3120-24TC:admin#enable dhcp_server
Command: enable dhcp_server
Success.
DGS-3120-24TC:admin#
Format
disable dhcp_server
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the Switch’s DHCP server:
DGS-3120-24TC:admin#disable dhcp_server
Command: disable dhcp_server
Success.
DGS-3120-24TC:admin#
Format
show dhcp_server
Parameters
None.
327
Restrictions
None.
Example
To display the DHCP server status:
DGS-3120-24TC:admin#show dhcp_server
Command: show dhcp_server
DGS-3120-24TC:admin#
Format
clear dhcp conflict_ip [<ipaddr> | all]
Parameters
<ipaddr> - Specify the IP address to be cleared.
all - Specify that all IP addresses will be cleared.
Restrictions
None.
Example
To clear an IP address 10.20.3.4 from the conflict database:
DGS-3120-24TC:admin#clear dhcp conflict_ip 10.20.3.4
Command: clear dhcp conflict_ip 10.20.3.4
Success.
DGS-3120-24TC:admin#
328
Format
show dhcp conflict_ip {<ipaddr>}
Parameters
<ipaddr> - (Optional) Specify the IP address to be displayed.
Restrictions
None.
Example
To display the entries in the DHCP conflict IP database:
DES-3810-28:admin#show dhcp conflict_ip
Command: show dhcp conflict_ip
DES-3810-28:admin#
329
Format
config filter dhcp_server [add permit server_ip <ipaddr> {client_mac <macaddr>} ports
[<portlist> | all] | delete permit server_ip <ipaddr> {client_mac <macaddr>} ports [<portlist>
| all] | ports [<portlist> | all] state [enable | disable] | illegal_server_log_suppress_duration
[1min | 5min | 30min ]]
Parameters
add permit - Specify to add a DHCP permit.
server_ip - The IP address of the DHCP server to be filtered.
<ipaddr> - Enter the DHCP server IP address here.
client_mac - (Optional) The MAC address of the DHCP client.
<macaddr> - Enter the DHCP client MAC address here.
ports - The port number of filter DHCP server.
330
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add an entry from the DHCP server/client filter list in the Switch’s database:
DGS-3120-24TC:admin# config filter dhcp_server add permit server_ip 10.1.1.1
client_mac 00-00-00-00-00-01 port 1:1-1:24
Command: config filter dhcp_server add permit server_ip 10.1.1.1 client_mac 00-
00-00-00-00-01 port 1:1-1:24
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show filter dhcp_server
331
Parameters
None.
Restrictions
None.
Example
To display the DHCP server/client filter list created on the Switch:
DGS-3120-24TC:admin#show filter dhcp_server
Command: show filter dhcp_server
Total Entries: 1
DGS-3120-24TC:admin#
Format
config filter dhcp_server log [enable | disable]
Parameters
enable - Enable the log function.
disable - Disable the log function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the log function.
332
Success.
DGS-3120-24TC:admin#
Format
config filter dhcp_server trap [enable | disable]
Parameters
enable - Enable the trap function.
disable - Disable the trap function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the trap function.
DGS-3120-24TC:admin#config filter dhcp_server trap disable
Command: config filter dhcp_server trap disable
Success.
DGS-3120-24TC:admin#
333
Format
enable dhcpv6_relay
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCPv6 relay global state to enable:
DGS-3120-24TC:admin#enable dhcpv6_relay
Command: enable dhcpv6_relay
Success.
DGS-3120-24TC:admin#
334
Format
disable dhcpv6_relay
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCPv6 relay global state to disable:
DGS-3120-24TC:admin#disable dhcpv6_relay
Command: disable dhcpv6_relay
Success.
DGS-3120-24TC:admin#
Format
config dhcpv6_relay [add|delete] ipif <ipif_name 12> <ipv6addr>
Parameters
add - Add an IPv6 destination to the DHCPv6 relay table.
delete - Delete an IPv6 destination from the DHCPv6 relay table.
ipif - The IP information for DHCPv6 relay.
<ipif_name 12> - The name of the IP interface in which DHCPv6 relay is to be enabled.
<ipv6addr> - The DHCPv6 server IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a DHCPv6 server to the relay table:
335
Success.
DGS-3120-24TC:admin#
Format
config dhcpv6_relay hop_count <value 1-32>
Parameters
<value 1-32> - Enter the number of relay agents that have to be relayed in this message. The
range is from 1 to 32. The default value is 4.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maximum hops of a DHCPv6 relay packet that can be transferred to 4:
DGS-3120-24TC:admin#config dhcpv6_relay hop_count 4
Command: config dhcpv6_relay hop_count 4
Success.
DGS-3120-24TC:admin#
Format
config dhcpv6_relay ipif [<ipif_name 12> | all] state [enable | disable]
Parameters
<ipif_name 12> - Specify the name of the IP interface.
all - The value all indicates all configured IP interfaces.
336
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCPv6 relay state of the System interface to enable:
DGS-3120-24TC:admin# config dhcpv6_relay ipif System state enable
Command: config dhcpv6_relay ipif System state enable
Success.
DGS-3120-24TC:admin#
Format
config dhcpv6_relay option_37 {state [enable | disable] | check [enable | disable] |
remote_id [default | cid_with_user_define <desc 128> | user_define <desc 128>]}
Parameters
state - (Optional) Specify DHCPv6 relay option 37 state.
enable - When the state is enabled, the DHCP packet is inserted with the option 37 field
before being relayed to the server.
disable - When the state is disabled, the DHCP packet is relayed directly to the server.
check – (Optional) Specify to check the packets or not.
enable - When the check state is enabled, packets from client side should not have the option
37 field. If client originating packets have the option 37 field, they will be dropped.
disable - Specify for not checking the packets.
remote_id – (Optional) Specify the content in the remote ID.
default – Specify to have the remote ID as VLAN ID + Module + Port +System MAC address
of the device.
cid_with_user_define – Specify to have the remote ID as VLAN ID + Module + Port + user
defined string.
<desc 128> - Enter the string.
user_define – Use the user-defined string as the remote ID.
<desc 128> - Enter the string.
337
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the DHCPv6 relay option 37:
DGS-3120-24TC:admin#config dhcpv6_relay option_37 state enable
Command: config dhcpv6_relay option_37 state enable
Success.
Success.
Success.
DGS-3120-24TC:admin#
Format
show dhcpv6_relay {ipif <ipif_name 12>}
Parameters
ipif - (Optional) The IP information for DHCPv6 relay.
<ipif_name 12> - The name of the IP interface in which DHCPv6 relay is to be enabled.
Restrictions
None.
Example
To show the DHCPv6 relay configuration of all interfaces:
338
DGS-3120-24TC:admin#show dhcpv6_relay
Command: show dhcpv6_relay
Total Entries : 1
DGS-3120-24TC:admin#
339
Format
config ddm [trap | log] [enable | disable]
Parameters
trap - Specify whether to send traps, when the operating parameter exceeds the corresponding
threshold. The DDM trap is disabled by default.
log - Specify whether to send a log, when the operating parameter exceeds the corresponding
threshold. The DDM log is enabled by default.
enable - Specify to enable the log or trap sending option.
disable - Specify to disable the log or trap sending option.
Restrictions
Only Administrator, and Operator level users can issue this command.
Example
To configure DDM log state to enable:
340
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
config ddm ports [<portlist> | all] [[temperature_threshold {high_alarm <degrees> |
low_alarm <degrees> | high_warning <degrees> | low_warning <degrees>} |
voltage_threshold {high_alarm <voltage> | low_alarm <voltage> | high_warning <voltage> |
low_warning <voltage>} | bias_current_threshold {high_alarm <milliampere> | low_alarm
<milliampere> | high_warning <milliampere> | low_warning <milliampere>} |
tx_power_threshold {high_alarm <milliwatts> | low_alarm <milliwatts> | high_warning
<milliwatts> | low_warning <milliwatts>} | rx_power_threshold {high_alarm <milliwatts> |
low_alarm <milliwatts> | high_warning <milliwatts> | low_warning <milliwatts>}] | {state
[enable | disable] | shutdown [alarm | warning | none]}]
Parameters
<portlist> - Enter the range of ports to be configured here.
all - Specify that all the optic ports’ operating parameters will be configured.
temperature_threshold - Specify the threshold of the optic module’s temperature in centigrade.
At least one parameter shall be specified for this threshold.
high_alarm - (Optional) Specify the high threshold for the alarm. When the operating
parameter rises above this value, the action associated with the alarm is taken.
<degrees> - Enter the high threshold alarm value used here.
low_alarm - (Optional) Specify the low threshold for the alarm. When the operating parameter
falls below this value, the action associated with the alarm is taken.
<degrees> - Enter the low threshold alarm value used here.
high_warning - (Optional) Specify the high threshold for the warning. When the operating
parameter rises above this value, the action associated with the warning is taken.
<degrees> - Enter the high threshold warning value here.
low_warning - (Optional) Specify the low threshold for the warning. When the operating
parameter falls below this value, the action associated with the warning is taken.
<degrees> - Enter the low threshold warning value here.
voltage_threshold - Specify the threshold of optic module’s voltage.
high_alarm - (Optional) Specify the high threshold for the alarm. When the operating
341
parameter rises above this value, the action associated with the alarm is taken.
<voltage> - Enter the high threshold alarm value used here.
low_alarm - (Optional) Specify the low threshold for the alarm. When the operating parameter
falls below this value, the action associated with the alarm is taken.
<voltage> - Enter the low threshold alarm value used here.
high_warning - (Optional) Specify the high threshold for the warning. When the operating
parameter rises above this value, the action associated with the warning is taken.
<voltage> - Enter the high threshold warning value here.
low_warning - (Optional) Specify the low threshold for the warning. When the operating
parameter falls below this value, the action associated with the warning is taken.
<voltage> - Enter the low threshold warning value here.
bias_current_threshold - Specify the threshold of the optic module’s bias current.
high_alarm - (Optional) Specify the high threshold for the alarm. When the operating
parameter rises above this value, the action associated with the alarm is taken.
<milliampere> - Enter the high threshold alarm value used here.
low_alarm - (Optional) Specify the low threshold for the alarm. When the operating parameter
falls below this value, the action associated with the alarm is taken.
<milliampere> - Enter the low threshold alarm value used here.
high_warning - (Optional) Specify the high threshold for the warning. When the operating
parameter rises above this value, the action associated with the warning is taken.
<milliampere> - Enter the high threshold warning value here.
low_warning - (Optional) Specify the low threshold for the warning. When the operating
parameter falls below this value, the action associated with the warning is taken.
<milliampere> - Enter the low threshold warning value here.
tx_power_threshold - Specify the threshold of the optic module’s output power.
high_alarm - (Optional) Specify the high threshold for the alarm. When the operating
parameter rises above this value, the action associated with the alarm is taken.
<milliwatts> - Enter the high threshold alarm value used here.
low_alarm - (Optional) Specify the low threshold for the alarm. When the operating parameter
falls below this value, the action associated with the alarm is taken.
<milliwatts> - Enter the low threshold alarm value used here.
high_warning - (Optional) Specify the high threshold for the warning. When the operating
parameter rises above this value, the action associated with the warning is taken.
<milliwatts> - Enter the high threshold warning value here.
low_warning - (Optional) Specify the low threshold for the warning. When the operating
parameter falls below this value, the action associated with the warning is taken.
<milliwatts> - Enter the low threshold warning value here.
rx_power_threshold - Specify the threshold of optic module’s received power.
high_alarm - (Optional) Specify the high threshold for the alarm. When the operating
parameter rises above this value, the action associated with the alarm is taken.
<milliwatts> - Enter the high threshold alarm value used here.
low_alarm - (Optional) Specify the low threshold for the alarm. When the operating parameter
falls below this value, the action associated with the alarm is taken.
<milliwatts> - Enter the low threshold alarm value used here.
high_warning - (Optional) Specify the high threshold for the warning. When the operating
parameter rises above this value, the action associated with the warning is taken.
<milliwatts> - Enter the high threshold warning value here.
low_warning - (Optional) Specify the low threshold for the warning. When the operating
parameter falls below this value, the action associated with the warning is taken.
<milliwatts> - Enter the low threshold warning value here.
state - (Optional) Specify the DDM state to enable or disable. If the state is disabled, no DDM
action will take effect.
enable - Specify to enable the DDM state.
disable - Specify to disable the DDM state.
shutdown - (Optional) Specify whether or not to shutdown the port when the operating
parameter exceeds the corresponding alarm threshold or warning threshold.
alarm - Shutdown the port when the configured alarm threshold range is exceeded.
warning - Shutdown the port when the configured warning threshold range is exceeded.
none - The port will never shutdown regardless if the threshold ranges are exceeded or not.
342
Restrictions
Only Administrator, and Operator level users can issue this command.
Example
To configure the port 21’s temperature threshold:
DGS-3120-24TC:admin#config ddm ports 1:21 temperature_threshold high_alarm
84.9555 low_alarm -10 high_warning 70 low_warning 2.25251
Command: config ddm ports 1:21 temperature_threshold high_alarm 84.9555
low_alarm -10 high_warning 70 low_warning 2.25251
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
343
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show ddm
Parameters
None.
Restrictions
None.
Example
To display the DDM global settings:
DGS-3120-24TC:admin#show ddm
Command: show ddm
DGS-3120-24TC:admin#
344
For the optic port, when a particular threshold was configured by user, it will be shown in this
command with a tag indicating that it is a threshold that user configured, else it would be the
threshold read from the optic module that is being inserted.
Format
show ddm ports {<portlist>} [status | configuration]
Parameters
<portlist> - (Optional) Enter the range of ports to be displayed here.
status - Specify that the operating parameter will be displayed.
configuration - Specify that the configuration values will be displayed.
Restrictions
None.
Example
To display ports 21-22’s operating parameters:
DGS-3120-24TC:admin#show ddm ports 1:21-1:22 status
Command: show ddm ports 1:21-1:22 status
345
Port: 1:21
--------------------------------------------
DDM State : Enabled
Shutdown : Alarm
DGS-3120-24TC:admin#
346
Format
config dvmrp [ipif <ipif_name 12> | all] {metric <value 1-31> | probe <sec 1-65535> |
neighbor_timeout <sec 1-65535> | state [enable | disable]}(1)
Parameters
ipif - Specify the IP interface name used.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
all - Specify that all the IP interfaces will be used.
metric - Allows the assignment of a DVMRP route cost to the above IP interface. A DVMRP route
cost is a relative number that represents the real cost of using this route in the construction of
a multicast delivery tree. It is similar to, but not defined as, the hop count in RIP.
<value 1-31> - Enter the metric value used here. This value must be between 1 and 31. The
default value is 1.
probe - Specify the time in seconds between the DVMRP Probe message transmissions.
<sec 1-65535> - Enter the probe value used here. This value must be between 1 and 65535
seconds. The default value is 10 seconds.
neighbor_timeout - Specify the time period that DVMRP will hold a DVMRP neighbor before the
neighbor’s Expire Timer expired.
<sec 1-65535> - Enter the neighbor timeout value used here. This value must be between 1
and 65535 seconds. The default value is 35 seconds.
state - Specify the DVMRP state of the IP interface.
enable - Specify that DVMRP of the specified IP interface will be enabled.
disable - Specify that DVMRP of the specified IP interface will be disabled.
347
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure DVMRP configurations of IP interface called ‘System’:
DGS-3120-24TC:admin#config dvmrp ipif System neighbor_timeout 30 metric 1 probe
5
Command: config dvmrp ipif System neighbor_timeout 30 metric 1 probe 5
Success.
DGS-3120-24TC:admin#
Format
enable dvmrp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable DVMRP:
DGS-3120-24TC:admin#enable dvmrp
Command: enable dvmrp
Success.
DGS-3120-24TC:admin#
348
Format
disable dvmrp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable DVMRP:
DGS-3120-24TC:admin#disable dvmrp
Command: disable dvmrp
Success.
DGS-3120-24TC:admin#
Format
show dvmrp {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the IP interface name used for the display.
<ipif_name 12> - Enter the IP interface name used for the display here. This name can be up
to 12 characters long.
If no parameter is specified, then all the IP interfaces will be displayed.
Restrictions
None.
Example
To display DVMRP configurations:
349
DGS-3120-24TC:admin#show dvmrp
Command: show dvmrp
Total Entries: 1
DGS-3120-24TC:admin#
Format
show dvmrp neighbor {ipif <ipif_name 12> | ipaddress <network_address>}
Parameters
ipif - (Optional) Specify the IP interface name used for the display.
<ipif_name 12> - Enter the IP interface name used for the display here. This name can be up
to 12 characters long.
ipaddress - (Optional) Specify the IP address and netmask of the destination used.
<network_address> - Enter the IP address and netmask of the destination used here.
If no parameter is specified, the system will display the whole DVMRP neighbor table.
Restrictions
None.
Example
To display DVMRP neighbor table:
350
Total Entries : 1
DGS-3120-24TC:admin#
Format
show dvmrp nexthop {ipaddress <network_address> | ipif <ipif_name 12>}
Parameters
ipaddress - (Optional) Specify the IP address and netmask of the destination used.
<network_address> - Enter the IP address and netmask of the destination used here.
ipif - (Optional) Specify the IP interface name used for the display.
<ipif_name 12> - Enter the IP interface name used for the display here. This name can be up
to 12 characters long.
If no parameter is specified, the system will display all the DVMRP routing next hop tables.
Restrictions
None.
Example
To display DVMRP routing next hop table:
351
Total Entries : 6
DGS-3120-24TC:admin#
Format
show dvmrp routing_table {ipaddress <network_address>}
Parameters
ipaddress - (Optional) Specify the IP address and netmask of the destination used.
<network_address> - Enter the IP address and netmask of the destination used here.
If no parameter is specified, the system will display the whole DVMRP routing table.
Restrictions
None.
Example
To display DVMRP routing table:
352
Total Entries : 3
DGS-3120-24TC:admin#
353
Format
install dlms activation_code <string 25> {unit <unit_id 1-6>}
Parameters
<string 25> - Specify an activation code.
unit - (Optional) Specify the Switch in the switch stack.
<unit_id 1-6> - Enter the unit ID of the Switch.
Restrictions
Only Administrator-level users can issue this command.
Example
To install an activation code:
DGS-3120-24TC:admin#install dlms activation_code xBc7vNWsSpchuQkGZsTfPwcfa
Command: install dlms activation_code xBc7vNWsSpchuQkGZsTfPwcfa
Success.
DGS-3120-24TC:admin#
354
Format
show dlms license {unit <unit_id 1-6>}
Parameters
unit - (Optional) Specify the Swithc in the switch stack.
<unit_id 1-6> - Enter the unit ID of the Switch.
Restrictions
None.
Example
To display license information:
DGS-3120-24TC:admin#show dlms license
Command: show dlms license
DGS-3120-24TC:admin#
355
Format
config duld ports [<portlist> | all ] {state [enable | disable] | mode [shutdown | normal] |
discovery_time <sec 5-65535>}(1)
Parameters
<portlist> - Specify a range of ports.
all - Specify to select all ports.
state - Specify these ports unidirectional link detection status.
enable - Enable unidirectional link detection status.
disable - Disable unidirectional link detection status.
mode - Specify the mode when detecting unidirectional link.
shutdown - If any unidirectional link is detected, disable the port and log an event.
normal - Only log an event when a unidirectional link is detected.
discovery_time - Specify these ports neighbor discovery time. If OAM discovery cannot
complete in the discovery time, the unidirectional link detection will start.
<sec 5-65535> - Enter a time in second. The default discovery time is 5 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable unidirectional link detection on port 1:
356
Success.
DGS-3120-24TC:admin#
Format
show duld ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports.
Restrictions
None.
Example
To show ports 1-4 unidirectional link detection information:
DGS-3120-24TC:admin#show duld ports 1:1-1:4
Command: show duld ports 1:1-1:4
Port Admin State Oper Status Mode Link Status Discovery Time(Sec)
----- ----------- ----------- -------- -------------- -------------------
1:1 Enabled Disabled Normal Unknown 5
1:2 Disabled Disabled Normal Unknown 5
1:3 Disabled Disabled Normal Unknown 5
1:4 Disabled Disabled Normal Unknown 5
DGS-3120-24TC:admin#
357
Format
config eee ports [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Specify a range of ports to be configured.
all - Specify to configure all ports.
state - Specify the EEE state. The default is disabled.
enable - Enable the EEE function for the specified port(s).
disable - Disable the EEE function for the specified port(s).
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the EEE state on ports 1:2-1:5:
DGS-3120-24TC:admin#config eee ports 1:2-1:5 state enable
Command: config eee ports 1:2-1:5 state enable
Success.
DGS-3120-24TC:admin#
Format
show eee ports {<portlist>}
358
Parameters
<portlist> - (Optional) Specify a list of ports to be displayed.
Restrictions
None.
Example
To display the EEE state:
DGS-3120-24TC:admin#show eee ports 1:1-1:6,1:9
Command: show eee ports 1:1-1:6,1:9
Port State
--------- -----------
1:1 Disabled
1:2 Enabled
1:3 Enabled
1:4 Enabled
1:5 Enabled
1:6 Disabled
1:9 Disabled
DGS-3120-24TC:admin#
359
Format
enable erps
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable ERPS:
360
Success.
DGS-3120-24TC:admin#
Format
disable erps
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable ERPS:
DGS-3120-24TC:admin# disable erps
Command: disable erps
Success.
DGS-3120-24TC:admin#
Format
create erps raps_vlan <vlanid 1-4094>
Parameters
<vlanid 1-4094> - Specify the VLAN which will be the R-APS VLAN.
361
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an R-APS VLAN:
DGS-3120-24TC:admin# create erps raps_vlan 4094
Command: create erps raps_vlan 4094
Success.
DGS-3120-24TC:admin#
Format
delete erps raps_vlan <vlanid 1-4094>
Parameters
<vlanid 1-4094> - Specify the VLAN which will be the R-APS VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an R-APS VLAN:
DGS-3120-24TC:admin# delete erps raps_vlan 4094
Command: delete erps raps_vlan 4094
Success.
DGS-3120-24TC:admin#
362
The ring MEL is one field in the R-APS PDU. Note that if CFM (Connectivity Fault Management)
and ERPS are used at the same time, the R-APS PDU is one of a suite of Ethernet OAM PDU.
The behavior for forwarding of R-APS PDU should follow the Ethernet OAM. If the MEL of R-APS
PDU is not higher than the level of the MEP with the same VLAN on the ring ports, the R-APS
PDU cannot be forwarded on the ring.
Restrictions apply for ports that are included in a link aggregation group. A link aggregation group
can be configured as a ring port by specifying the master port of the link aggregation port. Only the
master port can be specified as a ring port. If the specified link aggregation group is eliminated, the
master port retains its ring port status. If the ring port configured on virtual channel, the ring which
the port connects to will be considered as a sub-ring. Note that the ring ports can be modified
when ERPS is enabled.
RPL port - Specify one of the R-APS VLAN ring ports as the RPL port. To remove an RPL port
from an R-APS VLAN, use the none designation for rpl_port.
RPL owner - Specify the node as the RPL owner.
Note that the RPL port and RPL owner can be modified when ERPS is enabled; and the virtual
channel cannot be configured as RPL. For example, if a ring port is configured on the virtual
channel and the ring port is configured as an RPL port, an error message will be display and the
configuration will fail.
The R-APS VLAN cannot be the protected VLAN. The protected VLAN can be one that has
already been created, or it can be used for a VLAN that has not yet been created.
Holdoff timer - The Holdoff timer is used to filter out intermittent link faults when link failures occur
during the protection switching process. When a ring node detects a link failure, it will start the
holdoff timer and report the link failure event (R-APS BPDU with SF flag) after the link failure is
confirmed within period of time specified.
Guard timer - Guard timer is used to prevent ring nodes from receiving outdated R-APS
messages. This timer is used during the protection switching process after the link failure recovers.
When the link node detects the recovery of the link, it will report the link failure recovery event (R-
APS PDU with NR flag) and start the guard timer. Before the guard timer expires, all received R-
APS messages are ignored by this ring node, except in the case where a burst of three R-APS
event messages that indicates the topology of a sub-ring has changed and the node needs to flush
FDB are received on the node. In this case the recovered link does not go into a blocking state.
The Guard Timer should be greater than the maximum expected forwarding delay for which one R-
APS message circles around the ring.
WTR timer - WTR timer is used to prevent frequent operation of the protection switch due to an
intermittent defect. This timer is used during the protection switching process when a link failure
recovers. It is only used by the RPL owner. When the RPL owner in protection state receives R-
APS PDU with an NR flag, it will start the WTR timer. The RPL owner will block the original
unblocked RPL port and start to send R-APS PDU with an RB flag after the link recovery is
confirmed within this period of time.
363
When both the global state and the specified ring ERPS state are enabled, the specified ring will
be activated. STP and LBD should be disabled on the ring ports before the specified ring is
activated.
The ring cannot be enabled before the R-APS VLAN is created, and ring ports, RPL port, RPL
owner, are configured. Note that these parameters cannot be changed when the ring is activated.
In order to guarantee correct operation, the following integrity will be checked when the ring is
enabled and the global ERPS state is enabled.
1. R-APS VLAN is created.
2. The Ring port is the tagged member port of the R-APS VLAN.
3. The RPL port is specified if RPL owner is enabled.
Format
config erps raps_vlan <vlanid 1-4094> [state [enable | disable] | ring_mel <value 0-7> |
ring_port [west [<port> | virtual_channel] | east [<port> | virtual_channel]] | rpl_port [west |
east | none] | rpl_owner [enable | disable] | protected_vlan [add | delete] vlanid <vidlist> |
sub_ring raps_vlan <vlanid 1-4094> tc_propagation state [enable | disable] | [add | delete]
sub_ring raps_vlan <vlanid 1-4094> | revertive [enable| disable] | timer { holdoff_time
<millisecond 0 - 10000> | guard_time <millisecond 10 - 2000 > | wtr_time <min 5 - 12>}]
Parameters
raps_vlan - Specify the R-APS VLAN used.
<vlanid 1-4094> - Enter the VLAN ID used here.
state - Specify to enable or disable the specified ring.
enable - Enable the state of the specified ring.
disable - Disable the state of the specified ring. The default value is disabled.
ring_mel - Specify the ring MEL of the R-APS function. The default ring MEL is 1.
<value 0-7> - Enter the ring MEL value here. This value should be between 0 and 7.
ring_port - Specify the ring port used.
west - Specify the port as the west ring port.
<port> - Enter the port number here.
virtual_channel - Specify the port as west port on virtual channel.
east - Specify the port as the east ring port.
<port> - Enter the port number here.
virtual_channel - Specify the port as east port on virtual channel.
rpl_port - Specify the RPL port used.
west - Specify the west ring port as the RPL port.
east - Specify the east ring port as the RPL port.
none - No RPL port on this node. By default, the node has no RPL port.
rpl_owner - Specify to enable or disable the RPL owner node.
enable - Specify the device as an RPL owner node.
disable - This node is not an RPL owner. By default, the RPS owner is disabled.
protected_vlan - Specify to add or delete the protected VLAN group.
add - Add VLANs to the protected VLAN group.
delete - Delete VLANs from the protected VLAN group.
vlanid - Specify the VLAN ID to be removed or added.
<vidlist> - Enter the VLAN ID list here.
sub_ring - Specify that the sub-ring is being configured.
raps_vlan - Specify the R-APS VLAN.
<vlanid 1-4094> - Enter the VLAN ID used here.
tc_propagation - Specify that the topology propagation state will be configured.
state - Specify the topology propagation state.
364
enable - Enable the propagation state of topology change for the sub-ring.
disable - Disable the propagation state of topology change for the sub-ring. The default value
is disabled.
add - Connect the sub-ring to another ring.
delete - Disconnect the sub-ring from the connected ring.
sub_ring - Specify that the sub-ring is being configured.
raps_vlan - Specify the R-APS VLAN.
<vlanid 1-4094> - Enter the VLAN ID used here.
revertive - Specify the state of the R-APS revertive option.
enable - Specify that the R-APS revertive option will be enabled.
disable - Specify that the R-APS revertive option will be disabled.
timer - Specify the R-APS timer used.
holdoff_time - (Optional) Specify the holdoff time of the R-APS function. The default holdoff
time is 0 milliseconds.
<millisecond 0-10000> - Enter the hold off time value here. This value must be in the
range of 0 to 10000 millseconds.
guard_time - (Optional) Specify the guard time of the R-APS function. The default guard time
is 500 milliseconds.
<millisecond 10-2000> - Enter the guard time value here. This value must be in the range
of 0 to 2000 millseconds.
wtr_time - (Optional) Specify the WTR time of the R-APS function.
<min 5-12> - Enter the WTR time range value here. The range is from 5 to 12 minutes.
The default WTR time is 5 minutes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MEL of the ERPS ring for a specific R-APS VLAN:
DGS-3120-24TC:admin#config erps raps_vlan 4094 ring_mel 2
Command: config erps raps_vlan 4094 ring_mel 2
Success.
DGS-3120-24TC:admin#
To configure the ports of the ERPS ring for a specific R-APS VLAN:
DGS-3120-24TC:admin#config erps raps_vlan 4094 ring_port west 1:5
Command: config erps raps_vlan 4094 ring_port west 1:5
Success.
DGS-3120-24TC:admin#
365
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
366
Success.
DGS-3120-24TC:admin#
Format
config erps log [enable | disable]
Parameters
log - Specify to enable or disable the ERPS log state.
enable - Enter enable to enable the log state.
disable - Enter disable to disable the log state. The default value is disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the ERPS log state:
DGS-3120-24TC:admin# config erps log enable
Command: config erps log enable
Success.
DGS-3120-24TC:admin#
Format
config erps trap [enable | disable]
367
Parameters
trap - Specify to enable or disable the ERPS trap state.
enable - Enter enable to enable the trap state.
disable - Enter disable to disable the trap state. The default value is disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the trap state of the ERPS:
DGS-3120-24TC:admin# config erps trap enable
Command: config erps trap enable
Success.
DGS-3120-24TC:admin#
Format
show erps {raps_vlan <vlanid 1-4094> {sub_ring}}
Parameters
raps_vlan - (Optional) Specify the R-APS VLAN.
<vlanid 1-4094> - Enter the VLAN ID used here.
sub_ring - (Optional) Display the sub-ring configuration information.
Restrictions
None.
368
Example
To display ERPS information:
DGS-3120-24TC:admin# show erps
Command: show erps
ERPS Information
Global Status : Enabled
Log Status : Disabled
Trap Status : Disabled
------------------------
R-APS VLAN : 4092
Ring Status : Enabled
West Port : 5 (Blocking)
East Port : 7 (Forwarding)
RPL Port : West Port
RPL Owner : Enabled (Active)
Protected VLANs : 100-300, 4092, 4093
Ring MEL : 2
Holdoff Time : 0 milliseconds
Guard Time : 500 milliseconds
WTR Time : 5 minutes
Current Ring State : Idle
------------------------
R-APS VLAN : 4093
Ring Status : Enabled
West Port : Virtual Channel
East Port : 10 (Forwarding)
RPL Port : None
RPL Owner : Disabled
Protected VLANs : 200-220
Ring MEL : 2
Holdoff Time : 0 milliseconds
Guard Time : 500 milliseconds
WTR Time : 5 minutes
Current Ring State : Idle
------------------------
Total Ring: 2
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
369
Format
create fdb <vlan_name 32> <macaddr> [port <port> | drop]
Parameters
<vlan_name 32> - Specify a VLAN name associated with a MAC address. The maximum length
of the VLAN name is 32 bytes.
<macaddr> - The MAC address to be added to the static forwarding table.
port - The port number corresponding to the MAC destination address. The switch will always
forward traffic to the specified device through this port.
<port> - Enter the port number corresponding to the MAC destination address here.
drop - Specify the action drop to be taken.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a unicast MAC forwarding entry:
DGS-3120-24TC:admin#create fdb default 00-00-00-00-01-02 port 1:5
Command: create fdb default 00-00-00-00-01-02 port 1:5
Success.
DGS-3120-24TC:admin#
370
Success.
DGS-3120-24TC:admin#
Format
create fdb vlanid <vidlist> <macaddr> [port <port> | drop]
Parameters
<vidlist> - Specify a VLAN ID associated with a MAC address.
<macaddr> - The MAC address to be added to the static forwarding table.
port - The port number corresponding to the MAC destination address. The switch will always
forward traffic to the specified device through this port.
<port> - Enter the port number corresponding to the MAC destination address here.
drop - Specify the action drop to be taken.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a unicast MAC forwarding entry:
DGS-3120-24TC:admin#create fdb vlanid 1 00-00-00-00-02-02 port 1:5
Command: create fdb vlanid 1 00-00-00-00-02-02 port 1:5
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
371
Format
create multicast_fdb <vlan_name 32> <macaddr>
Parameters
<vlan_name 32> - The name of the VLAN on which the MAC address resides. The maximum
name length is 32.
<macaddr> - Enter the multicast MAC address to be added to the static forwarding table here.
Addresses in the range 01-80-C2-XX-XX-XX are reserved addresses, 01-00-5E-XX-XX-XX
are reserved for IPv4 multicast MAC address and 33-33-XX-XX-XX are reserved for IPv6
multicast MAC address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a multicast MAC forwarding entry to the default VLAN:
DGS-3120-24TC:admin#create multicast_fdb default 01-00-5C-11-22-33
Command: create multicast_fdb default 01-00-5C-11-22-33
Success.
DGS-3120-24TC:admin#
Format
config multicast_fdb <vlan_name 32> <macaddr> [add | delete] <portlist>
Parameters
<vlan_name 32> - The name of the VLAN on which the MAC address resides. The maximum
name length is 32.
<macaddr> - Enter the multicast MAC address to be added or removed to and from the static
forwarding table here. Addresses in the range 01-80-C2-XX-XX-XX cannot be configured as
static MAC addresses. Addresses in the range 01-00-5E-XX-XX-XX and 33-33-XX-XX-XX-XX
372
are IP multicast addresses, which cannot be specified as the static L2 multicast MAC address.
add - Specify to add ports to the multicast forwarding table.
delete - Specify to remove ports from the multicast forwarding table.
<portlist> - Specify a range of ports to be configured. (UnitID: port number).
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a multicast MAC forwarding entry to the default VLAN on port 1:1 to 1:5:
DGS-3120-24TC:admin#config multicast_fdb default 01-00-5C-11-22-33 add 1:1-1:5
Command: config multicast_fdb default 01-00-5C-11-22-33 add 1:1-1:5
Success.
DGS-3120-24TC:admin#
Format
config fdb aging_time <sec 10-1000000>
Parameters
aging_time - Specify the FDB age out time in seconds. The aging time affects the learning
process of the Switch. Dynamic forwarding table entries, which are made up of the source
MAC addresses and their associated port numbers, are deleted from the table if they are not
accessed within the aging time. The aging time can be from 10 to 1000000 seconds with a
default value of 300 seconds. A very long aging time can result in dynamic forwarding table
entries that are out-of-date or no longer exist. This may cause incorrect packet forwarding
decisions by the Switch. If the aging time is too short however, many entries may be aged out
too soon. This will result in a high percentage of received packets whose source addresses
cannot be found in the forwarding table, in which case the Switch will broadcast the packet to
all ports, negating many of the benefits of having a switch..
<sec 10-1000000> - The FDB age out time must be between 10 to 1000000 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MAC address table aging time to 600 seconds:
373
Success.
DGS-3120-24TC:admin#
Format
config multicast vlan_filtering_mode [vlanid <vidlist> | vlan <vlan_name 32> | all]
[forward_all_groups | forward_unregistered_groups | filter_unregistered_groups]
Parameters
vlanid - Specify a list of VLANs to be configured.
<vidlist> - Enter the VLAN ID list here.
vlan - Specify the name of the VLAN. The maximum name length is 32.
<vlan_name 32> - The VLAN name can be up to 32 characters long.
all - Specify all configured VLANs.
forward_all_groups - Both the registered group and the unregistered group will be forwarded to
all member ports of the specified VLAN where the multicast traffic comes in.
forward_unregistered_groups - The unregistered group will be forwarded to all member ports
of the VLAN where the multicast traffic comes in.
filter_unregistered_groups - The unregistered group will be filtered.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the multicast packet filtering mode to filter all unregistered multicast groups for the
VLAN 200 to 300:
DGS-3120-24TC:admin# config multicast vlan_filtering_mode vlanid 200-300
filter_unregistered_groups
Command: config multicast vlan_filtering_mode vlanid 200-300
filter_unregistered_groups
Success.
DGS-3120-24TC:admin#
374
Format
delete fdb <vlan_name 32> <macaddr>
Parameters
<vlan_name 32> - The name of the VLAN on which the MAC address resides. The maximum
name length is 32.
<macaddr> - The multicast MAC address to be deleted from the static forwarding table.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a static FDB entry:
DGS-3120-24TC:admin# delete fdb default 00-00-00-00-01-02
Command: delete fdb default 00-00-00-00-01-02
Success.
DGS-3120-24TC:admin#
Format
clear fdb [vlan <vlan_name 32> | port <port> | all]
Parameters
vlan - Clears the FDB entry by specifying the VLAN name.
<vlan_name 32> - The name of the VLAN on which the MAC address resides. The maximum
name length is 32.
port - Clears the FDB entry by specifying the port number.
<port> - The port number corresponding to the MAC destination address. The switch will
always forward traffic to the specified device through this port.
all - Clears all dynamic entries in the Switch’s forwarding database.
375
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear all FDB dynamic entries:
DGS-3120-24TC:admin# clear fdb all
Command: clear fdb all
Success.
DGS-3120-24TC:admin#
Format
show multicast_fdb {[vlan <vlan_name 32> | vlanid <vidlist>] | mac_address <macaddr>}
Parameters
vlan - (Optional) The name of the VLAN on which the MAC address resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Displays the entries for the VLANs indicated by VID list.
<vidlist> - Enter the VLAN ID list here.
mac_address - (Optional) Specify a MAC address, for which FDB entries will be displayed.
<macaddr> - Enter the MAC address here.
If no parameter is specified, all multicast FDB entries will be displayed.
Restrictions
None.
Example
To display the multicast MAC address table:
376
DGS-3120-24TC:admin#show multicast_fdb
Command: show multicast_fdb
Total Entries: 1
DGS-3120-24TC:admin#
Format
show fdb {[port <port> | vlan <vlan_name 32> | vlanid <vidlist> | mac_address <macaddr> |
static | aging_time | security]}
Parameters
port - (Optional) Displays the entries for a specified port.
<port> - Enter the port number here.
vlan - (Optional) Displays the entries for a specific VLAN. The maximum name length is 32.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Displays the entries for the VLANs indicated by VID list.
<vidlist> - Enter the VLAN ID list here.
mac_address - (Optional) Displays a specific MAC address.
<macaddr> - Enter the MAC address here.
static - (Optional) Displays all permanent entries.
aging_time - (Optional) Displays the unicast MAC address aging time.
security - (Optional) Displays the FDB entries that are created by the security module.
If no parameter is specified, system will display the unicast address table.
Restrictions
None.
Example
To display the FDB table:
377
DGS-3120-24TC:admin#show fdb
Command: show fdb
Total Entries: 5
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
Format
show multicast vlan_filtering_mode {[ vlanid < vidlist> | vlan <vlan_name 32>]}
Parameters
vlanid - (Optional) Specify a list of VLANs to be configured.
<vidlist> - Enter the VLAN ID list here.
vlan - (Optional) Specify the name of the VLAN. The maximum name length is 32.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
378
long.
If no parameter is specified, the device will show all multicast filtering settings in the device.
Restrictions
None.
Example
To show the multicast vlan_filtering_mode for VLANs:
DGS-3120-24TC:admin#show multicast vlan_filtering_mode
Command: show multicast vlan_filtering_mode
DGS-3120-24TC:admin#
379
Format
config filter netbios [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Specify the list of ports used.
all - Specify that all the ports will be used for the configuration.
state- Specify the state of the filter to block the NETBIOS packet.
enable - Specify that the state will be enabled.
disable - Specify that the state will be disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure filter netbios state:
DGS-3120-24TC:admin# config filter netbios 1-10 state enable
Command: config filter netbios 1-10 state enable
Success.
DGS-3120-24TC:admin#
Format
show filter netbios
380
Parameters
None.
Restrictions
None.
Example
To display the DHCP server/client filter list created on the Switch:
DGS-3120-24TC:admin# show filter netbios
Command: show filter netbios
DGS-3120-24TC:admin#
Format
config filter extensive_netbios [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Enter the list of ports used for this configuration here.
all - Specify that all the ports will be used this configuration.
state - Enable or disable the filter to block the NETBIOS packet over 802.3 frame.
enable - Specify that the filter state will be enabled.
disable - Specify that the filter state will be disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure a DHCP client/server filter entry.
DGS-3120-24TC:admin# config filter extensive_netbios 1-10 state enable
Command: config filter extensive_netbios 1-10 state enable
Success.
DGS-3120-24TC:admin#
381
Format
show filter extensive_netbios
Parameters
None.
Restrictions
None.
Example
To display the extensive_state created on the Switch:
DGS-3120-24TC:admin# show filter extensive_netbios
Command: show filter extensive_netbios
DGS-3120-24TC:admin#
382
Format
show storage_media_info {[unit <unit_id> | all]}
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
all - Specify all units.
Restrictions
None.
Example
To display the storage media’s information:
383
GS-3120-24TC:admin#show storage_media_info
Command: show storage_media_info
DGS-3120-24TC:admin#
Format
change drive {unit <unit_id>} <drive_id>
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
<drive_id> - Specify the drive ID. The format of drive_id is C:, D: and so on.
Restrictions
None.
Example
To display the storage media’s information:
DGS-3120-24TC:admin# change drive unit 3 c:
Command: change drive unit 3 c:
Success.
DGS-3120-24TC:admin#
37-3 md
Description
This command is used to create a directory.
Format
md {{unit <unit_id>} <drive_id>} <pathname>
384
Parameters
unit – (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname> - Specify the directory to be removed. The path name can be specified either as a
full path name or partial name. For partial path name, it indicates the file is in the current
directory. The drive ID also included in this parameter, for example: d:/config/bootup.cfg.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To make a directory:
DGS-3120-24TC:admin# md c:/abc
Command: md c:/abc
Success.
DGS-3120-24TC:admin#
37-4 rd
Description
This command is used to remove a directory. If there are files still existing in the directory, this
command will fail and return error message.
Format
rd {{unit <unit_id>} <drive_id>} <pathname>
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname> - Specify the directory to be removed. The path name can be specified either as a
full path name or partial name. For partial path name, it indicates the file is in the current
directory.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To remove a directory:
385
DGS-3120-24TC:admin# rd c:/abc
Command: rd c:/abc
Success.
DGS-3120-24TC:admin#
37-5 cd
Description
This command is used to change the current directory. The current directory is changed under the
current drive. If you want to change the working directory to the directory in another drive, then you
need to change the current drive to the desired drive, and then change the current directory. The
current drive and current directory will be displayed if the <pathname> is not specified.
Format
cd {<pathname>}
Parameters
<pathname> - (Optional) Specify the directory to be removed. The path name can be specified
either as a full path name or partial name. For partial path name, it indicates the file is in the
current directory.
Restrictions
None.
Example
To change to other directory or display current directory path:
DGS-3120-24TC:admin# cd
Command: cd
DGS-3120-24TC:admin#
37-6 dir
Description
This command is used to list all the files located in a directory of a drive.
If pathname is not specified, then all of the files in the specified drive will be displayed. If none of
the parameters are specified, the files in the current drive will be displayed.
Format
dir {{unit <unit_id>} <drive_id>} {<pathname>}
386
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname> - (Optional) Specify the directory to be removed. The path name can be specified
either as a full path name or partial name. For partial path name, it indicates the file is in the
current directory.
Restrictions
None.
Example
List the files:
DGS-3120-24TC:admin#dir
Command: dir
Directory of /unit2:/c:
DGS-3120-24TC:admin#
37-7 rename
Description
This command is used to rename a file. Note that for standalone device, the unit argument is not
needed. This command is used to rename a file in the file system. The pathname specifies the file
(in path form) to be renamed and the filename specifies the new filename. If the pathname is not a
full path, then it refers to a path under the current directory for the drive. The renamed file will stay
in the same directory.
Format
rename {{unit <unit_id>} <drive_id>} <pathname> <filename>
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
387
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To rename a file:
DGS-3120-24TC:admin# rename run.had run1.had
Command: rename run.had run1.had
Success.
DGS-3120-24TC:admin#
37-8 del
Description
This command is used to delete a file, either physically or softly. It is also used to delete a directory
and its contents. If two files with the same name under the same directory are softly deleted
sequentially, only the last one will exist. Deleting, copying, renaming or moving the already softly
deleted file is not acceptable.
System will prompt if the target file is a FW or configuration whose type is bootup or backup.
Format
del {{unit <unit_id>} <drive_id>} <pathname> {recursive}
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname>- Specify the file or directory to be deleted. If it is specified in the associated form,
then it is related to the current directory.
recursive - (Optional) Used on directory, to delete a directory and its contents even if it’s not
empty.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Delete a directory with parameter “recursive”:
388
DGS-3120-24TC:admin#dir
Command: dir
Directory of /unit2:/c:
DGS-3120-24TC:admin#del 12 recursive
Command: del 12 recursive
Success.
DGS-3120-24TC:admin#dir
Command: dir
Directory of /unit2:/c:
DGS-3120-24TC:admin#
37-9 erase
Description
This command is used to delete a file stored in the file system.
System will prompt if the target file is a FW or configuration whose type is boot up.
Format
erase {{unit <unit_id>} <drive_id>} <pathname>
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> - Enter the unit ID here.
389
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To erase a file:
DGS-3120-24TC:admin#dir
Command: dir
Directory of /unit2:/c:
DGS-3120-24TC:admin#erase config2.cfg
Command: erase config2.cfg
Success.
DGS-3120-24TC:admin#dir
Command: dir
Directory of /unit2:/c:
DGS-3120-24TC:admin#
390
37-10 move
Description
This command is used to move a file around the file system. Files in a drive located in a unit can
be moved to another drive located in another unit. Note that when a file is moved, it can be
specified whether to rename at the same time.
Format
move {{unit <unit_id>} <drive_id>} <pathname> {{unit <unit_id>} <drive_id>} <pathname>
Parameters
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unit_id> Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname> - Specify the file to be moved. The path name can be specified either as a full path
name or partial name. Specified either as a full path name or partial name. For partial path
name, it indicates the file is in the current directory.
unit - (Optional) Specify a unit ID if in the stacking system. If not specified, it refers to the master
unit.
<unitid 1-n> Enter the unit ID here. This value must be between 1 and n.
<drive_id> - (Optional) Enter the drive ID used here. Examples are C: or D:
<pathname> - Specify the new path where the file will be moved. The path name can be. For
partial path name, it indicates the file is in the current directory.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To move a file from one location to another location:
DGS-3120-24TC:admin# move c:/log.txt c:/log1.txt
Command: move c:/log.txt c:/log1.txt
Success.
DGS-3120-24TC:admin#
37-11 copy
Description
This command is used to copy a file to another file in the file system. A file located in a drive of a
unit can be copied to another file located in another drive of another unit.
For project that does not support file system on the flash, the system file such as runtime
image/configuration / prom /log can still be copied to media or from media that support sfile system
via this command using the reserved keyword. The keyword here refers to image_id, config_id,
prom, or log.
391
Format
copy {{unit <unit_id>} <drive_id>} <pathname> {{unit <unit_id>} <drive_id>} <pathname>
Parameters
unit - (Optional) Unit ID in the stacking system. If not specified, it refers to the master unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID. Examples are C: or D:
<pathname> - Specify the file to be copied. The path name can be specified either as a full path
name or partial name. For partial path name, it indicates the file is in the current directory.
unit - (Optional) Unit ID in the stacking system. If not specified, it refers to the master unit.
<unit_id> - Enter the unit ID here.
<drive_id> - (Optional) Enter the drive ID. Examples are C: or D:
<pathname> - Specify the file to copy to. The path name can be specified either as a full path
name or partial name. For partial path name, it indicates the file is in the current directory.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To copy a file:
DGS-3120-24TC:admin# copy c:/log.txt c:/log1.txt
Command: copy c:/log.txt c:/log1.txt
Success.
DGS-3120-24TC:admin#
37-12 format
Description
This command is used to format a specific drive.
Format
format {unit <unit_id>} <drive_id> {[fat16 | fat32]} {<label_name>}
Parameters
unit - (Optional) Unit ID in the stacking system. If not specified, it refers to the master unit.
<unitid 1-n> - Enter the unit ID here. This value must be between 1 and n.
<drive_id> - Specify drive to be formatted.
fat16 - Specify a FAT16 file system
fat32 - Specify a FAT32 file system
<label_name> - (Optional) Enter the label for the drive here. This value can be up to 8 characters
long.
392
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To format a drive:
DGS-3120-24TC:admin#format d: fat32 aaaa
Command: format d: fat32 aaaa
Formatting........................... Done
Success
DGS-3120-24TC:admin#
393
Format
config gratuitous_arp send ipif_status_up [enable | disable]
Parameters
enable - Enable sending of gratuitous ARP when IPIF status become up.
disable - Disable sending of gratuitous ARP when IPIF status become up.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable send gratuitous ARP request in normal situation:
DGS-3120-24TC:admin# config gratuitous_arp send ipif_status_up enable
Command: config gratuitous_arp send ipif_status_up enable
Success.
DGS-3120-24TC:admin#
394
that the system received a ARP request packet that is sent by an IP address that match the
system’s own IP address. In this case, the system knows that some body out there uses an IP
address that is conflict with the system. In order to reclaim the correct host of this IP address, the
system can send out the gratuitous ARP request packet for this duplicate IP address.
Format
config gratuitous_arp send dup_ip_detected [enable | disable]
Parameters
enable - Enable sending of gratuitous ARP when duplicate IP is detected.
disable - Disable sending of gratuitous ARP when duplicate IP is detected.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable send gratuitous ARP request when duplicate IP is detected:
DGS-3120-24TC:admin# config gratuitous_arp send dup_ip_detected enable
Command: config gratuitous_arp send dup_ip_detected enable
Success.
DGS-3120-24TC:admin#
Format
config gratuitous_arp learning [enable | disable]
Parameters
enable - Enable learning of ARP entry based on the received gratuitous ARP packet.
disable - Disable learning of ARP entry based on the received gratuitous ARP packet.
395
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the Gratuitous ARP learning state:
DGS-3120-24TC:admin# config gratuitous_arp learning enable
Command: config gratuitous_arp learning enable
Success.
DGS-3120-24TC:admin#
Format
config gratuitous_arp send periodically ipif <ipif_name 12> interval <value 0-65535>
Parameters
ipif - Interface name of L3 interface.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
interval - Periodically send gratuitous ARP interval time in seconds. 0 means not send gratuitous
ARP periodically.
<value 0-65535> - Enter the gratuitous ARP interval time here. This value must be between 0
and 65535 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure gratuitous ARP interval to 5 for IPIF System:
DGS-3120-24TC:admin# config gratuitous_arp send periodically ipif System
interval 5
Command: config gratuitous_arp send periodically ipif System interval 5
Success.
DGS-3120-24TC:admin#
396
Format
enable gratuitous_arp {ipif <ipif_name 12>} {trap | log}(1)
Parameters
ipif - (Optional) Interface name of L3 interface
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
trap - Specify to enable the trap function.
log - Specify to enable the log function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable system interface’s gratuitous ARP log and trap:
DGS-3120-24TC:admin#enable gratuitous_arp ipif System trap log
Command: enable gratuitous_arp ipif System trap log
Success.
DGS-3120-24TC:admin#
Format
disable gratuitous_arp {ipif <ipif_name 12>} {trap | log}(1)
Parameters
ipif - (Optional) Interface name of L3 interface
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
trap - Specify to disable the trap function.
log - Specify to disable the log function.
397
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable system interface’s gratuitous ARP log and trap:
DGS-3120-24TC:admin# disable gratuitous_arp ipif System trap log
Command: disable gratuitous_arp ipif System trap log
Success.
DGS-3120-24TC:admin#
Format
show gratuitous_arp {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Interface name of L3 interface.
<ipif_name 12> - Enter the IP interface name here.
Restrictions
None.
Example
To display gratuitous ARP configuration:
398
DGS-3120-24TC:admin#show gratuitous_arp
Command: show gratuitous_arp
Total Entries: 1
DGS-3120-24TC:admin#
399
Format
config igmp [ipif <ipif_name 12> | all] {version <value 1-3> | query_interval <sec 1-31744> |
max_response_time <sec 1-25> | robustness_variable <value 1-7> |
last_member_query_interval <value 1-25> | state [enable | disable]}(1)
Parameters
ipif - Specify the IP interface name used for this configuration.
<ipif_name 12> - Enter the IP interface name used for this configuration here. This name can
be up to 12 characters long.
all - Specify that all the IP interfaces will be used.
version - Specify the IGMP version used.
<value 1-3> - Enter the IGMP version number used here. This value must be between 1 and
3. The default value is 3.
query_interval - Specify the time in seconds between general query transmissions.
<sec 1-31744> - Enter the query interval time here. This value must be between 1 and 31744
seconds. The default value is 125.
max_response_time - Specify the maximum time in seconds to wait for reports from members.
<sec 1-25> - Enter the maximum response time here. This value must be between 1 and 25
seconds. The default value is 10.
robustness_variable - Specify the permitted packet loss that guarantees IGMP.
<value 1-7> - Enter the robustness variable here. This value must be between 1 and 7. The
default value is 2.
last_member_query_interval - Specify the maximum Response Time inserted into the Group-
Specific Queries that are sent in response to Leave Group messages, which is also the
amount of time between Group-Specific Query messages.
<value 1-25> - Enter the last member query interval value here. This value must be between
1 and 25. The default value is 1.
400
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable IGMP version 1 for the IP interface “System”:
DGS-3120-24TC:admin#config igmp ipif System version 1 state enable
Command: config igmp ipif System version 1 state enable
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show igmp {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the IP interface name to be displayed.
<ipif_name 12> - Enter the IP interface name, to be displayed, here. This name can be up to
12 characters long.
If no parameter is specified, the system will display all IGMP configurations.
Restrictions
None.
Example
To display the IGMP configuration for all interfaces:
401
DGS-3120-24TC:admin#show igmp
Command: show igmp
Total Entries: 1
DGS-3120-24TC:admin#
Format
show igmp group {group <group> | ipif <ipif_name 12>}
Parameters
group - (Optional) Specify the multicast group ID.
<group> - Enter the multicast group ID value here.
ipif - (Optional) Specify the IP interface name to be displayed
<ipif_name 12> - Enter the IP interface name, to be displayed, here. This name can be up to
12 characters long.
If no parameter is specified, the system will display all IGMP group tables.
Restrictions
None.
Example
To display the IGMP group table:
402
Total Entries : 5
DGS-3120-24TC:admin#
Format
config igmp check_subscriber_source_network [ipif <ipif_name 12> | all] [enable | disable]
Parameters
ipif - Specify the IP interface name used for this configuration.
<ipif_name 12> - Enter the IP interface name used for this configuration here. This name can
be up to 12 characters long.
all - Specify that all the IP interfaces will be used.
enable - Specify that the check state will be enabled.
disable - Specify that the check state will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the checking of subscriber source IP addresses when an IGMP report or leave message
is received on the interface called ‘System’:
403
Success.
DGS-3120-24TC:admin#
Format
show igmp check_subscriber_source_network {ipif <ipif_name 12>}
Parameters
ipif – (Optional) Specify the IP interface name to be displayed.
<ipif_name 12> - Enter the IP interface name, to be displayed, here. This name can be up to
12 characters long.
If no parameter is specified, the system will display all interfaces.
Restrictions
None.
Example
To show the status of the check subscriber for the received IGMP report/leave messages on
interface “n20”:
DGS-3120-24TC:admin#show igmp check_subscriber_source_network ipif n20
Command: show igmp check_subscriber_source_network ipif n20
Total Entries: 1
DGS-3120-24TC:admin#
To show the status of the check subscriber for the received IGMP report/leave messages on all
interfaces:
404
Total Entries: 5
DGS-3120-24TC:admin#
Format
create igmp static_group ipif <ipif_name 12> group <ipaddr>
Parameters
<ipif_name 12> - Enter the IP interface name used for this configuration. This name can be up to
12 characters long.
group - Specify the multicast IP address used.
<ipaddr> - Enter the multicast IP address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IGMP static group, with the multicast IP address 225.0.0.2 on the IP interface
“System”:
DGS-3120-24TC:admin#create igmp static_group ipif System group 225.0.0.2
Command: create igmp static_group ipif System group 225.0.0.2
Success.
DGS-3120-24TC:admin#
Format
delete igmp static_group ipif <ipif_name 12> [group <ipaddr> | all]
Parameters
<ipif_name 12> - Enter the IP interface name used for this configuration. This name can be up to
12 characters long.
group - Specify the multicast IP address used.
<ipaddr> - Enter the multicast IP address used here.
all – Specify that all the multicast IP addresses will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the IGMP static group, with the multicast IP address 225.0.0.2 on the IP interface
“System”.
DGS-3120-24TC:admin#delete igmp static_group ipif System group 255.0.0.2
Command: delete igmp static_group ipif System group 255.0.0.2
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show igmp static_group {ipif <ipif_name 12>}
Parameters
ipif – (Optional) Specify the IP interface name to be displayed.
<ipif_name 12> - Enter the IP interface name, to be displayed, here. This name can be up to
406
12 characters long.
If no parameter is specified, the system will display all IGMP static groups.
Restrictions
None.
Example
To display all IGMP static groups on the interface “n20”:
DGS-3120-24TC:admin#show igmp static_group ipif n20
Command: show igmp static_group ipif n20
Total Entries: 1
DGS-3120-24TC:admin#
Total Entries: 3
DGS-3120-24TC:admin#
407
Format
enable igmp_proxy
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the IGMP proxy:
DGS-3120-24TC:admin#enable igmp_proxy
Command: enable igmp_proxy
Success.
DGS-3120-24TC:admin#
Format
disable igmp_proxy
408
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the IGMP proxy:
DGS-3120-24TC:admin#disable igmp_proxy
Command: disable igmp_proxy
Success.
DGS-3120-24TC:admin#
Format
config igmp_proxy downstream_if [add | delete] vlan [<vlan_name 32> | vlanid <vidlist>]
Parameters
add - Specify to add a downstream interface.
delete - Specify to delete a downstream interface .
vlan – Specify the VLAN by name or ID.
<vlan_name 32> - Specify a name of VLAN which will be added to or deleted from the IGMP
proxy downstream interface. The maximum length is 32 characters.
vlanid - Specify a list of VLAN IDs to be added to or deleted from the IGMP proxy
downstream interface.
<vidlist> - Specify a list of VLAN IDs which will be added to or deleted from the IGMP
proxy downstream interface.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the IGMP proxy’s downstream interface:
409
Success.
DGS-3120-24TC:admin#
Format
config igmp_proxy upstream_if {vlan [<vlan_name 32> | vlanid <vlanid 1-4094>] |
router_ports [add | delete] <portlist> | source_ip <ipaddr> | unsolicited_report_interval <sec
0-25>} (1)
Parameters
vlan - Specify the VLAN for the upstream interface.
<vlan_name 32> - Specify a VLAN name between 1 and 32 characters.
vlanid - Specify the VLAN ID for the upstream interface.
<1-4094> - Specify the VLAN ID between 1 and 4094.
router_ports - Specify a list of ports that are connected to multicast-enabled routers.
add - Specify to add the router ports.
delete - Specify to delete the router ports.
<portlist> - Specify a range of ports to be configured.
source_ip - Specify the source IP address of the upstream protocol packet. If it is not specified,
zero IP address will be used as the protocol source IP address.
<ipaddr> - Specify the IP address.
unsolicited_report_interval - Specify the time between repetitions of the host's initial report of
membership in a group. The default is 10 seconds. If set to 0, only one report packet is sent.
<sec 0-25> - Specify the time between 0 and 25 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the router port of IGMP proxy’s upstream interface:
410
Success.
DGS-3120-24TC:admin#
Format
show igmp_proxy {group}
Parameters
group - (Optional) Specify the group information.
Note: If the group is not specified, the IGMP proxy configuration will be displayed.
Restrictions
None.
Example
To display IGMP proxy information:
DGS-3120-24TC:admin#show igmp_proxy
Command: show igmp_proxy
Upstream Interface
VLAN ID : 1
Dynamic Router Ports : 1-4
Static Router Ports : 5-6
Unsolicited Report Interval : 10
Source IP Address : 0.0.0.0
Downstream Interface
VLAN List : 2-4
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
412
config igmp_snooping [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all ] { state [enable |
disable] | fast_leave [enable | disable] | proxy_reporting {state [enable|disable] | source_ip
<ipaddr>}(1)}(1)
config igmp_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>] [<value 1-1000> |
no_limit]
config igmp_snooping querier [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all]
{query_interval <sec 1-65535> | max_response_time <sec 1-25> | robustness_variable
<value 1-7> | last_member_query_interval <sec 1-25> | state [enable | disable] | version
<value 1-3>}(1)
config igmp access_authentication ports [all | <portlist>] state [enable | disable]
config router_ports [<vlan_name 32> | vlanid <vlanid_list> ] [add | delete] <portlist>
config router_ports_forbidden [ <vlan_name 32> | vlanid <vlanid_list> ] [add | delete] <portlist>
enable igmp_snooping
disable igmp_snooping
create igmp_snooping static_group [vlan<vlan_name 32> | vlanid <vlanid_list>] <ipaddr>
delete igmp_snooping static_group [vlan<vlan_name 32> | vlanid <vlanid_list>] <ipaddr>
config igmp_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipaddr> [add |
delete] <portlist>
show igmp_snooping static_group {[vlan <vlan_name 32> | vlanid <vlanid_list>] <ipaddr>}
config igmp_snooping data_driven_learning [all | vlan_name <vlan_name 32> | vlanid
<vlanid_list>] {state [enable | disable] | aged_out [enable | disable ] | expiry_time <sec 1-
65535>}(1) (EI and SI Mode Only)
config igmp_snooping data_driven_learning max_learned_entry <value 1-1024> (EI and SI
Mode Only)
clear igmp_snooping data_driven_group [all | [vlan_name <vlan_name 32> | vlanid
<vlanid_list>] [<ipaddr> | all]] (EI and SI Mode Only)
show igmp_snooping {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
show igmp_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>]
show igmp_snooping group {[vlan <vlan_name 32> | vlanid <vlanid_list> | ports <portlist>]
{<ipaddr>}} {data_driven}
show igmp_snooping forwarding {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
show router_ports [vlan <vlan_name 32> | vlanid <vlanid_list> | all ] {[static | dynamic |
forbidden]}
show igmp_snooping statistic counter [vlan <vlan_name> | vlanid <vlanid_list> | ports
<portlist>]
413
Format
config igmp_snooping [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all ] { state
[enable | disable] | fast_leave [enable | disable] | proxy_reporting {state [enable|disable] |
source_ip <ipaddr>}(1)}(1)
Parameters
vlan_name - Specify the name of the VLAN for which IGMP snooping is to be configured.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the VLAN ID for which IGMP snooping is to be configured.
<vlanid_list> - Enter the VLAN ID here.
all - Specify to use all configured VLANs.
state - (Optional) Enable or disable IGMP snooping for the chosen VLAN.
enable - Enter enable to enable IGMP snooping for the chosen VLAN.
disable - Enter disable to disable IGMP snooping for the chosen VLAN.
fast_leave - Enable or disable the IGMP snooping fast leave function.
enable - Enter enable to enable the IGMP snooping fast leave function. If enabled, the
membership is immediately removed when the system receives the IGMP leave message.
disable - Enter disable to disable the IGMP snooping fast leave function.
proxy reporting - Specify IGMP proxy reporting. If enabled, multiple IGMP reports or leave for a
specific (S, G) will be integrated into one report only before sending to the router port.
state - Enable or disable the proxy reporting.
enable - Enable the proxy reporting.
disable - Disable the proxy reporting.
source_ip - Specify the source IP of proxy reporting integrated report. Default value is zero
IP.
<ipaddr> - Enter the IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure IGMP snooping:
DGS-3120-24TC:admin# config igmp_snooping vlan_name default state enable
Command: config igmp_snooping vlan_name default state enable
Success.
DGS-3120-24TC:admin#
414
Format
config igmp_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>] [<value 1-1000> |
no_limit]
Parameters
ports - Specify a range of ports to be configured.
<portlist> - Enter the range of ports to be configured here.
vlanid - Specify a range of VLANs to be configured.
<vlanid_list> - Enter the VLAN ID list here.
<value 1-1000> - Configure the rate of the IGMP control packet that the Switch can process on a
specific port/VLAN. The rate is specified in packets per second. The packets that exceed the
limit will be dropped.
no_limit - Configure the rate of the IGMP control packet to be unlimited that the Switch can
process on a specific port/VLAN. The rate is specified in packets per second. The packets that
exceed the limit will be dropped. The default setting is no_limit.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the IGMP snooping per port rate_limit:
DGS-3120-24TC:admin#config igmp_snooping rate_limit ports 1:1 100
Command: config igmp_snooping rate_limit ports 1:1 100
Success.
DGS-3120-24TC:admin#
Format
config igmp_snooping querier [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all]
{query_interval <sec 1-65535> | max_response_time <sec 1-25> | robustness_variable
<value 1-7> | last_member_query_interval <sec 1-25> | state [enable | disable] | version
<value 1-3>}(1)
415
Parameters
vlan_name - Specify the name of the VLAN for which IGMP snooping querier is to be configured.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the VLAN ID for which IGMP snooping querier is to be configured.
<vlanid_list> - Enter the VLAN ID list here.
all - Specify all VLANs for which IGMP snooping querier is to be configured.
query_interval - (Optional) Specify the amount of time in seconds between general query
transmissions. The default setting is 125 seconds.
<sec 1-65535> - Enter the query interval value here. This value must between between 1 and
65535 seconds.
max_reponse_time - (Optional) Specify the maximum time in seconds to wait for reports from
members. The default setting is 10 seconds.
<sec 1-25> - Enter the maximum response time value here. This value must be between 1
and 25 seconds.
robustness_variable - (Optional) Provides fine-tuning to allow for expected packet loss on a
subnet. The value of the robustness variable is used in calculating the following IGMP
message intervals:
<value 1-7> - Enter the robustness variable value here. This value must be between 1 and 7.
By default, the robustness variable is set to 2. You might want to increase this value if you
expect a subnet to be loosely.
• Group member interval—Amount of time that must pass before a multicast router decides
there are no more members of a group on a network. This interval is calculated as
follows: (robustness variable x query interval) + (1 x query response interval).
• Other querier present interval—Amount of time that must pass before a multicast router
decides that there is no longer another multicast router that is the querier. This interval is
calculated as follows: (robustness variable x query interval) + (0.5 x query response
interval).
• Last member query count—Number of group-specific queries sent before the router
assumes there are no local members of a group. The default number is the value of the
robustness variable.
last_member_query_interval - (Optional) Specify the maximum amount of time between group-
specific query messages, including those sent in response to leave-group messages. You
might lower this interval to reduce the amount of time it takes a router to detect the loss of the
last member of a group. On receiving a leave message, the router will assume there are no
local members on the interface if there are no reports received after the response time (which
is last member query interval * robustness variable)
<sec 1-25> - Enter the last member query interval value here. This value must be between 1
and 25 seconds.
state - (Optional) If the state is enabled, it allows the Switch to be selected as an IGMP Querier
(sends IGMP query packets). It the state is disabled, then the Switch cannot play the role as a
querier. Note that if the Layer 3 router connected to the Switch provide only the IGMP proxy
function but does not provide the multicast routing function, then this state must be configured
as disabled. Otherwise, if the Layer 3 router is not selected as the querier, it will not send the
IGMP query packet. Since it will not send the multicast-routing protocol packet, the port will be
timed out as a router port.
enable - Enter enable to enable this state.
disable - Enter disable to disable this state.
version - (Optional) Specify the version of IGMP packet that will be sent by this port. If an IGMP
packet received by the interface has a version higher than the specified version, this packet
will be dropped.
<value 1-3> - Enter the version number here. This value must be between 1 and 3.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
416
Example
To configure the IGMP snooping querier:
DGS-3120-24TC:admin# config igmp_snooping querier vlan_name default
query_interval 125 state enable
Command: config igmp_snooping querier vlan_name default query_interval 125
state enable
Success.
DGS-3120-24TC:admin#
Format
config igmp access_authentication ports [all | <portlist>] state [enable | disable]
Parameters
all - Specify all ports to be configured.
<portlist> - Specify a range of ports to be configured.
state - Specify the state of the RADIUS authentication function on the specified ports.
enable - Enable the RADIUS authentication function on the specified ports.
disable - Disable the RADIUS authentication function on the specified ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable IGMP Access Control for all ports:
DGS-3120-24TC:admin#config igmp access_authentication ports all state enable
Command: config igmp access_authentication ports all state enable
Success.
DGS-3120-24TC:admin#
417
Format
config router_ports [<vlan_name 32> | vlanid <vlanid_list> ] [add | delete] <portlist>
Parameters
<vlan_name 32> - Specify the name of the VLAN on which the router port resides.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID here.
add - Specify to add the router ports.
delete - Specify to delete the router ports.
<portlist> - Specify a range of ports to be configured. (UnitID:port number)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set up static router ports:
DGS-3120-24TC:admin# config router_ports default add 1:1-1:10
Command: config router_ports default add 1:1-1:10
Success.
DGS-3120-24TC:admin#
Format
config router_ports_forbidden [ <vlan_name 32> | vlanid <vlanid_list> ] [add | delete]
<portlist>
Parameters
<vlan_name 32> - Specify the name of the VLAN on which the router port resides.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
418
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set up port range 1-10 to forbidden router ports of default VLAN:
DGS-3120-24TC:admin# config router_ports_forbidden default add 1:11-1:12
Command: config router_ports_forbidden default add 1:11-1:12
Success.
DGS-3120-24TC:admin#
Format
enable igmp_snooping
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable IGMP snooping on the Switch:
DGS-3120-24TC:admin# enable igmp_snooping
Command: enable igmp_snooping
Success.
DGS-3120-24TC:admin#
419
Format
disable igmp_snooping
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable IGMP snooping on the Switch:
DGS-3120-24TC:admin# disable igmp_snooping
Command: disable igmp_snooping
Success.
DGS-3120-24TC:admin#
The static group will only take effect when IGMP snooping is enabled on the VLAN. For those
static member ports, the device needs to emulate the IGMP protocol operation to the querier, and
forward the traffic destined to the multicast group to the member ports.
For a layer 3 device, the device is also responsible to route the packet destined for this specific
group to static member ports.
420
Format
create igmp_snooping static_group [vlan<vlan_name 32> | vlanid <vlanid_list>] <ipaddr>
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID here.
<ipaddr> - Specify the multicast group IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IGMP snooping static group for VLAN 1, group 239.1.1.1:
DGS-3120-24TC:admin# create igmp_snooping static_group vlan default 239.1.1.1
Command: create igmp_snooping static_group vlan default 239.1.1.1
Success.
DGS-3120-24TC:admin#
Format
delete igmp_snooping static_group [vlan<vlan_name 32> | vlanid <vlanid_list>] <ipaddr>
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
<ipaddr> - Specify the multicast group IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
421
Example
To delete an IGMP snooping static group for VLAN 1, group 239.1.1.1:
DGS-3120-24TC:admin# delete igmp_snooping static_group vlan default 239.1.1.1
Command: delete igmp_snooping static_group vlan default 239.1.1.1
Success.
DGS-3120-24TC:admin#
Format
config igmp_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipaddr>
[add | delete] <portlist>
Parameters
vlan - Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID here.
<ipaddr> - Specify the multicast group IP address (for Layer 3 switch).
add - Specify to add the member ports.
delete - Specify to delete the member ports.
<portlist> - Specify a range of ports to be configured.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To unset port range 9-10 from IGMP snooping static member ports for group 239.1.1.1 on default
VLAN:
422
Success.
DGS-3120-24TC:admin#
Format
show igmp_snooping static_group {[vlan <vlan_name 32> | vlanid <vlanid_list>] <ipaddr>}
Parameters
vlan - Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID here.
<ipaddr> - Specify the multicast group IP address.
Restrictions
None.
Example
To display all the IGMP snooping static groups:
DGS-3120-24TC:admin# show igmp_snooping static_group
VLAN ID/Name IP Address Static Member Ports
-------------- ------------------ ------------------------
1 / Default 239.1.1.1 2:9-2:10
Total Entries : 1
DGS-3120-24TC:admin#
423
When data-driven learning is enabled for the VLAN, when the Switch receives the IP multicast
traffic on this VLAN, an IGMP snooping group will be created. That is, the learning of an entry is
not activated by IGMP membership registration, but activated by the traffic. For an ordinary IGMP
snooping entry, the IGMP protocol will take care of the aging out of the entry. For a data-driven
entry, the entry can be specified not to be aged out or to be aged out by the aged timer.
When data driven learning is enabled, and the data driven table is not full, the multicast filtering
mode for all ports is ignored. That is, the multicast packets will be forwarded to router ports. If the
data driven learning table is full, the multicast packets will be forwarded according to the multicast
filtering mode.
Note that if a data-driven group is created and IGMP member ports are learned later, the entry will
become an ordinary IGMP snooping entry. That is, the aging out mechanism will follow the
ordinary IGMP snooping entry.
Format
config igmp_snooping data_driven_learning [all | vlan_name <vlan_name 32> | vlanid
<vlanid_list>] {state [enable | disable] | aged_out [enable | disable ] | expiry_time <sec 1-
65535>}(1)
Parameters
all - Specify all VLANs to be configured.
vlan_name - Specify the VLAN name to be configured.
<vlan_name 32> - Enter the VLAN name here.
vlanid - Specify the VLAN ID to be configured.
<vlanid_list> - Enter the VLAN ID here.
state - (Optional) Specify to enable or disable the data driven learning of an IGMP snooping
group.
enable - Enter enable to enable the data driven learning option. By default, the state is
enabled.
disable - Enter disable to disable the data driven learning option.
aged_out - (Optional) Enable or disable the aging out of the entry.
enable - Enter enable to enable the aging out of the entry.
disable - Enter disable to disable the aging out of the entry. By default, the state is disabled
state.
expiry_time - (Optional) Specify the data driven group lifetime in seconds. This parameter is
valid only when aged_out is enabled.
<sec 1-65535> - Enter the expiry time here. This value must be between 1 and 65535
seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the data driven learning of an IGMP snooping group on the default VLAN:
424
Success.
DGS-3120-24TC:admin#
Format
config igmp_snooping data_driven_learning max_learned_entry <value 1-1024>
Parameters
max_learned_entry - Specify the maximum number of groups that can be learned by data
driven. The suggested default setting is 56. This default setting may vary depending on
projects.
<value 1-1024> - Enter the maximum learning entry value here. This value must be between
1 and 1024.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the maximum number of groups that can be learned by data driven:
DGS-3120-24TC:admin# config igmp_snooping data_driven_learning
max_learned_entry 50
Command: config igmp_snooping data_driven_learning max_learned_entry 50
Success.
DGS-3120-24TC:admin#
425
Format
clear igmp_snooping data_driven_group [all | [vlan_name <vlan_name 32> | vlanid
<vlanid_list>] [<ipaddr> | all]]
Parameters
all - Specify all VLANs to which IGMP snooping groups will be deleted.
vlan_name - Specify the VLAN name.
<vlan_name 32> - Enter the VLAN name here.
vlanid - Specify the VLAN ID.
<vlanid_list> - Enter the VLAN ID here.
<ipaddr> - Specify the group’s IP address learned by data driven.
all - Delete all IGMP snooping groups of specified VLANs.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete all the groups learned by data-driven:
DGS-3120-24TC:admin# clear igmp_snooping data_driven_group all
Command: clear igmp_snooping data_driven_group all
Success.
DGS-3120-24TC:admin#
Format
show igmp_snooping {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view the IGMP snooping
configuration.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view the IGMP snooping
configuration.
<vlanid_list> - Enter the VLAN ID list here.
If the VLAN is not specified, the system will display all current IGMP snooping configurations.
426
Restrictions
None.
Example
To show IGMP snooping:
Command: show igmp_snooping
Total Entries: 1
DGS-3120-24TC:admin#
Format
show igmp_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>]
Parameters
ports - Specify the port range.
<portlist> - Enter the range of ports here.
vlanid - Specify the VLAN range..
<vlanid_list> - Enter the VLAN ID list here.
Restrictions
None.
427
Example
To display the IGMP snooping rate limit for ports 1 to 15:
DGS-3120-24TC:admin# show igmp_snooping rate_limit ports 1-15
Command: show igmp_snooping rate_limit ports 1-15
Total Entries: 5
Format
show igmp_snooping group {[vlan <vlan_name 32> | vlanid <vlanid_list> | ports <portlist>]
{<ipaddr>}} {data_driven}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view IGMP snooping group
information. If VLAN, ports and IP address are not specified, the system will display all current
IGMP snooping group information.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view IGMP snooping group
information.
<vlanid_list> - Enter the VLAN ID list here.
ports - (Optional) Specify a list of ports for which you want to view IGMP snooping group
information.
<portlist> - Enter the list of ports here.
<ipaddr> - (Optional) Specify the group IP address for which you want to view IGMP snooping
group information.
data_driven - (Optional) If data_driven is specified, only data driven groups will be displayed.
(EI and SI Mode Only)
Restrictions
None.
Example
To show IGMP snooping groups when IGMP v3 is supported:
428
Source/Group : 10.0.0.1/225.0.0.1
VLAN Name/VID : default/1
Member Ports : 1:5
UP Time : 6
Expiry Time : 254
Filter Mode : INCLUDE
Source/Group : 10.0.0.10/225.0.0.1
VLAN Name/VID : default/1
Member Ports : 1:5
UP Time : 6
Expiry Time : 254
Filter Mode : INCLUDE
Source/Group : NULL/239.255.255.250
VLAN Name/VID : default/1
Member Ports : 1:5
UP Time : 2
Expiry Time : 258
Filter Mode : EXCLUDE
Total Entries: 3
DGS-3120-24TC:admin#
Total Entries : 1
DGS-3120-24TC:admin#
To show IGMP snooping groups when only IGMP v2 is supported: The third item is a data-driven
learned entry. If the member port list is empty, the multicast packets will be forwarded to the router
ports. If the router port list is empty, the packets will be dropped.
DGS-3120-24TC:admin# show igmp_snooping group
Command: show igmp_snooping group
Source/Group : NULL/226.0.0.1
VLAN Name/VID : default/1
429
Source/Group : NULL/226.0.0.2
VLAN Name/VID : default/1
Member Ports : 1:5
UP Time : 9
Expiry Time : 259
Filter Mode : EXCLUDE
Source/Group : NULL/226.0.0.3
VLAN Name/VID : default/1
Member Ports :
Router Ports :
UP Time : 1
Expiry Time : 259
Filter Mode : EXCLUDE
Source/Group : NULL/239.255.255.250
VLAN Name/VID : default/1
Member Ports : 1:5
UP Time : 1
Expiry Time : 259
Filter Mode : EXCLUDE
Total Entries: 4
DGS-3120-24TC:admin#
Format
show igmp_snooping forwarding {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view IGMP snooping
forwarding table information.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view IGMP snooping
forwarding table information.
430
Restrictions
None.
Example
To show all IGMP snooping forwarding entries located on the Switch:
DGS-3120-24TC:admin# show igmp_snooping forwarding
Command: show igmp_snooping forwarding
Total Entries : 3
DGS-3120-24TC:admin#
Format
show router_ports [vlan <vlan_name 32> | vlanid <vlanid_list> | all ] {[static | dynamic |
forbidden]}
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
431
Restrictions
None.
Example
To display router ports:
DGS-3120-24TC:admin#show router_ports all
Command: show router_ports all
Total Entries: 1
DGS-3120-24TC:admin#
Format
show igmp_snooping statistic counter [vlan <vlan_name> | vlanid <vlanid_list> | ports
<portlist>]
Parameters
vlan - Specify a VLAN to be displayed.
<vlan_name> - Enter the VLAN name here.
vlanid - Specify a list of VLANs to be displayed.
<vlanid_list> - Enter the VLAN ID list here.
ports - Specify a list of ports to be displayed.
<portlist> - Enter the list of port to be displayed here.
432
Restrictions
None.
Example
To display the IGMP snooping statistics counter:
DGS-3120-24TC:admin# show igmp_snooping statistics counter vlanid 1
Command: show igmp_snooping statistics counter vlanid 1
Transmit Statistics
Query
IGMP v1 Query : 1
IGMP v2 Query : 1
IGMP v3 Query : 1
Total : 3
Report & Leave
IGMP v1 Report : 0
IGMP v2 Report : 10
IGMP v3 Report : 10
IGMP v2 Leave : 1
Total : 21
Total Entries : 1
DGS-3120-24TC:admin#
433
Port #1
------------------------------------------------
Group Number : 10
Receive Statistics
Query
IGMP v1 Query : 0
IGMP v2 Query : 0
IGMP v3 Query : 0
Total : 0
Dropped By Rate Limitation : 0
Dropped By Multicast VLAN : 0
Transmit Statistics
Query
IGMP v1 Query : 0
IGMP v2 Query : 0
IGMP v3 Query : 0
Total : 0
Total Entries : 1
DGS-3120-24TC:admin#
434
Format
show igmp access_authentication ports [all | <portlist>]
Parameters
all - Specify all ports to be displayed.
<portlist> - Specify a range of ports to be displayed.
Restrictions
None.
Example
To display the IGMP Access Control status for ports 1-4:
DGS-3120-24TC:admin#show igmp access_authentication ports 1:1-1:4
Command: show igmp access_authentication ports 1:1-1:4
Port State
----- ---------
1:1 Enabled
1:2 Disabled
1:3 Disabled
1:4 Disabled
DGS-3120-24TC:admin#
Port State
----- ---------
1:1 Enabled
1:2 Disabled
1:3 Disabled
1:4 Disabled
1:5 Disabled
1:6 Disabled
1:7 Disabled
1:8 Disabled
1:9 Disabled
1:10 Disabled
1:11 Disabled
1:12 Disabled
1:13 Disabled
1:14 Disabled
1:15 Disabled
1:16 Disabled
1:17 Disabled
435
1:18 Disabled
1:19 Disabled
1:20 Disabled
CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All
Format
clear igmp_snooping statistics counter
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear the IGMP snooping statistics counter:
DGS-3120-24TC:admin# clear igmp_snooping statistic counter
Command: clear igmp_snooping statistic counter
Success.
DGS-3120-24TC:admin#
436
437
Format
create address_binding ip_mac ipaddress <ipaddr> mac_address <macaddr> {ports
[<portlist> | all]}
Parameters
ipaddress - Specify the IP address used for the IMPB entry.
<ipaddr> - Enter the IP address used here.
mac_address - Specify the MAC address used for the IMPB entry.
<macaddr> - Enter the MAC address used here.
ports - (Optional) Specify the portlist the entry will apply to. If not ports are specified, the settings
will be applied to all ports.
<portlist> - Enter a list of ports used for this configuration here.
all - Specify that all the ports will be included.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IMPB entry:
DGS-3120-24TC:admin#create address_binding ip_mac ipaddress 10.1.1.1
mac_address 00-00-00-00-00-11
Command: create address_binding ip_mac ipaddress 10.1.1.1 mac_address 00-00-00-
00-00-11
Success.
DGS-3120-24TC:admin#
Format
config address_binding ip_mac ports [ <portlist> | all] {arp_inspection [strict | loose |
disable] | ip_inspection [enable | disable] | protocol [ipv4 | ipv6 | all] | allow_zeroip [enable |
disable] | forward_dhcppkt [enable | disable] | stop_learning_threshold <int 0-500>}
Parameters
ports - Specify the ports used for this configuration.
<portlist> - Enter the list of ports used for this configuration here.
all - Specify that all the ports will be used.
arp_inspection - (Optional) Specify that the ARP inspection option will be configured.
strict - In this mode, all packets are dropped by default until a legal ARP or IP packets are
detected.
loose - In this mode, all packets are forwarded by default until an illegal ARP or broadcast IP
438
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable IMPB on port 1:
DGS-3120-24TC:admin#config address_binding ip_mac ports 1:1 arp_inspection
strict
Command: config address_binding ip_mac ports 1:1 arp_inspection strict
Success.
DGS-3120-24TC:admin#
Format
create address_binding ip_mac ipv6address <ipv6addr> mac_address <macaddr> {ports
[ <portlist>| all ]}
439
Parameters
<ipv6addr> - Specify the IPv6 address.
mac_address - Specify the MAC address.
<macaddr> - Enter the MAC address here.
ports - (Optional) Configure the portlist or all ports.
<portlist> - Specify a range of ports to be configured.
all - Specify to apply to all the ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static IPv6 IMPB entry that binds the IPv6 address fe80::240:5ff:fe00:28 to the MAC
address 00-00-00-00-00-11:
DGS-3120-24TC:admin#create address_binding ip_mac ipv6address
fe80::240:5ff:fe00:28 mac_address 00-00-00-00-00-11
Command: create address_binding ip_mac ipv6address FE80::240:5FF:FE00:28
mac_address 00-00-00-00-00-11
Success.
DGS-3120-24TC:admin#
Format
config address_binding ip_mac ipv6address <ipv6addr> mac_address <macaddr> {ports
[<portlist>| all]}
Parameters
<ipv6addr> - Enter the IPv6 address used here.
mac_address - Specify the MAC address.
<macaddr> - Enter the MAC address here.
ports - (Optional) Configure the portlist to apply, if ports are not configured, then it will apply to all
ports.
<portlist> - Specify the list of ports to apply.
all - Specify to apply to all the ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
440
Example
To configure a static IPv6 IMPB entry so that that IPv6 address fe80::240:5ff:fe00:28 is bound to
the MAC address 00-00-00-00-00-11:
DGS-3120-24TC:admin#config address_binding ip_mac ipv6address
fe80::240:5ff:fe00:28 mac_address 00-00-00-00-00-11
Command: config address_binding ip_mac ipv6address FE80::240:5FF:FE00:28
mac_address 00-00-00-00-00-11
Success.
DGS-3120-24TC:admin#
Format
delete address_binding blocked [all | vlan_name <vlan_name> mac_address <macaddr>]
Parameters
all - Specify that all the entries the address database that the system has automatically learned
and blocked to be deleted.
vlan_name - Specify the name of the VLAN to which the blocked MAC address belongs.
<vlan_name> - Enter the VLAN name.
mac_address - Specify the MAC address of the entry or the blocked MAC address.
<macaddr> - Enter the MAC address used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a blocked address:
DGS-3120-24TC:admin# delete address_binding blocked vlan_name v31 mac_address
00-00-00-00-00-11
Command: delete address_binding blocked vlan_name v31 mac_address 00-00-00-00-
00-11
Success.
DGS-3120-24TC:admin#
441
Format
delete address_binding ip_mac [all | ipaddress <ipaddr> mac_address <macaddr> |
ipv6address <ipv6addr> mac_address <macaddr>]
Parameters
all - Specify that all the MAC address will be used.
ipaddress - Specify the learned IP address of the entry in the database.
<ipaddr> - Enter the IP address used.
mac_address - Specify the MAC address used for this configuration.
<macaddr> - Enter the MAC address used.
Ipv6address - Specify the learned IPv6 address of the entry in the database.
<ipv6addr> - Enter the IPv6 address used.
mac_address - Specify the MAC address used for this configuration.
<macaddr> - Enter the MAC address used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a blocked address:
DGS-3120-24TC:admin#delete address_binding ip_mac ipaddress 10.1.1.1
mac_address 00-00-00-00-00-11
Command: delete address_binding ip_mac ipaddress 10.1.1.1 mac_address 00-00-00-
00-00-11
Success.
DGS-3120-24TC:admin#
Format
config address_binding ip_mac ipaddress <ipaddr> mac_address <macaddr> {ports
[<portlist> | all]}
Parameters
ipaddress - Specify the IP address of the entry being updated.
<ipaddr> - Enter the IP address used here.
mac_address - Specify the MAC address of the entry being updated
<macaddr> - Enter the MAC address used here.
ports - (Optional) Specify which ports are used for the IMPB entry being updated. If not specified,
then it is applied to all ports.
442
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an IMPB entry:
DGS-3120-24TC:admin# config address_binding ip_mac ipaddress 10.1.1.1
mac_address 00-00-00-00-00-11
Command: config address_binding ip_mac ipaddress 10.1.1.1 mac_address 00-00-00-
00-00-11
Success.
DGS-3120-24TC:admin#
Format
show address_binding {ports {<portlist>}}
Parameters
ports - (Optional) Specify the ports for which the information is displayed. If not specified, all
ports are displayed.
<portlist> - (Optional) Enter the list of ports used here.
Restrictions
None.
Example
To show the IMPB global configuration:
443
DGS-3120-24TC:admin#show address_binding
Command: show address_binding
Trap/Log : Disabled
DHCP Snoop(IPv4) : Disabled
DHCP Snoop(IPv6) : Disabled
ND Snoop : Disabled
Function Version : 3.96
DGS-3120-24TC:admin#
Format
show address_binding blocked [all | vlan_name <vlan_name> mac_address <macaddr>]
444
Parameters
all - Specify that all the addresses in the database that the system has auto learned and blocked
to be displayed.
vlan_name - Specify the name of the VLAN to which the blocked MAC address belongs.
<vlan_name> - Enter the VLAN name used.
mac_address - Specify the MAC address of the entry or the blocked MAC address.
<macaddr> - Enter the MAC address of the entry or the blocked MAC address.
Restrictions
None.
Example
To show the IMPB entries that are blocked:
DGS-3120-24TC:admin#show address_binding blocked all
Command: show address_binding blocked all
Total Entries : 1
DGS-3120-24TC:admin#
Format
show address_binding ip_mac [all | [[ipaddress <ipaddr> | ipv6address <ipv6addr>]
{mac_address <macaddr>} | mac_address <macaddr>]]
Parameters
all - Specify that all the IP addresses to be displayed.
ipaddress - Specify the learned IP address of the entry in the database.
<ipaddr> - Enter the learned IP address.
ipv6address - Specify the learned IPv6 address of the entry in the database.
<ipv6addr> - Enter the learned IPv6 address.
mac_address - (Optional) Specify the MAC address of the entry in the database.
<macaddr> - Enter the MAC address here.
mac_address - Specify the MAC address of the entry in the database.
<macaddr> - Enter the MAC address here.
445
Restrictions
None.
Example
To show IMPB entries:
DGS-3120-24TC:admin#show address_binding ip_mac all
Command: show address_binding ip_mac all
Total Entries : 1
DGS-3120-24TC:admin#
446
Format
enable address_binding dhcp_snoop {[ipv6| all]}
Parameters
ipv6 - (Optional) Specify that IPv6 entries to be enabled.
all - (Optional) Specify to enable all DHCP snooping mode.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable DHCP IPv4 snooping mode:
DGS-3120-24TC:admin# enable address_binding dhcp_snoop
Command: enable address_binding dhcp_snoop
Success.
DGS-3120-24TC:admin#
Format
disable address_binding dhcp_snoop {[ipv6| all]}
Parameters
ipv6 - (Optional) Specify that IPv6 entries to be disabled.
all - (Optional) Specify to disable all DHCP snooping mode.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable DHCP IPv4 snooping mode:
447
Success.
DGS-3120-24TC:admin#
Format
clear address_binding dhcp_snoop binding_entry ports [<portlist> | all] {[ipv6 | all]}
Parameters
<portlist> - Enter the list of ports used.
all - Specify that all the ports will be used.
ipv6 - (Optional) Specify that IPv6 entries will be cleared.
all - (Optional) Specify that all entries will be cleared.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear DHCP IPv4 snooping entries on ports 1-3:
DGS-3120-24TC:admin# clear address_binding dhcp_snoop binding_entry ports 1-3
Command: clear address_binding dhcp_snoop binding_entry ports 1-3
Success.
DGS-3120-24TC:admin#
Format
show address_binding dhcp_snoop {max_entry {ports <portlist>}}
Parameters
max_entry - (Optional) To show the maximum number of entries per port.
448
Restrictions
None.
Example
To show the DHCP snooping state:
DGS-3120-24TC:admin#show address_binding dhcp_snoop
Command: show address_binding dhcp_snoop
DGS-3120-24TC:admin#
449
Format
show address_binding dhcp_snoop binding_entry {port <port>}
Parameters
port – (Optional) Specify the port used for this configuration.
<port> - Enter the port number used here.
Restrictions
None.
Example
To display the DHCP snooping binding entries:
DGS-3120-24TC:admin#show address_binding dhcp_snoop binding_entry
Command: show address_binding dhcp_snoop binding_entry
Total Entries : 2
DGS-3120-24TC:admin#
Format
show address_binding dhcp_snoop limit_rate {ports <portlist>}
Parameters
port – (Optional) Specify the port used for this configuration.
<port> - Enter the port number used here.
450
Restrictions
None.
Example
To display the DHCP snooping limit rate entries:
DGS-3120-24TC:admin#show address_binding dhcp_snoop limit_rate
Command: show address_binding dhcp_snoop limit_rate
DGS-3120-24TC:admin#
Format
config address_binding dhcp_snoop max_entry ports [<portlist> | all] limit [<value 1-50> |
no_limit] {ipv6}
451
Parameters
<portlist> - Enter the list of ports you would like to set the maximum number of entries that can
be learned.
all - Specify that all the ports to be used.
limit - Specify the maximum number.
<value 1-50> - Enter the limit value here. This value must be between 1 and 50.
no_limit - Specify that the maximum number of learned entries is unlimited.
ipv6 - (Optional) Specify the IPv6 address used for this configuration.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the maximum number of DHCP IPv4 snooping entries that ports 1:1–1:3 can learned to 10:
DGS-3120-24TC:admin#config address_binding dhcp_snoop max_entry ports 1:1-1:3
limit 10
Command: config address_binding dhcp_snoop max_entry ports 1:1-1:3 limit 10
Success.
DGS-3120-24TC:admin#
Format
enable address_binding nd_snoop
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the ND snooping function on the switch:
452
Success.
DGS-3120-24TC:admin#
Format
disable address_binding nd_snoop
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the ND snooping function on the switch:
DGS-3120-24TC:admin#disable address_binding nd_snoop
Command: disable address_binding nd_snoop
Success.
DGS-3120-24TC:admin#
Format
config address_binding nd_snoop ports [<portlist> | all] max_entry [< value 1-50 > | no_limit]
Parameters
ports - Specify the list of ports used for this configuration.
453
<portlist> - Enter the list of ports used for this configuration here.
all - Specify that all the ports will be usd for this configuration.
max_entry - Specify the maximum number of entries.
<value 1-50> - Enter the maximum number of entries used here. This value must be between
1 and 50.
no_limit - Specify that the maximum number of learned entries is unlimited.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To that a maximum of 10 entries can be learned by ND snooping on ports 1:1 to 1:3:
DGS-3120-24TC:admin#config address_binding nd_snoop ports 1:1-1:3 max_entry 10
Command: config address_binding nd_snoop ports 1:1-1:3 max_entry 10
Success.
DGS-3120-24TC:admin#
Format
show address_binding nd_snoop {ports <portlist>}
Parameters
ports – (Optional) Specify the list of ports used for this display.
<portlist> - Enter the list of ports used for this display here.
Restrictions
None.
Example
To show the ND snooping state:
DGS-3120-24TC:admin#show address_binding nd_snoop
Command: show address_binding nd_snoop
ND Snoop : Enabled
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
Format
show address_binding nd_snoop binding_entry {port <port>}
Parameters
port - (Optional) Specify a port used for this display.
<port> - Enter the port number used for this display here.
Restrictions
None.
Example
To the ND snooping binding entry:
DGS-3120-24TC:admin#show address_binding nd_snoop binding_entry
Command: show address_binding nd_snoop binding_entry
Total Entries : 2
DGS-3120-24TC:admin#
455
Format
clear address_binding nd_snoop binding_entry ports [<portlist> | all]
Parameters
ports - Specify the list of ports that you would like to clear the ND snoop learned entry.
<portlist> - Enter the list of port used here.
all - Clear all ND snooping learned entries.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear ND snooping entry on ports 1:1-1:3:
DGS-3120-24TC:admin#clear address_binding nd_snoop binding_entry ports 1:1-1:3
Success.
DGS-3120-24TC:admin#
Format
enable address_binding trap_log
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
456
Example
To enable the IMPB traps and logs:
DGS-3120-24TC:admin# enable address_binding trap_log
Command: enable address_binding trap_log
Success.
DGS-3120-24TC:admin#
Format
disable address_binding trap_log
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable IMPB traps and logs:
DGS-3120-24TC:admin# disable address_binding trap_log
Command: disable address_binding trap_log
Success.
DGS-3120-24TC:admin#
Format
config address_binding recover_learning ports [<portlist> | all]
457
Parameters
ports - Specify the list of ports that need to recover the IMPB check.
<portlist> - Enter the list of port used here.
all - Specify that all the ports will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To recover IMPB checking for ports 6 to 7:
DGS-3120-24TC:admin# config address_binding recover_learning ports 6-7
Command: config address_binding recover_learning ports 6-7
Success.
DGS-3120-24TC:admin#
Format
config address_binding dhcp snooping ports [<portlist> | all] limit [rate {<value 1-2048>
mode [drop | shutdown]} | no_limit]
Parameters
<portlist> - Specify list of ports to be configured.
all - Specify to configure all ports.
limit - Specify the reate limit.
rate - The number of DHCP messages that an interface can receive per second.
<value 1-2048> - (Optional) Enter the value between 1 and 2048.
mode - (Optional) Specify the DHCP protection mode. The default is shutdown.
drop - Drop all the above rate limit DHCP packets when the port enters the under
attack state.
shutdown - Shut down the port when the port enters the under attack state.
no_limit – Disable DHCP snooping rate limiting. This is the default.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure limit 10pps DHCP packet on port 1:
458
Success.
DGS-3120-24TC:admin#
Format
config address_binding dhcp snooping recovery_timer [<sec 60-1000000> | infinite]
Parameters
<sec 60-1000000> - Enter a value between 60 and 1000000 for the time interval used by the
auto-recovery mechanism.
infinite - Specify that the port cannot be auto-recovered.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the auto-recovery time as 1000 seconds:
DGS-3120-24TC:admin#config address_binding dhcp snooping recovery_timer 1000
Command: config address_binding dhcp snooping recovery_timer 1000
Success.
DGS-3120-24TC:admin#
459
Format
show ipmc {ipif <ipif_name 12> | protocol [inactive | dvmrp | pim]}
Parameters
ipif - (Optional) Specify the IP Multicast interface that will be displayed.
<ipif_name 12> - Enter the IP Multicast interface name, that will be displayed, here. This
name can be up to 12 characters long.
protocol - (Optional) Specify which kind of routing protocol the interface table will display.
inactive - Specify that the protocol display feature will be inactive
dvmrp - Specify that the DVMRP protocol will be displayed.
pim - Specify that the PIM protocol will be displayed.
Restrictions
None.
Example
To display the IP Multicast interface table:
DGS-3120-24TC:admin#show ipmc
Command: show ipmc
Total Entries: 1
DGS-3120-24TC:admin#
460
Format
show ipmc cache {group <group>} {ipaddress <network_address>}
Parameters
group - (Optional) Specify the multicast group.
<group> - Enter the multicast group value here.
ipaddress - (Optional) Specify the network address used here.
<network_address> - Enter the network address used here.
Restrictions
None.
Example
To display the IP multicast forwarding cache:
DGS-3120-24TC:admin#show ipmc cache
Command: show ipmc cache
Total Entries: 3
DGS-3120-24TC:admin#
461
Format
create ip standard access_list <list_name 16>
Parameters
<list_name16> - Enter the name of the access list.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an access_list named “list1”:
DGS-3120-24TC:admin#create ip standard access_list list1
Command: create ip standard access_list list1
Success.
DGS-3120-24TC:admin#
Format
config ip standard access_list <list_name 16> [add | delete] <network_address> [deny |
permit]
Parameters
<list_name 16> - Enter the name of the access list.
add - Add the entry to the access list.
delete - Delete the entry from the access list.
<network_address> - Enter the network address as the filter condidtion of the access list.
deny - The network matched will be denied.
permit - The network matched will be permitted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add an entry to the access list:
DGS-3120-24TC:admin#config ip standard access_list list1 add 10.10.10.0/24
permit
Command: config ip standard access_list list1 add 10.10.10.0/24 permit
Success.
DGS-3120-24TC:admin#
Format
delete ip standard access_list [list_name <list_name 16> | all]
Parameters
list_name - Specify the name of the access list.
<list_name 16> - Enter the name of the access list.
all - specify to remove all access list.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
463
Example
To delete an access list named by “list1”:
DGS-3120-24TC:admin#delete ip standard access_list list_name list1
Command: delete ip standard access_list list_name list1
Success.
DGS-3120-24TC:admin#
Format
show ip standard access_list {<list_name 16>}
Parameters
<list_name16> - (Optional) Enter the name of the access list.
Restrictions
None.
Example
To display the information of an access list named “list1”:
DGS-3120-24TC:admin#show ip standard access_list list1
Command: show ip standard access_list list1
DGS-3120-24TC:admin#
Format
create route_map <map_name 16>
464
Parameters
<map_name 16> - Enter the route map name.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a route map named map1:
DGS-3120-24TC:admin#create route_map map1
Command: create route_map map1
Success.
DGS-3120-24TC:admin#
Format
config route_map <map_name 16> [[add | delete] sequence <value 1-65535 > {[deny |
permit]} | sequence <value 1-65535> [match [add | delete] [ip [next_hop | address]
<list_name 16> | metric <uint 0-4294967294> | route_type [internal | external | type_1 |
type_2] | interface <ipif_name 12> | route_source <list_name 16>] | set [add | delete]
[next_hop [<ipaddr>] | metric <uint 0-4294967294> | metric_type [type_1 | type_2]]]]
Parameters
<map_name 16> - Enter the name of the route map.
add - Add the specified sequence.
delete - Delete the specified sequence.
sequence - Specify the sequence.
<value 1-65535 > - Enter the sequence number for the route map rule.
deny - (Optional) Deny the route if the rule is matched.
permit- (Optional) Permit the route if the rule is matched.
sequence - Specify the sequence.
<value 1-65535> - Enter the sequence number for the route map rule.
match - Specify to configure the macth rules.
add - Add a match rule.
delete - Delete a match rule.
ip - Specify to match IP information.
next_hop - Specify to match the next hop of the routes.
address - Specify to match the routes.
465
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a sequence to the route map:
DGS-3120-24TC:admin#config route_map map1 add sequence 20
Command: config route_map map1 add sequence 20
Success.
DGS-3120-24TC:admin#
Format
delete route_map [map_name <map_name 16> {all_seqence} | all]
Parameters
map_name - Specify the name of the route map.
<mep_name 16> - Enter the route map name.
all_sequence - (Optional) Specify to remove all sequence entries from the route map. The
466
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the route map:
DGS-3120-24TC:admin#delete route_map map_name map1
Command: delete route_map map_name map1
Success.
DGS-3120-24TC:admin#
Format
show route_map {<map_name 16>}
Parameters
<mep_name 16> - (Optional) Enter the route map name.
Restrictions
None.
Example
To display the route map:
467
DGS-3120-24TC:admin#show route_map
Command: show route_map
route_map : map1
--------------------------
sequence : 10 (Permit)
Match clauses:
Set clauses:
-----------------
sequence : 20 (Permit)
Match clauses:
Set clauses:
DGS-3120-24TC:admin#
468
Format
create ip_tunnel <tunnel_name 12>
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IP tunnel interface (with the tunnel name “tn2”):
DGS-3120-24TC:admin#create ip_tunnel tn2
Command: create ip_tunnel tn2
Success.
DGS-3120-24TC:admin#
469
Format
delete ip_tunnel <tunnel_name 12>
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an IP tunnel interface (with the tunnel name “tn2”):
DGS-3120-24TC:admin#delete ip_tunnel tn2
Command: delete ip_tunnel tn2
Success.
DGS-3120-24TC:admin#
Format
config ip_tunnel manual <tunnel_name 12> {ipv6address <ipv6networkaddr> | source
<ipaddr> | destination <ipaddr>}(1)
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
ipv6address - (Optional) Specify the IPv6 address assigned to the IPv6 tunnel interface. IPv6
processing becomes enabled on the IPv6 tunnel interface when an IPv6 address is
configured. The IPv6 address is not connected with the tunnel source or the destination IPv4
470
address.
<ipv6networkaddr> - Enter the IPv6 address used here.
source - (Optional) Specify the source IPv4 address of the IPv6 tunnel interface. It is used as the
source address for packets in the IPv6 tunnel.
<ipaddr> - Enter the IPv4 source address used here.
destination - (Optional) Specify the destination IPv4 address of the IPv6 tunnel interface. It is
used as the destination address for packets in the IPv6 tunnel. It is not required for 6to4 and
ISATAP tunnels.
<ipaddr> - Enter the IPv4 destination address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an IPv6 manual tunnel (Tunnel name is “tn2”, Tunnel source IPv4 address is 1.0.0.1,
Tunnel destination IPv4 address is 1.0.0.2, Tunnel IPv6 address is 2001::1/64):
DGS-3120-24TC:admin# config ip_tunnel manual tn2 source 1.0.0.1 destination
1.0.0.2 ipv6address 2001::1/64
Command: config ip_tunnel manual tn2 source 1.0.0.1 destination 1.0.0.2
ipv6address 2001::1/64
Success.
DGS-3120-24TC:admin#
Format
config ip_tunnel 6to4 <tunnel_name 12> {ipv6address <ipv6networkaddr> | source
<ipaddr>}(1)
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
ipv6address - (Optional) Specify the IPv6 address assigned to this IPv6 tunnel interface. IPv6
processing will be enabled on this IPv6 tunnel interface as soon as its IPv6 address is
471
configured. The 32 bits following the initial 2002::/16 prefix correspond to an IPv4 address
assigned to the tunnel source.
<ipv6networkaddr> - Enter the IPv6 address used here.
source - (Optional) Specify the IPv4 source address for a packet sent to the remote end of the
6to4 tunnel. The IPv4 destination address for the packet is derived from the IPv6 destination
address of the remote destination, which is in the format of a 6to4 address. The address is
derived by extracting the 4-octets immediately following the IPv6 destination address's
2002::/16 prefix. For example, a 6to4 address, 2002:c0a8:0001::/48 will be extracted to
192.168.0.1. Any IPv6 address that begins with the 2002::/16 prefix is known as a 6to4
address
<ipaddr> - Enter the IPv4 source address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an IPv6 6to4 tunnel (Tunnel name is “tn2”, Tunnel source IPv4 address is 10.0.0.1,
Tunnel IPv6 address is 2002:a00:1::1/64):
DGS-3120-24TC:admin#config ip_tunnel 6to4 tn2 ipv6address 2002:A00:1::1/64
source 10.0.0.1
Command: config ip_tunnel 6to4 tn2 ipv6address 2002:A00:1::1/64 source 10.0.0.1
Success.
DGS-3120-24TC:admin#
Format
config ip_tunnel isatap <tunnel_name 12> {ipv6address <ipv6networkaddr> | source
<ipaddr>}(1)
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
ipv6address - (Optional) Specify the IPv6 address assigned to this IPv6 tunnel interface. IPv6
processing will be enabled on the IPv6 tunnel interface when an IPv6 address is configured.
The last 32 bits of the IPv6 ISATAP address correspond to an IPv4 address assigned to the
tunnel source.
472
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an IPv6 ISATAP tunnel (Tunnel name is “tn2”, Tunnel source IPv4 address is
10.0.0.1, Tunnel IPv6 address is 2001::5efe:a00:1/64):
DGS-3120-24TC:admin#config ip_tunnel isatap tn2 ipv6address 2001::5EFE:A00:1/64
source 10.0.0.1
Command: config ip_tunnel isatap tn2 ipv6address 2001::5EFE:A00:1/64 source
10.0.0.1
Success.
DGS-3120-24TC:admin#
Format
config ip_tunnel gre <tunnel_name 12> {ipaddress <network_address> | ipv6address
<ipv6networkaddr> | source [<ipaddr> | <ipv6addr>] | destination [<ipaddr> | <ipv6addr>]}(1)
Parameters
<tunnel_name 12> - Enter the IP tunnel interface name used here. This name can be up to 12
characters long.
ipaddress - (Optional) Specify the IPv4 address assigned to the GRE tunnel interface. IPv4
processing will be enabled on the IPv4 tunnel interface when an IPv4 address is configured.
This IPv4 address is not connected with the tunnel source or destination IPv4 address.
<network_address> - Enter the IPv4 network address.
ipv6address - (Optional) Specify the IPv6 address assigned to the GRE tunnel interface. IPv6
processing will be enabled on the IPv6 tunnel interface when an IPv6 address is configured.
This IPv6 address is not connected with the tunnel source or destination IPv4 address.
<ipv6networkaddr> - Enter the IPv6 network address.
source - (Optional) Specify the source address of the GRE tunnel interface. It is used as the
source address for packets in the tunnel.
<ipaddr> - Enter the IPv4 source address.
<ipv6addr> - Enter the IPv6 source address.
473
destination - (Optional) Specify the destination address of the GRE tunnel interface. It is used as
the destination address for packets in the tunnel.
<ipaddr> - Enter the IPv4 destination address.
<ipv6addr> - Enter the IPv6 destination address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a GRE tunnel (tunnel with: the name “tn1”, the delivery protocol as IPv4, the tunnel
source IPv4 address 1.0.0.1, the tunnel destination IPv4 address 1.0.0.2, the GRE tunnel
interface’s IPv6 address 2001::1/64, and the GRE tunnel interface’s IPv4 address 2.0.0.1/8):
DGS-3120-24TC:admin#config ip_tunnel gre tn1 source 1.0.0.1 destination 1.0.0.2
Command: config ip_tunnel gre tn1 source 1.0.0.1 destination 1.0.0.2
Success.
Success.
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
Format
show ip_tunnel {<tunnel_name 12>}
474
Parameters
<tunnel_name 12> - (Optional) Enter the IP tunnel interface name used here. This name can be
up to 12 characters long.
Restrictions
None.
Example
To show an IP tunnel interface’s information (Tunnel name is “tn2”):
DGS-3120-24TC:admin#show ip_tunnel tn2
Command: show ip_tunnel tn2
DGS-3120-24TC:admin#
Format
enable ip_tunnel {<tunnel_name 12>}
Parameters
<tunnel_name 12> - (Optional) Enter the IP tunnel interface name used here. This name can be
up to 12 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable an IP tunnel interface (Tunnel name is “tn2”):
475
Success.
DGS-3120-24TC:admin#
Format
disable ip_tunnel {<tunnel_name 12>}
Parameters
<tunnel_name 12> - (Optional) Enter the IP tunnel interface name used here. This name can be
up to 12 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable an IP tunnel interface (Tunnel name is “tn2”):
DGS-3120-24TC:admin#disable ip_tunnel tn2
Command: disable ip_tunnel tn2
Success.
DGS-3120-24TC:admin#
476
Format
create ipv6 neighbor_cache ipif <ipif_name 12> <ipv6addr> <macaddr>
Parameters
ipif - Specify the interface’s name.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
<ipv6addr> - The address of the neighbor.
<macaddr> - The MAC address of the neighbor.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Create a static neighbor cache entry:
DGS-3120-24TC:admin# create ipv6 neighbor_cache ipif System 3ffc::1 00-01-02-
03-04-05
Command: create ipv6 neighbor_cache ipif System 3ffc::1 00-01-02-03-04-05
Success.
DGS-3120-24TC:admin#
477
Format
delete ipv6 neighbor_cache ipif [<ipif_name 12> | all] [<ipv6addr> | static | dynamic | all]
Parameters
ipif - Specify the IPv6 interface name.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
all - Specify that all the interfaces will be used in this configuration.
<ipv6addr> - The neighbor’s address.
static - Delete the static entry.
dynamic - Delete those dynamic entries.
all - All entries include static and dynamic entries will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Delete a neighbor cache.entry on IP interface “System”:
DGS-3120-24TC:admin# delete ipv6 neighbor_cache ipif System 3ffc::1
Command: delete ipv6 neighbor_cache ipif System 3FFC::1
Success.
DGS-3120-24TC:admin#
Format
show ipv6 neighbor_cache ipif [<ipif_name 12> | all] [ipv6address <ipv6addr> | static |
dynamic | all]
478
Parameters
ipif - Specify the IPv6 interface name
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
all - Specify that all the interface will be displayed.
ipv6address - The neighbor’s address.
<ipv6addr> - Enter the IPv6 address here.
static - Static neighbor cache entry.
dynamic - Dynamic entries.
all - All entries include static and dynamic entries.
Restrictions
None
Example
Show all neighbor cache entries of IP interface “System”:
DGS-3120-24TC:admin#show ipv6 neighbor_cache ipif System all
Command: show ipv6 neighbor_cache ipif System all
Total Entries: 1
DGS-3120-24TC:admin#
Format
config ipv6 nd ns ipif <ipif_name 12> retrans_time <millisecond 0-4294967295>
Parameters
ipif - The IPv6 interface name
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
retrans_time - Neighbor solicitation’s re-transmit timer in millisecond.
<millisecond 0-4294967295> - Enter the re-transmit timer value here. This value must be
between 0 and 4294967295 milliseconds.
479
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the retrans_time of IPv6 ND neighbor solicitation:
DGS-3120-24TC:admin# config ipv6 nd ns ipif Zira retrans_time 1000000
Command: config ipv6 nd ns ipif Zira retrans_time 1000000
Success.
DGS-3120-24TC:admin#
Format
show ipv6 nd {ipif <ipif_name 12>}
Parameters
ipif – (Optional) The name of the interface.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
If no IP interface is specified, it will show the IPv6 ND related configuration of all interfaces.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To show IPv6 ND related configuration:
DGS-3120-24TC:admin#show ipv6 nd ipif System
Command: show ipv6 nd ipif System
DGS-3120-24TC:admin#
480
Format
config ipv6 nd ra ipif <ipif_name 12> {state [enable | disable] | life_time <sec 0-9000> |
reachable_time <millisecond 0-3600000> | retrans_time <millisecond 0-4294967295> |
hop_limit <value 0-255> | managed_flag [enable | disable] | other_config_flag [enable |
disable] | min_rtr_adv_interval <sec 3-1350> | max_rtr_adv_interval <sec 4-1800>}(1)
Parameters
<ipif_name 12> - Specify the name of the interface.
state - Specify the router advertisement status.
enable - Enable the router advertisement state.
disable - Disable the router advertisement state.
life_time - Specify the lifetime of the router as the default router, in seconds.
<sec 0-9000> - Specify the time between 0 and 9000 seconds.
reachable_time - Specify the amount of time that a node can consider a neighboring node
reachable after receiving a reachability confirmation, in milliseconds.
<millisecond 0-3600000> - Specify the time between 0 and 3600000 milliseconds.
retrans_time - Specify the amount of time that a node can consider a neighboring node
reachable after receiving a reachability confirmation, in milliseconds.
<millisecond 0-4294967295> - Specify the time between 0 and 4294967295 milliseconds.
hop_limit - Specify the default value of the hop limit field in the IPv6 header for packets sent by
hosts that receive this RA message.
<value 0-255> - Specify the value between 0 and 255.
managed_flag - Specify to enable or disable the function.
enable - When set to enable, it indicates that hosts receiving this RA must use a stateful
address configuration protocol to obtain an address, in addition to the addresses derived
from the stateless address configuration.
disable - Set to disable to stop hosts receiving the RA from using a stateful address
configuration to obtain an address.
other_config_flag - Specify to enable or disable the function.
enable - When set to enable, it indicates that hosts receiving this RA must use a stateful
address configuration protocol to obtain on-address configuration information.
disable - Set to disable to stop hosts receiving this RA from using a stateful address
configuration protocol to obtain on-address configuration information.
min_rtr_adv_interval - Specify the minimum time allowed between sending unsolicited multicast
Router Advertisements from the interface, in seconds. It must be no less than 3 seconds and
no greater than .75 * MaxRtrAdvInterval. The default is 0.33 * MaxRtrAdvInterval.
<sec 3-1350> - Specify the time between 3 and 1350 seconds.
max_rtr_adv_interval - Specify the maximum time allowed between sending unsolicited
multicast Router Advertisements from the interface, in seconds. It must be no less than 4
seconds and no greater than 1800 seconds. The default is 600 seconds.
<sec 4-1800> - Specify the time between 4 and 1800 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the RA state as enabled and the life_time of the “System” interface to be 1000
seconds:
481
Success.
DGS-3120-24TC:admin#
Format
config ipv6 nd ra prefix_option ipif <ipif_name 12> <ipv6networkaddr> {preferred_life_time
<sec 0-4294967295> | valid_life_time <sec 0-4294967295> | on_link_flag [enable | disable] |
autonomous_flag [enable | disable]}(1)
Parameters
<ipif_name 12> - Specify the name of the interface. The maximum length is 12 characters.
<ipv6networkaddr> - Specify the IPv6 network address.
preferred_life_time - Specify the number in milliseconds that an address, based on the specified
prefix using the stateless address configuration, remains in preferred state.
<sec 0-4294967295> - Specify the time between 0 and 4294967295 milliseconds. For an
infinite valid lifetime the value can be set to 4294967295.
valid_life_time - Specify the number of seconds that an address, based on the specified prefix,
using the stateless address configuration, remains valid.
<sec 0-4294967295> - Specify the time between 0 and 4294967295 milliseconds. For an
infinite valid lifetime the value can be set to 4294967295.
on_link_flag - Specify to enable or disable the function.
enable - Setting this field to enable will denote, within the IPv6 packet, that the IPv6 prefix
configured here is assigned to this link-local network. Once traffic has been successfully
sent to these nodes with this specific IPv6 prefix, the nodes will be considered reachable
on the link-local network.
disable - When set to disable, the addresses implied by the specified prefix are not available
on the link where the RA message is received.
autonomous_flag - Specify to enable or disable the function.
enable - Setting this field to enable will denote that this prefix may be used to autoconfigure
IPv6 addresses on the link-local network.
disable - When set to disable, the specified prefix will not be used to create an autonomous
address configuration.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the value of the preferred_life_time of prefix option to be 1000 seconds for the prefix
3ffe:501:ffff:100::/64, which is the prefix of the ip1 interface:
482
Success.
DGS-3120-24TC:admin#
483
Format
create ipv6route [default | <ipv6networkaddr>] [[<ipif_name 12> <ipv6addr> | <ipv6addr>]
{<metric 1-65535>} {[primary|backup]} | ip_tunnel <tunnel_name 12>]
Parameters
default - Specify the default route.
<ipv6networkaddr> - Specify the destination network of the route.
<ipif_name 12> - Specify the interface for the route. This name can be up to 12 characters long.
<ipv6addr> - Specify the next hop address for this route.
<ipv6addr> - Specify the next hop address for this route.
<metric 1-65535> - (Optional) Enter the metric value here. The default setting is 1. This value
must between 1 and 65535.
primary - (Optional) Specify the route as the primary route to the destination.
backup - (Optional) Specify the route as the backup route to the destination. The backup route
can only be added when the primary route exists. If the route is not specified as the primary
route or the backup route, then it will be auto-assigned by the system. The first created is the
primary, the second created is the backup.
ip_tunnel - Specify the IP tunnel interface of the route.
<tunnel_name 12> - Enter the IP tunnel interface name.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IPv6 route:
484
Success.
DGS-3120-24TC:admin#
Format
delete ipv6route [[default | <ipv6networkaddr>] [<ipif_name 12> <ipv6addr> | <ipv6addr> |
ip_tunnel <tunnel_name 12>] | all]
Parameters
default - Specify the default route.
<ipv6networkaddr> - The destination network of the route.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12 characters
long.
<ipv6addr> - Specify the next hop address for the route.
<ipv6addr> - Specify the next hop address for the route.
ip_tunnel - Specify the IP tunnel interface of the route.
<tunnel_name 12> - Enter the IP tunnel interface name.
all - Specify to delete all created static routes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Delete an IPv6 static route:
DGS-3120-24TC:admin#delete ipv6route default System 3FFC::1
Command: delete ipv6route default System 3FFC::1
Success.
DGS-3120-24TC:admin#
485
Format
show ipv6route {[<ipv6networkaddr> | <ipv6addr>]} {[static | ripng | ospfv3 | hardware]
Parameters
None.
Restrictions
<ipv6networkaddr> - (Optional) The destination network of the route.
<ipv6addr> - (Optional) Specify the destination 128-bit length IPv6 address to be displayed.
static - (Optional) Specify to display only the static route entries.
ripng - (Optional) Specify to display only the RIPng route entries.
ospfv3 - (Optional) Specify to display only the OSPFv3 route entries.
hardware - (Optional) Specify to display only the route entries which have been wrote into
hardware table.
Example
Show all the IPv6 routes:
DGS-3120-24PC:admin#show ipv6route
Command: show ipv6route
Total Entries: 5
DGS-3120-24TC:admin#
486
487
Using the JWAC function, PC users need to pass two stages of authentication. The first stage is to
do the authentication with the quarantine server and the second stage is the authentication with
the Switch. For the second stage, the authentication is similar to WAC, except that there is no port
VLAN membership change by JWAC after a host passes authentication. The RADIUS server will
share the server configuration defined by the 802.1X command set.
Format
enable jwac
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable JWAC:
DGS-3120-24TC:admin#enable jwac
Command: enable jwac
Success.
DGS-3120-24TC:admin#
Format
disable jwac
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
488
DGS-3120-24TC:admin#disable jwac
Command: disable jwac
Success.
DGS-3120-24TC:admin#
Format
config jwac [quarantine_server_url [<string 128> | ipv6 <string 128>] |
clear_quarantine_server_url {ipv6}]
Parameters
quarantine_server_url - Specify the entire URL of the authentication page on the quarantine
server.
<string 128> - Specify the entire URL of the authentication page on the quarantine server.
The quarantine server URL can be up to 128 characters long.
ipv6 - Specify the entire URL of authentication page on Quarantine Server of IPv6. (EI Mode
Only)
<string 128> - The quarantine server URL can be up to 128 characters long.
clear_quarantine_server_url - Specify to clear the current quarantine server URL.
ipv6 – (Optional) Clear the Quarantine Server URL of IPv6. (EI Mode Only)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the quarantine server URL:
DGS-3120-24TC:admin# config jwac quarantine_server_url
http://10.90.90.88/authpage.html
Command: config jwac quarantine_server_url http://10.90.90.88/authpage.html
Success.
DGS-3120-24TC:admin#
489
Format
show jwac
Parameters
None.
Restrictions
None.
Example
To display the current JWAC configuration:
DGS-3120-24TC:admin#show jwac
Command: show jwac
State : Disabled
Enabled Ports :
Virtual IP/URL : 0.0.0.0/-
Virtual IPv6/URL : ::/-
Switch HTTP Port : 80 (HTTP)
UDP Filtering : Enabled
Forcible Logout : Enabled
Redirect State : Enabled
Redirect Delay Time : 1 Seconds
Redirect Destination : Quarantine Server
Quarantine Server :
Quarantine Server IPv6 :
Q-Server Monitor : Disabled
Q-Server Error Timeout : 30 Seconds
RADIUS Auth-Protocol : PAP
RADIUS Authorization : Enabled
Local Authorization : Enabled
Function Version : 2.11
DGS-3120-24TC:admin#
490
URL. When redirect jwac_login_page is enabled, the unauthenticated host will be redirected to
the jwac_login_page on the Switch to finish authentication.
When enable redirect to quarantine server is in effect, a quarantine server must be configured first.
Format
enable jwac redirect
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Success.
DGS-3120-24TC:admin#
Format
disable jwac redirect
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable JWAC redirect:
491
Success.
DGS-3120-24TC:admin#
Format
config jwac redirect {destination [quarantine_server | jwac_login_page] | delay_time <sec 0-
10>}(1)
Parameters
destination - Specify the destination which the unauthenticated host will be redirected to.
quarantine_server - Specify the unauthenticated host will be redirected to the
quarantine_server.
jwac_login_page - Specify the unauthenticated host will be redirected to the
jwac_login_page.
delay_time - Specify the time interval after which the unauthenticated host will be redirected.
<sec 0-10> - Specify the time interval after which the unauthenticated host will be redirected.
The delay time must be between 0 and 10 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure JWAC redirect destination to JWAC login web page and a delay time of 5 seconds:
DGS-3120-24TC:admin#config jwac redirect destination jwac_login_page delay_time
5
Command: config jwac redirect destination jwac_login_page delay_time 5
Success.
DGS-3120-24TC:admin#
Format
enable jwac forcible_logout
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable JWAC forcible logout:
DGS-3120-24TC:admin#enable jwac forcible_logout
Command: enable jwac forcible_logout
Success.
DGS-3120-24TC:admin#
Format
disable jwac forcible_logout
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable JWAC forcible logout:
493
Success.
DGS-3120-24TC:admin#
Format
enable jwac udp_filtering
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable JWAC UDP filtering:
DGS-3120-24TC:admin#enable jwac udp_filtering
Command: enable jwac udp_filtering
Success.
DGS-3120-24TC:admin#
Format
disable jwac udp_filtering
Parameters
None.
494
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable JWAC UDP filtering:
DGS-3120-24TC:admin#disable jwac udp_filtering
Command: disable jwac udp_filtering
Success.
DGS-3120-24TC:admin#
Format
enable jwac quarantine_server_monitor
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable JWAC quarantine server monitoring:
DGS-3120-24TC:admin#enable jwac quarantine_server_monitor
Command: enable jwac quarantine_server_monitor
Success.
DGS-3120-24TC:admin#
495
Format
disable jwac quarantine_server_monitor
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable JWAC quarantine server monitoring:
DGS-3120-24TC:admin#disable jwac quarantine_server_monitor
Command: disable jwac quarantine_server_monitor
Success.
DGS-3120-24TC:admin#
Format
config jwac quarantine_server_error_timeout <sec 5-300>
Parameters
<sec 5-300> - Specify the error timeout interval.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
496
Example
To set the quarantine server error timeout:
DGS-3120-24TC:admin#config jwac quarantine_server_error_timeout 60
Command: config jwac quarantine_server_error_timeout 60
Success.
DGS-3120-24TC:admin#
Format
config jwac virtual_ip [<ipaddr> | <ipv6addr>] {url [<string 128> | clear]}
Parameters
<ipaddr> - Specify the IP address of the virtual IP.
<ipv6addr> - Specify the Ipv6 address of the virtual IP. (EI Mode Only)
url - (Optional) Specify the URL of the virtual IP.
<string 128> - Specify the URL of the virtual IP.
clear - Clear the URL of the virtual IP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a JWAC virtual IP address of 1.1.1.1 to accept authentication requests from an
unauthenticated host:
DGS-3120-24TC:admin# config jwac virtual_ip 1.1.1.1
Command: config jwac virtual_ip 1.1.1.1
Success.
DGS-3120-24TC:admin#
497
need to be able to have access to accomplish authentication. Before the client passes
authentication, it should be added to the Switch with its IP address. For example, the client may
need to access update.microsoft.com or some sites of the Anti-Virus software companies to check
whether the OS or Anti-Virus software of the client are the latest; and so IP addresses of
update.microsoft.com and of Anti-Virus software companies need to be added in the Switch.
Format
config jwac update_server [add | delete] [ipaddress <network_address> | ipv6address
<ipv6networkaddr>] {[tcp_port <port_number 1-65535> | udp_port <port_number 1-65535>]}
Parameters
add - Specify to add a network address to which the traffic will not be blocked. Up to 100 network
addresses can be added.
delete - Specify to delete a network address to which the traffic will not be blocked.
ipaddress - Specify the network address to add or delete.
<network_address> - Enter the network address here.
ipv6address - Specify the IPv6 network address for the update server network. (EI Mode Only)
<ipv6networkaddr> - To set a specific IPv6 network address, use “/” to separate the IPv6
address and the number of network mask bits. If TCP port or UDP port number is not
specified, all TCP/UDP ports are accessible.
tcp_port - (Optional) Specify a TCP port number between 1 and 65535.
<port_number 1-65535> - Specify a TCP port value between 1 and 65535.
udp_port - (Optional) Specify a UDP port number between 1 and 65535.
<port_number 1-65535> - Specify a UDP port value between 1 and 65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the update servers:
DGS-3120-24TC:admin#config jwac update_server add ipv6address 3000::1/32
Command: config jwac update_server add ipv6address 3000::1/32
Success.
DGS-3120-24TC:admin#
498
Format
config jwac switch_http_port <tcp_port_number 1-65535> {[http | https]}
Parameters
<tcp_port_number 1-65535> - Specify a TCP port which the JWAC switch listens to and uses to
finish the authenticating process.
http - (Optional) Specify the JWAC run HTTP protocol on this TCP port.
https - (Optional) Specify the JWAC run HTTPS protocol on this TCP port.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the TCP port which the JWAC switch listens to:
DGS-3120-24TC:admin# config jwac switch_http_port 8888 http
Command: config jwac switch_http_port 8888 http
Success.
DGS-3120-24TC:admin#
Format
config jwac ports [<portlist> | all] { state [enable | disable] | max_authenticating_host <value
0-50> | aging_time [infinite | <min 1-1440>] | idle_time [infinite | <min 1-1440>] | block_time
[<sec 0-300>]}(1)
Parameters
<portlist> - Specify a port range for setting the JWAC state.
all - Specify to configure all switch ports’ JWAC state.
state - Specify the port state of JWAC.
enable - Specify to enable the JWAC port state.
disable - Specify to disable the JWAC port state.
max_authenticating_host - Specify the maximum number of hosts that can process
authentication on each port at the same time. The default value is 50.
<value 0-50> - Specify the maximum number of authenticating hosts, between 0 and 50.
aging_time - Specify a time period during which an authenticated host will keep in authenticated
state.
infinite - Specify to indicate the authenticated host on the port will never ageout.
<min 1-1440> - Specify an aging time between 1 and 1440 minutes. The default value is 1440
minutes.
idle_time - If there is no traffic during idle time, the host will be moved back to unauthenticated
499
state.
infinite - Specify to indicate the idle state of the authenticated host on the port will never be
checked. The default value is infinite.
<min 1-1440> - Specify an idle time between 1 and 1440 minutes.
block_time - If a host fails to pass the authentication, it will be blocked for a period specified by
the blocking time.The default value is 60 seconds.
<sec 0-300> - Specify a blocking time value between 0 and 300.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the JWAC port state:
DGS-3120-24TC:admin# config jwac ports 1-9 state enable
Command: config jwac ports 1-9 state enable
Success.
DGS-3120-24TC:admin#
Format
show jwac ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a port range to show the configuration of JWAC.
Restrictions
None.
Example
To display JWAC ports 1 to 4:
500
DGS-3120-24TC:admin#
Format
config jwac radius_protocol [local | eap_md5 | pap | chap | ms_chap | ms_chapv2]
Parameters
local - Specify the JWAC switch uses the local user DB to complete the authentication.
eap_md5 - Specify the JWAC switch uses EAP MD5 to communicate with the RADIUS server.
pap - Specify the JWAC switch uses PAP to communicate with the RADIUS server.
chap - Specify the JWAC switch uses CHAP to communicate with the RADIUS server.
ms_chap - Specify the JWAC switch uses MS-CHAP to communicate with the RADIUS server.
ms_chapv2 - Specify the JWAC switch uses MS-CHAPv2 to communicate with the RADIUS
server.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the RADIUS protocol used by JWAC:
DGS-3120-24TC:admin#config jwac radius_protocol ms_chapv2
Command: config jwac radius_protocol ms_chapv2
Success.
DGS-3120-24TC:admin#
501
Format
create jwac user <username 15> {vlan <vlanid 1-4094>}
Parameters
<username 15> - Specify the user name to be created.
vlan - (Optional) Specify the target VLAN ID for the authenticated host which uses this user
account to pass authentication.
<vlanid 1-4094> - Specify the target VLAN ID for the authenticated host which uses this user
account to pass authentication. The VLAN ID value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a JWAC user in the local database:
DGS-3120-24TC:admin#create jwac user 112233
Command: create jwac user 112233
DGS-3120-24TC:admin#
Format
config jwac user <username 15> {vlan <vlanid 1-4094>}
Parameters
<username 15> - Specify the user name to be configured.
vlan - (Optional) Specify the target VLAN ID for the authenticated host which uses this user
account to pass authentication.
<vlanid 1-4094> - Specify the target VLAN ID for the authenticated host which uses this user
account to pass authentication. The VLAN ID value must be between 1 and 4094.
502
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a JWAC user:
DGS-3120-24TC:admin#config jwac user 112233
Command: config jwac user 112233
DGS-3120-24TC:admin#
Format
delete jwac [user <username 15> | all_users]
Parameters
user - Specify the user name to be deleted.
<username 15> - Specify the user name to be deleted. The user name can be up to 15
characters long.
all_users - Specify all user accounts in the local database will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a JWAC user from the local database:
DGS-3120-24TC:admin#delete jwac user 112233
Command: delete jwac user 112233
Success.
DGS-3120-24TC:admin#
503
Format
show jwac user
Parameters
None.
Restrictions
None.
Example
To display the current JWAC local users:
DGS-3120-24TC:admin#show jwac user
Command: show jwac user
Total Entries:2
DGS-3120-24TC:admin#
Format
clear jwac auth_state [ports [all | <portlist>] {authenticated | authenticating | blocked} |
mac_addr <macaddr>]
Parameters
ports - Specify the port range to delete hosts on.
all - Specify to delete all ports.
<portlist> - Specify range of ports to delete.
authenticated - (Optional) Specify the state of host to delete.
504
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete authentication entries:
DGS-3120-24TC:admin#clear jwac auth_state ports all blocked
Command: clear jwac auth_state ports all blocked
Success.
DGS-3120-24TC:admin#
Format
show jwac auth_state ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a port range to show the JWAC authentication entries.
If no port is specified, the JWAC authentication state will be displayed for all ports.
Restrictions
None.
Example
To display JWAC authentication entries for ports 1 to 2:
505
DGS-3120-24TC:admin#
Format
config jwac authorization attributes {radius [enable | disable] | local [enable | disable]}(1)
Parameters
radius - If specified to enable, the authorized data assigned by the RADUIS server will be
accepted if the global authorization network is enabled.The default state is enabled.
enable - Specify to enable authorized data assigned by the RADUIS server to be accepted.
disable - Specify to disable authorized data assigned by the RADUIS server from being
accepted.
local - If specified to enable, the authorized data assigned by the local database will be accepted
if the global authorization network is enabled. The default state is enabled.
enable - Specify to enable authorized data assigned by the local database to be accepted.
disable - Specify to disable authorized data assigned by the local database from being
accepted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
506
Example
To disable the configuration authorized from the local database:
DGS-3120-24TC:admin#config jwac authorization attributes local disable
Command: config jwac authorization attributes local disable
Success.
DGS-3120-24TC:admin#
Format
show jwac update_server
Parameters
None.
Restrictions
None.
Example
To display the JWAC update server:
DGS-3120-24TC:admin# show jwac update_server
Command: show jwac update_server
DGS-3120-24TC:admin#
507
Format
config jwac authentication_page element [japanese | english] [default | page_title <desc
128> | login_window_title <desc 32> | user_name_title <desc 16> | password_title <desc 16>
| logout_window_title <desc 32> | notification_line <value 1-5> <desc 128>]
Parameters
japanese - Specify to change to the Japanese page.
english - Specify to change to the English page.
default - Specify to reset the page element to default.
page_title - Specify the title of the authenticate page.
<desc 128> - Specify the title of the authenticate page. The page title description can be up to
128 characters long.
login_window_title - Specify the login window title of the authenticate page.
<desc 32> - Specify the login window title of the authenticate page. The login window title
description can be up to 32 characters long.
user_name_title - Specify the user name title of the authenticate page.
<desc 16> - Specify the user name title of the authenticate page. The user name title
description can be up to 16 characters long.
password_title - Specify the password title of the authenticate page.
<desc 16> - Specify the password title of the authenticate page. The password title
description can be up to 16 characters long.
logout_window_title - Specify the logout windown title mapping of the authenticate page.
<desc 32> - Specify the logout windown title mapping of the authenticate page. The logout
window title description can be up to 32 characters long.
notification_line - Specify this parameter to set the notification information by line in
authentication Web pages.
<value 1-5> - Specify a notification line value between 1 and 5.
<desc 128> - Specify a notification line description up to 128 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To customize the authenticate page:
DGS-3120-24TC:admin# config jwac authentication_page element japanese
page_title "ディーリンクジャパン株式会社" login_window_title "JWAC 认证"
user_name_title "ユーザ名" password_title "パスワード" logout_window_title "ログアウ
ト"
Command: config jwac authentication_page element japanese page_title "ディーリン
クジャパン株式会社" login_window_title "JWAC 认证" user_name_title "ユーザ名"
password_title "パスワード" logout_window_title "ログアウト"
Success.
DGS-3120-24TC:admin#
Format
config jwac authenticate_page [japanese | english]
Parameters
japanese - Specify to change to the Japanese page.
english - Specify to change to the English page. This is the default page.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To customize the authenticate page:
DGS-3120-24TC:admin#config jwac authenticate_page japanese
Command: config jwac authenticate_page japanese
Success.
DGS-3120-24TC:admin#
Format
show jwac authenticate_page
Parameters
None.
Restrictions
None.
Example
To display the element mapping of the customized authenticate page:
509
510
Format
enable jumbo_frame
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the Jumbo frame:
DGS-3120-24TC:admin# enable jumbo_frame
Command: enable jumbo_frame
DGS-3120-24TC:admin#
Format
disable jumbo_frame
511
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the Jumbo frame:
DGS-3120-24TC:admin# disable jumbo_frame
Command: disable jumbo_frame
Success.
DGS-3120-24TC:admin#
Format
show jumbo_frame
Parameters
None.
Restrictions
None.
Example
To show the Jumbo frame:
DGS-3120-24TC:admin#show jumbo_frame
Command: show jumbo_frame
DGS-3120-24TC:admin#
512
Format
enable l2protocol_tunnel
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the Layer 2 protocol tunneling function:
DGS-3120-24TC:admin#enable l2protocol_tunnel
Command: enable l2protocol_tunnel
Success.
DGS-3120-24TC:admin#
Format
disable l2protocol_tunnel
513
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the Layer 2 protocol tunneling function:
DGS-3120-24TC:admin#disable l2protocol_tunnel
Command: disable l2protocol_tunnel
Success.
DGS-3120-24TC:admin#
Format
config l2protocol_tunnel ports [<portlist> | all] type [uni tunneled_protocol [{stp | gvrp |
protocol_mac [01-00-0C-CC-CC-CC | 01-00-0C-CC-CC-CD]}(1) | all] {threshold <value 0-
65535>} | nni | none]
Parameters
<portlist> - Specify a list of ports on which the Layer 2 protocol tunneling to be configured.
all – Specify to have all ports to be configured
type - Specify the type of the ports.
uni - Specify the ports as UNI ports.
tunneled_protocol - Specify tunneled protocols on the UNI ports.
stp - Specify to use the STP protocol.
gvrp - Specify to use the GVRP protocol.
protocol_mac - Specify the destination MAC address of the L2 protocol packets that
will tunneled on these UNI ports.
01-00-0C-CC-CC-CC - Specify the MAC address as 01-00-0C-CC-CC-CC.
514
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the STP tunneling on ports 1-4:
DGS-3120-24TC:admin#config l2protocol_tunnel ports 1:1-1:4 type uni
tunneled_protocol stp
Command: config l2protocol_tunnel ports 1:1-1:4 type uni tunneled_protocol stp
Success.
DGS-3120-24TC:admin#
Format
show l2protocol_tunnel {[uni | nni]}
Parameters
uni - (Optional) Specify to show UNI detail information, include tunneled and dropped PDU
statistic.
nni - (Optional) Specify to show NNI detail information, include de-capsulated Layer 2 PDU
statistic.
Restrictions
None.
Example
To show Layer 2 protocol tunneling information summary:
515
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
516
Format
create link_aggregation group_id <value 1-32> {type [lacp | static]}
Parameters
group_id - Specify the group id. The number of link aggregation groups is project dependency.
The group number identifies each of the groups.
<value 1-32> - Enter the group ID value here. This value must be between 1 and 32.
type - (Optional) Specify the group type is belong to static or LACP. If type is not specified, the
default is static type.
lacp - Specify to use LACP as the group type.
static - Specify to use static as the group type.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create link aggregation group:
DGS-3120-24TC:admin# create link_aggregation group_id 1 type lacp
Command: create link_aggregation group_id 1 type lacp
Success.
DGS-3120-24TC:admin#
517
Format
delete link_aggregation group_id <value 1-32>
Parameters
group_id - Specify the group id. The number of link aggregation groups is project dependency.
The group number identifies each of the groups.
<value 1-32> - Enter the group ID value here. This value must be between 1 and 32.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete link aggregation group:
DGS-3120-24TC:admin# delete link_aggregation group_id 3
Command: delete link_aggregation group_id 3
Success.
DGS-3120-24TC:admin#
Format
config link_aggregation group_id <value 1-32> {master_port <port> | ports <portlist> | state
[enable | disable] | trap [enable | disable]}
Parameters
group_id - Specify the group id. The group number identifies each of the groups.
<value 1-32> - Enter the group ID value here. This value must be between 1 and 32.
master_port - (Optional) Master port ID. Specify which port (by port number) of the link
aggregation group will be the master port. All of the ports in a link aggregation group will share
the port configuration with the master port.
<port> - Enter the master port number here.
ports - (Optional) Specify a range of ports that will belong to the link aggregation group. The port
list is specified by listing the lowest switch number and the beginning port number on that
switch, separated by a colon. Then highest switch number, and the highest port number of the
range (also separated by a colon) are specified. The beginning and end of the port list range
518
are separated by a dash. For example, 1:3 would specify switch number 1, port 3. 2:4
specifies switch number 2, port 4. 1:3-2:4 specifies all of the ports between switch 1, port 3
and switch 2, port 4 − in numerical order.
<portlist> - Enter the list of port used for the configuration here.
state - (Optional) Enable or disable the specified link aggregation group. If not specified, the
group will keep the previous state, the default state is disabled. If configure LACP group, the
ports’ state machine will start.
enable - Enable the specified link aggregation group.
disable - Disable the specified link aggregation group.
trap - (Optional) Specify the state of Link Up and Link Down notifications.
enable - Enable Link Up and Link Down notifications.
disable - Disable Link Up and Link Down notifications.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To define a load-sharing group of ports, group-id 1, master port 17 of unit 2:
DGS-3120-24TC:admin#config link_aggregation group_id 1 master_port 1:5 ports
1:5-1:7
Command: config link_aggregation group_id 1 master_port 1:5 ports 1:5-1:7
Success.
DGS-3120-24TC:admin#
Format
config link_aggregation algorithm [mac_source | mac_destination | mac_source_dest |
ip_source | ip_destination | ip_source_dest | l4_src_port | l4_dest_port | l4_src_dest_port]
Parameters
mac_source - Indicates that the Switch should examine the MAC source address.
mac_destination - Indicates that the Switch should examine the MAC destination address.
mac_source_dest - Indicates that the Switch should examine the MAC source and destination
address.
ip_source - Indicates that the Switch should examine the IP source address.
ip_destination - Indicates that the Switch should examine the IP destination address.
ip_source_dest - Indicates that the Switch should examine the IP source address and
destination address.
l4_src_port - Indicates that the Switch should examine the TCP/UDP source port.
l4_dest_port - Indicates that the Switch should examine the TCP/UDP destination port.
l4_src_dest_port - Indicates that the Switch should examine the TCP/UDP source port and
519
destination port.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure link aggregation algorithm for mac-source-dest:
DGS-3120-24TC:admin# config link_aggregation algorithm mac_source_dest
Command: config link_aggregation algorithm mac_source_dest
Success.
DGS-3120-24TC:admin#
Format
show link_aggregation {group_id <value 1-32> | algorithm}
Parameters
group_id - (Optional) Specify the group id. The group number identifies each of the groups.
<value 1-32> - Enter the group ID value here. This value must be between 1 and 32.
algorithm - (Optional) Allows you to specify the display of link aggregation by the algorithm in
use by that group.
If no parameter specified, system will display all link aggregation information.
Restrictions
None.
Example
Link aggregation group enable:
520
DGS-3120-24TC:admin#show link_aggregation
Command: show link_aggregation
Group ID : 1
Type : LACP
Master Port : 1:5
Member Port : 1:5-1:7
Active Port : 7
Status : Enabled
Flooding Port : 7
Trap : Disabled
Total Entries : 1
DGS-3120-24TC:admin#
Group ID : 1
Type : LACP
Master Port : 1:5
Member Port : 1:5-1:7
Active Port :
Status : Enabled
Flooding Port :
Trap : Disabled
Total Entries : 1
DGS-3120-24TC:admin#
521
DGS-3120-24TC:admin#show link_aggregation
Command: show link_aggregation
Group ID : 1
Type : LACP
Master Port : 1:5
Member Port : 1:5-1:7
Active Port :
Status : Disabled
Flooding Port :
Trap : Disabled
Total Entries : 1
DGS-3120-24TC:admin#
Format
config lacp_port <portlist> mode [active | passive]
Parameters
lacp_port - Specified a range of ports to be configured. (UnitID:port number).
<portlist> - Enter the list of port used for the configuration here.
mode - Specify the LACP mode used.
active - Specify to set the LACP mode as active.
passive - Specify to set the LACP mode as passive.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config port LACP mode:
DGS-3120-24TC:admin# config lacp_port 1-12 mode active
command: config lacp_port 1:1-1:12 mode active
Success.
DGS-3120-24TC:admin#
522
Format
show lacp_port <portlist>
Parameters
lacp_port - Specified a range of ports to be configured. (UnitID:port number).
<portlist> - Enter the list of ports used for this configuration here.
If no parameter specified, the system will display current LACP and all port status.
Restrictions
None.
Example
To show port lacp mode:
DGS-3120-24TC:admin# show lacp_port
Command: show lacp_port
Port Activity
------ --------
1 Active
2 Active
3 Active
4 Active
5 Active
6 Active
7 Active
8 Active
9 Active
10 Active
11 Active
12 Active
DGS-3120-24TC:admin#
523
524
Format
enable lldp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable LLDP:
DGS-3120-24TC:admin# enable lldp
Command: enable lldp
Success.
DGS-3120-24TC:admin#
Format
disable lldp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable LLDP:
DGS-3120-24TC:admin# disable lldp
Command: disable lldp
Success.
DGS-3120-24TC:admin#
525
Format
config lldp [message_tx_interval <sec 5-32768> | message_tx_hold_multiplier <int 2-10> |
tx_delay <sec 1-8192> | reinit_delay <sec 1-10>]
Parameters
message_tx_interval - Changes the interval between consecutive transmissions of LLDP
advertisements on any given port. The default setting 30 seconds.
<sec 5-32768> - Enter the message transmit interval value here. This value must be between
5 and 32768 seconds.
message_tx_hold_multiplier - Specify to configure the message hold multiplier. The default
setting 4.
<2-10> - Enter the message transmit hold multiplier value here. This value must be between 2
and 10.
tx_delay - Specify the minimum interval between sending of LLDP messages due to constantly
change of MIB content. The default setting 2 seconds.
<sec 1-8192> - Enter the transmit delay value here. This value must be between 1 and 8192
seconds.
reinit_delay - Specify the the minimum time of reinitialization delay interval. The default setting 2
seconds.
<sec 1-10> - Enter the re-initiate delay value here. This value must be between 1 and 10
seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To change the packet transmission interval:
DGS-3120-24TC:admin#config lldp message_tx_interval 30
Command: config lldp message_tx_interval 30
Success.
DGS-3120-24TC:admin#
Format
config lldp notification_interval <sec 5-3600>
526
Parameters
notification_interval - Specify the timer of notification interval for sending notification to
configured SNMP trap receiver(s). The default setting is 5 seconds.
<sec 5-3600> - Enter the notification interval value here. This value must be between 5 and
3600 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To changes the notification interval to 10 second:
DGS-3120-24TC:admin#config lldp notification_interval 10
Command: config lldp notification_interval 10
Success.
DGS-3120-24TC:admin#
Format
config lldp ports [<portlist> | all] [notification [enable | disable] | admin_status [tx_only |
rx_only | tx_and_rx | disable] | mgt_addr [ipv4 {<ipaddr>} | ipv6 {<ipv6addr>}] [enable |
disable] | basic_tlvs [{all} |{port_description | system_name | system_description |
system_capabilities}] [enable | disable] | dot1_tlv_pvid [enable | disable] |
dot1_tlv_protocol_vid [vlan [all | <vlan_name 32> ] | vlanid <vidlist>] [enable | disable] |
dot1_tlv_vlan_name [vlan [all | <vlan_name 32>] | vlanid <vidlist>] [enable | disable] |
dot1_tlv_protocol_identity [all | {eapol | lacp | gvrp | stp}] [enable | disable] | dot3_tlvs [{all} |
{mac_phy_configuration_status | link_aggregation | power_via_mdi|maximum_frame_size}]
[enable | disable]]
Parameters
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
notification - Enables or disables the SNMP trap notification of LLDP data changes detected on
advertisements received from neighbor devices. The default notification state is disabled.
enable - Specify that the SNMP trap notification of LLDP data changes detected will be
enabled.
disable - Specify that the SNMP trap notification of LLDP data changes detected will be
disabled.
admin_status - Specify the per-port transmit and receive modes.
tx_only - Configure the specified port(s) to transmit LLDP packets, but block inbound LLDP
527
528
numerous vendor proprietary variations are responsible for maintaining the topology and
connectivity of the network. If EAPOL, GVRP, STP (including MSTP), and LACP protocol
identity is enabled on this port and it is enabled to be advertised, then this protocol identity will
be advertised. The default state is disabled.
all - Specify that all the vendor proprietary protocols will be advertised.
eapol - (Optional) Specify that the EAPOL protocol will be advertised.
lacp - (Optional) Specify that the LACP protocol will be advertised.
gvrp - (Optional) Specify that the GVRP protocol will be advertised.
stp - (Optional) Specify that the STP protocol will be advertised.
enable - Specify that the protocol identity TLV according to the protocol specified will be
adverstised.
disable - Specify that the protocol identity TLV according to the protocol specified will not be
adverstised.
dot3_tlvs - Specify that the IEEE 802.3 specific TLV data type will be configured.
all - Specify that all the IEEE 802.3 specific TLV data type will be used.
mac_phy_configuration_status - (Optional) This TLV optional data type indicates that LLDP
agent should transmit 'MAC/PHY configuration/status TLV'. This type indicates it is
possible for two ends of an IEEE 802.3 link to be configured with different duplex and/or
speed settings and still establish some limited network connectivity. More precisely, the
information includes whether the port supported the auto-negotiation function, whether the
function is enabled, the auto-negotiated advertised capability, and the operational MAU
type. The default state is disabled.
link_aggregation - (Optional) This TLV optional data type indicates that LLDP agent should
transmit 'Link Aggregation TLV'. This type indicates the current link aggregation status of
IEEE 802.3 MACs. More precisely, the information should include whether the port is
capable of doing link aggregation, whether the port is aggregated in a aggregated link, and
the aggregated port ID. The default state is disabled.
power_via_mdi - (Optional) This TLV optional data type indicates that LLDP agent should
transmit 'Power via MDI TLV'. Three IEEE 802.3 PMD implementations (10BASE-T,
100BASE-TX, and 1000BASE-T) allow power to be supplied over the link for connected
non-powered systems. The Power Via MDI TLV allows network management to advertise
and discover the MDI power support capabilities of the sending IEEE 802.3 LAN station.
The default state is disabled.
maximum_frame_size - (Optional) This TLV optional data type indicates that LLDP agent
should transmit 'Maximum-frame-size TLV. The default state is disabled.
enable - Specify that the IEEE 802.3 specific TLV data type selected will be advertised.
disable - Specify that the IEEE 802.3 specific TLV data type selected will be not advertised.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable SNMP notifications from port 1:1-1:5:
DGS-3120-24TC:admin#config lldp ports 1:1-1:5 notification enable
Command: config lldp ports 1:1-1:5 notification enable
Success.
DGS-3120-24TC:admin#
529
Success.
DGS-3120-24TC:admin#
Success
DGS-3120-24TC:admin#
To configure exclude the system name TLV from the outbound LLDP advertisements for all ports:
DGS-3120-24TC:admin#config lldp ports all basic_tlvs system_name enable
Command: config lldp ports all basic_tlvs system_name enable
Success.
DGS-3120-24TC:admin#
To configure exclude the vlan nameTLV from the outbound LLDP advertisements for all ports:
DGS-3120-24TC:admin#config lldp ports all dot1_tlv_protocol_vid vlan default
enable
Command: config lldp ports all dot1_tlv_protocol_vid vlan default enable
Success.
DGS-3120-24TC:admin#
To configure exclude the port and protocol VLAN ID TLV from the outbound LLDP advertisements
for all ports:
DGS-3120-24TC:admin# config lldp ports all dot1_tlv_protocol_vid vlanid 1-3
enable
Command: config lldp ports all dot1_tlv_protocol_vid vlanid 1-3 enable
Success.
DGS-3120-24TC:admin#
To configure exclude the VLAN name TLV from the outbound LLDP advertisements for all ports:
530
Success.
DGS-3120-24TC:admin#
To configure exclude the protocol identity TLV from the outbound LLDP advertisements for all
ports:
DGS-3120-24TC:admin# config lldp ports all dot1_tlv_protocol_identity all
enable
Command: config lldp ports all dot1_tlv_protocol_identity all enable
Success.
DGS-3120-24TC:admin#
To configure exclude the MAC/PHY configuration/status TLV from the outbound LLDP
advertisements for all ports:
DGS-3120-24TC:admin# config lldp ports all dot3_tlvs
mac_phy_configuration_status enable
Command: config lldp ports all dot3_tlvs mac_phy_configuration_status enable
Success.
DGS-3120-24TC:admin#
Format
config lldp forward_message [enable | disable]
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure LLDP to forward LLDP PDUs:
531
Success.
DGS-3120-24TC:admin#
Format
show lldp
Parameters
None.
Restrictions
None.
Example
To display the LLDP system level configuration status:
Command: show lldp
LLDP Configurations
LLDP Status : Enabled
LLDP Forward Status : Enabled
Message TX Interval : 30
Message TX Hold Multiplier: 4
ReInit Delay : 2
TX Delay : 2
Notification Interval : 10
DGS-3120-24TC:admin#
532
Format
show lldp mgt_addr {[ipv4 {<ipaddr>} | ipv6 {<ipv6addr>}]}
Parameters
ipv4 - (Optional) Specify the IPv4 address used for the display.
<ipaddr> - (Optional) Enter the IPv4 address used for this configuration here.
ipv6 - (Optional) Specify the IPv6 address used for the display.
<ipv6addr> - (Optional) Enter the IPv6 address used for this configuration here.
Restrictions
None.
Example
To display management address information:
DGS-3120-24TC:admin# show lldp mgt_addr ipv4 192.168.254.10
Command: show lldp mgt_addr ipv4 192.168.254.10
Address 1
-----------------------------------------------------------------------
Subtype : IPV4
Address : 192.168.254.10
IF type : unknown
OID : 1.3.6.1.4.1.171.10.36.1.11
Advertising ports :
1:1-1:5, 1:7, 2:10-2:20
DGS-3120-24TC:admin#
Format
show lldp ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If the port list is not specified, information for all the ports will be displayed.
533
Restrictions
None.
Example
To display the LLDP port 1 TLV option configuration:
DGS-3120-24TC:admin#show lldp ports 1:1
Command: show lldp ports 1:1
Port ID : 1:1
-----------------------------------------------------------------
Admin Status : TX_and_RX
Notification Status : Enabled
Advertised TLVs Option :
Port Description Disabled
System Name Disabled
System Description Disabled
System Capabilities Disabled
Enabled Management Address
(None)
Port VLAN ID Disabled
Enabled Port_and_Protocol_VLAN_ID
(None)
Enabled VLAN Name
(None)
Enabled Protocol_Identity
(None)
MAC/PHY Configuration/Status Disabled
Link Aggregation Disabled
Maximum Frame Size Disabled
DGS-3120-24TC:admin#
Format
show lldp local_ports {<portlist>} {mode [brief | normal | detailed]}
Parameters
<portlist> - (Optional) Specified a range of ports to be configured. When port list is not specified,
information for all ports will be displayed.
534
Restrictions
None.
Example
To display outbound LLDP advertisements for port 1 in detailed mode. Port description on the
display should use the same value as ifDescr.
DGS-3120-24TC:admin#show lldp local_ports 1:1 mode detailed
Command: show lldp local_ports 1:1 mode detailed
Port ID : 1:1
-----------------------------------------------------------------------------
Port ID Subtype : MAC Address
Port ID : 00-01-02-03-04-01
Port Description : D-Link DGS-3120-24TC R2.00.010
Port 1 on Unit 1
Port PVID : 1
Management Address Count : 2
Subtype : IPv4
Address : 0.0.0.0
IF Type : IfIndex
OID : 1.3.6.1.4.1.171.10.117.1.1
Subtype : IPv4
Address : 10.90.90.90
IF Type : IfIndex
OID : 1.3.6.1.4.1.171.10.117.1.1
Link Aggregation :
Aggregation Capability : Aggregated
Aggregation Status : Not Currently in Aggregation
535
Aggregation Port ID : 0
DGS-3120-24TC:admin#
Port ID : 1:1
-----------------------------------------------------------------------------
Port ID Subtype : MAC Address
Port ID : 00-01-02-03-04-01
Port Description : D-Link DGS-3120-24TC R2.00.010
Port 1 on Unit 1
Port PVID : 1
Management Address Count : 2
PPVID Entries Count : 0
VLAN Name Entries Count : 1
Protocol Identity Entries Count : 0
MAC/PHY Configuration/Status : (See Detail)
Link Aggregation : (See Detail)
Maximum Frame Size : 1536
DGS-3120-24TC:admin#
Port ID 1:
-----------------------------------------------------------------------
Port ID Subtype : LOCAL
Port ID : 1/1
Port Description : RMON Port 1 on Unit 1
DGS-3120-24TC:admin#
Format
show lldp remote_ports {<portlist>} {mode [brief | normal | detailed]}
536
Parameters
<portlist> - (Optional) Specified a range of ports to be configured. When port list is not specified,
information for all ports will be displayed.
mode – (Optional) Specify to display the information in various modes.
brief - Display the information in brief mode.
normal - Display the information in normal mode. This is the default display mode.
detailed - Display the information in detailed mode.
Restrictions
None.
Example
To display remote table in brief mode:
DGS-3120-24TC:admin# show lldp remote_ports 1:1-1:2 mode brief
Command: show lldp remote_ports 1:1-1:2 mode brief
Port ID: 1
----------------------------------------------------------------------
Remote Entities count : 3
Entity 1
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-01
Port ID Subtype : LOCAL
Port ID : 1/3
Port Description : RMON Port 1 on Unit 3
Entity 2
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-02
Port ID Subtype : LOCAL
Port ID : 1/4
Port Description : RMON Port 1 on Unit 4
Port ID : 2
---------------------------------------------------------------------
Remote Entities count : 3
Entity 1
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-03
Port ID Subtype : LOCAL
Port ID : 2/1
Port Description : RMON Port 2 on Unit 1
Entity 2
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-04
Port ID Subtype : LOCAL
Port ID : 2/2
Port Description : RMON Port 2 on Unit 2
537
Entity 3
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-05
Port ID Subtype : LOCAL
Port ID : 2/3
Port Description : RMON Port 2 on Unit 3
DGS-3120-24TC:admin#
Port ID : 1
----------------------------------------------------------------------
Remote Entities count : 2
Entity 1
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-01
Port ID Subtype : LOCAL
Port ID : 1/3
Port Description : RMON Port 3 on Unit 1
System Name : Switch1
System Description : Stackable Ethernet Switch
System Capabilities : Repeater, Bridge
Management Address count : 1
Port VLAN ID : 1
PPVID Entries count : 5
VLAN Name Entries count : 3
Protocol Id Entries count : 2
MAC/PHY Configuration/Status : (See detail)
Power Via MDI : (See detail)
Link Aggregation : (See detail)
Maximum Frame Size : 1536
Unknown TLVs count : 2
Entity 2
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-02
Port ID Subtype : LOCAL
Port ID : 2/1
Port Description : RMON Port 1 on Unit 2
System Name : Switch2
System Description : Stackable Ethernet Switch
System Capabilities : Repeater, Bridge
Management Address count : 2
Port VLAN ID : 1
PPVID Entries count : 5
VLAN Name Entries count : 3
Protocol Id Entries count : 2
MAC/PHY Configuration/Status : (See detail)
538
DGS-3120-24TC:admin#
Port ID : 1
---------------------------------------------------------------------
Remote Entities count : 1
Entity 1
Chassis ID Subtype : MACADDRESS
Chassis ID : 00-01-02-03-04-01
Port ID Subtype : LOCAL
Port ID : 1/3
Port Description : RMON Port 3 on Unit 1
System Name : Switch1
System Description : Stackable Ethernet Switch
System Capabilities : Repeater, Bridge
Management Address : 10.90.90.91
Port VLAN ID : 1
Management Address
Address 1
Subtype : IPV4
Address : 192.168.254.10
IF type : unknown
OID : 1.3.6.1.4.1.171.10.36.1.11
Address 2
Subtype : IPV4
Address : 192.168.254.11
IF type : unknown
OID : 2.3.6.1.4.1.171.10.36.1.11
PPVID Entries
Entry 1
Port and protocol VLAN ID : 4
PPVID supported : supported
PPVID Enable : Enable
Entry 2
Port and protocol VLAN ID : 5
PPVID supported : supported
PPVID Enable : Enable
Entry 3
Port and protocol VLAN ID : 6
PPVID supported : supported
539
Entry 2
VLANID : 2
VLAN Name : V2
Entry 3
VLAN ID : 3
VLAN Name : V3
Entry 2
Protocol index : 2
Protocol id : 00 27 42 42 03 00 00 02
Protocol Name : STP
MAC/PHY Configuration/Status
Auto-negotiation support : supported
Auto-negotiation status : enabled
Auto-negotiation advertised capability : xxxx (hex)
Auto-negotiation operational MAU type : 0010 (hex)
Link Aggregation
Aggregation capability : aggregated
Aggregation status : currently in aggregation
Aggregated port ID : 1
Entry 2
540
DGS-3120-24TC:admin#
Format
show lldp statistics
Parameters
None.
Restrictions
None.
Example
To display global statistics information:
DGS-3120-24TC:admin# show lldp statistics
Command: show lldp statistics
DGS-3120-24TC:admin#
Format
show lldp statistics ports {<portlist>}
Parameters
<portlist> - (Optional) Specified a range of ports to be configured. When port list is not specified,
541
Restrictions
None.
Example
To display statistics information of port 1:
DGS-3120-24TC:admin# show lldp statistics ports 1:1
Command: show lldp statistics ports 1:1
Port ID: 1
------------------------------------------------------------------------
lldpStatsTxPortFramesTotal : 27
lldpStatsRxPortFramesDiscardedTotal : 0
lldpStatsRxPortFramesErrors : 0
lldpStatsRxPortFramesTotal : 27
lldpStatsRxPortTLVsDiscardedTotal : 0
lldpStatsRxPortTLVsUnrecognizedTotal : 0
lldpStatsRxPortAgeoutsTotal : 0
DGS-3120-24TC:admin#
Format
config lldp_med fast_start repeat_count <value 1 - 10>
Parameters
<value 1-10> - Specify a fast start repeat count value between 1 and 10. The default value is 4.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure a LLDP-MED fast start repeat count of 5:
542
Success.
DGS-3120-24TC:admin#
Format
config lldp_med log state [enable | disable]
Parameters
enable - Enable the log state for LLDP-MED events.
disable - Disable the log state for LLDP-MED events. The default is disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the log state of LLDP-MED events:
DGS-3120-24TC:admin#config lldp_med log state enable
Command: config lldp_med log state enable
Success.
DGS-3120-24TC:admin#
Format
config lldp_med notification topo_change ports [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Specify a range of ports to be configured.
all - Specify to set all ports in the system.
543
state - Enable or disable the SNMP trap notification of topology change detected state.
enable - Enable the SNMP trap notification of topology change detected.
disable - Disable the SNMP trap notification of topology change detected. The default
notification state is disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable topology change notification on ports 1 to 2:
DGS-3120-24TC:admin#config lldp_med notification topo_change ports 1:1-1:2
state enable
Command: config lldp_med notification topo_change ports 1:1-1:2 state enable
Success.
DGS-3120-24TC:admin#
Format
config lldp_med ports [<portlist> | all] med_transmit_capabilities [all | {capabilities |
network_policy | power_pse | inventory}(1)] state [enable | disable]
Parameters
<portlist> - Specify a range of ports to be configured.
all - Specify to set all ports in the system.
med_transit_capabilities - Select to send the LLDP-MED TLV capabilities specified.
all - Select to send capabilities, network policy, and inventory.
capabilities - Specify that the LLDP agent should transmit “LLDP-MED capabilities TLV.” If a
user wants to transmit LLDP-MED PDU, this TLV type should be enabled. Otherwise, this
port cannot transmit LLDP-MED PDU.
network_policy - Specify that the LLDP agent should transmit “LLDP-MED network policy
TLV.”
power_pse - Specify that the LLDP agent should transmit 'LLDP-MED extended Power via
MDI TLV' if the local device is a PSE device.
inventory - Specify that the LLDP agent should transmit “LLDP-MED inventory TLV.”
state - Enable or disable the transmitting of LLDP-MED TLVs.
enable - Enable the transmitting of LLDP-MED TLVs.
disable - Disable the transmitting of LLDP-MED TLVs.
544
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable transmitting all capabilities on all ports:
DGS-3120-24TC:admin#config lldp_med ports all med_transmit_capabilities all
state enable
Command: config lldp_med ports all med_transmit_capabilities all state enable
Success.
DGS-3120-24TC:admin#
Format
show lldp_med ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If a port list is not specified, information for all ports will be displayed.
Restrictions
None.
Example
To display LLDP-MED configuration information for port 1:
DGS-3120-24TC:admin#show lldp_med ports 1:1
Command: show lldp_med ports 1:1
Port ID : 1:1
-----------------------------------------------------------------
Topology Change Notification Status :Enabled
LLDP-MED Capabilities TLV :Enabled
LLDP-MED Network Policy TLV :Enabled
LLDP-MED Extended Power Via MDI PSE TLV :Enabled
LLDP-MED Inventory TLV :Enabled
DGS-3120-24TC:admin#
545
Format
show lldp_med
Parameters
None.
Restrictions
None.
Example
To display the Switch’s general LLDP-MED configuration status:
DGS-3120-24TC:admin#show lldp_med
Command: show lldp_med
LLDP-MED Configuration:
Fast Start Repeat Count : 4
DGS-3120-24TC:admin#
546
Format
show lldp_med local_ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
Restrictions
None.
Example
To display LLDP-MED information currently available for populating outbound LLDP-MED
advertisements for port 1:
DGS-3120-24TC:admin#show lldp_med local_ports 1:1
Command: show lldp_med local_ports 1:1
Port ID : 1:1
-----------------------------------------------------------------
LLDP-MED Capabilities Support:
Capabilities :Support
Network Policy :Support
Location Identification :Not Support
Extended Power Via MDI PSE :Not Support
Extended Power Via MDI PD :Not Support
Inventory :Support
Network Policy:
None
DGS-3120-24TC:admin#
Format
show lldp_med remote_ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
547
Restrictions
None.
Example
To display remote entry information:
DGS-3120-24TC:admin#show lldp_med remote_ports 1:1
Command: show lldp_med remote_ports 1:1
Port ID : 1:1
---------------------------------------------------------------------------
Remote Entities Count : 1
Entity 1
Chassis ID Subtype : MAC Address
Chassis ID : 00-01-02-03-04-00
Port ID Subtype : Net Address
Port ID : 172.18.10.11
LLDP-MED capabilities:
LLDP-MED Device Class: Endpoint Device Class III
LLDP-MED Capabilities Support:
Capabilities : Support
Network Policy : Support
Location Identification : Support
Extended Power Via MDI : Support
Inventory : Support
LLDP-MED Capabilities Enabled:
Capabilities : Enabled
Network Policy : Enabled
Location Identification : Enabled
Extended Power Via MDI : Enabled
Inventory : Enabled
Network Policy:
Application Type : Voice
VLAN ID :
Priority :
DSCP :
Unknown : True
Tagged :
Application Type : Softphone Voice
VLAN ID : 200
Priority : 7
DSCP : 5
Unknown : False
Tagged : True
Location Identification:
Location Subtype: CoordinateBased
548
Location Information :
Location Subtype: CivicAddress
Location Information :
Inventory Management:
Hardware Revision :
Firmware Revision :
Software Revision :
Serial Number :
Manufacturer Name :
Model Name :
Asset ID :
DGS-3120-24TC:admin#
549
Format
config loopdetect {recover_timer [0 | <sec 60-1000000>] | interval <sec 1-32767> | mode
[port-based | vlan-based]}
Parameters
recover_timer - (Optional) The time interval (in seconds) used by the Auto-Recovery mechanism
to decide how long to check before determining that the loop status has gone. The valid range
is from 60 to 1000000. 0 is a special value that specifies that the auto-recovery mechanism
should be disabled. When the auto-recovery mechanism is disabled, a user would need to
manually recover a disabled port. The default value for the recover timer is 60 seconds.
0 - 0 is a special value that specifies that the auto-recovery mechanism should be disabled.
When the auto-recovery mechanism is disabled, a user would need to manually recover a
disabled port.
<sec 60-1000000> - Enter the recovery timer value here. This value must be between 60 and
1000000 seconds.
interval - (Optional) The time interval (in seconds) that the device will transmit all the CTP
(Configuration Test Protocol) packets to detect a loop-back event. The default setting is 10
seconds. The valid range is from 1 to 32767 seconds.
<sec - 1-32767> - Enter the time interval value here. This value must be between 1 and
32767 seconds.
mode - (Optional) Specify the loop-detection operation mode. In port-based mode, the port will
be shut down (disabled) when loop has been detected In VLAN-based mode, the port cannot
process the packets of the VLAN that has detected the loop.
port-based - Specify that the loop-detection operation mode will be set to port-based mode.
vlan-based - Specify that the loop-detection operation mode will be set to vlan-based mode.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
550
Example
To set the auto-recover time to 0, which disables the auto-recovery mechanism, the interval to 20
seconds and specify VLAN-based mode:
DGS-3120-24TC:admin# config loopdetect recover_timer 0 interval 20 mode vlan-
based
Command: config loopdetect recover_timer 0 interval 20 mode vlan-based
Success.
DGS-3120-24TC:admin#
Format
config loopdetect ports [<portlist> | all] state [enable | disable]
Parameters
ports - Specify the range of ports that LBD will be configured on.
<portlist> - Enter a list of ports
all - To set all ports in the system, you may use the “all” parameter.
state - Specify whether the LBD function should be enabled or disabled on the ports specified in
the port list. The default state is disabled.
enable - Specify to enable the LBD function.
disable - Specify to disable the LBD function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the LBD function on ports 1:1-1:5:
DGS-3120-24TC:admin# config loopdetect ports 1:1-1:5 state enable
Command: config loopdetect ports 1:1-1:5 state enable
Success.
DGS-3120-24TC:admin#
551
Format
enable loopdetect
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the LBD function globally:
DGS-3120-24TC:admin# enable loopdetect
Command: enable loopdetect
Success.
DGS-3120-24TC:admin#
Format
disable loopdetect
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the LBD function globally:
552
Success.
DGS-3120-24TC:admin#
Format
show loopdetect
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To show the LBD global settings:
DGS-3120-24TC:admin#show loopdetect
Command: show loopdetect
DGS-3120-24TC:admin#
553
Format
show loopdetect ports {<portlist>}
Parameters
ports - Specify the range of member ports that will display the LBD settings.
<portlist> - Enter the list of port to be configured here.
If no port is specified, the configuration for all ports will be displayed.
Restrictions
None.
Example
To show the LBD settings on ports 1-9:
DGS-3120-24TC:admin# show loopdetect ports 1-9
Command: show loopdetect ports 1-9
DGS-3120-24TC:admin#
Format
config loopdetect trap [none | loop_detected | loop_cleared | both]
Parameters
none - There is no trap in the LBD function.
loop_detected - Trap will only be sent when the loop condition is detected.
loop_cleared - Trap will only be sent when the loop condition is cleared.
both - Trap will either be sent when the loop condition is detected or cleared.
554
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To specify that traps will be sent when the loop condition is detected or cleared:
DGS-3120-24TC:admin# config loopdetect trap both
Command: config loopdetect trap both
Success.
DGS-3120-24TC:admin#
Format
config loopdetect log state [enable | disable]
Parameters
state - Specify the state of the LBD log feature.
enable - Enable the LBD log feature.
disable - Disable the LBD log feature. All LBD-related logs will not be recorded.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the log state for LBD:
DGS-3120-24TC:admin# config loopdetect log state enable
Command: config loopdetect log state enable
Success.
DGS-3120-24TC:admin#
555
Format
create loopback ipif <ipif_name 12> {<network_address>} {state [enable | disable]}
Parameters
<ipif_name 12> - Enter the IP interface name used for this configuration here. This name can be
up to 12 characters long.
<network_address> - (Optional) Enter the IPv4 network address of the loopback interface here.
It specifies a host address and length of network mask.
state - (Optional) Specify the state of the loopback interface.
enable - Specify that the loopback interface state will be enabled.
disable - Specify that the loopback interface state will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create one loopback interface named loopback1 with subnet address 20.1.1.1/8 and enable the
admin state:
DGS-3120-24TC:admin#create loopback ipif loopback1 20.1.1.1/8 state enable
Command: create loopback ipif loopback1 20.1.1.1/8 state enable
Success.
DGS-3120-24TC:admin#
556
Format
config loopback ipif <ipif_name 12> [{ipaddress <network_address> | state [enable |
disable]}(1)]
Parameters
<ipif_name 12> - Enter the IP interface name used for this configuration here. This name can be
up to 12 characters long.
ipaddress –Specify the IPv4 network address of the loopback interface.
<network_address> - Enter the IPv4 network address of the loopback interface here. It specifies
a host address and length of network mask.
state - Specify the state of the loopback interface.
enable - Specify that the loopback interface state will be enabled.
disable - Specify that the loopback interface state will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the loopback interface named loopback1 with subnet address 10.0.0.1/8:
DGS-3120-24TC:admin#config loopback ipif loopback1 ipaddress 10.0.0.1/8
Command: config loopback ipif loopback1 ipaddress 10.0.0.1/8
Success.
DGS-3120-24TC:admin#
Format
delete loopback ipif [<ipif_name 12> | all]
Parameters
<ipif_name 12> - Enter the IP interface name used for this configuration here. This name can be
up to 12 characters long.
all – Specify that all the IP loopback interfaces will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
557
Example
To delete the loopback interface named loopback1:
DGS-3120-24TC:admin#delete loopback ipif loopback1
Command: delete loopback ipif loopback1
Success.
DGS-3120-24TC:admin#
Format
show loopback ipif {<ipif_name 12>}
Parameters
<ipif_name 12> - (Optional) Enter the IP interface name used for this configuration here. This
name can be up to 12 characters long.
Restrictions
None.
Example
To show the information of the loopback interface named loopback1:
DGS-3120-24TC:admin#show loopback ipif loopback1
Command: show loopback ipif loopback1
Total Entries : 1
DGS-3120-24TC:admin#
558
Format
enable mac_notification
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable mac_notification function:
DGS-3120-24TC:admin# enable mac_notification
Command: enable mac_notification
Success.
DGS-3120-24TC:admin#
Format
disable mac_notification
559
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable mac_notification function:
DGS-3120-24TC:admin# disable mac_notification
Command: disable mac_notification
Success.
DGS-3120-24TC:admin#
Format
config mac_notification {interval <sec 1-2147483647> | historysize <int 1-500>}
Parameters
interval - (Optional) The time in seconds between notifications.
<sec 1-2147483647> - Enter the interval time here. This value must be between 1 and
2147483647 seconds.
historysize - (Optional) This is maximum number of entries listed in the history log used for
notification. Up to 500 entries can be specified.
<int 1-500> - Enter the history log size here. This value must be between 1 and 500.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To config the Switch’s Mac address table notification global settings:
DGS-3120-24TC:admin# config mac_notification interval 1 historysize 500
Command: config mac_notification interval 1 historysize 500
Success.
DGS-3120-24TC:admin#
560
Format
config mac_notification ports [<portlist> | all] [enable | disable]
Parameters
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
enable - Enable the port’s MAC address table notification.
disable - Disable the port’s MAC address table notification.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable 7th port’s mac address table notification:
DGS-3120-24TC:admin# config mac_notification ports 1:7 enable
Command: config mac_notification ports 1:7 enable
Success.
DGS-3120-24TC:admin#
Format
show mac_notification
Parameters
None.
Restrictions
None.
561
Example
To show the Switch’s Mac address table notification global settings:
DGS-3120-24TC:admin# show mac_notification
Command: show mac_notification
State : Enabled
Interval : 1
History Size : 500
DGS-3120-24TC:admin#
Format
show mac_notification ports {<portlist>}
Parameters
<portlist> - (Optional) Enter a list of ports used for the configuration here.
Restrictions
None.
Example
To display all port’s Mac address table notification status settings:
562
DGS-3120-24TC:admin#
563
Format
enable mac_based_access_control
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
564
Example
To enable the MAC-based Access Control global state:
DGS-3120-24TC:admin# enable mac_based_access_control
Command: enable mac_based_access_control
Success.
DGS-3120-24TC:admin#
Format
disable mac_based_access_control
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the MAC-based Access Control global state:
DGS-3120-24TC:admin# disable mac_based_access_control
Command: disable mac_based_access_control
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control password <passwd 16>
565
Parameters
password - In RADIUS mode, the Switch will communicate with the RADIUS server using this
password. The maximum length of the key is 16.
<password> - Enter the password used here. The default password is “default”.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the MAC-based Access Control password:
DGS-3120-24TC:admin# config mac_based_access_control password switch
Command: config mac_based_access_control password switch
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control password_type [manual_string | client_mac_address]
Parameters
manual_string - Use the same password for all clients to communicate with the RADIUS server.
client_mac_address - Use the client’s MAC address as the password to communicate with the
RADIUS server.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MAC-based Access Control using client’s MAC address as authentication
password:
DGS-3120-24TC:admin#config mac_based_access_control password_type
client_mac_address
Command: config mac_based_access_control password_type client_mac_address
Success.
DGS-3120-24TC:admin#
566
Format
config mac_based_access_control method [local | radius]
Parameters
local - Specify to authenticate via the local database.
radius - Specify to authenticate via a RADIUS server.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the MAC-based Access Control authentication method as local:
DGS-3120-24TC:admin# config mac_based_access_control method local
Command: config mac_based_access_control method local
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control guest_vlan ports <portlist>
Parameters
ports - Specify MAC-based Access Control guest VLAN membership.
<portlist> - Enter the list of port used for this configuration here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
567
Example
To set the MAC-based Access Control guest VLAN membership:
DGS-3120-24TC:admin# config mac_based_access_control guest_vlan ports 1-8
Command: config mac_based_access_control guest_vlan ports 1-8
Success.
DGS-3120-24TC:admin#
• If the user passes the authentication, the user will be able to forward traffic operated under
the assigned VLAN.
When the MAC-based Access Control function is enabled for a port, and the port is a MAC-based
Access Control guest VLAN member, the port(s) will be removed from the original VLAN(s)
member ports, and added to MAC-based Access Control guest VLAN member ports.
• Before the authentication process starts, the user is able to forward traffic under the guest
VLAN.
• After the authentication process, the user will be able to access the assigned VLAN.
If the port authorize mode is port based mode, when the port has been moved to the authorized
VLAN, the subsequent users will not be authenticated again. They will operate in the current
authorized VLAN.
If the port authorize mode is host based mode, then each user will be authorized individually and
be capable of getting its own assigned VLAN.
If port’s block time is set to” infinite”, it means that a failed authentication client will never be
blocked. Block time will be set to “0”.
Format
config mac_based_access_control ports [<portlist> | all] {state [enable | disable] | mode
[port_based | host_based] | aging_time [infinite | <min 1-1440>] | block_time <sec 0-300> |
max_users [<value 1-1000> | no_limit]}(1)
568
Parameters
ports - Specify a range of ports for configuring the MAC-based Access Control function
parameters.
<portlist> - Enter the list of port used for this configuration here.
all - Specify all existed ports of switch for configuring the MAC-based Access Control function
parameters.
state - (Optional) Specify whether the port’s MAC-based Access Control function is enabled or
disabled.
enable - Specify that the port's MAC-based Access Control states will be enabled.
disable - Specify that the port's MAC-based Access Control states will be disabled.
mode - (Optional) Specify the MAC-based access control port mode used.
port_based - Specify that the MAC-based access control port mode will be set to port-based.
host_based - Specify that the MAC-based access control port mode will be set to host-based.
aging_time - (Optional) A time period during which an authenticated host will be kept in an
authenticated state. When the aging time has timed-out, the host will be moved back to
unauthenticated state.
infinite - If the aging time is set to infinite, it means that authorized clients will not be aged out
automatically.
<min 1-1440> - Enter the aging time value here. This value must be between 1 and 1440
minutes.
block_time - (Optional) If a host fails to pass the authentication, the next authentication will not
start within the block time unless the user clears the entry state manually. If the block time is
set to 0, it means do not block the client that failed authentication.
<sec 0-300> -Enter the block time value here. This value must be between 0 and 300
seconds.
max_users - (Optional) Specify maximum number of users per port.
<value 1-1000> - Enter the maximum number of users per port here. This value must be
between 1 and 1000.
no_limit - Specify to not limit the maximum number of users on the port. The default value is
128.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an unlimited number of maximum users for MAC-based Access Control on ports 1 to
8:
DGS-3120-24TC:admin# config mac_based_access_control ports 1:1-1:8 max_users
no_limit
Command: config mac_based_access_control ports 1:1-1:8 max_users no_limit
Success.
DGS-3120-24TC:admin#
To configure the MAC-based Access Control timer parameters to have an infinite aging time and a
block time of 120 seconds on ports 1 to 8:
569
Success.
DGS-3120-24TC:admin#
Format
create mac_based_access_control [guest_vlan <vlan_name 32> | guest_vlanid <vlanid 1-
4094>]
Parameters
guest_vlan - Specify MAC-based Access Control guest VLAN by name, it must be a static 1Q
VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
guest_vlanid - Specify MAC-based Access Control guest VLAN by VID, it must be a static 1Q
VLAN.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a MAC-based Access Control guest VLAN:
DGS-3120-24TC:admin# create mac_based_access_control guest_vlan VLAN8
Command: create mac_based_access_control guest_vlan VLAN8
Success.
DGS-3120-24TC:admin#
570
Format
delete mac_based_access_control [guest_vlan <vlan_name 32> | guest_vlanid <vlanid 1-
4094>]
Parameters
guest_vlan - Specify the name of the MAC-based Access Control’s guest VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
guest_vlanid - Specify the VID of the MAC-based Access Control’s guest VLAN.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the MAC-based Access Control guest VLAN called default:
DGS-3120-24TC:admin# delete mac_based_access_control guest_vlan default
Command: delete mac_based_access_control guest_vlan default
Success.
DGS-3120-24TC:admin#
Format
clear mac_based_access_control auth_state [ports [all | <portlist>] | mac_addr <macaddr>]
Parameters
ports - To specify the port range to delete MAC addresses on them.
all - To specify all MAC-based Access Control enabled ports to delete MAC addresses.
<portlist> - Enter the list of port used for this configuration here.
mac_addr - To delete a specified host with this MAC address.
<macaddr> - Enter the MAC address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
571
Example
To clear MAC-based Access Control clients’ authentication information for all ports:
DGS-3120-24TC:admin# clear mac_based_access_control auth_state ports all
Command: clear mac_based_access_control auth_state ports all
Success.
DGS-3120-24TC:admin#
To delete the MAC-based Access Control authentication information for the host that has a MAC
address of 00-00-00-47-04-65:
DGS-3120-24TC:admin# clear mac_based_access_control auth_state mac_addr 00-00-
00-47-04-65
Command: clear mac_based_access_control auth_state mac_addr 00-00-00-47-04-65
Success.
DGS-3120-24TC:admin#
Format
create mac_based_access_control_local mac <macaddr> {[vlan <vlan_name 32> | vlanid <
vlanid 1-4094>]}
Parameters
mac - Specify the MAC address that can pass local authentication.
<macaddr> - Enter the MAC address used here.
vlan - (Optional) Specify the target VLAN by using the VLAN name. When this host is authorized,
it will be assigned to this VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Specify the target VLAN by using the VID. When this host is authorized, it will
be assigned to this VLAN if the target VLAN exists.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
If no vlanid or vlan parameter is specified, not specify the target VLAN for this host.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
572
Example
To create one MAC-based Access Control local database entry for MAC address 00-00-00-00-00-
01 and specify that the host will be assigned to the “default” VLAN after the host has been
authorized:
DGS-3120-24TC:admin# create mac_based_access_control_local mac 00-00-00-00-00-
01 vlan default
Command: create mac_based_access_control_local mac 00-00-00-00-00-01 vlan
default
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control_local mac <macaddr> [vlan <vlan_name 32> | vlanid
<vlanid 1-4094> | clear_vlan]
Parameters
mac - Specify the authenticated host’s MAC address.
<macaddr> - Enter the MAC address used here.
vlan - Specify the target VLAN by VLAN name. When this host is authorized, the host will be
assigned to this VLAN.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify the target VLAN by VID. When this host is authorized, the host will be assigned
to this VLAN if the target VLAN exists.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
clear_vlan - Not specify the target VLAN. When this host is authorized, will not assign target
VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the target VLAN “default” for the MAC-based Access Control local database entry 00-
00-00-00-00-01:
573
Success.
DGS-3120-24TC:admin#
Format
delete mac_based_access_control_local [mac <macaddr> | vlan <vlan_name 32> | vlanid
<vlanid 1-4094>]
Parameters
mac - Delete local database entry by specific MAC address.
<macaddr> - Enter the MAC address used here.
vlan - Delete local database entries by specific target VLAN name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Delete local database entries by specific target VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the MAC-based Access Control local database entry for MAC address 00-00-00-00-00-
01:
DGS-3120-24TC:admin# delete mac_based_access_control_local mac 00-00-00-00-00-
01
Command: delete mac_based_access_control_local mac 00-00-00-00-00-01
Success.
DGS-3120-24TC:admin#
To delete the MAC-based Access Control local database entry for the VLAN name VLAN3:
574
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control authorization attributes {radius [enable | disable] | local
[enable | disable]}(1)
Parameters
radius - (Optional) If specified to enable, the authorized attributes (for example VLAN, 802.1p
default priority, and ACL) assigned by the RADUIS server will be accepted if the global
authorization status is enabled. The default state is enabled.
enable - Specify that the radius attributes will be enabled.
disable - Specify that the radius attributes will be disabled.
local - (Optional) If specified to enable, the authorized attributes assigned by the local database
will be accepted if the global authorization status is enabled. The default state is enabled.
enable - Specify that the local attributes will be enabled.
disable - Specify that the local attributes will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
The following example will disable the configuration authorized from the local database:
DGS-3120-24TC:admin# config mac_based_access_control authorization attributes
local disable
Command: config mac_based_access_control authorization attributes local disable
Success.
DGS-3120-24TC:admin#
575
Format
show mac_based_access_control {ports {<portlist>}}
Parameters
ports – (Optional) Displays the MAC-based Access Control settings for a specific port or range of
ports.
<portlist> - (Optional) Enter the list of port used for this configuration here.
If no parameter is specified, the global MAC-based Access Control settings will be displayed.
Restrictions
None.
Example
To show the MAC-based Access Control port configuration for ports 1 to 4:
DGS-3120-24TC:admin#show mac_based_access_control ports 1:1-1:4
Command: show mac_based_access_control ports 1:1-1:4
Port State Aging Time Block Time Auth Mode Max User
(min) (sec)
----- -------- ---------- --------- ---------- --------
1:1 Disabled 1440 300 Host-based 128
1:2 Disabled 1440 300 Host-based 128
1:3 Disabled 1440 300 Host-based 128
1:4 Disabled 1440 300 Host-based 128
DGS-3120-24TC:admin#
Format
show mac_based_access_control_local {[mac <macaddr> | vlan <vlan_name 32> | vlanid
<vlanid 1-4094>]}
Parameters
mac - (Optional) Displays MAC-based Access Control local database entries for a specific MAC
576
address.
<macaddr> - Enter the MAC address used here.
vlan - (Optional) Displays MAC-based Access Control local database entries for a specific target
VLAN name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Displays MAC-based Access Control local database entries for a specific
target VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
If the parameter is no specified, displays all MAC-based Access Control local database entries.
Restrictions
None.
Example
To show MAC-based Access Control local database for the VLAN called ‘default’:
DGS-3120-24TC:admin# show mac_based_access_control_local vlan default
Command: show mac_based_access_control_local vlan default
Total Entries:2
DGS-3120-24TC:admin#
Format
show mac_based_access_control auth_state ports {<portlist>}
Parameters
ports - Display authentication status by specific port.
<portlist> - (Optional) Enter the list of port used for this configuration here.
If not specified port(s), it will display all of MAC-based Access Control ports authentication status.
Restrictions
None.
Example
To display the MAC-based Access Control authentication status on port 1:1-1:4
577
(P): Port-based
DGS-3120-24TC:admin#
Format
config mac_based_access_control max_users [<value 1-1000> | no_limit]
Parameters
max_users - Specify to set the maximum number of authorized clients on the whole device. N is
project dependent.
<value 1-1000> - Enter the maximum users here. This value must be between 1 and 1000.
no_limit - Specify to not limit the maximum number of users on the system. By default, there
is no limit on the number of users.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maximum number of users of the MAC-based Access Control system supports to
128:
DGS-3120-24TC:admin# config mac_based_access_control max_users 128
Command: config mac_based_access_control max_users 128
Success.
DGS-3120-24TC:admin#
578
Format
config mac_based_access_control trap state [enable | disable]
Parameters
enable - Enable trap for MAC-based Access Control. The trap of MAC-based Access Control will
be sent out.
disable - Disable trap for MAC-based Access Control.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable trap state of MAC-based Access Control:
DGS-3120-24TC:admin# config mac_based_access_control trap state enable
Command: config mac_based_access_control trap state enable
Success.
DGS-3120-24TC:admin#
Format
config mac_based_access_control log state [enable | disable]
Parameters
enable - Enable log for MAC-based Access Control. The log of MAC-based Access Control will
be generated.
disable - Disable log for MAC-based Access Control.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
579
Example
To disable log state of MAC-based Access Control:
DGS-3120-24TC:admin# config mac_based_access_control log state disable
Command: config mac_based_access_control log state disable
Success.
DGS-3120-24TC:admin#
580
Format
create mac_based_vlan mac_address <macaddr> [vlan <vlan_name 32> | vlanid <vlanid 1-
4094>]
Parameters
mac_address - Specify the MAC address used.
<macaddr> - Enter the MAC address here.
vlan - The VLAN to be associated with the MAC address.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify the VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
priority - Specify the priority that is assigned to untagged packets. If not specified, the priority is
the default value 0.
<value 0-7> - Enter the value between 0 and 7.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static MAC-based VLAN entry:
581
Success.
DGS-3120-24TC:admin#
Format
delete mac_based_vlan {mac_address <macaddr> [vlan <vlan_name 32> | vlanid <vlanid 1-
4094>]}
Parameters
mac_address - (Optional) Specify the MAC address used.
<macaddr> - Enter the MAC address used here.
vlan - (Optional) The VLAN to be associated with the MAC address.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Specify the VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
If no parameter is specified, ALL static configured entries will be removed.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a static MAC-based VLAN entry:
DGS-3120-24TC:admin# delete mac_based_vlan mac_address 00-11-22-33-44-55 vlanid
100
Command: delete mac_based_vlan mac_address 00-11-22-33-44-55 vlanid 100
Success.
DGS-3120-24TC:admin#
582
Format
show mac_based_vlan {mac_address <macaddr> | [vlan <vlan_name 32> | vlanid <vlanid 1-
4094>]}
Parameters
mac_address - (Optional) Specify the entry that you would like to display.
<macaddr> - Enter the MAC address used here.
vlan - (Optional) Specify the VLAN that you would like to display.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Specify the VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
Restrictions
None.
Example
In the following example, MAC address “00-80-c2-33-c3-45” is assigned to VLAN 300 by manual
config. It is assigned to VLAN 400 by Voice VLAN. Since Voice VLAN has higher priority than
manual configuration, the manual configured entry will become inactive. To display the MAC-
based VLAN entry:
DGS-3120-24TC:admin# show mac_based_vlan
Total Entries : 3
DGS-3120-24TC:admin#
583
Format
create md5 key <key_id 1-255> <password 16>
Parameters
<key_id 1-255> - Enter the MD5 key to be added. This key must be between 1 and 255.
<password 16> - Enter an alphanumeric string of between 1 and 16, case-sensitive characters,
used to generate the Message Digest which is in turn used to authenticate OSPF packets
within the OSPF routing domain.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create an MD5 key table:
DGS-3120-24TC:admin#create md5 key 1 dlink
Command: create md5 key 1 dlink
Success.
DGS-3120-24TC:admin#
584
authenticate every packet exchanged between OSPF routers. It is used as a security mechanism
to limit the exchange of network topology information to the OSPF routing domain.
Format
config md5 key <key_id 1-255> <password 16>
Parameters
key_id 1-255> - Enter the MD5 key to be configured. This key must be between 1 and 255.
<password 16> - Enter an alphanumeric string of between 1 and 16, case-sensitive characters,
used to generate the Message Digest which is in turn used to authenticate OSPF packets
within the OSPF routing domain.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure an MD5 key and password:
DGS-3120-24TC:admin#config md5 key 1 dlink1
Command: config md5 key 1 dlink1
Success.
DGS-3120-24TC:admin#
Format
delete md5 key <key_id 1-255>
Parameters
<key_id 1-255> - Enter the MD5 key to be removed. This key must be between 1 and 255.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete an MD5 key table:
585
Success.
DGS-3120-24TC:admin#
Format
show md5 {key <key_id 1-255>}
Parameters
key - (Optional) Specify that the MD5 key will be displayed.
<key_id 1-255> - Enter the MD5 key used here. This key must be between 1 and 255.
If no parameter is specified, the system will display the MD5 key table.
Restrictions
None.
Example
To display the MD5 key table:
DGS-3120-24TC:admin#show md5
Command: show md5
Key-ID Key
------ ----------
1 dlink1
Total Entries: 1
DGS-3120-24TC:admin#
586
Format
config mirror port <port> {[add | delete] source ports <portlist> [rx | tx | both]}
Parameters
port - The port that will receive the packets duplicated at the mirror port.
<port> - Enter the port number to be configured here.
add - (Optional) The mirror entry to be added.
delete - (Optional) The mirror entry to be deleted.
source ports - (Optional) The port that will be mirrored. All packets entering and leaving the
source port can be duplicated in the mirror port.
<portlist> - Enter the list of port to be configured here.
rx - (Optional) Allows the mirroring packets received (flowing into) the port or ports in the port list.
tx - (Optional) Allows the mirroring packets sent (flowing out of) the port or ports in the port list.
both - (Optional) Mirrors all the packets received or sent by the port or ports in the port list.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To add the mirroring ports:
587
Success.
DGS-3120-24TC:admin#
Format
enable mirror
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable mirroring function:
DGS-3120-24TC:admin# enable mirror
Command: enable mirror
Success.
DGS-3120-24TC:admin#
Format
disable mirror
Parameters
None.
588
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable mirroring function:
DGS-3120-24TC:admin# disable mirror
Command: disable mirror
Success.
DGS-3120-24TC:admin#
Format
show mirror {group_id <value 1-4>}
Parameters
group_id - (Optional) Specify a mirror group ID.
<value 1-4> - Enter a mirro group identify value.
Restrictions
None.
Example
To display mirroring configuration:
DGS-3120-24TC:admin#show mirror
Command: show mirror
DGS-3120-24TC:admin#
589
Format
create mirror group_id <value 1-4>
Parameters
<value 1-4> - Enter a mirro group identify value.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create mirror group 3:
DGS-3120-24TC:admin#create mirror group_id 3
Command: create mirror group_id 3
Success.
DGS-3120-24TC:admin#
Format
config mirror group_id <value 1-4> {target_port <port> | [add | delete] source ports
<portlist> [rx | tx | both] | state [enable | disable]}(1)
Parameters
<value 1-4> - Enter a mirro group identify value.
target_port - The port that receives the packets duplicated at the mirror port.
<port> - Specify the port.
add - Add the mirror source ports.
delete - Delete mirror source ports.
source ports – Specify the mirror group source ports.
<portlist> - Enter a list of ports.
rx - Only the received packets on the mirror group source ports will be mirrored to the
590
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure mirror group 3 with state enable and add source ports 1:4-1:9:
DGS-3120-24TC:admin#config mirror group_id 3 state enable add source ports 1:4-
1:9 both
Command: config mirror group_id 3 state enable add source ports 1:4-1:9 both
Success.
DGS-3120-24TC:admin#
Format
delete mirror group_id <value 1-4>
Parameters
<value 1-4> - Enter a mirro group identify value.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete mirror group 3:
DGS-3120-24TC:admin#delete mirror group_id 3
Command: delete mirror group_id 3
Success.
DGS-3120-24TC:admin#
591
Format
config mld [ipif <ipif_name 12> | all] {query_interval <sec 1-31744> | max_response_time
<sec 1-25> | robustness_variable <value 2-7> | last_listener_query_interval <sec 1-25> |
version <value 1-2> | state [enable | disable]}(1)
Parameters
ipif - Specify the IP interface name used for this configuration.
<ipif_name 12> - Enter the IP interface name used for this configuration. This name can be
up to 12 characters long.
all - Specify that all the IP interfaces to be used.
query_interval - Specify the time in seconds between general query transmissions.
<sec 1-31744> - Enter the query interval time. This value must be between 1 and 31744
seconds. The default value is 125.
max_response_time - Specify the maximum time in seconds to wait for reports from members.
<sec 1-25> - Enter the maximum response time here. This value must be between 1 and 25
seconds. The default value is 10.
robustness_variable - Specify the permitted packet loss that guarantees MLD.
<value 2-7> - Enter the robustness variable here. This value must be between 2 and 7. The
default value is 2.
last_member_query_interval - Specify the maximum Response Time inserted into the Multicast
Address Specific Query sent in response to Done Group messages, which is also the amount
of time between Multicast Address Specific Query messages.
<value 1-25> - Enter the last member query interval value here. This value must be between
1 and 25. The default value is 1.
version - Specify the MLD version.
<value 1-2> - Enter the MLD version number. This value must be between 1 and 2. The
default value is 2.
state - Specify the MLD state on a router interface.
enable - Specify that the MLD state will be enabled.
592
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MLD on the IP interface “System”:
DGS-3120-24TC:admin#config mld ipif System version 1 state enable
Command: config mld ipif System version 1 state enable
Success.
DGS-3120-24TC:admin#
Format
show mld {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the IP interface name.
<ipif_name 12> - Enter the IP interface name.
Restrictions
None.
Example
To display the MLD configurations on all interfaces::
593
DGS-3120-24TC:admin#show mld
Command: show mld
Total Entries: 1
DGS-3120-24TC:admin#
Format
show mld group {ipif <ipif_name 12> | group <ipv6addr>}
Parameters
ipif - (Optional) Specify the IP interface name.
<ipif_name 12> - Enter the IP interface name.
group - (Optional) Specify the IPv6 multicast group address.
<ipv6addr> - Enter the IPv6 multicast group address.
Restrictions
None.
Example
To display all the MLD group member information:
DGS-3120-24TC:admin#show mld group
Command: show mld group
Total Entries : 1
DGS-3120-24TC:admin#
594
Format
enable mld_proxy
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the MLD proxy:
DGS-3120-24TC:admin#enable mld_proxy
Command: enable mld_proxy
Success.
DGS-3120-24TC:admin#
Format
disable mld_proxy
595
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the MLD proxy:
DGS-3120-24TC:admin#disable mld_proxy
Command: disable mld_proxy
Success.
DGS-3120-24TC:admin#
Format
config mld_proxy downstream_if [add | delete] vlan [<vlan_name 32> | vlanid <vidlist>]
Parameters
add - Specify to add a downstream interface.
delete - Specify to delete a downstream interface .
vlan - Specify the VLAN by name or ID.
<vlan_name 32> - Specify a name of VLAN which belong to the MLD proxy downstream
interface. The maximum length is 32 characters.
vlanid - Specify a list of VLAN IDs which belong to the MLD proxy downstream interface.
<vidlist> - Specify a list of VLAN IDs which belong to the MLD proxy downstream
interface.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MLD Proxy’s downstream interface:
596
Success.
DGS-3120-24TC:admin#
Format
config mld_proxy upstream_if {vlan [<vlan_name 32> | vlanid <vlanid 1-4094>] |
router_ports [add | delete] <portlist> | source_ip <ipv6addr> | unsolicited_report_interval
<sec 0-25>}(1)
Parameters
vlan - Specify the VLAN for the upstream interface.
<vlan_name 32> - Specify a VLAN name between 1 and 32 characters.
vlanid - Specify the VLAN ID for the upstream interface.
<vlanid 1-4094> - Specify the VLAN ID between 1 and 4094.
router_ports - Specify a list of ports that are connected to multicast-enabled routers.
add - Specify to add the router ports.
delete - Specify to delete the router ports.
<portlist> - Specify a range of ports to be configured.
source_ip - Specify the source IPv6 address of the upstream protocol packet. If it is not
specified, zero IP address will be used as the protocol source IP address.
<ipv6addr>> - Specify the IPv6 address.
unsolicited_report_interval - Specify the time between repetitions of the host's initial report of
membership in a group. The default is 10 seconds. If set to 0, only one report packet is sent.
<sec 0-25> - Specify the time between 0 and 25 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the router port of MLD proxy’s upstream interface:
597
Success.
DGS-3120-24TC:admin#
Format
show mld_proxy {group}
Parameters
group - (Optional) Specify the group information.
Restrictions
None.
Example
To display the MLD proxy’s information:
DGS-3120-24TC:admin#show mld_proxy
Command: show mld_proxy
Upstream Interface
VLAN ID : 1
Dynamic Router Ports : 1:1-1:4
Static Router Ports : 1:5
Unsolicited Report Interval : 10
Source IP Address : ::
Downstream Interface
VLAN List : 2-4
DGS-3120-24TC:admin#
598
Source : NULL
Group : FF1E::0202
Downstream VLAN : 4
Member Ports : 3,6
Status : Active
Source : FF80::200
Group : FF1E::0202
Downstream VLAN : 2
Member Ports : 2,5,8
Status : Inactive
Total Entries: 2
DGS-3120-24TC:admin#
599
config mld_snooping [vlan_name <vlan_name 32> | vlanid <vlanid_list> |all] {state [enable |
disable] | fast_done [enable | disable] | proxy_reporting {state [enable | disable] | source_ip
<ipv6addr>}(1)}(1)
config mld_snooping querier [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all]
{query_interval <sec 1-65535> | max_response_time <sec 1-25> | robustness_variable
<value 1-7> | last_listener_query_interval <sec 1-25> | state [enable | disable] | version
<value 1-2>}(1)
config mld_snooping mrouter_ports [vlan <vlan_name 32> | vlanid <vlanid_list>] [add | delete]
<portlist>
config mld_snooping mrouter_ports_forbidden [vlan <vlan_name 32> | vlanid <vlanid_list>]
[add | delete] <portlist>
enable mld_snooping
disable mld_snooping
show mld_snooping {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
show mld_snooping group {[vlan <vlan_name 32> | vlanid <vlanid_list> | ports <portlist>]
{<ipv6addr>}} {data_driven}
show mld_snooping forwarding {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
show mld_snooping mrouter_ports [vlan <vlan_name 32> | vlanid <vlanid_list> | all] {[static |
dynamic | forbidden]}
create mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>
delete mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>
config mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr> [add
| delete] <portlist>
show mld_snooping static_group {[vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>}
config mld_snooping data_driven_learning [all | vlan_name <vlan_name 32> | vlanid
<vlanid_list>] { state [enable | disable] | aged_out [enable | disable ] | expiry_time <sec 1-
65535>}(1) (EI and SI Mode Only)
config mld_snooping data_driven_learning max_learned_entry <value 1-1024> (EI and SI
Mode Only)
clear mld_snooping data_driven_group [all | [vlan_name <vlan_name 32> | vlanid <vlanid_list>]
[<ipv6addr>| all]] (EI and SI Mode Only)
show mld_snooping statistic counter [vlan <vlan_name> | vlanid <vlanid_list> | ports <portlist>]
clear mld_snooping statistics counter
config mld_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>] [<value 1-1000> | no_limit]
show mld_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>]
600
Format
config mld_snooping [vlan_name <vlan_name 32> | vlanid <vlanid_list> |all] {state [enable |
disable] | fast_done [enable | disable] | proxy_reporting {state [enable | disable] | source_ip
<ipv6addr>}(1)}(1)
Parameters
vlan_name - Specify the name of the VLAN for which MLD snooping is to be configured.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN for which MLD snooping is to be configured.
<vlanid_list> - Enter the VLAN ID list here.
all - Specify all VLANs for which MLD snooping is to be configured.
state - Enable or disable MLD snooping for the chosen VLAN.
enable - Enter enable here to enable MLD snooping for the chosen VLAN.
disable - Enter disable here to disable MLD snooping for the chosen VLAN.
fast_done - Enable or disable MLD snooping fast_leave function.
enable - Enter enable here to enable MLD snooping fast_leave function. If enable, the
membership is immediately removed when the system receive the MLD leave message.
disable - Enter disable here to disable MLD snooping fast_leave function.
proxy reporting - Specify MLD proxy reporting.
state - Enable or disable the proxy reporting.
enable - Enable the proxy reporting.
disable - Disable the proxy reporting.
source_ip - Specify the source IP of proxy reporting integrated report. Default value is zero
IP.
<ipv6addr> - Enter the Ipv6 address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure MLD snooping:
DGS-3120-24TC:admin#config mld_snooping vlan_name default state enable
Command: config mld_snooping vlan_name default state enable
Success.
DGS-3120-24TC:admin#
601
Format
config mld_snooping querier [vlan_name <vlan_name 32> | vlanid <vlanid_list> | all]
{query_interval <sec 1-65535> | max_response_time <sec 1-25> | robustness_variable
<value 1-7> | last_listener_query_interval <sec 1-25> | state [enable | disable] | version
<value 1-2>}(1)
Parameters
vlan_name - Specify the name of the VLAN for which MLD snooping querier is to be configured.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN for which MLD snooping querier is to be configured.
<vlanid_list> - Enter the VLAN ID list here.
all - Specify all VLANs for which MLD snooping querier is to be configured.
query_interval - Specify the amount of time in seconds between general query transmissions.
The default setting is 125 seconds.
<sec 1-65535> - Enter the query interval value here. This value must be between 1 and
65535 seconds.
max_reponse_time - Specify the maximum time in seconds to wait for reports from listeners.
The default setting is 10 seconds.
<sec 1-25> - Enter the maximum response time value here. This value must be between 1
and 25 seconds.
robustness_variable - Provides fine-tuning to allow for expected packet loss on a subnet. The
value of the robustness variable is used in calculating the following MLD message intervals:
<value 1-7> - Enter the robustness variable value here. This value must be between 1 and 7.
• Group listener interval—Amount of time that must pass before a multicast router decides
there are no more listeners of a group on a network. This interval is calculated as follows:
(robustness variable * query interval) + (1 * query response interval).
• Other querier present interval—Amount of time that must pass before a multicast router
decides that there is no longer another multicast router that is the querier. This interval is
calculated as follows: (robustness variable * query interval) + (0.5 * query response
interval).
• Last listener query count—Number of group-specific queries sent before the router
assumes there are no local listeners of a group. The default number is the value of the
robustness variable.
• By default, the robustness variable is set to 2. You might want to increase this value if
you expect a subnet to be loosely.
last_listener_query_interval - (Optional) Specify the maximum amount of time between group-
specific query messages, including those sent in response to done-group messages. You
might lower this interval to reduce the amount of time it takes a router to detect the loss of the
last listener of a group.
<sec 1-25> - Enter the last listener query interval value here. This value must be between 1
and 25 seconds.
state - (Optional) This allows the Switch to be specified as an MLD Querier (sends MLD query
packets) or a Non-Querier (does not send MLD query packets). Set to enable or disable.
enable - Enter enable to enable the MLD querier state here.
disable - Enter disable to disable the MLD querier state here.
version - (Optional) Specify the version of MLD packet that will be sent by this port. If a MLD
packet received by the interface has a version higher than the specified version, this packet
will be dropped.
<value 1-2> - Enter the version number value here. This value must be between 1 and 2.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
602
Example
To configure the MLD snooping querier:
DGS-3120-24TC:admin# config mld_snooping querier vlan_name default
query_interval 125 state enable
Command: config mld_snooping querier vlan_name default query_interval 125 state
enable
Success.
DGS-3120-24TC:admin#
Format
config mld_snooping mrouter_ports [vlan <vlan_name 32> | vlanid <vlanid_list>] [add |
delete] <portlist>
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
add - Specify to add the router ports.
delete - Specify to delete the router ports.
<portlist> - Specify a range of ports to be configured. (UnitID:port number)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set up static router ports:
DGS-3120-24TC:admin# config mld_snooping mrouter_ports vlan default add 1:1-
1:10
Command: config mld_snooping mrouter_ports vlan default add 1:1-1:10
Success.
DGS-3120-24TC:admin#
603
Format
config mld_snooping mrouter_ports_forbidden [vlan <vlan_name 32> | vlanid <vlanid_list>]
[add | delete] <portlist>
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
add - Specify to add the router ports.
delete - Specify to delete the router ports.
<portlist> - Specify a range of ports to be configured. (UnitID:port number)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set up port range 1-10 to forbidden router ports of the default VLAN:
DGS-3120-24TC:admin# config mld_snooping mrouter_ports_forbidden vlan default
add 1:11
Command: config mld_snooping mrouter_ports_forbidden vlan default add 1:11
Success.
DGS-3120-24TC:admin#
Format
enable mld_snooping
604
Parameters
When the Switch receives an MLD report packet from a port, this port will be learned as a
member port of the multicast group that the port is reported, and the router will be a default
member of this multicast group. The multicast packet destined for this multicast group will be
forwarded to all the members of this multicast group.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable MLD snooping on the Switch:
DGS-3120-24TC:admin# enable mld_snooping
Command: enable mld_snooping
Success.
DGS-3120-24TC:admin#
Format
disable mld_snooping
Parameters
When the Switch receives an MLD report packet from a port, this port will be learned as a
member port of the multicast group that the port is reported, and the router will be a default
member of this multicast group. The multicast packet destined for this multicast group will be
forwarded to all the members of this multicast group.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable MLD snooping on the Switch:
DGS-3120-24TC:admin# disable mld_snooping
Command: disable mld_snooping
Success.
DGS-3120-24TC:admin#
605
Format
show mld_snooping {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view the IGMP snooping
configuration.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view the IGMP snooping
configuration.
<vlanid_list> - Enter the VLAN ID list here.
If VLAN is not specified, the system will display all current MLD snooping configurations.
Restrictions
None.
Example
To show MLD snooping:
Command: show mld_snooping
Total Entries: 1
DGS-3120-24TC:admin#
606
Format
show mld_snooping group {[vlan <vlan_name 32> | vlanid <vlanid_list> | ports <portlist>]
{<ipv6addr>}} {data_driven}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view MLD snooping group
information. If VLAN and ports and IP address are not specified, the system will display all
current IGMP snooping group information.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view MLD snooping group
information.
<vlanid_list> - Enter the VLAN ID list here.
ports - (Optional) Specify a list of ports for which you want to view MLD snooping group
information.
<portlist> - Enter the list of port here.
<ipv6addr> - (Optional) Specify the group IPv6 address for which you want to view MLD
snooping group information.
data_driven - (Optional) Display the data driven groups. (EI and SI Mode Only)
Restrictions
None.
Example
To show an MLD snooping group when MLD v2 is supported:
The first item means that for ports 1-2, the data from the 2001::1/FE1E::1 will be forwarded.
The second item means that for port 3, the data from the 2002::2/FE1E::1 must not be forwarded.
The third item means that for ports 4-5, the data from FE1E::2 will be forwarded, MLD v1 group
doesn't care about the source address.
The fourth item is a data-driven learned entry. The member port list is empty. The multicast
packets will be forwarded to the router ports. If the router port list is empty, the packet will be
dropped.
607
Source/Group : 2001::1/FE1E::1
VLAN Name/VID : default/1
Member Ports : 1-2
UP Time : 26
Expiry Time : 258
Filter Mode : INCLUDE
Source/Group : 2002::2/FE1E::1
VLAN Name/VID: : default/1
Member Ports : 3
UP Time : 29
Expiry Time : 247
Filter Mode : EXCLUDE
Source/Group : NULL/FE1E::2
VLAN Name/VID : default/1
Member Ports : 4-5
UP Time : 40
Expiry Time : 205
Filter Mode : EXCLUDE
Source/Group : NULL/FF1E::5
VLAN Name/VID : default/1
Reports : 0
Member Ports :
Router Ports : 24
UP Time : 100
Expiry Time : 200
Filter Mode : EXCLUDE
Total Entries : 4
DGS-3120-24TC:admin#
Source/Group : NULL/FF1E::5
VLAN Name/VID : default/1
Member Ports :
Router Ports : 24
UP Time : 100
Expiry Time : 200
Filter Mode : EXCLUDE
Total Entries : 1
DGS-3120-24TC:admin#
608
Format
show mld_snooping forwarding {[vlan <vlan_name 32> | vlanid <vlanid_list>]}
Parameters
vlan - (Optional) Specify the name of the VLAN for which you want to view MLD snooping
forwarding table information.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN for which you want to view MLD snooping
forwarding table information.
<vlanid_list> - Enter the VLAN ID list here.
If no parameter is specified, the system will display all current MLD snooping forwarding table
entries of the Switch.
Restrictions
None.
Example
To show all MLD snooping forwarding entries located on the Switch.
DGS-3120-24TC:admin# show mld_snooping forwarding
Command: show mld_snooping forwarding
Total Entries : 2
DGS-3120-24TC:admin#
609
Format
show mld_snooping mrouter_ports [vlan <vlan_name 32> | vlanid <vlanid_list> | all] {[static
| dynamic | forbidden]}
Parameters
vlan - Specify the name of the VLAN on which the router port resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the router port resides.
<vlanid_list> - Enter the VLAN ID list here.
all - Specify all VLANs on which the router port resides.
static - (Optional) Displays router ports that have been statically configured.
dynamic - (Optional) Displays router ports that have been dynamically configured.
forbidden - (Optional) Displays forbidden router ports that have been statically configured.
If no parameter is specified, the system will display all currently configured router ports on the
Switch.
Restrictions
None.
Example
To display the mld_snooping router ports:
DGS-3120-24TC:admin#show mld_snooping mrouter_ports all
Command: show mld_snooping mrouter_ports all
Total Entries: 1
DGS-3120-24TC:admin#
610
The static group will only take effect when MLD snooping is enabled on the VLAN. For those static
member ports, the device needs to emulate the MLD protocol operation to the querier, and forward
the traffic destined to the multicast group to the member ports.
For a layer 3 device, the device is also responsible to route the packets destined for this specific
group to static member ports.
The static member ports will only affect MLD V2 operation.
The Reserved IP multicast addresses FF0x::/16 must be excluded from the configured group.
The VLAN must be created first before a static group can be created.
Format
create mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>
Parameters
vlan - Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID list here.
<ipv6addr> - Specify the multicast group IPv6 address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an MLD snooping static group for VLAN 1, group FF1E::1:
DGS-3120-24TC:admin# create mld_snooping default FF1E::1
Command: create mld_snooping default FF1E::1
Success.
DGS-3120-24TC:admin#
Format
delete mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>
Parameters
vlan - Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
611
long.
vlanid - Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID list here.
<ipv6addr> - Specify the multicast group IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an MLD snooping static group for VLAN 1, group FF1E::1:
DGS-3120-24TC:admin# delete mld_snooping default FF1E::1
Command: delete mld_snooping default FF1E::1
Success.
DGS-3120-24TC:admin#
Format
config mld_snooping static_group [vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>
[add | delete] <portlist>
Parameters
vlan - Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID list here.
<ipv6addr> - Specify the multicast group IPv6 address.
add - Specify to add the member ports.
delete - Specify to delete the member ports.
<portlist> - Specify a range of ports to be configured.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
612
Example
To unset port range 9-10 from MLD snooping static member ports for group FF1E::1 on default
VLAN:
DGS-3120-24TC:admin# config mld_snooping static_group vlan default FF1E::1
delete 2:9-2:10
Command: create mld_snooping static_group vlan default FF1E::1 delete 2:9-2:10
Success.
DGS-3120-24TC:admin#
Format
show mld_snooping static_group {[vlan <vlan_name 32> | vlanid <vlanid_list>] <ipv6addr>}
Parameters
vlan - (Optional) Specify the name of the VLAN on which the static group resides.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - (Optional) Specify the ID of the VLAN on which the static group resides.
<vlanid_list> - Enter the VLAN ID list here.
<ipv6addr> - (Optional) Specify the multicast group IPv6 address.
Restrictions
None.
Example
To display all the MLD snooping static groups:
DGS-3120-24TC:admin# show mld_snooping static_group
VLAN ID/Name IP Address Static Member Ports
-------------- ------------------ ------------------------
1 / default FF1E ::1 2:9-2:10
Total Entries : 1
DGS-3120-24TC:admin#
613
Format
config mld_snooping data_driven_learning [all | vlan_name <vlan_name 32> | vlanid
<vlanid_list>] { state [enable | disable] | aged_out [enable | disable ] | expiry_time <sec 1-
65535>}(1)
Parameters
all - Specify that all VLANs are to be configured.
vlan_name - Specify the VLAN name to be configured.
<vlan_name 32> - Enter the VLAN name here.
vlanid - Specify the VLAN ID to be configured.
<vlanid_list> - Enter the VLAN ID list here.
state - (Optional) Specify to enable or disable the data driven learning of MLD snooping groups.
By default, the state is enabled.
enable - Enter enable to enable the data driven learning state.
disable - Enter disable to disable the data driven learning state.
aged_out - (Optional) Enable or disable the aging out of entries. By default, the state is disabled.
enable - Enter enable to enable the aged out option.
disable - Enter disable to disable the aged out option.
expiry_time - (Optional) Specify the data driven group lifetime, in seconds. This parameter is
valid only when aged_out is enabled.
<sec 1-65535> - Enter the expiry time value here. This value must be between 1 and 65535
seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the data driven learning of an MLD snooping group on the default VLAN:
614
Success.
DGS-3120-24TC:admin#
Format
config mld_snooping data_driven_learning max_learned_entry <value 1-1024>
Parameters
max_learned_entry - Specify the maximum number of groups that can be learned by data
driven. The suggested default setting is 56. This default setting may vary depending on
project.
<value 1-1024> - Enter the maximum learned entry value here. This value must be between 1
and 1024.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the maximum number of groups that can be learned by data driven:
DGS-3120-24TC:admin# config mld_snooping data_driven_learning max_learned_entry
50
Command: config mld_snooping data_driven_learning max_learned_entry 50
Success.
DGS-3120-24TC:admin#
615
Format
clear mld_snooping data_driven_group [all | [vlan_name <vlan_name 32> | vlanid
<vlanid_list>] [<ipv6addr>| all]]
Parameters
all - Specify all VLANs to which IGMP snooping groups will be deleted.
vlan_name - Specify the VLAN name.
<vlan_name 32> - Enter the VLAN name here.
vlanid - Specify the VLAN ID.
<vlanid_list> - Enter the VLAN ID list here.
<ipaddr> - Specify the group’s IP address learned by data driven.
all - Specify to clear all data driven groups of the specified VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete all the groups learned by data-driven:
DGS-3120-24TC:admin# clear mld_snooping data_driven_group all
Command: clear mld_snooping data_driven_group all
Success.
DGS-3120-24TC:admin#
Format
show mld _snooping statistic counter [vlan <vlan_name> | vlanid <vlanid_list> | ports
<portlist>]
Parameters
vlan - Specify a VLAN to be displayed.
<vlan_name> - Enter the VLAN name here.
vlanid - Specify a list of VLANs to be displayed.
<vlanid_list> - Enter the VLAN ID list here.
ports - Specify a list of ports to be displayed.
<portlist> - Enter the list of port here.
Restrictions
None.
616
Example
To show MLD snooping statistics counters:
DGS-3120-24TC:admin# show mld_snooping statistics counter vlanid 1
Command: show mld_snooping statistics counter vlanid 1
Transmit Statistics
Query
MLD v1 Query : 1
MLD v2 Query : 1
Total : 2
Report & Leave
MLD v1 Report : 0
MLD v2 Report : 10
MLD v1 Done : 1
Total : 11
Total Entries : 1
DGS-3120-24TC:admin#
Format
clear mld _snooping statistics counter
617
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear MLD snooping statistics counter:
DGS-3120-24TC:admin# clear mld_snooping statistic counter
Command: clear mld_snooping statistic counter
Success.
DGS-3120-24TC:admin#
Format
config mld_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>] [<value 1-1000> |
no_limit]
Parameters
ports - Specify a range of ports to be configured.
<portlist> - Enter the range of ports to be configured here.
vlanid - Specify a range of VLANs to be configured.
<vlanid_list> - Enter the VLAN ID list here.
<value 1-1024> - Configure the rate limit of MLD control packets that the Switch can process on
a specific port or VLAN. The rate is specified in packet per second. The packets that exceed
the limited rate will be dropped.
no_limit - Configure the rate limit of MLD control packets that the Switch can process on a
specific port or VLAN. The rate is specified in packet per second. The packets that exceed the
limited rate will be dropped. The default setting is no_limit.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the MLD snooping per port rate limit:
618
Success.
DGS-3120-24TC:admin#
Format
show mld_snooping rate_limit [ports <portlist> | vlanid <vlanid_list>]
Parameters
ports - Specify a list of ports.
<portlist> - Enter the range of ports to be configured here.
vlanid - Specify a list of VLANs.
<vlanid_list> - Enter the VLAN ID list here.
Restrictions
None.
Example
To configure the mld_snooping per port rate_limit:
DGS-3120-24TC:admin# show mld_snooping rate_limit ports 1-15
Command: show mld_snooping rate_limit ports 1-15
Total Entries: 5
DGS-3120-24TC:admin#
619
Format
debug stp config ports [<portlist> | all] [event | bpdu | state_machine | all] state [disable |
brief | detail]
Parameters
<portlist> - Specify the STP port range to debug.
all - Specify to debug all ports on the Switch.
event - Debug the external operation and event processing.
bpdu - Debug the BPDU’s that have been received and transmitted.
state_machine - Debug the state change of the STP state machine.
all - Debug all of the above.
state - Specify the state of the debug mechanism.
disable - Disables the debug mechanism.
brief - Sets the debug level to brief.
detail - Sets the debug level to detail.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure all STP debug flags to brief level on all ports:
620
Success.
DGS-3120-24TC:admin#
Format
debug stp show information
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To show STP debug information:
DGS-3120-24TC:admin# debug stp show information
Command: debug stp show information
DGS-3120-24TC:admin#
Format
debug stp show flag {ports <portlist>}
Parameters
ports - (Optional) Specify the STP ports to display.
<portlist> - (Optional) Enter the list of port used for this configuration here.
If no parameter is specified, all ports on the Switch will be displayed.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the debug STP levels on all ports:
DGS-3120-24TC:admin#debug stp show flag
Command: debug stp show flag
622
DGS-3120-24TC:admin#
Format
debug stp show counter {ports [<portlist> | all]}
Parameters
ports - (Optional) Specify the STP ports for display.
<portlist> - Enter the list of port used for this configuration here.
all - Display all port’s counters.
If no parameter is specified, display the global counters.
Restrictions
Only Administrator-level users can issue this command.
Example
To show the STP counters for port 9:
623
STP Counters
--------------------------------------
Port 1:9 :
Receive: Transmit:
Total STP Packets : 0 Total STP Packets : 0
Configuration BPDU : 0 Configuration BPDU : 0
TCN BPDU : 0 TCN BPDU : 0
RSTP TC-Flag : 0 RSTP TC-Flag : 0
RST BPDU : 0 RST BPDU : 0
Discard:
Total Discarded BPDU : 0
Global STP Disabled : 0
Port STP Disabled : 0
Invalid packet Format : 0
Invalid Protocol : 0
Configuration BPDU Length : 0
TCN BPDU Length : 0
RST BPDU Length : 0
Invalid Type : 0
Invalid Timers : 0
DGS-3120-24TC:admin#
Format
debug stp clear counter [ports <portlist> | all]
Parameters
ports - Specify the port range.
<portlist> - Enter the list of port used for this configuration here.
all - Clears all port counters.
Restrictions
Only Administrator-level users can issue this command.
Example
To clear all STP counters on the Switch:
624
Success.
DGS-3120-24TC:admin#
Format
debug stp state [enable | disable]
Parameters
state - Specify the STP debug state.
enable - Enable the STP debug state.
disable - Disable the STP debug state.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the STP debug state to enable, and then disable the STP debug state:
DGS-3120-24TC:admin# debug stp state enable
Command: debug stp state enable
Success.
Success.
DGS-3120-24TC:admin#
625
Format
config stp trap {topo_change [disable | enable ] | new_root [enable | disable]}(1)
Parameters
topo_change - Specify the state of sending new root traps. The default state is enable.
disable - Disable sending new root traps.
enable - Enable sending new root traps.
new_root - Specify the state of sending topology change traps. The default state is enable.
enable - Enable sending topology change traps.
disable - Enable sending topology change traps.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the sending state for STP traps:
DGS-3120-24TC:admin#config stp trap new_root enable
Command: config stp trap new_root enable
Success.
DGS-3120-24TC:
626
Format
create mcast_filter_profile {[ipv4 | ipv6]} profile_id <value 1-24> profile_name <name 32>
Parameters
ipv4 - (Optional) Adds an IPv4 multicast profile.
ipv6 - (Optional) Adds an IPv6 multicast profile.
profile_id - The ID of the profile. Range is 1 to n.
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - Provides a meaningful description for the profile.
<name 32> - Enter the profile name here. The profile name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a multicast address profile with a profile ID of 2 and a profile name of MOD:
627
Success.
DGS-3120-24TC:admin#
Format
config mcast_filter_profile [profile_id <value 1-24> | profile_name <name 32>] {profile_name
<name 32> | [add | delete] <mcast_address_list>}(1)
Parameters
profile_id - ID of the profile.
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - Provides a meaningful description for the profile.
<name 32> - Enter the profile name here. THe profile name can be up to 32 characters long.
profile_name - Provides a meaningful description for the profile.
<name 32> - Enter the profile name here. THe profile name can be up to 32 characters long.
add - Specify to add a multicast address.
delete - Specify to delete a multicast address.
<mcast_address_list> - List of the multicast addresses to be put in the profile. You can either
specify a single multicast IP address or a range of multicast addresses using -.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add the multicast address range 225.1.1.1 to 225.1.1.10 to the profile:
DGS-3120-24TC:admin# config mcast_filter_profile profile_id 2 add 225.1.1.1 -
225.1.1.10
Command: config mcast_filter_profile profile_id 2 add 225.1.1.1 - 225.1.1.10
Success.
DGS-3120-24TC:admin#
628
Format
config mcast_filter_profile ipv6 [profile_id <value 1-24> | profile_name <name 32>]
{profile_name <name 32> | [add | delete] <mcastv6_address_list>}(1)
Parameters
profile_id - ID of the profile.
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - Provides a meaningful description for the profile.
<name 32> - Enter the profile name here. The profile name can be up to 32 characters long.
profile_name - Provides a meaningful description for the profile.
<name 32> - Enter the profile name here. The profile name can be up to 32 characters long.
add - Specify to add an IPv6 multicast address.
delete - Specify to delete an IPv6 multicast address.
<mcastv6_address_list> - Lists the IPv6 multicast addresses to put in the profile. You can either
specify a single IPv6 multicast IP address or a range of IPv6 multicast addresses connected
by ‘-‘.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add the IPv6 multicast address range FFF0E::100:0:0:20 – FFF0E::100:0:0:22 to profile ID 3:
DGS-3120-24TC:admin# config mcast_filter_profile profile_id 3 add
FF0E::100:0:0:20 - FF0E::100:0:0:22
Command: config mcast_filter_profile profile_id 3 add FF0E::100:0:0:20 -
FF0E::100:0:0:22
Success.
DGS-3120-24TC:admin#
Format
delete mcast_filter_profile {[ipv4 | ipv6]} [profile_id [<value 1-24> | all] | profile_name <name
32>]
Parameters
ipv4 - (Optional) Specify to delete an IPv4 multicast profile.
ipv6 - (Optional) Specify to delete an IPv6 multicast profile.
profile_id - Specify the ID of the profile
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
all - All multicast address profiles will be deleted.
629
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the multicast address profile with a profile ID of 3:
DGS-3120-24TC:admin# delete mcast_filter_profile profile_id 3
Command: delete mcast_filter_profile profile_id 3
Success.
DGS-3120-24TC:admin#
Total entries: 2
DGS-3120-24TC:admin#
Format
show mcast_filter_profile {[ipv4 | ipv6]} {[profile_id <value 1-24> | profile_name <name 32>]}
Parameters
ipv4 - (Optional) Specify to delete an IPv4 multicast profile.
ipv6 - (Optional) Specify to delete an IPv6 multicast profile.
profile_id - (Optional) Specify the ID of the profile
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - (Optional) Specify to display a profile based on the profile name.
<name 1-32> - Enter the profile name here. The profile name can be up to 32 characters long.
Restrictions
None.
630
Example
To display all the defined multicast address profiles:
DGS-3120-24TC:admin# show mcast_filter_profile
Command: show mcast_filter_profile
Total Entries : 2
DGS-3120-24TC:admin#
Format
config limited_multicast_addr [ports <portlist> | vlanid <vlanid_list>] {[ipv4 | ipv6]} {[add
[profile_id <value 1-24> | profile_name <name 32>] | delete [profile_id <value 1-24> |
profile_name <name 32> | all]] | access [permit | deny]}(1)
Parameters
ports - Specify the range of ports to configure the multicast address filtering function.
<portslist> - Enter the list of port to be configured here.
vlanid - Specify the VLAN ID of the VLAN that the multicast address filtering function will be
configured on.
<vlanid_list> - Enter the VLAN ID list here.
ipv4 - (Optional) Specify the IPv4 multicast profile.
ipv6 - (Optional) Specify the IPv6 multicast profile.
add - Adds a multicast address profile to a port.
profile_id - A profile to be added to or deleted from the port.
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - Specify the profile name used.
<name 1-32> - Enter the profile name here. The profile name can be up to 32 characters
long.
delete - Delete a multicast address profile to a port.
profile_id - A profile to be added to or deleted from the port.
<value 1-24> - Enter the profile ID value here. This value must be between 1 and 24.
profile_name - Specify the profile name used.
<name 1-32> - Enter the profile name here. The profile name can be up to 32 characters
long.
631
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add multicast address profile 2 to ports 1 and 3:
DGS-3120-24TC:admin# config limited_multicast_addr ports 1,3 add profile_id 2
Command: config limited_multicast_addr ports 1,3 add profile_id 2
Success.
DGS-3120-24TC:admin#
Format
config max_mcast_group [ports <portlist> | vlanid <vlanid_list] {[ipv4 | ipv6]} {max_group
[<value 1-1024> | infinite] | action [ drop | replace]}(1)
Parameters
ports - Specify the range of ports to configure the max_mcast_group.
<portlist> - Enter the list of ports to be configured here.
vlanid - Specify the VLAN ID to configure max_mcast_group.
<vlanid_list> - Enter the VLAN ID list here.
ipv4 - (Optional) Specify that the maximum number of IPv4 learned addresses should be limited.
ipv6 - (Optional) Specify that the maximum number of IPv6 learned addresses should be limited.
max_group - (Optional) Specify the maximum number of multicast groups. The range is from 1
to n or infinite. “Infinite” means that the maximum number of multicast groups per port or
VLAN is not limited by the Switch, which is project dependent.. “n” is based on the project.
<value 1-1024> - Enter the maximum group value here. This value must be between 1 and
1024.
infinite - Specify that the maximum group value will be set to infinite.
action - (Optional) Specify the action for handling newly learned groups when the register is full.
drop - The new group will be dropped.
replace - The new group will replace the eldest group in the register table.
632
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maximum number of multicast group that ports 1 and 3 can join to 100:
DGS-3120-24TC:admin# config max_mcast_group ports 1, 3 max_group 100
Command: config max_mcast_group ports 1, 3 max_group 100
Success.
DGS-3120-24TC:admin#
Format
show max_mcast_group [ports {<portlist>} | vlanid {<vlanid_list >}] {[ipv4 | ipv6]}
Parameters
ports - Specify the range of ports for displaying information about the maximum number of
multicast groups that the specified ports can join.
<portlist> - (Optional) Enter the list of ports to be configured here.
vlanid - Specify the VLAN ID for displaying the maximum number of multicast groups.
<vlanid_list> - (Optional) Enter the VLAN ID list here.
ipv4 - (Optional) Specify to display the maximum number of IPv4 learned addresses.
ipv6 - (Optional) Specify to display the maximum number of IPv6 learned addresses.
Restrictions
None.
Example
To display the maximum number of multicast groups that ports 1 and 2 can join:
633
Total Entries: 2
DGS-3120-24TC:admin#
To display the maximum number of multicast groups that VLANs 1 and 2 can join:
DGS-3120-24TC:admin#show max_mcast_group vlanid 1-2
Command: show max_mcast_group vlanid 1-2
Total Entries: 2
DGS-3120-24TC:admin#
Format
show limited_multicast_addr [ports {<portlist>} | vlanid {<vlanid_list>}] {[ipv4 | ipv6]}
Parameters
ports - Specify the range of ports that require information displaying about the multicast address
filtering function.
<portlist> - (Optional) Enter the list of port to be configured here.
vlanid - Specify the VLAN ID of VLANs that require information displaying about the multicast
address filtering function.
<vlanid_list> - (Optional) Enter the VLAN ID list here.
ipv4 - (Optional) Specify to display the IPv4 multicast profile associated with the port.
ipv6 - (Optional) Specify to display the IPv6 multicast profile associated with the port.
634
Restrictions
None.
Example
To show the limited multicast address range on ports 1 and 3:
DGS-3120-24TC:admin# show limited_multicast_addr ports 1,3
Command: show limited_multicast_addr ports 1,3
Port : 1
Access : Deny
Port : 3
Access : Deny
DGS-3120-24TC:admin#
VLAN ID : 1
Access : Deny
Success.
DGS-3120-24TC:admin#
635
Format
config cpu_filter l3_control_pkt <portlist> [{dvmrp | pim | igmp_query}(1) | all] state [enable
| disable]
Parameters
<portlist> - Specify the port list to filter control packets.
dvmrp - Specify to filter the DVMRP control packets.
pim - Specify to filter the PIM control packets.
igmp_query - Specify to filter the IGMP query control packets.
all - Specify to filter all the L3 protocol control packets.
state - Specify the filter function status. The default is disabled.
enable - Enable the filtering function.
disable - Disable the filtering function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To filter the DVMRP control packets on ports 1 to 2:
DGS-3120-24TC:admin#config cpu_filter l3_control_pkt 1:1-1:2 dvmrp state enable
Command: config cpu_filter l3_control_pkt 1:1-1:2 dvmrp state enable
Success.
DGS-3120-24TC:admin#
Format
show cpu_filter l3_control_pkt ports {<portlist>}
Parameters
<portlist> - (Optional) Specify the port list to display the L3 control packet CPU filtering state.
Restrictions
None.
Example
To display the filtering status for port 1 and 2:
636
DGS-3120-24TC:admin#
637
638
Format
create [igmp_snooping | mld_snooping] multicast_vlan <vlan_name 32> <vlanid 2-4094>
{remap_priority [<value 0-7> | none] {replace_priority}}
Parameters
igmp_snooping - Specify to configure VLAN for IGMP snooping.
mld_snooping - Specify to configure VLAN for MLD snooping.
multicast_vlan - The name of the multicast VLAN to be created. Each multicast VLAN is given a
name that can be up to 32 characters.
<vlan_name 32> - Enter the VLAN here. The VLAN name can be up to 32 characters long.
<vlanid 2-4094> - The VLAN ID of the multicast VLAN to be created. This value must be
between 2 and 4094.
remap_priority - (Optional) The remap priority (0 to 7) to be associated with the data traffic to be
forwarded on the multicast VLAN. If none is specified, the packet’s original priority will be
used. The default setting is none.
<value 0-7> - Enter the remap priority value here. This value must be between 0 and 7.
none - Specify that the remap priority value will be set to none.
replace_priority - (Optional) Specify that packet’s priority will be changed by the Switch, based
on the remap priority. This flag will only take effect when the remap priority is set.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IGMP snooping multicast VLAN with the VLAN name mv1 and the VID 2:
DGS-3120-24TC:admin# create igmp_snoop multicast_vlan mv1 2
Command: create igmp_snoop multicast_vlan mv1 2
Success.
DGS-3120-24TC:admin#
Format
config igmp_snooping multicast_vlan <vlan_name 32> {[add | delete] [member_port
<portlist> | [source_port <portlist> | untag_source_port <portlist>] | tag_member_port
<portlist>] | state [enable|disable] | replace_source_ip [<ipaddr> | none] | remap_priority
[<value 0-7> | none] {replace_priority}}(1)
639
Parameters
multicast_vlan - The name of the multicast VLAN to be configured.
<vlan_name 32> - Enter the VLAN here. The VLAN name can be up to 32 characters long.
add - Specify that the entry will be added to the specified multicast VLAN.
delete - Specify that the entry will be deleted to the specified multicast VLAN.
member_port - A member port or range of member ports to be added to the multicast VLAN.
The specified range of ports will become untagged members of the multicast VLAN.
<portlist> - Enter the list of port to be configured here.
source_port - A port or range of ports to be added to the multicast VLAN.
<portlist> - Enter the list of port to be configured here.
untag_source_port - Specify the source port or range of source ports as untagged members of
the multicast VLAN. The PVID of the untagged source port is automatically changed to the
multicast VLAN. Source ports must be either tagged or untagged for any single multicast
VLAN, i.e. both types cannot be members of the same multicast VLAN.
<portlist> - Enter the list of port to be configured here.
tag_member_port - Specify the port or range of ports that will become tagged members of the
multicast VLAN.
<portlist> - Enter the list of port to be configured here.
state - Used to specify if the multicast VLAN for a chosen VLAN should be enabled or disabled.
enable - Specify to enable the multicast VLAN for a chosen VLAN.
disable - Specify to disable the multicast VLAN for a chosen VLAN.
replace_source_ip - Before forwarding the report packet sent by the host, the source IP address
in the join packet must be replaced by this IP address. If none is specified, the source IP
address will not be replaced.
<ipaddr> - Enter the replace source IP address here.
none - Specify for not replacing the source IP address.
remap_priority - The remap priority value to be associated with the data traffic to be forwarded
on the multicast VLAN. If none is specified, the packet’s original priority is used. The default
setting is none.
<value 0-7> - Enter the remap priority value here. This value must be between 0 and 7.
none - Specify that the remap priority value will be set to none.
replace_priority - (Optional) Specify that the packet priority will be changed to the
remap_priority, but only if remap_priority is set.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an IGMP snooping multicast VLAN with the name “v1”, make ports 1 and 3 members
of the VLAN, and set the state to enable:
DGS-3120-24TC:admin# config igmp_snooping multicast_vlan v1 add member_port
1,3 state enable
Command: config igmp_snooping multicast_vlan v1 add member_port 1,3 state
enable
Success.
DGS-3120-24TC:admin#
640
Format
config mld_snooping multicast_vlan <vlan_name 32> {[add | delete] [member_port
<portlist> | [source_port <portlist> | untag_source_port <portlist>] | tag_member_port
<portlist>] | state [enable | disable] | replace_source_ipv6 [<ipv6addr> | none] |
remap_priority [<value 0-7> | none] {replace_priority}}(1)
Parameters
multicast_vlan - The name of the multicast VLAN to be configured. The maximum length is 32
characters.
<vlan_name 32> - Enter the VLAN here. The VLAN name can be up to 32 characters long.
add - Specify to add member ports to the multicast VLAN.
delete - Specify to delete member ports to the multicast VLAN.
member_port - A member port or range of member ports to be added to the multicast VLAN.
The specified range of ports will become untagged members of the multicast VLAN.
<portlist> - Enter the list of port to be configured here.
tag_member_port - Specify that the port or range of ports will become tagged members of the
multicast VLAN.
<portlist> - Enter the list of port to be configured here.
source_port - Specify the port or range of ports to be added to the multicast VLAN.
<portlist> - Enter the list of port to be configured here.
untag_source_port - Specify the source port or range of source ports as untagged members of
the multicast VLAN. The PVID of the untagged source port is automatically changed to the
multicast VLAN. Source ports must be either tagged or untagged for any single multicast
VLAN, i.e. both types cannot be members of the same multicast VLAN.
<portlist> - Enter the list of port to be configured here.
state - Used to specify if the multicast VLAN for a chosen VLAN should be enabled or disabled.
enable - Specify to enable the multicast VLAN for a chosen VLAN.
disable - Specify to disable the multicast VLAN for a chosen VLAN.
replace_source_ipv6 - Before forwarding the report packet sent by the host, the source IP
address in the join packet must be replaced by this IP address. If none is specified, the source
IP address will not be replaced.
<ipv6addr> - Enter the replace source IPv6 address here.
none – Specify for not replaceing the source IPv6 address.
remap_priority - The remap priority value to be associated with the data traffic to be forwarded
on the multicast VLAN. If none is specified, the packet’s original priority is used. The default
setting is none.
<value 0-7> - Enter the remap priority value here. This value must be between 0 and 7.
replace_priority - (Optional) The packet priority is changed to the remap_priority, but only if the
remap_priority is set.
641
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an MLD snooping multicast VLAN with the name “v1”, make ports 1 and 3 members
of the VLAN, and set the state to enable:
DGS-3120-24TC:admin#config mld_snooping multicast_vlan v1 add member_port
1:1,1:3 state enable
Command: config mld_snooping multicast_vlan v1 add member_port 1:1,1:3 state
enable
Success.
DGS-3120-24TC:admin#
Format
create [igmp_snooping | mld_snooping] multicast_vlan_group_profile <profile_name 1-32>
Parameters
igmp_snooping - Specify that an IGMP snooping profile will be created.
mld_snooping - Specify that an MLD snooping profile will be created.
multicast_vlan_group_profile - Specify the multicast VLAN profile name. The maximum length
is 32 characters.
<profile_name 1-32> - Enter the multicast VLAN group profile name here. The name can be
up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an IGMP snooping multicast group profile with the name “test”:
DGS-3120-24TC:admin# create igmp_snooping multicast_vlan_group_profile test
Command: create igmp_snooping multicast_vlan_group_profile test
Success.
DGS-3120-24TC:admin#
642
Format
config igmp_snooping multicast_vlan_group_profile <profile_name 1-32> [add | delete]
<mcast_address_list>
Parameters
multicast_vlan_group_profile - Specify the multicast VLAN profile name. The maximum length
is 32 characters.
<profile_name 1-32> - Enter the multicast VLAN group name here. This name can be up to
32 characters long.
add - Adds a multicast address list to or from this multicast VLAN profile. The
<mcast_address_list> can be a continuous single multicast address, such as 225.1.1.1,
225.1.1.3, 225.1.1.8, a multicast address range, such as 225.1.1.1-225.2.2.2, or both of types,
such as 225.1.1.1, 225.1.1.18-225.1.1.20.
delete - Deletes a multicast address list to or from this multicast VLAN profile. The
<mcast_address_list> can be a continuous single multicast addresses, such as 225.1.1.1,
225.1.1.3, 225.1.1.8, or a multicast address range, such as 225.1.1.1-225.2.2.2, or both types,
such as 225.1.1.1, 225.1.1.18-225.1.1.20.
<mcast_address_list> - Enter the multicast VLAN IP address here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add the single multicast address 225.1.1.1 and multicast range 225.1.1.10-225.1.1.20 to the
IGMP snooping multicast VLAN profile named “MOD”:
DGS-3120-24TC:admin# config igmp_snooping multicast_vlan_group_profile MOD add
225.1.1.1, 225.1.1.10-225.1.1.20
Command: config igmp_snooping multicast_vlan_group_profile MOD add 225.1.1.1,
225.1.1.10-225.1.1.20
Success.
DGS-3120-24TC:admin#
643
Format
config mld_snooping multicast_vlan_group_profile <profile_name 1-32> [add | delete]
<mcast_v6address_list>
Parameters
multicast_vlan_group_profile - Specify the multicast VLAN profile name. The maximum length
is 32 characters.
<profile_name 1-32> - Enter the multicast VLAN group profile name here. This name can be
up to 32 characters long.
add - Add a multicast address list to or from this multicast VLAN profile. The
<mcast_v6address_list> can be a continuous single multicast addresses, such as FF1E::1, a
multicast address range, such asFF1E::1-FF1E::2, or both of them, such as FF1E::1,
FF1E::10-FF1E::20.
delete - Delete multicast address list to or from this multicast VLAN profile. The
<mcast_v6address_list> can be a continuous single multicast addresses, such as FF1E::1, a
multicast address range, such as FF1E::1-FF1E::2, or both of them, such as FF1E::1,
FF1E::10-FF1E::20.
<mcast_v6address_list> - Enter the multicast VLAN IPv6 address here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a multicast address or range to an MLD snooping multicast VLAN profile with name “MOD”:
DGS-3120-24TC:admin# config mld_snooping multicast_vlan_group_profile MOD add
FF1E::1, FF1E::10-FF1E::20
Command: config mld _snooping multicast_vlan_group_profile MOD add FF1E::1,
FF1E::10-FF1E::20
Success.
DGS-3120-24TC:admin#
Format
delete [igmp_snooping | mld_snooping] multicast_vlan_group_profile [profile_name
<profile_name 1-32> | all]
644
Parameters
igmp_snooping - Specify to delete an IGMP snooping group profile.
mld_snooping - Specify to delete an MLD snooping group profile.
profile_name - Specify the multicast VLAN profile name.
<profile_name 1-32> - Enter the multicast VLAN profile name here. This name can be up to
32 characters long.
all - Specify to delete all the multicast VLAN profiles.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an IGMP snooping multicast group profile with the name “MOD”:
DGS-3120-24TC:admin# delete igmp_snooping multicast_vlan_group_profile
profile_name MOD
Command: delete igmp_snooping multicast_vlan_group_profile profile_name MOD
Success.
DGS-3120-24TC:admin#
Format
show [igmp_snooping | mld_snooping ] multicast_vlan_group_profile {< profile_name 1-
32>}
Parameters
igmp_snooping - Specify that an IGMP snooping multicast group profile should be displayed.
mld_snooping - Specify that an MLD snooping multicast group profile should be displayed.
multicast_vlan_group_profile - Specify the profile name of the existing multicast VLAN profile
that should be displayed.
<profile_name 1-32> - (Optional) Enter the multicast VLAN group profile name here. The
name can be up to 32 characters long.
Restrictions
None.
Example
To display all IGMP snooping multicast VLAN profiles:
645
Total Entries : 2
DGS-3120-24TC:admin#
Note that a profile cannot overlap in different multicast VLANs. Multiple profiles can be added to a
multicast VLAN.
Format
config [igmp_snooping | mld_snooping] multicast_vlan_group <vlan_name 32> [add |
delete] profile_name <profile_name 1-32>
Parameters
igmp_snooping - Specify IGMP snooping should be configured.
mld_snooping - Specify MLD snooping should be configured.
multicast_vlan_group - The name of the multicast VLAN to be configured. Each multicast VLAN
is given a name of up to 32 characters.
<vlan_name 32> - Enter the multicast VLAN name here. The VLAN name can be up to 32
characters long.
add - Used to associate a profile to a multicast VLAN.
delete - Used to de-associate a profile from a multicast VLAN.
profile_name - Specify the multicast VLAN profile name.
<profile_name 1-32> - Enter the multicast VLAN profile name here. The name can be up to
32 characters long.
646
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add an IGMP snooping profile to a multicast VLAN group with the name “v1”:
DGS-3120-24TC:admin# config igmp_snooping multicast_vlan_group v1 add
profile_name channel_1
Command: config igmp_snooping multicast_vlan_group v1 add profile_name
channel_1
Success.
DGS-3120-24TC:admin#
Format
show [igmp_snooping | mld_snooping] multicast_vlan_group {<vlan_name 32>}
Parameters
igmp_snooping - Specify that IGMP snooping VLAN groups should be displayed.
mld_snooping - Specify that MLD snooping VLAN groups should be displayed.
multicast_vlan_group - Specify the the name of the multicast VLAN to be displayed.
<vlan_name 32> - (Optional) Enter the VLAN name here. The VLAN name can be up to 32
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To show all MLD snooping multicast VLAN groups setup on the Switch:
DGS-3120-24TC:admin# show mld_snooping multicast_vlan_group
Command: show mld_snooping multicat_vlan_group
VLAN Name VLAN ID Multicast Group Profiles
------------------------------ ------------- -------------------------
mod 8 test
DGS-3120-24TC:admin#
647
Format
delete [igmp_snooping | mld_snooping] multicast_vlan <vlan_name 32>
Parameters
igmp_snooping - Specify that an IGMP snooping multicast VLAN will be deleted.
mld_snooping - Specify that an MLD snooping multicast VLAN will be deleted.
multicast_vlan - The name of the multicast VLAN to be deleted.
<vlan_name 32> -Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an MLD snooping multicast VLAN called “v1”:
DGS-3120-24TC:admin# delete mld_snooping multicat_vlan v1
Command: delete mld_snooping multicat_vlan v1
Success.
DGS-3120-24TC:admin#
Format
enable [igmp_snooping | mld_snooping] multicast_vlan
Parameters
igmp_snooping - Specify that IGMP snooping multicast VLAN is to be enabled.
mld_snooping - Specify that MLD snooping multicast VLAN is to be enabled.
648
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the IGMP snooping multicast VLAN function globally:
DGS-3120-24TC:admin# enable igmp_snooping multicast_vlan
Command: enable igmp_snooping multicast_vlan
Success.
DGS-3120-24TC:admin#
Format
disable [igmp_snooping | mld_snooping] multicast_vlan
Parameters
igmp_snooping - Specify that the IGMP snooping multicast VLAN function should be disabled.
mld_snooping - Specify that the MLD snooping multicast VLAN function should be disabled.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the MLD snooping multicast VLAN function:
DGS-3120-24TC:admin# disable mld_snooping multicast_vlan
Command: disable mld_snooping multicast_vlan
Success.
DGS-3120-24TC:admin#
649
Format
config [igmp_snooping | mld_snooping] multicast_vlan forward_unmatched [enable |
disable]
Parameters
igmp_snooping - Specify that the IGMP snooping multicast VLAN function will be configured.
mld_snooping - Specify that the MLD snooping multicast VLAN function will be configured.
multicast_vlan forward_unmatched - Specify to enable or disable packet flooding on the
multicast VLAN.
enable - The packet will be flooded on the VLAN.
disable - The packet will be dropped.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the forwarding mode for multicast VLAN unmatched packets:
DGS-3120-24TC:admin# config igmp_snooping multicast_vlan forward_unmatched
enable
Command: config igmp_snooping multicast_vlan forward_unmatched enable
Success.
DGS-3120-24TC:admin#
Format
show [igmp_snooping | mld_snooping] multicast_vlan {<vlan_name 32>}
650
Parameters
igmp_snooping - Specify that IGMP snooping multicast VLANs will be displayed.
mld_snooping - Specify that MLD snooping multicast VLANs will be displayed.
multicast_vlan - The name of the multicast VLAN to be shown.
<vlan_name 32> - (Optional) Enter the VLAN name here. The VLAN name can be up to 32
characters long.
Restrictions
None.
Example
To display all IGMP snooping multicast VLANs:
DGS-3120-24TC:admin# show igmp_snooping multicast_vlan
Command: show igmp_snooping multicast_vlan
Member(Untagged) Ports : 1
Tagged Member Ports :
Source Ports : 3
Untagged Source Ports :
Status : Disabled
Replace Source IP : 0.0.0.0
Remap Priority : None
Total Entries: 1
DGS-3120-24TC:admin#
651
Format
create nlb unicast_fdb <macaddr>
Parameters
<macaddr> - Specify the MAC address of the NLB unicast FDB entry to be created.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an NLB unicast MAC forwarding entry, for the product that support the VLAN information
on the unicast forwarding:
DGS-3120-24TC:admin#create nlb unicast_fdb 02-bf-01-01-01-01
Command: create nlb unicast_fdb 02-BF-01-01-01-01
Success.
DGS-3120-24TC:admin#
652
Format
config nlb unicast_fdb <macaddr> [add | delete] <portlist>
Parameters
<macaddr> - Specify the MAC address of the NLB unicast FDB entry to be configured.
add - Specify to add the ports.
delete - Specify to delete the ports.
<portlist> - Specify a list of forwarding ports to be added or removed.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure NLB unicast FDB entry, for the product that support the VLAN information on the
unicast forwarding:
DGS-3120-24TC:admin#config nlb unicast_fdb 02-BF-01-01-01-01 add 1:1-1:5
Command: config nlb unicast_fdb 02-BF-01-01-01-01 add 1:1-1:5
Success.
DGS-3120-24TC:admin#
Format
delete nlb unicast_fdb <macaddr>
Parameters
<macaddr> - Specify the MAC address of the NLB unicast FDB entry to be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the NLB unicast FDB entry, for the product that support the VLAN information on the
unicast forwarding:
653
Success.
DGS-3120-24TC:admin#
Format
create nlb multicast_fdb [<vlan_name 32> | vlanid <vlanid 1-4094>] <macaddr>
Parameters
multicast_fdb - Specify the VLAN of the NLB multicast FDB entry to be created.
<vlan_name 32> - Enter the VLAN name here. The VLAN name can be up to 32 characters
long.
vlanid - Specify the VLAN by the VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here.
<macaddr> - Enter the MAC address of the NLB multicast FDB entry to be created. Multicast
MAC addresses with the prefix of 33-33-XX-XX-XX is used for address mapping with IP
addresses. To avoid incorrect forwarding behaviors, 33-33-XX-XX-XX is not supported.
Multicast MAC addresses with the prefix 01-80-C2-XX-XX is reserved MAC addresses and is
also not supported.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a NLB multicast FDB entry:
654
Success.
DGS-3120-24TC:admin#
Format
config nlb multicast_fdb [<vlan_name 32>|vlanid <vlanid 1-4094>] <macaddr> [add | delete]
<portlist>
Parameters
<vlan_name 32> - Specify the VLAN of the NLB multicast FDB entry to be configured.
vlanid - Specify the VLAN by the VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here.
<macaddr> - Specify the Mac address of the NLB multicast FDB entry to be configured.
add - Specify a list of forwarding ports to be added.
delete - Specify a list of forwarding ports to be deleted.
<portlist> - Enter the list of ports used for this configuration.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure NLB multicast MAC forwarding database:
DGS-3120-24TC:admin# config nlb multicast_fdb default 03-bf-01-01-01-01 add
1:1-1:5
Command: config nlb multicast_fdb default 03-bf-01-01-01-01 add 1:1-1:5
Success.
DGS-3120-24TC:admin#
655
Format
delete nlb multicast_fdb [<vlan_name 32> |vlanid <vlanid 1-4094>] <macaddr>
Parameters
<vlan_name 32> - Specify the VLAN of the NLB multicast FDB entry to be deleted.
vlanid - Specify the VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here.
<macaddr> - Specify the MAC address of the NLB multicast FDB entry to be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete NLB multicast FDB entry:
DGS-3120-24TC:admin# delete nlb multicast_fdb default 03-bf-01-01-01-01
Command: delete nlb multicast_fdb default 03-bf-01-01-01-01
Success.
DGS-3120-24TC:admin#
Format
show nlb fdb
Parameters
None.
Restrictions
None.
Example
To display the NLB forwarding table:
656
Total Entries : 2
DGS-3120-24TC:admin#
657
Format
show packet ports <portlist>
Parameters
<portlist> - Specify a range of ports to be displayed.
Restrictions
None.
Example
To display the packets analysis for port 7 of the unit 1:
658
Format
show errors ports <portlist>
Parameters
<portlist> - Specify a range of ports to be displayed.
Restrictions
None.
Example
To display the errors of the port 3 of unit 1:
659
Format
show utilization [cpu | ports]
Parameters
cpu - Specify to display information regarding the CPU.
ports - Specify a range of ports to be displayed.
Restrictions
None.
Example
To display the ports utilization:
660
661
CPU Utilization
-------------------------------------------------------------------------------
Five seconds - 10 % One minute - 10 % Five minutes - 10 %
Format
show utilization dram {unit <unit_id>}
Parameters
unit - (Optional) Specify the Switch unit ID to be displayed.
<unit_id> - Enter teh Switch unit ID used here.
Restrictions
None.
Example
To display DRAM utilization:
662
Format
show utilization flash {unit <unit_id>}
Parameters
unit - (Optional) Specify the Switch unit ID to be displayed.
<unit_id> - Enter teh Switch unit ID used here.
Restrictions
None.
Example
To display FLASH utilization:
DGS-3120-24TC:admin#show utilization flash
Command: show utilization flash
663
Format
clear counters {ports <portlist>}
Parameters
ports - (Optional) Specify a range of ports to be configured. The port list is specified by listing the
lowest switch number and the beginning port number on that switch, separated by a colon.
Then highest switch number, and the highest port number of the range (also separeted by a
colon) are specified. The beginning and end of the port list range are seperated by a dash.
<portlist> - Enter a list of ports used for the configuration here.
If no parameter is specified, system will display counters of all the ports .
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To clear the Switch’s statistics counters:
DGS-3120-24TC:admin# clear counters ports 2:7-2:9
Command: clear counters ports 2:7-2:9
Success.
DGS-3120-24TC:admin#
664
665
Format
config ethernet_oam ports [<portlist> | all] [mode [active | passive] | state [enable | disable]
| link_monitor [error_symbol {threshold <range 0-4294967295> | window <millisecond 1000-
60000> | notify_state [enable | disable]}(1) | error_frame {threshold <range 0-4294967295> |
window <millisecond 1000-60000> | notify_state [enable | disable]}(1) |
error_frame_seconds {threshold <range 1-900> | window <millisecond 10000-900000> |
notify_state [enable | disable]}(1) | error_frame_period {threshold <range 0-4294967295> |
window <number 148810-100000000> | notify_state [enable | disable]}(1)]|
critical_link_event [dying_gasp | critical_event] notify_state [enable | disable] |
remote_loopback [start | stop] | received_remote_loopback [process | ignore]]
Parameters
<portlist> - Used to specify a range of ports to be configured.
all - Used to specify all ports are to be configured.
mode - Specify the operation mode. The default mode is active.
active - Specify to operate in active mode.
passive - Specify to operate in passive mode.
state - Specify the OAM function status.
enable - Specify to enable the OAM function.
disable - Specify to disable the OAM function.
link_monitor - Used to detect and indicate link faults under a variety of conditions.
error_symbol - Used to generate an error symbol period event to notify the remote OAM
peer.
threshold - Specify the number of symbol errors in the period that is required to be equal
to or greater than in order for the event to be generated. The default value of threshold
is 1 symbol error.
<range 0-4294967295> - Specify the range from 0 to 4294967295.
window - The range is 1000 to 60000 ms. The default value is 1000ms.
<millisecond 1000-60000> -The range is 1000 to 60000 ms.
notify_state - Specify the event notification status. The default state is enable.
enable -Specify to enable event notification.
disable -Specify to disable event notification.
error_frame - Specify the error frame.
threshold - Specify a threshold range.
<range 0-4294967295> - Specify a threshold range between 0 and 4294967295.
window - The range is 1000 to 60000 ms. The default value is 1000ms.
<millisecond 1000-60000> - The range is 1000 to 60000 ms.
notify_state - Specify the event notification status. The default state is enable.
enable - Specify to enable event notification.
disable - Specify to disable event notification.
error_frame_seconds - Specify error fram time.
threshold - Specify a threshold range between 1 and 900.
<range 1-900> -Specify a threshold range between 1 and 900.
window - The range is 1000 to 900000 ms.
<millisecond 10000-900000> - The range is 1000 to 900000 ms.
notify_state - Specify the event notification status. The default state is enable.
enable - Specify to enable event notification.
disable - Specify to disable event notification.
error_frame_period - Specify error frame period.
threshold - Specify a threshold range between 0 and 4294967295.
<range 0-4294967295> -Specify a threshold range between 0 and 4294967295.
window - The range is 148810 to 100000000 ms.
<number 148810-100000000> - The range is 148810 to 100000000 ms.
notify_state - Specify the event notification status. The default state is enable.
enable - Specify to enable event notification.
disable - Specify to disable event notification.
666
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure Ethernet OAM on ports 1 to 2 in active mode:
DGS-3120-24TC:admin# config ethernet_oam ports 1-2 mode active
Command: config ethernet_oam ports 1-2 mode active
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
To configure the error symbol threshold to 2 and period to 1000ms for port 1:
DGS-3120-24TC:admin# config ethernet_oam ports 1 link_monitor error_symbol
threshold 2 window 1000 notify_state enable
Command: config ethernet_oam ports 1 link_monitor error_symbol threshold 2
window 1000 notify_state enable
Success.
DGS-3120-24TC:admin#
To configure the error frame threshold to 2 and period to 1000 ms for port 1:
667
Success.
DGS-3120-24TC:admin#
To configure the error frame seconds threshold to 2 and period to 10000 ms for port 1:
DGS-3120-24TC:admin# config ethernet_oam ports 1 link_monitor
error_frame_seconds threshold 2 window 10000 notify_state enable
Command: config ethernet_oam ports 1 link_monitor error_frame_seconds threshold
2 window 10000 notify_state enable
Success.
DGS-3120-24TC:admin#
To configure the error frame period threshold to10 and period to 1000000 ms for port 1:
DGS-3120-24TC:admin# config ethernet_oam ports 1 link_monitor
error_frame_period threshold 10 window 1000000 notify_state enable
Command: config ethernet_oam ports 1 link_monitor error_frame_period threshold
10 window 1000000 notify_state enable
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
To configure the method of processing the received remote loopback command as “process” on
port 1:
668
Success.
DGS-3120-24TC:admin#
• Unidirectional: It indicates that the OAM entity supports the transmission of OAMPDUs on links
that are operating in unidirectional mode (traffic flowing in one direction only).
• Loopback: It indicates that the OAM entity can initiate and respond to loopback commands.
• Link Monitoring: It indicates that the OAM entity can send and receive Event Notification
OAMPDUs.
669
• Variable: It indicates that the OAM entity can send and receive variable requests to monitor the
attribute value as described in the IEEE 802.3 Clause 30 MIB.
The event log displays Ethernet OAM event log information. The switch can buffer 1000 event logs.
The event log is different from sys-log as it provides more detailed information than sys-log. Each
OAM event will be recorded in both OAM event log and syslog.
Format
show ethernet_oam ports {<portlist>} [status | configuration | statistics | event_log {index
<value_list>}]
Parameters
<portlist> - (Optional) Specify the range of ports to display.
status - Specify to display the Ethernet OAM status.
configuration - Specify to display the Ethernet OAM configuration.
statistics - Specify to display Ethernet OAM statistics.
event_log - Specify to display the Ethernet OAM event log information.
index - (Optional) Specify an index range to display.
<value_list> - (Optional) Specify an index range to display.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To display Ethernet OAM statistics information for port 1:
670
Port 1
------------------------------------------------------------
Information OAMPDU TX : 0
Information OAMPDU RX : 0
Unique Event Notification OAMPDU TX : 0
Unique Event Notification OAMPDU RX : 0
Duplicate Event Notification OAMPDU TX: 0
Duplicate Event Notification OAMPDU RX: 0
Loopback Control OAMPDU TX : 0
Loopback Control OAMPDU RX : 0
Variable Request OAMPDU TX : 0
Variable Request OAMPDU RX : 0
Variable Response OAMPDU TX : 0
Variable Response OAMPDU RX : 0
Organization Specific OAMPDUs TX : 0
Organization Specific OAMPDUs RX : 0
Unsupported OAMPDU TX : 0
Unsupported OAMPDU RX : 0
Frames Lost Due To OAM : 0
DGS-3120-24TC:admin#
Format
clear ethernet_oam ports [<portlist> | all] [event_log | statistics]
Parameters
<portlist> - Specify a range of Ethernet OAM ports to be cleared.
all - Specify to clear all Ethernet OAM ports.
event_log - Specify to clear Ethernet OAM event log information.
statistics - Specify to clear Ethernet OAM statistics.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear port 1 OAM statistics:
671
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
672
Format
config ospf [ipif <ipif_name 12> | all] {area <area_id> | priority <value> | hello_interval <sec
1-65535> | dead_interval <sec 1-65535> | authentication [none | simple <password 8> | md5
673
<key_id 1-255>] | metric <value 1-65535> | state [enable | disable] | passive [enable | disable]
| distribute_list_in [access_list <list_name 16> | none]}(1)
Parameters
ipif - Specify the name of the IP interface.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
all - Specify that all the IP interfaces will be used.
area - (Optional) Specify the area to which the interface is assigned. An Area ID is a 32-bit
number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the OSPF area
in the OSPF domain.
<area_id> - Enter the area ID used here.
priority - (Optional) Specify the priority value for the Designated Router election. If a Router
Priority of 0 is set, the Switch cannot be elected as the DR for the network.
<value> - Enter the priority value used here.
hello_interval - (Optional) Allows the specification of the interval between the transmission of
OSPF Hello packets, in seconds. Between 1 and 65535 seconds can be specified. The Hello
Interval, Dead Interval, Authorization Type, and Authorization Key should be the same for all
routers on the same network.
<sec 1-65535> - Enter the hello packet interval value here. This value must be between 1 and
65535 seconds.
dead_interval - (Optional) Allows the specification of the length of time between the receipt of
Hello packets from a neighbor router before the selected area declares that router down. An
interval between 1 and 65535 seconds can be specified. The Dead Interval must be evenly
divisable by the Hello Interval.
<sec 1-65535> - Enter the dead packet interval value here. This value must be between 1 and
65535 seconds.
authentication - (Optional) Specify that authentication value.
none - Specify that the authentication value will be set to none.
simple - Specify that a simple text password must be specified.
<password 8> - Enter the simple text password value here.
md5 - Specify that the authentication will be set to use an MD5 key ID.
<key_id 1-255> - Enter the MD5 key used here. This key can must be between 1 and 255.
metric - (Optional) Specify the interface metric used.
<value 1-65535> - Enter the metric value here. This value must be between 1 and 65535.
state - (Optional) Specify the OSPF interface state here.
enable - Specify that the state will be set to enabled.
disable - Specify that the state will be set to disabled.
passive - (Optional) Specify whether the designated entry should be a passive interface or not.
When the interface is specified to be passive, OSPF protocol packets will neither be sent out
or received on the interface.
enable - Specify that the passive interface will be enabled.
disable - Specify that the passive interface will be disabled.
distribute_list_in - Specify the inbound route filter on the OSPF interface.
access_list - Use an IP standard access list to filter the receiving OSPF routes.
<list_name16> - Enter the access list name.
none - Specify not to filter the receiving OSPF routes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure OSPF interface settings:
674
Success.
DGS-3120-24TC:admin#
Format
create ospf aggregation <area_id> <network_address> lsdb_type [summary {advertise
[enable | disable]} | nssa_ext {advertise [enable | disable]}]
Parameters
<area_id> - A 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<network_address> - The IP address that uniquely identifies the network that corresponds to
the OSPF Area. The network address format is 'IP address/prefix length'.
lsdb_type - Specify the Link-State Database (LSDB) type of address aggregation.
summary - Specify the LSDB type as summary.
advertise - (Optional) Allows for the advertisement of the summary LSAs.
enable - Specify that the advertisement trigger will be enabled.
disable - Specify that the advertisement trigger will be disabled.
nssa_ext - Specify the LSDB type as a Not-So-Stub Area External Route (NSSA EXT).
advertise - (Optional) Allows for the advertisement of aggregated NSSA external route.
enable - Specify that the advertisement trigger will be enabled.
disable - Specify that the advertisement trigger will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an OSPF area aggregation entry:
DGS-3120-24TC:admin#create ospf aggregation 10.48.74.122 192.168.0.1/16
lsdb_type summary
Command: create ospf aggregation 10.48.74.122 192.168.0.1/16 lsdb_type summary
Success.
DGS-3120-24TC:admin#
675
Format
config ospf aggregation <area_id> <network_address> lsdb_type [summary {advertise
[enable | disable]} | nssa_ext {advertise [enable | disable]}]
Parameters
<area_id> - A 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<network_address> - The IP address that uniquely identifies the network that corresponds to
the OSPF Area. The network address format is 'IP address/prefix length'.
lsdb_type - Specify the Link-State Database (LSDB) type of address aggregation.
summary - Specify the LSDB type as summary.
advertise - (Optional) Allows for the advertisement of the summary LSAs.
enable - Specify that the advertisement trigger will be enabled.
disable - Specify that the advertisement trigger will be disabled.
nssa_ext - Specify the LSDB type as a Not-So-Stub Area External Route (NSSA EXT).
advertise - (Optional) Allows for the advertisement of aggregated NSSA external route.
enable - Specify that the advertisement trigger will be enabled.
disable - Specify that the advertisement trigger will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the OSPF area aggregation settings:
DGS-3120-24TC:admin#config ospf aggregation 10.48.74.122 192.168.0.1/16
lsdb_type summary advertise enable
Command: config ospf aggregation 10.48.74.122 192.168.0.1/16 lsdb_type summary
advertise enable
Success.
DGS-3120-24TC:admin#
Format
delete ospf aggregation <area_id> <network_address> lsdb_type [summary | nssa_ext]
676
Parameters
<area_id> - A 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<network_address> - The IP address that uniquely identifies the network that corresponds to
the OSPF Area. The network address format is 'IP address/prefix length'.
lsdb_type - Specify the LSDB type.
summary - Specify the summary type.
nssa_ext - Specify the NSSA EXT type.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPF area aggregation entry:
DGS-3120-24TC:admin#delete ospf aggregation 10.48.74.122 192.168.0.1/16
lsdb_type summary
Command: delete ospf aggregation 10.48.74.122 192.168.0.1/16 lsdb_type summary
Success.
DGS-3120-24TC:admin#
Format
show ospf aggregation {<area_id>}
Parameters
<area_id> - (Optional) Enter the area ID used here.
Restrictions
None.
Example
To display OSPF area aggregation settings:
677
Total Entries : 1
DGS-3120-24TC:admin#
Format
create ospf area <area_id> type [normal | [stub | nssa {translate [enable | disable]}]
{stub_summary [enable | disable] | metric <value 0-65535>}]
Parameters
<area_id> - Enter the OSPF area ID used here.
type - Specify the OSPF area operation type. In some Autonomous Systems, the majority of the
topological database may consist of AS external advertisements. An OSPF AS external
advertisement is usually flooded throughout the entire AS. However, OSPF allows certain
areas to be configured as "stub areas". AS external advertisements are not flooded
into/throughout stub areas; routing to AS external destinations in these areas is based on a
(per-area) default only. This reduces the topological database size, and therefore the memory
requirements, for a stub area's internal routers.
normal - Specify that the OSPF area type will be set to normal.
stub - Specify that the OSPF area type will be set to STUB.
nssa - Specify that the OSPF area type will be set to NSSA.
translate - (Optional) Specify if translation will be enabled or disabled.
enable - Specify that the translate option will be enabled.
disable - Specify that the translate option will be disabled.
stub_summary - (Optional) Specify whether the summary LSA is effective for this area.
enable - Specify that the STUB summary option will be enabled.
disable - Specify that the STUB summary option will be disabled.
metric - (Optional) Specify the metric (1 - 65535; 0 for auto cost) of this area.
<value 0-65535> - Enter the metric value used here. This value must be between 0 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
678
Example
To create an OSPF area:
DGS-3120-24TC:admin#create ospf area 10.48.74.122 type stub stub_summary enable
metric 1
Command: create ospf area 10.48.74.122 type stub stub_summary enable metric 1
Success.
DGS-3120-24TC:admin#
Format
config ospf area <area_id> type [normal | [stub | nssa {translate [enable | disable]}]
{stub_summary [enable | disable] | metric <value 0-65535>}]
Parameters
<area_id> - Enter the OSPF area ID used here.
type - Specify the OSPF area operation type. In some Autonomous Systems, the majority of the
topological database may consist of AS external advertisements. An OSPF AS external
advertisement is usually flooded throughout the entire AS. However, OSPF allows certain
areas to be configured as "stub areas". AS external advertisements are not flooded
into/throughout stub areas; routing to AS external destinations in these areas is based on a
(per-area) default only. This reduces the topological database size, and therefore the memory
requirements, for a stub area's internal routers.
normal - Specify that the OSPF area type will be set to normal.
stub - Specify that the OSPF area type will be set to STUB.
nssa - Specify that the OSPF area type will be set to NSSA.
translate - (Optional) Specify if translation will be enabled or disabled.
enable - Specify that the translate option will be enabled.
disable - Specify that the translate option will be disabled.
stub_summary - (Optional) Specify whether the summary LSA is effective for this area.
enable - Specify that the STUB summary option will be enabled.
disable - Specify that the STUB summary option will be disabled.
metric - (Optional) Specify the metric (1 - 65535; 0 for auto cost) of this area.
<value 0-65535> - Enter the metric value used here. This value must be between 0 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an OSPF area’s settings:
679
Success.
DGS-3120-24TC:admin#
Format
delete ospf area <area_id>
Parameters
<area_id> - Enter the OSPF area ID used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPF area:
DGS-3120-24TC:admin#delete ospf area 10.48.74.122
Command: delete ospf area 10.48.74.122
Success.
DGS-3120-24TC:admin#
Format
show ospf area {<area_id>}
Parameters
<area_id> - (Optional) Enter the OSPF area ID used here.
680
Restrictions
None.
Example
To display OSPF areas configuration:
DGS-3120-24TC:admin#show ospf area
Command: show ospf area
Area ID Type Stub Import Summary LSA Stub Default Cost Translate
--------------- ------ ----------------------- ----------------- ---------
0.0.0.0 Normal None None None
Total Entries : 2
DGS-3120-24TC:admin#
Format
create ospf host_route <ipaddr> {area <area_id> | metric <value 1-65535>}
Parameters
<ipaddr> - Enter the host’s IP address used here.
area - (Optional) Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that
uniquely identifies the OSPF area in the OSPF domain.
<area_id> - Enter the area ID value here.
metric - (Optional) Specify a metric that will be advertised.
<value 1-65535> - Enter the metric value used here. This value must be between 1 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an OSPF host route:
681
Success.
DGS-3120-24TC:admin#
Format
config ospf host_route <ipaddr> {area <area_id> | metric <value 1-65535>}(1)
Parameters
<ipaddr> - Enter the host’s IP address used here.
area - (Optional) Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that
uniquely identifies the OSPF area in the OSPF domain.
<area_id> - Enter the area ID value here.
metric - (Optional) Specify a metric that will be advertised.
<value 1-65535> - Enter the metric value used here. This value must be between 1 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an OSPF host route:
DGS-3120-24TC:admin#config ospf host_route 10.48.74.122 area 10.1.1.1 metric 3
Command: config ospf host_route 10.48.74.122 area 10.1.1.1 metric 3
Success.
DGS-3120-24TC:admin#
Format
delete ospf host_route <ipaddr>
682
Parameters
<ipaddr> - Enter the host’s IP address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPF host route:
DGS-3120-24TC:admin#delete ospf host_route 10.48.74.122
Command: delete ospf host_route 10.48.74.122
Success.
DGS-3120-24TC:admin#
Format
show ospf host_route {<ipaddr>}
Parameters
<ipaddr> - (Optional) Enter the host’s IP address used here.
Restrictions
None.
Example
To display the OSPF host route settings:
683
Total Entries : 1
DGS-3120-24TC:admin#
Format
config ospf router_id <ipaddr>
Parameters
<ipaddr> - Enter the router's IP address here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the router ID for the Switch:
DGS-3120-24TC:admin#config ospf router_id 10.48.74.122
Command: config ospf router_id 10.48.74.122
Success.
DGS-3120-24TC:admin#
684
Format
create ospf virtual_link <area_id> <neighbor_id> {hello_interval <sec 1-65535> |
dead_interval <sec 1-65535> | authentication [none | simple <password 8> | md5 <key_id 1-
255>]}
Parameters
<area_id> - Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<neighbor_id> - Specify the OSPF router ID for the remote area. This is a 32-bit number in the
form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the remote area’s Area Border
Router. This is the router ID of the neighbor router.
hello_interval - (Optional) Allows the specification of the interval between the transmission of
OSPF Hello packets, in seconds. The Hello Interval, Dead Interval, Authorization Type, and
Authorization Key should be the same for all routers on the same network.
<sec 1-65535> - Enter the hello packet interval used here. This value must be between 1 and
65535.
dead_interval - (Optional) Allows the specification of the length of time between the receipt of
Hello packets from a neighbor router before the selected area declares that router down. An
interval between 1 and 65535 seconds can be specified. The Dead Interval must be evenly
divisable by the Hello Interval.
<sec 1-65535> - Enter the dead packet interval used here. This value must be between 1 and
65535.
authentication - (Optional) Specify the authentication type used.
none - Specify that the authentication type will be set to none.
simple - Specify that a simple text password will be used in the authentication.
<password 8> - Enter the simple text password value here. This value can be up to 8
characters long.
md5 - Specify that an MD5 key ID will be used for the authentication.
<key_id 1-255> - Enter the MD5 key ID value used here. This value can be between 1 and
255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a virtual link to another ABR:
DGS-3120-24TC:admin#create ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval
10
Command: create ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval 10
Success.
DGS-3120-24TC:admin#
685
Format
config ospf virtual_link <area_id> <neighbor_id> {hello_interval <sec 1-65535> |
dead_interval <sec 1-65535> | authentication [none | simple <password 8> | md5 <key_id 1-
255>]}(1)
Parameters
<area_id> - Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<neighbor_id> - Specify the OSPF router ID for the remote area. This is a 32-bit number in the
form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the remote area’s Area Border
Router. This is the router ID of the neighbor router.
hello_interval - (Optional) Allows the specification of the interval between the transmission of
OSPF Hello packets, in seconds. The Hello Interval, Dead Interval, Authorization Type, and
Authorization Key should be the same for all routers on the same network.
<sec 1-65535> - Enter the hello packet interval used here. This value must be between 1 and
65535.
dead_interval - (Optional) Allows the specification of the length of time between the receipt of
Hello packets from a neighbor router before the selected area declares that router down. An
interval between 1 and 65535 seconds can be specified. The Dead Interval must be evenly
divisable by the Hello Interval.
<sec 1-65535> - Enter the dead packet interval used here. This value must be between 1 and
65535.
authentication - (Optional) Specify the authentication type used.
none - Specify that the authentication type will be set to none.
simple - Specify that a simple text password will be used in the authentication.
<password 8> - Enter the simple text password value here. This value can be up to 8
characters long.
md5 - Specify that an MD5 key ID will be used for the authentication.
<key_id 1-255> - Enter the MD5 key ID value used here. This value can be between 1 and
255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the OSPF virtual link:
DGS-3120-24TC:admin#config ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval
30
Command: config ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval 30
Success.
DGS-3120-24TC:admin#
686
Format
delete ospf virtual_link <area_id> <neighbor_id>
Parameters
<area_id> - Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely
identifies the OSPF area in the OSPF domain.
<neighbor_id> - Specify the OSPF router ID for the remote area. This is a 32-bit number in the
form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the remote area’s Area Border
Router. This is the router ID of the neighbor router.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPF virtual link:
DGS-3120-24TC:admin#delete ospf virtual_link 10.1.1.1 20.1.1.1
Command: delete ospf virtual_link 10.1.1.1 20.1.1.1
Success.
DGS-3120-24TC:admin#
Format
show ospf virtual_link {<area_id> <neighbor_id>}
Parameters
<area_id> - (Optional) Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that
uniquely identifies the OSPF area in the OSPF domain.
<neighbor_id> - (Optional) The OSPF router ID for the remote area. This is a 32-bit number in
the form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the remote area’s Area
Border Router. This is the router ID of the neighbor router.
If no parameter is specified, the system will display the all current OSPF virtual link configuration.
Restrictions
None.
Example
To display the current OSPF virtual link configuration:
687
Total Entries : 1
DGS-3120-24TC:admin#
Format
enable ospf
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable OSPF on the Switch:
DGS-3120-24TC:admin#enable ospf
Command: enable ospf
Success.
DGS-3120-24TC:admin#
688
Format
disable ospf
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable OSPF on the Switch:
DGS-3120-24TC:admin#disable ospf
Command: disable ospf
Success.
DGS-3120-24TC:admin#
Format
show ospf {[ipif <ipif_name 12> | all]}
Parameters
ipif - (Optional) Specify the IP interface name.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
all - Specify that all the IP interfaces will be displayed.
If no parameter is specified, the system will display the current OSPF state.
Restrictions
None.
Example
To display the current OSPF state:
689
DGS-3120-24TC:admin#show ospf
Command: show ospf
Total Entries : 1
Area ID Type Stub Import Summary LSA Stub Default Cost Translate
--------------- ------ ----------------------- ----------------- ---------
0.0.0.0 Normal None None None
Total Entries : 1
CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All
Format
show ospf lsdb {area <area_id> | advertise_router <ipaddr> | type [rtrlink | netlink |
summary | assummary | asextlink | nssa_ext | stub]}
Parameters
area - (Optional) Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that
uniquely identifies the OSPF area in the OSPF domain.
<area_id> - Enter the area ID used here.
advertise_router - (Optional) Specify the IP address of the advertising router.
<ipaddr> - Enter the advertising router's IP address here.
type - (Optional) Specify the type of link displayed.
rtrlink - Specify the type to be displayed as router link.
netlink - Specify the type to be displayed as network link.
summary - Specify the type to be displayed as summary.
assummary - Specify the type to be displayed as AS summary.
asextlink - Specify the type to be displayed as AS external link.
nssa_ext - Specify the type to be displayed as NSSA external information.
stub - Specify the type to be displayed as STUB link.
690
Restrictions
None.
Example
To display the link state database of OSPF:
DGS-3120-24TC:admin#show ospf lsdb
Command: show ospf lsdb
Total Entries : 6
DGS-3120-24TC:admin#
Format
show ospf neighbor {<ipaddr>}
Parameters
<ipaddr> - (Optional) Specify the IP address of the neighbor router.
If no parameter is specified, the system will display all OSPF neighbor information.
Restrictions
None.
Example
To display OSPF neighbor information:
691
Total Entries : 1
DGS-3120-24TC:admin#
Format
show ospf virtual_neighbor {<area_id> <neighbor_id>}
Parameters
<area_id> - (Optional) Specify a 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that
uniquely identifies the OSPF area in the OSPF domain.
<neighbor_id> - (Optional) Specify the OSPF router ID for the remote area. This is a 32-bit
number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the remote
area’s Area Border Router.
If no parameter is specified, the system will display all OSPF virtual-link neighbor information.
Restrictions
None.
Example
To display OSPF virtual-link neighbor information:
DGS-3120-24TC:admin#show ospf virtual_neighbor
Command: show ospf virtual_neighbor
Total Entries : 1
DGS-3120-24TC:admin#
692
Format
config ospf default-information {originate [always | default | none] | mettype [1 | 2] | metric
<value 1-65535>}(1)
Parameters
originate - (Optional) Specify the status of originating default information.
always - Specify that the external default route will be originated, whether a default route
exists or not.
default - Specify that the external default route will be originated only when one default route
already exists.
none - Specify that the external default route will never be originated. This is the default
option.
mettype - (Optional) Specify the type of LSA that contains the default external route imported into
OSPF.
1 - Specify that this default external route will be calculated using the metric by adding the
interface cost to the metric entered in the metric field.
2 - Specify that this default external route will be calculated using the metric entered in the
metric field without change. This is the default option.
metric - (Optional) Specify the metric used by originating default external route.
<value 1-65535> - Enter the metric value used here. This value must be between 1 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the status of originating the OSPF default external route:
DGS-3120-24TC:admin#config ospf default-information originate always
Command: config ospf default-information originate always
Success.
DGS-3120-24TC:admin#
693
Format
config ospfv3 router_id <ipaddr>
Parameters
<ipaddr> - Enter a 32-bit number in the form of an IPv4 address that uniquely identifies the router
in the OSPFv3 domain. In OSPFv3, neighboring routers on a given link are always identified
by their OSPFv3 Router ID. Set 0.0.0.0 means auto-selected. Switch will select the largest
694
IPv4 address among the IP interfaces to be the router ID. The default value of OSPFv3 router
ID is 0.0.0.0 (auto-selected). Only with executing this command, the OSPFv3 router ID can be
changed.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure OSPFv3 router ID:
DGS-3120-24TC:admin#config ospfv3 router_id 1.1.1.1
Command: config ospfv3 router_id 1.1.1.1
Success.
DGS-3120-24TC:admin#
Format
enable ospfv3
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable OSPFv3:
DGS-3120-24TC:admin#enable ospfv3
Command: enable ospfv3
Success.
DGS-3120-24TC:admin#
Format
disable ospfv3
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable OSPFv3:
DGS-3120-24TC:admin#disable ospfv3
Command: disable ospfv3
Success.
DGS-3120-24TC:admin#
Format
config ospfv3 [ipif <ipif_name 12> | all] {area <area_id> | priority <value 0-255> |
hello_interval <sec 1-65535> | dead_interval <sec 1-65535> | instance <value 0-255> | metric
<value 1-65535> | state [enable | disable] | passive [enable | disable]}(1)
Parameters
ipif - Specify to configure an OSPFv3 interface.
<ipif_name 12> - Enter the name of the OSPFv3 interface.
all - Specify to configure all OSPFv3 interfaces.
area - (Optional) Specify the OSPFv3 area ID. It is a 32-bit number in the form of an IPv4
address that uniquely identifies the OSPFv3 area in the OSPFv3 domain.
<area_id> - Enter the OSPFv3 area ID.
priority - (Optional) Specify the priority used in the election of the Designated Router (DR).
<value 0-255> - Enter a value between 0 and 255. The default value is 1.
hello_interval - (Optional) Specify to allow the interval between the transmission of OSPFv3
Hello packets, in seconds.
<sec 1-65535> - Enter the time between 1 and 65535. The default value is 10.
dead_interval - (Optional) Specify to allow the interval between the receipt of Hello packets from
a neighbor router before the selected area declares that router down.
<sec 1-65535> - Enter the time between 1 and 65535. The default value is 40.
instance - (Optional) Specify the instance ID of the interface. Support for multiple instances on a
696
link is accomplished through an instance ID contained in the OSPFv3 packet header. If the
instance ID configured on the interface and that of a received OSPFv3 packets do not match,
the interface discards the packet and no neighbor relationship can be established.
<value 0-255> - Enter a value between 0 and 255. The default value is 0.
metric - (Optional) Specify to allow the representative of the OSPFv3 cost to reach the specified
OSPFv3 interface.
<value 1-65535> - Enter a value between 1 and 65535. The default value is 1.
state - (Optional) Specify to enable or disable this interface to run OSPFv3.
enable - Enable the interface to run OSPFv3.
disable - Disable the interface to run OSPFv3. This is the default.
passive - (Optional) Specify that the user may select Active or Passive for this OSPFv3 interface.
Active interface actively advertises OSPFv3 to routers on other Intranets that are not part of
this specific OSPFv3 group. Passive interface does not advertise to any other routers except
those within its OSPFv3 intranet. When this field is disabled, it denotes an active interface. Its
default setting is Disabled.
enable - Specify to be passive interface.
disable - Specify to be active interface.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an OSPFv3 interface:
DGS-3120-24TC:admin#config ospfv3 ipif System area 1.1.1.1 priority 100
hello_interval 20 dead_interval 60 instance 1 metric 20 state enable passive
disable
Command: config ospfv3 ipif System area 1.1.1.1 priority 100 hello_interval 20
dead_interval 60 instance 1 metric 20 state enable passive disable
Success.
DGS-3120-24TC:admin#
Format
show ospfv3 {[ipif <ipif_name 12> | all]}
Parameters
ipif - (Optional) Specify the OSPFv3 interface.
<ipif_name 12> - Enter the OSPFv3 interface name.
all - (Optional) Specify to display all OSPFv3 interfaces.
697
Restrictions
None.
Example
To display OSPFv3 configurations:
DGS-3120-24TC:admin#show ospfv3
Command: show ospfv3
Total Entries: 0
Total Entries: 1
CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All
Format
create ospfv3 area <area_id> type [normal | stub {stub_summary [enable | disable] | metric
<value 0-65535>}]
Parameters
<area_id> - Enter the OSPFv3 area ID. It is a 32-bit number in the form of an IPv4 address that
uniquely identifies the OSPFv3 area in the OSPFv3 domain.
type - The OSPFv3 area mode of operation.
normal - Define the OSPFv3 area created as a normal area.
stub - Define the OSPFv3 area created as a stub area.
698
stub_summary - (Optional) Specify whether the OSPFv3 stub area imports inter-area
prefix LSA advertisements.
enable - Import inter-area prefix LSA into this stub area.
disable - Stop importing inter-area prefix LSA into this stub area.
metric - (Optional) Specify the cost of default inter-area prefix LSA in OSPFv3 stub area.
<value 0-65535> - Enter the value between 0 and 65535. The default value is 1.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an OSPFv3 area:
DGS-3120-24TC:admin#create ospfv3 area 1.1.1.1 type normal
Command: create ospfv3 area 1.1.1.1 type normal
Success.
DGS-3120-24TC:admin#
Format
config ospfv3 area <area_id> type [normal | stub {stub_summary [enable | disable] | metric
<value 0-65535>}]
Parameters
<area_id> - Enter the OSPFv3 area ID. It is a 32-bit number in the form of an IPv4 address that
uniquely identifies the OSPFv3 area in the OSPFv3 domain.
type - The OSPFv3 area mode of operation.
normal - Define the OSPFv3 area created as a normal area.
stub - Define the OSPFv3 area created as a stub area.
stub_summary - (Optional) Specify whether the OSPFv3 stub area imports inter-area
prefix LSA advertisements.
enable - Import inter-area prefix LSA into this stub area.
disable - Stop importing inter-area prefix LSA into this stub area.
metric - (Optional) Specify the cost of default inter-area prefix LSA in OSPFv3 stub area.
<value 0-65535> - Enter the value between 0 and 65535. The default value is 1.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
699
Example
To configure OSPFv3 area:
DGS-3120-24TC:admin#config ospfv3 area 2.2.2.2 type stub
Command: config ospfv3 area 2.2.2.2 type stub
Success.
DGS-3120-24TC:admin#
Format
delete ospfv3 area <area_id>
Parameters
<area_id> - Enter the OSPFv3 area ID. It is a 32-bit number in the form of an IPv4 address that
uniquely identifies the OSPFv3 area in the OSPFv3 domain.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPFv3 area:
DGS-3120-24TC:admin#delete ospfv3 area 2.2.2.2
Command: delete ospfv3 area 2.2.2.2
Success.
DGS-3120-24TC:admin#
Format
show ospfv3 area {<area_id>}
700
Parameters
<area_id> - (Optional) Enter the OSPFv3 area ID. It is a 32-bit number in the form of an IPv4
address that uniquely identifies the OSPFv3 area in the OSPFv3 domain.
Restrictions
None.
Example
To display OSPFv3 areas:
DGS-3120-24TC:admin#show ospfv3 area
Command: show ospfv3 area
Total Entries: 2
DGS-3120-24TC:admin#
Format
create ospfv3 aggregation <area_id> <ipv6networkaddr> advertise [enable | disable]
Parameters
<area_id> - Enter the OSPFv3 area ID where the aggregation belongs to.
<ipv6networkaddr> - Enter the IPv6 network address of the aggregation.
advertise - Specify whether to use this aggregation to aggregate the intra-area routes when it
advertises these routes to another area.
enable - OSPFv3 ABR(Area Border Router) will use this aggregation to aggregate the intra-
area routes when it advertises these routes to another area.
disable - OSPFv3 ABR will not use this aggregation to aggregate the intra-area routes when it
advertises these routes to another area.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
701
Example
To create an OSPFv3 area aggregation:
DGS-3120-24TC:admin#create ospfv3 aggregation 2.2.2.2 2000::/16 advertise
enable
Success.
DGS-3120-24TC:admin#
Format
config ospfv3 aggregation <area_id> <ipv6networkaddr> advertise [enable | disable]
Parameters
<area_id> - Enter the OSPFv3 area ID where the aggregation belongs to.
<ipv6networkaddr> - Enter the IPv6 network address of the aggregation.
advertise - Specify whether to use this aggregation to aggregate the intra-area routes when it
advertises these routes to another area.
enable - OSPFv3 ABR(Area Border Router) will use this aggregation to aggregate the intra-
area routes when it advertises these routes to another area.
disable - OSPFv3 ABR will not use this aggregation to aggregate the intra-area routes when it
advertises these routes to another area.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an OSPFv3 area aggregation:
DGS-3120-24TC:admin#config ospfv3 aggregation 2.2.2.2 2000::/16 advertise
disable
Command: config ospfv3 aggregation 2.2.2.2 2000::/16 advertise disable
Success.
DGS-3120-24TC:admin#
Format
delete ospfv3 aggregation <area_id> <ipv6networkaddr>
Parameters
<area_id> - Enter the OSPFv3 area ID where the aggregation belongs to.
<ipv6networkaddr> - Enter the IPv6 network address of the aggregation.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPFv3 area aggregation:
DGS-3120-24TC:admin#delete ospfv3 aggregation 2.2.2.2 2000::/16
Command: delete ospfv3 aggregation 2.2.2.2 2000::/16
Success.
DGS-3120-24TC:admin#
Format
show ospfv3 aggregation {<area_id>}
Parameters
<area_id> - (Optional) Enter the OSPFv3 area ID where the aggregation belongs to.
Restrictions
None.
Example
To display OSPFv3 area aggregations:
703
Total Entries: 1
DGS-3120-24TC:admin#
Format
show ospfv3 lsdb {area <area_id> | type [rtrlink | netlink | inter_area_prefix |
inter_area_router | asextlink | link_lsa | intra_area_prefix]}
Parameters
area - (Optional) Specify to only display the LSAs that belong to this area.
<area_id> - Enter the area ID.
type - (Optional) Specify to only display the LSAs of the specific type. The detail information for
these LSAs displays at the same time.
rtrlink - Specify to only display Router LSA.
netlink - Specify to only display Network LSA.
inter_area_prefix - Specify to only display Inter-area-prefix LSA.
inter_area_router - Specify to only display Inter-area-router LSA.
asextlink - Specify to only display AS external LSA.
link_lsa - Specify to only display Link LSA.
intra_area_prefix - Specify to only display Intra-area-prefix LSA.
Restrictions
None.
Example
To show display OSPFv3 Link-State Database:
704
Total Entries: 3
DGS-3120-24TC:admin#
Format
show ospfv3 neighbor {<neighbor_id> ipif <ipif_name 12>}
Parameters
<neighbor_id> - (Optional) Specify the neighbor ID.
ipif - (Optional) Specify the interface where the neighbor is built.
<ipif_name 12> - Enter the interface name.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To show ospfv3 neighbor:
705
Total Entries: 2
DGS-3120-24TC:admin#
Format
show ospfv3 virtual_neighbor {<area_id> <neighbor_id>}
Parameters
<area_id> - (Optional) Specify the transit area where the virtual neighbor is built.
<neighbor_id> - (Optional) Specify the virtural neighbor router ID.
Restrictions
None.
Example
To display OSPFv3 virtual neighbor:
DGS-3120-24TC:admin#show ospfv3 virtual_neighbor
Command: show ospfv3 virtual_neighbor
Total Entries: 1
DGS-3120-24TC:admin#
Format
create ospfv3 virtual_link <area_id> <neighbor_id> {hello_interval <sec 1-65535> |
dead_interval <sec 1-65535> | instance <value 0-255>}
Parameters
<area_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies the
OSPFv3 area in the OSPFv3 domain. This area is the transit area where the virtual link is
built.
<neighbor_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies
the OSPFv3 virtual neighbor in the OSPFv3 domain.
hello_interval - (Optional) Specify the interval between the transmission of OSPFv3 hello
packets. The hello interval and dead interval should be the same for all routers at the same
link.
<sec 1-65535> - Enter the interval between 1 and 65535 seconds. The default value is 10.
dead_interval - (Optional) Specify the interval between the receipt of hello packets from a
neighbor router before the selected area declares that the router is down. The dead interval
must be evenly divisible by the hello interval.
<sec 1-65535> - Enter the interval between 1 and 65535 seconds. The default value is 60.
instance - (Optional) The instance ID on the virtual link. Support for multiple instances on a link is
accomplished through an instance ID contained in the OSPFv3 packet header. If the instance
ID configured on the interface and that of a received OSPFv3 packets do not match, the
interface discards the packet and no neighbor relationship can be established.
<value 0-255> - Enter a value between 0 and 255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create OSPFv3 virtual link:
DGS-3120-24TC:admin#create ospfv3 virtual_link 1.1.1.1 60.60.60.60
Command: create ospfv3 virtual_link 1.1.1.1 60.60.60.60
Success.
DGS-3120-24TC:admin#
Format
config ospfv3 virtual_link <area_id> <neighbor_id> {hello_interval <sec 1-65535> |
dead_interval <sec 1-65535> |instance <value 0-255>}(1)
707
Parameters
<area_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies the
OSPFv3 area in the OSPFv3 domain. This area is the transit area where the virtual link is
built.
<neighbor_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies
the OSPFv3 virtual neighbor in the OSPFv3 domain.
hello_interval - (Optional) Specify the interval between the transmission of OSPFv3 hello
packets. The hello interval and dead interval should be the same for all routers at the same
link.
<sec 1-65535> - Enter the interval between 1 and 65535 seconds. The default value is 10.
dead_interval - (Optional) Specify the interval between the receipt of hello packets from a
neighbor router before the selected area declares that the router is down. The dead interval
must be evenly divisible by the hello interval.
<sec 1-65535> - Enter the interval between 1 and 65535 seconds. The default value is 60.
instance - (Optional) The instance ID on the virtual link. Support for multiple instances on a link is
accomplished through an instance ID contained in the OSPFv3 packet header. If the instance
ID configured on the interface and that of a received OSPFv3 packets do not match, the
interface discards the packet and no neighbor relationship can be established.
<value 0-255> - Enter a value between 0 and 255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure an OSPFv3 virtual link:
DGS-3120-24TC:admin#config ospfv3 virtual_link 1.1.1.1 60.60.60.60
hello_interval 20 dead_interval 80 instance 1
Command: config ospfv3 virtual_link 1.1.1.1 60.60.60.60 hello_interval 20
dead_interval 80 instance 1
Success.
DGS-3120-24TC:admin#
Format
delete ospfv3 virtual_link <area_id> <neighbor_id>
Parameters
<area_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies the
OSPFv3 area in the OSPFv3 domain. This area is the transit area where the virtual link is
built.
<neighbor_id> - Specify a 32-bit number in the form of an IPv4 address that uniquely identifies
the OSPFv3 virtual neighbor in the OSPFv3 domain.
708
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an OSPFv3 virtual link:
DGS-3120-24TC:admin#delete ospfv3 virtual_link 1.1.1.1 60.60.60.60
Command: delete ospfv3 virtual_link 1.1.1.1 60.60.60.60
Success.
DGS-3120-24TC:admin#
Format
show ospfv3 virtual_link {<area_id> <neighbor_id>}
Parameters
<area_id> - (Optional) Specify a 32-bit number in the form of an IPv4 address that uniquely
identifies the OSPFv3 area in the OSPFv3 domain. This area is the transit area where the
virtual link is built.
<neighbor_id> - (Optional) Specify a 32-bit number in the form of an IPv4 address that uniquely
identifies the OSPFv3 virtual neighbor in the OSPFv3 domain.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To display an OSPFv3 virtual link:
709
Total Entries: 1
DGS-3120-24TC:admin#
Format
create ipv6route redistribute dst ospfv3 src [local | static | ripng] {mettype [1 | 2] | metric
<value 1-16777214>}
Parameters
local - Redistribute local routes into OSPFv3.
static - Redistribute static routes into OSPFv3.
ripng - Redistribute RIPng routes into OSPFv3.
mettype - (Optional) Allow the selection of one of two methods for calculating the metric value.
1 - 1 calculates the metric (for other routing protocols to OSPFv3) by adding the destination’s
interface cost to the metric entered in the Metric field.
2 - 2 uses the metric entered in the Metric field without change. If the metric type is not
specified, it will be type 2.
metric - (Optional) Specify the metric for the redistributed routes.
<value 1-16777214> - Enter the value between 1 and 16777214. The default value is 20.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create OSPFv3 route redistribution:
710
Success.
DGS-3120-24TC:admin#
Format
config ipv6route redistribute dst ospfv3 src [local | static | ripng] {mettype [1 | 2] | metric
<value 1-16777214>}(1)
Parameters
local - Redistribute local routes into OSPFv3.
static - Redistribute static routes into OSPFv3.
ripng - Redistribute RIPng routes into OSPFv3.
mettype - (Optional) Allow the selection of one of two methods for calculating the metric value.
1 - 1 calculates the metric (for other routing protocols to OSPFv3) by adding the destination’s
interface cost to the metric entered in the Metric field.
2 - 2 uses the metric entered in the Metric field without change. If the metric type is not
specified, it will be type 2.
metric - (Optional) Specify the metric for the redistributed routes.
<value 1-16777214> - Enter the value between 1 and 16777214. The default value is 20.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the metric of OSPFv3 route redistribution:
DGS-3120-24TC:admin#config ipv6route redistribute dst ospfv3 src static mettype
1 metric 100
Command: config ipv6route redistribute dst ospfv3 src static mettype 1 metric
100
Success.
DGS-3120-24TC:admin#
711
Format
delete ipv6route redistribute dst ospfv3 src [local | static | ripng]
Parameters
local - Specify not to redistribute local routes into OSPFv3.
static - Specify not to redistribute static routes into OSPFv3.
ripng - Specify not to redistribute RIPng routes into OSPFv3.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To remove OSPFv3 route redistribution:
DGS-3120-24TC:admin#delete ipv6route redistribute dst ospfv3 src static
Command: delete ipv6route redistribute dst ospfv3 src static
Success.
DGS-3120-24TC:admin#
712
Note: This command does not take effect until being saved.
Format
enable password_recovery
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the password recovery mode:
DGS-3120-24TC:admin# enable password_recovery
Command: enable password_recovery
Success.
DGS-3120-24TC:admin#
Note: This command does not take effect until being saved.
713
Format
disable password_recovery
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the password recovery mode:
DGS-3120-24TC:admin# disable password_recovery
Command: disable password_recovery
Success.
DGS-3120-24TC:admin#
Note: Only the NV-RAM configuration will take effect when the Switch restarts, the running
configuration does not take effect until being saved. That means the password recovery is
determined by the state stored in the NV-RAM and takes effect when the Switch starts up
the next time. The Running Configuration is the current configured state of the password
recovery, the configuration is deleted without being saved, or becomes the NV-RAM
configuration when being saved.
Format
show password_recovery
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
714
Example
To display the password recovery state:
DGS-3120-24TC:admin# show password_recovery
Command: show password_recovery
DGS-3120-24TC:admin#
715
Format
show device_status
Parameters
None.
Restrictions
None.
Example
To show device status, the number 1, 2, 3 etc represent the fan number:
DGS-3120-24TC:admin#show device_status
Command: show device_status
Unit 1:
Internal Power: Active
External Power: Fail
Right Fan : 1,2 Fail
DGS-3120-24TC:admin#
716
Format
show environment
Parameters
None.
Restrictions
None.
Example
To display the standalone device environment:
717
DGS-3120-24TC:admin#show environment
Command: show environment
Unit 1
Internal Power : Active
External Power : Fail
Right Fan 1 : Speed Low (3000 RPM)
Right Fan 2 : Speed Low (3000 RPM)
Current Temperature(Celsius) : 37
Fan High Temperature Threshold(Celsius) : 40
Fan Low Temperature Threshold(Celsius) : 35
Unit 2
Internal Power : Active
External Power : Fail
Right Fan 1 : Speed Low (3000 RPM)
Right Fan 2 : Speed Low (3000 RPM)
Current Temperature(Celsius) : 38
Fan High Temperature Threshold(Celsius) : 40
Fan Low Temperature Threshold(Celsius) : 35
Unit 3
Internal Power : Active
External Power : Fail
Right Fan 1 : Speed Low (3000 RPM)
Right Fan 2 : Speed Low (3000 RPM)
Current Temperature(Celsius) : 37
Fan High Temperature Threshold(Celsius) : 40
Fan Low Temperature Threshold(Celsius) : 35
DGS-3120-24TC:admin#
Format
config temperature threshold {high <temperature -500-500> | low <temperature -500-500>}
Parameters
threshold - Specify the high and low threshold value.
high - (Optional) To configure high threshold value. m is the high threshold value. The high
threshold must bigger than the low threshold.
718
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the warning temperature threshold:
DGS-3120-24TC:admin# config temperature threshold high 80
Command: config temperature threshold high 80
Success.
DGS-3120-24TC:admin#
Format
config temperature [trap | log] state [enable | disable]
Parameters
trap state - Specify the trap state for the warning temperature event.
enable - Enable trap state for warning temperature event. The default state is enabled.
disable - Disable trap state for warning temperature event.
log state - Specify the log state for the warning temperature event.
enable - Enable log state for warning temperature event. The default state is enabled.
disable - Disable log state for warning temperature event.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the trap state for temperature warning event:
DGS-3120-24TC:admin#config temperature trap state enable
Command: config temperature trap state enable
Success.
DGS-3120-24TC:admin#
719
Format
config fan trap state [enable | disable]
Parameters
enable - Enable trap state for warning fan event.
disable - Disable trap state for warning fan event.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the warning fan traps state:
DGS-3120-24TC:admin#config fan trap state enable
Command: config fan trap state enable
Success.
DGS-3120-24TC:admin#
Format
config power trap state [enable | disable]
Parameters
enable - Enable trap state for warning power event.
disable - Disable trap state for warning power event.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the warning power traps state:
720
Success.
DGS-3120-24TC:admin#
721
73-1 ping
Description
This command is used to send Internet Control Message Protocol (ICMP) echo messages to a
remote IP address. The remote IP address will then “echo” or return the message. This is used to
confirm connectivity between the Switch and the remote device.
Format
ping <ipaddr> {times <value 1-255> | timeout <sec 1-99> | source_ip <ipaddr>}
Parameters
<ipaddr> - Specify the IP address of the host.
times - (Optional) The number of individual ICMP echo messages to be sent. A value of 0 will
send an infinite ICMP echo messages. The maximum value is 255. The default is 0, indicating
infinity. Press the "CTRL+C” to break the ping test.
<value 1-255> - Enter the number of individual ICMP echo messages to be sent here. This
value must be between 1 and 255.
timeout - (Optional) Specify the time-out period while waiting for a response from the remote
device. A value of 1 to 99 seconds can be specified. The default is 1 second.
<sec 1-99> - Enter the time-out period here. This value must be between 1 and 99 seconds.
source_ip - (Optional) Specify the source IP.
<ipaddr> - Enter the IP address.
Restrictions
None.
Example
To send ICMP echo message to “10.51.17.1” for 4 times:
722
DGS-3120-24TC:admin#
73-2 ping6
Description
This command is used to send IPv6 Internet Control Message Protocol (ICMP) echo messages to
a remote IPv6 address. The remote IPv6 address will then “echo” or return the message. This is
used to confirm the IPv6 connectivity between the Switch and the remote device.
Format
ping6 <ipv6addr> {times <value 1-255> | size <value 1-6000> | timeout <sec 1-99> |
source_ip <ipv6addr>}
Parameters
<ipv6addr> - Enter the IPv6 address here.
times - (Optional) The number of individual ICMP echo messages to be sent. A value of 0 will
send an infinite ICMP echo messages. The maximum value is 255. The default is 0, indicating
infinity. Press the "CTRL+C” to break the ping test.
<value 1-255> - Enter the number of individual ICMP echo messages to be sent here. This
value must be between 1 and 255.
size - (Optional) Size of the test packet.
<value 1-6000> - Enter the size of the test packet here. This value must be between 1 and
6000.
timeout - (Optional) Defines the time-out period while waiting for a response from the remote
device.
<sec 1-99> - Enter the time-out period here. This value must be between 1 and 99 seconds.
The default is 1 second.
source_ip - (Optional) Specify the source IP.
<ipv6addr> - Enter the IPv6 address.
Restrictions
None.
Example
To send ICMP echo message to “3000::1” for 4 times:
723
DGS-3120-24TC:admin#
724
Format
create policy_route name <policyroute_name 32>
Parameters
<policyroute_name 32> - The policy route name. The maximum length is 32 characters.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a policy route named “danilo”:
DGS-3120-24TC:admin#create policy_route name danilo
Command: create policy_route name danilo
Success.
DGS-3120-24TC:admin#
Format
delete policy_route name <policyroute_name 32>
725
Parameters
<policyroute_name 32> - The policy route name. The maximum length is 32 characters.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an IP route entry in the Switch’s IP routing table named “duhon”:
DGS-3120-24TC:admin#delete policy_route name duhon
Command: delete policy_route name duhon
Success.
DGS-3120-24TC:admin#
Format
config policy_route name <policyroute_name 32> acl profile_id <value 1-6> access_id
<value 1-256> nexthop <ipaddr> state [enable | disable]
Parameters
<policyroute_name 32> - The policy route name. The maximum length is 32 characters.
acl profile_id - The ACL profile ID.
<value 1-6>- Specify the value between 1 and 6.
access_id - The ACL access ID.
<value 1-256> - Specify the value between 1 and 256.
nexthop - The next hop IP address.
<ipaddr> - Speciify the IP address.
state - Activate or deactivate this rule.
enable - Activate this rule.
disable - Deactivate this rule.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
726
Example
To configure all packets which match ACL rule profile ID=1 and access ID=1, and then route to
20.1.1.100:
DGS-3120-24TC:admin#config policy_route name danilo acl profile_id 1 access_id
1 nexthop 20.1.1.100 state enable
Command: config policy_route name danilo acl profile_id 1 access_id 1 nexthop
20.1.1.100 state enable
Success.
DGS-3120-24TC:admin#
Format
show policy_route
Parameters
None.
Restrictions
None.
Example
To display the Switch’s current policy route rules:
DGS-3120-24TC:admin#show policy_route
Command: show policy_route
Total Entries: 1
DGS-3120-24TC:admin#
727
Format
config port_security system max_learning_addr [<max_lock_no 1-3072> | no_limit]
Parameters
max_learning_addr - Specify the maximum number of port security entries that can be learned
by the system. If the setting is smaller than the number of current learned entries on all
enabled ports, the command will be rejected.
<max_lock_no 1-3072> - Enter the maximum learning address value here. This value must
be between 1 and 3072.
no_limit - No limitation on the number of port security entries that can be learned by the
system. By default, the number is set to no_limit.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maximum number of port security entries on the Switch to be 256:
728
Success.
DGS-3120-24TC:admin#
Format
config port_security ports [<portlist> | all] [{admin_state [enable | disable] |
max_learning_addr <max_lock_no 0-3072> | action [drop | shutdown] | lock_address_mode
[permanent | deleteontimeout | deleteonreset]}(1) | {vlan [<vlan_name 32> | vlanid <vidlist>]
max_learning_addr [<max_lock_no 0-3072> | no_limit]}(1)]
Parameters
<portlist> - Enter the list of port used for this configuration.
all - Specify that all ports will be configured.
admin_state - Specify the state of the port security function on the port.
enable - Specify to enable the port security function on the port.
disable - Specify to disable the port security function on the port. By default, the setting is
disabled.
max_learning_addr - Specify the maximum number of port security entries that can be learned
on this port. If the value is set to 0, it means that no user can be authorized by the port
security function on this port. If the setting is smaller than the number of current learned
entries on the port, the command will be rejected. The default value is 32.
<max_lock_no 0-3072> - Enter the maximum number of port security entries that can be
learned here. This value must be between 0 and 3072.
action - Specify the action to be taken when the number of secure MAC address reaches the
maximum learning on the port.
drop - When the number of secure MAC address reaches the maximum learning on the port,
new entry will be dropped. This is the default setting.
shutdown - When the number of secure MAC address reaches the maximum learning on the
port, the port will be shut down and enter error-disabled state immediately. The port state is
recovered only by enabling the port manually.The shutdown action only applies to port
level security setting.
lock_address_mode - Indicates the lock address mode. The default mode is deleteonreset.
permanent - The address will never be deleted unless the user removes it manually, the
VLAN of the entry is removed, the port is removed from the VLAN, or port security is
disabled on the port where the address resides.
deleteontimeout - This entry will be removed if the entry is idle for the specified aging time.
deleteonreset - This address will be removed if the Switch is reset or rebooted. Events that
cause permanent entries to be deleted also apply to the deleteonreset entries.
vlan - Specify the VLAN name used here.
<vlan_name 32> - Enter the VLAN name used here. This name can be up to 32 characters
long.
729
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the port-based port security setting so that the maximum number of port security
entries is restricted to 10, and the lock_address mode is set to permanent on port 6:
DGS-3120-24TC:admin#config port_security ports 1:6 admin_state enable
max_learning_addr 10 lock_address_mode permanent
Command: config port_security ports 1:6 admin_state enable max_learning_addr 10
lock_address_mode permanent
Success.
DGS-3120-24TC:admin#
Format
config port_security vlan [<vlan_name 32> | vlanid <vidlist>] max_learning_addr
[<max_lock_no 0-3072> | no_limit]
Parameters
vlan - Specify the VLAN by name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify a list of VLANs by VLAN ID.
<vidlist> - Enter the VLAN ID list here.
max_learning_addr - Specify the maximum number of port security entries that can be learned
by this VLAN. If this parameter is set to 0, it means that no user can be authorized on this
VLAN. If the setting is lower than the number of current learned entries on the VLAN, the
command will be rejected. The default value is “no_limit”
<max_lock_no 0-3072> - Enter the maximum number of port security entries that can be
learned here. This value must be between 0 and 3072.
no_limit - No limitation on the number of port security entries that can be learned by a specific
VLAN.
730
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the maximum number of VLAN-based port security entries on VLAN 1 to be 64:
DGS-3120-24TC:admin# config port_security vlan vlanid 1 max_learning_addr 64
Command: config port_security vlan vlanid 1 max_learning_addr 64
Success.
DGS-3120-24TC:admin#
Format
delete port_security_entry [vlan <vlan_name 32> | vlanid <vlanid 1-4094>] mac_address
<macaddr>
Parameters
vlan - Specify the VLAN by VLAN name.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - Specify the VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID list here. This value must be between 1 and 4094.
mac_address - Specify the MAC address of the entry.
<macaddr> - Enter the MAC address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the port security entry with a MAC address of 00-00-00-00-00-01 on VLAN 1:
DGS-3120-24TC:admin# delete port_security_entry vlanid 1 mac_address 00-00-00-
00-00-01
Command: delete port_security_entry vlanid 1 mac_address 00-00-00-00-00-01
Success.
DGS-3120-24TC:admin#
731
Format
clear port_security_entry {ports [<portlist> | all] {[vlan <vlan_name 32> | vlanid <vidlist>]}}
Parameters
ports - (Optional) Specify the range of ports to be configured.
<portlist> - The port security entries learned on the specified port will be cleared.
all - All the port security entries learned by the system will be cleared.
vlan - (Optional) The port security entries learned on the specified VLANs will be cleared.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Specify a list of VLANs by VLAN ID.
<vidlist> - Enter the VLAN ID list here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear the port security entries on port 6:
DGS-3120-24TC:admin# clear port_security_entry ports 6
Command: clear port_security_entry ports 6
Success.
DGS-3120-24TC:admin#
Format
show port_security_entry {ports {<portlist>} {[vlan <vlan_name 32> | vlanid <vidlist>]}}
Parameters
ports - (Optional) Specify the range of ports that will display the port security entries. While this
732
Restrictions
None.
Example
To show all the port security entries:
DGS-3120-24TC:admin# show port_security_entry
Command: show port_security_entry
Total Entries: 1
DGS-3120-24TC:admin#
Format
show port_security {ports {<portlist>} {[vlan <vlan_name 32> | vlanid <vidlist>]}}
Parameters
ports - (Optional) Specify the range of ports that will show their configuration. While this
parameter is null, to show the entries on all of the ports.
<portlist> - Enter the list of port used for this configuration here.
vlan - (Optional) Specify the name of the VLAN that will show its configuration.
<vlan_name 32> - Enter the VLAN name here. This name can be up to 32 characters long.
vlanid - (Optional) Specify the ID of the VLAN that will show its configuration.
<vidlist> - Enter the VLAN ID list here.
Restrictions
None.
733
Example
To display the global configuration of port security:
DGS-3120-24TC:admin#show port_security
Command: show port_security
DGS-3120-24TC:admin#
Format
config port_security trap state [enable | disable]
Parameters
enable - Enable port security trap.
disable - Disable port security trap.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the sending of port security traps:
DGS-3120-24TC:admin#config port_security trap state enable
Command: config port_security trap state enable
Success.
DGS-3120-24TC:admin#
734
Format
config port_security log state [enable | disable]
Parameters
enable - Enable port security log.
disable - Disable port security log.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the port security log:
DGS-3120-24TC:admin#config port_security log state enable
Command: config port_security log state enable
Success.
DGS-3120-24TC:admin#
735
Format
config poe system {units [<unitlist> | all]} {power_limit <value 37-760>|
power_disconnect_method [deny_next_port | deny_low_priority_port] | legacy_pd [enable |
disable]}
Parameters
units - (Optional) Specified the units that will be configured. If no specified units, all supported
PoE units in the system will be configured.
<unitlist> - Enter the list of units that will be configured here.
all - Specify that all the units will be configured.
power_limit - (Optional) Configure the power budget of PoE system. The range of value which
can be specified is determined by the system. Normally, the minimum setting is 37 W and the
maximum setting is 760 W. The actual range will depend on power supply capability.
<value 37-760> - Enter the power limit value here. This value must be between 37 and 760.
power_disconnect_method - (Optional) Configure the disconnection method that will be used
when the power budget is running out. When the system attempts to supply power to a new
port, if the power budget is insufficient to do this, PoE controller will initiate port disconnection
procedure to prevent overloading the power supply. The controller uses one of the following
two ways to perform the disconnection procedure.
deny_next_port - The port with max port number will be denied regardless of its priority. Note
that if the disconnect_method is set to deny_next_port, then the power provision will not
utilize the system’s maximum power. There is a 19W safe margin. That is, when the
system has only 19W remaining, this power cannot be utilized.
deny_low_priority_port - If there are ports that have been supplied power that have a priority
lower than the new port, the port with the lowest priority will be disconnected. This process
will stop until enough power is released for the new port. Note that if the
disconnect_method is set to deny_low_priority_port, then the power provision can utilize
the system’s maximum power.
legacy_pd - Configure legacy PDs detection status, enable for support, if set to disable, can’t
detect legacy PDs signal.
enable - Specify that the legacy PDs detection status will be enabled.
disable - Specify that the legacy PDs detection status will be disabled.
736
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config PoE system-wise was setting:
DGS-3120-24PC:admin# config poe system power_limit 250 power_disconnect_method
deny_low_priority_port
Command: config poe system power_limit 250 power_disconnect_method
deny_low_priority_port
Success.
DGS-3120-24PC:admin#
Format
config poe ports [all | <portlist>] { state [enable | disable] | [time_range <range_name 32> |
clear_time_range] | priority [critical | high | low] | power_limit [class_0 | class_1 | class_2 |
class_3 | user_define <value 1000-35000>]}
Parameters
ports - Specified the list of ports whose setting is under configuration.
all - Specify that all the ports will be included in this configuration.
<portlist> - Enter the list of port used for this configuration here.
state - (Optional) When the state is set to disable, power will not be supplied to the powered
737
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config PoE port:
DGS-3120-24PC:admin#config poe ports 1-4 state enable priority critical
power_limit class_1
Command: config poe ports 1:1-1:4 state enable priority critical power_limit
class_1
Success.
Success.
DGS-3120-24PC:admin#
Format
show poe system {units <unitlist>}
Parameters
units - (Optional) Specified units that will be displayed.
<unitlist> - Enter the unit list that will be displayed here.
If no parameter specified, the system will display the status of all supported poe units in the
systems.
Restrictions
None.
Example
To display PoE system:
DGS-3120-24PC:admin#show poe system units 1
Command: show poe system units 1
If Power Disconnection Method is set to deny next port, then the system can not
utilize out of its maximum power capacity. The maximum unused watt is 19W.
DGS-3120-24PC:admin#
Format
show poe ports {<portlist>}
739
Parameters
<portlist> - (Optional) Specified a list of ports to be displayed.
If no parameter specified, the system will display the status for all ports.
Restrictions
None.
Example
To display PoE port:
DGS-3120-24PC:admin#show poe ports 1:1-1:6
Command: show poe ports 1:1-1:6
DGS-3120-24PC:admin#
740
Format
config power_saving mode {length_detection | link_detection|led |port |hibernation} [enable
| disable]
Parameters
length_detection - (Optional) Specify the power saving link detection state.
link_detection - (Optional) Specify the length detection used.
741
Led - (Optional) Specify to configure the power saving state of port LED.
port - (Optional) Specify to configure the power saving state of port.
hibernation - (Optional) Specify to configure the power saving state of system hibernation.
enable - Specify to enable power saving state.
disable - Specify to disable power saving state.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the power saving state of port, hibernation:
DGS-3120-24TC:admin#config power_saving mode port hibernation enable
Command: config power_saving mode port hibernation enable
Success.
DGS-3120-24TC:admin#
Format
config power_saving hibernation [[add | delete] time_range <range_name 32> |
clear_time_range]
Parameters
add - Specify to add a time range.
delete - Specify to delete a time range.
time_range - Specify the name of the time range.
<range_name32> - Enter a name for maximum 32 characters.
clear_time_range - Specify to clear all the time range of system hibernation.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To add a time range named “range_1” on system hibernation:
742
Success.
DGS-3120-24TC:admin#
Format
config power_saving led [[add | delete] time_range <range_name 32> | clear_time_range]
Parameters
add - Specify to add a time range.
delete - Specify to delete a time range.
time_range - Specify the name of the time range.
<range_name32> - Enter a name for maximum 32 characters.
clear_time_range - Specify to clear all the time range of port LED.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To add a time range named “range_1” on port LED:
DGS-3120-24TC:admin#config power_saving led add time_range range_1
Command: config power_saving led add time_range range_1
Success.
DGS-3120-24TC:admin#
743
Format
config power_saving port [<portlist> | all] [[add | delete] time_range <range_name 32> |
clear_time_range]
Parameters
<portlist> - Specify a range of ports.
all - Specify all ports.
add - Specify to add a time range.
delete - Specify to delete a time range.
time_range - Specify the name of the time range.
<range_name32> - Enter a name for maximum 32 characters.
clear_time_range - Specify to clear all the time range of port.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To add a time range named “range_1” on port 1:
DGS-3120-24TC:admin#config power_saving port 1:1 add time_range range_1
Command: config power_saving port 1:1 add time_range range_1
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show power_saving {length_detection | link_detection | led | port | hibernation}
744
Parameters
length_detection - (Optional) Display the length detection configuration of power saving.
link_detection - (Optional) Display the link detection configuration of power saving.
led - (Optional) Display the port LED configuration of power saving.
port - (Optional) Display the port configuration of power saving.
hibernation - (Optional) Display the system hibernation configuration of power saving.
If no parameter is specified, all configurations of power saving will be displayed.
Restrictions
None.
Example
To display the power saving function setting:
DGS-3120-24TC:admin#show power_saving
Command: show power_saving
DGS-3120-24TC:admin#
Format
config led state [enable | disable]
Parameters
enable - Specify to enable the LED admin state of all ports.
disable - Specify to disable the LED admin state of all ports.
745
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the LED admin state:
DGS-3120-24TC:admin#config led state disable
Command: config led state disable
Success.
DGS-3120-24TC:admin#
Format
show led
Parameters
None.
Restrictions
None.
Example
To display the setting of all port’s LED admin state:
DGS-3120-24TC:admin#show led
Command: show led
DGS-3120-24TC:admin#
746
Format
config pppoe circuit_id_insertion state [enable | disable]
Parameters
enable - Specify to enable the PPPoE circuit ID insertion on the Switch.
disable - Specify to disable the PPPoE circuit ID insertion on the Switch.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the PPPoE circuit insertion state:
DGS-3120-24TC:admin#config pppoe circuit_id_insertion state enable
Command: config pppoe circuit_id_insertion state enable
Success.
DGS-3120-24TC:admin#
747
Format
config pppoe circuit_id_insertion ports <portlist> {state [enable | disable] | circuit_id [mac |
ip | udf <string 32>]}(1)
Parameters
<portlist> - Specify a list of ports to be configured.
state - Specify to enable or disable port’s PPPoE circuit ID insertion function. The default setting
is enable.
enable - Enable port’s PPPoE circuit ID insertion function.
disable - Disable port’s PPPoE circuit ID insertion function.
circuit_id - Configure the device ID part for encoding of the circuit ID option.
mac - The MAC address of the Switch will be used to encode the circuit ID option.
ip - The Switch’s IP address will be used to encode the circuit ID option. This is the default.
udf - A user specified string to be used to encode the circuit ID option.
<string 32> - Enter a string with the maximum length of 32.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable port 5 PPPoE circuit ID insertion function:
DGS-3120-24TC:admin#config pppoe circuit_id_insertion ports 5 state enable
Command: config pppoe circuit_id_insertion ports 1:5 state enable
Success.
DGS-3120-24TC:admin#
Format
show pppoe circuit_id_insertion
748
Parameters
None.
Restrictions
None.
Example
To display PPPoE circuit ID insertion status:
DGS-3120-24TC:admin#show pppoe circuit_id_insertion
Command: show pppoe circuit_id_insertion
DGS-3120-24TC:admin#
Format
show pppoe circuit_id_insertion ports {<portlist>}
Parameters
<portlist> - (Optional) Specify a list of ports to be displayed.
Restrictions
None.
Example
To display port 2-5 PPPoE circuit ID insertion configuration:
DGS-3120-24TC:admin#show pppoe circuit_id_insertion ports 1:2-1:5
Command: show pppoe circuit_id_insertion ports 1:2-1:5
749
DGS-3120-24TC:admin#
750
Format
config pim [[ipif <ipif_name 12> | all] {hello <sec 1-18724> | jp_interval <sec 1-18724> | state
[enable | disable] | mode [dm | sm | sm-dm] | dr_priority <uint 0-4294967294>}(1) |
register_probe_time <value 1-127> | register_suppression_time <value 3-255>]
Parameters
ipif - Specify the IP interface name.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
all - Specify that all the IP interfaces will be used.
hello - Specify the time between issuing hello packets to find neighboring routers.
751
<sec 1-18724> - Enter the hello time value here. This value must be between 1 and 18724
seconds. The default value is 30 seconds.
jp_interval - Specify the interval between transmitting (flooding to all interfaces) multicast
messages to downstream routers, and automatically ‘pruning’ a branch from the multicast
delivery tree. This interval also determines the time interval the router uses to automatically
remove prune information from a branch of a multicast delivery tree and begin to flood
multicast messages to all branches of that delivery tree. These two actions are equivalent.
The default is 60 seconds.
<sec 1-18724> - Enter the join/prune interval value here. This value must be between 1 and
18724 seconds.
state - Specify to allow the PIM function to be disabled or enabled for the above IP interface.
The default is disabled.
enable - Specify that the PIM function will be enabled.
disable - Specify that the PIM function will be disabled.
mode - Specify the multicast protocol mode used. – dense mode or sparse mode, or sparse-
dense mode. The default value is dense mode.
dm - Specify that the multicast protocol mode will be set to dense mode.
sm - Specify that the multicast protocol mode will be set to sparse mode.
sm-dm - Specify that the multicast protocol mode will be set to sparse-dense mode.
dr_priority - Specify the priority for DR (Designated Router) election. The DR will forward
multicast traffic from a unicast source to the appropriate RP (Rendezvous Point). The router
with the highest priority value will be elected as the DR in the VLAN. When multiple routers
are configured with the same highest priority value, the router with the highest IP addres will
the elected as the DR.
<uint 0-4294967294> - Enter the DR priority value used here. This value must be between 0
and 4294967294.
register_probe_time - Specify the time before the Register-Stop Timer expires. This is used
when a DR may send a Null-Register to the RP to cause it to resend a Register-Stop
message. The default value is 5 sec.
<value 1-127> - Enter the register probe time value here. This value must be between 1 and
127.
register_suppression_time - Specify the period after which a PIM DR will stop sending register
encapsulated data to the RP after receiving a Register-Stop message. The default value is 60
sec.
<value 3-255> - Enter the register suppression time value here. This value must be between 3
and 255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure PIM configurations of IP interface System:
DGS-3120-24TC:admin#config pim ipif System hello 35 jp_interval 70 state enable
Command: config pim ipif System hello 35 jp_interval 70 state enable
Success.
DGS-3120-24TC:admin#
752
Format
enable pim
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable PIM:
DGS-3120-24TC:admin#enable pim
Command: enable pim
Success.
DGS-3120-24TC:admin#
Format
disable pim
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable PIM:
DGS-3120-24TC:admin#disable pim
Command: disable pim
Success.
753
DGS-3120-24TC:admin#
Format
show pim neighbor {ipif <ipif_name 12> | ipaddress <network_address>}
Parameters
ipif - (Optional) Specify the name of the IP interface for which you want to display the current PIM
neighbor router table.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
ipaddress - (Optional) Specify the IP address and netmask of the destination.
<network_address> - Enter the destination IP address and netmask used here.
If no parameter is specified, the system will display all the PIM neighbor addresses in the table.
Restrictions
None.
Example
To display PIM neighbor address table:
DGS-3120-24TC:admin#show pim neighbor
Command: show pim neighbor
Total Entries : 1
DGS-3120-24TC:admin#
Format
show pim {ipif <ipif_name 12>}
754
Parameters
ipif - (Optional) Specify the name of the IP interface used to display the PIM configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
If no parameter is specified, the system will display all the PIM configurations of all IP interfaces.
Restrictions
None.
Example
To display PIM configurations of IP interface System:
DGS-3120-24TC:admin#show pim
Command: show pim
Total Entries: 1
DGS-3120-24TC:admin#
Format
config pim cbsr [ipif <ipif_name 12> {priority [-1 | <value 0-255>]} | hash_masklen <value 0-
32> | bootstrap_period <value 1-255>]
755
Parameters
ipif - Specify the IP interface used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
priority - (Optional) Specify to set the C-BSR priority. The lower value indicates lower priority.
The default value is -1. Note that only one interface can be the C-BSR in one device.
-1 - Specify that the interface will be disable to be the BSR.
<value 0-255> - Enter the C-BSR priority value used here. This value must be between 0 and
255.
hash_masklen - Enter a hash mask length, which will be used with the IP address of the
candidate RP and the multicast group address, to calculate the hash algorithm used by the
router to determine which CRP on the PIM-SM enabled network will be the RP.
<value 0-32> - Enter the hash mask lenght value here. This value must be between 0 and 32.
The default value is 30 seconds.
bootstrap_period - Specify the interval between originating Bootstrap message.
<value 1-255> - Enter the bootstrap period value used here. This value must be between 1
and 255. The default value is 60 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the C-BSR for the System interface :
DGS-3120-24TC:admin#config pim cbsr ipif System priority 255
Command: config pim cbsr ipif System priority 255
Success.
DGS-3120-24TC:admin#
Format
show pim cbsr {ipif <ipif_name 12>}
Parameters
ipif – (Optional) Specify the IP interface to be displayed.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
If no parameter is specified, the system will display all C-BSR configurations.
Restrictions
None.
756
Example
To display the C-BSR settings:
DGS-3120-24TC:admin#show pim cbsr
Command: show pim cbsr
Total Entries: 1
DGS-3120-24TC:admin#
Format
config pim crp {holdtime <value 0-255> | priority <value 0-255> | wildcard_prefix_cnt [0 | 1]}
Parameters
holdtime - (Optional) This field is used to set the time Candidate RP (CRP) advertisements are
valid on the PIM-SM enabled network. If CRP advertisements are not received by the BSR
within this time frame, the CRP is removed from the list of candidates. An entry of 0 will send
out one advertisement that states to the BSR that it should be immediately removed from CRP
status on the PIM-SM network.
<value 0-255> - Enter the hold time for the RP here. This value must be between 0 and 255.
The default value is 150 seconds.
priority - (Optional) Specify the priority used for RP election. This priority value will be included in
the router’s CRP advertisements. A lower value means a higher priority, yet, if there is a tie for
the highest priority, the router having the higher IP address will become the RP.
<value 0-255> - Enter the priority value used here. This value must be between 0 and 255.
The default value is 192.
wildcard_prefix_cnt - (Optional) Specify the Prefix Count value of the wildcard address
(224.0.0.0/24) to be choosed. The default vaule is 0.
0 - Specify that the wildcard prefix count value will be set to 0.
1 - Specify that the wildcard prefix count value will be set to 1.
757
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the candidate rendezvous point (RP) holdtime, priority and wildcard prefix count:
DGS-3120-24TC:admin#config pim crp holdtime 150 priority 192
wildcard_prefix_cnt 0
Command: config pim crp holdtime 150 priority 192 wildcard_prefix_cnt 0
Success.
DGS-3120-24TC:admin#
Format
create pim crp group <network_address> rp <ipif_name 12>
Parameters
group - Specify the multicast group address for this Switch to become a Candidate RP. This
address must be a class D address.
<network_address> - Enter the group network address used here.
rp - Specify that the interface will act as C-RP for the group.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a multicast group range into a C-RP server list:
DGS-3120-24TC:admin#create pim crp group 224.1.2.3/32 rp System
Command: create pim crp group 224.1.2.3/32 rp System
Success.
DGS-3120-24TC:admin#
758
Format
delete pim crp group <network_address>
Parameters
<network_address> - Enter the multicast group address for this switch to be removed from
being a Candidate RP. This address must be a class ID address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a multicast group range from the C-RP server list:
DGS-3120-24TC:admin#delete pim crp group 224.1.2.3/32
Command: delete pim crp group 224.1.2.3/32
Success.
DGS-3120-24TC:admin#
Format
show pim crp
Parameters
None.
Restrictions
None.
Example
To list all the candidate rendezvous point (C-RP) related information:
759
Group Interface
------------------ ------------------
224.1.2.3/32 System
Total Entries: 1
DGS-3120-24TC:admin#
Format
config pim last_hop_spt_switchover [never | immediately]
Parameters
never - Specify that the router will always receive multicast data from the shared tree.
immediately - Specify that the router will always receive multicast data from shortest path tree.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Set the SPT-switchover mode to never:
DGS-3120-24TC:admin#config pim last_hop_spt_switchover never
Command: config pim last_hop_spt_switchover never
Success.
DGS-3120-24TC:admin#
760
Format
show pim ipmroute
Parameters
None.
Restrictions
None.
Example
To list all the entries of multicast routing:
DGS-3120-24TC:admin#show pim ipmroute
Command: show pim ipmroute
UA = Upstream AssertTimer
AM = Assert Metric
AMPref = Assert MetricPref
ARB = Assert RPTBit
Total Entries: 8
DGS-3120-24TC:admin#
761
Format
create pim static_rp group <network_address> rp <ipaddr>
Parameters
group - Specify to assign the multicast group address for this static RP.
<network_address> - Enter the multicast group address used here.
rp - Specify the IP address used by this static RP.
<ipaddr> - Enter the IP address used here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static RP:
DGS-3120-24TC:admin#create pim static_rp group 239.1.1.0/24 rp 10.52.33.18
Command: create pim static_rp group 239.1.1.0/24 rp 10.52.33.18
Success.
DGS-3120-24TC:admin#
Format
delete pim static_rp group <network_address>
Parameters
<network_address> - Enter Specify the multicast group address that will removed from the static
RP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
762
Example
To delete a static RP:
DGS-3120-24TC:admin#delete pim static_rp group 239.1.1.0/24
Command: delete pim static_rp group 239.1.1.0/24
Success.
DGS-3120-24TC:admin#
Format
show pim static_rp
Parameters
None.
Restrictions
None.
Example
To list all the static RP settings:
DGS-3120-24TC:admin#show pim static_rp
Command: show pim static_rp
Group RP Address
------------------ ------------------
224.1.2.0/24 10.52.33.4
239.1.1.0/24 10.52.33.18
Total Entries: 2
DGS-3120-24TC:admin#
763
Format
show pim rpset
Parameters
None.
Restrictions
None.
Example
To list all the RPset information:
DGS-3120-24TC:admin#show pim rpset
Command: show pim rpset
Total Entries: 2
DGS-3120-24TC:admin#
764
Format
create pim register_checksum_include_data rp_address <ipaddr>
Parameters
<ipaddr> - Specify that the RP will expect to receive a register packet in which the checksum will
be included in the data portion.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create an entry for a specific RP in which the checksum in the registered packet will include the
data portion:
DGS-3120-24TC:admin#create pim register_checksum_include_data rp_address
24.1.2.3
Command: create pim register_checksum_include_data rp_address 24.1.2.3
Success.
DGS-3120-24TC:admin#
Format
delete pim register_checksum_include_data rp_address <ipaddr>
Parameters
<ipaddr> - Specify the RP address that will be removed from the checksum, including the data
portion list.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the register checksum including the data for the specific RP address:
765
Success.
DGS-3120-24TC:admin#
Format
show pim register_checksum_include_data_rp_list
Parameters
None.
Restrictions
None.
Example
To list all the RPs of the registered checksum, including the data:
DGS-3120-24TC:admin#show pim register_checksum_include_data_rp_list
Command: show pim register_checksum_include_data_rp_list
RP Address
-----------------------------------
24.0.0.0
24.1.2.3
Total Entries: 2
DGS-3120-24TC:admin#
766
Format
config pim-ssm {state [enable | disable] | group_range [default | <network_address>]}(1)
Parameters
state - Specify to enable or disable the SSM service model on the Switch.
enable - Specify that the SSM service model will be enabled.
disable - Specify that the SSM service model will be disabled.
group_range - Specify the group address range for the SSM service in IPv4.
default - The default indicates that the group address range is 232.0.0.0/8.
<network_address> - Enter the group address range for the SSM service here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure PIM-SSM state and group range:
DGS-3120-24TC:admin#config pim-ssm state enable group_range default
Command: config pim-ssm state enable group_range default
Success.
DGS-3120-24TC:admin#
Format
show pim-ssm
Parameters
None.
Restrictions
None.
767
Example
To display PIM-SSM state and group range:
DGS-3120-24TC:admin#show pim-ssm
Command: show pim-ssm
DGS-3120-24TC:admin#
768
Format
config pim6 [ipif <ipif_name 12> | all] {hello_interval <sec 0-18000> | triggered_hello_delay
<sec 0-60> | propagation_delay <sec 0-32> | override_interval <sec 0-65> | jp_interval <sec
0-18000> | dr_priority <uint 0-4294967294> | bsr_border [disable | enable] | stub_interface
[disable | enable] | state [enable | disable]}(1)
Parameters
ipif - Specify to apply the configurations to this specific IP interface.
<ipif_name 12> - Enter the IP interface name.
all - Specify to apply the configurations to all IP interfaces.
769
hello_interval – Specify the interval of issuing hello packets fo find neighboring routers.
<sec 0-18000> - Enter the time between 0 and 18000 seconds. The default value is 30.
triggered_hello_delay - Specify the maximum time, in seconds, before the router sends a
triggered PIM Hello message on the specified interface. A value of zero indicates that
triggered PIM6 Hello message should always be sent immediately.
<sec 0-60> - Enter the time between 0 and 60 seconds. The default value is 5.
propagation_delay - Specify the expected propagation delay between the PIM6 routers on this
network or link, in seconds.
<sec 0-32> - Enter the time between 0 and 32 seconds. The default value is 1.
override_interval - Specify the value for the router to insert into the Override_Interval field of the
LAN Prune Delay option in the PIM6 Hello messages it sends on this interface. When
overriding a prune, PIM6 routers pick random time duration up to the value of this object. The
more PIM6 routers that are active on a network, the more likely it is that the prune will be
overridden after a small proportion of this time has elapsed. The more PIM6 routers are active
on this network, the larger this object should be to obtain an optimal spread of prune override
latencies.
<sec 0-65> - Enter the time between 0 and 65 seconds. The default value is 3.
jp_interval - Specify the frequency at which this router sends PIM6 Join/Prune messages on this
PIM6 interface. A value of zero represents not to send PIM Join/Prune message on this
interface.
<sec 0-18000> - Enter the time between 0 and 18000 seconds. The default value is 60.
dr_priority - Specify the Designated Router Priority value inserted into the DR Priority option in
PIM6 Hello message transmitted on this interface. Numerically higher values for this
parameter indicate higher priorities.
<uint 0-4294967294> - Enter the value between 0 and 4294967294. The default value is 1.
bsr_border - Specify to determine whether this interface is a PIM6 domain border. If this
interface is a domain border, it prevents bootstrap router (BSR) messages from being sent or
received through it.
disable - Specify that the interface is not a PIM6 domain border. This is the default.
enable - Specify that the interface is a PIM6 domain border.
stub_interface - Specify whether this interface is a stub interface. If this interface is a stub
interface, no PIM6 packets are sent out to this interface, and any received PIM6 packets are
ignored.
disable - Specify that the interface is not a stub interface. This is the default.
enable - Specify that the interface is a stub interface.
state - Specify to allow the PIM6 to be disabled or enabled for the IPv6 interface.
enable - Enable PIM6 for the IPv6 interface.
disable - Disable PIM6 for the IPv6 interface.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the jp_interval to 60 seconds, the hello_interval to 60 seconds, and enable the PIM6 state
for interface “System”:
DGS-3120-24TC:admin#config pim6 ipif System jp_interval 60 hello_interval 60
state enable
Command: config pim6 ipif System jp_interval 60 hello_interval 60 state enable
Success.
DGS-3120-24TC:admin#
770
Format
show pim6 {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify to the IP interface name to be displayed.
<ipif_name 12> - Enter the IP interface name.
Restrictions
None.
Example
To show brief information for the PIM6 protocol related parameters on all interfaces:
DGS-3120-24TC:admin#show pim6
Command: show pim6
Total Entries : 1
DGS-3120-24TC:admin#
To show detailed information for PIM6 protocol related parameters on the interface “System”:
771
DGS-3120-24TC:admin#
Format
config pim6 cbsr {ipif <ipif_name 12> state [enable | disable] | priority <value 0-255> |
hash_masklen <value 0-128>}(1)
Parameters
ipif - Specify the IP interface.
<ipif_name 12> - Enter the IP interface name. This name can be up to 12 characters long.
state - Specify to determine whether the input interface can be a C-BSR.
enable - Specify that the interface is a C-BSR.
disable - Specify that the interface is not a C-BSR. This is the default.
priority - (Optional) Specify to set the C-BSR priority.
<value 0-255> - Enter the value between 0 and 255. The default value is 64.
hash_masklen - Specify the length in bits of the mask. This makes use of a hash function for the
case where a group range has multiple RPs with the same priority.
<value 0-128> - Enter the value must be between 0 and 128. The default value is 126
772
seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the C-BSR on the interface “System”:
DGS-3120-24TC:admin#config pim6 cbsr ipif System state enable priority 64
hash_masklen 126
Command: config pim6 cbsr ipif System state enable priority 64 hash_masklen 126
Success.
DGS-3120-24TC:admin#
Format
show pim6 cbsr
Parameters
None.
Restrictions
None.
Example
To show C-BSR settings on the Switch:
DGS-3120-24TC:admin#show pim6 cbsr
Command: show pim6 cbsr
DGS-3120-24TC:admin#
773
Format
config pim6 crp [rp <ipif_name 12> | all] {priority <value 0-255> | interval <sec 1-16383>}(1)
Parameters
ipif - Specify to apply the configurations to this specific IP interface.
<ipif_name 12> - Enter the IP interface name.
all - Specify to apply the configurations to all IP interfaces.
priority - Specify for RP election.
<value 0-255> - Enter the value between 0 and 255. The lower the value is, the higher the
priority is. The default value is 192.
interval - Specify the C-RP advertisement interval in seconds.
<sec 1-16383> - Enter the interval between 1 and 16383 seconds. The default value is 60.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the C-RP priority and the interval on the interface “System”:
DGS-3120-24TC:admin#config pim6 crp rp System priority 60 interval 60
Command: config pim6 crp rp System priority 60 interval 60
Success.
DGS-3120-24TC:admin#
Format
create pim6 crp group <ipv6networkaddr> rp <ipif_name 12>
Parameters
<ipv6networkaddr> - Specify the IPv6 group address range served by the RP.
rp - Specify the interface act as a C-RP.
<ipif_name 12> - Enter the IP interface name.
774
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a multicast group range “FF1E::12EF:1023/64” into the serve list of the C-RP “System”:
DGS-3120-24TC:admin#create pim6 crp group FF1E::12EF:1023/64 rp System
Command: create pim6 crp group FF1E::12EF:1023/64 rp System
Success.
DGS-3120-24TC:admin#
Format
delete pim6 crp group <ipv6networkaddr>
Parameters
<ipv6networkaddr> - Specify the multicast group address range of the C-RP entry to be
removed from C-RP serve list.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a multicast group range “FF1E::12EF:1023/64” from the C-RP serve list:
DGS-3120-24TC:admin#delete pim6 crp group FF1E::12EF:1023/64
Command: delete pim6 crp group FF1E::12EF:1023/64
Success.
DGS-3120-24TC:admin#
775
Format
enable pim6
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the PIM global state for an IPv6 network:
DGS-3120-24TC:admin#enable pim6
Command: enable pim6
Success.
DGS-3120-24TC:admin#
Format
disable pim6
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable PIM-SM for an IPv6 network:
DGS-3120-24TC:admin#disable pim6
Command: disable pim6
Success.
DGS-3120-24TC:admin#
776
Format
config pim6 last_hop_spt_switchover [never | immediately]
Parameters
never - Specify to never switch to SPT. The last hop router always receives the multicast data
from the shared tree. This is the default.
immediately - Specify to immediately switch to SPT. The last hop router switches from shared
tree to shortest path tree on the first multicast data arrived.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the SPT-switchover mode to never:
DGS-3120-24TC:admin#config pim6 last_hop_spt_switchover never
Command: config pim6 last_hop_spt_switchover never
Success.
DGS-3120-24TC:admin#
Format
show pim6 neighbor {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify to the IPv6 interface name to be displayed.
<ipif_name 12> - Enter the IPv6 interface name.
Restrictions
None.
777
Example
To show the PIM6 neighbors:
DGS-3120-24TC:admin#show pim6 neighbor
Command: show pim6 neighbor
Total Entries : 2
DGS-3120-24TC:admin#
Total Entries : 1
DGS-3120-24TC:admin#
Format
show pim6 mroute {group <ipv6addr> {source <ipv6addr>}}
Parameters
group - (Optional) Specify the IPv6 multicast group address to be displayed.
<ipv6addr> - Enter the IPv6 address.
source - (Optional) Specify the IPv6 source address to be displayed.
<ipv6addr> - Enter the IPv6 address.
778
Restrictions
None.
Example
To show the whole IPv6 multicast routing table generated on the Switch:
DGS-3120-24TC:admin#show pim6 mroute
Command: show pim6 mroute
Group : FF13::100
Source : * Upstream: n1
Outgoing : n10 n30
Group : FF13::100
Source : 2001::1111 Upstream: n2
Outgoing: n10
Group : FF13::102
Source : 2001::3F6D Upstream: n2
Outgoing: n20
Group : FF13::100
Source : 2001::1111 rpt, Upstream: n1
RP Address: 3FFE:10:10::153
Outgoing : -
Total Entries: 4
DGS-3120-24TC:admin#
Format
show pim6 mroute star_g {group <ipv6addr> {ipif <ipif_name 12>}}
Parameters
group - (Optional) Specify the IPv6 multicast group address to be displayed.
<ipv6addr> - Enter the IPv6 address.
ipif - (Optional) Specify the IPv6 interface to be displayed.
779
Restrictions
None.
Example
To show the whole IPv6 multicast routing table of (*, G) generated on the switch:
DGS-3120-24TC:admin#show pim6 mroute star_g
Command: show pim6 mroute star_g
Group : FF13::101
Upstream : n2
RP Address : 3FFE:10:10::153
Group : FF13::102
Upstream : n2
RP Address : 3FFE:10:10::153
Total Entries: 3
DGS-3120-24TC:admin#
Format
show pim6 mroute s_g {rpt} {group <ipv6addr> source <ipv6addr> {ipif <ipif_name 12>}}
Parameters
rpt - (Optional) Specify the (S, G, rpt) entry.
group - (Optional) Specify the IPv6 multicast group address to be displayed.
<ipv6addr> - Enter the IPv6 address.
source - (Optional) Specify the IPv6 source address to be displayed.
<ipv6addr> - Enter the IPv6 address.
ipif - (Optional) Specify to the IPv6 interface name to be displayed.
<ipif_name 12> - Enter the IPv6 interface name.
780
Restrictions
None.
Example
To show all (S, G) route entries generated on the Switch:
DGS-3120-24TC:admin#show pim6 mroute s_g
Command: show pim6 mroute s_g
Group : FF13::100
Source : 2001::2222
Group : FF13::200
Source : 2001::1111
Group : FF13::300
Source : 2001::1111
Total Entries: 4
DGS-3120-24TC:admin#
Format
create pim6 static_rp group <ipv6networkaddr> rp <ipv6addr> {override_dynamic}
Parameters
<ipv6networkaddr> - Specify the multicast group network address for this static RP.
rp - Specify the IPv6 address to this static RP.
<ipv6addr> - Enter the IPv6 address.
override_dynamic - (Optional) Specify to enable static RP to override dynamically learned RP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
781
Example
To create a static RP:
DGS-3120-24TC:admin#create pim6 static_rp group FF02::11/64 rp 3000::12
Command: create pim6 static_rp group FF02::11/64 rp 3000::12
Success.
DGS-3120-24TC:admin#
Format
delete pim6 static_rp group <ipv6networkaddr>
Parameters
<ipv6networkaddr> - Specify the multicast group network address for this static RP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a static RP:
DGS-3120-24TC:admin#delete pim6 static_rp group FF02::11/64
Command: delete pim6 static_rp group FF02::11/64
Success.
DGS-3120-24TC:admin#
Format
config pim6 embedded_rp state [enable | disable]
Parameters
enable - Specify to enable embedded RP support in PIM6.
782
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the embedded RP state:
DGS-3120-24TC:admin#config pim6 embedded_rp state enable
Command: config pim6 embedded_rp state enable
Success.
DGS-3120-24TC:admin#
Format
show pim6 crp
Parameters
None.
Restrictions
None.
Example
To show C-RP information:
DGS-3120-24TC:admin#show pim6 crp
Command: show pim6 crp
Total Entries : 1
DGS-3120-24TC:admin#
783
Format
show pim6 static_rp
Parameters
None.
Restrictions
None.
Example
To show the static RP:
DGS-3120-24TC:admin#show pim6 static_rp
Command: show pim6 static_rp
Total Entries: 1
DGS-3120-24TC:admin#
Format
show pim6 rpset
Parameters
None.
784
Restrictions
None.
Example
To show all the active RP information:
DGS-3120-24TC:admin#show pim6 rpset
Command: show pim6 rpset
Group : FF3E::/64
RP Address : 3127::111
Override Dynamic : False
Type : Static
Total Entries: 2
DGS-3120-24TC:admin#
Format
config pim6 register_checksum_calculate [include_data | not_include_data]
Parameters
include_data - When specified to calculate the checksum in IPv6 PIM register packets, the data
portion is included.
not_include_data - When specified to calculate the checksum in IPv6 PIM register packets, the
data portion is excluded.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
785
Example
To specify the switch calculates the register packet checksum including the data portion:
DGS-3120-24TC:admin#config pim6 register_checksum_calculate include_data
Command: config pim6 register_checksum_calculate include_data
Success.
DGS-3120-24TC:admin#
Format
config pim6 register_probe_time <sec 1-127>
Parameters
<sec 1-127> - Enter the time before the Register-Stop Timer (RST) expires when a DR may send
a Null-Register to the RP to cause it to resend a Register-Stop message. The default value is
5.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the register probe time to be 20 seconds:
DGS-3120-24TC:admin#config pim6 register_probe_time 20
Command: config pim6 register_probe_time 20
Success.
DGS-3120-24TC:admin#
Format
config pim6 register_suppression_time <sec 3-65535>
786
Parameters
<sec 3-655535> - Enter the period during which a PIM DR stops sending Register-encapsulated
data to the RP after receiving a Register-Stop message. The default value is 60.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the PIM6-SM register suppression time to be 120 seconds:
DGS-3120-24TC:admin#config pim6 register_suppression_time 120
Command: config pim6 register_suppression_time 120
Success.
DGS-3120-24TC:admin#
Format
config pim6 keepalive_period <sec 120-65535>
Parameters
<sec 120-655535> - Enter the period during which the PIM router will maintain the (S, G) state in
the absence of explicit (S, G) local membership or (S, G) join messages received to maintain
it. The default value is 210.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the multicast routing keepalive period to be 220 seconds:
DGS-3120-24TC:admin#config pim6 keepalive_period 220
Command: config pim6 keepalive_period 220
Success.
DGS-3120-24TC:admin#
787
Format
create dot1v_protocol_group group_id <int 1-16> {group_name <name 32>}
Parameters
group_id - The ID of protocol group which is used to identify a set of protocols
<int 1-16> - Enter the group ID used here.
group_name - (Optional) The name of the protocol group. The maximum length is 32 chars.
<name 32> - Enter the group name here. This name can be up to 32 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a protocol group:
DGS-3120-24TC:admin# create dot1v_protocol_group group_id 10 group_name
General_Group
Command: create dot1v_protocol_group group_id 10 group_name General_Group
Success.
DGS-3120-24TC:admin#
788
Format
config dot1v_protocol_group [group_id <int 1-16> | group_name <name 32>] [add protocol
[ethernet_2 | ieee802.3_snap | ieee802.3_llc] <protocol_value> | delete protocol [ethernet_2 |
ieee802.3_snap | ieee802.3_llc] <protocol_value>]
Parameters
group_id - The ID of the protocol group which is used to identify a set of protocols.
<int 1-16> - Enter the group ID.
group_name - The name of the protocol group.
<name 32> - Enter the group name here. This name can be up to 32 characters long.
add - Specify that the protocol will be added to the specified group.
delete - Specify that the protocol will be removed from the specified group.
protocol - The protocol value is used to identify a protocol of the frame type specified.
ethernet_2 - Specify that the Ethernet 2 protocol will be used.
ieee802.3_snap - Specify that the IEEE 802.3 Snap protocol will be used.
ieee802.3_llc - Specify that the IEEE 802.3 LLC protocol will be used.
<protocol_value> - Enter the protocol value here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a protocol ipv6 to protocol group 10:
DGS-3120-24TC:admin# config dot1v_protocol_group group_id 10 add protocol
Ethernet_2 86dd
Command: config dot1v_protocol_group group_id 10 add protocol Ethernet_2 86dd
Success.
DGS-3120-24TC:admin#
Format
delete dot1v_protocol_group [group_id <int 1-16> | group_name <name 32> | all]
789
Parameters
group_id - Specify the group ID to be deleted.
<int 1-16> - Enter the group ID used here.
group_name - Specify the name of the group to be deleted.
<name 32> - Enter the group name here. This name can be up to 32 characters long.
all - Specify that all the protocol group will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete protocol group 100:
DGS-3120-24TC:admin# delete dot1v_protocol_group group_id 100
Command: delete dot1v_protocol_group group_id 100
Success.
DGS-3120-24TC:admin#
Format
show dot1v_protocol_group {[group_id <int 1-16> | group_name <name 32>]}
Parameters
group_id - (Optional) Specify the ID of the group to be displayed.
<int 1-16> - Enter the group ID used here.
group_name - (Optional) Specify the name of the protocol group to be displayed.
<name 32> - Enter the group name here. This name can be up to 32 characters long.
If no group ID is not specified, all the configured protocol groups will be displayed.
Restrictions
None.
Example
To display the protocol group ID 10:
790
Success.
DGS-3120-24TC:admin#
Format
config port dot1v ports [<portlist> | all] [add protocol_group [group_id <int 1-16> |
group_name <name 32>] [vlan <vlan_name 32> | vlanid <id>] {priority <value 0-7>} | delete
protocol_group [group_id <int 1-16> | all]]
Parameters
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
add - Specify that the group specified will be added.
protocol_group - Specify that parameters for the group will follow.
group_id - Specify the group ID of the protocol group.
<int 1-16> - Enter the group ID used here.
group_name - Specify the name of the protocol group.
<name 32> - Enter the name of the group used here. This name can be up to 32 characters
long.
vlan - The VLAN that is to be associated with this protocol group on this port.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32 characters
long.
vlanid - Specify the VLAN ID.
<id> - Enter the VLAN ID used here.
priority - (Optional) Specify the priority to be associated with the packet which has been
classified to the specified VLAN by the protocol.
<value 0-7> - Enter the priority value here. This value must be between 0 and 7.
delete - Specify that the group specified will be deleted.
protocol_group - Specify that parameters for the group will follow.
group_id - Specify the group ID of the protocol group.
<int 1-16> - Enter the group ID used here.
all - Specify that all the groups will be deleted.
791
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
The example is to assign VLAN marketing-1 for untaged ipv6 packet ingress from port 3.
To configure the group ID 10 on port 3 to be associated with VLAN marketing-1:
DGS-3120-24TC:admin#config port dot1v ports 1:3 add protocol_group group_id 10
vlan marketing-1
Command: config port dot1v ports 1:3 add protocol_group group_id 10 vlan
marketing-1
Success.
DGS-3120-24TC:admin#
Format
show port dot1v {ports <portlist>}
Parameters
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - Enter a list of ports used for the configuration here.
If not port is specified, information for all ports will be displayed.
Restrictions
None.
Example
The example display the protocol VLAN information for ports 1:
792
Port: 1:1
Protocol Group ID VLAN Name Protocol Priority
------------------- --------------------------------- -----------------
1 default -
2 VLAN2 -
3 VLAN3 -
4 VLAN4 -
Success.
DGS-3120-24TC:admin#
793
Format
enable qinq
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable QinQ:
794
Success.
DGS-3120-24TC:admin#
Format
disable qinq
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable QinQ:
DGS-3120-24TC:admin# disable qinq
Command: disable qinq
Success.
DGS-3120-24TC:admin#
Format
config qinq inner_tpid <hex 0x1-0xffff>
795
Parameters
inner_tpid - Specify the inner-TPID of the system.
<hex 0x1-0xffff> - Enter the inner-TPID of the system here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the inner TPID in the system to 0x9100:
DGS-3120-24TC:admin# config qinq inner_tpid 0x9100
Command: config qinq inner_tpid 0x9100
Success.
DGS-3120-24TC:admin#
Format
config qinq ports [<portlist> | all] {role [uni | nni] | missdrop [enable | disable] | outer_tpid
<hex 0x1 - 0xffff> | use_inner_priority [enable | disable] | add_inner_tag [<hex 0x1 - 0xffff> |
disable]}
Parameters
ports - Specify a range of ports to configure.
<portlist> - Enter the list of ports to be configured here.
all - Specify that all the ports will be used for the configuration.
role - (Optional) Specify the port role in QinQ mode.
uni - Specify that the port is connecting to the customer network.
nni - Specify that the port is connecting to the service provider network.
missdrop - (Optional) Specify the state of the miss drop of ports option.
enable - Specify that the miss drop of ports option will be enabled.
disable - Specify that the miss drop of ports option will be disabled.
outer_tpid - (Optional) Specify the outer-TPID of a port.
<hex 0x1-0xffff> - Enter the outer-TPID value used here.
use_inner_priority – Specify whether to use the priority in the C-VLAN tag as the priority in the
S-VLAN tag.
enable -.Specify to use the priority in the C-VLAN tag as the priority in the S-VLAN tag.
disable -.Specify for not using the priority in the C-VLAN tag.
add_inner_tag - (Optional) Specify to add an inner tag for ingress untagged packets. If set, the
inner tag will be added for the ingress untagged packets and therefore the packets that egress
to the NNI port will be double tagged. If disable, only the s-tag will be added for ingress
untagged packets.
<hex 0x1-0xffff> - Enter the inner tag value used here.
disable - Specify that the add inner tag option will be disabled.
796
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure port list 1-4 as NNI port and set the TPID to 0x88A8:
DGS-3120-24TC:admin# config qinq ports 1:1-1:4 role nni outer_tpid 0x88A8
Command: config qinq ports 1:1-1:4 role nni outer_tpid 0x88A8
Success.
DGS-3120-24TC:admin#
Format
show qinq
Parameters
None.
Restrictions
None.
Example
To display the global QinQ status:
DGS-3120-24TC:admin# show qinq
Command: show qinq
DGS-3120-24TC:admin#
797
Format
show qinq inner_tpid
Parameters
None.
Restrictions
None.
Example
To display the inner-TPID of a system:
DGS-3120-24TC:admin# show qinq inner_tpid
Command: show qinq inner_tpid
DGS-3120-24TC:admin#
Format
show qinq ports {<portlist>}
Parameters
ports - Specify a list of ports to be displayed.
<portlist> - (Optional) Enter the list of ports to be displayed here.
Restrictions
None.
Example
To show the QinQ mode for ports 1-2 of unit 1:
798
DGS-3120-24TC:admin#
Format
create vlan_translation ports [<portlist> | all] [add cvid <vidlist> | replace cvid <vlanid 1-
4094>] svid <vlanid 1-4094> {priority <priority 0-7>}
Parameters
ports - Specify a list of ports to be configured.
<portlist> - Enter the list of ports to be configured here.
all - Specify that all the ports will be used for the configuration.
add - Specify to add an S-Tag to the packet.
cvid - Specify the customer VLAN ID used.
<vidlist> - Enter the customer VLAN ID used here.
replace - Specify to replace the C-Tag with the S-Tag.
cvid - Specify the customer VLAN ID used.
<vlanid 1-4094> - Enter the customer VLAN ID used here.
svid - Specify the service provider VLAN ID used.
<vlanid 1-4094> - Enter the service provider VLAN ID used here.
priority - (Optional) Specify to assign an 802.1p priority to the S-Tag. If the priority is not
specified, a 802.1p priority of the S-Tag will be assigned by default.
<priority 0-7> - Enter the 802.1p S-Tag priority value here. This value must be between 0 and
7.
799
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To replace the C-Tag in which the CVID is 20, with the S-Tag and the S-VID is 200 at UNI Port 1:
DGS-3120-24TC:admin# create vlan_translation ports 1:1 replace cvid 20 svid 200
Command: create vlan_translation ports 1:1 replace cvid 20 svid 200
Success.
DGS-3120-24TC:admin#
To add S-Tag, when the S-VID is 300, to a packet in which the CVID is 30 at UNI Port 1:
DGS-3120-24TC:admin# create vlan_translation ports 1:1 add cvid 30 svid 300
Command: create vlan_translation ports 1:1 add cvid 30 svid 300
Success.
DGS-3120-24TC:admin#
Format
delete vlan_translation ports [<portlist> | all] {cvid <vidlist>}
Parameters
ports - Specify a list of ports to be configured.
<portlist> - Enter the list of ports to be configured here.
all - Specify that all the ports will be used for the configuration.
cvid - (Optional) Specify the rules for the specified CVIDs. If the CVID is not specified, all rules
configured for the port will be deleted.
<vidlist> - Enter the CVID value here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a VLAN translation rule on ports 1-4:
800
Success.
DGS-3120-24TC:admin#
Format
show vlan_translation {[ports <portlist> | cvid <vidlist>]}
Parameters
ports – (Optional) Specify a list of ports to be displayed.
<portlist> - Enter the list of ports to be displayed here.
cvid - (Optional) Specify the rules for the specified CVIDs.
<vidlist> - Enter the CVID value used here.
Restrictions
None.
Example
To show C-VLANs based on VLAN translation rules in the system:
DGS-3120-24TC:admin# show vlan_translation
Command: show vlan_translation
Total Entries: 2
DGS-3120-24TC:admin#
801
Format
config bandwidth_control [<portlist> | all] {rx_rate [no_limit | <value 8-10240000>] | tx_rate
[no_limit | <value 8-10240000>]}
Parameters
<portlist> - Specify a range of ports to be configured.
all – Specify that all the ports will be used for this configuration.
rx_rate - (Optional) Specify the limitation applied to receive data rate.
no_limit - Indicates there is no limit on receiving bandwidth of the configured ports. An integer
value from m to n sets a maximum limit in Kbits/sec. The actual bandwidth will be an
adjusted value based on the user specified bandwidth. The actual limit may be equal to the
user specified limit, but will not exceed it. The actual limit recognized by the device, will be
displayed when the command is executed.
<value 8-10240000> - Enter the receiving data rate here. This value must be between 8 and
10240000.
tx_rate - (Optional) Specify the limitation applied to transmit data rate.
no_limit - Indicates there is no limit on port tx bandwidth. An integer value from m to n sets a
802
maximum limit in Kbits/sec. The actual bandwidth will be an adjusted value based on the
user specified bandwidth. The actual limit may be equal to the user specified limit, but will
not exceed it.. The actual limit recognized by the device, will be displayed when the
command is executed.
<value 8-10240000> - Enter the transmitting data rate here. This value must be between 8
and 10240000.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the port bandwidth:
DGS-3120-24TC:admin#config bandwidth_control 1:1-1:10 tx_rate 100
Command: config bandwidth_control 1:1-1:10 tx_rate 100
Success.
DGS-3120-24TC:admin#
Format
show bandwidth_control {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If no parameter specified, system will display all ports bandwidth configurations.
Restrictions
None.
803
Example
To display port bandwidth control table:
DGS-3120-24TC:admin#show bandwidth_control 1:1-1:10
Command: show bandwidth_control 1:1-1:10
DGS-3120-24TC:admin#
Format
config per_queue bandwidth_control {ports [<portlist> | all]} <cos_id_list 0-7> {{min_rate
[no_limit | <value 8-10240000>]} max_rate [no_limit | <value 8-10240000>]}
Parameters
ports - (Optional) Specify a range of ports to be configured.
<portlist> - Enter the list of port used for this configuration here.
all - For set all ports in the system, you may use “all” parameter. If no parameter is specified,
system will set all ports.
<cos_id_list 0-7> - Specify a list of priority queues. The priority queue number is ranged from 0
to 7.
min_rate - (Optional) Specify that one of the parameters below (no_limit or <value m-n) will be
applied to the mini-rate at which the above specified class will be allowed to receive packets.
no_limit - Specify that there will be no limit on the rate of packets received by the above
specified class.
<value 8-10240000> - Specify the packet limit, in Kbps, that the above ports will be allowed to
receive. If the specified rate is not multiple of minimum granularity, the rate will be
adjusted.
max_rate - (Optional) Specify that one of the parameters below (no_limit or <value m-n >) will be
applied to the maximum rate at which the above specified class will be allowed to transmit
packets.
804
no_limit - Specify that there will be no limit on the rate of packets received by the above
specified class.
<value 8-10240000> - Specify the packet limit, in Kbps, that the above ports will be allowed to
receive. If the specified rate is not multiple of minimum granularity, the rate will be
adjusted.
Restrictions
Only Administrator level can issue this command.
Example
To configure the ports 1:1-1:10 CoS bandwidth queue 1 min rate to 130 and max rate to 100000:
DGS-3120-24TC:admin#config per_queue bandwidth_control ports 1:1-1:10 1
min_rate 130 max_rate 1000
Command: config per_queue bandwidth_control ports 1:1-1:10 1 min_rate 130
max_rate 1000
Success.
DGS-3120-24TC:admin#
Format
show per_queue bandwidth_control {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If no parameter is specified, system will display all ports CoS bandwidth configurations.
Restrictions
None.
Example
Display per port CoS bandwidth control table:
805
DGS-3120-24TC:admin#
Format
config scheduling {ports [<portlist> | all]} <class_id 0-7> [strict | weight <value 1-127>]
Parameters
ports - Specify a range of ports to be configured.
<portlist> - Enter the list of port used for this configuration here.
<class_id 0-7> - This specifies the 8 hardware priority queues which the config scheduling
command will apply to. The four hardware priority queues are identified by number from 0 to 7
with the 0 queue being the lowest priority.
strict - The queue will operate in strict mode.
weight - Specify the weights for weighted round robin. A value between 0 and n can be specified.
<value 1-127> - Enter the weights for weighted round robin value here. This value must be
between 1 and 127.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the traffic scheduling CoS queue 1 to weight 25 on port 1:10:
DGS-3120-24TC:admin# config scheduling ports 1:10 1 weight 25
Command: config scheduling ports 1:10 1 weight 25
Success.
DGS-3120-24TC:admin#
806
Format
config scheduling_mechanism {ports [<portlist> | all]} [strict | wrr]
Parameters
ports - (Optional) Specify a range of ports to be configured.
<portlist> - Enter the list of port used for this configuration here.
all - For set all ports in the system, you may use “all” parameter. If no parameter is specified,
system will set all ports.
strict - All queues operate in strict mode.
wrr - Each queue operates based on its setting.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the traffic scheduling mechanism for each CoS queue:
DGS-3120-24TC:admin# config scheduling_mechanism strict
Command: config scheduling_mechanism strict
Success.
DGS-3120-24TC:admin#
To configure the traffic scheduling mechanism for CoS queue on port 1:1:
DGS-3120-24TC:admin# config scheduling_mechanism ports 1:1 strict
Command: config scheduling_mechanism ports 1:1 strict
Success.
DGS-3120-24TC:admin#
Format
show scheduling {<portlist>}
807
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If no parameter specified, system will display all ports scheduling configurations.
Restrictions
None.
Example
To display the traffic scheduling parameters for each CoS queue on port 1:1(take eight hardware
priority queues for example):
DGS-3120-24TC:admin#show scheduling 1:1
Command: show scheduling 1:1
DGS-3120-24TC:admin#
Format
show scheduling_mechanism {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If no parameter specified, system will display all ports scheduling mechanism configurations.
Restrictions
None.
808
Example
To show scheduling mechanism:
DGS-3120-24TC:admin#show scheduling_mechanism
Command: show scheduling_mechanism
Port Mode
----- ------
1:1 Strict
1:2 Strict
1:3 Strict
1:4 Strict
1:5 Strict
1:6 Strict
1:7 Strict
1:8 Strict
1:9 Strict
1:10 Strict
1:11 Strict
1:12 Strict
1:13 Strict
1:14 Strict
1:15 Strict
1:16 Strict
1:17 Strict
1:18 Strict
1:19 Strict
1:20 Strict
1:21 Strict
1:22 Strict
1:23 Strict
1:24 Strict
DGS-3120-24TC:admin#
Format
config 802.1p user_priority <priority 0-7> <class_id 0-7>
Parameters
<priority 0-7> - The 802.1p user priority you want to associate with the <class_id> (the number
of the hardware queue) with.
<class_id 0-7> - The number of the Switch’s hardware priority queue. The switch has 8 hardware
809
priority queues available. They are numbered between 0 (the lowest priority) and 7 (the
highest priority).
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the 802.1p user priority:
DGS-3120-24TC:admin#config 802.1p user_priority 1 3
Command: config 802.1p user_priority 1 3
Success.
DGS-3120-24TC:admin#
Format
show 802.1p user_priority
Parameters
None.
Restrictions
None.
Example
To display the 802.1p user priority:
810
DGS-3120-24TC:admin#
Format
config 802.1p default_priority [<portlist> | all] <priority 0-7>
Parameters
<portlist> - This specifies a range of ports for which the default priority is to be configured. That
is, a range of ports for which all untagged packets received will be assigned the priority
specified below. The port list is specified by listing the lowest switch number and the beginning
port number on that switch, separated by a colon. Then highest switch number, and the
highest port number of the range (also separated by a colon) are specified. The beginning and
end of the port list range are separated by a dash.
For example, 1:3 would specify switch number 1, port 3. 2:4 specifies switch number 2, port 4.
1:3-2:4 specifies all of the ports between switch 1, port 3 and switch 2, port 4 − in numerical
order.
all - Specify that the command apply to all ports on the Switch.
<priority 0-7> - The priority value (0 to 7) assigned to untagged packets received by the Switch
or a range of ports on the Switch.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the 802.1p default priority settings on the Switch:
811
Success.
DGS-3120-24TC:admin#
Format
show 802.1p default_priority {<portlist>}
Parameters
<portlist> - (Optional) Specified a range of ports to be displayed.
If no parameter is specified, all ports for 802.1p default priority will be displayed.
Restrictions
None.
Example
To display 802.1p default priority:
812
DGS-3120-24TC:admin#
Format
enable hol_prevention
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable HOL prevention on the Switch:
DGS-3120-24TC:admin# enable hol_prevention
Command: enable hol_prevention
Success.
DGS-3120-24TC:admin#
813
Format
disable hol_prevention
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable HOL prevention on the Switch:
DGS-3120-24TC:admin# disable hol_prevention
Command: disable hol_prevention
Success.
DGS-3120-24TC:admin#
Format
show hol_prevention
Parameters
None.
Restrictions
None.
Example
To display HOL prevention state on the Switch.
814
DGS-3120-24TC:admin#
Format
config dscp trust [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Enter the list of port used for this configuration here.
all - Specify that the command apply to all ports on the Switch.
state - Enable or disable to trust DSCP. By default, DSCP trust is disabled.
enable - Specify that the DSCP trust state will be enabled.
disable - Specify that the DSCP trust state will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Enable DSCP trust on ports 1:1-1:8.
DGS-3120-24TC:admin#config dscp trust 1:1-1:8 state enable
Command: config dscp trust 1:1-1:8 state enable
Success.
DGS-3120-24TC:admin#
Format
show dscp trust {<portlist>}
815
Parameters
<portlist> - (Optional) A range of ports to display.
If not specify the port, all ports for DSCP trust status on the Switch will be displayed.
Restrictions
None.
Example
Display DSCP trust status on ports 1:1-1:8.
DGS-3120-24TC:admin#show dscp trust 1:1-1:8
Command: show dscp trust 1:1-1:8
Port DSCP-Trust
---- ----------
1:1 Enabled
1:2 Enabled
1:3 Enabled
1:4 Enabled
1:5 Enabled
1:6 Enabled
1:7 Enabled
1:8 Enabled
DGS-3120-24TC:admin#
Format
config dscp map {[<portlist> | all]} [dscp_priority <dscp_list> to <priority 0-7> | dscp_dscp
<dscp_list> to <dscp 0-63>]
816
Parameters
<portlist> - Enter the list of port used for this configuration here.
all - Specify that all the ports will be included in this configuration.
dscp_priority - Specify a list of DSCP value to be mapped to a specific priority.
<dscp_list> - Enter the DSCP priority list here.
to - Specify that the above or following parameter will be mapped to the previously mentioned
parameter.
<priority 0-7> - Specify the result priority of mapping.
dscp_dscp - Specify a list of DSCP value to be mapped to a specific DSCP.
<dscp_list> - Enter the DSCP to DSCP list here.
to - Specify that the above or following parameter will be mapped to the previously mentioned
parameter.
<dscp 0-63> - Specify the result DSCP of mapping.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the mapping of the DSCP priority to priority 1:
DGS-3120-24TC:admin#config dscp map 1:1-1:8 dscp_priority 1 to 1
Command: config dscp map 1:1-1:8 dscp_priority 1 to 1
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
show dscp map {<portlist>} [dscp_priority | dscp_dscp] {dscp <dscp_list>}
Parameters
<portlist> - (Optional) A range of ports to show. If no parameter is specified, all ports’ dscp
mapping will be displayed.
dscp_priotity - Specify a list of DSCP value to be mapped to a specific priority.
817
Restrictions
None.
Example
In case of project support per port configure, show DSCP map configuration on port 1:1.
DGS-3120-24TC:admin# show dscp map 1:1 dscp_dscp
Command: show dscp map 1:1 dscp_dscp
818
Format
enable rspan
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Configure RSPAN state to enable:
819
Success.
DGS-3120-24TC:admin#
Format
disable rspan
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Configure RSPAN state to disabled:
DGS-3120-24TC:admin# disable rspan
Command: disable rspan
Success.
DGS-3120-24TC:admin#
Format
create rspan vlan [vlan_name <vlan_name> | vlan_id <vlanid 1-4094>]
Parameters
vlan_name - Create the RSPAN VLAN by VLAN name.
<vlan_name> - Enter the VLAN name here.
vlan_id - Create the RSPAN VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
820
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create an RSPAN VLAN entry by VLAN name “v2”:
DGS-3120-24TC:admin#create rspan vlan vlan_name v2
Command: create rspan vlan vlan_name v2
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
delete rspan vlan [vlan_name <vlan_name> | vlan_id <vlanid 1-4094>]
Parameters
vlan_name - Delete RSPAN VLAN by VLAN name.
<vlan_name> - Enter the VLAN name here.
vlan_id - Delete RSPAN VLAN by VLAN ID.
<vlanid 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete an RSPAN VLAN entry by VLAN name “v2”:
821
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
config rspan vlan [vlan_name <vlan_name> | vlan_id <vlanid 1-4094>] [redirect [add | delete]
ports <portlist> | source {[mirror_group_id <value 1-4> | [add | delete] ports <portlist> [rx |
tx | both]]}]
Parameters
vlan - Specify the RSPAN VLAN used for this configuration.
vlan_name - Specify the RSPAN VLAN by VLAN name.
<vlan_name> - Enter the VLAN name here.
vlan_id - Specify the RSPAN VLAN by VLAN ID.
<value 1-4094> - Enter the VLAN ID here. This value must be between 1 and 4094.
redirect - Specify output portlist for the RSPAN VLAN packets. If the redirect port is a Link
Aggregation port, there will perform the Link Aggregation behavior for RSPAN packets.
add - Specify to add output ports for the RSPAN VLAN packets.
delete - Specify to delete output ports for the RSPAN VLAN packets.
ports - Specify the output ports for the RSPAN VLAN packets.
<portlist> - Enter the list of ports that will be used for this configuration here.
source - If the ports are not specified by this command, the source of RSPAN will come from the
source specified by the mirror command or the flow-based source specified by an ACL.
mirror_group_id – Specify the mirror session used for RSPAN source function.
<value 1-4> - Enter the value between 1 and 4.
add - (Optional) Add source ports.
delete - (Optional) Delete source ports.
ports - (Optional) Specify source portlist to add to or delete from the RSPAN source.
<portlist> - Enter the list of ports that will be used for this configuration here.
rx - (Optional) Only monitor ingress packets.
tx - (Optional) Only monitor egress packets.
both - (Optional) Monitor both ingress and egress packets.
822
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure an RSPAN source entry without source target port:
DGS-3120-24TC:admin#config rspan vlan vlan_name v2 source add ports 1:2-1:5 rx
Command: config rspan vlan vlan_name v2 source add ports 1:2-1:5 rx
Success.
DGS-3120-24TC:admin#
To configure an RSPAN source entry for per flow RSPAN, without any source ports:
DGS-3120-24TC:admin#config rspan vlan vlan_id 2 source
Command: config rspan vlan vlan_id 2 source
Success.
DGS-3120-24TC:admin#
To add redirect ports for special RSPAN VLAN on intermediate or destination switch:
DGS-3120-24TC:admin#config rspan vlan vlan_name vlan2 redirect add ports 1:18-
1:19
Command: config rspan vlan vlan_name vlan2 redirect add ports 1:18-1:19
Success.
Success.
DGS-3120-24TC:admin#
Format
show rspan {[vlan_name <vlan_name> | vlan_id <vlanid 1-4094>]}
Parameters
vlan_name - (Optional) Specify the RSPAN VLAN by VLAN name
<vlan_name> - Enter the VLAN name here.
823
Restrictions
None.
Example
Display the specific settings:
DGS-3120-24TC:admin#show rspan
Command: show rspan
RSPAN : Enabled
RSPAN VLAN ID : 2
--------------------
Mirror Group ID : 1
Target Port :
Source Port
RX : 1:2-1:5
TX :
RSPAN VLAN ID : 3
--------------------
DGS-3120-24TC:admin#
824
Format
enable rip
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable RIP:
DGS-3120-24TC:admin#enable rip
Command: enable rip
Success.
DGS-3120-24TC:admin#
825
Format
disable rip
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable RIP:
DGS-3120-24TC:admin#disable rip
Command: disable rip
Success.
DGS-3120-24TC:admin#
Format
config rip [ipif <ipif_name 12> | all] {authentication [enable <password 16> | disable] |
tx_mode [disable | v1_only | v1_compatible | v2_only] | rx_mode [v1_only| v2_only |
v1_or_v2 | disable] | state [enable | disable] | distribute_list_in [access_list <list_name 16> |
none]}(1)
Parameters
ipif_name - Specify the IP interface name used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
all - Specify that all the IP interfaces will be used in this configuration.
authentication - Specify to set the state of authentication.
enable - Specify that the authentication state will be enabled.
<password 16> - When the authentication state is enabled, enter the password used here.
This value can be up to 16 characters long.
disable - Specify that the authentication state will be disabled.
tx_mode - Specify the RIP transmission mode.
disable - Specify to prevent the transmission of RIP packets.
v1_only - Specify that only RIP version 1 format packets will be transmitted.
v1_compatible - Specify to transmit RIP version 2 format packets to the broadcast address.
v2_only - Specify that only RIP version 2 format packets will be transmitted.
826
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To change the RIP receive mode for the IP interface System:
DGS-3120-24TC:admin#config rip ipif System rx_mode v1_only
Command: config rip ipif System rx_mode v1_only
Success.
DGS-3120-24TC:admin#
Format
config rip timers {update <sec 5-65535> | timeout <sec 5-65535> | garbage_collection <sec
5-65535>}(1)
Parameters
update - The value of the time at which RIP updates are sent.
<sec 5-65535> - Enter the time between 5 and 65535 seconds.The default value is 30.
timeout - The value of the time after which a RIP route is declared to be invalid.
<sec 5-65535> - Enter the time between 5 and 65535 seconds.The default value is 180.
garbage_collection - The value of the time for which a RIP route will be kept before it is
removed from the routing table.
<sec 5-65535> - Enter the time between 5 and 65535 seconds.The default value is 120.
827
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the RIP timers:
DGS-3120-24TC:admin#config rip timers update 60 timeout 360 garbage_collection
240
Command: config rip timers update 60 timeout 360 garbage_collection 240
Success.
DGS-3120-24TC:admin#
Format
show rip {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the IP interface name used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
If no parameter is specified, the system will display RIP configuration and statistics for all the IP
interfaces.
Restrictions
None.
Example
To display RIP configuration and statistics for all IP interfaces.
828
DGS-3120-24TC:admin#show rip
Command: show rip
Total Entries : 1
DGS-3120-24TC:admin#
829
Format
enable ripng
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable RIPng globally:
DGS-3120-24TC:admin#enable ripng
Command: enable ripng
Success.
DGS-3120-24TC:admin#
830
Format
disable ripng
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable RIPng globally:
DGS-3120-24TC:admin#disable ripng
Command: disable ripng
Success.
DGS-3120-24TC:admin#
Format
config ripng {method [no_horizon | split_horizon | poison_reverse ] | update <sec 5-65535> |
expire <sec 1-65535> | garbage_collection <sec 1-65535>}(1)
Parameters
method - Specify the method of RIPng.
no_horizon - Specify not to use any horizon.
split_horizon - Specify to use basic split horizon.
poison_reverse - Specify to use poison reverse.
update - Specify the update timer.
<sec 5-65535> - Enter the time in second between 5 and 65535.
expire - Specify the expiry timer.
<sec 1-65535> - Enter the time in second between 1 and 65535.
garbage_collection - Specify the garbage-collection timer.
<sec 1-65535> - Enter the time in second between 1 and 65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
831
Example
To configure the RIPng method as poison reverse:
DGS-3120-24TC:admin#config ripng method poison_reverse
Command: config ripng method poison_reverse
Success.
DGS-3120-24TC:admin#
Format
config ripng ipif [<ipif_name 12> | all] {state [enable | disable] | metric <value 1-15>}(1)
Parameters
<ipif_name 12> - Specify the interface name.
all - Specify all interfaces to be configured.
state - Specify the RIPng state on the selected interfaces.
enable - Specify to enable the RIPng state.
disable - Specify to disable the RIPng state.
metric - The cost value of an interface. The RIPng route that was learned from the interface will
add this value as a new route metric. The default value is 1.
<value 1-15> - Enter the value between 1 and 15.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the RIPng interface state:
DGS-3120-24TC:admin#config ripng ipif System state enable
Command: config ripng ipif System state enable
Success.
DGS-3120-24TC:admin#
832
Format
show ripng {ipif <ipif_name 12>}
Parameters
ipif - (Optional) Specify the interface name.
<ipif_name 12> - Enter the interface name.
Restrictions
None.
Example
To display RIPng information:
DGS-3120-24TC:admin#show ripng
Command: show ripng
Total Entries : 2
Total Entries: 2
DGS-3120-24TC:admin#
833
Format
create ipv6route redistribute dst ripng src [local | static | ospfv3] {metric <value 0-16>}
Parameters
local - Redistribute local routes into RIPng.
static - Redistribute static routes into RIPng.
ospfv3 - Redistribute OSPFv3 routes into RIPng.
metric - (Optional) Specify the RIPng route metric for the redistributed routes. When the metric
value is 0, the metric in the original route will become the metric of the redistributed RIPng
route transparently. If the metric of the original route is equal or greater than 16, the route will
be not redistributed.
<value 0-16> - Enter the value between 0 and 16.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create RIPng route redistribution:
DGS-3120-24TC:admin#create ipv6route redistribute dst ripng src local
Command: create ipv6route redistribute dst ripng src local
Success.
DGS-3120-24TC:admin#
Format
config ipv6route redistribute dst ripng src [local | static | ospfv3] {metric <value 0-16>}
Parameters
local - Redistribute local routes into RIPng.
static - Redistribute static routes into RIPng.
ospfv3 - Redistribute OSPFv3 routes into RIPng.
metric - (Optional) Specify the RIPng route metric for the redistributed routes. When the metric
value is 0, the metric in the original route will become the metric of the redistributed RIPng
route transparently. If the metric of the original route is equal or greater than 16, the route will
be not redistributed.
<value 0-16> - Enter the value between 0 and 16.
834
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the RIPng route redistribution:
DGS-3120-24TC:admin#config ipv6route redistribute dst ripng src local metric 6
Command: config ipv6route redistribute dst ripng src local metric 6
Success.
DGS-3120-24TC:admin#
Format
delete ipv6route redistribute dst ripng src [local | static | ospfv3]
Parameters
local - Specify not to redistribute local routes into RIPng.
static - Specify not to redistribute static routes into RIPng.
ospfv3 - Specify not to redistribute OSPFv3 routes into RIPng.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To remove the RIPng route redistribution:
DGS-3120-24TC:admin#delete ipv6route redistribute dst ripng src local
Command: delete ipv6route redistribute dst ripng src local
Success.
DGS-3120-24TC:admin#
835
836
Format
create iproute [default | <network_address>] [<ipaddr> {<metric 1-65535>} {[primary |
backup | weight <value 1-4>]} | null0 | ip_tunnel <tunnel_name 12>]
Parameters
default - Create an IP default route (0.0.0.0/0).
<network_address> - The IP address and net mask of the destination of the route. The address
and the mask can be set by the traditional format (for example, 10.1.2.3/255.0.0.0) or in CIDR
format (for example,10.1.2.3/16). (RI and EI Mode Only)
<ipaddr> - The IP address for the next hop router.
<metric 1-65535> - (Optional) Enter the metric value here. This value must be between 1 and
65535. The default setting is 1.
primary - (Optional) Specify the route as the primary route to the destination.
backup - (Optional) Specify the route as the backup route to the destination.
weight - (Optional) Specify the weight value of the IP route. (RI and EI Mode Only)
<value 1-4> - Enter the weight value used here. This value must be between 1 and 4.
null0 - Specify the null interface as the next hop. (RI Mode Only)
ip_tunnel – Specify the IP tunnel interface of the next hop. (RI Mode Only)
<tunnel_name 12> - Enter the IP tunnel interface name.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a floating static route:
DGS-3120-24TC:admin# create iproute default 10.1.1.254 primary
Command: create iproute default 10.1.1.254 primary
Success.
DGS-3120-24TC:admin#
Format
delete iproute [default | <network_address>] [<ipaddr> | null0 | ip_tunnel <tunnel_name 12>]
Parameters
default - Deletes an IP default route (0.0.0.0/0).
<network_address> – Specify the network address used. (RI and EI Mode Only)
<ipaddr> - Specify the next hop IP address of the route need to be deleted.
null0 - Specify the null interface as the next hop. (RI Mode Only)
ip_tunnel – Specify the IP tunnel interface of the next hop. (RI Mode Only)
837
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an IP default route:
DGS-3120-24TC:admin# delete iproute default 10.1.1.254
Command: delete iproute default 10.1.1.254
Success.
DGS-3120-24TC:admin#
Format
show iproute {[<network_address> | <ipaddr>]} {[static | rip | ospf | hardware]}
Parameters
<network_address> - (Optional) Specify the destination network address of the route to be
displayed. (RI and EI Mode Only)
<ipaddr> - (Optional) Specify the destination IP address of the route to be displayed. The longest
prefix matched route will be displayed. (RI and EI Mode Only)
static - (Optional) Specify to display only static routes. One static route may be active or inactive.
rip - (Optional) Specify to display only RIP routes. One RIP route may be active or inactive. (RI
Mode Only)
ospf - (Optional) Specify to display only OSPF routes. One OSPF route may be active or
inactive. (RI Mode Only)
hardware - (Optional) Specify to display only the routes that have been written into the chip.
(RI and EI Mode Only)
Restrictions
None.
Example
To display the contents of the IP routing table:
838
Routing Table
Total Entries : 2
DGS-3120-24TC:admin#
Format
config route preference [static | default | rip | ospfIntra | ospfInter | ospfExt1 | ospfExt2]
<value 1-999>
Parameters
static - Configure the preference of static route. The default value is 60.
default - Configure the preference of default route. The default value is 1.
rip - Configure the preference of RIP route. The default value is 80. (RI Mode Only)
ospfIntra - Configure the preference of OSPF intra-area route. The default value is 80. (RI
Mode Only)
ospfInter - Configure the preference of OSPF inter-area route. The default value is 90. (RI
Mode Only)
ospfExt1 - Configure the preference of OSPF external type-1 route. The default value is 110.
(RI Mode Only)
ospfExt2 - Configure the preference of OSPF external type-2 route. The default value is 115.
(RI Mode Only)
<value 1-999> - Specify the value of the preference.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the route preference for static routes to 70:
839
Success.
DGS-3120-24TC:admin#
87-5 create route redistribute dst ospf src (RI Mode Only)
Description
This command is used to redistribute routing information from other routing protocols into OSPF.
Format
create route redistribute dst ospf src [local | static | rip] {mettype [1 | 2] | metric <value 0-
16777214> | route_map <map_name 16>}
Parameters
local - Redistribute local routes into OSPF.
static - Redistribute static routes into OSPF.
rip - Redistribute RIP routes into OSPF.
mettype - (Optional) Allow the selection of one of two methods for calculating the metric value.
1 - 1 calculates the metric (for other routing protocols to OSPF) by adding the destination’s
interface cost to the metric entered in the Metric field.
2 - 2 uses the metric entered in the Metric field without change. This field applies only when
the destination field is OSPF. If the metric type is not specified, it will be type 2.
metric - (Optional) Specify the metric for the redistributed routes.
<value 0-16777214> - Enter the value between 0 and 16777214. If it is not specified or
specified as 0, the redistributed routes will be associated with the default metric 20.
route_map - (Optional) Specify the route map for the redistributed routes.
<map_name 16> - Enter the name of the route map.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add route redistribution settings:
DGS-3120-24TC:admin#create route redistribute dst ospf src rip metric 2
Command: create route redistribute dst ospf src rip metric 2
Success.
DGS-3120-24TC:admin#
840
87-6 config route redistribute dst ospf src (RI Mode Only)
Description
This command is used to update the metric or the route map to be associated with the
redistributed routes from a specific protocol to OSPF protocol.
Format
config route redistribute dst ospf src [local | static | rip] {mettype [1 | 2] | metric <value 0-
16777214> | [route_map <map_name 16> | no_route_map]}
Parameters
local - Redistribute local routes into OSPF.
static - Redistribute static routes into OSPF.
rip - Redistribute RIP routes into OSPF.
mettype - (Optional) Allow the selection of one of two methods for calculating the metric value.
1 - 1 calculates the metric (for other routing protocols to OSPF) by adding the destination’s
interface cost to the metric entered in the Metric field.
2 - 2 uses the metric entered in the Metric field without change. This field applies only when
the destination field is OSPF. If the metric type is not specified, it will be type 2.
metric - (Optional) Specify the metric for the redistributed routes.
<value 0-16777214> - Enter the value between 0 and 16777214. If it is not specified or
specified as 0, the redistributed routes will be associated with the default metric 20.
route_map - (Optional) Specify the route map for the redistributed routes.
<map_name 16> - Enter the name of the route map.
no_route_map - (Optional) Specify to remove the route map associated with the redistributed
routes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure route redistributions:
DGS-3120-24TC:admin#config route redistribute dst ospf src rip mettype 1 metric
2
Command: config route redistribute dst ospf src rip mettype 1 metric 2
Success.
DGS-3120-24TC:admin#
87-7 delete route redistribute dst ospf src (RI Mode Only)
Description
This command is used to stop redistribution of routes from one source protocol to OSPF.
841
Format
delete route redistribute dst ospf src [local | static | rip]
Parameters
local - Specify the source protocol as local.
static - Specify the source protocol as static.
rip - Specify the source protocol as RIP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete route redistribution settings:
DGS-3120-24TC:admin#delete route redistribute dst ospf src local
Command: delete route redistribute dst ospf src local
Success.
DGS-3120-24TC:admin#
87-8 create route redistribute dst rip src (RI Mode Only)
Description
This command is used to redistribute routing information from other routing protocols into RIP.
When the metric is specified as 0, the metric in the original route will become the metric of the
redistributing RIP routes transparently. If the metric of the original routes is greater than 16, the
route will be not redistributed.
Format
create route redistribute dst rip src [local | static | ospf [all | internal | external | type_1 |
type_2 | inter+e1 | inter+e2]] {metric <value 0-16> | route_map <map_name 16>}
Parameters
local - Redistribute local routes into RIP.
static - Redistribute static routes into RIP.
ospf - Redistribute OSPF routes into RIP.
all - Redistribute both OSPF AS-internal and OSPF AS-external routes into RIP.
internal - Only redistribute OSPF AS-internal routes.
external - Only redistribute OSPF AS-external routes, including type-1 and type-2 routes.
type_1 - Only redistribute OSPF AS-internal type-1 routes.
type_2 - Only redistribute OSPF AS-internal type-2 routes.
inter+e1 - Only redistribute OSPF AS-internal type-1 and OSPF AS-internal routes.
inter+e2 - Only redistribute OSPF AS-internal type-2 and OSPF AS-internal routes.
metric - (Optional) Specifies the RIP route metric value for the redistributed routes.
<value 0-16> - Enter the value from 0 to 16. The default value is 0.
842
route_map - (Optional) Specify the route map for the redistributed routes.
<map_name 16> - Enter the name of the route map.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add route redistribution settings:
DGS-3120-24TC:admin#create route redistribute dst rip src ospf all metric 2
Command: create route redistribute dst rip src ospf all metric 2
Success.
DGS-3120-24TC:admin#
87-9 config route redistribute dst rip src (RI Mode Only)
Description
This command is used to update the metric to be associated with the redistributed routes from a
specific protocol to RIP protocol.
Format
config route redistribute dst rip src [local | static | ospf [all | internal | external | type_1 |
type_2 | inter+e1 | inter+e2]] {metric <value 0-16> | [route_map <map_name 16> |
no_route_map]}
Parameters
local - Redistribute local routes into RIP.
static - Redistribute static routes into RIP.
ospf - Redistribute OSPF routes into RIP.
all - Redistribute both OSPF AS-internal and OSPF AS-external routes into RIP.
internal - Only redistribute OSPF AS-internal routes.
external - Only redistribute OSPF AS-external routes, including type-1 and type-2 routes.
type_1 - Only redistribute OSPF AS-internal type-1 routes.
type_2 - Only redistribute OSPF AS-internal type-2 routes.
inter+e1 - Only redistribute OSPF AS-internal type-1 and OSPF AS-internal routes.
inter+e2 - Only redistribute OSPF AS-internal type-2 and OSPF AS-internal routes.
metric - (Optional) Specifies the RIP route metric value for the redistributed routes.
<value 0-16> - Enter the value from 0 to 16. The default value is 0.
route_map - (Optional) Specify the route map for the redistributed routes.
<map_name 16> - Enter the name of the route map.
no_route_map – (Optional) Specify to remove the route map associated with the redistributed
routes.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
843
Example
To configure the route redistributions:
DGS-3120-24TC:admin#config route redistribute dst rip src ospf internal
Command: config route redistribute dst rip src ospf internal
Success.
DGS-3120-24TC:admin#
87-10 delete route redistribute dst rip src (RI Mode Only)
Description
This command is used to stop redistribution of routes from one source protocol to RIP.
Format
delete route redistribute dst rip src [local | static | ospf]
Parameters
local - Specify the source protocol as local.
static - Specify the source protocol as static.
rip - Specify the source protocol as RIP.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete route redistribution settings:
DGS-3120-24TC:admin#delete route redistribute dst rip src local
Command: delete route redistribute dst rip src local
Success.
DGS-3120-24TC:admin#
Format
show route redistribute
844
Parameters
None.
Restrictions
None.
Example
To display the route redistribution settings:
DGS-3120-24TC:admin#show route redistribute
Command: show route redistribute
Total Entries : 2
DGS-3120-24TC:admin#
Format
show route redistribute dst ospf {src [local | static | rip]}
Parameters
src - (Optional) Specify the source protocol.
local - Display the redistribution with the source local.
static - Display the redistribution with the source static.
rip - Display the redistribution with the source protocol RIP.
Restrictions
None.
Example
To display the redistribution with the target protocol OSPF:
845
Total Entries : 1
DGS-3120-24TC:admin#
Format
show route redistribute dst rip {src [local | static | ospf]}
Parameters
src - (Optional) Specify the source protocol.
local - Display the redistribution with the source local.
static - Display the redistribution with the source static.
rip - Display the redistribution with the source protocol RIP.
Restrictions
None.
Example
To display the redistribution with the target protocol RIP:
846
Total Entries : 1
DGS-3120-24TC:admin#
Format
config ecmp algorithm {ip_destination | [ip_source | crc_low | crc_high] | tcp_udp_port}
Parameters
ip_destination - (Optional) Specify to include the destination IP in the ECMP algorithm. This is
the default.
ip_source- (Optional) Specify to include the lower 5 bits of the source IP in the ECMP algorithm.
crc_low- (Optional) Specify to include the lower 5 bits of the CRC in the ECMP algorithm.
crc_high- (Optional) Specify to include the upper 5 bits of the CRC in the ECMP algorithm.
tcp_udp_port- (Optional) Specify to include the TCP or UDP port in the ECMP algorithm.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure ECMP algorithm:
DGS-3120-24TC:admin#config ecmp algorithm ip_destination ip_source
Command: config ecmp algorithm ip_destination ip_source
Success.
DGS-3120-24TC:admin#
847
Format
show ecmp algorithm
Parameters
None.
Restrictions
None.
Example
To display the ECMP hash algorithm:
GS-3120-24TC:admin#show ecmp algorithm
Command: show ecmp algorithm
DGS-3120-24TC:admin#
Format
show ipfdb {[ip_address <ipaddr> | interface <ipif_name 12> | port <port>]}
Parameters
ip_address - (Optional) Displays the specified host IP address.
<ipaddr> - Enter the IP address used here.
interface - (Optional) Specify a IP interface.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
848
long.
port - (Optional) Specify a port.
<port> - Enter the port number here.
Restrictions
None.
Example
To display network address forwarding table:
DGS-3120-24TC:admin# show ipfdb
Command: show ipfdb
Total Entries: 3
DGS-3120-24TC:admin#
Format
show route preference {[local | static | default | rip | ospf | ospfIntra | ospfInter | ospfExt1 |
ospfExt2]}
Parameters
local - (Optional) Display the preference of local route.
static - (Optional) Display the preference of static route.
default - (Optional) Display the preference of default route.
rip - (Optional) Display the preference of RIP route. (RI Mode Only)
ospf - (Optional) Display the preference of OSPF route. (RI Mode Only)
ospfIntra - (Optional) Display the preference of OSPF intra-area route. (RI Mode Only)
ospfInter - (Optional) Display the preference of OSPF inter-area route. (RI Mode Only)
ospfExt1 - (Optional) Display the preference of OSPF external type-1 route. (RI Mode Only)
ospfExt2 - (Optional) Display the preference of OSPF external type-2 route. (RI Mode Only)
Restrictions
None.
849
Example
To display the route preference for all route types:
DGS-3120-24TC:admin#show route preference
Command: show route preference
Protocol Preference
---------- ----------
Static 60
Default 1
Local 0
DGS-3120-24TC:admin#
Format
enable ecmp ospf
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the OSPF ECMP function:
DGS-3120-24TC:admin#enable ecmp ospf
Command: enable ecmp ospf
Success.
DGS-3120-24TC:admin#
850
Format
disable ecmp ospf
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the OSPF ECMP function:
DGS-3120-24TC:admin#disable ecmp ospf
Command: disable ecmp ospf
Success.
DGS-3120-24TC:admin#
851
Format
config filter rpc_portmapper [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Specify a list of ports to be configured for the RPC portmapper filter state.
all - Specify all ports to be configured for the RPC portmapper filter state.
state - Specify the RPC portmapper filter state.
enable - Enable the RPC portmapper filter on specified ports.
disable - Disable the RPC portmapper filter on specified ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable RPC portmapper filter on unit 1 port 1 to port 10:
DGS-3120-24TC:admin#config filter rpc_portmapper 1:1-1:10 state enable
Command: config filter rpc_portmapper 1:1-1:10 state enable
Success.
DGS-3120-24TC:admin#
Format
show filter rpc_portmapper
852
Parameters
None.
Restrictions
None.
Example
To display the RPC portmapper state:
DGS-3120-24TC:admin#show filter rpc_portmapper
Command: show filter rpc_portmapper
DGS-3120-24TC:admin#
853
Format
config safeguard_engine {state [enable | disable] | utilization {rising <value 20-100> | falling
<value 20-100>}(1) | trap_log [enable|disable] | mode [ strict | fuzzy]}(1)
Parameters
state - (Optional) Specify to configure CPU protection state to enable or disable.
enable - Specify that CPU protection will be enabled.
disable - Specify that CPU protection will be enabled.
utilization - (Optional) Specify to configure the CPU protection threshold.
rising - Config utilization rising threshold , the range is between 20%-100% , if the CPU
utilization is over the rising threshold, the Switch enters exhausted mode.
<20-100> - Enter the utilization rising value here. This value must be between 20 and 100.
falling - Config utilization falling threshold , the range is between 20%-100% , if the CPU
utilization is lower than the falling threshold, the Switch enters normal mode.
<20-100> - Enter the utilization falling value here. This value must be between 20 and 100.
trap_log - (Optional) Configure the state of CPU protection related trap/log mechanism to enable
or disable. If set to enable, trap and log will be active while cpu protection current mode
changed.If set to disable, current mode change will not trigger trap and log events.
enable - Specify that the CPU protection trap or log mechanism will be enabled.
disable - Specify that the CPU protection trap or log mechanism will be disabled.
mode - (Optional) determine the controlling method of broadcast traffic. Here are two modes
(strict and fuzzy).
strict - In strict, the Switch will stop receiving all ‘ARP not to me’ packets (the protocol address
of target in ARP packet is the Switch itself). That means no matter what reasons cause the
high CPU utilization (may not caused by ARP storm), the Switch reluctantly processes
any ’ARP not to me’ packets in exhausted mode.
fuzzy - In fuzzy mode, the Switch will adjust the bandwidth dynamically depend on some
reasonable algorithm.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure CPU protection:
854
Success.
DGS-3120-24TC:admin#
Format
show safeguard_engine
Parameters
None.
Restrictions
None.
Example
To show safeguard_engine information:
DGS-3120-24TC:admin# show safeguard_engine
Command: show safeguard_engine
DGS-3120-24TC:admin#
Note: Safeguard engine current status has two modes: exhausted and normal mode.
855
Format
create backup [config | log] time_range <range_name 32> filename <pathname> {state
[enable | disable]}
Parameters
config - Schedule to back up configuration.
log - Schedule to back up log.
time_range - The schedule to back up the configuration or log.
<range_name32> - Enter the name of the time range. Maximum 32 characters.
filename - The backup filename of the configuration or log.
<pathname> - Enter the backup file path name.
state - (Optional) Enable or disable the backup schedule when the schedule is created. If not
specified, the schedule will be disabled.
enable – Enable the backup schedule.
disable – Disable the backup schedule.
Restrictions
Only Administrator and Operator-level users can issue this command.
856
Example
To create a backup schedule on time range "range_1":
DGS-3120-24TC:admin#create backup config time_range range_1 filename c:/bk-
confi
g-1
Command: create backup config time_range range_1 filename c:/bk-config-1
Success.
DGS-3120-24TC:admin#
Format
config backup [config | log] time_range <range_name 32> filename <pathname> state
[enable | disable]
Parameters
config - Schedule to back up configuration.
log - Schedule to back up log.
time_range - The schedule to back up the configuration or log.
<range_name32> - Enter the name of the time range. Maximum 32 characters.
filename - The backup filename of the configuration or log.
<pathname> - Enter the backup file path name.
state - (Optional) Enable or disable the backup schedule when the schedule is created.
enable – Enable the backup schedule.
disable – Disable the backup schedule.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable a backup schedule on time range "range_1":
DGS-3120-24TC:admin# config backup log time_range range_1 filename bk-des-log
state enable
Command: config backup log time_range range_1 filename bk-des-log state enable
Success.
DGS-3120-24TC:admin#
857
Format
delete backup [config | log] [all | time_range <range_name 32> {filename <pathname>}]
Parameters
config - Schedule to back up configuration.
log - Schedule to back up log.
all - Delete all the schedules.
time_range - The time range of schedule backup that wants to be deleted.
<range_name32> - Enter the name of the time range. Maximum 32 characters.
filename - (Optional) The backup filename of the configuration or log that wants to be deleted.
<pathname> - Enter the backup file path name.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete all the schedules:
DGS-3120-24TC:admin# delete backup config all
Command: delete backup config all
Success.
DGS-3120-24TC:admin#
Format
show backup {config | log}
Parameters
config - Display the backup schedules for configuration.
log - Display the backup schedules for log.
Restrictions
None.
858
Example
To show all backup schedules:
DGS-3120-24TC:admin#show backup
Command: show backup
Total Entries1
DGS-3120-24TC:admin#
Format
create execute_config time_range <range_name 32> config <pathname> {state [enable |
disable] | [increment | reset]}
Parameters
<range_name32> - Enter the time range for schedule to execute the configuration. Maximum 32
characters.
config - The filename of the configuration on file system.
<pathname> - Enter the configuration file path name.
state - (Optional) Enable or disable the executive schedules when the schedule is created.If not
specified, the schedule will be disabled.
enable – Enable the executive schedule.
disable – Disable the executive schedule.
increment - (Optional) The current configuration will not be reset before executing the
configuration.
reset - (Optional) The current configuration will be reset before executing the configuration.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a schedule to execute the configuration on file system:
859
Success.
DGS-3120-24TC:admin#
Format
config execute_config time_range <range_name 32> config <pathname> {state [enable |
disable] | [increment | reset]}
Parameters
<range_name32> - Enter the time range for schedule to execute the configuration. Maximum 32
characters.
config - The filename of the configuration on file system.
<pathname> - Enter the configuration file path name.
state - (Optional) Enable or disable the executive schedules.
enable – Enable the executive schedule.
disable – Disable the executive schedule.
increment - (Optional) The current configuration will not be reset before executing the
configuration.
reset - (Optional) The current configuration will be reset before executing the configuration.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure a executive schedule:
DGS-3120-24TC:admin# config execute_config time_range range_1 config c:/system-
config state enable increment
Command: config execute_config time_range range_1 config c:/system-config state
enable increment
Success.
DGS-3120-24TC:admin#
860
Format
delete execute_config [all | time_range <range_name 32> {config <pathname>}]
Parameters
all - Delete all the schedules of executing configuration.
time_range - The time range of the schedules that execute configuration to be deleted.
<range_name 32> - Enter the time range to be deleted. Maximum 32 characters.
config - (Optional) The configuration file name on file system.
<pathname> - Enter the configuration file path name.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete all the schedule of executing configuration:
DGS-3120-24TC:admin# delete execute_config all
Command: delete execute_config all
Success.
DGS-3120-24TC:admin#
Format
show execute_config
Parameters
None.
Restrictions
None.
861
Example
To display all the executive schedules:
DGS-3120-24TC:admin#show execute_config
Command: show execute_config
Total Entries1
DGS-3120-24TC:admin#
Format
execute config <pathname> {increment}
Parameters
<pathname> - The configuration filename on file system.
increment - (Optional) If not specified, the current configuration will be reset before executing the
configuration.If specified, the current configuration will not be reset before executing the
configuration.
Restrictions
Only Administrator-level users can issue this command.
Example
To load and execute a configuration:
DGS-3120-24PC:admin#execute config c:/config-vlan-0.cfg
Command: execute config c:/config-vlan-0.cfg
Success.
DGS-3120-24TC:admin#
862
Format
config ssh algorithm [3DES | AES128 | AES192 | AES256 | arcfour | blowfish | cast128 |
twofish128 | twofish192 | twofish256 | MD5| SHA1 | RSA | DSA] [enable | disable]
Parameters
3DES - The "3DES" cipher is three-key triple-DES (encrypt-decrypt-encrypt), where the first 8
bytes of the key are used for the first encryption, the next 8 bytes for the decryption, and the
following 8 bytes for the final encryption.
AES (128,192,256) - Advanced Encryption Standard.
arcfour - RC4 (also known as ARC4 or ARCFOUR meaning Alleged RC4) is the most widely-
used software stream cipher.
blowfish - Blowfish is a keyed, symmetric block cipher.
cast128 - CAST-128 is a 12- or 16-round feistel network with a 64-bit block size and a key size of
between 40 to 128 bits.
twofish (128,192,256) - Twofish has a 128-bit block size, a key size ranging from 128 to 256 bits.
MD5 - Message-Digest Algorithm 5.
SHA1 - Secure Hash Algorithm.
RSA - RSA encryption algorithm is a non-symmetric encryption algorithm.
DSS - Digital Signature Standard.
enable - Enabled the algorithm.
disable - Disables the algorithm.
863
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable SSH server public key algorithm:
DGS-3120-24TC:admin#config ssh algorithm DSA enable
Command: config ssh algorithm DSA enable
Success.
DGS-3120-24TC:admin#
Format
show ssh algorithm
Parameters
None.
Restrictions
None.
Example
To show server algorithm:
864
Encryption Algorithm
--------------------------
3DES : Enabled
AES128 : Enabled
AES192 : Enabled
AES256 : Enabled
Arcfour : Enabled
Blowfish : Enabled
Cast128 : Enabled
Twofish128 : Enabled
Twofish192 : Enabled
Twofish256 : Enabled
DGS-3120-24TC:admin#
Format
config ssh authmode [password | publickey | hostbased] [enable | disable]
Parameters
password - Specify user authentication method.
publickey - Specify user authentication method.
hostbased - Specify user authentication method.
enable - Enable user authentication method.
disable - Disable user authentication method.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
865
Example
To configure user authentication method:
DGS-3120-24TC:admin# config ssh authmode publickey enable
Command: config ssh authmode publickey enable
Success.
DGS-3120-24TC:admin#
Format
show ssh authmode
Parameters
None.
Restrictions
None.
Example
To show user authentication method:
DGS-3120-24TC:admin#show ssh authmode
Command: show ssh authmode
DGS-3120-24TC:admin#
866
Format
config ssh user <username 15> authmode [hostbased [hostname <domain_name 32> |
hostname_IP <domain_name 32> [<ipaddr> | <ipv6addr>]] | password | publickey]
Parameters
user - Specify the user name.
<username 15> - Enter the user name used here. This name can be up to 15 characters long.
hostbased - Specify user authentication method.
hostname - Specify host domain name.
<domain_name 32> - Enter the domain name here. This name can be up to 32 characters
long.
hostname_IP - Specify host domain name and IP address.
<domain_name 32> - Specify host name if configuring Host-based method.
<ipaddr> - Specify host IP address if configuring Host-based method.
<ipv6addr> - Specify host IPv6 address if configuring Host-based method. (EI Mode Only)
password - Specify user authentication method.
publickey - Specify user authentication method.
Restrictions
Only Administrator-level users can issue this command.
Example
To update user “test” authentication method:
DGS-3120-24TC:admin# config ssh user test authmode publickey
Command: config ssh user test authmode publickey
Success.
DGS-3120-24TC:admin#
Format
show ssh user authmode
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
867
Example
To show user information about SSH configuration:
DGS-3120-24TC:admin# show ssh user authmode
Command: show ssh user authmode
Current Accounts:
User Name Authentication Host Name Host IP
---------- --- -------------- --------- -------------
test Public Key
alpha Host-based alpha-local 172.18.61.180
beta Host-based beta-local 3000::105
Total Entries : 3
DGS-3120-24TC:admin#
Format
config ssh server {maxsession <int 1-8> | contimeout <sec 30-600> | authfail <int 2-20> |
rekey [10min | 30min | 60min | never] | port <tcp_port_number 1-65535>}
Parameters
maxsession - (Optional) Specify SSH server maximum session at the same time, maximum 8
sessions.
<int 1-8> - Enter the maximum session value here. This value must be between 1 and 8.
contimeout - (Optional) Specify SSH server connection time-out, in the unit of second.
<sec 30-600> - Enter the connection time-out value here. This value must be between 30 and
600 seconds.
authfail - (Optional) Specify user maximum fail attempts.
<int 2-20> - Enter the user maximum fail attempts value here. This value must be between 2
and 20.
rekey - (Optional) Specify time to re-generate session key. There are 10 minutes, 30 minutes, 60
minutes and never for the selection, which the never means do NOT re- generate session key
10min - Specify that the re-generate session key time will be 10 minutes.
30min - Specify that the re-generate session key time will be 30 minutes.
60min - Specify that the re-generate session key time will be 60 minutes.
never - Specify that the re-generate session key time will be set to never.
port - (Optional) Specify the TCP port used to communication between SSH client and server.
The default value is 22.
<tcp_port_number 1-65535> - Enter the TCP port number here. This value must be between
1 and 65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
868
Example
To configure SSH server maximum session number is 3:
DGS-3120-24TC:admin# config ssh server maxsession 3
Command: config ssh server maxsession 3
Success.
DGS-3120-24TC:admin#
Format
enable ssh
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable SSH server:
DGS-3120-24TC:admin# enable ssh
Command: enable ssh
Success.
DGS-3120-24TC:admin#
Format
disable ssh
Parameters
None.
869
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the SSH server services:
DGS-3120-24TC:admin#disable ssh
Command: disable ssh
Success.
DGS-3120-24TC:admin#
Format
show ssh server
Parameters
None.
Restrictions
None.
Example
To show SSH server:
DGS-3120-24TC:admin#show ssh server
Command: show ssh server
DGS-3120-24TC:admin#
870
Format
config ssh publickey bypass_login_screen state [enable | disable]
Parameters
enable - Specify to bypass the username/password login screen to avoid a secondary
authentication after using SSH public key authentication. If this method is specified, the login
user using SSH public key authentication can execute command directly with the initial
privilege level of the login user.
disable - Specify to need a secondary username/password authentication after using SSH public
key authentication. If this method is specified, the login user using SSH public key
authentication must pass username/password authentication before execution shell is
obtained. The initial privilege level depends on the secondary username/password
authentication.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the secondary username/password authentication for users using SSH public key
authentication:
DGS-3120-24TC:admin#config ssh publickey bypass_login_screen state disable
Command: config ssh publickey bypass_login_screen state disable
Success.
DGS-3120-24TC:admin#
Format
download ssh client_pub_key [<ipaddr> | <ipv6addr>] src_file <path_filename 64>
Parameters
<ipaddr> - Specify the IPv4 address of the TFTP server.
871
Restrictions
Only Administrator level can issue this command.
Example
To download a SSH public key file named id_rsa_keys from TFTP server 169.168.10.100 to the
switch:
DGS-3120-24TC:admin#download ssh client_public_key 169.168.10.100 src_file
id_rsa_keys
Command: download ssh client_public_key 169.168.10.100 src_file id_rsa_keys
DGS-3120-24TC:admin#
Format
upload ssh client_pub_key [<ipaddr> | <ipv6addr>] dest_file <path_filename 64>
Parameters
<ipaddr> - Specify the IPv4 address of the TFTP server.
<ipv6addr> - Specify the IPv6 address of the TFTP server.
src_file - Specify the path name and file name of the TFTP server. It can be a relative path name
or an absolute path name. If path name is not specified, it refers to the TFTP server path.
<path_filename 64> - Enter the source file path. This can be up to 64 characters long.
Restrictions
Only Administrator level can issue this command.
Example
To upload a SSH public key file named id_rsa_keys from TFTP server 169.168.10.100 to the
switch:
872
DGS-3120-24TC:admin#
873
Format
download ssl certificate <ipaddr> certfilename <path_filename 64> {keyfilename
<path_filename 64>}
Parameters
<ipaddr> - Enter the TFTP server IP address used for this configuration here.
certfilename - Specify the desired certificate file name.
<path_filename 64> - Certificate file path respect to tftp server root path, and input characters
max to 64 octets.
keyfilename – (Optional) Specify the private key file name which accompany with the certificate.
<path_filename 64> - Private key file path respect to tftp server root path, and input
characters max to 64 octets.
Restrictions
Only Administrator-level users can issue this command.
Example
To download certificate from TFTP server:
874
Success.
DGS-3120-24TC:admin#
Format
enable ssl {ciphersuite {RSA_with_RC4_128_MD5 | RSA_with_3DES_EDE_CBC_SHA |
DHE_DSS_with_3DES_EDE_CBC_SHA | RSA_EXPORT_with_RC4_40_MD5}}
Parameters
ciphersuite - (Optional) Specify the cipher suite combination used for this configuration.
RSA_with_RC4_128_MD5 - Indicate RSA key exchange with RC4 128 bits encryption and
MD5 hash.
RSA_with_3DES_EDE_CBC_SHA - Indicate RSA key exchange with 3DES_EDE_CBC
encryption and SHA hash.
DHE_DSS_with_3DES_EDE_CBC_SHA - Indicate DH key exchange with 3DES_EDE_CBC
encryption and SHA hash.
RSA_EXPORT_with_RC4_40_MD5 - Indicate RSA_EXPORT key exchange with RC4 40 bits
encryption and MD5 hash.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the SSL ciphersuite for RSA_with_RC4_128_MD5:
DGS-3120-24TC:admin# enable ssl ciphersuite RSA_with_RC4_128_MD5
Command: enable ssl ciphersuite RSA_with_RC4_128_MD5
Success.
DGS-3120-24TC:admin#
To enable SSL:
875
DGS-3120-24TC:admin#
Format
disable ssl {ciphersuite {RSA_with_RC4_128_MD5 | RSA_with_3DES_EDE_CBC_SHA |
DHE_DSS_with_3DES_EDE_CBC_SHA | RSA_EXPORT_with_RC4_40_MD5}}
Parameters
ciphersuite - (Optional) Specify the cipher suite combination used for this configuration.
RSA_with_RC4_128_MD5 - Indicate RSA key exchange with RC4 128 bits encryption and
MD5 hash.
RSA_with_3DES_EDE_CBC_SHA - Indicate RSA key exchange with 3DES_EDE_CBC
encryption and SHA hash.
DHE_DSS_with_3DES_EDE_CBC_SHA - Indicate DH key exchange with 3DES_EDE_CBC
encryption and SHA hash.
RSA_EXPORT_with_RC4_40_MD5 - Indicate RSA_EXPORT key exchange with RC4 40 bits
encryption and MD5 hash.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable SSL ciphersuite for RSA_with_RC4_128_MD5:
DGS-3120-24TC:admin# disable ssl ciphersuite RSA_with_RC4_128_MD5
Command: disable ssl ciphersuite RSA_with_RC4_128_MD5
Success.
DGS-3120-24TC:admin#
To disable SSL:
876
Success.
DGS-3120-24TC:admin#
Format
delete ssl certificate <path_filename 64>
Parameters
<path_filename 64> - Specify the certification file name on the Switch.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a certificate:
DGS-3120-24TC:admin#delete ssl certificate web_ca2.cer
Command: delete ssl certificate web_ca2.cer
Success.
DGS-3120-24TC:admin#
Format
show ssl {certificate {[chain | <path_filename 64>]}}
Parameters
certificate - (Optional) Specify that the SSL certificate will be displayed.
chain - (Optioanl) Specify the chain of certifications on the Switch to be displayed.
877
<path_filename 64> - (Optioanl) Specify the certification file name on the Switch.
Restrictions
None.
Example
To show SSL:
DGS-3120-24TC:admin#show ssl
Command: show ssl
DGS-3120-24TC:admin#
To show certificate:
DGS-3120-24TC:admin# show ssl certificate
Command: show ssl certificate
DGS-3120-24TC:admin#
Format
show ssl cachetimeout
Parameters
None.
Restrictions
None.
878
Example
To show SSL cache timeout:
DGS-3120-24TC:admin#show ssl cachetimeout
Command: show ssl cachetimeout
DGS-3120-24TC:admin#
Format
config ssl cachetimeout <value 60-86400>
Parameters
timeout - Specify the SSL cache timeout value attributes.
<value 60-86400> - Enter the timeout value here. This value must be between 60 and 86400.
Restrictions
None.
Example
To configure the SSL cache timeout value to 60:
DGS-3120-24TC:admin#config ssl cachetimeout 60
Command: config ssl cachetimeout 60
Success.
DGS-3120-24TC:admin#
879
Format
config ssl certificate chain [default | <cert_list>]
Parameters
default - Specify to use all certificates to constitute the SSL certificate chain.
<cert_list> - Specify chain of certifications on the Switch.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure SSL chain of certifications
DGS-3120-24TC:admin#config ssl certificate chain web_ca2.cer,server.crt
Command: config ssl certificate chain web_ca2.cer,server.crt
Success.
DGS-3120-24TC:admin#
880
Format
enable stp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable STP:
881
DGS-3120-24TC:admin#enable stp
Command: enable stp
Success.
DGS-3120-24TC:admin#
Format
disable stp
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable STP:
DGS-3120-24TC:admin#disable stp
Command: disable stp
Success.
DGS-3120-24TC:admin#
Format
config stp {maxage <value 6-40> | maxhops <value 6-40> | hellotime <value 1-2> |
forwarddelay <value 4-30> | txholdcount <value 1-10> | fbpdu [enable | disable] |
nni_bpdu_addr [dot1d | dot1ad]}
Parameters
maxage - (Optional) Used to determine if a BPDU is valid. The default value is 20.
882
<value 6-40> - Enter the maximum age value here. This value must be between 6-40.
maxhops - (Optional) Used to restrict the forwarded times of one BPDU. The default value is 20.
<value 6-40> - Enter the maximum hops value here. This value must be between 6 and 40.
hello_time - (Optional) The time interval for sending configuration BPDUs by the Root Bridge.
The default value is 2 seconds. This parameter is for STP and RSTP version. MSTP version
uses per-port hellotime parameter.
<value 1-2> - Enter the hello time value here. This value must be between 1 and 2.
forwarddelay - (Optional) The maximum delay time for one BPDU to be transmitted by a bridge
and received from another bridge. The default value is 15.
<value 4-30> - Enter the maximum delay time here. This value must be between 4 and 30.
txholdcount - (Optional) Used to restrict the numbers of BPDU transmitted in a time interval.
<value 1-10> - Enter the transmitted BPDU restriction value here. This value must be
between 1 and 10.
fbpdu - (Optional) To decide if the bridge will flood STP BPDU when STP functionality is
disabled.
enable - Specify that the bridge will flood STP BPDU when STP functionality is disabled
disable - Specify that the bridge will not flood STP BPDU when STP functionality is disabled
nni_bpdu_addr - (Optional) Used to determine the BPDU protocol address for STP in service
provide site. It can use 802.1d STP address, or 802.1ad service provider STP address.
dot1d - Specify that the NNI BPDU protocol address value will be set to Dot1d.
dot1ad - Specify that the NNI BPDU protocol address value will be set to Dot1ad.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure STP:
DGS-3120-24TC:admin#config stp maxage 25
Command: config stp maxage 25
Success.
DGS-3120-24TC:admin#
Format
show stp
Parameters
None.
Restrictions
None.
883
Example
To show STP:
DGS-3120-24TC:admin#show stp
Command: show stp
DGS-3120-24TC:admin#
Format
create stp instance_id <value 1-15>
Parameters
instance_id - Specify the MSTP instance ID. Instance 0 represents for default instance, CIST.
<value 1-15> - Enter the MSTP instance ID here. This value must be between 1 and 15.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create MSTP instance:
884
DGS-3120-24TC:admin#
Format
config stp instance_id <value 1-15> [add_vlan | remove_vlan] <vidlist>
Parameters
instance_id - Specify the MSTP instance ID. Instance 0 represents for default instance, CIST.
<value 1-15> - Enter the MSTP instance ID here. This value must be between 1 and 15.
add_vlan - Specify to map the specified VLAN list to an existing MST instance.
remove_vlan - Specify to delete the specified VLAN list from an existing MST instance.
<vidlist> - Specify a list of VLANs by VLAN ID.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To map a VLAN ID to an MSTP instance:
DGS-3120-24TC:admin# config stp instance_id 2 add_vlan 1-3
Command: config stp instance_id 2 add_vlan 1-3
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
885
Format
delete stp instance_id <value 1-15>
Parameters
instance_id - Specify the MSTP instance ID. Instance 0 represents for default instance, CIST.
<value 1-15> - Enter the MSTP instance ID here. This value must be between 1 and 15.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete an MSTP instance:
DGS-3120-24TC:admin# delete stp instance_id 2
Command: delete stp instance_id 2
Success.
DGS-3120-24TC:admin#
Format
config stp mst_config_id {revision_level <int 0-65535> | name <string>}
Parameters
name - (Optional) Specify the name given for a specific MST region.
<string> - Enter the MST region name here.
revision_level - (Optional) The same given name with different revision level also represents
different MST regions.
<int 0-65535> - Enter the revision level here. This value must be between 0 and 65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
886
Example
To change the name and revision level of the MST configuration identification:
DGS-3120-24TC:admin#config stp mst_config_id name R&D_BlockG revision_level 1
Success.
DGS-3120-24TC:admin#
Format
show stp mst_config_id
Parameters
None.
Restrictions
None.
Example
show STP MST configuration ID:
DGS-3120-24TC:admin# show stp mst_config_id
Command: show stp mst_config_id
DGS-3120-24TC:admin#
887
Format
config stp mst_ports <portlist> instance_id <value 0-15> {internalCost [auto | <value 1-
200000000>] | priority <value 0-240>}
Parameters
mst_ports - Specify to be distinguished from the parameters of ports only at CIST level.
<portlist> - Enter a list of ports used for the configuration here.
instance_id - Specify the instance ID used.
<value 0-15> - Enter the instance ID used here. This value must be between 0 and 15.
internalCost - (Optional) Specify the port path cost used in MSTP.
auto - Specify that the internal cost value will be set to auto.
<value 1-200000000> - Enter the internal cost value here. This value must be between 1 and
200000000.
priority - (Optional) Specify the port priority value.
<value 0-240> - Enter the port priority value here. This value must be between 0 and 240.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure STP MST ports:
DGS-3120-24TC:admin#config stp mst_ports 1:1 instance_id 0 internalCost auto
Command: config stp mst_ports 1:1 instance_id 0 internalCost auto
Success.
DGS-3120-24TC:admin#
Format
config stp ports <portlist> {externalCost [auto | <value 1-200000000>] | hellotime <value 1-
2> | migrate [yes | no] | edge [true | false | auto] | p2p [true | false | auto] | state [enable |
disable]| restricted_role [true | false] | restricted_tcn [true | false] | fbpdu [enable | disable]}
Parameters
<portlist> - Enter a list of ports used for the configuration here.
external_cost - (Optional) The path cost between MST regions from the transmitting Bridge to
the CIST Root Bridge. It is only used at CIST level.
auto - Specify that the external cost value will be set to automatic.
<value 1-200000000> - Enter the external cost value here. This value must be between 1 and
200000000.
888
hellotime - (Optional) The default value is 2 . This parameter is for MSTP version. For STP and
RSTP version, uses the per system hellotime parameter.
<value 1-2> - Enter the hello time value here. This value must be between 1 and 2.
migrate - (Optional) Operation of management in order to specify the port to send MSTP BPDU
for a delay time.
yes - Specify that the MSTP BPDU for a delay time will be sent.
no - Specify that the MSTP BPDU for a delay time will not be sent.
edge - (Optional) To decide if this port is connected to a LAN or a Bridged LAN.
true - Specify that the specified port(s) is edge.
false - Specify that the specified port(s) is not edge.
auto - In auto mode, the bridge will delay for a period to become edge port if no bridge BPUD
is received. The default is auto mode.
p2p - (Optional) To decide if this port is in Full-Duplex or Half-Duplex mode.
true - Specify that the port(s) is in Full-Duplex mode.
false - Specify that the port(s) is in Half-Duplex mode.
auto - Specify that the port(s) is in Full-Duplex and Half-Duplex mode.
state - (Optional) To decide if this port supports the STP functionality.
enable - Specify that STP functionality on the port(s) is enabled.
disable - Specify that STP functionality on the port(s) is disabled.
restricted_role - (Optional) To decide if this port not to be selected as Root Port. The default
value is false.
true - Specify that the port cannot be specified as the root port.
false - Specify that the port can be specified as the root port.
restricted_tcn - (Optional) To decide if this port not to propagate topology change. The default
value is false.
true - Specify that the port cannot be set to propagate a topology change.
false - Specify that the port can be set to propagate a topology change.
fbpdu - (Optional) To decide if this port will flood STP BPDU when STP functionality is disabled.
When the state is set to enable, the received BPDU will be forwarded. When the state is set to
disable, the received BPDU will be dropped.
enable - Specify that the port can be set to flood the STP BPDU when the STP functionality is
disabled.
disable - Specify that the port can not be set to flood the STP BPDU when the STP
functionality is disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure STP ports:
DGS-3120-24TC:admin#config stp ports 1:1 externalCost auto
Command: config stp ports 1:1 externalCost auto
Success.
DGS-3120-24TC:admin#
889
Format
show stp ports {<portlist>}
Parameters
ports - To show parameters of the designated port numbers, to be distinguished from showing
parameters of the bridge.
<portlist> - (Optional) Enter a list of ports used for the configuration here.
Restrictions
None.
Example
To show STP ports:
DGS-3120-24TC:admin#show stp ports
Command: show stp ports
Format
config stp priority <value 0-61440> instance_id <value 0-15>
Parameters
priority - Specify the bridge priority value. This value must be divisible by 4096.
890
<value 0-61440> - Enter the bridge priority value here. This value must be between 0 and
61440.
instance_id - Identifier to distinguish different STP instances.
<value 0-15> - Enter the STP instance ID here. This value must be between 0 and 15.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the STP instance ID:
DGS-3120-24TC:admin# config stp priority 61440 instance_id 0
Command: config stp priority 61440 instance_id 0
Success.
DGS-3120-24TC:admin#
Format
config stp trap {topo_change [disable | enable] | new_root [enable | disable]}
Parameters
topo_change - Specify enable or disable sending topology change traps.
disable - Disable sending topology change traps.
enable - Enable sending topology change traps.
new_root - Specify enable or disable sending new root traps.
enable - Enable sending new root traps.
disable - Disable sending new root traps.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable sending new root traps:
DGS-3120-24TC:admin#config stp trap new_root disable
Command: config stp trap new_root disable
DGS-3120-24TC:admin#
891
Format
config stp version [mstp | rstp | stp]
Parameters
version - To decide to run under which version of STP.
mstp - Multiple Spanning Tree Protocol.
rstp - Rapid Spanning Tree Protocol.
stp - Spanning Tree Protocol.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure STP version:
DGS-3120-24TC:admin# config stp version mstp
Command: config stp version mstp
Success.
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
Format
show stp instance {<value 0-15>}
892
Parameters
instance - Specify the MSTP instance ID.
<value 0-15> - (Optional) Enter the MSTP instance ID value here. This value must be
between 0 and 15.
Restrictions
None.
Example
To show STP instance:
DGS-3120-24TC:admin# show stp instance
Command: show stp instance
DGS-3120-24TC:admin#
893
Format
enable surveillance_vlan [<vlan_name 32> | vlanid <vlanid 1-4094>]
Parameters
<vlan_name 32> - Specify the name of surveillance VLAN.
vlanid - Specify the ID of surveillance VLAN.
<vlanid 1-4094> - Enter the ID of surveillance VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable a surveillance VLAN with the name “v2”:
DGS-3120-24TC:admin#enable surveillance_vlan v2
Command: enable surveillance_vlan v2
Success.
DGS-3120-24TC:admin#
894
Format
disable surveillance_vlan
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the surveillance VLAN:
DGS-3120-24TC:admin#disable surveillance_vlan
Command: disable surveillance_vlan
Success.
DGS-3120-24TC:admin#
Format
config surveillance_vlan priority <int 0-7>
Parameters
<int 0-7> - Enter the priority of the surveillance VLAN. The range is from 0 to 7. The default
priority is 5.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the priority of the surveillance VLAN to be 6:
895
Success.
DGS-3120-24TC:admin#
Format
config surveillance_vlan oui [add | delete] <macaddr> <macmask> {component_type [vms |
vms_client | video_encoder | network_storage | other] description <desc 32>}
Parameters
add - Specify to add a user-defined OUI of a surveillance device vendor.
delete - Specify to remove a user-defined OUI of a surveillance device vendor.
<macaddr> - The user-defined OUI MAC address.
<macmask> - The user-defined OUI MAC address mask.
component_type - (Optional) Specify the surveillance components that could be auto-detected
by surveillance VLAN.
vms - Specify the Video Manage Server (VMS) to be auto-detected by surveillance VLAN.
vms_client - Specify the VMS client to be auto-detected by surveillance VLAN.
video_encoder - Specify the video encoder to be auto-detected by surveillance VLAN.
network_storage - Specify the network storage to be auto-detected by surveillance VLAN.
other - Specify other surveillance devices to be auto-detected by surveillance VLAN.
description - Specify the description for the user-defined OUI.
<desc 32> - Enter the description.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a user-defined OUI of a surveillance device:
DGS-3120-24TC:admin#config surveillance_vlan oui add AA-BB-CC-DD-EF-FF FF-FF-FF-
00-00-00 component_type other description abc
Command: config surveillance_vlan oui add AA-BB-CC-DD-EF-FF FF-FF-FF-00-00-00
component_type other description abc
Success.
DGS-3120-24TC:admin#
896
Format
config surveillance_vlan ports [<portlist> | all] state [enable | disable]
Parameters
<portlist> - Enter a list of ports to be configured.
all - Specify all ports to be configured.
state - The state of the surveillance VLAN function on the specified ports.
enable - Specify to enable surveillance VLAN function on the specified ports.
disable - Specify to disable surveillance VLAN function on the specified ports.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure Surveillance VLAN to the enabled state on ports 4-6 of unit 1:
DGS-3120-24TC:admin#config surveillance_vlan ports 1:4-1:6 state enable
Command: config surveillance_vlan ports 1:4-1:6 state enable
Success.
DGS-3120-24TC:admin#
Format
config surveillance_vlan aging_time <min 1-65535>
Parameters
<min 1-65535> - Specify the aging time. The range is from 1 to 65535 minutes. The default value
is 720.
897
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the aging time of the surveillance VLAN to 60 minutes:
DGS-3120-24TC:admin#config surveillance_vlan aging_time 60
Command: config surveillance_vlan aging_time 60
Success.
DGS-3120-24TC:admin#
Format
config surveillance_vlan log state [enable | disable]
Parameters
enable - Specify to enable the log state of the surveillance VLAN.
disable - Specify to disable the log state of the surveillance VLAN.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the log state of the surveillance VLAN:
DGS-3120-24TC:admin#config surveillance_vlan log state enable
Command: config surveillance_vlan log state enable
Success.
DGS-3120-24TC:admin#
898
Format
show surveillance_vlan {oui | ports {<portlist>} | device {ports <portlist>}}
Parameters
oui - (Optional) The OUI information of the surveillance VLAN.
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - (Optional) Enter a range of ports to be displayed.
device - (Optional) The Surveillance devices that are learned through their OUI.
ports - (Optional) Specify a range of ports to be displayed.
<portlist> - Enter a range of ports to be displayed.
Restrictions
None.
Example
To display the surveillance VLAN global information when surveillance VLAN is enabled:
GS-3120-24TC:admin#show surveillance_vlan
Command: show surveillance_vlan
DGS-3120-24TC:admin#
899
Format
create sflow flow_sampler ports [<portlist> | all] analyzer_server_id <value 1-4> {rate <value
0-65535> | maxheadersize <value 18-256>}
Parameters
ports - Specify the list of ports to be configured.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
analyzer_server_id - Specify the ID of a server analyzer where the packet will be forwarded.
<value 1-4> - Enter the analyzer server ID here. This value must be between 1 and 4.
rate - (Optional) The sampling rate for packet Rx sampling. The configured rate value multiplied
by x is the actual rate, where the x is project dependent with the default value 256. If set to 0,
the sampler is disabled. If the rate is not specified, its default value is 0.
<value 0-65535> - Enter the sampling rate value here. This value must be between 0 and
65535.
maxheadersize - (Optional) The maximum number of leading bytes in the packet which has
900
been sampled that will be encapsulated and forwarded to the server. If not specified, the
default value is 128.
<value 18-256> - Enter the maximum header size here. This value must be between 18 and
256.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Create sFlow flow sampler:
DGS-3120-24TC:admin# create sflow flow_sampler ports 1 analyzer_server_id 1
rate 1 maxheadersize 18
Command: create sflow flow_sampler ports 1 analyzer_server_id 1 rate 1
maxheadersize 18
Success.
DGS-3120-24TC:admin#
Format
config sflow flow_sampler ports [<portlist> | all] {rate <value 0-65535> | maxheadersize
<value 18-256>}
Parameters
ports - Specify the list of ports to be configured.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
rate - (Optional) The sampling rate for packet Rx sampling. The configured rate value multiplied
by x is the actual rate, where the x is project dependent with the default value 256. If set to 0,
the sampler is disabled. If the rate is not specified, its default value is 0.
<value 0-65535> - Enter the sampling rate value here. This value must be between 0 and
65535.
maxheadersize - (Optional) The maximum number of leading bytes in the packet which has
been sampled that will be encapsulated and forwarded to the server. If not specified, the
default value is 128.
<value 18-256> - Enter the maximum header size value here. This value must be between 18
and 256.
Restrictions
Only Administrator and Operator-level users can issue this command.
901
Example
Configure the sFlow sampler the rate of port 1 to be 0:
DGS-3120-24TC:admin#config sflow flow_sampler ports 1:1 rate 0 maxheadersize 18
Command: config sflow flow_sampler ports 1:1 rate 0 maxheadersize 18
Success.
DGS-3120-24TC:admin#
Format
delete sflow flow_sampler ports [<portlist> | all]
Parameters
ports - Specify the list of ports to be configured.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Delete the sFlow sampler port 1:
DGS-3120-24TC:admin#delete sflow flow_sampler ports 1:1
Command: delete sflow flow_sampler ports 1:1
Success.
DGS-3120-24TC:admin#
Format
create sflow counter_poller ports [<portlist> | all] analyzer_server_id <value 1-4> {interval
[disable | <sec 20-120>]}
902
Parameters
ports - Specify the list of ports to be configured.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
analyzer_server_id - The ID of a analyzer server.
<value 1-4> - Enter the analyzer server IS here. This value must be between 1 and 4.
interval - (Optional) The maximum number of seconds between successive statistics counters
information.
disable - This new sFlow counter will not export counter until the interval to be set a
appropriate value. If interval is not specified, its default value is disabled.
<sec 20-120> - Enter the maximum number of seconds between successive statistics
counters information here. This value must be between 20 and 120 seconds.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Create sFlow counter poller, which sample port 1 to analyzer server 1:
DGS-3120-24TC:admin#create sflow counter_poller ports 1:1 analyzer_server_id 1
Command: create sflow counter_poller ports 1:1 analyzer_server_id 1
Success.
DGS-3120-24TC:admin#
Format
config sflow counter_poller ports [<portlist> | all] interval [disable | <sec 20-120>]
Parameters
ports - Specify the list of ports to be configured.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
interval - The maximum number of seconds between successive samples of the counters.
disable - Stop exporting counter.
<sec 20-120> - Enter the maximum number of seconds between successive samples of the
counters here. This value must be between 20 and 120.
Restrictions
Only Administrator and Operator-level users can issue this command.
903
Example
Configure the interval of sFlow counter poller port 1 to be 0:
DGS-3120-24TC:admin#config sflow counter_poller ports 1:1 interval disable
Command: config sflow counter_poller ports 1:1 interval disable
Success.
DGS-3120-24TC:admin#
Format
delete sflow counter_poller ports [<portlist> | all]
Parameters
ports - Specify the list of ports to delete the counter poller.
<portlist> - Enter the list of ports that will be used for this configuration here.
all - Specify all ports on the Switch.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Delete sFlow counter poller on port 1:
DGS-3120-24TC:admin#delete sflow counter_poller ports 1:1
Command: delete sflow counter_poller ports 1:1
Success.
DGS-3120-24TC:admin#
904
Format
create sflow analyzer_server <value 1-4> owner <name 16> {timeout [<sec 1-2000000> |
infinite] | collectoraddress <ipaddr> | collectorport <udp_port_number 1-65535> |
maxdatagramsize <value 300-1400>}
Parameters
analyzer_server - The ID of analyzer server.
<value 1-4> - Enter the analyzer server ID here.
owner - The entity making use of this sFlow analyzer_server. When owner is set or modified, the
timeout value will become 400 automatically.
<name 16> - Enter the owner name here. This name can be up to 16 characters long.
timeout - (Optional) The seconds to wait before the server is timed out. When the analyzer
server times out, all of the flow_samplers and counter_pollers associated with this analyzer
server will be deleted. The default value is 400 seconds.
<sec 1-2000000> - Enter the time-out value here. This value must be between 1 and 2000000
seconds.
infinite - Indicates the analyzer server never timeout.
collectoraddress - (Optional) The IP address of the analyzer server. If this is set to 0 or not
specified, the IP address is 0 and the entry is not active.
<ipaddr> - Enter the IP address used for the configuration here.
collectorport - (Optional) The destination UDP port for sending the sFlow datagram. If not
specified, the default value is 6364. The specified UDP port number can NOT conflict with
other applications.
<udp_port_number 1-65535> - Enter the destination UDP port number here. This value must
be between 1 and 65535.
maxdatagramsize - (Optional) The maximum number of data bytes that can be packed in a
single sample datagram. If not specified, the default value is 1400 bytes.
<value 300-1400> - Enter the maximum datagram size here. This value must be between 300
and 1400.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create the analyzer server:
DGS-3120-24TC:admin# create sflow analyzer_server 2 owner monitor timeout
infinite collectoraddress 10.0.0.1 collectorport 65524 maxdatagramsize 300
Command: create sflow analyzer_server 2 owner monitor timeout infinite
collectoraddress 10.0.0.1 collectorport 65524 maxdatagramsize 300
Success.
DGS-3120-24TC:admin#
905
Format
config sflow analyzer_server <value 1-4> {timeout [<sec 1-2000000> | infinite] |
collectoraddress <ipaddr> | collectorport <udp_port_number 1-65535> | maxdatagramsize
<value 300-1400>}
Parameters
analyzer_server - The ID of analyzer server.
<value 1-4> - Enter the analyzer server ID here. This value must be between 1 and 4.
timeout - (Optional) The time (in seconds) remaining before the sample is released and stops
sampling. When the analyzer_server times out, all of the flow_samplers and counter_pollers
associated with this analyzer_server will be deleted.
<sec 1-2000000> - Enter the time-out value here. This value must be between 1 and 2000000
seconds.
infinity - Indicates the analyzer server never timeout
collectoraddress - (Optional) The IP address of the server. If not specified or set a 0 address,
sFlow packets will not be sent to this server.
<ipaddr> - Enter the IP address used for the configuration here.
collectorport - (Optional) The destination UDP port for sending the sFlow datagram. If not
specified, the default value is 6364
<udp_port_number 1-65535> - Enter the destination port number here. This value must be
between 1 and 65535.
maxdatagramsize - (Optional) The maximum number of data bytes that can be packed in a
single sample datagram. If not specified, the default value is 1400 bytes.
<value 300-1400> - Enter the maximum datagram size here. This value must be between 300
and 1400.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Configure the host 10.90.90.90 to be the sFlow analyzer server with the ID 1:
DGS-3120-24TC:admin# config sflow analyzer_server 1 collectoraddress
10.90.90.90
Command: config sflow analyzer_server 1 collectoraddress 10.90.90.90
Success.
DGS-3120-24TC:admin#
Format
delete sflow analyzer_server <value 1-4>
906
Parameters
analyzer_server - The ID of analyzer server that to be deleted.
<value 1-4> - Enter the analyzer server ID value here. This value must be between 1 and 4.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete an analyzer server:
DGS-3120-24TC:admin# delete sflow analyzer_server 1
Command: delete sflow analyzer_server 1
Success.
DGS-3120-24TC:admin#
Format
enable sflow
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Enable sFlow globally:
DGS-3120-24TC:admin# enable sflow
Command: enable sflow
Success.
DGS-3120-24TC:admin#
907
Format
disable sflow
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Disable the sFlow globally:
DGS-3120-24TC:admin# disable sflow
Command: disable sflow
Success.
DGS-3120-24TC:admin#
Format
show sflow
Parameters
None.
Restrictions
None.
908
Example
To show the sFlow information:
DGS-3120-24TC:admin#show sflow
Command: show sflow
sFlow Version : V5
sFlow Address : 10.90.90.90
sFlow State : Disabled
DGS-3120-24TC:admin#
Format
show sflow flow_sampler
Parameters
None.
Restrictions
None.
Example
To show the sFlow flow sampler information of ports which have been created:
DGS-3120-24TC:admin#show sflow flow_sampler
Command: show sflow flow_sampler
Port Analyzer Server ID Configured Rate Active Rate Max Header Size
---- ------------------ --------------- ----------- ---------------
1:1 1 0 0 18
Total Entries: 1
DGS-3120-24TC:admin#
909
Format
show sflow counter_poller
Parameters
None.
Restrictions
None.
Example
To show the sFlow counter poller information of ports which have been created:
DGS-3120-24TC:admin#show sflow counter_poller
Command: show sflow counter_poller
Total Entries: 1
DGS-3120-24TC:admin#
Format
show sflow analyzer_server
Parameters
None.
Restrictions
None.
910
Example
To show the sFlow flow sampler information of ports which have been created:
DGS-3120-24TC:admin#show sflow analyzer_server
Command: show sflow analyzer_server
Server ID : 2
Owner : monitor
Timeout : Infinite
Current Countdown Time: Infinite
Collector Address : 10.0.0.1
Collector Port : 65524
Max Datagram Size : 300
Total Entries: 2
DGS-3120-24TC:admin#
911
Format
show tech_support
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To show the information of technique’s support:
912
DES-3200-28P:admin#show tech_support
Command: show tech_support
#------------------------------------------------------------------------------
-
# DGS-3120-24TC Gigabit Ethernet Switch
# Technical Support Information
#
# Firmware: Build 3.00.522
# Copyright(C) 2013 D-Link Corporation. All rights reserved.
#------------------------------------------------------------------------------
-
#Topology Information
Stable Topology:
My Box ID : 1 Role : Master
Box Cnt : 1 Topology Type : Duplex Chain
Unit Prio- Device Runtime Stacking
ID rity Role MAC Type option version version
----- ---- ------- ----------------- ---------- ------ --------- -------
1 32 32 Master 00-01-02-03-04-00 DGS-3120-24TC 0x0002 3.00.006 2.0.1
2 NOT EXIST
3 NOT EXIST
4 NOT EXIST
5 NOT EXIST
6 NOT EXIST
*(S) means static box ID
Temporary Topology:
Stable Cnt : 48 Hot Swap Type : Stable
Box Cnt : 1 Topology Type : Duplex Chain
913
Format
upload tech_support_toTFTP <ipaddr> <path_filename 64>
Parameters
<ipaddr> - Specify the IP address of TFTP server.
<path_filename 64> - Specify the file name to store the information of technique’s support in
TFTP server. The max size of the file name is 64.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To upload the information of technique’s support:
DGS-3120-24TC:admin#upload tech_support_toTFTP 10.0.0.66 tech_report.txt
Command: upload tech_support_toTFTP 10.0.0.66 tech_report.txt
Success.
DGS-3120-24TC:admin#
914
Format
enable smtp
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable SMTP status:
DGS-3120-24TC:admin#enable smtp
Command: enable smtp
Success.
DGS-3120-24TC:admin#
915
Format
disable smtp
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To disable SMTP status:
DGS-3120-24TC:admin#disable smtp
Command: disable smtp
Success.
DGS-3120-24TC:admin#
Format
config smtp {server <ipaddr> | server_port <port_number 1-65535> | self_mail_addr
<mail_addr 254> | [add mail_receiver <mail_addr 254> | delete mail_receiver <index 1-8>]}(1)
Parameters
server - Specify the SMTP server IP address.
<ipaddr> - Enter the SMTP server IP address
server_port - Specify the SMTP server port.
<port_number 1-65535> - Enter the port number between 1 and 65535.
self_mail_addr - Specify the sender’s mail address.
<mail_addr 254> - Enter the mail address with maximum of 254 characters.
add mail_receiver – Specify to add mail receiver’s address.
<mail_addr 254> - Enter the mail address with maximum of 254 characters.
delete mail_receiver – Specify to delete mail receiver’s address.
<index 1-8> - Enter the mail address with maximum of 254 characters.
Restrictions
Only Administrator-level users can issue this command.
916
Example
To configure an SMTP server IP address:
DGS-3120-24TC:admin#config smtp server 172.18.208.9
Command: config smtp server 172.18.208.9
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
917
Format
show smtp
Parameters
None.
Restrictions
None.
Example
To display the current SMTP information:
DGS-3120-24TC:admin#show smtp
Command: show smtp
DGS-3120-24TC:admin#
Format
smtp send_testmsg
Parameters
None.
918
Restrictions
Only Administrator-level users can issue this command.
Example
To test whether the SMTP server can be reached:
DGS-3120-24TC:admin#smtp send_testmsg
Command: smtp send_testmsg
Subject:e-mail heading
Content:e-mail content
Success.
DGS-3120-24TC:admin#
919
920
An access list of IP addresses of the SNMP managers that are permitted to use the community
string to gain access to the agent.
A MIB view, which defines the subset of all MIB objects accessible to the given community.
Read and write or read-only permission for the MIB objects accessible to the community.
Format
create snmp community <community_string 32> view <view_name 32> [read_only |
read_write]
Parameters
community - An alphanumeric string of up to 32 characters used to authentication of users
wanting access to the Switch’s SNMP agent.
<community_string> - Enter the community string value here.
view_name - Specify to view a MIB name.
<view_name 32> - Enter the MIB view name here. This name can be up to 32 characters
long.
readonly - Allows the user using the above community string to have read only access to the
Switch’s SNMP agent.
readwrite - Allows the user using the above community string to have read and write access to
the Switch’s SNMP agent. The default read only community string is public. The default read
write community string is private.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a read-only level SNMP community “System” with a “CommunityView” view:
DGS-3120-24TC:admin# create snmp community System view CommunityView read_only
Command: create snmp community System view CommunityView read_only
Success.
DGS-3120-24TC:admin#
921
Format
create snmp community_masking view <view_name 32> [ read_only | read_write]
Parameters
<view_name 32> - Specify the name that is used to identify the group of MIB objects that a
remote SNMP manager is allowed to access on the Switch. The view name must exist in the
show snmp view command.
read_only - Specify that SNMP community members using the community string created can
only read the contents of the MIBs on the Switch.
read_write - Specify that SNMP community members using the community string created can
read from, and write to the contents of the MIBs on the Switch.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a secure SNMP community string:
DGS-3120-24TC:admin#create snmp community_masking view restricted read_only
Command: create snmp community_masking view restricted read_only
Success.
DGS-3120-24TC:admin#
Format
delete snmp community <community_string 32>
Parameters
community - Community string will be deleted.
<community_string 32> - Enter the community string value here. This value can be up to 32
characters long.
922
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a SNMP community “System”:
DGS-3120-24TC:admin# delete snmp community System
Command: delete snmp community System
Success.
DGS-3120-24TC:admin#
Format
show snmp community <community_string 32>
Parameters
<community_string 32> - (Optional) Specify the Community string.
If not specify community string , all community string information will be displayed.
Restrictions
None.
Example
To display SNMP community:
DGS-3120-24TC:admin# show snmp community
Command: show snmp community
Total Entries : 2
DGS-3120-24TC:admin#
923
Format
create snmp user <user_name 32> <groupname 32> {encrypted [by_password auth [md5
<auth_password 8-16> | sha <auth_password 8-20>] priv [none | des <priv_password 8-16>]
| by_key auth [md5 <auth_key 32-32> | sha <auth_key 40-40>] priv [none | des <priv_key 32-
32>]]}
Parameters
<user_name 32> - The name of the user on the host that connects to the agent. The range is 1
to 32.
<groupname 32> - The name of the group to which the user is associated. The range is 1 to 32.
encrypted - (Optional) Specify whether the password appears in encrypted format.
by_password - (Optional) Indicate input password for authentication and privacy.
auth - Initiates an authentication level setting session. The options are md5 and sha.
md5 - The HMAC-MD5-96 authentication level.
<auth_password 8-16> - Enter the MD5 authentication password here. This value must
be between 8 and 16 characters.
sha - The HMAC-SHA-96 authentication level.
<auth_password 8-20> - Enter the SHA authentication password here. This value must
be between 8 and 20 characters.
priv - (Optional) A privacy key used by DES, it is hex string type.
none - Specify that no encryption will be used for the privacy key.
des - Specify that the DES encryption will be used for the privacy key.
<priv_password 8-16> - Enter the DES password value here. This value must be between
8 and 16 characters long.
by_key - (Optional) Indicate input key for authentication and privacy.
auth - An authentication string used by MD5 or SHA1.
md5 - An authentication key used by MD5, it is hex string type.
<auth_key 32-32> - Enter the MD5 authentication key here. This value must be 32
characters long.
sha - An authentication key used by SHA1, it is hex string type.
<auth_key 40-40> - Enter the SHA authentication key here. This value must be 32
characters long.
priv - (Optional) A privacy key used by DES, it is hex string type.
none - Specify that no encryption will be used for the privacy key.
des - Specify that the DES encryption will be used for the privacy key.
<priv_key 32-32> - Enter the DES privacy key here. This value must be 32 characters
long.
Restrictions
Only Administrator-level users can issue this command.
Example
To create a SNMP user “user123” with group “group123”:
924
Success.
DGS-3120-24TC:admin#
Format
delete snmp user <username 32>
Parameters
<username 32> - The name of the user on the host that connects to the agent. The range is 1 to
32.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete a SNMP user “user123”:
DGS-3120-24TC:admin# delete snmp user user123
Command: delete snmp user user123
Success.
DGS-3120-24TC:admin#
Format
show snmp user
925
Parameters
None.
Restrictions
None.
Example
To show SNMP user:
DGS-3120-24TC:admin# show snmp user
Command: show snmp user
Total Entries : 2
DGS-3120-24TC:admin#
Format
create snmp group <groupname 32> [v1 | v2c | v3 [noauth_nopriv | auth_nopriv | auth_priv]]
{read_view <view_name 32> | write_view <view_name 32> | notify_view <view_name 32>}
Parameters
group - Specify the name of the group.
<groupname 32> - Enter the group name here. This name can be up to 32 characters long.
v1 - The least secure of the possible security models.
v2c - The second least secure of the possible security models.
v3 - The most secure of the possible.
noauth_nopriv - Neither support packet authentication nor encrypting.
auth_nopriv - Support packet authentication.
auth_priv - Support packet authentication and encrypting.
read_view - (Optional) Specify that the view name would be read.
<view_name 32> - Enter the read view name here. This name can be up to 32 characters
long.
write_view - (Optional) Specify that the view name would be write.
<view_name 32> - Enter the wite view name here. This name can be up to 32 characters
long.
notify_view - (Optional) Specify that the view name would be notify.
<view_name 32> - Enter the notify view name here. This name can be up to 32 characters
926
long.
Restrictions
Only Administrator-level users can issue this command.
Example
To create SNMP group “group123”:
DGS-3120-24TC:admin# create snmp group group123 v3 auth_priv read_view
CommunityView write_view CommunityView notify_view CommunityView
Command: create snmp group group123 v3 auth_priv read_view CommunityView
write_view CommunityView notify_view CommunityView
Success.
DGS-3120-24TC:admin#
Format
delete snmp group <groupname 32>
Parameters
<groupname 32> - The name of the group will be deleted.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete SNMP group “group123”:
DGS-3120-24TC:admin# delete snmp group group123
Command: delete snmp group group123
Success.
DGS-3120-24TC:admin#
927
Format
show snmp groups
Parameters
None.
Restrictions
None.
Example
To show SNMP groups:
928
Total Entries: 10
DGS-3120-24TC:admin#
Format
create snmp view <view_name 32> <oid> view_type [included | excluded]
Parameters
view - View name to be created.
<view_name 32> - Enter the view name here. The name can be up to 32 characters long.
929
Restrictions
Only Administrator-level users can issue this command.
Example
To create SNMP view “view123”:
DGS-3120-24TC:admin# create snmp view view123 1.3.6 view_type included
Command: create snmp view view123 1.3.6 view_type included
Success.
DGS-3120-24TC:admin#
Format
delete snmp view <view_name 32> [all | <oid>]
Parameters
view - View name to be deleted.
<view_name 32> - Enter the view name here. The name can be up to 32 characters long.
all - Specify that all view records will be removed.
<oid> - Object-Identified tree, MIB tree.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete SNMP view “view123”:
DGS-3120-24TC:admin# delete snmp view view123 all
Command: delete snmp view view123 all
Success.
DGS-3120-24TC:admin#
930
Format
show snmp view {<view_name 32>}
Parameters
view - (Optional) View name of the user who likes to show.
<view_name 32> - Enter the view name here. The name can be up to 32 characters long.
Restrictions
None.
Example
To show SNMP view:
DGS-3120-24TC:admin# show snmp view
Command: show snmp view
Total Entries: 9
DGS-3120-24TC:admin#
Format
enable snmp
931
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable SNMP:
DGS-3120-24TC:admin# enable snmp
Command: enable snmp
Success.
DGS-3120-24TC:admin#
Format
disable snmp
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable SNMP:
DGS-3120-24TC:admin# disable snmp
Command: disable snmp
Success.
DGS-3120-24TC:admin#
932
Format
create snmp [host <ipaddr> | v6host <ipv6addr>] [v1 | v2c | v3 [noauth_nopriv | auth_nopriv
| auth_priv]] <auth_string 32>
Parameters
host - Specify the recipient for which the traps are targeted.
<ipaddr> - The IP address of the recipient for which the traps are targeted.
v6host - Specify the IPv6 host address to which the trap packet will be sent.
<ipv6addr> - The IPv6 address of the recipient for which the traps are targeted.
v1 - The least secure of the possible security models.
v2c - The second least secure of the possible security models.
v3 - The most secure of the possible.
noauth_nopriv - Neither support packet authentication nor encrypting.
auth_nopriv - Support packet authentication.
auth_priv - Support packet authentication and encrypting.
<auth_string 32> - Authentication string. If the v1 or v2 is specified, the auth_string presents the
community string, and it must be one of the entries in community table. If the v3 is specified,
the auth_string presents the user name, and it must be one of the entries in the user table.
Restrictions
Only Administrator-level users can issue this command.
Example
To create SNMP host “10.0.0.1” with community string “public”:
DGS-3120-24TC:admin# create snmp host 10.0.0.1 v1 public
Command: create snmp host 10.0.0.1 v1 public
Success.
DGS-3120-24TC:admin#
Format
delete snmp [host <ipaddr> | v6host <ipv6addr>]
933
Parameters
host - The IP address of the recipient for which the traps are targeted.
<ipaddr> - Enter the IP address used for the configuration here.
v6host - The IPv6 address of the recipient for which the traps are targeted.
<ipv6addr> - Enter the IPv6 address used for the configuration here.
Restrictions
Only Administrator-level users can issue this command.
Example
To delete SNMP host “10.0.0.1”:
DGS-3120-24TC:admin# delete snmp host 10.0.0.1
Command: delete snmp host 10.0.0.1
Success.
DGS-3120-24TC:admin#
Format
show snmp
Parameters
None.
Restrictions
None.
Example
To display SNMP:
934
DGS-3120-24TC:admin#show snmp
Command: show snmp
System Name :
System Location :
System Contact :
SNMP Trap : Enabled
SNMP State : Enabled
DGS-3120-24TC:admin#
Format
show snmp host {<ipaddr>}
Parameters
host - (Optional) The IP address of the recipient for which the traps are targeted.
<ipaddr> - Enter the IP address used for the configuration here.
If no parameter specified, all SNMP hosts will be displayed.
Restrictions
None.
Example
To show SNMP host:
DGS-3120-24TC:admin# show snmp host
Command: show snmp host
Total Entries : 5
DGS-3120-24TC:admin#
935
Format
show snmp v6host {<ipv6addr>}
Parameters
v6host - (Optional) Specify the IPv6 host address.
<ipv6addr> - Enter the IPv6 address used for the configuration here.
If no parameter specified, all SNMP hosts will be displayed.
Restrictions
None.
Example
To show SNMP host:
DGS-3120-24TC:admin# show snmp v6host
Command: show snmp v6host
Total Entries: 5
DGS-3120-24TC:admin#
936
Format
config snmp engineID <snmp_engineID 10-64>
Parameters
engineID - Identify for the SNMP engine on the Switch. It is octet string type. It accepts the hex
number directly.
<snmp_engineID 10-64> - Enter the SNMP engine ID here. This value must be between 10
and 64.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure SNMP engine ID to “1023457890”:
DGS-3120-24TC:admin# config snmp engineID 1023457890
Command: config snmp engineID 1023457890
Success.
DGS-3120-24TC:admin#
Format
show snmp engineID
Parameters
None.
937
Restrictions
None.
Example
To show SNMP engine ID:
DGS-3120-24TC:admin# show snmp engineID
Command: show snmp engineID
DGS-3120-24TC:admin#
Format
config snmp system_name {<sw_name>}
Parameters
system_name - A maximum of 128 characters is allowed. And NULL string is accepted.
<sw_name> - (Optional) Enter the system name used here.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the Switch name for “DGS-XXXXS Stackable Switch”:
DGS-3120-24TC:admin# config snmp system_name DGS-XXXXS Stackable Switch
Command: config snmp system_name DGS-XXXXS Stackable Switch
Success.
DGS-3120-24TC:admin#
938
Format
config snmp system_location {<sw_location>}
Parameters
system_location - A maximum of 128 characters is allowed. And NULL string is accepted
<sw_location> - (Optional) Enter the system location string here.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the Switch location for “HQ 5F”:
DGS-3120-24TC:admin# config snmp system_location HQ 5F
Command: config snmp system_location HQ 5F
Success.
DGS-3120-24TC:admin#
Format
config snmp system_contact {<sw_contact>}
Parameters
system_contact - A maximum of 128 characters is allowed. And NULL string is accepted.
<sw_contact> - (Optional) Enter the system contact string here.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the Switch contact to “MIS Department II”:
DGS-3120-24TC:admin# config snmp system_contact "MIS Department II"
Command: config snmp system_contact "MIS Department II"
Success.
DGS-3120-24TC:admin#
939
Format
enable snmp traps
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable SNMP trap support:
DGS-3120-24TC:admin# enable snmp traps
Command: enable snmp traps
Success.
DGS-3120-24TC:admin#
Format
disable snmp traps
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To prevent SNMP traps from being sent from the Switch:
940
Success.
DGS-3120-24TC:admin#
Format
enable snmp authenticate_traps
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable SNMP authentication trap support:
DGS-3120-24TC:admin# enable snmp authenticate_traps
Command: enable snmp authenticate_traps
Success.
DGS-3120-24TC:admin#
Format
disable snmp authenticate_traps
Parameters
None.
941
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable SNMP authentication trap support:
DGS-3120-24TC:admin# disable snmp authenticate_traps
Command: disable snmp authenticate_traps
Success.
DGS-3120-24TC:admin#
Format
enable snmp linkchange_traps
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the sending of linkchange traps:
DGS-3120-24TC:admin# enable snmp linkchange_traps
Command: enable snmp linkchange_traps
Success.
DGS-3120-24TC:admin#
Format
disable snmp linkchange_traps
942
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the sending of linkchange traps:
DGS-3120-24TC:admin# disable snmp linkchange_traps
Command: disable snmp linkchange_traps
Success.
DGS-3120-24TC:admin#
Format
config snmp linkchange_traps ports [all | <portlist>] [enable | disable]
Parameters
all - To specify all ports.
<portlist> - To specify a port range.
enable - Enable sending of the link change trap for this port.
disable - Disable sending of the link change trap for this port.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the sending of linkchange traps:
DGS-3120-24TC:admin# config snmp linkchange_traps ports 1:1-1:4 enable
Command: config snmp linkchange_traps ports 1:1-1:4 enable
Success.
DGS-3120-24TC:admin#
943
Format
config snmp coldstart_traps [enable | disable]
Parameters
enable - Enable the trap of the coldstart event. The default state is enabled.
disable - Disable the trap of the coldstart event.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the trap for coldstart event:
DGS-3120-24TC:admin# config snmp coldstart_traps enable
Command: config snmp coldstart_traps enable
Success.
DGS-3120-24TC:admin#
Format
config snmp warmstart_traps [enable | disable]
Parameters
enable - Enable the trap of the warmstart event. The default state is enabled.
disable - Disable the trap of the warmstart event.
Restrictions
Only Administrator-level users can issue this command.
944
Example
To configure the trap state for warmstart event:
DGS-3120-24TC:admin# config snmp warmstart_traps enable
Command: config snmp warmstart_traps enable
Success.
DGS-3120-24TC:admin#
Format
show snmp traps {linkchange_traps {ports <portlist>}}
Parameters
linkchange_traps - (Optional) Specify that the SNMP trap sending status will be displayed.
ports - (Optional) Specify the ports for the display.
<portlist> - Enter the list of ports used for the display here.
Restrictions
None.
Example
DGS-3120-24TC:admin#
945
Format
config rmon trap {rising_alarm [enable | disable] | falling_alarm [enable | disable]} (1)
Parameters
rising_alarm - (Optional) Specify the trap state for rising alarm. The default state is enabled.
enable - Specify that the rising alarm function will be enabled.
disable - Specify that the rising alarm function will be disabled.
falling_alarm - (Optional) Specify the trap state for falling alarm. The default state is enabled.
enable - Specify that the falling alarm function will be enabled.
disable - Specify that the falling alarm function will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To configure the trap state for RMON events:
DGS-3120-24TC:admin# config rmon trap rising_alarm disable
Command: config rmon trap rising_alarm disable
Success.
DGS-3120-24TC:admin#
Format
show rmon
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To display the RMON related setting:
946
DGS-3120-24TC:admin#
Format
enable community_encryption
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable the encryption state on SNMP community string:
DGS-3120-24TC:admin#enable community_encryption
Command: enable community_encryption
Success.
DGS-3120-24TC:admin#
Format
disable community_encryption
Parameters
None.
947
Restrictions
Only Administrator-level users can issue this command.
Example
To disable the encryption state on SNMP community string:
DGS-3120-24TC:admin#disable community_encryption
Command: disable community_encryption
Success.
DGS-3120-24TC:admin#
Format
show community_encryption
Parameters
None.
Restrictions
None.
Example
To display the encryption state on SNMP community string:
DGS-3120-24TC:admin#show community_encryption
Command: show community_encryption
DGS-3120-24TC:admin#
948
Format
enable sim
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable SIM:
DGS-3120-24TC:admin# enable sim
Command: enable sim
Success.
DGS-3120-24TC:admin#
949
Format
disable sim
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable SIM:
DGS-3120-24TC:admin# disable sim
Command: disable sim
Success.
DGS-3120-24TC:admin#
Format
show sim {[candidates {<candidate_id 1-100>} | members{<member_id 1-32>} | group
{commander_mac <macaddr>} | neighbor]}
Parameters
candidates - (Optional) Specify the candidate devices.
<candidate_id 1-100> - (Optional) Enter the candidate device ID here. This value must be
between 1 and 100.
members - (Optional) Specify the member devices.
<member_id 1-32> - (Optional) Enter the member device ID here. This value must be
between 1 and 32.
group - (Optional) Specify other group devices.
commander_mac - (Optional) Specify the commander MAC address used.
<macaddr> - Enter the commander MAC address used here.
neighbor - (Optional) Specify other neighbor devices.
950
Restrictions
None.
Example
To show the self information in detail:
DGS-3120-24TC:admin#show sim
Command: show sim
DGS-3120-24TC:admin#
To show the candidate information in summary, if user specify candidate id, it would show
information in detail:
DGS-3120-24TC:admin# show sim candidate
Command: show sim candidate
Total Entries: 2
DGS-3120-24TC:admin#
To show the member information in summary, if user specify member id, it will show information in
detail:
951
Total Entries: 2
DGS-3120-24TC:admin#
To show other groups information in summary, if user specify group name, it will show information
in detail:
DGS-3120-24TC:admin# show sim group
Command: show sim group
DGS-3120-24TC:admin#
952
Neighbor Table
Total Entries: 3
DGS-3120-24TC:admin#
99-4 reconfig
Description
This command is used to re-telnet to member.
Format
reconfig [member_id <value 1-32> | exit]
Parameters
member_id - Specify the serial number of the member.
<value 1-32> - Enter the serial number of the member here.
exit - Specify to exit from the telnet session.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To re-telnet to member:
DGS-3120-24TC:admin# reconfig member_id 1
Command: reconfig member_id 1
DGS-3120-24TC:admin#
Login:
953
Format
config sim_group [add <candidate_id 1-100> {<password>} | delete <member_id 1-32>]
Parameters
add - Specify to add a specific candidate to the group.
<candidate_id 1-100> - Enter the candidate ID to be added to the group here. This value
must be between 1 and 100.
<password> - (Optional) The password of candidate if necessary.
delete - Specify to delete a member from the group.
<member_id 1-32> - Enter the member ID of the member to be removed from the group here.
This value must be between 1 and 32.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a member:
DGS-3120-24TC:admin# config sim_group add 2
Command: config sim_group add 2
Success.
DGS-3120-24TC:admin#
To delete a member:
DGS-3120-24TC:admin# config sim_group delete 1
Command: config sim_group delete 1
Success.
DGS-3120-24TC:admin#
954
Format
config sim [[commander {group_name <groupname 64>} | candidate] | dp_interval <sec 30-
90> | hold_time <sec 100-255>]
Parameters
commander - Specify to transfer the role to the commander.
group_name - (Optional) Specify that if the user is the commander, the user can update the
name of group.
<groupname 64> - Enter the group name here. This name can be up to 64 characters long.
candidate - Specify to transfer the role to the candidate.
dp_interval - The time in seconds between discoveries.
<sec 30-90> - Enter the discovery time here in seconds. This value must be between 30 and
90 seconds.
hold_time - The time in seconds the device holds the discovery result.
<sec 100-255> - Enter the hold time here in seconds. This value must be between 100 and
255.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command..
Example
To transfer to commander:
DGS-3120-24TC:admin# config sim commander
Command: config sim commander
Success.
DGS-3120-24TC:admin#
To transfer to candidate:
DGS-3120-24TC:admin# config sim candidate
Command: config sim candidate
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
955
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
download sim_ms [firmware_from_tftp | configuration_from_tftp] <ipaddr> <path_filename>
{[members <mslist 1-32> | all]}
Parameters
firmware_from_tftp - Specify that the firmware will be downloaded from the TFTP server.
configuration_from_tftp - Specify that the configuration will be downloaded from the TFTP
server.
<ipaddr> - Specify the IP address of the TFTP server.
<path_filename> - Specify the file path of the firmware or configuration in the TFTP server.
members - (Optional) Specify a range of members who can download this firmware or
configuration.
<mslist 1-32> - Enter the member list used here. This value must be between 1 and 32.
all - (Optional) Specify that all members will be used.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To download configuration:
956
Download Status :
DGS-3120-24TC:admin#
To download firmware:
DGS-3120-24TC:admin#download sim_ms firmware_from_tftp 10.55.47.1 D:\test.txt
members 1
Command: download sim_ms firmware_from_tftp 10.55.47.1 D:\test.txt members 1
Download Status :
DGS-3120-24TC:admin#
Format
upload sim_ms [configuration_to_tftp | log_to_tftp] <ipaddr> <path_filename> {[members
<mslist> | all]}
Parameters
configuration_to_tftp - Specify that the configuration will be uploaded to the TFTP server.
log_to_tftp – Specify that the log file will be uploaded to the TFTP server.
<ipaddr> - Specify the IP address of the TFTP server.
<path_filename> - Specify the file path to store the configuration in the TFTP server.
members - (Optional) Specify a range of members who can up this configuration.
<mslist> - Enter the member list used here.
all - (Optional) Specify that all members will be used.
957
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To upload configuration:
DGS-3120-24TC:admin# upload sim_ms configuration_to_tftp 10.55.47.1
D:\configuration.txt members 1
Command: upload sim_ms configuration_to_tftp 10.55.47.1 D:\configuration.txt
members 1
Upload Status :
DGS-3120-24TC:admin#
Format
config sim trap [enable | disable]
Parameters
enable - Enable the trap state.
disable - Disable the trap state.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable sim trap:
DGS-3120-24TC:admin# config sim trap enable
Command: config sim trap enable
Success.
DGS-3120-24TC:admin#
958
Format
config box_priority current_box_id <value 1-6> priority <value 1-63>
Parameters
current_box_id - Specify the Switch being configured. The range is 1-m, where the m.is
determined by device type. For example, to the DGS3120 Series, it is 6.
<value 1-6> - Enter the current box ID here. This value must be between 1 and 6.
priority - Specify the priority assigned to the box, with lower number meaning higher priority. The
range is 1-63.
<value 1-63> - Enter the higher priority value here. This value must be between 1 and 63.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure box priority:
DGS-3120-24TC:admin#config box_priority current_box_id 1 priority 1
Command: config box_priority current_box_id 1 priority 1
Success.
DGS-3120-24TC:admin#
959
Format
config box_id current_box_id <value 1-6> new_box_id [auto | <value 1-6>]
Parameters
current_box_id - Specify the Switch being configured. The parameter range is 1-m, where the m
is determined by device type. For example, to the DGS3120 Series, it is 6.
<value 1-6> - Enter the current box ID here. This value must be between 1 and 6.
new_box_id - Specify the new ID assigned to the box. The parameter range is 1-m.
auto - Allows the box ID to be assigned automatically by the stack system. The new box ID
will take effect after the next boot.
<value 1-6> - Enter the new box ID here. This value must be between 1 and 6.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure box ID of box 1 to be auto:
DGS-3120-24TC:admin#config box_id current_box_id 1 new_box_id auto
Command: config box_id current_box_id 1 new_box_id auto
Success.
DGS-3120-24TC:admin#
Message 1:
Stack Topology Status: Topology will change from Chain to Ring after n seconds.
When this message is shown, it means the topology change is detected; the topology change
process will take place after the count down timer reaches 0. If topology change is detected again
before the count down timer reaches 0, the count down timer will be reset.
960
Message 2:
Stack Topology Status: New device is detected; hot insert may happen after n seconds.
When this message is shown, it means hot insert of new device is detected. The stack system will
do the hot insert action after the timer reaches 0. If topology change is detected again before the
count down timer reaches 0, the count down timer will be reset. It is suggested for the user not to
do any command regarding read /write of flash, for example:”download firmware”,”save”,”show
config in flash”,”upload”,”copy”,”show slave’s dangerous log”.
Message 3:
Stack Topology Status: Configuring the new device.
When this message is shown, it means stacking has started to do the hot insert action. Now the
system is configuring the new device, and the user can not execute any command except “show
stack_ information”.
If no message shown means the topology is stable and the system operation is normally.
Format
show stack_information
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To display the stack information:
961
DGS-3120-24TC:admin#show stack_information
Command: show stack_information
Topology : Duplex_Chain
My Box ID : 1
Master ID : 1
Box Count : 1
DGS-3120-24TC:admin#
Format
show stack_device
Parameters
None.
Restrictions
None.
Example
To display the stack information:
962
DGS-3120-24TC:admin#show stack_device
Command: show stack_device
DGS-3120-24TC:admin#
Format
config stacking_mode [disable | enable]
Parameters
stacking_mode - Enable or disable the Switch’s stacking capability.
enable - Specify that the Switch's stacking capabilty will be enabled.
disable - Specify that the Switch's stacking capabilty will be disabled.
Restrictions
Only Administrator level can issue this command.
Example
To enable stacking mode:
DGS-3120-24TC:admin# config stacking_mode enable
Command: config stacking_mode enable
Change Box stacking_mode may cause devices work restart, still continue?(y/n)
y
Please wait, the switch is rebooting...
Format
show stacking_mode
963
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To display stacking mode:
DGS-3120-24TC:admin# show stacking_mode
Command: show stacking_mode
DGS-3120-24TC:admin#
Format
config stacking force_master_role state [enable | disable]
Parameters
force_master_role - Enable or disable the Switch’s Stacking Force Master Role state. Default
setting is disabled.
enable - Specify that switch's stacking force master role will be enabled.
disable - Specify that switch's stacking force master role will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable stacking force master role state:
964
Success.
DGS-3120-24TC:admin#
Format
config stacking trap state [enable | disable]
Parameters
enable - Enable the Switch’s stacking trap.
disable - Disable the Switch’s stacking trap.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the stacking trap state:
DGS-3120-24TC:admin#config stacking trap state enable
Command: config stacking trap state enable
Success.
DGS-3120-24TC:admin#
Format
config stacking log state [enable | disable]
Parameters
enable - Enable the Switch’s stacking log.
disable - Disable the Switch’s stacking log.
965
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the stacking log state:
DGS-3120-24TC:admin#config stacking log state enable
Command: config stacking log state enable
Success.
DGS-3120-24TC:admin#
966
Format
create ipmroute <network_address> rpf_address [<ipaddr> | null]
Parameters
<network_address> - Specify the network address of the static multicast route entry that is
created on the Switch.If the source IP address of the received IP multicast packet matches the
network of a static multicast route entry, the static multicast route entry will be used to do RPF
check by IP multicast route protocol.
rpf_address - Specify the RPF address of the static multicast route entry that is created on the
Switch.If the source IP address of the received IP multicast packet matches the network of a
static multicast route entry, the RPF address of the static multicast route entry will be used to
check whether the IP multicast packet is received from legal upstream interface.
<ipaddr> - Enter the RPF address.
null - If set the RPF address of a static multicast route entry to null, the RPF checks whether
the source IP address of IP multicast packets matches this static multicast route entry. If
matches, it will be always failed.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static multicast route entry:
DGS-3120-24TC:admin#create ipmroute 11.0.0.0/8 rpf_address 20.1.1.1
Command: create ipmroute 11.0.0.0/8 rpf_address 20.1.1.1
Success.
DGS-3120-24TC:admin#
967
Format
delete ipmroute [<network_address> | all]
Parameters
<network_address> - Specify the network address of the static multicast route entry.
all - Specify to delete all static multicast route entries.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a static multicast route entry:
DGS-3120-24TC:admin#delete ipmroute 11.0.0.0/8
Command: delete ipmroute 11.0.0.0/8
Success.
DGS-3120-24TC:admin#
Format
show ipmroute {<network_address>}
Parameters
<network_address> - (Optional) Specify the network address of the static multicast route entry.
Restrictions
None.
Example
To display all static multicast route entries:
968
DGS-3120-24TC:admin#show ipmroute
Command: show ipmroute
Total Entries : 1
DGS-3120-24TC:admin#
969
Format
config syslog source_ipif [<ipif_name 12> {<ipaddr> | <ipv6addr>} | none]
Parameters
ipif - Specify the IP interface name. If only specify this parameter, the least IPv4 address and the
smallest IPv6 address of ipif_name will be used as source IP addresses.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
<ipaddr> - (Optional) Enter the IP address used for the configuration here.
<ipv6addr> - (Optional) Enter the IPv6 address used for the configuration here.
none - Specify to clear the configured source IP interface.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Configure syslog source IP interface:
DGS-3120-24TC:admin# config syslog source_ipif ipif3 14.0.0.5
Command: config syslog source_ipif add ipif3 14.0.0.5
Success
DGS-3120-24TC:admin#
970
Success
DGS-3120-24TC:admin#
Format
show syslog source_ipif
Parameters
None.
Restrictions
None.
Example
Show syslog source IP interface:
DGS-3120-24TC:admin#show syslog source_ipif
Command: show syslog source_ipif
IP Interface : ipif3
IPv4 Address : 14.0.0.5
IPv6 Address : None
DGS-3120-24TC:admin#
Format
config trap source_ipif [<ipif_name 12> {<ipaddr> | <ipv6addr> } | none]
971
Parameters
ipif - Specify the IP interface name. If only specify this parameter, the least IPv4 address and the
smallest IPv6 address of ipif_name will be used as source IP addresses.
<ipif_name 12> - Enter the IP interface name here. This name can be up to 12 characters
long.
<ipaddr> - (Optional) Enter the IP address used for the configuration here.
<ipv6addr> - (Optional) Enter the IPv6 address used for the configuration here.
none - Specify to clear the configured source IP interface.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Configure trap source IP interface:
DGS-3120-24TC:admin# config trap source_ipif System
Command: config trap source_ipif System
Success
DGS-3120-24TC:admin#
Success
DGS-3120-24TC:admin#
Format
show trap source_ipif
Parameters
None.
Restrictions
None.
972
Example
Show trap source IP interface:
DGS-3120-24TC:admin# show trap source_ip
Command: show trap source_ip
IP Interface : System
IPv4 Address : None
DGS-3120-24TC:admin#
973
Format
clear log
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To clear the Switch’s history log:
974
Success.
DGS-3120-24TC:admin#
Format
show log {[index <value_list> | severity {module <module_list>} {emergency | alert | critical |
error | warning | notice | informational | debug | <level_list 0-7>} | module<module_list>]}
Parameters
index - (Optional) The show log command will display the history log between the log number of
X and Y. For example, showing log index 1-5 will display the history log from 1 to 5.
<value_list> - Enter the index value here.
severity - (Optional) Specify the severity level used.
module - (Optional) Specify the modules which are to be displayed. The module can be obtained
by using the show log_support_module command. Use a comma to separate multiple
modules.
<module_list> - Enter the module list value here.
emergency - (Optional) Severity level 0
alert - (Optional) Severity level 1
critical - (Optional) Severity level 2
error - (Optional) Severity level 3
warning - (Optional) Severity level 4
notice - (Optional) Severity level 5
informational - (Optional) Severity level 6
debug - (Optional) Severity level 7
<level_list 0-7> - Specify a list of severity level which is to be displayed. If there is more than
one severity level, please separate them by comma. The level number is from 0 to 7.
module - (Optional) Specify the modules which are to be displayed. The module can be obtained
by using the show log_support_module command. Use a comma to separate multiple
modules.
<module_list> - Enter the module list value here.
If no parameter is specified, all history log entries will be displayed.
Restrictions
None.
Example
To display the Switch’s history log:
975
DGS-3120-24TC:admin#
Format
show log_software_module
Parameters
None.
Restrictions
None.
Example
To display the protocols or applications that support the enhanced log:
DGS-3120-24TC:admin#show log_software_module
Command: show log_software_module
DGS-3120-24TC:admin#
976
Format
enable syslog
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the sending of syslog messages:
DGS-3120-24TC:admin# enable syslog
Command: enable syslog
Success.
DGS-3120-24TC:admin#
Format
disable syslog
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the sending of syslog messages:
DGS-3120-24TC:admin# disable syslog
Command: disable syslog
Success.
DGS-3120-24TC:admin#
977
Format
show syslog
Parameters
None.
Restrictions
None.
Example
To display the syslog protocol global state:
DGS-3120-24TC:admin# show syslog
Command: show syslog
DGS-3120-24TC:admin#
Format
create syslog host <index 1-4> ipaddress [<ipaddr> | <ipv6addr>] {severity [emergency |
alert | critical | error | warning | notice | informational | debug | <level 0-7>] | facility [local0 |
local1 | local2 | local3 | local4 | local5 | local6 | local7] | udp_port <udp_port_number> | state
[enable | disable]}
Parameters
<index> - Enter the host index value here.
all - Specify that all the host indexes will be used.
ipaddress - Specify the IP or IPv6 address for the host.
<ipaddr> - Specify the IP address for the host.
<ipv6addr> - Specify the IPv6 address for the host.
severity - (Optional) Specify the severity level.
978
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
Adds a new syslog host:
DGS-3120-24TC:admin#create syslog host 1 ipaddress 10.90.90.1 severity debug
facility local0
Command: create syslog host 1 ipaddress 10.90.90.1 severity debug facility
local0
Success.
DGS-3120-24TC:admin#
979
Format
config syslog host [<index 1-4> | all] {severity [emergency | alert | critical | error | warning |
notice | informational | debug| <level 0-7>] | facility [local0 | local1 | local2 | local3 | local4 |
local5 | local6 | local7] | udp_port <udp_port_number> | ipaddress [<ipaddr> | <ipv6addr>] |
state [enable | disable]}
Parameters
<index 1-4> - Enter the host index value here.
all - Specify that all the host indexes will be used.
severity - (Optional) Specify the severity level.
emergency - Severity level 0
alert - Severity level 1
critical - Severity level 2
error - Severity level 3
warning - Severity level 4
notice - Severity level 5
informational - Severity level 6
debug - Severity level 7
<level 0-7> - Enter the severity level value here. This value must be between 0 and 7.
facility - (Optional) Some of the operating system daemons and processes have been assigned
Facility values. Processes and daemons that have not been explicitly assigned a Facility may
use any of the "local use" facilities or they may use the "user-level" Facility. Those Facilities
that have been designated are shown below. This facility setting will be put in the syslog
packet when it is sent to a specific syslog server.
local0 - Specify that the user-defined facility will be set to local 0.
local1 - Specify that the user-defined facility will be set to local 1.
local2 - Specify that the user-defined facility will be set to local 2.
local3 - Specify that the user-defined facility will be set to local 3.
local4 - Specify that the user-defined facility will be set to local 4.
local5 - Specify that the user-defined facility will be set to local 5.
local6 - Specify that the user-defined facility will be set to local 6.
local7 - Specify that the user-defined facility will be set to local 7.
udp_port - (Optional) Specify the UDP port number.
<udp_port_number> - Enter the UDP port number used here.
ipaddress - (Optional) Specify IP address for the host.
<ipaddr> - Enter the IP address used for the configuration here.
<ipv6addr> - Enter the IPv6 address used for the configuration here.
state - (Optional) The syslog protocol is used for the transmission of event notification messages
across networks to a host. The option enables or disables the host to receive such messages.
enable - Specify that the host to receive such messages will be enabled.
disable - Specify that the host to receive such messages will be disabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the syslog host configuration:
980
Success.
DGS-3120-24TC:admin#
Format
delete syslog host [<index 1-4> | all]
Parameters
host - The host index or all hosts.
<index> - Enter the host index value here.
all - Specify that all the host indexes will be used.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete the specific syslog host:
DGS-3120-24TC:admin# delete syslog host 4
Command: delete syslog host 4
Success.
DGS-3120-24TC:admin#
Format
show syslog host {<index 1-4>}
Parameters
host - The host index or all hosts.
<index> - (Optional) Enter the host index value here.
981
Restrictions
None.
Example
To show the syslog host information:
DGS-3120-24TC:admin#show syslog host
Command: show syslog host
Host 1
IP Address : 10.90.90.1
Severity : Debug(7)
Facility : Local0
UDP Port : 514
Status : Disabled
Total Entries : 1
DGS-3120-24TC:admin#
Format
config log_save_timing [time_interval <min 1-65535> | on_demand | log_trigger]
Parameters
time_interval - Save log to flash every xxx minutes. (If no new log events occur in this period,
don't save.)
<min 1-65535> - Enter the time interval value here. This value must be between 1 and 65535
minutes.
on_demand - Save log to flash whenever the user enters the "save log" or "save all" command.
The default setting is on_demand.
log_trigger - Save log to flash whenever a new log event arrives.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the method for saving a log as on demand:
982
Success.
DGS-3120-24TC:admin#
Format
show log_save_timing
Parameters
None.
Restrictions
None.
Example
To show the timing method used for saving the log:
DGS-3120-24TC:admin#show log_save_timing
Command: show log_save_timing
DGS-3120-24TC:admin#
Format
show attack_log {unit <unit_id 1-12} {index <value_list>}
983
Parameters
unit - (Optional) The attack log messages on the specified unit will be displayed. If unit ID is not
specified, then it will be referred to as the master unit.
<unit_id 1-12> - Enter the unit ID value here. This value must be between 1 and n.
index - (Optional) The list of index numbers of the entries that need to be displayed. For
example, show attack_log index 1-5 will display the attack log messages from 1 to 5.
<value_list> - Enter the index numbers of the entries that needs to be displayed here.
If no parameter is specified, all entries in the attack log will be displayed.
Restrictions
None.
Example
To show dangerous messages on the master:
DGS-3120-24TC:admin# show attack_log index 1
Command: show attack_log index 1
DGS-3120-24TC:admin#
Format
clear attack_log {unit <unit_id 1-12> | all}
Parameters
unit - (Optional) The attack log messages on the specified unit will be cleared. If not specified, it
will be referred to as the master unit.
<unit_id 1-12> - Enter the unit ID number here.
all - Specify that all the unit ID's information will be used.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To clear the master’s attack log:
984
Success.
DGS-3120-24TC:admin#
985
Format
config system_severity [trap | log | all] [emergency | alert| critical | error | warning | notice |
information | debug | <level 0-7>]
Parameters
trap - Specify the severity level control for traps.
log - Specify the severity level control for the log.
all - Specify the severity level control for traps and the log.
emergency - Severity level 0.
alert - Severity level 1.
critical - Severity level 2.
error - Severity level 3.
warning - Severity level 4.
notice - Severity level 5.
information - Severity level 6.
debug - Severity level 7.
<level 0-7> - Enter the severity level here. This value must be between 0 and 7.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure severity level control as information level for trap:
DGS-3120-24TC:admin#config system_severity trap warning
Command: config system_severity trap warning
Success.
DGS-3120-24TC:admin#
986
Format
show system_severity
Parameters
None.
Restrictions
None.
Example
To show severity level control for system:
DGS-3120-24TC:admin#show system_severity
Command: show system_severity
DGS-3120-24TC:admin#
987
105-1 telnet
Description
This command is used to start the telnet client to connect to the specific telnet server. The
parameters specified by the command will only be used for the establishment of this specific
session. They will not affect the establishment of other sessions.
Format
telnet [<ipaddr> | <ipv6addr>] {tcp_port <value 1-65535>}
Parameters
<ipaddr> - The IP address of the telnet server.
<ipv6addr> - The IPv6 address of the telnet server.
tcp_port - (Optional) Specify the telnet server port number to be connected. If not specified, the
default port is 23.
<value 1-65535> - Enter the TCP port number used here. This value must be between 1 and
65535.
Restrictions
None.
Example
Telnet to a Switch by specifying the IP address:
DGS-3120-24TC:admin# telnet 10.90.90.90
Command: telnet 10.90.90.90
988
106-1 download
Description
This command is used to download the firmware image and configuration from TFTP server.
Format
download [firmware_fromTFTP [<ipaddr> | <ipv6addr>] src_file <path_filename 64> {[unit
<unit_id> | all]} {dest_file <pathname>} {boot_up} | cfg_fromTFTP [<ipaddr> | <ipv6addr>]
src_file <path_filename 64> {[unit <unit_id> | all]} {[increment | dest_file <pathname>]}]
Parameters
firmware_fromTFTP – Specify to download firmware from a TFTP server.
<ipaddr> - (Optional) The IP address of the TFTP server.
<ipv6addr> - (Optional) The IPv6 address of the TFTP server.
src_file - (Optional) Used to identify the parameter “path_filename”.
<path_filename 64> - Enter the source file path name here. This name can be up to 64
characters long.
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to the
master unit.
<unit_id> - Enter the unit ID value here. This value must be between 1 and n.
all - When all is specified, the firmware image on all units will be updated.
dest_file - (Optional) Used to identify the parameter “path_filename”.
<pathname> - Enter the destination file path name here.
boot_up - (Optional) Specify as boot up file.
cfg_fromTFTP – Specify to download a configuration file from a TFTP server.
<ipaddr> - (Optional) The IP address of the TFTP server.
<ipv6addr> - (Optional) The IPv6 address of the TFTP server.
src_file - (Optional) Used to identify the parameter “path_filename”.
<path_filename 64> - The pathname specifies the pathname on the TFTP server. It can
be a relative pathname or an absolute pathname. This name can be up to 64 characters
long.
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to the
master unit.
<unit_id> - Enter the unit ID value here. This value must be between 1 and n.
all - (Optional) When all is specified, the firmware image on all units will be updated.
increment - (Optional) This is only required for system which does not have file system and
only support one configuration file since the download of a configuration will automatically
989
apply the setting to the system. If increment is specified, the existing configuration will not
be cleared before applying to the new configuration. If it is not specified, the existing
configuration will be cleared before applying to the new configuration.
dest_file - (Optional) Used to identify the parameter “path_filename”.
<pathname>- The pathname specifies an absolute pathname on the device file system. If
pathname is not specified, it refers to the boot_up configuration file.
Restrictions
Only Administrator-level users can issue this command.
Example
To download firmware from TFTP:
DGS-3120-24TC:admin# download firmware_fromTFTP 10.54.71.1 src_file px.had
Command: download firmware_fromTFTP 10.54.71.1 src_file px.had
DGS-3120-24TC:admin#
DGS-3120-24TC:admin#
106-2 upload
Description
This command is used to upload firmware and configuration from device to TFTP server.
Format
upload [cfg_toTFTP [<ipaddr> | <ipv6addr>] dest_file <path_filename 64> {unit <unit_id>}
{src_file <pathname>} {[include | exclude | begin] <filter_string 80> {<filter_string 80>
{<filter_string 80>}} {[include | exclude | begin] <filter_string 80> {<filter_string 80>
{<filter_string 80>}} {[include | exclude | begin ] <filter_string 80> {<filter_string 80>
{<filter_string 80>}}}}} | log_toTFTP [<ipaddr> | <ipv6addr>] dest_file <path_filename 64> |
attack_log_toTFTP [<ipaddr> | <ipv6addr>] dest_file <path_filename 64> {unit <unit_id>} |
firmware_toTFTP [<ipaddr> | <ipv6addr>] dest_file <path_filename 64> {unit <unit_id>}
{src_file <pathname>}]
990
Parameters
cfg_toTFTP – Specify that the configuration file will be uploaded to the TFTP server.
<ipaddr> - The IP address of the TFTP server.
<ipv6addr> - The IPv6 address of the TFTP server.
dest_file - Used to identify the parameter “path_filename”.
<path_filename 64> - The pathname specifies the pathname on the TFTP server. It can
be a relative pathname or an absolute pathname. This name can be up to 64 characters
long.
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to the
master unit.
<unit_id> - Enter the stacking system unit ID here.
src_file - (Optional) Used to identify the parameter “path_filename”.
<pathname> - The pathname specifies an absolute pathname on the device file system. If
pathname is not specified, it refers to the boot_up CFG file.
include - (Optional) Specify to include lines that contain the specified filter string.
exclude - (Optional) Specify to exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol. Thus, the filter string itself cannot
contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string itself
cannot contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string
itself cannot contain the character. The filter string is case sensitive. This string can be
up to 80 characters long.
include - (Optional) Specify to include lines that contain the specified filter string.
exclude - (Optional) Specify to exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol. Thus, the filter string itself cannot
contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string itself
cannot contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string
itself cannot contain the character. The filter string is case sensitive. This string can be
up to 80 characters long.
include - (Optional) Specify to include lines that contain the specified filter string.
exclude - (Optional) Specify to exclude lines that contain the specified filter string.
begin - (Optional) The first line that contains the specified filter string will be the first line of the
output.
<filter_string 80> - A filter string is enclosed by symbol. Thus, the filter string itself cannot
contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string itself
cannot contain the character. The filter string is case sensitive. This string can be up to 80
characters long.
<filter_string 80> - (Optional) A filter string is enclosed by symbol. Thus, the filter string
itself cannot contain the character. The filter string is case sensitive. This string can be
up to 80 characters long.
log_toTFTP - Specify to upload a log file from device to TFTP server.
<ipaddr> - The IP address of the TFTP server.
<ipv6addr> - The IPv6 address of the TFTP server.
dest_file - Used to identify the parameter “path_filename”.
<path_filename 64> - The pathname specifies the pathname on the TFTP server. It can
be a relative pathname or an absolute pathname. This name can be up to 64 characters
991
long.
attack_log_toTFTP – Specify that the attack log will be uploaded to the TFTP server.
<ipaddr> - The IP address of the TFTP server.
<ipv6addr> - The IPv6 address of the TFTP server.
dest_file - Used to identify the parameter “path_filename”.
<path_filename 64> - Specify the path name on the TFTP server to hold the attack log.
This name can be up to 64 characters long.
unit - (Optional) The attack log messages on the specified unit will be uploaded to the
TFTP server. If it is not specified, it refers to the master unit.
<unit_id> - Enter the unit ID.
firmware_toTFTP – Specify that the firmware file will be uploaded to the TFTP server.
<ipaddr> - The IP address of the TFTP server.
<ipv6addr> - The IPv6 address of the TFTP server.
dest_file - Used to identify the parameter “path_filename”.
<path_filename 64> - The pathname specifies the pathname on the TFTP server. It
can be a relative pathname or an absolute pathname. This name can be up to 64
characters long.
unit - (Optional) Specify which unit on the stacking system. If it is not specified, it refers to
the master unit.
<unit_id> - Enter the unit ID value.
src_file - (Optional) Used to identify the parameter “path_filename”.
<pathname> - The pathname specifies an absolute pathname on the device file
system. If pathname is not specified, it refers to the boot_up image. This name can
be up to 64 characters long.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To upload firmware from a file system device to a TFTP server:
DGS-3120-24TC:admin# upload firmware_toTFTP 10.1.1.1 dest_file D:/firmware.had
src_file 100b70.had
Command: upload firmware_toTFTP 10.1.1.1 dest_file D:/firmware.had src_file
100b70.had
DGS-3120-24TC:admin#
No such file.
Failure!
DGS-3120-24TC:admin#
992
DGS-3120-24TC:admin#
No such file.
Failure!
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
993
Format
config sntp {primary <ipaddr> | secondary <ipaddr> | poll-interval <int 30-99999>}
Parameters
primary - (Optional) SNTP primary server IP address.
<ipaddr> - Enter the IP address used for this configuration here.
secondary - (Optional) SNTP secondary server IP address.
<ipaddr> - Enter the IP address used for this configuration here.
poll-interval - (Optional) Specify the polling interval range seconds.
<int 30-99999> - Enter the polling interval range here. This value must be between 30 and
99999 seconds.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure SNTP:
994
Success.
DGS-3120-24TC:admin#
Format
cconfig sntp ipv6server {primary <ipv6addr> | secondary <ipv6addr>}(1)
Parameters
primary - (Optional) SNTP primary server IPv6 address.
<ipaddr> - Enter the IP address used for this configuration here.
secondary - (Optional) SNTP secondary server IPv6 address.
<ipaddr> - Enter the IP address used for this configuration here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure SNTP:
DGS-3120-24TC:admin#config sntp ipv6server primary 1000::1 secondary 1000::2
Command: config sntp ipv6server primary 1000::1 secondary 1000::2
Success.
DGS-3120-24TC:admin#
Format
show sntp
995
Parameters
None.
Restrictions
None.
Example
To show SNTP:
DGS-3120-24TC:admin#show sntp
Command: show sntp
DGS-3120-24TC:admin#
Format
enable sntp
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable SNTP:
996
Success.
DGS-3120-24TC:admin#
Format
disable sntp
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable SNTP:
DGS-3120-24TC:admin# disable sntp
Command: disable sntp
Success.
DGS-3120-24TC:admin#
Format
config time <date ddmthyyyy> <time hh:mm:ss>
Parameters
<date ddmthyyyy> - Specify the system clock date. An example would look like this:
'30jun2010'.
<time hh:mm:ss> - Specify the system clock time. An example would look like this: '12:00:00'.
997
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure time:
DGS-3120-24TC:admin# config time 30jun2003 16:30:30
Command: config time 30jun2003 16:30:30
Success.
DGS-3120-24TC:admin#
Format
config time_zone {operator [+ | -] | hour <gmt_hour 0-13> | min <minute 0-59>}
Parameters
operator - (Optional) Specify the operator of time zone.
[+ | -] - Specify that time should be added or subtracted to or from the GMT.
hour - (Optional) Specify the hour of time zone.
<gmt_hour 0-13> - Enter the hour value of the time zone here. This value must be between 0
and 13.
min - (Optional) Specify the minute of time zone.
<minute 0-59> - Enter the minute value of the time zone here. This value must be between 0
and 59.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure time_zone:
DGS-3120-24TC:admin# config time_zone operator + hour 2 min 30
Command: config time_zone operator + hour 2 min 30
Success.
DGS-3120-24TC:admin#
998
Format
config dst [disable | repeating {s_week <start_week 1-4,last> | s_day <start_day sun-sat> |
s_mth <start_mth 1-12> | s_time <start_time hh:mm> | e_week <end_week 1-4,last> | e_day
<end_day sun-sat> | e_mth <end_mth 1-12> | e_time <end_time hh:mm> | offset [30 | 60 | 90
| 120]} | annual {s_date <start_date 1-31> | s_mth <start_mth 1-12> | s_time <start_time
hh:mm> | e_date <end_date 1-31> | e_mth <end_mth 1-12> | e_time <end_time hh:mm> |
offset [30 | 60 | 90 | 120]}]
Parameters
disable - Disable the Daylight Saving Time of the Switch.
repeating - Set the Daylight Saving Time to repeating mode.
s_week, e_week - (Optional) Configure the start /end week number of Daylight Saving Time.
<start_week 1-4, last> - Enter the starting week number of Daylight Saving Time here.
This value must be between 1 and 4.
<end_week 1-4, last> - Enter the ending week number of Daylight Saving Time here. This
value must be between 1 and 4.
s_day, e_day - (Optional) Configure the start /end day number of Daylight Saving Time.
<start_day sun-sat> - Enter the starting day value of Daylight Saving Time here. This
value must either be sun, mon, tue, wed, thu, fri or sat.
<end_day sun-sat> - Enter the ending day value of Daylight Saving Time here. This value
must either be sun, mon, tue, wed, thu, fri or sat.
s_mth, e_mth - (Optional) Configure the start /end month number of Daylight Saving Time.
<start_mth 1-12> - Enter the starting month number of Daylight Saving Time here. This
value must be between 1 and 12.
<end_mth 1-12> - Enter the ending month number of Daylight Saving Time here. This
value must be between 1 and 12.
s_time, e_time - (Optional) Configure the start /end time of Daylight Saving Time.
<start_time hh:mm> - Enter the starting time of Daylight Saving Time here. This value
must be in the hh:mm format.
<end_time hh:mm> - Enter the starting time of Daylight Saving Time here. This value
must be in the hh:mm format.
offset - (Optional) Indicates number of minutes to add or to subtract during summertime. The
ranges of offset are 30, 60, 90,120. The default value is 60.
30 - Specify that the offset range will 30 minutes.
60 - Specify that the offset range will 60 minutes.
90 - Specify that the offset range will 90 minutes.
120 - Specify that the offset range will 120 minutes.
annual - Set the Daylight Saving Time to annual mode.
s_date, e_date - (Optional) Configure the start /end date of Daylight Saving Time.
<start_date 1-31> - Enter the starting date of Daylight Saving Time here. This range must
be between 1 an 31.
<end_date 1-31> - Enter the ending date of Daylight Saving Time here. This range must
be between 1 an 31.
s_mth, e_mth - (Optional) Configure the start /end month number of Daylight Saving Time.
<start_mth 1-12> - Enter the starting month number of Daylight Saving Time here. This
value must be between 1 and 12.
<end_mth 1-12> - Enter the ending month number of Daylight Saving Time here. This
value must be between 1 and 12.
s_time, e_time - (Optional) Configure the start /end time of Daylight Saving Time.
999
<start_time hh:mm> - Enter the starting time of Daylight Saving Time here. This value
must be in the hh:mm format.
<end_time hh:mm> - Enter the starting time of Daylight Saving Time here. This value
must be in the hh:mm format.
offset - (Optional) Indicates number of minutes to add or to subtract during summertime. The
ranges of offset are 30, 60, 90,120; default value is 60.
30 - Specify that the offset range will 30 minutes.
60 - Specify that the offset range will 60 minutes.
90 - Specify that the offset range will 90 minutes.
120 - Specify that the offset range will 120 minutes.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure time:
DGS-3120-24TC:admin# config dst repeating s_week 2 s_day tue s_mth 4 s_time
15:00 e_week
2 e_day wed e_mth 10 e_time 15:30 offset 30
Command: config dst repeating s_week 2 s_day tue s_mth 4 s_time 15:00 e_week 2
e
_day wed e_mth 10 e_time 15:30 offset 30
Success.
DGS-3120-24TC:admin#
Format
show time
Parameters
None.
Restrictions
None.
Example
To show time:
1000
DGS-3120-24TC:admin#show time
Command: show time
DGS-3120-24TC:admin#
1001
108-1 traceroute
Description
This command is used to trace the routed path between the Switch and a destination end station.
Format
traceroute <ipaddr> {ttl <value 1-60> | port <value 30000-64900> | timeout <sec 1-65535> |
probe <value 1-9>}
Parameters
<ipaddr> - Specify the IP address of the destination end station.
ttl - (Optional) The time to live value of the trace route request. This is the maximum number of
routers that a trace route packet can pass. The traceroute command will cross while seeking
the network path between two devices. The range for the TTL is 1 to 60 hops.
<value 1-60> - Enter the time to live value here. This value must be between 1 and 60.
port - (Optional) The port number. The value range is from 30000 to 64900.
<value 30000-64900> - Enter the port number here. This value must be between 30000 and
64900.
timeout - (Optional) Defines the timeout period while waiting for a response from the remote
device. A value of 1 to 65535 seconds can be specified. The default is 5 seconds.
<sec 1-65535> - Enter the timeout period value here. This value must be between 1 and
65535 seconds.
probe - (Optional) The number of probing. The range is from 1 to 9. If unspecified, the default
value is 1.
<value 1-9> - Enter the probing number value here. This value must be between 1 and 9.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Trace the routed path between the Switch and 10.48.74.121:
1002
Trace complete.
DGS-3120-24TC:admin#
108-2 traceroute6
Description
This command is used to trace the IPv6 routed path between the Switch and a destination end
station.
Format
traceroute6 <ipv6addr> {ttl <value 1-60> | port <value 30000-64900> | timeout <sec 1-65535>
| probe <value 1-9>}
Parameters
<ipv6addr> - Specify the IPv6 address of the destination end station.
ttl - (Optional) The time to live value of the trace route request. This is the maximum number of
routers that a trace route packet can pass. The traceroute command will cross while seeking
the network path between two devices. The range for the TTL is 1 to 60 hops.
<value 1-60> - Enter the time to live value here. This value must be between 1 and 60.
port - (Optional) The port number. The value range is from 30000 to 64900.
<value 30000-64900> - Enter the port number here. This value must be between 30000 and
64900.
timeout - (Optional) Defines the timeout period while waiting for a response from the remote
device. A value of 1 to 65535 seconds can be specified. The default is 5 seconds.
<sec 1-65535> - Enter the timeout period value here. This value must be between 1 and
65535 seconds.
probe - (Optional) The number of probing. The range is from 1 to 9. If unspecified, the default
value is 1.
<value 1-9> - Enter the probing number value here. This value must be between 1 and 9.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
Trace the IPv6 routed path between the Switch and 3000::1:
1003
Trace complete.
DGS-3120-24TC:admin#
Trace the IPv6 routed path between the Switch and 1210:100::11 with port 40000:
DGS-3120-24TC:admin# traceroute6 1210:100::11 port 40000
Command: traceroute6 1210:100::11 port 40000
Trace complete.
DGS-3120-24TC:admin#
1004
Format
config traffic control [<portlist> | all] {broadcast [enable | disable] | multicast [enable |
disable] | unicast [enable | disable] | action [drop | shutdown] | [threshold <value 0-
1488100> | {broadcast_threshold <value 0-1488100> | multicast_threshold <value 0-
1488100> | unicast_threshold <value 0-1488100>}] | countdown [<min 0> | <min3-30> |
disable] | time_interval <sec 5-600>}
Parameters
<portlist> - Used to specify a range of ports to be configured.
all - Specify that all the ports will be used for this configuration.
broadcast - (Optional) Enable or disable broadcast storm control.
enable - Specify that broadcast storm control will be enabled.
disable - Specify that broadcast storm control will be disabled.
multicast - (Optional) Enable or disable multicast storm control.
enable - Specify that multicast storm control will be enabled.
disable - Specify that multicast storm control will be disabled.
unicast - (Optional) Enable or disable unknown packet storm control. ( Supported for drop mode
only)
enable - Specify that unicast storm control will be enabled.
disable - Specify that unicast storm control will be disabled.
action - (Optional) One of the two options for action is specified for storm control, shutdown or
drop mode. Shutdown mode is a function of software, drop mode is implemented by the chip.
If shutdown mode is specified, it is necessary to configure values for the countdown and
time_interval parameters.
drop - Specify that the action applied will be drop mode.
shutdown - Specify that the action applied will be shutdown mode.
threshold - (Optional) The upper threshold, at which point the specified storm control is
triggered. The <value> is the number of broadcast/multicast packets per second received by
1005
the Switch that will trigger the storm traffic control measure. The threshold is expressed as
PPS (packets per second) and must be an unsigned integer.
<value 0-1488100> - Enter the upper threshold value here. This value must be between 0 and
1488100.
broadcast_threshold - Specify the number of broadcast packets per second received by the
Switch that will trigger the storm traffic control measure.
<value 0-1488100> - Enter the value between 0-1488100.
multicast_threshold - Specify the number of multicast packets per second received by the
Switch that will trigger the storm traffic control measure.
<value 0-1488100> - Enter the value between 0-1488100.
unicast_threshold - Specify the number of unicast packets per second received by the Switch
that will trigger the storm traffic control measure.
<value 0-1488100> - Enter the value between 0-1488100.
countdown - (Optional) Timer for shutdown mode. If a port enters the shutdown Rx state and
this timer runs out, port will be shutdown forever. The parameter is not applicable if “drop”
(mode) is specified for the “action” parameter.
<min 0> - 0 disables the forever state, meaning that the port will not enter the shutdown
forever state.
<min 3-30> - Enter the countdown timer value here. This value must be between 3 and 30.
disable – Specify that the countdown timer will be disabled.
time_interval - (Optional) The sampling interval of received packet counts. The possible value
will be m-n seconds. The parameter is not applicable if “drop” (mode) is specified for the
“action” parameter.
<sec 5-600> - Enter the time interval value here. This value must be between 5 and 600.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the parameters so that the traffic control status is enabled on ports 1-12:
DGS-3120-24TC:admin# config traffic control 1:1-1:12 broadcast enable action
shutdown threshold 1 countdown 5 time_interval 10
Command: config traffic control 1:1-1:12 broadcast enable action shutdown
threshold 1 countdown 5 time_interval 10
Success.
DGS-3120-24TC:admin#
Format
config traffic trap [none | storm_occurred | storm_cleared | both]
1006
Parameters
none - No trap state is specified for storm control.
storm_occurred - Occurred mode is enabled and cleared mode is disabled.
storm_cleared - Occurred mode is disabled and cleared mode is enabled.
both - Both occurred and cleared modes are enabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable both the occurred mode and cleared mode traffic control traps:
DGS-3120-24TC:admin# config traffic trap both
Command: config traffic trap both
Success.
DGS-3120-24TC:admin#
Format
show traffic control {<portlist>}
Parameters
<portlist> - (Optional) Used to specify the range of ports to be shown.
If no parameter is specified, the system will display the packet storm control configuration for all
ports.
Restrictions
None.
Example
To display the traffic control parameters for ports 1 to 10:
1007
DGS-3120-24TC:admin#
Format
config traffic control log state [enable | disable]
Parameters
enable - Both occurred and cleared are logged.
1008
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the traffic log state on the Switch:
DGS-3120-24TC:admin# config traffic control log state enable
Command: config traffic control log state enable
Success.
DGS-3120-24TC:admin#
Format
config traffic control auto_recover_time [<min 0> | <min 1-65535>]
Parameters
auto_recover_time - The time allowed for auto recovery from shutdown for a port. The default
value is 0, so no auto recovery is possible; the port remains in shutdown forever mode. This
requires manual entry of the CLI command “config ports [ <portlist> | all ] state enable" to
return the port to a forwarding state. The default value is 0, which means disable auto recover
mode, shutdown forever.
<min 0> - Specify that the auto recovery time will be disabled.
<min 1-65535> - Enter the auto recovery time value here. This value must be between 1 and
65535.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the auto recover time to 5 minutes:
DGS-3120-24TC:admin# config traffic control auto_recover_time 5
Command: config traffic control auto_recover_time 5
Success.
DGS-3120-24TC:admin#
1009
1010
Format
config traffic_segmentation [<portlist> | all] forward_list [null | all | <portlist>]
Parameters
<portlist> - Specify a range of ports to be configured.
all - Specify that all the ports will be used for this configuration.
forward_list - Specify a range of port forwarding domain.
null - Specify a range of port forwarding domain is null.
all – Specify all ports to be configured.
<portlist> - Specify a range of ports to be configured.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure traffic segmentation:
DGS-3120-24TC:admin# config traffic_segmentation 1:1-1:10 forward_list 1:11-
1:15
Command: config traffic_segmentation 1:1-1:10 forward_list 1:11-1:15
Success.
DGS-3120-24TC:admin#
1011
Format
show traffic_segmentation {<portlist>}
Parameters
<portlist> - (Optional) Specify a range of ports to be displayed.
If no parameter is specified, the system will display all current traffic segmentation tables.
Restrictions
None.
Example
To display traffic segmentation table:
DGS-3120-24TC:admin# show traffic_segmentation 1:1-1:10
Command: show traffic_segmentation 1:1-1:10
DGS-3120-24TC:admin#
1012
Format
create trusted_host [<ipaddr> |<ipv6addr> | network <network_address> | ipv6_prefix
<ipv6networkaddr>] {snmp | telnet | ssh | http | https | ping}
Parameters
<ipaddr> - The IP address of the trusted host.
<ipv6addr> - The IPv6 address of the trusted host.
network - The network address of the trusted network. The form of network address is
xxx.xxx.xxx.xxx/y.
<network_address> - Enter the network address used here.
ipv6_prefix – Specify that IPv6 prefix here.
<ipv6networkaddr> - Enter the IPv6 network address here.
snmp - (Optional) Specify trusted host for SNMP.
telnet - (Optional) Specify trusted host for TELNET.
ssh - (Optional) Specify trusted host for SSH
http - (Optional) Specify trusted host for HTTP
https - (Optional) Specify trusted host for HTTPs.
ping - (Optional) Specify trusted host for PING
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To create the trusted host:
1013
Success.
DGS-3120-24TC:admin#
Format
delete trusted_host [ipaddr <ipaddr> | ipv6address <ipv6addr> | network
<network_address> | ipv6_prefix <ipv6networkaddr> | all]
Parameters
ipaddr - The IP address of the trusted host.
<ipaddr> - Enter the IP address used for this configuration here.
ipv6addr - The IPv6 address of the trusted host.
<ipv6addr> - Enter the IPv6 address used for this configuration here.
network - The network address of the trusted network.
<network_address> - Enter the network address used for this configuration here.
ipv6_prefix - The IPv6 subnet prefix of the trusted network.
<ipv6networkaddr> - Enter the IPv6 subnet prefix here.
all - All trusted hosts will be deleted.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To delete the trusted host:
DGS-3120-24TC:admin#delete trusted_host ipaddr 10.48.74.121
Command: delete trusted_host ipaddr 10.48.74.121
Success.
DGS-3120-24TC:admin#
1014
Format
config trusted_host [<ipaddr> | <ipv6addr> | network <network_address> | ipv6_prefix
<ipv6networkaddr>] [add | delete] {snmp | telnet | ssh | http | https | ping | all}
Parameters
<ipaddr> - The IP address of the trusted host.
<ipv6addr> - The IPv6 address of the trusted host.
network - The network address of the trusted network. The form of network address is
xxx.xxx.xxx.xxx/y.
<network_address> - Enter the network address used here.
ipv6_prefix - The IPv6 subnet prefix of the trusted network.
<ipv6networkaddr> - Enter the IPv6 subnet prefix here.
add - Add interfaces for that trusted host.
delete - Delete interfaces for that trusted host.
snmp - (Optional) Specify trusted host for SNMP.
telnet - (Optional) Specify trusted host for TELNET.
ssh - (Optional) Specify trusted host for SSH.
http - (Optional) Specify trusted host for HTTP.
https - (Optional) Specify trusted host for HTTPs.
ping - (Optional) Specify trusted host for PING.
all – (Optional) Specify trusted host for all application.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure the trusted host:
DGS-3120-24TC:admin# config trusted_host 10.48.74.121 add ssh telnet
Command: config trusted_host 10.48.74.121 add ssh telnet
Success.
DGS-3120-24TC:admin#
Format
show trusted_host
Parameters
None.
1015
Restrictions
None.
Example
To display trusted host:
DGS-3120-24TC:admin#show trusted_host
Command: show trusted_host
Management Stations
Total Entries: 1
DGS-3120-24TC:admin#
1016
Format
enable udp_helper
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the UDP helper function:
DGS-3120-24TC:admin#enable udp_helper
Command: enable udp_helper
Success.
DGS-3120-24TC:admin#
Format
disable udp_helper
1017
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the UDP helper function:
DGS-3120-24TC:admin#disable udp_helper
Command: disable udp_helper
Success.
DGS-3120-24TC:admin#
Format
config udp_helper udp_port add [time | tacacs | dns | tftp | netbios-ns | netbios-ds |
<port_number 0-65535>]
Parameters
time – Time service. The UDP port is 37.
tacacs - Terminal Access Controller Access Control System service. The UDP port number is 49.
dns - Domain Naming System. The UDP port number is 53.
tftp - Trivial File Transfer Protocol. The UDP port number is 69.
netbios-ns - NetBIOS Name Server. The UDP port number is 137.
netbios-ds - NetBIOS Datagram Server. The UDP port number is 138.
<port_number 0-65535> - Specify other UDP ports, except the port 67 and 68. These two ports
are reserved for DHCP function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a UDP port:
1018
Success.
DGS-3120-24TC:admin#
Format
config udp_helper udp_port delete [time | tacacs | dns | tftp | netbios-ns | netbios-ds |
<port_number 0-65535>]
Parameters
time – Time service. The UDP port is 37.
tacacs - Terminal Access Controller Access Control System service. The UDP port number is 49.
dns - Domain Naming System. The UDP port number is 53.
tftp - Trivial File Transfer Protocol. The UDP port number is 69.
netbios-ns - NetBIOS Name Server. The UDP port number is 137.
netbios-ds - NetBIOS Datagram Server. The UDP port number is 138.
<port_number 0-65535> - Specify other UDP ports, except the port 67 and 68. These two ports
are reserved for DHCP function.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a UDP port:
dmin#config udp_helper udp_port delete 55
Command: config udp_helper udp_port delete 55
Success.
DGS-3120-24TC:admin#
Format
config udp_helper add ipif <ipif_name 12> <ipaddr>
1019
Parameters
<ipif_name 12> - Enter the name of the IP interface that receives UDP broadcast.
<ipaddr> - Enter the UDP helper server IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a server address for System interface:
DGS-3120-24TC:admin#config udp_helper add ipif System 20.0.0.90
Command: config udp_helper add ipif System 20.0.0.90
Success.
DGS-3120-24TC:admin#
Format
config udp_helper delete ipif <ipif_name 12> <ipaddr>
Parameters
<ipif_name 12> - Enter the name of the IP interface that receives UDP broadcast.
<ipaddr> - Enter the UDP helper server IP address.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a server address for System interface:
DGS-3120-24TC:admin#config udp_helper delete ipif System 20.0.0.90
Command: config udp_helper delete ipif System 20.0.0.90
Success.
DGS-3120-24TC:admin#
1020
Format
show udp_helper {[udp_port | ipif <ipif_name 12>]}
Parameters
udp_port - (Optional) Specify the UDP port configured for the UDP helper.
ipif - (Optional)Specify the name of the IP interface to be configured for the UDP helper
<ipif_name 12> - Enter the name of the IP interface.
Restrictions
None.
Example
To display the current UDP Helper configuration:
DGS-3120-24TC:admin#show udp_helper
Command: show udp_helper
Interface Server
------------ ---------------
System 20.0.0.90
DGS-3120-24TC:admin#
1021
Format
enable vrrp {ping}
Parameters
ping - (Optional) Specify that the ping option will be enabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable VRRP:
DGS-3120-24TC:admin#enable vrrp
Command: enable vrrp
Success.
DGS-3120-24TC:admin#
1022
Format
disable vrrp {ping}
Parameters
ping - (Optional) Specify that the ping option will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable VRRP:
DGS-3120-24TC:admin#disable vrrp
Command: disable vrrp
Success.
DGS-3120-24TC:admin#
Format
create vrrp vrid <vrid 1-255> ipif <ipif_name 12> ipaddress <ipaddr> {state [enable | disable]
| priority <int 1-254> | advertisement_interval <int 1-255> | preempt [true | false] | critical_ip
<ipaddr> | critical_ip_state [enable | disable]}
Parameters
vrid - Specify the ID of the Virtual Router used.
<vrid 1-255> - Enter the Virtual Router ID used here. This value must be between 1 and 255.
ipif - Specify the IP interface used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
ipaddress - Specify the virtual router’s IP address used.
<ipaddr> - Enter the virtual router's IP address used here.
state - (Optional) Specify the state of the virtual router function.
enable - Specify that the virtual router function will be enabled.
disable - Specify that the virtual router function will be disabled.
1023
priority - (Optional) Specify the priority to be used for the Virtual Router Master election process
<int 1-254> - Enter the priority value used here. This value must be between 1 and 254.
advertisement_interval - (Optional) Specify the time interval used between sending
advertisement messages.
<int 1-255> - Enter the advertisement interval value here. This value must be between 1 and
255 seconds.
preempt - (Optional) Controls whether a higher priority virtual router will preempt a lower priority
master. The preempt setting must be consistent with all the routers participating within the
same VRRP group. Default is settings is true.
true - Specify that if the backup router’s priority is set higher than the masters priority, it will
become the master instead of the current one.
false - Specify that if the backup router’s priority is higher than the masters priority, it will not
become the master until the master failed.
critical_ip - (Optional) Specify an IP address that will provide the most direct route to the Internet
or other critical network connections from this virtual router. This IP address must be a real IP
address of a real device on the network. If the connection from the virtual router to this IP
address fails, the virtual router will automatically be disabled. A new Master will be elected
from the backup routers participating in the VRRP group. Different critical IP addresses may
be assigned to different routers participating in the VRRP group and can therefore define
multiple routes to the Internet or other critical network connections.
<ipaddr> - Enter the critical interface's IP address used here.
critical_ip_state - (Optional) Specify the state of checking the status (active or inactive) of a
critical IP address.
enable - Specify that the critical IP state checking will be enabled.
disable - Specify that the critical IP state checking will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a VRRP entry:
DGS-3120-24TC:admin#create vrrp vrid 1 ipif System ipaddress 10.90.90.91 state
enable
Command: create vrrp vrid 1 ipif System ipaddress 10.90.90.91 state enable
Success.
DGS-3120-24TC:admin#
Format
config vrrp vrid <vrid 1-255> ipif <ipif_name 12> {state [enable | disable] | priority <int 1-
254> | ipaddress <ipaddr> | advertisement_interval <int 1-255> | preempt [true | false] |
critical_ip <ipaddr> | critical_ip_state [enable | disable]}
1024
Parameters
vrid - specifies the ID of the Virtual Router used.
<vrid 1-255> - Enter the Virtual Router ID used here. This value must be between 1 and 255.
ipif - Specify the IP interface used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
state - (Optional) Specify the state of the virtual router function.
enable - Specify that the virtual router function will be enabled.
disable - Specify that the virtual router function will be disabled.
priority - (Optional) specifies the priority to be used for the Virtual Router Master election process
<int 1-254> - Enter the priority value used here. This value must be between 1 and 254.
ipaddress - (Optional) Specify the virtual router’s IP address used.
<ipaddr> - Enter the virtual router's IP address used here.
advertisement_interval - (Optional) Specify the time interval used between sending
advertisement messages.
<int 1-255> - Enter the advertisement interval value here. This value must be between 1 and
255 seconds.
preempt - (Optional) Controls whether a higher priority virtual router will preempt a lower priority
master. The preempt setting must be consistent with all the routers participating within the
same VRRP group. Default is setting is true.
true - Specify that if the backup router’s priority is set higher than the masters priority, it will
become the master instead of the current one.
false - Specify if the backup router’s priority is higher than the masters priority, it will not
become the master until the master failed.
critical_ip - (Optional) specifies an IP address that will provide the most direct route to the
Internet or other critical network connections from this virtual router. This IP address must be a
real IP address of a real device on the network. If the connection from the virtual router to this
IP address fails, the virtual router will automatically be disabled. A new Master will be elected
from the backup routers participating in the VRRP group. Different critical IP addresses may
be assigned to different routers participating in the VRRP group and can therefore define
multiple routes to the Internet or other critical network connections.
<ipaddr> - Enter the critical interface's IP address used here.
critical_ip_state - (Optional) Specify the state of checking the status (active or inactive) of a
critical IP address.
enable - Specify that the critical IP state checking will be enabled.
disable - Specify that the critical IP state checking will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure VRRP:
DGS-3120-24TC:admin#config vrrp vrid 1 ipif System state enable
Command: config vrrp vrid 1 ipif System state enable
Success.
DGS-3120-24TC:admin#
Format
config vrrp ipif <ipif_name 12> [authtype [none | simple authdata <string 8> | ip authdata
<string 16>]]
Parameters
ipif - Specify the name of IP interface used for this configuration.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
characters long.
authtype - Specify the VRRP’s authentication type.
none - Specify that no authentication algorithm will be used on this interface.
simple - Specify that the authentication algorithm will be set to simple text on this interface.
authdata - Specify the authentication data used in the simple text authentication algorithm.
<string 8> - Enter the authentication data used in the simple text authentication
algorithm here. This value can be up to 8 characters long.
ip - Specify that the authentication algorithm will be set to IP authentication header on this
interface.
authdata - Specify the authentication data used in the IP authentication header algorithm.
<string 16> - Enter the authentication data used in the IP authentication header
algorithm here. This value can be up to 16 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure a VRRP IP interface:
DGS-3120-24TC:admin#config vrrp ipif System authtype simple authdata 12345678
Command: config vrrp ipif System authtype simple authdata 12345678
Success.
DGS-3120-24TC:admin#
Format
delete vrrp {vrid <vrid 1-255> ipif <ipif_name 12>}
Parameters
vrid - (Optional) Specify the Virtual Router ID used.
<vrid 1-255> - Enter the Virtual Router ID used here. This value must be between 1 and 255.
ipif - (Optional) Specify the IP interface name used.
<ipif_name 12> - Enter the IP interface name used here. This name can be up to 12
1026
characters long.
If no parameter is specified, all the VRRP entries will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete VRRP:
DGS-3120-24TC:admin#delete vrrp vrid 1 ipif System
Command: delete vrrp vrid 1 ipif System
Success.
DGS-3120-24TC:admin#
Format
show vrrp {ipif <ipif_name 12> {vrid <vrid 1-255>}}
Parameters
ipif - (Optional) Specify the IP interface name to be displayed.
<ipif_name 12> - Enter the IP interface name to be displayed here. This name can be up to
12 characters long.
vrid - (Optional) Specify the Virtual Router ID to be displayed.
<vrid 1-255> - Enter the Virtual Router ID to be displayed here. This value must be between 1
and 255.
If no parameter is specified, then all the VRRP entries will be displayed.
Restrictions
None.
Example
To display the VRRP configuration:
1027
DGS-3120-24TC:admin#show vrrp
Command: show vrrp
VRID : 1
Virtual IP Address : 10.90.90.91
Virtual MAC Address : 00-00-5E-00-01-01
Virtual Router State : Master
State : Enabled
Priority : 100
Master IP Address : 10.90.90.90
Critical IP Address : 0.0.0.0
Checking Critical IP : Disabled
Advertisement Interval : 1 Sec(s)
Preempt Mode : True
Virtual Router Up Time : 621430 centi-secs
Total Entries: 1
DGS-3120-24TC:admin#
1028
Format
enable vlan_trunk
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To enable the VLAN Trunk:
DGS-3120-24TC:admin# enable vlan_trunk
Command: enable vlan_trunk
Success.
DGS-3120-24TC:admin#
Format
disable vlan_trunk
1029
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To disable the VLAN Trunk:
DGS-3120-24TC:admin# disable vlan_trunk
Command: disable vlan_trunk
Success.
DGS-3120-24TC:admin#
A VLAN trunk port and a non-VLAN trunk port cannot be grouped as an aggregated link. To
change the VLAN trunk setting for an aggregated link, the user must apply the command to the
master port. However, this setting will disappear as the aggregated link is destroyed, and the
VLAN trunk setting of the individual port will follow the original setting of the port.
If the command is applied to link aggregation member port excluding the master, the command will
be rejected.
The ports with different VLAN configurations are not allowed to form an aggregated link. However,
if they are specified as VLAN trunk port, they are allowed to form an aggregated link.
For a VLAN trunk port, the VLANs on which the packets can be by passed will not be advertised
by GVRP on this port. However, since the traffic on these VLANs are forwarded, this vlan trunk
port should participate the MSTP instances corresponding to these VLAN.
Format
config vlan_trunk ports [<portlist> | all] | state [enable | disable]
1030
Parameters
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
state - Specify that the port is a VLAN trunk port or not.
enable - Specify that the port is a VLAN trunk port.
disable - Specify that the port is not a VLAN trunk port.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure VLAN trunk ports:
DGS-3120-24TC:admin# config vlan_trunk ports 1:1-1:5 state enable
Command: config vlan_trunk ports 1:1-1:5 state enable
Success.
DGS-3120-24TC:admin#
Success.
Success.
Success.
DGS-3120-24PC:admin#
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24PC:admin#
Port 6, 7 have the same VLAN configuration before enabling VLAN trunk.
Port 6 is LA-1 member port; port 7 is LA-1 master port.
DGS-3120-24TC:admin# config vlan_trunk ports 1:7 state disable
Command: config vlan_trunk ports 1:7 state disable
Success.
Success.
DGS-3120-24TC:admin#
Format
show vlan_trunk
Parameters
None.
Restrictions
None.
Example
To show the VLAN Trunk information:
1032
DGS-3120-24TC:admin#show vlan_trunk
Command: show vlan_trunk
DGS-3120-24TC:admin#
The following example displays the VLAN information which will also display VLAN trunk setting:
DGS-3120-24TC:admin# show vlan
Command: show vlan
DGS-3120-24TC:admin#
1033
Format
enable voice_vlan [<vlan_name 32> | vlanid <vlanid 1-4094>]
Parameters
<vlan_name 32> - Enter the name of the voice VLAN here. This name can be up to 32
characters long.
vlanid - Specify the VLAN ID of the voice VLAN.
<vlanid 1-4094> - Enter the voice VLAN ID here. This value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable a voice VLAN with name “v2”:
1034
Success.
DGS-3120-24TC:admin#
Format
disable voice_vlan
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable the voice VLAN:
DGS-3120-24TC:admin# disable voice_vlan
Command: disable voice_vlan
Success.
DGS-3120-24TC:admin#
Format
config voice_vlan priority <int 0-7>
Parameters
priority - The priority of the voice VLAN. The default priority is 5.
<int 0-7> - Enter the priotity value here. This value must be between 0 and 7.
1035
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To set the priority of the voice VLAN to be six:
DGS-3120-24TC:admin# config voice_vlan priority 6
Command: config voice_vlan priority 6
Success.
DGS-3120-24TC:admin#
Format
config voice_vlan oui [add | delete] <macaddr> <macmask> {description <desc 32>}
Parameters
oui - Specify the OUI used for this configuration.
add - Adding a user-defined OUI of a voice device vendor.
delete - Deleting a user-defined OUI of a voice device vendor.
<macaddr> - The user-defined OUI MAC address.
<macmask> - The user-defined OUI MAC address mask.
description - (Optional) The description for the user-defined OUI.
<desc 32> - Enter the description here. This value can be up to 32 characters long.
1036
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To add a user-defined OUI for a voice device:
DGS-3120-24TC:admin# config voice_vlan oui add 00-0A-OB-00-00-00 FF-FF-FF-00-
00-00
Command: config voice_vlan oui add 00-0A-OB-00-00-00 FF-FF-FF-00-00-00
Success.
DGS-3120-24TC:admin#
Format
config voice_vlan ports [<portlist> | all] [state [enable | disable] | mode [auto {[tag
|untag]}|manual]]
Parameters
ports - Specify a range of port to set.
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
state - The voice VLAN function state on ports. The default state is disabled.
enable - Specify that the voice VLAN function for this switch will be enabled.
disable - Specify that the voice VLAN function for this switch will be disabled.
mode - The voice VLAN mode. The default mode is auto.
auto - Specify that the voice VLAN mode will be set to auto.
tag - When the port is working in auto-tagged mode, and learns about a voice device
through the device’s OUI, it will join the voice VLAN as a tagged member automatically.
When the voice device sends voice VLAN tagged packets, the Switch will change its
priority. When the voice device sends untagged packets, it will forward them to port’s
PVID VLAN.
untag - When the port is working in auto-untagged mode, and the port captures a voice
device through the device’s OUI, it will join the voice VLAN as an untagged member
automatically. When the voice device sends voice VLAN tagged packets, the Switch will
forward them according to the tag. When the voice device sends voice VLAN untagged
packets, it will assign priority and voice VLAN ID into this packet. When the Switch
receives LLDP-MED packets, it checks the VLAN ID, tagged flag and priority flag.The
switch should follow the tagged flag and priority setting. By default, the mode is auto
untagged.
manual - Specify that the voice VLAN mode will be set to manual.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
1037
Example
To configure voice VLAN ports 4-6 to enable:
DGS-3120-24TC:admin#config voice_vlan ports 1:4-1:6 state enable
Command: config voice_vlan ports 1:4-1:6 state enable
Success.
DGS-3120-24TC:admin#
Success.
DGS-3120-24TC:admin#
Format
config voice_vlan aging_time <min 1-65535>
Parameters
aging_time - The aging time to set. The default value is 720 minutes.
<min 1-65535> - Enter the aging time value here. This value must be between 1 and 65535.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To set 60 minutes as the aging time of voice VLAN:
1038
Success.
DGS-3120-24TC:admin#
Format
config voice_vlan log state [enable | disable]
Parameters
enable - Specify that the sending of a voice VLAN log will be enabled.
disable - Specify that the sending of a voice VLAN log will be disabled.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable the log state for voice VLAN:
DGS-3120-24TC:admin#config voice_vlan log state enable
Command: config voice_vlan log state enable
Success.
DGS-3120-24TC:admin#
Format
show voice_vlan
Parameters
None.
1039
Restrictions
None.
Example
To display the voice VLAN global information when voice VLAN is enabled:
DGS-3120-24TC:admin#show voice_vlan
Command: show voice_vlan
DGS-3120-24TC:admin#
To display the voice VLAN global information when voice VLAN is disabled:
DGS-3120-24TC:admin#show voice_vlan
Command: show voice_vlan
DGS-3120-24TC:admin#
Format
show voice_vlan oui
Parameters
None.
1040
Restrictions
None.
Example
To display the OUI information of voice VLAN:
DGS-3120-24TC:admin#show voice_vlan oui
Command: show voice_vlan oui
Total Entries: 9
DGS-3120-24TC:admin#
Format
show voice_vlan ports {<portlist>}
Parameters
<portlist> - (Optional) Enter a list of ports used to be displayed here.
Restrictions
None.
Example
To display the voice VLAN information of ports 1-5:
1041
DGS-3120-24TC:admin#
Format
show voice_vlan voice_device {ports <portlist>}
Parameters
ports - (Optional) Specify the list of ports to be configured here.
<portlist> - Enter a list of ports used to be displayed here.
Restrictions
None.
Example
To display the voice devices that are connected to the ports 1-5:
1042
Total Entries: 6
DGS-3120-24TC:admin#
Format
show voice_vlan lldp_med voice_device
Parameters
None.
Restrictions
None.
Example
To display the voice devices discovered by LLDP-MED:
1043
Index : 1
Local Port : 1:1
Chassis ID Subtype : MAC Address
Chassis ID : 00-E0-BB-00-00-11
Port ID Subtype : Network Address
Port ID : 172.18.1.1
Create Time : 10/6/2008 09:00
Remain Time : 120 Seconds
Index : 2
Local Port : 1:3
Chassis ID Subtype : MAC Address
Chassis ID : 00-E0-BB-00-00-12
Port ID Subtype : Network Address
Port ID : 172.18.1.2
Create Time : 10/6/2008 09:00
Remain Time : 120 Seconds
Total Entries: 2
DGS-3120-24TC:admin#
1044
Format
enable wac
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable WAC:
1045
Success.
DGS-3120-24TC:admin#
Format
disable wac
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable WAC:
DGS-3120-24TC:admin# disable wac
Command: disable wac
Success.
DGS-3120-24TC:admin#
Format
config wac ports [<portlist> | all] {state [enable | disable] | aging_time [infinite | <min 1-
1440>] | idle_time [infinite | <min 1-1440>] | block_time [<sec 0-300>]} (1)
Parameters
<portlist> - A port range to set their WAC state.
1046
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config state and other parameters of the ports:
DGS-3120-24TC:admin#config wac ports 1:1-1:9 state enable
Command: config wac ports 1:1-1:9 state enable
Success.
DGS-3120-24TC:admin#
Format
config wac method [local | radius]
Parameters
local - The authentication will be done via the local database.
radius - The authentication will be done via the RADIUS server.
1047
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure WAC auth method:
DGS-3120-24TC:admin# config wac method radius
Command: config wac method radius
Success.
DGS-3120-24TC:admin#
Format
config wac default_redirpath <string 128>
Parameters
<string 128> - The URL that the client will be redirected to after successful authentication. By
default, the redirected path is cleared. This value can be up to 128 characters long.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config WAC default redirect URL:
DGS-3120-24TC:admin# config wac default_redirpath http://www.dlink.com
Command: config wac default_redirpath http://www.dlink.com
Success.
DGS-3120-24TC:admin#
1048
Format
config wac clear_default_redirpath
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To clear WAC default redirect URL:
DGS-3120-24TC:admin#config wac clear_default_redirpath
Command: config wac clear_default_redirpath
Success.
DGS-3120-24TC:admin#
Format
config wac virtual_ip {<ipaddr> | <ipv6addr>}(1)
Parameters
<ipaddr> - Specify the IP address of the virtual IP.
<ipv6addr> - Specify the IPv6 address of the virtual IP. (EI Mode Only)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
1049
Example
Set virtual IP address:
DGS-3120-24TC:admin# config wac virtual_ip 1.1.1.1
Command: config wac virtual_ip 1.1.1.1
Success.
DGS-3120-24TC:admin#
Format
config wac switch_http_port <tcp_port_number 1-65535> {[http | https]}
Parameters
<tcp_port_number 1-65535> - A TCP port which the WAC Switch listens to and uses to finish
the authenticating process. The range of port number is 1-65535.
http - (Optional) To specify the WAC runs HTTP protocol on this TCP port.
https - (Optional) To specify the WAC runs HTTPS protocol on this TCP port.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config HTTP(s) port of the Switch used by WAC:
DGS-3120-24TC:admin# config wac switch_http_port 8888 http
Command: config wac switch_http_port 8888 http
Success.
DGS-3120-24TC:admin#
1050
Format
create wac user <username 15> {[vlan <vlan_name 32> | vlanid <vlanid 1-4094>]}
Parameters
user - User account for web-base access control.
<username 15> - Enter the user name here. This name can be up to 15 characters long.
vlan - (Optional) Specify the target VLAN name for authenticated hosts which will uses this user
account to pass authentication.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32 characters
long.
vlanid - (Optional) Specify the target VLAN ID for authenticated hosts which will uses this user
account to pass authentication.
<vlanid 1-4094> - Enter the VLAN ID used here. This value must be between 1 and 4094.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a WAC local user:
DGS-3120-24TC:admin#create wac user Jim
Command: create wac user Jim
DGS-3120-24TC:admin#
Format
delete wac [user <username 15> | all_users]
1051
Parameters
user - To specify the user name to be deleted
<username 15> - Enter the username used here. This name can be up to 15 characters long.
all_users - All user accounts in local DB will be deleted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete a WAC local user:
DGS-3120-24TC:admin# delete wac user 123
Command: delete wac user 123
Success.
DGS-3120-24TC:admin#
Format
config wac user <username 15> [vlan <vlan_name 32> | vlanid <vlanid 1-4094> | clear_vlan]
Parameters
user - The user name to be configured.
<username 15> - Enter the username used here. This name can be up to 32 characters long.
vlan - Specify the VLAN name for authenticated host which uses this user account to pass
authentication.
<vlan_name 32> - Enter the name of the VLAN here. This name can be up to 32 characters
long.
vlanid - Target VLAN ID for authenticated host which uses this user account to pass
authentication.
<vlanid 1-4094> - Enter the VLAN ID used here. This value must be between 1 and 4094.
clear_vlan - Specify that the VLAN details for the specified user will be cleared.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure WAC local user:
1052
DGS-3120-24TC:admin#
Format
config wac authorization attributes {radius [enable| disable] | local [enable | disable]}(1)
Parameters
radius - (Optional) If specified to enable, the authorized data assigned by the RADUIS server will
be accepted if the global authorization network is enabled. The default state is enabled.
enable - Specify that the authorized data assigned by the RADUIS server will be accepted.
disable - Specify that the authorized data assigned by the RADUIS server will not be
accepted.
local - (Optional) If specified to enable, the authorized data assigned by the local database will
be accepted if the global authorization network is enabled. The default state is enabled.
enable - Specify that the authorized data assigned by the local database will be accepted.
disable - Specify that the authorized data assigned by the local database will not be accepted.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable acceptation of authorized configuration:
DGS-3120-24TC:admin# config wac authorization attributes local disable
Command: config wac authorization attributes local disable
Success.
DGS-3120-24TC:admin#
1053
Format
config wac authentication_page element [default | page_title <desc 128> |
login_window_title <desc 64> | user_name_title <desc 32> | password_title <desc 32> |
logout_window_title <desc 64> | notification_line <value 1-5> <desc 128>]
Parameters
default - Reset the page elements to default.
page_title - Specify to configure the title of the authentication page.
<desc 128> -Enter a description with maximum of 128 characters.
login_window_title - Specify to configure the login window title of the authentication page.
<desc 64> - Enter a description with maximum of 64 characters.
user_name_title - Specify configure the user name title of the authentication page.
<desc 32> - Enter a description with maximum of 32 characters.
password_title - Specify to configure the password title of the authentication page.
<desc 32> - Enter a description with maximum of 64 characters.
logout_window_title - Specify to configure the logout window title of the authentication page.
<desc 64> - Enter a description with maximum of 64 characters.
notification_line - Specify to set the notification information by line in authentication Web pages.
<value 1-5> - Enter a value between 1 and 5.
<desc 128> - Enter a description with maximum of 128 characters.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the authenticate page elements:
DGS-3120-24TC:admin#config wac authentication_page element notification_line 1 C
opyright @ 2011 D-Link All Rights Reserved
Command: config wac authentication_page element notification_line 1 Copyright @
2011 D-Link All Rights Reserved
Success.
DGS-3120-24TC:admin#
1054
Format
show wac
Parameters
None.
Restrictions
None.
Example
Show global configuration about WAC:
DGS-3120-24TC:admin#show wac
Command: show wac
DGS-3120-24TC:admin#
Format
show wac ports {<portlist>}
Parameters
ports - Specify a range of member ports to show the status.
<portlist> - (Optional) Enter a list of ports to display here.
Restrictions
None.
1055
Example
To show WAC port state and other parameters:
DGS-3120-24TC:admin# show wac ports 1-3
Command: show wac ports 1-3
DGS-3120-24TC:admin#
Format
show wac user
Parameters
None.
Restrictions
None.
Example
To show WAC local user:
DGS-3120-24TC:admin# show wac user
Command: show wac user
User Name Password VID
----------------- ----------------- ---------
Jim pasx 1000
Total Entries: 1
DGS-3120-24TC:admin#
1056
Format
show wac auth_state ports {<portlist>}
Parameters
ports - Specify a range of member ports to show the status.
<portlist> - (Optional) Enter a list of ports to display here.
Restrictions
None.
Example
Supposed that port 1 is in host-based mode:
1. MAC 00-00-00-00-00-01 is authenticated without VLAN assigned (may be the specified
target VLAN does not exist or target VLAN has not been specified at all), the ID of RX
VLAN will be displayed (RX VLAN ID is 20 and the assigned VLAN ID is 4004 in this
example).
2. MAC 00-00-00-00-00-02 is authenticated with target VLAN assigned, the ID of target
VLAN will be displayed (RX VLAN ID is 20 and the assigned VLAN ID is 1234 in this
example).
3. MAC 00-00-00-00-00-03 failed to pass authentication, the VID field will be shown as “-”
indicating that packets with SA 00-00-00-00-00-03 will be dropped no matter which VLAN
these packets are from.
4. MAC 00-00-00-00-00-04 attempts to start authentication, the VID field will be shown as “-
“until authentication completed.
1057
Port MAC Address Original State VID Pri Aging Time/ Idle
RX VID Block Time
Time
------ -------------------- ---- -------------- ---- -- ----------- ----
1:1 00-00-00-00-00-01 20 Authenticated - 3 Infinite 40
1:1 00-00-00-00-00-02 20 Authenticated 1234 - Infinite 50
1:1 00-00-00-00-00-03 4004 Blocked - - 60 -
1:1 00-00-00-00-00-04 4004 Authenticating - - 10 -
1:2 00-00-00-00-00-10(P) 2040 Authenticated 1234 2 1440 20
1:3 00-00-00-00-00-20(P) 2045 Authenticating - - 5 -
1:3 00-00-00-00-00-21(P) 2045 Blocked - - 100 -
DGS-3120-24TC:admin#
Format
show wac authenticate_page
Parameters
None.
Restrictions
None.
Example
To display the authentication page elements:
DGS-3120-24TC:admin#show wac authenticate_page
Command: show wac authenticate_page
1058
DGS-3120-24TC:admin#
Format
clear wac auth_state [ports [<portlist> | all] {authenticated | authenticating | blocked} |
macaddr <macaddr>]
Parameters
ports - Specify the list of ports whose WAC state will be cleared.
<portlist> - Enter a list of ports used for the configuration here.
all - Specify that all the ports will be used for this configuration.
authenticated - (Optional) Specified to clear all authenticated users for a port.
authenticating - (Optional) Specified to clear all authenticating users for a port.
blocked - (Optional) Specified to clear all blocked users for a port.
macaddr - Specify the MAC address of the users to be cleared.
<macaddr> - Enter the MAC address of the users to be cleared here.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete WAC hosts on ports 1 to 5:
DGS-3120-24TC:admin#clear wac auth_state ports 1:1-1:5
Command: clear wac auth_state ports 1:1-1:5
Success.
DGS-3120-24TC:admin#
1059
Format
enable wred
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To enable global wred state:
DGS-3120-24TC:admin#enable wred
Command: enable wred
Success.
DGS-3120-24TC:admin#
1060
Format
disable wred
Parameters
None.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To disable wred global state:
DGS-3120-24TC:admin#disable wred
Command: disable wred
Success.
DGS-3120-24TC:admin#
Format
create wred profile <int 2-128> profile_name <profile_name 32>
Parameters
<int 2-128> - Specify the WRED profile ID to be added.
profile_name - Specify the profile name to be added.
<profile_name 32> - Enter the profile name.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a wred profile id 2:
1061
Success.
DGS-3120-24TC:admin#
Format
config wred profile [default | profile_id <int 2-128> | <profile_name 32>] {tcp | non_tcp}
{green | yellow | red} min_threshold <int 0-100> max_threshold <int 0-100> max_drop_rate
<int 0-100>
Parameters
default - Specify the default WRED profile to be configured.
profile_id - Specify the WRED profile ID to be configured.
<int 2-128> - Enter the WRED profile ID.
<profile_name 32> - Enter the WRED profile name.
tcp - (Optional) Specify the TCP type of packets to be dropped.
non_tcp - (Optional) Specify the non-TCP type of packets to be dropped.
green - (Optional) Specify the green packets to be dropped.
yellow - (Optional) Specify the yellow packets to be dropped.
red - (Optional) Specify the red packets to be dropped.
min_threshold - Specify the minimum threshold value used. If the queue size is higher than this
value, then the color yellow will be assigned to it. If the queue size is lower than this value,
then the color green will be assigned to it and then it will be guaranteed not to be dropped.
Yellow packet behavior depends on the profile setting for this color.
<int 0-100> - Enter the value between 0 and 100.
max_threshold - Specify the maximum threshold value used. If the queue size is lower than this
value, then the color yellow will be assigned to it. If the queue size is higher than this value,
then the color red will be assigned to it and then it will be dropped. Yellow packet behavior
depends on the profile setting for this color.
<int 0-100> - Enter the value between 0 and 100.
max_drop_rate - Specify the maximum drop rate value.
<int 0-100> - Enter the value between 0 and 100.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To config the profile 2 to drop all type and all color packets:
1062
Success.
DGS-3120-24TC:admin#
Format
config wred ports [<portlist> | all] [cos <class_id 0-7> [profile [default | profile_id <int 2-128>
| <profile_name 32>] | weight <int 0-15>] | profile [default | profile_id <int 2-128> |
<profile_name 32>] | weight <int 0-15>]
Parameters
<portlist> - Specify a range of ports to be configured.
all - Specify all ports to be configured.
cos – Specify the hardware priority queues.
<class_id 0-7> - Enter the priority between 0 and 7.
profile - Specify the profile to be used.
default - Specify the default profile to be used.
profile_id - Specify the profile ID to be used.
<int 2-128> - Enter the profile ID between 2 and 128.
<profile_name 32> - Specify the profile name to be used.
weight – Specify the weight of average queue size formular.
<int 0-15> - Enter the weight between 0 and 15.
profile - Specify the profile to be used.
default - Specify the default profile to be used.
profile_id - Specify the profile ID to be used.
<int 2-128> - Enter the profile ID between 2 and 128.
<profile_name 32> - Specify the profile name to be used.
weight – Specify the weight of average queue size formular.
<int 0-15> - Enter the weight between 0 and 15.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the port 1:1 as queue 2 and to use the profile 2:
1063
Success.
DGS-3120-24TC:admin#
Format
delete wred profile [profile_id <int 2-128> | <profile_name 32> |all]
Parameters
profile_id - Specify the profile ID to be deleted.
<int 2-128> - Enter the profile ID between 2 and 128.
<profile_name 32> - Specify the profile name to be delete.
all - Specify all profiles to be delete.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To delete the profile 2:
DGS-3120-24TC:admin#delete wred profile all
Command: delete wred profile all
Success.
DGS-3120-24TC:admin#
Format
show wred {ports {<portlist>}}
Parameters
ports - (Optional) Specify a range of ports.
1064
Restrictions
None.
Example
To display wred of port 1:1 and 1:2 settings:
DGS-3120-24TC:admin#show wred ports 1:1-1:2
Command: show wred ports 1:1-1:2
Port: 1:1
Class_ID Weight Profile_id Profile_Name
-------- ------ ---------- ------------
0 9 1 default
1 9 1 default
2 2 2 profilename
3 9 1 default
4 9 1 default
5 9 1 default
6 9 1 default
7 9 1 default
Port: 1:2
Class_ID Weight Profile_id Profile_Name
-------- ------ ---------- ------------
0 9 1 default
1 9 1 default
2 9 1 default
3 9 1 default
4 9 1 default
5 9 1 default
6 9 1 default
7 9 1 default
DGS-3120-24TC:admin#
Format
show wred profile {[ default | profile_id <int 2-128> | <profile_name 32>]}
1065
Parameters
default - (Optional) Specify the default profile to be displayed.
profile_id - (Optional) Specify the profile ID to be displayed.
<int 2-128> - Enter the profile ID between 2 and 128.
<profile_name 32> - (Optional) Specify the profile name to be displayed.
Restrictions
None.
Example
To display the WRED profile information:
DGS-3120-24TC:admin#show wred profile
Command: show wred profile
DGS-3120-24TC:admin#
1066
3. In the “Password Recovery Mode” only the following commands can be used.
Command Parameters
reset config The reset config command resets the whole configuration back to the
{force_agree} default values. If force_agree is specified, the configuration will reset to
default without the user’s agreement.
reboot The reboot command exits the Reset Password Recovery Mode and
{force_agree} restarts the Switch. A confirmation message will be displayed to allow the
user to save the current settings.
1067
Command Parameters
reset account The reset account command deletes all the previously created accounts.
reset password The reset password command resets the password of the specified user. If
{<username>} a username is not specified, the passwords of all users will be reset.
show account The show account command displays all previously created accounts.
1068
1070
1071
1073
1074
1075
1076
1077
1078
1079
<[unitID:]portNum>,
Direction:<mepdirection>)
CFM EXTENSION AIS condition detected AIS condition detected. MD Notice
Level:<mdlevel>,
VLAN:<vlanid>, Local(Port
<[unitID:]portNum>,
Direction:<mepdirection>,
MEPID:<mepid>)
AIS condition cleared AIS condition cleared. MD Notice
Level:<mdlevel>,
VLAN:<vlanid>, Local(Port
<[unitID:]portNum>,
Direction:<mepdirection>,
MEPID:<mepid>)
LCK condition detected LCK condition detected. MD Notice
Level:<mdlevel>,
VLAN:<vlanid>, Local(Port
<[unitID:]portNum>,
Direction:<mepdirection>,
MEPID:<mepid>)
LCK condition cleared LCK condition cleared. MD Notice
Level:<mdlevel>,
VLAN:<vlanid>, Local(Port
<[unitID:]portNum>,
Direction:<mepdirection>,
MEPID:<mepid>)
Voice VLAN When a new voice device New voice device detected Informational
is detected in the port (MAC:<macaddr>,Port:<[unitID:]
portNum>)
While the port join to the Port <[unitID:]portNum> add into Informational
voice VLAN while the port voice VLAN <vid >
is auto voice VLAN mode
While the port withdraws Port <[unitID:]portNum> remove Informational
from the voice VLAN while from voice VLAN <vid >
there is no more voice
device detected in the
aging interval.
ERPS Signal failure detected Signal failure detected on node Notice
<macaddr>
Signal failure cleared Signal failure cleared on node Notice
<macaddr>
RPL owner conflict RPL owner conflicted on the ring Warning
<macaddr>
Command Command Logging <username>: execute command Informational
logging "<string>".
DDM DDM exceeded or recover DDM Port <[unitID:]portNum> Critical
from DDM alarm threshold optic module [thresholdType]
[exceedType] the
[thresholdSubType] alarm
threshold
DDM exceeded or recover DDM Port <[unitID:]portNum> Warning
from DDM warning optic module [thresholdType]
threshold [exceedType] the
[thresholdSubType] warning
threshold
LAC Lac trunk group link down Link aggregation Group <LAG Information
and link up log. Index> (Interface: <LAG
interface index>) <link status>
SD Card Execute configuration Error when execute configuration Warning
Management error. <filename> line:<lineno> at time
< time-range>.
Schedule backup fail. Backup <type>:<filename> at Warning
time <time-range> failure.
Execute configuration Execute configuration Informational
success. <filename> success at time <
time-range>.
Schedule backup Backup <type>:<filename> Informational
success. success at time <time-range>.
LLDP LLDP-MED Topology LLDP-MED Topology change notice
change detected detected (on port %d. chassis id:
%d, %s, port id: %d, %s, device
class: %d)
Conflict LLDP-MED Conflict LLDP-MED device type notice
device type detected detected (on port %d. chassis id:
1080
table.
A virtual MAC address is Added a virtual IP <vrrp-ip-addr> Notice
adding into switch L3 MAC <vrrp-mac-addr> into L3
table. table
A virtual MAC address is Deleted a virtual IP <vrrp-ip- Notice
deleting from switch L3 addr> MAC <vrrp-mac-addr>
table. from L3 table
Failed when adding a Failed to add virtual MAC <vrrp- Error
virtual MAC into switch mac-addr> into chip L2 table.
chip L2 table. Errcode <vrrp-errcode>
Failed when deleting a Failed to delete virtual MAC Error
virtual MAC from switch <vrrp-mac-addr> from chip L2
chip L2 table. table. Errcode <vrrp-errcode>
Failed when adding a Failed to add virtual IP <vrrp-ip- Error
virtual MAC into switch L3 addr> MAC <vrrp-mac-addr> into
table. The L3 table is full. L3 table. L3 table is full
Failed when adding a Failed to add virtual IP <vrrp-ip- Error
virtual MAC into switch L3 addr> MAC <vrrp-mac-addr> into
table. The port where the L3 table. Port <mac-port> is
MAC is learned from is invalid
invalid.
Failed when adding a Failed to add virtual IP <vrrp-ip- Error
virtual MAC into switch L3 addr> MAC <vrrp-mac-addr> into
table. The interface where L3 table. Interface <mac-intf> is
the MAC is learned from is invalid
invalid.
Failed when adding a Failed to add virtual IP <vrrp-ip- Error
virtual MAC into switch L3 addr> MAC <vrrp-mac-addr> into
table. The box where the L3 table. Box id <mac-box> is
MAC is learned from is invalid
invalid.
Failed when adding a Failed to add virtual IP <vrrp-ip- Error
virtual MAC into switch addr> MAC <vrrp-mac-addr> into
chip’s L3 table. chip L3 table. Errcode <vrrp-
errcode>
Failed when deleting a Failed to delete virtual IP <vrrp- Error
virtual MAC from switch ip-addr> MAC <vrrp-mac-addr>
chip’s L3 table. from chip L3 table. Errcode
<vrrp-errcode>
RIPng The RIPng state of RIPng protocol on interface <intf- Informational
interface changed name> changed state to
<enabled | disabled>
1082
1083
1084
swVlanLoopOccurred The trap is sent when a Port with a VID loop 1.3.6.1.4.1.171.12.41.10.0.3
occurs.
Binding
1. swLoopDetectPortIndex
2. swVlanLoopDetectVID
swVlanLoopRestart The trap is sent when a Port with a VID loop 1.3.6.1.4.1.171.12.41.10.0.4
restarts after the interval time.
Binding
1. swLoopDetectPortIndex
2. swVlanLoopDetectVID
1085
1086
3. agentLoginUserName
1087
Binding
1. swDdmPort
2. swDdmThresholdType
3. swDdmThresholdExceedType
4. swDdmThresholdExceedOrRecover
1088
1089
Tree; the
trap is sent by a bridge soon after its
election
as the new root, e.g., upon expiration of the
Topology Change Timer immediately
subsequent to
its election. Implementation of this trap is
optional.
1090
This table lists the trap logs DGS-3120 Series hardware version B1 found on DGS-3120 Series
hardware version B1.
1091
1092
Binding
1. swLoopDetectPortIndex
swVlanLoopOccurred The trap is sent when a Port with a VID loop 1.3.6.1.4.1.171.12.41.10.0.3
occurs.
Binding
1. swLoopDetectPortIndex
2. swVlanLoopDetectVID
swVlanLoopRestart The trap is sent when a Port with a VID loop 1.3.6.1.4.1.171.12.41.10.0.4
restarts after the interval time.
Binding
1. swLoopDetectPortIndex
2. swVlanLoopDetectVID
1093
3. dot1agCfmMepIdentifier
1094
2. swPowerID
3. swPowerStatus
1095
4. swDdmThresholdExceedOrRecover
1096
1. swSingleIPMSID
2. swSingleIPMSMacAddr
1097
subsequent to
its election. Implementation of this trap is
optional.
Binding objects:
(1) vrrpOperMasterIpAddr
1098
Binding objects:
(1) vrrpTrapPacketSrc
(2) vrrpTrapAuthErrorType
1099
1100
The description that follows explains the following RADIUS Attributes Assignment types:
• Ingress/Egress Bandwidth
• 802.1p Default Priority
• VLAN
• ACL
If the user has configured the bandwidth attribute of the RADIUS server (for example, ingress
bandwidth 1000Kbps) and the 802.1X authentication is successful, the device will assign the
bandwidth (according to the RADIUS server) to the port. However, if the user does not configure
the bandwidth attribute and authenticates successfully, the device will not assign any bandwidth to
the port. If the bandwidth attribute is configured on the RADIUS server as "0", the effective
bandwidth will be set "no_limited", and if the bandwidth is configured lower than 0 or higher than
maximum supported value, the bandwidth will be ignored.
To assign 802.1p default priority by RADIUS Server, the proper parameters should be
configured on the RADIUS Server. The tables below show the parameters for 802.1p default
priority.
1101
To assign VLAN by RADIUS Server, the proper parameters should be configured on the RADIUS
Server. To use VLAN assignment, RFC3580 defines the following tunnel attributes in RADIUS
packets.
0 1 2 3
01234567890123456789012345678901
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The table below shows the definition of Tag field (different with RFC 2868):
1102
If the user has configured the VLAN attribute of the RADIUS server (for example, VID 3) and the
802.1X, or MAC-based Access Control authentication is successful, the port will be added to VLAN
3. However, if the user does not configure the VLAN attribute and authenticates successfully, the
port will be kept in its original VLAN. If the VLAN attribute configured on the RADIUS server does
not exist, the port will not be assigned to the requested VLAN.
To assign ACL by RADIUS Server, the proper parameters should be configured on the RADIUS
Server. The table below shows the parameters for an ACL.
1103
If the user has configured the ACL attribute of the RADIUS server (for example, ACL profile:
create access_profile profile_id 6 profile_name 1 ethernet; ACL rule: config access_profile
profile_id 6 add access_id auto_assign ethernet), and the 802.1X, MAC-based Access Control,
WAC or JWAC authentication is successful, the device will assign the ACL profiles and rules
according to the RADIUS server. For more information about the ACL module, please refer to
Chapter 22 Access Control List (ACL) Commands.
1104